From 4b3ba3e51adda9b179bf349bb7cb1664ea8995d9 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Sat, 7 Aug 2021 20:25:03 +0200
Subject: Edit FAQ
Changes:
- Edit FAQ.
- Add history.
- Add best practices.
---
docs/FAQ.md | 150 ++++++------------------------------------------------------
1 file changed, 14 insertions(+), 136 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 0e816062..560f37bf 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -1,4 +1,7 @@
-# Frequently asked questions about AFL++
+# Frequently asked questions and troubleshooting
+
+If you find an interesting or important question missing, submit it via
+[https://github.com/AFLplusplus/AFLplusplus/issues](https://github.com/AFLplusplus/AFLplusplus/issues).
## Contents
@@ -11,30 +14,11 @@
* [Why is my stability below 100%?](#why-is-my-stability-below-100)
* [How can I improve the stability value?](#how-can-i-improve-the-stability-value)
-If you find an interesting or important question missing, submit it via
-[https://github.com/AFLplusplus/AFLplusplus/issues](https://github.com/AFLplusplus/AFLplusplus/issues)
-
## What is the difference between AFL and AFL++?
-American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting in
-2013/2014, and when he left Google end of 2017 he stopped developing it.
-
-At the end of 2019 the Google fuzzing team took over maintenance of AFL, however
-it is only accepting PRs from the community and is not developing enhancements
-anymore.
+AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
-In the second quarter of 2019, 1 1/2 year later when no further development of
-AFL had happened and it became clear there would none be coming, AFL++
-was born, where initially community patches were collected and applied
-for bug fixes and enhancements. Then from various AFL spin-offs - mostly academic
-research - features were integrated. This already resulted in a much advanced
-AFL.
-
-Until the end of 2019 the AFL++ team had grown to four active developers which
-then implemented their own research and features, making it now by far the most
-flexible and feature rich guided fuzzer available as open source.
-And in independent fuzzing benchmarks it is one of the best fuzzers available,
-e.g. [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html)
+For more information about the history of AFL++, see [docs/history_afl++.md](docs/history_afl++.md).
## I got a weird compile error from clang
@@ -58,51 +42,21 @@ Solution: `git pull ; make clean install` of AFL++
## How to improve the fuzzing speed?
- 1. Use [llvm_mode](../instrumentation/README.llvm.md): afl-clang-lto (llvm >= 11) or afl-clang-fast (llvm >= 9 recommended)
- 2. Use [persistent mode](../instrumentation/README.persistent_mode.md) (x2-x20 speed increase)
- 3. Use the [AFL++ snapshot module](https://github.com/AFLplusplus/AFL-Snapshot-LKM) (x2 speed increase)
- 4. If you do not use shmem persistent mode, use `AFL_TMPDIR` to put the input file directory on a tempfs location, see [docs/env_variables.md](docs/env_variables.md)
- 5. Improve Linux kernel performance: modify `/etc/default/grub`, set `GRUB_CMDLINE_LINUX_DEFAULT="ibpb=off ibrs=off kpti=off l1tf=off mds=off mitigations=off no_stf_barrier noibpb noibrs nopcid nopti nospec_store_bypass_disable nospectre_v1 nospectre_v2 pcid=off pti=off spec_store_bypass_disable=off spectre_v2=off stf_barrier=off"`; then `update-grub` and `reboot` (warning: makes the system less secure)
- 6. Running on an `ext2` filesystem with `noatime` mount option will be a bit faster than on any other journaling filesystem
- 7. Use your cores! [README.md:3.b) Using multiple cores/threads](../README.md#b-using-multiple-coresthreads)
-
-## How do I fuzz a network service?
+See [docs/best_practices.md#improving-speed](docs/best_practices.md#improving-speed).
-The short answer is - you cannot, at least not "out of the box".
+## How can I improve the stability value?
-Using a network channel is inadequate for several reasons:
-- it has a slow-down of x10-20 on the fuzzing speed
-- it does not scale to fuzzing multiple instances easily,
-- instead of one initial data packet often a back-and-forth interplay of packets is needed for stateful protocols (which is totally unsupported by most coverage aware fuzzers).
+See [docs/best_practices.md#improving-stability](docs/best_practices.md#improving-stability).
-The established method to fuzz network services is to modify the source code
-to read from a file or stdin (fd 0) (or even faster via shared memory, combine
-this with persistent mode [instrumentation/README.persistent_mode.md](../instrumentation/README.persistent_mode.md)
-and you have a performance gain of x10 instead of a performance loss of over
-x10 - that is a x100 difference!).
+## How do I fuzz a network service?
-If modifying the source is not an option (e.g. because you only have a binary
-and perform binary fuzzing) you can also use a shared library with AFL_PRELOAD
-to emulate the network. This is also much faster than the real network would be.
-See [utils/socket_fuzzing/](../utils/socket_fuzzing/).
+The short answer is - you cannot, at least not "out of the box".
-There is an outdated AFL++ branch that implements networking if you are
-desperate though: [https://github.com/AFLplusplus/AFLplusplus/tree/networking](https://github.com/AFLplusplus/AFLplusplus/tree/networking) -
-however a better option is AFLnet ([https://github.com/aflnet/aflnet](https://github.com/aflnet/aflnet))
-which allows you to define network state with different type of data packets.
+For more information, see [docs/best_practices.md#fuzzing-network-service](docs/best_practices.md#fuzzing-network-service).
## How do I fuzz a GUI program?
-If the GUI program can read the fuzz data from a file (via the command line,
-a fixed location or via an environment variable) without needing any user
-interaction then it would be suitable for fuzzing.
-
-Otherwise it is not possible without modifying the source code - which is a
-very good idea anyway as the GUI functionality is a huge CPU/time overhead
-for the fuzzing.
-
-So create a new `main()` that just reads the test case and calls the
-functionality for processing the input that the GUI program is using.
+See [docs/best_practices.md#fuzzing-gui-program](docs/best_practices.md#fuzzing-gui-program).
## What is an "edge"?
@@ -154,7 +108,7 @@ Stability is measured by how many percent of the edges in the target are
path through the target every time. If that is the case, the stability is 100%.
If however randomness happens, e.g. a thread reading other external data,
-reaction to timing, etc. then in some of the re-executions with the same data
+reaction to timing, etc., then in some of the re-executions with the same data
the edge coverage result will be different accross runs.
Those edges that change are then flagged "unstable".
@@ -165,79 +119,3 @@ A value above 90% is usually fine and a value above 80% is also still ok, and
even a value above 20% can still result in successful finds of bugs.
However, it is recommended that for values below 90% or 80% you should take
countermeasures to improve stability.
-
-## How can I improve the stability value?
-
-For fuzzing a 100% stable target that covers all edges is the best case.
-A 90% stable target that covers all edges is however better than a 100% stable
-target that ignores 10% of the edges.
-
-With instability you basically have a partial coverage loss on an edge, with
-ignored functions you have a full loss on that edges.
-
-There are functions that are unstable, but also provide value to coverage, eg
-init functions that use fuzz data as input for example.
-If however a function that has nothing to do with the input data is the
-source of instability, e.g. checking jitter, or is a hash map function etc.
-then it should not be instrumented.
-
-To be able to exclude these functions (based on AFL++'s measured stability)
-the following process will allow to identify functions with variable edges.
-
-Four steps are required to do this and it also requires quite some knowledge
-of coding and/or disassembly and is effectively possible only with
-afl-clang-fast PCGUARD and afl-clang-lto LTO instrumentation.
-
- 1. First step: Instrument to be able to find the responsible function(s).
-
- a) For LTO instrumented binaries this can be documented during compile
- time, just set `export AFL_LLVM_DOCUMENT_IDS=/path/to/a/file`.
- This file will have one assigned edge ID and the corresponding
- function per line.
-
- b) For PCGUARD instrumented binaries it is much more difficult. Here you
- can either modify the __sanitizer_cov_trace_pc_guard function in
- instrumentation/afl-llvm-rt.o.c to write a backtrace to a file if the ID in
- __afl_area_ptr[*guard] is one of the unstable edge IDs.
- (Example code is already there).
- Then recompile and reinstall llvm_mode and rebuild your target.
- Run the recompiled target with afl-fuzz for a while and then check the
- file that you wrote with the backtrace information.
- Alternatively you can use `gdb` to hook __sanitizer_cov_trace_pc_guard_init
- on start, check to which memory address the edge ID value is written
- and set a write breakpoint to that address (`watch 0x.....`).
-
- c) in all other instrumentation types this is not possible. So just
- recompile with the two mentioned above. This is just for
- identifying the functions that have unstable edges.
-
- 2. Second step: Identify which edge ID numbers are unstable
-
- run the target with `export AFL_DEBUG=1` for a few minutes then terminate.
- The out/fuzzer_stats file will then show the edge IDs that were identified
- as unstable in the `var_bytes` entry. You can match these numbers
- directly to the data you created in the first step.
- Now you know which functions are responsible for the instability
-
- 3. Third step: create a text file with the filenames/functions
-
- Identify which source code files contain the functions that you need to
- remove from instrumentation, or just specify the functions you want to
- skip for instrumentation. Note that optimization might inline functions!
-
- Simply follow this document on how to do this: [instrumentation/README.instrument_list.md](../instrumentation/README.instrument_list.md)
- If PCGUARD is used, then you need to follow this guide (needs llvm 12+!):
- [http://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation](http://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation)
-
- Only exclude those functions from instrumentation that provide no value
- for coverage - that is if it does not process any fuzz data directly
- or indirectly (e.g. hash maps, thread management etc.).
- If however a function directly or indirectly handles fuzz data then you
- should not put the function in a deny instrumentation list and rather
- live with the instability it comes with.
-
- 4. Fourth step: recompile the target
-
- Recompile, fuzz it, be happy :)
-
- This link explains this process for [Fuzzbench](https://github.com/google/fuzzbench/issues/677)
--
cgit 1.4.1
From 85a7195631f43fdbd337e6fedac53b0475353139 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Sun, 15 Aug 2021 21:01:27 +0200
Subject: Update FAQ.md
---
docs/FAQ.md | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 560f37bf..73b9992b 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -7,9 +7,9 @@ If you find an interesting or important question missing, submit it via
* [What is the difference between AFL and AFL++?](#what-is-the-difference-between-afl-and-afl)
* [I got a weird compile error from clang](#i-got-a-weird-compile-error-from-clang)
- * [How to improve the fuzzing speed?](#how-to-improve-the-fuzzing-speed)
- * [How do I fuzz a network service?](#how-do-i-fuzz-a-network-service)
- * [How do I fuzz a GUI program?](#how-do-i-fuzz-a-gui-program)
+ * [How can I improve the fuzzing speed?](#how-can-i-improve-the-fuzzing-speed)
+ * [How can I fuzz a network service?](#how-can-i-fuzz-a-network-service)
+ * [How can I fuzz a GUI program?](#how-can-i-fuzz-a-gui-program)
* [What is an edge?](#what-is-an-edge)
* [Why is my stability below 100%?](#why-is-my-stability-below-100)
* [How can I improve the stability value?](#how-can-i-improve-the-stability-value)
@@ -40,7 +40,7 @@ package and because of that the AFL++ llvm plugins do not match anymore.
Solution: `git pull ; make clean install` of AFL++
-## How to improve the fuzzing speed?
+## How can I improve the fuzzing speed?
See [docs/best_practices.md#improving-speed](docs/best_practices.md#improving-speed).
@@ -48,13 +48,13 @@ See [docs/best_practices.md#improving-speed](docs/best_practices.md#improving-sp
See [docs/best_practices.md#improving-stability](docs/best_practices.md#improving-stability).
-## How do I fuzz a network service?
+## How can I fuzz a network service?
The short answer is - you cannot, at least not "out of the box".
For more information, see [docs/best_practices.md#fuzzing-network-service](docs/best_practices.md#fuzzing-network-service).
-## How do I fuzz a GUI program?
+## How can I fuzz a GUI program?
See [docs/best_practices.md#fuzzing-gui-program](docs/best_practices.md#fuzzing-gui-program).
--
cgit 1.4.1
From 8948fdcf4c66ad2a5fa81dad46c5e46a12a798fb Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Sun, 15 Aug 2021 21:19:44 +0200
Subject: Update FAQ.md
---
docs/FAQ.md | 116 +++++++++++++++++++++++++++++++++++++-----------------------
1 file changed, 71 insertions(+), 45 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 73b9992b..4b6b815f 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -1,64 +1,38 @@
-# Frequently asked questions and troubleshooting
+# Frequently asked questions (FAQ)
If you find an interesting or important question missing, submit it via
[https://github.com/AFLplusplus/AFLplusplus/issues](https://github.com/AFLplusplus/AFLplusplus/issues).
-## Contents
+### General
- * [What is the difference between AFL and AFL++?](#what-is-the-difference-between-afl-and-afl)
- * [I got a weird compile error from clang](#i-got-a-weird-compile-error-from-clang)
- * [How can I improve the fuzzing speed?](#how-can-i-improve-the-fuzzing-speed)
- * [How can I fuzz a network service?](#how-can-i-fuzz-a-network-service)
- * [How can I fuzz a GUI program?](#how-can-i-fuzz-a-gui-program)
+ * [What is the difference between afl and afl++?](#what-is-the-difference-between-afl-and-afl)
* [What is an edge?](#what-is-an-edge)
- * [Why is my stability below 100%?](#why-is-my-stability-below-100)
- * [How can I improve the stability value?](#how-can-i-improve-the-stability-value)
-
-## What is the difference between AFL and AFL++?
-AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
-
-For more information about the history of AFL++, see [docs/history_afl++.md](docs/history_afl++.md).
+### Targets
-## I got a weird compile error from clang
-
-If you see this kind of error when trying to instrument a target with afl-cc/
-afl-clang-fast/afl-clang-lto:
-```
-/prg/tmp/llvm-project/build/bin/clang-13: symbol lookup error: /usr/local/bin/../lib/afl//cmplog-instructions-pass.so: undefined symbol: _ZNK4llvm8TypeSizecvmEv
-clang-13: error: unable to execute command: No such file or directory
-clang-13: error: clang frontend command failed due to signal (use -v to see invocation)
-clang version 13.0.0 (https://github.com/llvm/llvm-project 1d7cf550721c51030144f3cd295c5789d51c4aad)
-Target: x86_64-unknown-linux-gnu
-Thread model: posix
-InstalledDir: /prg/tmp/llvm-project/build/bin
-clang-13: note: diagnostic msg:
-********************
-```
-Then this means that your OS updated the clang installation from an upgrade
-package and because of that the AFL++ llvm plugins do not match anymore.
-
-Solution: `git pull ; make clean install` of AFL++
-
-## How can I improve the fuzzing speed?
+ * [How can I fuzz a binary-only target?](#how-can-i-fuzz-a-binary-only-target)
+ * [How can I fuzz a network service?](#how-can-i-fuzz-a-network-service)
+ * [How can I fuzz a GUI program?](#how-can-i-fuzz-a-gui-program)
-See [docs/best_practices.md#improving-speed](docs/best_practices.md#improving-speed).
+### Performance
-## How can I improve the stability value?
+ * [How can I improve the fuzzing speed?](#how-can-i-improve-the-fuzzing-speed)
+ * [Why is my stability below 100%?](#why-is-my-stability-below-100)
+ * [How can I improve the stability value?](#how-can-i-improve-the-stability-value)
-See [docs/best_practices.md#improving-stability](docs/best_practices.md#improving-stability).
+### Troubleshooting
-## How can I fuzz a network service?
+ * [I got a weird compile error from clang](#i-got-a-weird-compile-error-from-clang)
-The short answer is - you cannot, at least not "out of the box".
+## Questions & answers
-For more information, see [docs/best_practices.md#fuzzing-network-service](docs/best_practices.md#fuzzing-network-service).
+### What is the difference between AFL and AFL++?
-## How can I fuzz a GUI program?
+AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
-See [docs/best_practices.md#fuzzing-gui-program](docs/best_practices.md#fuzzing-gui-program).
+For more information about the history of AFL++, see [docs/history_afl++.md](docs/history_afl++.md).
