syzkaller is an unsupervised coverage-guided kernel fuzzer
Go to file
2020-02-21 17:56:49 +01:00
.github/workflows CIFuzz: update config file 2020-02-20 07:22:42 +01:00
dashboard dashboard/config: Add CONFIG_MPTCP to default configs and update to 5.6-rc1 2020-02-17 19:32:41 +01:00
docs vm/isolated: add initial support for fuzzing chromebooks 2020-02-20 17:37:54 +01:00
executor sys/linux: add NETLINK_RDMA descriptions 2020-02-21 17:38:10 +01:00
Godeps vendor: update vendored files 2020-01-29 16:01:06 +01:00
pkg sys/linux: add NETLINK_RDMA descriptions 2020-02-21 17:38:10 +01:00
prog prog: dump orig prog if Deserialize panics 2020-02-21 10:22:07 +01:00
sys sys/linux: add NETLINK_RDMA descriptions 2020-02-21 17:38:10 +01:00
syz-ci prog: dump orig prog if Deserialize panics 2020-02-21 10:22:07 +01:00
syz-fuzzer prog: dump orig prog if Deserialize panics 2020-02-21 10:22:07 +01:00
syz-hub syz-hub: cap total number of programs sent to a manager 2019-11-29 10:46:26 +01:00
syz-manager prog: dump orig prog if Deserialize panics 2020-02-21 10:22:07 +01:00
tools tools/check-copyright.sh: also check cc/h/S files 2020-02-21 17:56:49 +01:00
vendor vendor: update vendored files 2020-01-29 16:01:06 +01:00
vm vm/isolated: add initial support for fuzzing chromebooks 2020-02-20 17:37:54 +01:00
.clang-format buildbot: add .travis.yml 2017-07-28 13:25:48 +02:00
.gitattributes sys/linux: use literal consts instead of hardcoded number 2020-02-01 11:33:32 +01:00
.gitignore dashboard/app: fix testing for go1.11 runtime 2020-01-29 16:01:06 +01:00
.golangci.yml tools/syz-trace2syz: disable golangci-lint 2019-10-08 12:31:54 +02:00
.travis.yml .travis.yml: add go1.14rc1 2020-02-09 14:09:19 +02:00
AUTHORS sys/linux: add new FUTEX_WAIT_MULTIPLE operation 2020-02-17 06:27:23 +01:00
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 2019-02-04 12:05:04 +01:00
CONTRIBUTORS sys/linux: add new FUTEX_WAIT_MULTIPLE operation 2020-02-17 06:27:23 +01:00
fuzzbuzz.yaml fuzz.yaml: rename to fuzzbuzz.yaml 2019-07-19 10:45:19 +02:00
fuzzit.sh fix fuzzit script to work with latest CLI syntax 2019-09-13 15:37:40 +01:00
LICENSE initial commit 2015-10-12 10:16:57 +02:00
Makefile prog: dump orig prog if Deserialize panics 2020-02-21 10:22:07 +01:00
README.md README: add proper syzkaller pronunciation 2020-02-01 12:34:56 +01:00

syzkaller - kernel fuzzer

Build Status fuzzit Go Report Card Coverage Status GoDoc License

syzkaller ([siːzˈːlə]) is an unsupervised coverage-guided kernel fuzzer.
Supported OSes: Akaros, FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, Windows.

Mailing list: syzkaller@googlegroups.com (join on web or by email).

Found bugs: Akaros, Darwin/XNU, FreeBSD, Linux, NetBSD, OpenBSD, Windows.

Documentation

Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, Darwin/XNU, FreeBSD, Fuchsia, NetBSD, OpenBSD, Windows, gVisor.

External Articles

Disclaimer

This is not an official Google product.