sys/targets: use kernel.full instead of kernel.debug

The latter contains only debug symbols and is meant to be used with the
kernel executable.  That is, the kernel executable contains a
.gnu_debuglink pointer to kernel.debug.  kernel.full contains
everything, including a copy of the kernel's text section, which we want
when enumerating __sanitizer_cov_trace_pc() calls for a coverage report.
1 file changed
tree: b1999c319f2eb54cb4f22f86073fdaa3a6fd32a2
  1. dashboard/
  2. docs/
  3. executor/
  4. Godeps/
  5. pkg/
  6. prog/
  7. sys/
  8. syz-ci/
  9. syz-fuzzer/
  10. syz-hub/
  11. syz-manager/
  12. tools/
  13. vendor/
  14. vm/
  15. .clang-format
  16. .gitignore
  17. .gometalinter.json
  18. .travis.yml
  19. AUTHORS
  20. CODE_OF_CONDUCT.md
  21. CONTRIBUTORS
  22. fuzz.yaml
  23. LICENSE
  24. Makefile
  25. README.md
README.md

syzkaller - kernel fuzzer

Build Status Go Report Card Coverage Status GoDoc License

syzkaller is an unsupervised coverage-guided kernel fuzzer.
Supported OSes: Akaros, FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, Windows.

Mailing list: syzkaller@googlegroups.com (join on web or by email).

Found bugs: Akaros, Darwin/XNU, FreeBSD, Linux, NetBSD, OpenBSD, Windows.

Documentation

Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, Darwin/XNU, FreeBSD, Fuchsia, NetBSD, OpenBSD, Windows, gVisor.

External Articles

Disclaimer

This is not an official Google product.