-## What is an "edge"?
+### What is an "edge"?
A program contains `functions`, `functions` contain the compiled machine code.
The compiled machine code in a `function` can be in a single or many `basic blocks`.
@@ -101,7 +75,31 @@ code example above):
Every line between two blocks is an `edge`.
Note that a few basic block loop to itself, this too would be an edge.
-## Why is my stability below 100%?
+### How can I fuzz a binary-only target?
+
+AFL++ is a great fuzzer if you have the source code available.
+
+However, if there is only the binary program and no source code available, then the standard non-instrumented mode is not effective.
+
+To learn how these binaries can be fuzzed, read [binaryonly_fuzzing.md](binaryonly_fuzzing.md).
+
+### How can I fuzz a network service?
+
+The short answer is - you cannot, at least not "out of the box".
+
+For more information on fuzzing network services, see [docs/best_practices.md#fuzzing-network-service](docs/best_practices.md#fuzzing-network-service).
+
+### How can I fuzz a GUI program?
+
+Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
+
+For more information on fuzzing GUI programs, see [docs/best_practices.md#fuzzing-gui-program](docs/best_practices.md#fuzzing-gui-program).
+
+### How can I improve the fuzzing speed?
+
+There are a few things you can do to improve the fuzzing speed, see [docs/best_practices.md#improving-speed](docs/best_practices.md#improving-speed).
+
+### Why is my stability below 100%?
Stability is measured by how many percent of the edges in the target are
"stable". Sending the same input again and again should take the exact same
@@ -119,3 +117,31 @@ A value above 90% is usually fine and a value above 80% is also still ok, and
even a value above 20% can still result in successful finds of bugs.
However, it is recommended that for values below 90% or 80% you should take
countermeasures to improve stability.
+
+### How can I improve the stability value?
+
+This depends on the target and the instrumentation.
+
+For more information on stability and how to improve the stability value, see [docs/best_practices.md#improving-stability](docs/best_practices.md#improving-stability).
+
+### I got a weird compile error from clang
+
+If you see this kind of error when trying to instrument a target with afl-cc/
+afl-clang-fast/afl-clang-lto:
+
+```
+/prg/tmp/llvm-project/build/bin/clang-13: symbol lookup error: /usr/local/bin/../lib/afl//cmplog-instructions-pass.so: undefined symbol: _ZNK4llvm8TypeSizecvmEv
+clang-13: error: unable to execute command: No such file or directory
+clang-13: error: clang frontend command failed due to signal (use -v to see invocation)
+clang version 13.0.0 (https://github.com/llvm/llvm-project 1d7cf550721c51030144f3cd295c5789d51c4aad)
+Target: x86_64-unknown-linux-gnu
+Thread model: posix
+InstalledDir: /prg/tmp/llvm-project/build/bin
+clang-13: note: diagnostic msg:
+********************
+```
+
+Then this means that your OS updated the clang installation from an upgrade
+package and because of that the AFL++ llvm plugins do not match anymore.
+
+Solution: `git pull ; make clean install` of AFL++
\ No newline at end of file
--
cgit 1.4.1
From e05519baf4fbefcc6cad65460da1d9ecf6024275 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Mon, 16 Aug 2021 21:00:05 +0200
Subject: Update FAQ.md
---
docs/FAQ.md | 59 +++++++++++++++++++++++++++++------------------------------
1 file changed, 29 insertions(+), 30 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 4b6b815f..767f6fac 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -1,12 +1,13 @@
# Frequently asked questions (FAQ)
If you find an interesting or important question missing, submit it via
-[https://github.com/AFLplusplus/AFLplusplus/issues](https://github.com/AFLplusplus/AFLplusplus/issues).
+[https://github.com/AFLplusplus/AFLplusplus/discussions](https://github.com/AFLplusplus/AFLplusplus/discussions).
### General
- * [What is the difference between afl and afl++?](#what-is-the-difference-between-afl-and-afl)
- * [What is an edge?](#what-is-an-edge)
+ * [What is the difference between AFL and AFL++?](#what-is-the-difference-between-afl-and-afl)
+ * [Where can I find tutorials?](#where-can-i-find-tutorials)
+ * [What is an "edge"?](#what-is-an-edge)
### Targets
@@ -30,15 +31,18 @@ If you find an interesting or important question missing, submit it via
AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
-For more information about the history of AFL++, see [docs/history_afl++.md](docs/history_afl++.md).
+For more information about the history of AFL++, see [history_afl++.md](history_afl++.md).
+
+### Where can I find tutorials?
+
+We compiled a list of tutorials and exercises, see [links_examples_writeups.md](links_examples_writeups.md).
### What is an "edge"?
A program contains `functions`, `functions` contain the compiled machine code.
The compiled machine code in a `function` can be in a single or many `basic blocks`.
-A `basic block` is the largest possible number of subsequent machine code
-instructions that has exactly one entrypoint (which can be be entered by multiple other basic blocks)
-and runs linearly without branching or jumping to other addresses (except at the end).
+A `basic block` is the largest possible number of subsequent machine code instructions that has exactly one entrypoint (which can be be entered by multiple other basic blocks) and runs linearly without branching or jumping to other addresses (except at the end).
+
```
function() {
A:
@@ -56,10 +60,11 @@ function() {
return
}
```
+
Every code block between two jump locations is a `basic block`.
-An `edge` is then the unique relationship between two directly connected `basic blocks` (from the
-code example above):
+An `edge` is then the unique relationship between two directly connected `basic blocks` (from the code example above):
+
```
Block A
|
@@ -72,6 +77,7 @@ code example above):
v
Block E
```
+
Every line between two blocks is an `edge`.
Note that a few basic block loop to itself, this too would be an edge.
@@ -87,47 +93,41 @@ To learn how these binaries can be fuzzed, read [binaryonly_fuzzing.md](binaryon
The short answer is - you cannot, at least not "out of the box".
-For more information on fuzzing network services, see [docs/best_practices.md#fuzzing-network-service](docs/best_practices.md#fuzzing-network-service).
+For more information on fuzzing network services, see [best_practices.md#fuzzing-network-service](best_practices.md#fuzzing-network-service).
### How can I fuzz a GUI program?
Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
-For more information on fuzzing GUI programs, see [docs/best_practices.md#fuzzing-gui-program](docs/best_practices.md#fuzzing-gui-program).
+For more information on fuzzing GUI programs, see [best_practices.md#fuzzing-gui-program](best_practices.md#fuzzing-gui-program).
### How can I improve the fuzzing speed?
-There are a few things you can do to improve the fuzzing speed, see [docs/best_practices.md#improving-speed](docs/best_practices.md#improving-speed).
+There are a few things you can do to improve the fuzzing speed, see [best_practices.md#improving-speed](best_practices.md#improving-speed).
### Why is my stability below 100%?
-Stability is measured by how many percent of the edges in the target are
-"stable". Sending the same input again and again should take the exact same
-path through the target every time. If that is the case, the stability is 100%.
+Stability is measured by how many percent of the edges in the target are "stable".
+Sending the same input again and again should take the exact same path through the target every time.
+If that is the case, the stability is 100%.
-If however randomness happens, e.g. a thread reading other external data,
-reaction to timing, etc., then in some of the re-executions with the same data
-the edge coverage result will be different accross runs.
+If however randomness happens, e.g. a thread reading other external data, reaction to timing, etc., then in some of the re-executions with the same data the edge coverage result will be different accross runs.
Those edges that change are then flagged "unstable".
-The more "unstable" edges, the more difficult for AFL++ to identify valid new
-paths.
+The more "unstable" edges, the more difficult for AFL++ to identify valid new paths.
-A value above 90% is usually fine and a value above 80% is also still ok, and
-even a value above 20% can still result in successful finds of bugs.
-However, it is recommended that for values below 90% or 80% you should take
-countermeasures to improve stability.
+A value above 90% is usually fine and a value above 80% is also still ok, and even a value above 20% can still result in successful finds of bugs.
+However, it is recommended that for values below 90% or 80% you should take countermeasures to improve stability.
### How can I improve the stability value?
This depends on the target and the instrumentation.
-For more information on stability and how to improve the stability value, see [docs/best_practices.md#improving-stability](docs/best_practices.md#improving-stability).
+For more information on stability and how to improve the stability value, see [best_practices.md#improving-stability](best_practices.md#improving-stability).
### I got a weird compile error from clang
-If you see this kind of error when trying to instrument a target with afl-cc/
-afl-clang-fast/afl-clang-lto:
+If you see this kind of error when trying to instrument a target with afl-cc/afl-clang-fast/afl-clang-lto:
```
/prg/tmp/llvm-project/build/bin/clang-13: symbol lookup error: /usr/local/bin/../lib/afl//cmplog-instructions-pass.so: undefined symbol: _ZNK4llvm8TypeSizecvmEv
@@ -141,7 +141,6 @@ clang-13: note: diagnostic msg:
********************
```
-Then this means that your OS updated the clang installation from an upgrade
-package and because of that the AFL++ llvm plugins do not match anymore.
+Then this means that your OS updated the clang installation from an upgrade package and because of that the AFL++ llvm plugins do not match anymore.
-Solution: `git pull ; make clean install` of AFL++
\ No newline at end of file
+Solution: `git pull ; make clean install` of AFL++.
\ No newline at end of file
--
cgit 1.4.1
From 4a88e17a26127ce39464dab7f98699fb4feb4def Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Mon, 16 Aug 2021 21:32:43 +0200
Subject: Update FAQ.md
---
docs/FAQ.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 767f6fac..3577f3e0 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -93,13 +93,13 @@ To learn how these binaries can be fuzzed, read [binaryonly_fuzzing.md](binaryon
The short answer is - you cannot, at least not "out of the box".
-For more information on fuzzing network services, see [best_practices.md#fuzzing-network-service](best_practices.md#fuzzing-network-service).
+For more information on fuzzing network services, see [best_practices.md#fuzzing-a-network-service](best_practices.md#fuzzing-a-network-service).
### How can I fuzz a GUI program?
Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
-For more information on fuzzing GUI programs, see [best_practices.md#fuzzing-gui-program](best_practices.md#fuzzing-gui-program).
+For more information on fuzzing GUI programs, see [best_practices.md#fuzzing-a-gui-program](best_practices.md#fuzzing-a-gui-program).
### How can I improve the fuzzing speed?
--
cgit 1.4.1
From 583b8e849bc78695d4fef0ccc61137df47439146 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Sat, 28 Aug 2021 20:41:17 +0200
Subject: Edit FAQ.md and related content
---
docs/FAQ.md | 13 +++++++++++--
docs/history_afl++.md | 12 ------------
2 files changed, 11 insertions(+), 14 deletions(-)
delete mode 100644 docs/history_afl++.md
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 3577f3e0..20a876fe 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -31,11 +31,20 @@ If you find an interesting or important question missing, submit it via
AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
-For more information about the history of AFL++, see [history_afl++.md](history_afl++.md).
+American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting in 2013/2014, and when he left Google end of 2017 he stopped developing it.
+
+At the end of 2019, the Google fuzzing team took over maintenance of AFL, however it is only accepting PRs from the community and is not developing enhancements anymore.
+
+In the second quarter of 2019, 1 1/2 years later, when no further development of AFL had happened and it became clear there would none be coming, AFL++ was born, where initially community patches were collected and applied for bug fixes and enhancements.
+Then from various AFL spin-offs - mostly academic research - features were integrated.
+This already resulted in a much advanced AFL.
+
+Until the end of 2019, the AFL++ team had grown to four active developers which then implemented their own research and features, making it now by far the most flexible and feature rich guided fuzzer available as open source.
+And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g. [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
### Where can I find tutorials?
-We compiled a list of tutorials and exercises, see [links_examples_writeups.md](links_examples_writeups.md).
+We compiled a list of tutorials and exercises, see [tutorials.md](tutorials.md).
### What is an "edge"?
diff --git a/docs/history_afl++.md b/docs/history_afl++.md
deleted file mode 100644
index ff06a372..00000000
--- a/docs/history_afl++.md
+++ /dev/null
@@ -1,12 +0,0 @@
-# History of AFL++
-
-American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting in 2013/2014, and when he left Google end of 2017 he stopped developing it.
-
-At the end of 2019, the Google fuzzing team took over maintenance of AFL, however it is only accepting PRs from the community and is not developing enhancements anymore.
-
-In the second quarter of 2019, 1 1/2 years later, when no further development of AFL had happened and it became clear there would none be coming, AFL++ was born, where initially community patches were collected and applied for bug fixes and enhancements.
-Then from various AFL spin-offs - mostly academic research - features were integrated.
-This already resulted in a much advanced AFL.
-
-Until the end of 2019, the AFL++ team had grown to four active developers which then implemented their own research and features, making it now by far the most flexible and feature rich guided fuzzer available as open source.
-And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g. [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html)
\ No newline at end of file
--
cgit 1.4.1
From d63afa5046a3236c81e215790a0b6ef73f3dfec7 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Fri, 3 Sep 2021 12:50:28 +0200
Subject: Update FAQ.md
---
docs/FAQ.md | 244 ++++++++++++++++++++++++++++++------------------------------
1 file changed, 121 insertions(+), 123 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 20a876fe..71e9a92b 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -3,153 +3,151 @@
If you find an interesting or important question missing, submit it via
[https://github.com/AFLplusplus/AFLplusplus/discussions](https://github.com/AFLplusplus/AFLplusplus/discussions).
-### General
-
- * [What is the difference between AFL and AFL++?](#what-is-the-difference-between-afl-and-afl)
- * [Where can I find tutorials?](#where-can-i-find-tutorials)
- * [What is an "edge"?](#what-is-an-edge)
-
-### Targets
-
- * [How can I fuzz a binary-only target?](#how-can-i-fuzz-a-binary-only-target)
- * [How can I fuzz a network service?](#how-can-i-fuzz-a-network-service)
- * [How can I fuzz a GUI program?](#how-can-i-fuzz-a-gui-program)
-
-### Performance
-
- * [How can I improve the fuzzing speed?](#how-can-i-improve-the-fuzzing-speed)
- * [Why is my stability below 100%?](#why-is-my-stability-below-100)
- * [How can I improve the stability value?](#how-can-i-improve-the-stability-value)
-
-### Troubleshooting
-
- * [I got a weird compile error from clang](#i-got-a-weird-compile-error-from-clang)
-
-## Questions & answers
-
-### What is the difference between AFL and AFL++?
-
-AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
-
-American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting in 2013/2014, and when he left Google end of 2017 he stopped developing it.
-
-At the end of 2019, the Google fuzzing team took over maintenance of AFL, however it is only accepting PRs from the community and is not developing enhancements anymore.
-
-In the second quarter of 2019, 1 1/2 years later, when no further development of AFL had happened and it became clear there would none be coming, AFL++ was born, where initially community patches were collected and applied for bug fixes and enhancements.
-Then from various AFL spin-offs - mostly academic research - features were integrated.
-This already resulted in a much advanced AFL.
-
-Until the end of 2019, the AFL++ team had grown to four active developers which then implemented their own research and features, making it now by far the most flexible and feature rich guided fuzzer available as open source.
-And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g. [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
-
-### Where can I find tutorials?
-
-We compiled a list of tutorials and exercises, see [tutorials.md](tutorials.md).
-
-### What is an "edge"?
-
-A program contains `functions`, `functions` contain the compiled machine code.
-The compiled machine code in a `function` can be in a single or many `basic blocks`.
-A `basic block` is the largest possible number of subsequent machine code instructions that has exactly one entrypoint (which can be be entered by multiple other basic blocks) and runs linearly without branching or jumping to other addresses (except at the end).
-
-```
-function() {
- A:
- some
- code
- B:
- if (x) goto C; else goto D;
- C:
- some code
- goto E
- D:
- some code
- goto B
- E:
- return
-}
-```
-
-Every code block between two jump locations is a `basic block`.
-
-An `edge` is then the unique relationship between two directly connected `basic blocks` (from the code example above):
-
-```
- Block A
- |
+## General
+
+
+ What is the difference between AFL and AFL++?
+
+ AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
+
+ American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting in 2013/2014, and when he left Google end of 2017 he stopped developing it.
