about summary refs log tree commit diff
path: root/src/afl-fuzz.c
AgeCommit message (Collapse)Author
2023-05-15push to stable (#1734)van Hauser
* afl++ -> AFL++ * update readme * more debug * slightly different weighting algo (#1719) * better seed selection * slightly different weighting calculation * remove unnecessary memset * Add "Hangs saved" to afl-whatsup (#1717) The hangs could show long or infinite loops. This is important. Co-authored-by: van Hauser <vh@thc.org> * nits * afl-showmap: Start a only a single fork server (#1718) A forkserver is started by afl_fsrv_get_mapsize() when dynamically finding the map size. When an input directory option is specified a second fork server was also started. This commit re-arranges the inits for several forkserver struct members so that we can re-use the server started by the get_mapsize() call when not in coresight/qemu/unicorn modes and just start the server otherwise. * Source Code Coverage support for Nyx (Part 1) (#1720) * Additional source code reformatting in afl-compiler-rt * Add source code coverage support to afl-compiler-rt (for use with Nyx) * doc, code format * llvm 17 changes * more llvm 17 * add frida mode tutorial * fix effector map * docs * Should memset EFF_ALEN(len) of eff_map (#1722) * fix reallocs * fix afl-system-config for macos * afl-fuzz.c: Document -i - in --help (#1725) afl-fuzz.c: Document `-i -` in `--help`, to write that `-i` can be passed '-' to resume the prior fuzzing job. Also reference AFL_AUTORESUME so users know they can set that parameter to sidestep the issue entirely. * tritondse custom mutator attempt * tritondse fixes * update libnyx (#1727) * GNUmakefile: Update LLVM instructions (#1728) Update LLVM instructions, because versions higher than 14 are supported and to be explicit that LLD is also required * disable macos in the ci, works fine for me * fix makefile * better tritondse support * next steps for tritondse * qemuafl: Persistent mode for PPC32 targets * update qemu_mode * afl-clang-lto incomptable with -flto=thin * add @responsefile support for afl-cc --------- Co-authored-by: fxlb <devel.fx.lebail@orange.fr> Co-authored-by: Nick Potenski <nick.potenski@garmin.com> Co-authored-by: Christian Holler (:decoder) <choller@mozilla.com> Co-authored-by: lazymio <mio@lazym.io> Co-authored-by: Moshe Kaplan <me@moshekaplan.com> Co-authored-by: Sergej Schumilo <sergej@schumilo.de> Co-authored-by: Dominik Maier <domenukk@gmail.com>
2023-04-25fixvanhauser-thc
2023-04-25rename env to AFL_IGNORE_PROBLEMS_COVERAGEvanhauser-thc
2023-04-22Merge pull request #1711 from atnwalk/atnwalkvan Hauser
AFL_POST_PROCESS_KEEP_ORIGINAL env variable for intermediate file formats and ATNwalk custom mutator
2023-04-22typovanhauser-thc
2023-04-21Merge remote-tracking branch 'origin/dev' into atnwalkMaik Betka
# Conflicts: # include/afl-fuzz.h # src/afl-fuzz-run.c
2023-04-17fixed code clones in atnwalk.c, introduced new environment variable ↵Maik Betka
AFL_POST_PROCESS_KEEP_ORIGINAL in AFL++ to integrate atnwalk without re-compiling afl-fuzz
2023-04-16Merge pull request #1702 from schumilo/devvan Hauser
add Nyx support in afl-showmap, afl-tmin, afl-cmin and afl-analyze
2023-04-16improved Nyx tmp dir handling (additional sanity checks)Sergej Schumilo
2023-04-14add Nyx support in various tools (like afl-cmin)Sergej Schumilo
2023-04-13remove -z option, use -p mmopt insteadvanhauser-thc
2023-04-09remove pointer to removed docvanhauser-thc
2023-04-05fixvanhauser-thc
2023-04-05add -z switchvanhauser-thc
2023-03-29introspectionvanhauser-thc
2023-03-26Clarify confusing version messageChris Down
When running, the following gets printed in quick succession on startup: afl-fuzz++4.00c based on afl by Michal Zalewski and a large online community [...] [+] NOTE: This is v3.x which changes defaults and behaviours - see README.md Don't assert that this is v3, just that v3+ changes defaults and behaviours.
2023-03-05Fixed according to PR comment, moved cli flag to an env variableAmit Elkabetz
2023-03-05Added minimum interval of 1 sec to avoid undefined behaviour in intervalAmit Elkabetz
2023-03-05auto code format fixesAmit Elkabetz
2023-03-05Added flag -u to allow custom interval to update fuzzer_stats fileAmit Elkabetz
2023-02-23regression fixvanhauser-thc
2023-02-21Merge pull request #1651 from AFLplusplus/devvan Hauser
Dev
2023-02-12Merge pull request #1639 from apach301/fix-score-calculationvan Hauser
Increase fuzz_level for mopt_common_fuzzing
2023-02-12revert perfscore 0 fix attemptvanhauser-thc
2023-02-09cmplog exec with target_pathYaakov Saxon
2023-02-08Validate -M and -p power schedule optionsDaniil Kutz
2023-02-07fix perfscore 0 checkvanhauser-thc
2023-02-06endless loop fixvanhauser-thc
2023-01-28fix warningvanhauser-thc
2023-01-27Merge pull request #1628 from AFLplusplus/devvan Hauser
Dev
2023-01-26update unicornvanhauser-thc
2023-01-18ignore timeout env optionvanhauser-thc
2023-01-16nitsvanhauser-thc
2023-01-15ensure out fd is closed in shmem modevanhauser-thc
2023-01-03welcome 2023vanhauser-thc
2022-12-20hide queue introspection behind definevanhauser-thc
2022-12-05fix warningvanhauser-thc
2022-11-23crash fix for queue analysis featurevanhauser-thc
2022-11-18write queue statisticsvanhauser-thc
2022-11-13Add option for random cmplog colorizationguyf2010
2022-10-29fixvanhauser-thc
2022-10-29nitsvanhauser-thc
2022-10-29fix fork server kill signals for qemu, unicorn and nyx modevanhauser-thc
2022-10-24changelog updatevanhauser-thc
2022-10-24Update usage messagesNils Bars
2022-10-24AFL_FORK_SERVER_KILL_SIGNAL backwards compatiblityNils Bars
If `AFL_KILL_SIGNAL` is set, `AFL_FORK_SERVER_KILL_SIGNAL` is set to the same value.
2022-10-21Add AFL_FORK_SERVER_KILL_SIGNAL environment variable.Nils Bars
The AFL_FORK_SERVER_KILL_SIGNAL variable allows to configure the signal used to kill the fork server on termination.
2022-10-20Fix child reaping on fuzzer terminationNils Bars
This commit contains the following changes: - Call `waitpid()` on the child and the fork server when terminating the fuzzer; thus, we do not end up with zombies. - Rename `fsrv.kill_signal` to `fsrv.child_kill_signal`, since the documentation states that the signal is used to terminate the *child*. - Use SIGTERM instead of fsrv.(child)_kill_signal, thus the fork server can always reap the child.
2022-10-11fastexit + code formatvanhauser-thc
2022-10-07auto shmem fuzzing (#1541)van Hauser
* auto shmem fuzzing * print warning when forcing shmem fuzzing * typos * Shmem always * typo fix * fixes Co-authored-by: Dominik Maier <dmnk@google.com>