syzkaller
Syzkaller is an open-source, coverage-guided fuzzer for operating-system kernels, originally developed by Google. It automatically generates and mutates sequences of system calls, executes them inside a kernel sandbox, and uses code coverage feedback to guide exploration. Its primary purpose is to discover security vulnerabilities and stability issues in kernel code, including memory-safety bugs such as use-after-free and null dereferences.
The fuzzer operates on programs that describe sequences of system calls and their arguments. It maintains a
Syzkaller is composed of several components, including a coordinating manager and one or more executors that
Although optimized for Linux, syzkaller has been ported to other kernels with additional syscall definitions and