+
+ At the end of 2019, the Google fuzzing team took over maintenance of AFL, however it is only accepting PRs from the community and is not developing enhancements anymore.
+
+ In the second quarter of 2019, 1 1/2 years later, when no further development of AFL had happened and it became clear there would none be coming, AFL++ was born, where initially community patches were collected and applied for bug fixes and enhancements.
+ Then from various AFL spin-offs - mostly academic research - features were integrated.
+ This already resulted in a much advanced AFL.
+
+ Until the end of 2019, the AFL++ team had grown to four active developers which then implemented their own research and features, making it now by far the most flexible and feature rich guided fuzzer available as open source.
+ And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g. [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
+
+
+
+ Where can I find tutorials?
+
+ We compiled a list of tutorials and exercises, see [tutorials.md](tutorials.md).
+
+
+
+ What is an "edge"?
+
+ A program contains `functions`, `functions` contain the compiled machine code.
+ The compiled machine code in a `function` can be in a single or many `basic blocks`.
+ A `basic block` is the largest possible number of subsequent machine code instructions that has exactly one entrypoint (which can be be entered by multiple other basic blocks) and runs linearly without branching or jumping to other addresses (except at the end).
+
+ ```
+ function() {
+ A:
+ some
+ code
+ B:
+ if (x) goto C; else goto D;
+ C:
+ some code
+ goto E
+ D:
+ some code
+ goto B
+ E:
+ return
+ }
+ ```
+
+ Every code block between two jump locations is a `basic block`.
+
+ An `edge` is then the unique relationship between two directly connected `basic blocks` (from the code example above):
+
+ ```
+ Block A
+ |
+ v
+ Block B <------+
+ / \ |
+ v v |
+ Block C Block D --+
+ \
v
- Block B <------+
- / \ |
- v v |
- Block C Block D --+
- \
- v
- Block E
-```
+ Block E
+ ```
+
+ Every line between two blocks is an `edge`.
+ Note that a few basic block loop to itself, this too would be an edge.
+
-Every line between two blocks is an `edge`.
-Note that a few basic block loop to itself, this too would be an edge.
+## Targets
-### How can I fuzz a binary-only target?
+
+ How can I fuzz a binary-only target?
-AFL++ is a great fuzzer if you have the source code available.
+ AFL++ is a great fuzzer if you have the source code available.
-However, if there is only the binary program and no source code available, then the standard non-instrumented mode is not effective.
+ However, if there is only the binary program and no source code available, then the standard non-instrumented mode is not effective.
-To learn how these binaries can be fuzzed, read [binaryonly_fuzzing.md](binaryonly_fuzzing.md).
+ To learn how these binaries can be fuzzed, read [binaryonly_fuzzing.md](binaryonly_fuzzing.md).
+
-### How can I fuzz a network service?
+
+ How can I fuzz a network service?
-The short answer is - you cannot, at least not "out of the box".
+ The short answer is - you cannot, at least not "out of the box".
-For more information on fuzzing network services, see [best_practices.md#fuzzing-a-network-service](best_practices.md#fuzzing-a-network-service).
+ For more information on fuzzing network services, see [best_practices.md#fuzzing-a-network-service](best_practices.md#fuzzing-a-network-service).
+
-### How can I fuzz a GUI program?
+
+ How can I fuzz a GUI program?
-Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
+ Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
-For more information on fuzzing GUI programs, see [best_practices.md#fuzzing-a-gui-program](best_practices.md#fuzzing-a-gui-program).
+ For more information on fuzzing GUI programs, see [best_practices.md#fuzzing-a-gui-program](best_practices.md#fuzzing-a-gui-program).
+
-### How can I improve the fuzzing speed?
+## Performance
-There are a few things you can do to improve the fuzzing speed, see [best_practices.md#improving-speed](best_practices.md#improving-speed).
+
+ How can I improve the fuzzing speed?
-### Why is my stability below 100%?
+ There are a few things you can do to improve the fuzzing speed, see [best_practices.md#improving-speed](best_practices.md#improving-speed).
+
-Stability is measured by how many percent of the edges in the target are "stable".
-Sending the same input again and again should take the exact same path through the target every time.
-If that is the case, the stability is 100%.
+
+ Why is my stability below 100%?
-If however randomness happens, e.g. a thread reading other external data, reaction to timing, etc., then in some of the re-executions with the same data the edge coverage result will be different accross runs.
-Those edges that change are then flagged "unstable".
+ Stability is measured by how many percent of the edges in the target are "stable".
+ Sending the same input again and again should take the exact same path through the target every time.
+ If that is the case, the stability is 100%.
-The more "unstable" edges, the more difficult for AFL++ to identify valid new paths.
+ If however randomness happens, e.g. a thread reading other external data, reaction to timing, etc., then in some of the re-executions with the same data the edge coverage result will be different accross runs.
+ Those edges that change are then flagged "unstable".
-A value above 90% is usually fine and a value above 80% is also still ok, and even a value above 20% can still result in successful finds of bugs.
-However, it is recommended that for values below 90% or 80% you should take countermeasures to improve stability.
+ The more "unstable" edges, the more difficult for AFL++ to identify valid new paths.
-### How can I improve the stability value?
+ A value above 90% is usually fine and a value above 80% is also still ok, and even a value above 20% can still result in successful finds of bugs.
+ However, it is recommended that for values below 90% or 80% you should take countermeasures to improve stability.
-This depends on the target and the instrumentation.
+ For more information on stability and how to improve the stability value, see [best_practices.md#improving-stability](best_practices.md#improving-stability).
+
-For more information on stability and how to improve the stability value, see [best_practices.md#improving-stability](best_practices.md#improving-stability).
+## Troubleshooting
-### I got a weird compile error from clang
+
+ I got a weird compile error from clang.
-If you see this kind of error when trying to instrument a target with afl-cc/afl-clang-fast/afl-clang-lto:
+ If you see this kind of error when trying to instrument a target with afl-cc/afl-clang-fast/afl-clang-lto:
-```
-/prg/tmp/llvm-project/build/bin/clang-13: symbol lookup error: /usr/local/bin/../lib/afl//cmplog-instructions-pass.so: undefined symbol: _ZNK4llvm8TypeSizecvmEv
-clang-13: error: unable to execute command: No such file or directory
-clang-13: error: clang frontend command failed due to signal (use -v to see invocation)
-clang version 13.0.0 (https://github.com/llvm/llvm-project 1d7cf550721c51030144f3cd295c5789d51c4aad)
-Target: x86_64-unknown-linux-gnu
-Thread model: posix
-InstalledDir: /prg/tmp/llvm-project/build/bin
-clang-13: note: diagnostic msg:
-********************
-```
+ ```
+ /prg/tmp/llvm-project/build/bin/clang-13: symbol lookup error: /usr/local/bin/../lib/afl//cmplog-instructions-pass.so: undefined symbol: _ZNK4llvm8TypeSizecvmEv
+ clang-13: error: unable to execute command: No such file or directory
+ clang-13: error: clang frontend command failed due to signal (use -v to see invocation)
+ clang version 13.0.0 (https://github.com/llvm/llvm-project 1d7cf550721c51030144f3cd295c5789d51c4aad)
+ Target: x86_64-unknown-linux-gnu
+ Thread model: posix
+ InstalledDir: /prg/tmp/llvm-project/build/bin
+ clang-13: note: diagnostic msg:
+ ********************
+ ```
-Then this means that your OS updated the clang installation from an upgrade package and because of that the AFL++ llvm plugins do not match anymore.
+ Then this means that your OS updated the clang installation from an upgrade package and because of that the AFL++ llvm plugins do not match anymore.
-Solution: `git pull ; make clean install` of AFL++.
\ No newline at end of file
+ Solution: `git pull ; make clean install` of AFL++.
+
\ No newline at end of file
--
cgit 1.4.1
From 3f7c5f80fefc4ffa1aef4bd19220bbe94f328e25 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Fri, 3 Sep 2021 15:45:47 +0200
Subject: Update FAQ.md
---
docs/FAQ.md | 36 ++++++++++++++++++------------------
1 file changed, 18 insertions(+), 18 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 71e9a92b..5da0bbcc 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -6,7 +6,7 @@ If you find an interesting or important question missing, submit it via
## General
- What is the difference between AFL and AFL++?
+ What is the difference between AFL and AFL++?
AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
@@ -20,16 +20,16 @@ If you find an interesting or important question missing, submit it via
Until the end of 2019, the AFL++ team had grown to four active developers which then implemented their own research and features, making it now by far the most flexible and feature rich guided fuzzer available as open source.
And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g. [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
-
+
- Where can I find tutorials?
+ Where can I find tutorials?
We compiled a list of tutorials and exercises, see [tutorials.md](tutorials.md).
-
+
- What is an "edge"?
+ What is an "edge"?
A program contains `functions`, `functions` contain the compiled machine code.
The compiled machine code in a `function` can be in a single or many `basic blocks`.
@@ -72,46 +72,46 @@ If you find an interesting or important question missing, submit it via
Every line between two blocks is an `edge`.
Note that a few basic block loop to itself, this too would be an edge.
-
+
## Targets
- How can I fuzz a binary-only target?
+ How can I fuzz a binary-only target?
AFL++ is a great fuzzer if you have the source code available.
However, if there is only the binary program and no source code available, then the standard non-instrumented mode is not effective.
To learn how these binaries can be fuzzed, read [binaryonly_fuzzing.md](binaryonly_fuzzing.md).
-
+
- How can I fuzz a network service?
+ How can I fuzz a network service?
The short answer is - you cannot, at least not "out of the box".
For more information on fuzzing network services, see [best_practices.md#fuzzing-a-network-service](best_practices.md#fuzzing-a-network-service).
-
+
- How can I fuzz a GUI program?
+ How can I fuzz a GUI program?
Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
For more information on fuzzing GUI programs, see [best_practices.md#fuzzing-a-gui-program](best_practices.md#fuzzing-a-gui-program).
-
+
## Performance
- How can I improve the fuzzing speed?
+ How can I improve the fuzzing speed?
There are a few things you can do to improve the fuzzing speed, see [best_practices.md#improving-speed](best_practices.md#improving-speed).
-
+
- Why is my stability below 100%?
+ Why is my stability below 100%?
Stability is measured by how many percent of the edges in the target are "stable".
Sending the same input again and again should take the exact same path through the target every time.
@@ -126,12 +126,12 @@ If you find an interesting or important question missing, submit it via
However, it is recommended that for values below 90% or 80% you should take countermeasures to improve stability.
For more information on stability and how to improve the stability value, see [best_practices.md#improving-stability](best_practices.md#improving-stability).
-
+
## Troubleshooting
- I got a weird compile error from clang.
+ I got a weird compile error from clang.
If you see this kind of error when trying to instrument a target with afl-cc/afl-clang-fast/afl-clang-lto:
@@ -150,4 +150,4 @@ If you find an interesting or important question missing, submit it via
Then this means that your OS updated the clang installation from an upgrade package and because of that the AFL++ llvm plugins do not match anymore.
Solution: `git pull ; make clean install` of AFL++.
-
\ No newline at end of file
+
\ No newline at end of file
--
cgit 1.4.1
From 70c03944d2b3d166e2a3bb75ac38c1f520b36347 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Mon, 6 Sep 2021 21:53:49 +0200
Subject: Update FAQ.md
---
docs/FAQ.md | 18 +++++++++---------
1 file changed, 9 insertions(+), 9 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 5da0bbcc..68ca3bad 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -6,7 +6,7 @@ If you find an interesting or important question missing, submit it via
## General
- What is the difference between AFL and AFL++?
+ What is the difference between AFL and AFL++?
AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
@@ -23,13 +23,13 @@ If you find an interesting or important question missing, submit it via
- Where can I find tutorials?
+ Where can I find tutorials?
We compiled a list of tutorials and exercises, see [tutorials.md](tutorials.md).
- What is an "edge"?
+ What is an "edge"?
A program contains `functions`, `functions` contain the compiled machine code.
The compiled machine code in a `function` can be in a single or many `basic blocks`.
@@ -77,7 +77,7 @@ If you find an interesting or important question missing, submit it via
## Targets
- How can I fuzz a binary-only target?
+ How can I fuzz a binary-only target?
AFL++ is a great fuzzer if you have the source code available.
@@ -87,7 +87,7 @@ If you find an interesting or important question missing, submit it via
- How can I fuzz a network service?
+ How can I fuzz a network service?
The short answer is - you cannot, at least not "out of the box".
@@ -95,7 +95,7 @@ If you find an interesting or important question missing, submit it via
- How can I fuzz a GUI program?
+ How can I fuzz a GUI program?
Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
@@ -105,13 +105,13 @@ If you find an interesting or important question missing, submit it via
## Performance
- How can I improve the fuzzing speed?
+ How can I improve the fuzzing speed?
There are a few things you can do to improve the fuzzing speed, see [best_practices.md#improving-speed](best_practices.md#improving-speed).
- Why is my stability below 100%?
+ Why is my stability below 100%?
Stability is measured by how many percent of the edges in the target are "stable".
Sending the same input again and again should take the exact same path through the target every time.
@@ -131,7 +131,7 @@ If you find an interesting or important question missing, submit it via
## Troubleshooting
- I got a weird compile error from clang.
+ I got a weird compile error from clang.
If you see this kind of error when trying to instrument a target with afl-cc/afl-clang-fast/afl-clang-lto:
--
cgit 1.4.1
From 492dbe9fb294dec27e5c2bc7297b36526bb8e61f Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Sun, 21 Nov 2021 18:00:01 +0100
Subject: Clean up docs folder
---
README.md | 5 +-
docs/FAQ.md | 5 +-
docs/best_practices.md | 18 +++--
docs/parallel_fuzzing.md | 182 +++++++++++++++++++++++------------------------
qemu_mode/README.md | 5 +-
5 files changed, 109 insertions(+), 106 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/README.md b/README.md
index b2714787..fcb6b3c9 100644
--- a/README.md
+++ b/README.md
@@ -132,9 +132,6 @@ The following branches exist:
* [dev](https://github.com/AFLplusplus/AFLplusplus/tree/dev): development state of AFL++ - bleeding edge and you might catch a checkout which does not compile or has a bug. *We only accept PRs in dev!!*
* (any other): experimental branches to work on specific features or testing new functionality or changes.
-For releases, please see the [Releases tab](https://github.com/AFLplusplus/AFLplusplus/releases).
-Also take a look at the list of [important changes in AFL++](docs/important_changes.md).
-
## Help wanted
We have several [ideas](docs/ideas.md) we would like to see in AFL++ to make it
@@ -233,4 +230,4 @@ presented at WOOT'20:
}
```
-
+
\ No newline at end of file
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 68ca3bad..34ed4cf5 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -83,7 +83,8 @@ If you find an interesting or important question missing, submit it via
However, if there is only the binary program and no source code available, then the standard non-instrumented mode is not effective.
- To learn how these binaries can be fuzzed, read [binaryonly_fuzzing.md](binaryonly_fuzzing.md).
+ To learn how these binaries can be fuzzed, read
+ [fuzzing_binary-only_targets.md](fuzzing_binary-only_targets.md).
@@ -143,7 +144,7 @@ If you find an interesting or important question missing, submit it via
Target: x86_64-unknown-linux-gnu
Thread model: posix
InstalledDir: /prg/tmp/llvm-project/build/bin
- clang-13: note: diagnostic msg:
+ clang-13: note: diagnostic msg:
********************
```
diff --git a/docs/best_practices.md b/docs/best_practices.md
index 7016f08d..5f2d45ed 100644
--- a/docs/best_practices.md
+++ b/docs/best_practices.md
@@ -4,20 +4,26 @@
### Targets
- * [Fuzzing a binary-only target](#fuzzing-a-binary-only-target)
- * [Fuzzing a GUI program](#fuzzing-a-gui-program)
- * [Fuzzing a network service](#fuzzing-a-network-service)
+* [Fuzzing a target with source code available](#fuzzing-a-target-with-source-code-available)
+* [Fuzzing a binary-only target](#fuzzing-a-binary-only-target)
+* [Fuzzing a GUI program](#fuzzing-a-gui-program)
+* [Fuzzing a network service](#fuzzing-a-network-service)
### Improvements
- * [Improving speed](#improving-speed)
- * [Improving stability](#improving-stability)
+* [Improving speed](#improving-speed)
+* [Improving stability](#improving-stability)
## Targets
+### Fuzzing a target with source code available
+
+To learn how to fuzz a target if source code is available, see [fuzzing_in_depth.md](fuzzing_in_depth.md).
