about summary refs log tree commit diff
path: root/src/afl-analyze.c
AgeCommit message (Collapse)Author
2023-01-03welcome 2023vanhauser-thc
2022-10-29nitsvanhauser-thc
2022-10-29fix fork server kill signals for qemu, unicorn and nyx modevanhauser-thc
2022-10-24changelog updatevanhauser-thc
2022-10-24AFL_FORK_SERVER_KILL_SIGNAL backwards compatiblityNils Bars
If `AFL_KILL_SIGNAL` is set, `AFL_FORK_SERVER_KILL_SIGNAL` is set to the same value.
2022-10-21Add AFL_FORK_SERVER_KILL_SIGNAL environment variable.Nils Bars
The AFL_FORK_SERVER_KILL_SIGNAL variable allows to configure the signal used to kill the fork server on termination.
2022-10-20Fix child reaping on fuzzer terminationNils Bars
This commit contains the following changes: - Call `waitpid()` on the child and the fork server when terminating the fuzzer; thus, we do not end up with zombies. - Rename `fsrv.kill_signal` to `fsrv.child_kill_signal`, since the documentation states that the signal is used to terminate the *child*. - Use SIGTERM instead of fsrv.(child)_kill_signal, thus the fork server can always reap the child.
2022-09-07analyze_run_target return dataconversionCodeLogicError
analyze_run_target create u64 data and return u32
2022-07-12clang format 14vanhauser-thc
2022-01-01welcome 2022vanhauser-thc
2021-12-15cleanup of TIMES macrovanhauser-thc
2021-11-16showmap -A -> -H, accurate help outputvanhauser-thc
2021-11-15Fix platform check for `-A` CoreSight modeAkira Moroo
Signed-off-by: Akira Moroo <retrage01@gmail.com>
2021-11-12Add platform check for `-A` CoreSight modeAkira Moroo
REF: https://github.com/AFLplusplus/AFLplusplus/pull/1156#discussion_r747454306 Signed-off-by: Akira Moroo <retrage01@gmail.com>
2021-11-12Clarify usage message for ARM CoreSight modeAkira Moroo
REF: https://github.com/AFLplusplus/AFLplusplus/pull/1156#issuecomment-966196217 Signed-off-by: Akira Moroo <retrage01@gmail.com>
2021-11-11Add initial CoreSight mode supportAkira Moroo
The original code is: https://github.com/RICSecLab/AFLplusplus-cs/tree/retrage/coresight-mode-pr Signed-off-by: Akira Moroo <retrage01@gmail.com>
2021-11-09fix afl- tools for new fridavanhauser-thc
2021-11-06http->httpsvanhauser-thc
2021-10-23fix timeout bug in afl toolsvanhauser-thc
2021-10-02fix some compiler warnings in 32-bit linuxhexcoder-
2021-09-07add check_binary_signatures for afl-* utilsvanhauser-thc
2021-07-30frida tool fixvanhauser-thc
2021-07-30frida tool fixvanhauser-thc
2021-06-10fix AFL_CAL_FASTvanhauser-thc
2021-06-07Forkserver for afl-analyze (#963)Dominik Maier
* afl-analyze forkserver * added missing vars to forkserver * synchronized a bit more with afl-tmin * more debugging, runs now, but need to suppress target output * fix dev/null setting * afl-analyze info: Co-authored-by: hexcoder- <heiko@hexco.de>
2021-06-07write target errors to out_dir/error.txtvanhauser-thc
2021-06-05restored timeout handling (with SIGALRM for now)hexcoder-
2021-04-04cleanupvanhauser-thc
2021-04-04Merge pull request #855 from MegaManSec/leak-sanitizervan Hauser
Add support for standalone leak-sanitizer
2021-04-04Move definition of __AFL_LEAK_CHECK inside ifguards,Joshua Rogers
use LSAN_OPTIONS=print_suppressions=0
2021-04-03Fix typos,Joshua Rogers
Use symbolize=0 for LSAN, Remove syntactic sugar.
2021-04-02Replace __AFL_CHECK_LEAK with __AFL_LEAK_CHECK to be more proper.Joshua Rogers
Fix spelling mistakes. Correctly call LSAN_ERROR not MSAN_ERROR.
2021-04-02 Add support for standalone leak-sanitizer, introducting the environmentJoshua Rogers
variable AFL_USE_LSAN. AFL_USE_LSAN introduces the macro __AFL_CHECK_LEAK() which will check for a memory leak when the macro is run. This is especially helpful when using __AFL_LOOP(). If __AFL_LEAK_CHECK() is not used when AFL_USE_LSAN=1 is set, the leak checker will run when the program exits.
2021-03-25Fix support for afl-cmin and updated READMEYour Name
2021-03-24Add support for FRIDA modeYour Name
2021-03-23make setting different file permissions easy via config.hvanhauser-thc
2021-03-15Remove AFL_PRELOAD and AFL_USE_QASAN handlersrealmadsci
These are now processed in afl-qemu-trace so that the "copy+paste" code that is in all of the other AFL tools can be removed. This also allows the AFL_USE_QASAN flag to work the same when used with tools like afl-fuzz as it does with afl-qemu-trace. This is important in situations where loading the QASAN library changes the address of your desired entrypoint, or for crash validation using the same environment that afl-fuzz was using. With this change, the same set of environment variables can be used in exactly the same way between afl-fuzz, afl-showmap, and afl-qemu-trace, and you will get exactly the same guest environment.
2021-03-04no ASAN odr violations by defaultvanhauser-thc
2021-01-30added AFL_CMPLOG_ONLY_NEW featurevan Hauser
2021-01-29AFL_USE_QASANAndrea Fioraldi
2021-01-20Fix build error for AndroidJoey Jiao
- LTO not work yet
2021-01-04code cleanups (shadowed vars, (un)signed type mismatches, format types, etc.)hexcoder-
2020-12-23warn on _AFL and __AFL env varsvan Hauser
2020-12-22one more with nonstd array initializershexcoder-
2020-12-03AFL_CRASH_EXITCODE env var added, u8->boolDominik Maier
2020-10-24asan_build for tmin and analyzevan Hauser
2020-10-24asan_build for tmin and analyzevan Hauser
2020-10-10fix for afl-analyze thanks to JJY-sec!hexcoder-
2020-08-07enabled Wextra, fixed bugsDominik Maier
2020-07-03ubsan optionsAndrea Fioraldi