syzkaller is an unsupervised coverage-guided kernel fuzzer
Go to file
Eric Biggers a4e87d4bb6 sys/linux: update fscrypt descriptions
- For v5.4: new ioctls FS_IOC_ADD_ENCRYPTION_KEY,
  FS_IOC_REMOVE_ENCRYPTION_KEY, FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS,
  FS_IOC_GET_ENCRYPTION_KEY_STATUS, and FS_IOC_GET_ENCRYPTION_POLICY_EX.

- For v5.4: FS_IOC_SET_ENCRYPTION_POLICY now accepts an
  fscrypt_policy_v2 argument in addition to the original fscrypt_policy
  which is now called fscrypt_policy_v1.

- For v5.4: the fscrypt definitions were moved to a new header
  <linux/fscrypt.h>, and some constants were given new FSCRYPT_* names
  instead of FS_*.  Handle this, and to keep things organized similarly
  move the syzkaller descriptions to a new file fscrypt.txt.

- For v5.0: remove the removed Speck modes and add Adiantum.

- For v5.0: add the DIRECT_KEY encryption policy flag.

Also fix the argument types for FS_IOC_GET_ENCRYPTION_POLICY and
FS_IOC_GET_ENCRYPTION_PWSALT, which had been mixed up.
2019-09-19 09:38:51 +02:00
dashboard dashboard/config: Add netbsd kernel configs 2019-09-18 15:00:55 +02:00
docs docs: update syzbot.md 2019-09-18 15:09:15 +02:00
executor sys/linux: update BPF's anonymous structures 2019-09-18 06:50:02 +02:00
Godeps vendor/github.com/google/go-cmp: update to HEAD 2019-03-17 18:06:44 +01:00
pkg pkg/build: build netbsd using config files 2019-09-18 15:00:55 +02:00
prog prog: implemented argument and call priorities 2019-09-04 10:46:46 +02:00
sys sys/linux: update fscrypt descriptions 2019-09-19 09:38:51 +02:00
syz-ci syz-ci: fix variable shadowing 2019-05-12 11:42:33 +02:00
syz-fuzzer syz-fuzzer: setup host features during image testing 2019-05-21 12:22:58 +02:00
syz-hub syz-manager: factor out rpc serving part 2018-12-26 10:58:23 +01:00
syz-manager pkg/cover: hierarchical coverage reports 2019-07-26 19:32:14 +02:00
tools runtest: add a flag to specify tests to run 2019-09-17 15:58:29 +02:00
vendor vendor/github.com/google/go-cmp: update to HEAD 2019-03-17 18:06:44 +01:00
vm all: convert Fuchsia to use "host fuzzing" mode 2019-08-27 14:39:18 -07:00
.clang-format buildbot: add .travis.yml 2017-07-28 13:25:48 +02:00
.gitignore fuzzit.sh: migrate syzkaller to new org and introduce regression 2019-08-09 11:56:42 +02:00
.golangci.yml updated golangci.yml to exclude new errors 2019-09-17 13:02:55 +02:00
.travis.yml fix fuzzit script to work with latest CLI syntax 2019-09-13 15:37:40 +01:00
AUTHORS sys/freebsd: Add support for fuzzing FreeBSD/i386 2019-05-29 14:28:59 +02:00
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 2019-02-04 12:05:04 +01:00
CONTRIBUTORS pkg/host: improve openat check 2019-06-11 12:06:50 +02:00
fuzzbuzz.yaml fuzz.yaml: rename to fuzzbuzz.yaml 2019-07-19 10:45:19 +02:00
fuzzit.sh fix fuzzit script to work with latest CLI syntax 2019-09-13 15:37:40 +01:00
LICENSE initial commit 2015-10-12 10:16:57 +02:00
Makefile all: convert Fuchsia to use "host fuzzing" mode 2019-08-27 14:39:18 -07:00
README.md fuzzit.sh: migrate syzkaller to new org and introduce regression 2019-08-09 11:56:42 +02:00

syzkaller - kernel fuzzer

Build Status fuzzit Go Report Card Coverage Status GoDoc License

syzkaller is an unsupervised coverage-guided kernel fuzzer.
Supported OSes: Akaros, FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, Windows.

Mailing list: syzkaller@googlegroups.com (join on web or by email).

Found bugs: Akaros, Darwin/XNU, FreeBSD, Linux, NetBSD, OpenBSD, Windows.

Documentation

Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, Darwin/XNU, FreeBSD, Fuchsia, NetBSD, OpenBSD, Windows, gVisor.

External Articles

Disclaimer

This is not an official Google product.