+
### Fuzzing a binary-only target
-For a comprehensive guide, see [binaryonly_fuzzing.md](binaryonly_fuzzing.md).
+For a comprehensive guide, see
+[fuzzing_binary-only_targets.md](fuzzing_binary-only_targets.md).
### Fuzzing a GUI program
diff --git a/docs/parallel_fuzzing.md b/docs/parallel_fuzzing.md
index d24f2837..130cb3ce 100644
--- a/docs/parallel_fuzzing.md
+++ b/docs/parallel_fuzzing.md
@@ -1,28 +1,28 @@
# Tips for parallel fuzzing
-This document talks about synchronizing afl-fuzz jobs on a single machine
-or across a fleet of systems. See README.md for the general instruction manual.
+This document talks about synchronizing afl-fuzz jobs on a single machine or
+across a fleet of systems. See README.md for the general instruction manual.
Note that this document is rather outdated. please refer to the main document
-section on multiple core usage [fuzzing_expert.md#Using multiple cores](fuzzing_expert.md#b-using-multiple-cores)
+section on multiple core usage
+[fuzzing_in_depth.md:b) Using multiple cores](fuzzing_in_depth.md#b-using-multiple-cores)
for up to date strategies!
## 1) Introduction
-Every copy of afl-fuzz will take up one CPU core. This means that on an
-n-core system, you can almost always run around n concurrent fuzzing jobs with
+Every copy of afl-fuzz will take up one CPU core. This means that on an n-core
+system, you can almost always run around n concurrent fuzzing jobs with
virtually no performance hit (you can use the afl-gotcpu tool to make sure).
-In fact, if you rely on just a single job on a multi-core system, you will
-be underutilizing the hardware. So, parallelization is always the right way to
-go.
+In fact, if you rely on just a single job on a multi-core system, you will be
+underutilizing the hardware. So, parallelization is always the right way to go.
When targeting multiple unrelated binaries or using the tool in
"non-instrumented" (-n) mode, it is perfectly fine to just start up several
-fully separate instances of afl-fuzz. The picture gets more complicated when
-you want to have multiple fuzzers hammering a common target: if a hard-to-hit
-but interesting test case is synthesized by one fuzzer, the remaining instances
-will not be able to use that input to guide their work.
+fully separate instances of afl-fuzz. The picture gets more complicated when you
+want to have multiple fuzzers hammering a common target: if a hard-to-hit but
+interesting test case is synthesized by one fuzzer, the remaining instances will
+not be able to use that input to guide their work.
To help with this problem, afl-fuzz offers a simple way to synchronize test
cases on the fly.
@@ -30,15 +30,15 @@ cases on the fly.
It is a good idea to use different power schedules if you run several instances
in parallel (`-p` option).
-Alternatively running other AFL spinoffs in parallel can be of value,
-e.g. Angora (https://github.com/AngoraFuzzer/Angora/)
+Alternatively running other AFL spinoffs in parallel can be of value, e.g.
+Angora (https://github.com/AngoraFuzzer/Angora/)
## 2) Single-system parallelization
-If you wish to parallelize a single job across multiple cores on a local
-system, simply create a new, empty output directory ("sync dir") that will be
-shared by all the instances of afl-fuzz; and then come up with a naming scheme
-for every instance - say, "fuzzer01", "fuzzer02", etc.
+If you wish to parallelize a single job across multiple cores on a local system,
+simply create a new, empty output directory ("sync dir") that will be shared by
+all the instances of afl-fuzz; and then come up with a naming scheme for every
+instance - say, "fuzzer01", "fuzzer02", etc.
Run the first one ("main node", -M) like this:
@@ -57,18 +57,18 @@ Each fuzzer will keep its state in a separate subdirectory, like so:
/path/to/sync_dir/fuzzer01/
-Each instance will also periodically rescan the top-level sync directory
-for any test cases found by other fuzzers - and will incorporate them into
-its own fuzzing when they are deemed interesting enough.
-For performance reasons only -M main node syncs the queue with everyone, the
--S secondary nodes will only sync from the main node.
+Each instance will also periodically rescan the top-level sync directory for any
+test cases found by other fuzzers - and will incorporate them into its own
+fuzzing when they are deemed interesting enough. For performance reasons only -M
+main node syncs the queue with everyone, the -S secondary nodes will only sync
+from the main node.
-The difference between the -M and -S modes is that the main instance will
-still perform deterministic checks; while the secondary instances will
-proceed straight to random tweaks.
+The difference between the -M and -S modes is that the main instance will still
+perform deterministic checks; while the secondary instances will proceed
+straight to random tweaks.
-Note that you must always have one -M main instance!
-Running multiple -M instances is wasteful!
+Note that you must always have one -M main instance! Running multiple -M
+instances is wasteful!
You can also monitor the progress of your jobs from the command line with the
provided afl-whatsup tool. When the instances are no longer finding new paths,
@@ -90,18 +90,18 @@ file name.
## 3) Multiple -M mains
-There is support for parallelizing the deterministic checks.
-This is only needed where
+There is support for parallelizing the deterministic checks. This is only needed
+where
1. many new paths are found fast over a long time and it looks unlikely that
main node will ever catch up, and
2. deterministic fuzzing is actively helping path discovery (you can see this
in the main node for the first for lines in the "fuzzing strategy yields"
- section. If the ration `found/attemps` is high, then it is effective. It
+ section. If the ration `found/attempts` is high, then it is effective. It
most commonly isn't.)
-Only if both are true it is beneficial to have more than one main.
-You can leverage this by creating -M instances like so:
+Only if both are true it is beneficial to have more than one main. You can
+leverage this by creating -M instances like so:
```
./afl-fuzz -i testcase_dir -o sync_dir -M mainA:1/3 [...]
@@ -115,27 +115,26 @@ distribute the deterministic fuzzing across. Note that if you boot up fewer
fuzzers than indicated by the second number passed to -M, you may end up with
poor coverage.
-## 4) Syncing with non-AFL fuzzers or independant instances
+## 4) Syncing with non-AFL fuzzers or independent instances
-A -M main node can be told with the `-F other_fuzzer_queue_directory` option
-to sync results from other fuzzers, e.g. libfuzzer or honggfuzz.
+A -M main node can be told with the `-F other_fuzzer_queue_directory` option to
+sync results from other fuzzers, e.g. libfuzzer or honggfuzz.
-Only the specified directory will by synced into afl, not subdirectories.
-The specified directory does not need to exist yet at the start of afl.
+Only the specified directory will by synced into afl, not subdirectories. The
+specified directory does not need to exist yet at the start of afl.
The `-F` option can be passed to the main node several times.
## 5) Multi-system parallelization
-The basic operating principle for multi-system parallelization is similar to
-the mechanism explained in section 2. The key difference is that you need to
-write a simple script that performs two actions:
+The basic operating principle for multi-system parallelization is similar to the
+mechanism explained in section 2. The key difference is that you need to write a
+simple script that performs two actions:
- - Uses SSH with authorized_keys to connect to every machine and retrieve
- a tar archive of the /path/to/sync_dir/ directory local to
- the machine.
- It is best to use a naming scheme that includes host name and it's being
- a main node (e.g. main1, main2) in the fuzzer ID, so that you can do
+ - Uses SSH with authorized_keys to connect to every machine and retrieve a tar
+ archive of the /path/to/sync_dir/ directory local to the
+ machine. It is best to use a naming scheme that includes host name and it's
+ being a main node (e.g. main1, main2) in the fuzzer ID, so that you can do
something like:
```sh
@@ -163,70 +162,70 @@ There are other (older) more featured, experimental tools:
However these do not support syncing just main nodes (yet).
-When developing custom test case sync code, there are several optimizations
-to keep in mind:
+When developing custom test case sync code, there are several optimizations to
+keep in mind:
- - The synchronization does not have to happen very often; running the
- task every 60 minutes or even less often at later fuzzing stages is
- fine
+ - The synchronization does not have to happen very often; running the task
+ every 60 minutes or even less often at later fuzzing stages is fine
- - There is no need to synchronize crashes/ or hangs/; you only need to
- copy over queue/* (and ideally, also fuzzer_stats).
+ - There is no need to synchronize crashes/ or hangs/; you only need to copy
+ over queue/* (and ideally, also fuzzer_stats).
- - It is not necessary (and not advisable!) to overwrite existing files;
- the -k option in tar is a good way to avoid that.
+ - It is not necessary (and not advisable!) to overwrite existing files; the -k
+ option in tar is a good way to avoid that.
- There is no need to fetch directories for fuzzers that are not running
locally on a particular machine, and were simply copied over onto that
system during earlier runs.
- - For large fleets, you will want to consolidate tarballs for each host,
- as this will let you use n SSH connections for sync, rather than n*(n-1).
+ - For large fleets, you will want to consolidate tarballs for each host, as
+ this will let you use n SSH connections for sync, rather than n*(n-1).
You may also want to implement staged synchronization. For example, you
- could have 10 groups of systems, with group 1 pushing test cases only
- to group 2; group 2 pushing them only to group 3; and so on, with group
+ could have 10 groups of systems, with group 1 pushing test cases only to
+ group 2; group 2 pushing them only to group 3; and so on, with group
eventually 10 feeding back to group 1.
- This arrangement would allow test interesting cases to propagate across
- the fleet without having to copy every fuzzer queue to every single host.
+ This arrangement would allow test interesting cases to propagate across the
+ fleet without having to copy every fuzzer queue to every single host.
- You do not want a "main" instance of afl-fuzz on every system; you should
run them all with -S, and just designate a single process somewhere within
the fleet to run with -M.
- - Syncing is only necessary for the main nodes on a system. It is possible
- to run main-less with only secondaries. However then you need to find out
- which secondary took over the temporary role to be the main node. Look for
- the `is_main_node` file in the fuzzer directories, eg. `sync-dir/hostname-*/is_main_node`
+ - Syncing is only necessary for the main nodes on a system. It is possible to
+ run main-less with only secondaries. However then you need to find out which
+ secondary took over the temporary role to be the main node. Look for the
+ `is_main_node` file in the fuzzer directories, eg.
+ `sync-dir/hostname-*/is_main_node`
It is *not* advisable to skip the synchronization script and run the fuzzers
-directly on a network filesystem; unexpected latency and unkillable processes
-in I/O wait state can mess things up.
+directly on a network filesystem; unexpected latency and unkillable processes in
+I/O wait state can mess things up.
## 6) Remote monitoring and data collection
-You can use screen, nohup, tmux, or something equivalent to run remote
-instances of afl-fuzz. If you redirect the program's output to a file, it will
+You can use screen, nohup, tmux, or something equivalent to run remote instances
+of afl-fuzz. If you redirect the program's output to a file, it will
automatically switch from a fancy UI to more limited status reports. There is
also basic machine-readable information which is always written to the
fuzzer_stats file in the output directory. Locally, that information can be
interpreted with afl-whatsup.
-In principle, you can use the status screen of the main (-M) instance to
-monitor the overall fuzzing progress and decide when to stop. In this
-mode, the most important signal is just that no new paths are being found
-for a longer while. If you do not have a main instance, just pick any
-single secondary instance to watch and go by that.
+In principle, you can use the status screen of the main (-M) instance to monitor
+the overall fuzzing progress and decide when to stop. In this mode, the most
+important signal is just that no new paths are being found for a longer while.
+If you do not have a main instance, just pick any single secondary instance to
+watch and go by that.
-You can also rely on that instance's output directory to collect the
-synthesized corpus that covers all the noteworthy paths discovered anywhere
-within the fleet. Secondary (-S) instances do not require any special
-monitoring, other than just making sure that they are up.
+You can also rely on that instance's output directory to collect the synthesized
+corpus that covers all the noteworthy paths discovered anywhere within the
+fleet. Secondary (-S) instances do not require any special monitoring, other
+than just making sure that they are up.
-Keep in mind that crashing inputs are *not* automatically propagated to the
-main instance, so you may still want to monitor for crashes fleet-wide
-from within your synchronization or health checking scripts (see afl-whatsup).
+Keep in mind that crashing inputs are *not* automatically propagated to the main
+instance, so you may still want to monitor for crashes fleet-wide from within
+your synchronization or health checking scripts (see afl-whatsup).
## 7) Asymmetric setups
@@ -238,21 +237,20 @@ It is perhaps worth noting that all of the following is permitted:
out_dir//queue/* and writing their own finds to sequentially
numbered id:nnnnnn files in out_dir//queue/*.
- - Running some of the synchronized fuzzers with different (but related)
- target binaries. For example, simultaneously stress-testing several
- different JPEG parsers (say, IJG jpeg and libjpeg-turbo) while sharing
- the discovered test cases can have synergistic effects and improve the
- overall coverage.
+ - Running some of the synchronized fuzzers with different (but related) target
+ binaries. For example, simultaneously stress-testing several different JPEG
+ parsers (say, IJG jpeg and libjpeg-turbo) while sharing the discovered test
+ cases can have synergistic effects and improve the overall coverage.
(In this case, running one -M instance per target is necessary.)
- - Having some of the fuzzers invoke the binary in different ways.
- For example, 'djpeg' supports several DCT modes, configurable with
- a command-line flag, while 'dwebp' supports incremental and one-shot
- decoding. In some scenarios, going after multiple distinct modes and then
- pooling test cases will improve coverage.
+ - Having some of the fuzzers invoke the binary in different ways. For example,
+ 'djpeg' supports several DCT modes, configurable with a command-line flag,
+ while 'dwebp' supports incremental and one-shot decoding. In some scenarios,
+ going after multiple distinct modes and then pooling test cases will improve
+ coverage.
- Much less convincingly, running the synchronized fuzzers with different
starting test cases (e.g., progressive and standard JPEG) or dictionaries.
The synchronization mechanism ensures that the test sets will get fairly
- homogeneous over time, but it introduces some initial variability.
+ homogeneous over time, but it introduces some initial variability.
\ No newline at end of file
diff --git a/qemu_mode/README.md b/qemu_mode/README.md
index d28479d9..c62309a2 100644
--- a/qemu_mode/README.md
+++ b/qemu_mode/README.md
@@ -217,5 +217,6 @@ them at run time, can be a faster alternative. That said, static rewriting is
fraught with peril, because it depends on being able to properly and fully model
program control flow without actually executing each and every code path.
-Checkout the "Fuzzing binary-only targets" section in our main README.md and
-the docs/binaryonly_fuzzing.md document for more information and hints.
+Check out
+[docs/fuzzing_binary-only_targets.md](../docs/fuzzing_binary-only_targets.md)
+for more information and hints.
--
cgit 1.4.1
From f63c2ed1450da8ab5ff38dcb7f0ab1a13d9865ca Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Thu, 2 Dec 2021 17:09:55 +0100
Subject: Change the word "entrypoint" to "entry point"
---
docs/FAQ.md | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 34ed4cf5..ae4a77dc 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -33,7 +33,10 @@ If you find an interesting or important question missing, submit it via
A program contains `functions`, `functions` contain the compiled machine code.
The compiled machine code in a `function` can be in a single or many `basic blocks`.
- A `basic block` is the largest possible number of subsequent machine code instructions that has exactly one entrypoint (which can be be entered by multiple other basic blocks) and runs linearly without branching or jumping to other addresses (except at the end).
+ A `basic block` is the largest possible number of subsequent machine code
+ instructions that has exactly one entry point (which can be be entered by
+ multiple other basic blocks) and runs linearly without branching or jumping to
+ other addresses (except at the end).
```
function() {
--
cgit 1.4.1
From a7694e299a331bd8c4826b2402ee68cd6f83d8f9 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Thu, 2 Dec 2021 20:45:48 +0100
Subject: Fix punctuation in connection with "however"
---
docs/FAQ.md | 10 +++++++---
docs/best_practices.md | 27 ++++++++++++++++++---------
docs/custom_mutators.md | 10 +++++-----
docs/fuzzing_in_depth.md | 10 +++++-----
docs/important_changes.md | 4 ++--
instrumentation/README.llvm.md | 11 ++++++-----
qemu_mode/README.persistent.md | 8 ++++----
qemu_mode/libcompcov/README.md | 8 ++++----
utils/afl_network_proxy/README.md | 13 +++++++------
utils/afl_untracer/README.md | 6 +++---
10 files changed, 61 insertions(+), 46 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/docs/FAQ.md b/docs/FAQ.md
index ae4a77dc..49444999 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -12,7 +12,9 @@ If you find an interesting or important question missing, submit it via
American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting in 2013/2014, and when he left Google end of 2017 he stopped developing it.
- At the end of 2019, the Google fuzzing team took over maintenance of AFL, however it is only accepting PRs from the community and is not developing enhancements anymore.
+ At the end of 2019, the Google fuzzing team took over maintenance of AFL,
+ however, it is only accepting PRs from the community and is not developing
+ enhancements anymore.
In the second quarter of 2019, 1 1/2 years later, when no further development of AFL had happened and it became clear there would none be coming, AFL++ was born, where initially community patches were collected and applied for bug fixes and enhancements.
Then from various AFL spin-offs - mostly academic research - features were integrated.
@@ -121,8 +123,10 @@ If you find an interesting or important question missing, submit it via
Sending the same input again and again should take the exact same path through the target every time.
If that is the case, the stability is 100%.
- If however randomness happens, e.g. a thread reading other external data, reaction to timing, etc., then in some of the re-executions with the same data the edge coverage result will be different accross runs.
- Those edges that change are then flagged "unstable".
+ If, however, randomness happens, e.g. a thread reading other external data,
+ reaction to timing, etc., then in some of the re-executions with the same data
+ the edge coverage result will be different accross runs. Those edges that
+ change are then flagged "unstable".
The more "unstable" edges, the more difficult for AFL++ to identify valid new paths.
diff --git a/docs/best_practices.md b/docs/best_practices.md
index 979849f4..15f8870c 100644
--- a/docs/best_practices.md
+++ b/docs/best_practices.md
@@ -54,9 +54,11 @@ to emulate the network. This is also much faster than the real network would be.
See [utils/socket_fuzzing/](../utils/socket_fuzzing/).
There is an outdated AFL++ branch that implements networking if you are
-desperate though: [https://github.com/AFLplusplus/AFLplusplus/tree/networking](https://github.com/AFLplusplus/AFLplusplus/tree/networking) -
-however a better option is AFLnet ([https://github.com/aflnet/aflnet](https://github.com/aflnet/aflnet))
-which allows you to define network state with different type of data packets.
+desperate though:
+[https://github.com/AFLplusplus/AFLplusplus/tree/networking](https://github.com/AFLplusplus/AFLplusplus/tree/networking)
+- however, a better option is AFLnet
+([https://github.com/aflnet/aflnet](https://github.com/aflnet/aflnet)) which
+allows you to define network state with different type of data packets.
## Improvements
@@ -72,13 +74,16 @@ which allows you to define network state with different type of data packets.
### Improving stability
-For fuzzing a 100% stable target that covers all edges is the best case.
-A 90% stable target that covers all edges is however better than a 100% stable target that ignores 10% of the edges.
+For fuzzing a 100% stable target that covers all edges is the best case. A 90%
+stable target that covers all edges is, however, better than a 100% stable
+target that ignores 10% of the edges.
With instability, you basically have a partial coverage loss on an edge, with ignored functions you have a full loss on that edges.
-There are functions that are unstable, but also provide value to coverage, e.g., init functions that use fuzz data as input.
-If however a function that has nothing to do with the input data is the source of instability, e.g., checking jitter, or is a hash map function etc., then it should not be instrumented.
+There are functions that are unstable, but also provide value to coverage, e.g.,
+init functions that use fuzz data as input. If, however, a function that has
+nothing to do with the input data is the source of instability, e.g., checking
+jitter, or is a hash map function etc., then it should not be instrumented.
To be able to exclude these functions (based on AFL++'s measured stability), the following process will allow to identify functions with variable edges.
@@ -116,8 +121,12 @@ Four steps are required to do this and it also requires quite some knowledge of
If `PCGUARD` is used, then you need to follow this guide (needs llvm 12+!):
[https://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation](https://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation)
- Only exclude those functions from instrumentation that provide no value for coverage - that is if it does not process any fuzz data directly or indirectly (e.g. hash maps, thread management etc.).
- If however a function directly or indirectly handles fuzz data, then you should not put the function in a deny instrumentation list and rather live with the instability it comes with.
+ Only exclude those functions from instrumentation that provide no value for
+ coverage - that is if it does not process any fuzz data directly or
+ indirectly (e.g. hash maps, thread management etc.). If, however, a
+ function directly or indirectly handles fuzz data, then you should not put
+ the function in a deny instrumentation list and rather live with the
+ instability it comes with.
4. Recompile the target
diff --git a/docs/custom_mutators.md b/docs/custom_mutators.md
index 4018d633..fc5ecbf9 100644
--- a/docs/custom_mutators.md
+++ b/docs/custom_mutators.md
@@ -112,11 +112,11 @@ def deinit(): # optional for Python
- `fuzz_count` (optional):
- When a queue entry is selected to be fuzzed, afl-fuzz selects the number
- of fuzzing attempts with this input based on a few factors.
- If however the custom mutator wants to set this number instead on how often
- it is called for a specific queue entry, use this function.
- This function is most useful if `AFL_CUSTOM_MUTATOR_ONLY` is **not** used.
+ When a queue entry is selected to be fuzzed, afl-fuzz selects the number of
+ fuzzing attempts with this input based on a few factors. If, however, the
+ custom mutator wants to set this number instead on how often it is called
+ for a specific queue entry, use this function. This function is most useful
+ if `AFL_CUSTOM_MUTATOR_ONLY` is **not** used.
- `fuzz` (optional):
diff --git a/docs/fuzzing_in_depth.md b/docs/fuzzing_in_depth.md
index 92b3cf86..96e709ab 100644
--- a/docs/fuzzing_in_depth.md
+++ b/docs/fuzzing_in_depth.md
@@ -131,8 +131,8 @@ The following options are available when you instrument with LTO mode
have to compile the target twice, once specifically with/for this mode by
setting `AFL_LLVM_CMPLOG=1`, and pass this binary to afl-fuzz via the `-c`
parameter. Note that you can compile also just a cmplog binary and use that
- for both however there will be a performance penality. You can read more about
- this in
+ for both, however, there will be a performance penality. You can read more
+ about this in
[instrumentation/README.cmplog.md](../instrumentation/README.cmplog.md).
If you use LTO, LLVM or GCC_PLUGIN mode
@@ -151,7 +151,7 @@ only instrument parts of the target that you are interested in:
inlined and then would not match! See
[instrumentation/README.instrument_list.md](../instrumentation/README.instrument_list.md)
-There are many more options and modes available however these are most of the
+There are many more options and modes available, however, these are most of the
time less effective. See:
* [instrumentation/README.ctx.md](../instrumentation/README.ctx.md)
* [instrumentation/README.ngram.md](../instrumentation/README.ngram.md)
@@ -369,8 +369,8 @@ This step is highly recommended!
### c) Minimizing all corpus files
The shorter the input files that still traverse the same path within the target,
-the better the fuzzing will be. This minimization is done with `afl-tmin`
-however it is a long process as this has to be done for every file:
+the better the fuzzing will be. This minimization is done with `afl-tmin`,
+however, it is a long process as this has to be done for every file:
```
mkdir input
diff --git a/docs/important_changes.md b/docs/important_changes.md
index 726de64d..6cd00791 100644
--- a/docs/important_changes.md
+++ b/docs/important_changes.md
@@ -15,8 +15,8 @@ With AFL++ 3.15 we introduced the following changes from previous behaviors:
With AFL++ 3.14 we introduced the following changes from previous behaviors:
* afl-fuzz: deterministic fuzzing it not a default for -M main anymore
- * afl-cmin/afl-showmap -i now descends into subdirectories (afl-cmin.bash
- however does not)
+ * afl-cmin/afl-showmap -i now descends into subdirectories (afl-cmin.bash,
+ however, does not)
With AFL++ 3.10 we introduced the following changes from previous behaviors:
* The '+' feature of the '-t' option now means to auto-calculate the timeout
diff --git a/instrumentation/README.llvm.md b/instrumentation/README.llvm.md
index 8133cbe4..d16049fa 100644
--- a/instrumentation/README.llvm.md
+++ b/instrumentation/README.llvm.md
@@ -106,9 +106,10 @@ either setting `AFL_CC_COMPILER=LLVM` or pass the parameter `--afl-llvm` via
CFLAGS/CXXFLAGS/CPPFLAGS.
The tool honors roughly the same environmental variables as afl-gcc (see
-[docs/env_variables.md](../docs/env_variables.md)). This includes AFL_USE_ASAN,
-AFL_HARDEN, and AFL_DONT_OPTIMIZE. However AFL_INST_RATIO is not honored as it
-does not serve a good purpose with the more effective PCGUARD analysis.
+[docs/env_variables.md](../docs/env_variables.md)). This includes
+`AFL_USE_ASAN`, `AFL_HARDEN`, and `AFL_DONT_OPTIMIZE`. However, `AFL_INST_RATIO`
+is not honored as it does not serve a good purpose with the more effective
+PCGUARD analysis.
## 3) Options
@@ -125,8 +126,8 @@ For splitting memcmp, strncmp, etc., see
Then there are different ways of instrumenting the target:
1. An better instrumentation strategy uses LTO and link time instrumentation.
- Note that not all targets can compile in this mode, however if it works it is
- the best option you can use. To go with this option, use
+ Note that not all targets can compile in this mode, however, if it works it
+ is the best option you can use. To go with this option, use
afl-clang-lto/afl-clang-lto++. See [README.lto.md](README.lto.md).
2. Alternatively you can choose a completely different coverage method:
diff --git a/qemu_mode/README.persistent.md b/qemu_mode/README.persistent.md
index 7210a8cc..ab45860d 100644
--- a/qemu_mode/README.persistent.md
+++ b/qemu_mode/README.persistent.md
@@ -17,10 +17,10 @@ The start of the persistent loop has to be set with environment variable
`AFL_QEMU_PERSISTENT_ADDR`.
This address can be the address of whatever instruction. Setting this address to
-the start of a function makes the usage simple. If the address is however within
-a function, either RET, OFFSET, or EXITS (see below in 2.2, 2.3, 2.6) have to be
-set. This address (as well as the RET address, see below) has to be defined in
-hexadecimal with the 0x prefix or as a decimal value.
+the start of a function makes the usage simple. If the address is, however,
+within a function, either RET, OFFSET, or EXITS (see below in 2.2, 2.3, 2.6)
+have to be set. This address (as well as the RET address, see below) has to be
+defined in hexadecimal with the 0x prefix or as a decimal value.
If both RET and EXITS are not set, QEMU will assume that START points to a
function and will patch the return address (on stack or in the link register) to
diff --git a/qemu_mode/libcompcov/README.md b/qemu_mode/libcompcov/README.md
index 6a72f5ff..50f0d802 100644
--- a/qemu_mode/libcompcov/README.md
+++ b/qemu_mode/libcompcov/README.md
@@ -18,7 +18,7 @@ and this module is not capable to log the coverage in this case.
If you have the source code of the fuzzing target you should nto use this
library and QEMU but build it with afl-clang-fast and the laf-intel options.
-To use this library make sure to preload it with AFL_PRELOAD.
+To use this library, make sure to preload it with AFL_PRELOAD.
```
export AFL_PRELOAD=/path/to/libcompcov.so
@@ -32,6 +32,6 @@ Level 1 logs just comparison with immediates / read-only memory and level 2
logs all the comparisons.
The library make use of https://github.com/ouadev/proc_maps_parser and so it is
-Linux specific. However this is not a strict dependency, other UNIX operating
-systems can be supported by replacing the code related to the
-/proc/self/maps parsing.
\ No newline at end of file
+Linux specific. However, this is not a strict dependency, other UNIX operating
+systems can be supported by replacing the code related to the /proc/self/maps
+parsing.
\ No newline at end of file
diff --git a/utils/afl_network_proxy/README.md b/utils/afl_network_proxy/README.md
index 05659c45..d2c00be2 100644
--- a/utils/afl_network_proxy/README.md
+++ b/utils/afl_network_proxy/README.md
@@ -34,16 +34,17 @@ afl-network-server -i 1111 -m 25M -t 1000 -- /bin/target -f @@
### on the (afl-fuzz) main node
-Just run afl-fuzz with your normal options, however the target should be
+Just run afl-fuzz with your normal options, however, the target should be
`afl-network-client` with the IP and PORT of the `afl-network-server` and
increase the -t value:
+
```
afl-fuzz -i in -o out -t 2000+ -- afl-network-client TARGET-IP 1111
```
-Note the '+' on the -t parameter value. The afl-network-server will take
-care of proper timeouts hence afl-fuzz should not. The '+' increases the
-timeout and the value itself should be 500-1000 higher than the one on
-afl-network-server.
+
+Note the '+' on the -t parameter value. The afl-network-server will take care of
+proper timeouts hence afl-fuzz should not. The '+' increases the timeout and the
+value itself should be 500-1000 higher than the one on afl-network-server.
### networking
@@ -53,7 +54,7 @@ either. Note that also the outgoing interface can be specified with a '%' for
Also make sure your default TCP window size is larger than your MAP_SIZE
(130kb is a good value).
-On Linux that is the middle value of `/proc/sys/net/ipv4/tcp_rmem`
+On Linux that is the middle value of `/proc/sys/net/ipv4/tcp_rmem`
## how to compile and install
diff --git a/utils/afl_untracer/README.md b/utils/afl_untracer/README.md
index ada0c916..9f41618f 100644
--- a/utils/afl_untracer/README.md
+++ b/utils/afl_untracer/README.md
@@ -5,9 +5,9 @@
afl-untracer is an example skeleton file which can easily be used to fuzz
a closed source library.
-It requires less memory and is x3-5 faster than qemu_mode however it is way
-more course grained and does not provide interesting features like compcov
-or cmplog.
+It requires less memory and is x3-5 faster than qemu_mode, however, it is way
+more course grained and does not provide interesting features like compcov or
+cmplog.
Supported is so far Intel (i386/x86_64) and AARCH64.
--
cgit 1.4.1
From 65c3db86256b3907404623fe1c52e01c9d12ff97 Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Thu, 2 Dec 2021 21:03:59 +0100
Subject: Fix punctuation in connection with "e.g."
---
.github/ISSUE_TEMPLATE/bug_report.md | 5 +++--
CONTRIBUTING.md | 2 +-
docs/FAQ.md | 4 ++--
docs/INSTALL.md | 3 ++-
docs/afl-fuzz_approach.md | 2 +-
docs/best_practices.md | 4 ++--
docs/custom_mutators.md | 7 ++++---
docs/env_variables.md | 22 +++++++++++-----------
docs/fuzzing_binary-only_targets.md | 6 +++---
docs/fuzzing_in_depth.md | 32 ++++++++++++++++----------------
docs/ideas.md | 2 +-
docs/important_changes.md | 2 +-
instrumentation/README.llvm.md | 2 +-
instrumentation/README.lto.md | 2 +-
utils/README.md | 2 +-
utils/afl_network_proxy/README.md | 6 ++++--
16 files changed, 54 insertions(+), 49 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md
index 31152cd2..0d80f4a3 100644
--- a/.github/ISSUE_TEMPLATE/bug_report.md
+++ b/.github/ISSUE_TEMPLATE/bug_report.md
@@ -8,8 +8,9 @@ assignees: ''
---
**IMPORTANT**
-1. You have verified that the issue to be present in the current `dev` branch
-2. Please supply the command line options and relevant environment variables, e.g. a copy-paste of the contents of `out/default/fuzzer_setup`
+1. You have verified that the issue to be present in the current `dev` branch.
+2. Please supply the command line options and relevant environment variables,
+ e.g., a copy-paste of the contents of `out/default/fuzzer_setup`.
Thank you for making AFL++ better!
diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md
index 0268b2e5..0ab4f8ec 100644
--- a/CONTRIBUTING.md
+++ b/CONTRIBUTING.md
@@ -17,7 +17,7 @@ project, or added a file in a directory we already format, otherwise run:
Regarding the coding style, please follow the AFL style.
No camel case at all and use AFL's macros wherever possible
-(e.g. WARNF, FATAL, MAP_SIZE, ...).
+(e.g., WARNF, FATAL, MAP_SIZE, ...).
Remember that AFL++ has to build and run on many platforms, so
generalize your Makefiles/GNUmakefile (or your patches to our pre-existing
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 49444999..27250415 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -21,7 +21,7 @@ If you find an interesting or important question missing, submit it via
This already resulted in a much advanced AFL.
Until the end of 2019, the AFL++ team had grown to four active developers which then implemented their own research and features, making it now by far the most flexible and feature rich guided fuzzer available as open source.
- And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g. [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
+ And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g., [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
@@ -123,7 +123,7 @@ If you find an interesting or important question missing, submit it via
Sending the same input again and again should take the exact same path through the target every time.
If that is the case, the stability is 100%.
- If, however, randomness happens, e.g. a thread reading other external data,
+ If, however, randomness happens, e.g., a thread reading other external data,
reaction to timing, etc., then in some of the re-executions with the same data
the edge coverage result will be different accross runs. Those edges that
change are then flagged "unstable".
diff --git a/docs/INSTALL.md b/docs/INSTALL.md
index ab6e735b..c1e22e36 100644
--- a/docs/INSTALL.md
+++ b/docs/INSTALL.md
@@ -69,7 +69,8 @@ These build options exist:
* NO_PYTHON - disable python support
* NO_SPLICING - disables splicing mutation in afl-fuzz, not recommended for normal fuzzing
* AFL_NO_X86 - if compiling on non-intel/amd platforms
-* LLVM_CONFIG - if your distro doesn't use the standard name for llvm-config (e.g. Debian)
+* LLVM_CONFIG - if your distro doesn't use the standard name for llvm-config
+ (e.g., Debian)
e.g.: `make ASAN_BUILD=1`
diff --git a/docs/afl-fuzz_approach.md b/docs/afl-fuzz_approach.md
index 242104f7..68f45891 100644
--- a/docs/afl-fuzz_approach.md
+++ b/docs/afl-fuzz_approach.md
@@ -504,7 +504,7 @@ directory. This includes:
- `peak_rss_mb` - max rss usage reached during fuzzing in MB
- `edges_found` - how many edges have been found
- `var_byte_count` - how many edges are non-deterministic
-- `afl_banner` - banner text (e.g. the target name)
+- `afl_banner` - banner text (e.g., the target name)
- `afl_version` - the version of AFL++ used
- `target_mode` - default, persistent, qemu, unicorn, non-instrumented
- `command_line` - full command line used for the fuzzing session
diff --git a/docs/best_practices.md b/docs/best_practices.md
index 15f8870c..6a406bde 100644
--- a/docs/best_practices.md
+++ b/docs/best_practices.md
@@ -48,7 +48,7 @@ this with persistent mode [instrumentation/README.persistent_mode.md](../instrum
and you have a performance gain of x10 instead of a performance loss of over
x10 - that is a x100 difference!).
-If modifying the source is not an option (e.g. because you only have a binary
+If modifying the source is not an option (e.g., because you only have a binary
and perform binary fuzzing) you can also use a shared library with AFL_PRELOAD
to emulate the network. This is also much faster than the real network would be.
See [utils/socket_fuzzing/](../utils/socket_fuzzing/).
@@ -123,7 +123,7 @@ Four steps are required to do this and it also requires quite some knowledge of
Only exclude those functions from instrumentation that provide no value for
coverage - that is if it does not process any fuzz data directly or
- indirectly (e.g. hash maps, thread management etc.). If, however, a
+ indirectly (e.g., hash maps, thread management etc.). If, however, a
function directly or indirectly handles fuzz data, then you should not put
the function in a deny instrumentation list and rather live with the
instability it comes with.
diff --git a/docs/custom_mutators.md b/docs/custom_mutators.md
index fc5ecbf9..6bee5413 100644
--- a/docs/custom_mutators.md
+++ b/docs/custom_mutators.md
@@ -124,7 +124,7 @@ def deinit(): # optional for Python
additional test case.
Note that this function is optional - but it makes sense to use it.
You would only skip this if `post_process` is used to fix checksums etc.
- so if you are using it e.g. as a post processing library.
+ so if you are using it, e.g., as a post processing library.
Note that a length > 0 *must* be returned!
- `describe` (optional):
@@ -191,8 +191,9 @@ trimmed input. Here's a quick API description:
This method is called at the start of each trimming operation and receives
the initial buffer. It should return the amount of iteration steps possible
- on this input (e.g. if your input has n elements and you want to remove them
- one by one, return n, if you do a binary search, return log(n), and so on).
+ on this input (e.g., if your input has n elements and you want to remove
+ them one by one, return n, if you do a binary search, return log(n), and so
+ on).
If your trimming algorithm doesn't allow to determine the amount of
(remaining) steps easily (esp. while running), then you can alternatively
diff --git a/docs/env_variables.md b/docs/env_variables.md
index 715a60cb..771bf157 100644
--- a/docs/env_variables.md
+++ b/docs/env_variables.md
@@ -80,9 +80,9 @@ fairly broad use of environment variables instead:
Setting `AFL_INST_RATIO` to 0 is a valid choice. This will instrument only
the transitions between function entry points, but not individual branches.
- Note that this is an outdated variable. A few instances (e.g. afl-gcc) still
- support these, but state-of-the-art (e.g. LLVM LTO and LLVM PCGUARD) do not
- need this.
+ Note that this is an outdated variable. A few instances (e.g., afl-gcc)
+ still support these, but state-of-the-art (e.g., LLVM LTO and LLVM PCGUARD)
+ do not need this.
- `AFL_NO_BUILTIN` causes the compiler to generate code suitable for use with
libtokencap.so (but perhaps running a bit slower than without the flag).
@@ -319,7 +319,7 @@ checks or alter some of the more exotic semantics of the tool:
afl-fuzz), setting `AFL_PYTHON_MODULE` to a Python module can also provide
additional mutations. If `AFL_CUSTOM_MUTATOR_ONLY` is also set, all
mutations will solely be performed with the custom mutator. This feature
- allows to configure custom mutators which can be very helpful, e.g. fuzzing
+ allows to configure custom mutators which can be very helpful, e.g., fuzzing
XML or other highly flexible structured input. For details, see
[custom_mutators.md](custom_mutators.md).
@@ -449,7 +449,7 @@ checks or alter some of the more exotic semantics of the tool:
not crash the target again when the test case is given. To be able to still
re-trigger these crashes, you can use the `AFL_PERSISTENT_RECORD` variable
with a value of how many previous fuzz cases to keep prio a crash. If set to
- e.g. 10, then the 9 previous inputs are written to out/default/crashes as
+ e.g., 10, then the 9 previous inputs are written to out/default/crashes as
RECORD:000000,cnt:000000 to RECORD:000000,cnt:000008 and
RECORD:000000,cnt:000009 being the crash case. NOTE: This option needs to be
enabled in config.h first!
@@ -493,7 +493,7 @@ checks or alter some of the more exotic semantics of the tool:
This is especially useful when running multiple instances (`-M/-S` for
example). Applied tags are `banner` and `afl_version`. `banner` corresponds
to the name of the fuzzer provided through `-M/-S`. `afl_version`
- corresponds to the currently running AFL++ version (e.g. `++3.0c`). Default
+ corresponds to the currently running AFL++ version (e.g., `++3.0c`). Default
(empty/non present) will add no tags to the metrics. For more information,
see [rpc_statsd.md](rpc_statsd.md).
@@ -535,11 +535,11 @@ The QEMU wrapper used to instrument binary-only code supports several settings:
- `AFL_DEBUG` will print the found entry point for the binary to stderr. Use
this if you are unsure if the entry point might be wrong - but use it
- directly, e.g. `afl-qemu-trace ./program`.
+ directly, e.g., `afl-qemu-trace ./program`.
- `AFL_ENTRYPOINT` allows you to specify a specific entry point into the
binary (this can be very good for the performance!). The entry point is
- specified as hex address, e.g. `0x4004110`. Note that the address must be
+ specified as hex address, e.g., `0x4004110`. Note that the address must be
the address of a basic block.
- Setting `AFL_INST_LIBS` causes the translator to also instrument the code
@@ -595,7 +595,7 @@ QEMU driver to provide a `main` loop for a user provided
`stdin` rather than using in-memory test cases.
* `AFL_FRIDA_EXCLUDE_RANGES` - See `AFL_QEMU_EXCLUDE_RANGES`
* `AFL_FRIDA_INST_COVERAGE_FILE` - File to write DynamoRio format coverage
-information (e.g. to be loaded within IDA lighthouse).
+information (e.g., to be loaded within IDA lighthouse).
* `AFL_FRIDA_INST_DEBUG_FILE` - File to write raw assembly of original blocks
and their instrumented counterparts during block compilation.
* `AFL_FRIDA_INST_JIT` - Enable the instrumentation of Just-In-Time compiled
@@ -617,13 +617,13 @@ child on fork.
* `AFL_FRIDA_INST_RANGES` - See `AFL_QEMU_INST_RANGES`
* `AFL_FRIDA_INST_SEED` - Sets the initial seed for the hash function used to
generate block (and hence edge) IDs. Setting this to a constant value may be
-useful for debugging purposes, e.g. investigating unstable edges.
+useful for debugging purposes, e.g., investigating unstable edges.
* `AFL_FRIDA_INST_TRACE` - Log to stdout the address of executed blocks,
implies `AFL_FRIDA_INST_NO_OPTIMIZE`.
* `AFL_FRIDA_INST_TRACE_UNIQUE` - As per `AFL_FRIDA_INST_TRACE`, but each edge
is logged only once, requires `AFL_FRIDA_INST_NO_OPTIMIZE`.
* `AFL_FRIDA_INST_UNSTABLE_COVERAGE_FILE` - File to write DynamoRio format
-coverage information for unstable edges (e.g. to be loaded within IDA
+coverage information for unstable edges (e.g., to be loaded within IDA
lighthouse).
* `AFL_FRIDA_JS_SCRIPT` - Set the script to be loaded by the FRIDA scripting
engine. See [here](Scripting.md) for details.
diff --git a/docs/fuzzing_binary-only_targets.md b/docs/fuzzing_binary-only_targets.md
index c3204212..a786fd8b 100644
--- a/docs/fuzzing_binary-only_targets.md
+++ b/docs/fuzzing_binary-only_targets.md
@@ -113,7 +113,7 @@ If you want to fuzz a binary-only library, then you can fuzz it with frida-gum
via frida_mode/. You will have to write a harness to call the target function in
the library, use afl-frida.c as a template.
-You can also perform remote fuzzing with frida, e.g. if you want to fuzz on
+You can also perform remote fuzzing with frida, e.g., if you want to fuzz on
iPhone or Android devices, for this you can use
[https://github.com/ttdennis/fpicker/](https://github.com/ttdennis/fpicker/) as
an intermediate that uses AFL++ for fuzzing.
@@ -198,8 +198,8 @@ It is at about 80-85% performance.
Dyninst is a binary instrumentation framework similar to Pintool and DynamoRIO.
However, whereas Pintool and DynamoRIO work at runtime, Dyninst instruments the
target at load time and then let it run - or save the binary with the changes.
-This is great for some things, e.g. fuzzing, and not so effective for others,
-e.g. malware analysis.
+This is great for some things, e.g., fuzzing, and not so effective for others,
+e.g., malware analysis.
So, what you can do with Dyninst is taking every basic block and putting AFL++'s
instrumentation code in there - and then save the binary. Afterwards, just fuzz
diff --git a/docs/fuzzing_in_depth.md b/docs/fuzzing_in_depth.md
index 96e709ab..4e1e001e 100644
--- a/docs/fuzzing_in_depth.md
+++ b/docs/fuzzing_in_depth.md
@@ -167,7 +167,7 @@ allows you to find bugs that would not necessarily result in a crash.
Note that sanitizers have a huge impact on CPU (= less executions per second)
and RAM usage. Also you should only run one afl-fuzz instance per sanitizer
-type. This is enough because a use-after-free bug will be picked up, e.g. by
+type. This is enough because a use-after-free bug will be picked up, e.g., by
ASAN (address sanitizer) anyway when syncing to other fuzzing instances, so not
all fuzzing instances need to be instrumented with ASAN.
@@ -179,7 +179,7 @@ The following sanitizers have built-in support in AFL++:
local variable that is defined and read before it is even set. Enabled with
`export AFL_USE_MSAN=1` before compiling.
* UBSAN = Undefined Behavior SANitizer, finds instances where - by the C and C++
- standards - undefined behavior happens, e.g. adding two signed integers
+ standards - undefined behavior happens, e.g., adding two signed integers
together where the result is larger than a signed integer can hold. Enabled
with `export AFL_USE_UBSAN=1` before compiling.
* CFISAN = Control Flow Integrity SANitizer, finds instances where the control
@@ -202,15 +202,15 @@ be looked up in the sanitizer documentation of llvm/clang. afl-fuzz, however,
requires some specific parameters important for fuzzing to be set. If you want
to set your own, it might bail and report what it is missing.
-Note that some sanitizers cannot be used together, e.g. ASAN and MSAN, and
-others often cannot work together because of target weirdness, e.g. ASAN and
+Note that some sanitizers cannot be used together, e.g., ASAN and MSAN, and
+others often cannot work together because of target weirdness, e.g., ASAN and
CFISAN. You might need to experiment which sanitizers you can combine in a
target (which means more instances can be run without a sanitized target, which
is more effective).
### d) Modifying the target
-If the target has features that make fuzzing more difficult, e.g. checksums,
+If the target has features that make fuzzing more difficult, e.g., checksums,
HMAC, etc. then modify the source code so that checks for these values are
removed. This can even be done safely for source code used in operational
products by eliminating these checks within these AFL++ specific blocks:
@@ -250,7 +250,7 @@ Then build the target. (Usually with `make`)
reporting via `export AFL_QUIET=1`.
2. sometimes configure and build systems error on warnings - these should be
- disabled (e.g. `--disable-werror` for some configure scripts).
+ disabled (e.g., `--disable-werror` for some configure scripts).
3. in case the configure/build system complains about AFL++'s compiler and
aborts then set `export AFL_NOOPT=1` which will then just behave like the
@@ -354,7 +354,7 @@ You can find many good examples of starting files in the
Use the AFL++ tool `afl-cmin` to remove inputs from the corpus that do not
produce a new path in the target.
-Put all files from step a) into one directory, e.g. INPUTS.
+Put all files from step a) into one directory, e.g., INPUTS.
If the target program is to be called by fuzzing as `bin/target -d INPUTFILE`
the run afl-cmin like this:
@@ -380,8 +380,8 @@ for i in *; do
done
```
-This step can also be parallelized, e.g. with `parallel`. Note that this step is
-rather optional though.
+This step can also be parallelized, e.g., with `parallel`. Note that this step
+is rather optional though.
### Done!
@@ -503,7 +503,7 @@ can set the cache size (in MB) by setting the environment variable
`AFL_TESTCACHE_SIZE`.
There should be one main fuzzer (`-M main-$HOSTNAME` option) and as many
-secondary fuzzers (e.g. `-S variant1`) as you have cores that you use. Every
+secondary fuzzers (e.g., `-S variant1`) as you have cores that you use. Every
-M/-S entry needs a unique name (that can be whatever), however, the same -o
output directory location has to be used for all instances.
@@ -522,7 +522,7 @@ All other secondaries should be used like this:
* a quarter to a third with the MOpt mutator enabled: `-L 0`
* run with a different power schedule, recommended are:
`fast (default), explore, coe, lin, quad, exploit and rare` which you can set
- with e.g. `-p explore`
+ with, e.g., `-p explore`
* a few instances should use the old queue cycling with `-Z`
Also, it is recommended to set `export AFL_IMPORT_FIRST=1` to load test cases
@@ -547,7 +547,7 @@ A long list can be found at
However, you can also sync AFL++ with honggfuzz, libfuzzer with `-entropic=1`,
etc. Just show the main fuzzer (-M) with the `-F` option where the queue/work
-directory of a different fuzzer is, e.g. `-F /src/target/honggfuzz`. Using
+directory of a different fuzzer is, e.g., `-F /src/target/honggfuzz`. Using
honggfuzz (with `-n 1` or `-n 2`) and libfuzzer in parallel is highly
recommended!
@@ -615,8 +615,8 @@ To restart an afl-fuzz run, just reuse the same command line but replace the `-i
directory` with `-i -` or set `AFL_AUTORESUME=1`.
If you want to add new seeds to a fuzzing campaign you can run a temporary
-fuzzing instance, e.g. when your main fuzzer is using `-o out` and the new seeds
-are in `newseeds/` directory:
+fuzzing instance, e.g., when your main fuzzer is using `-o out` and the new
+seeds are in `newseeds/` directory:
```
AFL_BENCH_JUST_ONE=1 AFL_FAST_CAL=1 afl-fuzz -i newseeds -o out -S newseeds -- ./target
@@ -665,9 +665,9 @@ then you will not touch any of the other library APIs and features.
### h) How long to fuzz a target?
This is a difficult question. Basically if no new path is found for a long time
-(e.g. for a day or a week) then you can expect that your fuzzing won't be
+(e.g., for a day or a week) then you can expect that your fuzzing won't be
fruitful anymore. However, often this just means that you should switch out
-secondaries for others, e.g. custom mutator modules, sync to very different
+secondaries for others, e.g., custom mutator modules, sync to very different
fuzzers, etc.
Keep the queue/ directory (for future fuzzings of the same or similar targets)
diff --git a/docs/ideas.md b/docs/ideas.md
index 325e7031..8193983b 100644
--- a/docs/ideas.md
+++ b/docs/ideas.md
@@ -32,7 +32,7 @@ Mentor: any
## Support other programming languages
Other programming languages also use llvm hence they could (easily?) supported
-for fuzzing, e.g. mono, swift, go, kotlin native, fortran, ...
+for fuzzing, e.g., mono, swift, go, kotlin native, fortran, ...
GCC also supports: Objective-C, Fortran, Ada, Go, and D
(according to [Gcc homepage](https://gcc.gnu.org/))
diff --git a/docs/important_changes.md b/docs/important_changes.md
index 6cd00791..82de054f 100644
--- a/docs/important_changes.md
+++ b/docs/important_changes.md
@@ -44,7 +44,7 @@ behaviors and defaults:
* `-i` input directory option now descends into subdirectories. It also
does not fatal on crashes and too large files, instead it skips them
and uses them for splicing mutations
- * -m none is now default, set memory limits (in MB) with e.g. -m 250
+ * -m none is now default, set memory limits (in MB) with, e.g., -m 250
* deterministic fuzzing is now disabled by default (unless using -M) and
can be enabled with -D
* a caching of test cases can now be performed and can be modified by
diff --git a/instrumentation/README.llvm.md b/instrumentation/README.llvm.md
index d16049fa..ac8f2f2a 100644
--- a/instrumentation/README.llvm.md
+++ b/instrumentation/README.llvm.md
@@ -40,7 +40,7 @@ The idea and much of the initial implementation came from Laszlo Szekeres.
## 2a) How to use this - short
-Set the `LLVM_CONFIG` variable to the clang version you want to use, e.g.
+Set the `LLVM_CONFIG` variable to the clang version you want to use, e.g.:
```
LLVM_CONFIG=llvm-config-9 make
diff --git a/instrumentation/README.lto.md b/instrumentation/README.lto.md
index b97e5799..a20175b1 100644
--- a/instrumentation/README.lto.md
+++ b/instrumentation/README.lto.md
@@ -71,7 +71,7 @@ use an outdated Linux distribution, read the next section.
Installing the llvm snapshot builds is easy and mostly painless:
In the following line, change `NAME` for your Debian or Ubuntu release name
-(e.g. buster, focal, eon, etc.):
+(e.g., buster, focal, eon, etc.):
```
echo deb http://apt.llvm.org/NAME/ llvm-toolchain-NAME NAME >> /etc/apt/sources.list
diff --git a/utils/README.md b/utils/README.md
index b8df0b47..b7eead8e 100644
--- a/utils/README.md
+++ b/utils/README.md
@@ -13,7 +13,7 @@ Here's a quick overview of the stuff you can find in this directory:
- afl_proxy - skeleton file example to show how to fuzz
something where you gather coverage data via
- different means, e.g. hw debugger
+ different means, e.g., hw debugger
- afl_untracer - fuzz binary-only libraries much faster but with
less coverage than qemu_mode
diff --git a/utils/afl_network_proxy/README.md b/utils/afl_network_proxy/README.md
index d2c00be2..c478319a 100644
--- a/utils/afl_network_proxy/README.md
+++ b/utils/afl_network_proxy/README.md
@@ -6,7 +6,8 @@ Note that the impact on fuzzing speed will be huge, expect a loss of 90%.
## When to use this
1. when you have to fuzz a target that has to run on a system that cannot
- contain the fuzzing output (e.g. /tmp too small and file system is read-only)
+ contain the fuzzing output (e.g., /tmp too small and file system is
+ read-only)
2. when the target instantly reboots on crashes
3. ... any other reason you would need this
@@ -28,6 +29,7 @@ For most targets this hurts performance though so it is disabled by default.
Run `afl-network-server` with your target with the -m and -t values you need.
Important is the -i parameter which is the TCP port to listen on.
e.g.:
+
```
afl-network-server -i 1111 -m 25M -t 1000 -- /bin/target -f @@
```
@@ -50,7 +52,7 @@ value itself should be 500-1000 higher than the one on afl-network-server.
The TARGET can be an IPv4 or IPv6 address, or a host name that resolves to
either. Note that also the outgoing interface can be specified with a '%' for
-`afl-network-client`, e.g. `fe80::1234%eth0`.
+`afl-network-client`, e.g., `fe80::1234%eth0`.
Also make sure your default TCP window size is larger than your MAP_SIZE
(130kb is a good value).
--
cgit 1.4.1
From aa6586a761c47da1f202221c9a449b692cacbcae Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Thu, 2 Dec 2021 21:23:22 +0100
Subject: Fix typos - 1st run
---
custom_mutators/gramatron/README.md | 6 +++---
docs/FAQ.md | 2 +-
docs/fuzzing_in_depth.md | 2 +-
instrumentation/README.llvm.md | 2 +-
qemu_mode/libcompcov/README.md | 2 +-
utils/optimin/README.md | 2 +-
6 files changed, 8 insertions(+), 8 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/custom_mutators/gramatron/README.md b/custom_mutators/gramatron/README.md
index 0167f620..2ed014cd 100644
--- a/custom_mutators/gramatron/README.md
+++ b/custom_mutators/gramatron/README.md
@@ -1,6 +1,6 @@
# GramaTron
-Gramatron is a coverage-guided fuzzer that uses grammar automatons to perform
+GramaTron is a coverage-guided fuzzer that uses grammar automatons to perform
grammar-aware fuzzing. Technical details about our framework are available
in the [ISSTA'21 paper](https://nebelwelt.net/files/21ISSTA.pdf).
The artifact to reproduce the experiments presented in the paper are present
@@ -9,11 +9,11 @@ grammars is presented below:
# Compiling
-Execute `./build_gramatron_mutator.sh`
+Execute `./build_gramatron_mutator.sh`.
# Running
-You have to set the grammar file to use with `GRAMMATRON_AUTOMATION`:
+You have to set the grammar file to use with `GRAMATRON_AUTOMATION`:
```
export AFL_DISABLE_TRIM=1
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 27250415..671957ef 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -125,7 +125,7 @@ If you find an interesting or important question missing, submit it via
If, however, randomness happens, e.g., a thread reading other external data,
reaction to timing, etc., then in some of the re-executions with the same data
- the edge coverage result will be different accross runs. Those edges that
+ the edge coverage result will be different across runs. Those edges that
change are then flagged "unstable".
The more "unstable" edges, the more difficult for AFL++ to identify valid new paths.
diff --git a/docs/fuzzing_in_depth.md b/docs/fuzzing_in_depth.md
index 7c464d81..011ba783 100644
--- a/docs/fuzzing_in_depth.md
+++ b/docs/fuzzing_in_depth.md
@@ -131,7 +131,7 @@ The following options are available when you instrument with LTO mode
have to compile the target twice, once specifically with/for this mode by
setting `AFL_LLVM_CMPLOG=1`, and pass this binary to afl-fuzz via the `-c`
parameter. Note that you can compile also just a cmplog binary and use that
- for both, however, there will be a performance penality. You can read more
+ for both, however, there will be a performance penalty. You can read more
about this in
[instrumentation/README.cmplog.md](../instrumentation/README.cmplog.md).
diff --git a/instrumentation/README.llvm.md b/instrumentation/README.llvm.md
index ac8f2f2a..c93cd312 100644
--- a/instrumentation/README.llvm.md
+++ b/instrumentation/README.llvm.md
@@ -125,7 +125,7 @@ For splitting memcmp, strncmp, etc., see
Then there are different ways of instrumenting the target:
-1. An better instrumentation strategy uses LTO and link time instrumentation.
+1. A better instrumentation strategy uses LTO and link time instrumentation.
Note that not all targets can compile in this mode, however, if it works it
is the best option you can use. To go with this option, use
afl-clang-lto/afl-clang-lto++. See [README.lto.md](README.lto.md).
diff --git a/qemu_mode/libcompcov/README.md b/qemu_mode/libcompcov/README.md
index 50f0d802..bb010d8f 100644
--- a/qemu_mode/libcompcov/README.md
+++ b/qemu_mode/libcompcov/README.md
@@ -31,7 +31,7 @@ The AFL_COMPCOV_LEVEL tells to QEMU and libcompcov how to log comaprisons.
Level 1 logs just comparison with immediates / read-only memory and level 2
logs all the comparisons.
-The library make use of https://github.com/ouadev/proc_maps_parser and so it is
+The library makes use of https://github.com/ouadev/proc_maps_parser and so it is
Linux specific. However, this is not a strict dependency, other UNIX operating
systems can be supported by replacing the code related to the /proc/self/maps
parsing.
\ No newline at end of file
diff --git a/utils/optimin/README.md b/utils/optimin/README.md
index 507cb305..340022b8 100644
--- a/utils/optimin/README.md
+++ b/utils/optimin/README.md
@@ -77,7 +77,7 @@ For more details, see the paper
[Seed Selection for Successful Fuzzing](https://dl.acm.org/doi/10.1145/3460319.3464795).
If you use OptiMin in your research, please cite this paper.
-Bibtex:
+BibTeX:
```bibtex
@inproceedings{Herrera:2021:FuzzSeedSelection,
--
cgit 1.4.1
From bcd81c377d22cf26812127881a8ac15ed9c022ad Mon Sep 17 00:00:00 2001
From: llzmb <46303940+llzmb@users.noreply.github.com>
Date: Sat, 4 Dec 2021 20:38:00 +0100
Subject: Fix line length and formatting
---
CONTRIBUTING.md | 11 ++--
README.md | 26 +++++---
TODO.md | 9 ++-
docs/FAQ.md | 82 ++++++++++++++++---------
docs/INSTALL.md | 79 +++++++++++++++---------
docs/afl-fuzz_approach.md | 4 +-
docs/best_practices.md | 114 +++++++++++++++++++++++------------
docs/custom_mutators.md | 80 ++++++++++++------------
docs/env_variables.md | 96 ++++++++++++++---------------
docs/fuzzing_binary-only_targets.md | 6 +-
docs/fuzzing_in_depth.md | 50 ++++++++-------
docs/ideas.md | 55 +++++++++--------
docs/important_changes.md | 29 ++++-----
docs/rpc_statsd.md | 73 ++++++++++++++++------
frida_mode/Scripting.md | 20 +++---
instrumentation/README.gcc_plugin.md | 4 +-
16 files changed, 435 insertions(+), 303 deletions(-)
(limited to 'docs/FAQ.md')
diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md
index 0ab4f8ec..fb13b91a 100644
--- a/CONTRIBUTING.md
+++ b/CONTRIBUTING.md
@@ -15,10 +15,9 @@ project, or added a file in a directory we already format, otherwise run:
./.custom-format.py -i file-that-you-have-created.c
```
-Regarding the coding style, please follow the AFL style.
-No camel case at all and use AFL's macros wherever possible
-(e.g., WARNF, FATAL, MAP_SIZE, ...).
+Regarding the coding style, please follow the AFL style. No camel case at all
+and use AFL's macros wherever possible (e.g., WARNF, FATAL, MAP_SIZE, ...).
-Remember that AFL++ has to build and run on many platforms, so
-generalize your Makefiles/GNUmakefile (or your patches to our pre-existing
-Makefiles) to be as generic as possible.
+Remember that AFL++ has to build and run on many platforms, so generalize your
+Makefiles/GNUmakefile (or your patches to our pre-existing Makefiles) to be as
+generic as possible.
\ No newline at end of file
diff --git a/README.md b/README.md
index 08363149..b70eb1ab 100644
--- a/README.md
+++ b/README.md
@@ -44,8 +44,8 @@ Here is some information to get you started:
## Building and installing AFL++
-To have AFL++ easily available with everything compiled, pull the image
-directly from the Docker Hub:
+To have AFL++ easily available with everything compiled, pull the image directly
+from the Docker Hub:
```shell
docker pull aflplusplus/aflplusplus
@@ -53,8 +53,8 @@ docker run -ti -v /location/of/your/target:/src aflplusplus/aflplusplus
```
This image is automatically generated when a push to the stable repo happens
-(see [branches](#branches)). You will find your target source
-code in `/src` in the container.
+(see [branches](#branches)). You will find your target source code in `/src` in
+the container.
To build AFL++ yourself, continue at [docs/INSTALL.md](docs/INSTALL.md).
@@ -120,8 +120,8 @@ Questions? Concerns? Bug reports?
* The contributors can be reached via
[https://github.com/AFLplusplus/AFLplusplus](https://github.com/AFLplusplus/AFLplusplus).
-* Take a look at our [FAQ](docs/FAQ.md). If you find an interesting or
- important question missing, submit it via
+* Take a look at our [FAQ](docs/FAQ.md). If you find an interesting or important
+ question missing, submit it via
[https://github.com/AFLplusplus/AFLplusplus/discussions](https://github.com/AFLplusplus/AFLplusplus/discussions).
* There is a mailing list for the AFL/AFL++ project
([browse archive](https://groups.google.com/group/afl-users)). To compare
@@ -133,10 +133,16 @@ Questions? Concerns? Bug reports?
The following branches exist:
-* [release](https://github.com/AFLplusplus/AFLplusplus/tree/release): the latest release
-* [stable/trunk](https://github.com/AFLplusplus/AFLplusplus/): stable state of AFL++ - it is synced from dev from time to time when we are satisfied with its stability
-* [dev](https://github.com/AFLplusplus/AFLplusplus/tree/dev): development state of AFL++ - bleeding edge and you might catch a checkout which does not compile or has a bug. *We only accept PRs in dev!!*
-* (any other): experimental branches to work on specific features or testing new functionality or changes.
+* [release](https://github.com/AFLplusplus/AFLplusplus/tree/release): the latest
+ release
+* [stable/trunk](https://github.com/AFLplusplus/AFLplusplus/): stable state of
+ AFL++ - it is synced from dev from time to time when we are satisfied with its
+ stability
+* [dev](https://github.com/AFLplusplus/AFLplusplus/tree/dev): development state
+ of AFL++ - bleeding edge and you might catch a checkout which does not compile
+ or has a bug. *We only accept PRs in dev!!*
+* (any other): experimental branches to work on specific features or testing new
+ functionality or changes.
## Help wanted
diff --git a/TODO.md b/TODO.md
index b8ac22ef..04f3abab 100644
--- a/TODO.md
+++ b/TODO.md
@@ -23,11 +23,10 @@ qemu_mode/frida_mode:
- add AFL_QEMU_EXITPOINT (maybe multiple?), maybe pointless as there is
persistent mode
-
## Ideas
- LTO/sancov: write current edge to prev_loc and use that information when
- using cmplog or __sanitizer_cov_trace_cmp*. maybe we can deduct by follow
- up edge numbers that both following cmp paths have been found and then
- disable working on this edge id -> cmplog_intelligence branch
- - use cmplog colorization taint result for havoc locations?
+ using cmplog or __sanitizer_cov_trace_cmp*. maybe we can deduct by follow up
+ edge numbers that both following cmp paths have been found and then disable
+ working on this edge id -> cmplog_intelligence branch
+ - use cmplog colorization taint result for havoc locations?
\ No newline at end of file
diff --git a/docs/FAQ.md b/docs/FAQ.md
index 671957ef..7869ee61 100644
--- a/docs/FAQ.md
+++ b/docs/FAQ.md
@@ -8,35 +8,45 @@ If you find an interesting or important question missing, submit it via
What is the difference between AFL and AFL++?
- AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.
+ AFL++ is a superior fork to Google's AFL - more speed, more and better
+ mutations, more and better instrumentation, custom module support, etc.
- American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting in 2013/2014, and when he left Google end of 2017 he stopped developing it.
+ American Fuzzy Lop (AFL) was developed by Michał "lcamtuf" Zalewski starting
+ in 2013/2014, and when he left Google end of 2017 he stopped developing it.
At the end of 2019, the Google fuzzing team took over maintenance of AFL,
however, it is only accepting PRs from the community and is not developing
enhancements anymore.
- In the second quarter of 2019, 1 1/2 years later, when no further development of AFL had happened and it became clear there would none be coming, AFL++ was born, where initially community patches were collected and applied for bug fixes and enhancements.
- Then from various AFL spin-offs - mostly academic research - features were integrated.
- This already resulted in a much advanced AFL.
-
- Until the end of 2019, the AFL++ team had grown to four active developers which then implemented their own research and features, making it now by far the most flexible and feature rich guided fuzzer available as open source.
- And in independent fuzzing benchmarks it is one of the best fuzzers available, e.g., [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
+ In the second quarter of 2019, 1 1/2 years later, when no further development
+ of AFL had happened and it became clear there would none be coming, AFL++ was
+ born, where initially community patches were collected and applied for bug
+ fixes and enhancements. Then from various AFL spin-offs - mostly academic
+ research - features were integrated. This already resulted in a much advanced
+ AFL.
+
+ Until the end of 2019, the AFL++ team had grown to four active developers
+ which then implemented their own research and features, making it now by far
+ the most flexible and feature rich guided fuzzer available as open source. And
+ in independent fuzzing benchmarks it is one of the best fuzzers available,
+ e.g., [Fuzzbench
+ Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
Where can I find tutorials?
- We compiled a list of tutorials and exercises, see [tutorials.md](tutorials.md).
+ We compiled a list of tutorials and exercises, see
+ [tutorials.md](tutorials.md).
What is an "edge"?
A program contains `functions`, `functions` contain the compiled machine code.
- The compiled machine code in a `function` can be in a single or many `basic blocks`.
- A `basic block` is the largest possible number of subsequent machine code
- instructions that has exactly one entry point (which can be be entered by
+ The compiled machine code in a `function` can be in a single or many `basic
+ blocks`. A `basic block` is the largest possible number of subsequent machine
+ code instructions that has exactly one entry point (which can be be entered by
multiple other basic blocks) and runs linearly without branching or jumping to
other addresses (except at the end).
@@ -60,7 +70,8 @@ If you find an interesting or important question missing, submit it via
Every code block between two jump locations is a `basic block`.
- An `edge` is then the unique relationship between two directly connected `basic blocks` (from the code example above):
+ An `edge` is then the unique relationship between two directly connected
+ `basic blocks` (from the code example above):
```
Block A
@@ -75,8 +86,8 @@ If you find an interesting or important question missing, submit it via
Block E
```
- Every line between two blocks is an `edge`.
- Note that a few basic block loop to itself, this too would be an edge.
+ Every line between two blocks is an `edge`. Note that a few basic block loop
+ to itself, this too would be an edge.
## Targets
@@ -86,7 +97,8 @@ If you find an interesting or important question missing, submit it via
AFL++ is a great fuzzer if you have the source code available.
- However, if there is only the binary program and no source code available, then the standard non-instrumented mode is not effective.
+ However, if there is only the binary program and no source code available,
+ then the standard non-instrumented mode is not effective.
To learn how these binaries can be fuzzed, read
[fuzzing_binary-only_targets.md](fuzzing_binary-only_targets.md).
@@ -97,15 +109,19 @@ If you find an interesting or important question missing, submit it via
The short answer is - you cannot, at least not "out of the box".
- For more information on fuzzing network services, see [best_practices.md#fuzzing-a-network-service](best_practices.md#fuzzing-a-network-service).
+ For more information on fuzzing network services, see
+ [best_practices.md#fuzzing-a-network-service](best_practices.md#fuzzing-a-network-service).
How can I fuzz a GUI program?
- Not all GUI programs are suitable for fuzzing. If the GUI program can read the fuzz data from a file without needing any user interaction, then it would be suitable for fuzzing.
+ Not all GUI programs are suitable for fuzzing. If the GUI program can read the
+ fuzz data from a file without needing any user interaction, then it would be
+ suitable for fuzzing.
- For more information on fuzzing GUI programs, see [best_practices.md#fuzzing-a-gui-program](best_practices.md#fuzzing-a-gui-program).
+ For more information on fuzzing GUI programs, see
+ [best_practices.md#fuzzing-a-gui-program](best_practices.md#fuzzing-a-gui-program).
## Performance
@@ -113,27 +129,33 @@ If you find an interesting or important question missing, submit it via
How can I improve the fuzzing speed?
- There are a few things you can do to improve the fuzzing speed, see [best_practices.md#improving-speed](best_practices.md#improving-speed).
+ There are a few things you can do to improve the fuzzing speed, see
+ [best_practices.md#improving-speed](best_practices.md#improving-speed).
Why is my stability below 100%?
- Stability is measured by how many percent of the edges in the target are "stable".
- Sending the same input again and again should take the exact same path through the target every time.
- If that is the case, the stability is 100%.
+ Stability is measured by how many percent of the edges in the target are
+ "stable". Sending the same input again and again should take the exact same
+ path through the target every time. If that is the case, the stability is
+ 100%.
If, however, randomness happens, e.g., a thread reading other external data,
reaction to timing, etc., then in some of the re-executions with the same data
the edge coverage result will be different across runs. Those edges that
change are then flagged "unstable".
- The more "unstable" edges, the more difficult for AFL++ to identify valid new paths.
+ The more "unstable" edges, the more difficult for AFL++ to identify valid new
+ paths.
- A value above 90% is usually fine and a value above 80% is also still ok, and even a value above 20% can still result in successful finds of bugs.
- However, it is recommended that for values below 90% or 80% you should take countermeasures to improve stability.
+ A value above 90% is usually fine and a value above 80% is also still ok, and
+ even a value above 20% can still result in successful finds of bugs. However,
+ it is recommended that for values below 90% or 80% you should take
+ countermeasures to improve stability.
- For more information on stability and how to improve the stability value, see [best_practices.md#improving-stability](best_practices.md#improving-stability).
+ For more information on stability and how to improve the stability value, see
+ [best_practices.md#improving-stability](best_practices.md#improving-stability).
## Troubleshooting
@@ -141,7 +163,8 @@ If you find an interesting or important question missing, submit it via
I got a weird compile error from clang.
- If you see this kind of error when trying to instrument a target with afl-cc/afl-clang-fast/afl-clang-lto:
+ If you see this kind of error when trying to instrument a target with
+ afl-cc/afl-clang-fast/afl-clang-lto:
```
/prg/tmp/llvm-project/build/bin/clang-13: symbol lookup error: /usr/local/bin/../lib/afl//cmplog-instructions-pass.so: undefined symbol: _ZNK4llvm8TypeSizecvmEv
@@ -155,7 +178,8 @@ If you find an interesting or important question missing, submit it via
********************
```
- Then this means that your OS updated the clang installation from an upgrade package and because of that the AFL++ llvm plugins do not match anymore.
+ Then this means that your OS updated the clang installation from an upgrade
+ package and because of that the AFL++ llvm plugins do not match anymore.
Solution: `git pull ; make clean install` of AFL++.
\ No newline at end of file
diff --git a/docs/INSTALL.md b/docs/INSTALL.md
index c1e22e36..08d3283e 100644
--- a/docs/INSTALL.md
+++ b/docs/INSTALL.md
@@ -3,7 +3,8 @@
## Linux on x86
An easy way to install AFL++ with everything compiled is available via docker:
-You can use the [Dockerfile](../Dockerfile) (which has gcc-10 and clang-11 - hence afl-clang-lto is available!) or just pull directly from the Docker Hub:
+You can use the [Dockerfile](../Dockerfile) (which has gcc-10 and clang-11 -
+hence afl-clang-lto is available!) or just pull directly from the Docker Hub:
```shell
docker pull aflplusplus/aflplusplus
@@ -13,8 +14,8 @@ docker run -ti -v /location/of/your/target:/src aflplusplus/aflplusplus
This image is automatically generated when a push to the stable repo happens.
You will find your target source code in /src in the container.
-If you want to build AFL++ yourself, you have many options.
-The easiest choice is to build and install everything:
+If you want to build AFL++ yourself, you have many options. The easiest choice
+is to build and install everything:
```shell
sudo apt-get update
@@ -29,10 +30,13 @@ make distrib
sudo make install
```
-It is recommended to install the newest available gcc, clang and llvm-dev possible in your distribution!
+It is recommended to install the newest available gcc, clang and llvm-dev
+possible in your distribution!
-Note that "make distrib" also builds instrumentation, qemu_mode, unicorn_mode and more.
-If you just want plain AFL++, then do "make all". However, compiling and using at least instrumentation is highly recommended for much better results - hence in this case choose:
+Note that "make distrib" also builds instrumentation, qemu_mode, unicorn_mode
+and more. If you just want plain AFL++, then do "make all". However, compiling
+and using at least instrumentation is highly recommended for much better results
+- hence in this case choose:
```shell
make source-only
@@ -41,19 +45,25 @@ make source-only
These build targets exist:
* all: just the main AFL++ binaries
-* binary-only: everything for binary-only fuzzing: qemu_mode, unicorn_mode, libdislocator, libtokencap
-* source-only: everything for source code fuzzing: instrumentation, libdislocator, libtokencap
+* binary-only: everything for binary-only fuzzing: qemu_mode, unicorn_mode,
+ libdislocator, libtokencap
+* source-only: everything for source code fuzzing: instrumentation,
+ libdislocator, libtokencap
* distrib: everything (for both binary-only and source code fuzzing)
* man: creates simple man pages from the help option of the programs
* install: installs everything you have compiled with the build options above
* clean: cleans everything compiled, not downloads (unless not on a checkout)
* deepclean: cleans everything including downloads
* code-format: format the code, do this before you commit and send a PR please!
-* tests: runs test cases to ensure that all features are still working as they should
+* tests: runs test cases to ensure that all features are still working as they
+ should
* unit: perform unit tests (based on cmocka)
* help: shows these build options
-[Unless you are on Mac OS X](https://developer.apple.com/library/archive/qa/qa1118/_index.html), you can also build statically linked versions of the AFL++ binaries by passing the `STATIC=1` argument to make:
+[Unless you are on Mac OS
+X](https://developer.apple.com/library/archive/qa/qa1118/_index.html), you can
+also build statically linked versions of the AFL++ binaries by passing the
+`STATIC=1` argument to make:
```shell
make STATIC=1
@@ -67,7 +77,8 @@ These build options exist:
* PROFILING - compile with profiling information (gprof)
* INTROSPECTION - compile afl-fuzz with mutation introspection
* NO_PYTHON - disable python support
-* NO_SPLICING - disables splicing mutation in afl-fuzz, not recommended for normal fuzzing
+* NO_SPLICING - disables splicing mutation in afl-fuzz, not recommended for
+ normal fuzzing
* AFL_NO_X86 - if compiling on non-intel/amd platforms
* LLVM_CONFIG - if your distro doesn't use the standard name for llvm-config
(e.g., Debian)
@@ -76,15 +87,17 @@ e.g.: `make ASAN_BUILD=1`
## MacOS X on x86 and arm64 (M1)
-MacOS X should work, but there are some gotchas due to the idiosyncrasies of the platform.
-On top of this, we have limited release testing capabilities and depend mostly on user feedback.
+MacOS X should work, but there are some gotchas due to the idiosyncrasies of the
+platform. On top of this, we have limited release testing capabilities and
+depend mostly on user feedback.
-To build AFL, install llvm (and perhaps gcc) from brew and follow the general instructions for Linux.
-If possible, avoid Xcode at all cost.
+To build AFL, install llvm (and perhaps gcc) from brew and follow the general
+instructions for Linux. If possible, avoid Xcode at all cost.
`brew install wget git make cmake llvm gdb`
-Be sure to setup `PATH` to point to the correct clang binaries and use the freshly installed clang, clang++ and gmake, e.g.:
+Be sure to setup `PATH` to point to the correct clang binaries and use the
+freshly installed clang, clang++ and gmake, e.g.:
```
export PATH="/usr/local/Cellar/llvm/12.0.1/bin/:$PATH"
@@ -97,20 +110,20 @@ cd ..
gmake install
```
-`afl-gcc` will fail unless you have GCC installed, but that is using outdated instrumentation anyway.
-You don't want that.
-Note that `afl-clang-lto`, `afl-gcc-fast` and `qemu_mode` are not working on MacOS.
+`afl-gcc` will fail unless you have GCC installed, but that is using outdated
+instrumentation anyway. You don't want that. Note that `afl-clang-lto`,
+`afl-gcc-fast` and `qemu_mode` are not working on MacOS.
-The crash reporting daemon that comes by default with MacOS X will cause problems with fuzzing.
-You need to turn it off:
+The crash reporting daemon that comes by default with MacOS X will cause
+problems with fuzzing. You need to turn it off:
```
launchctl unload -w /System/Library/LaunchAgents/com.apple.ReportCrash.plist
sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.ReportCrash.Root.plist
```
-The `fork()` semantics on OS X are a bit unusual compared to other unix systems and definitely don't look POSIX-compliant.
-This means two things:
+The `fork()` semantics on OS X are a bit unusual compared to other unix systems
+and definitely don't look POSIX-compliant. This means two things:
- Fuzzing will be probably slower than on Linux. In fact, some folks report
considerable performance gains by running the jobs inside a Linux VM on
@@ -119,11 +132,13 @@ This means two things:
forkserver. If you run into any problems, set `AFL_NO_FORKSRV=1` in the
environment before starting afl-fuzz.
-User emulation mode of QEMU does not appear to be supported on MacOS X, so black-box instrumentation mode (`-Q`) will not work.
-However, Frida mode (`-O`) should work on x86 and arm64 MacOS boxes.
+User emulation mode of QEMU does not appear to be supported on MacOS X, so
+black-box instrumentation mode (`-Q`) will not work. However, Frida mode (`-O`)
+should work on x86 and arm64 MacOS boxes.
-MacOS X supports SYSV shared memory used by AFL's instrumentation, but the default settings aren't usable with AFL++.
-The default settings on 10.14 seem to be:
+MacOS X supports SYSV shared memory used by AFL's instrumentation, but the
+default settings aren't usable with AFL++. The default settings on 10.14 seem to
+be:
```bash
$ ipcs -M
@@ -136,14 +151,16 @@ shminfo:
shmall: 1024 (max amount of shared memory in pages)
```
-To temporarily change your settings to something minimally usable with AFL++, run these commands as root:
+To temporarily change your settings to something minimally usable with AFL++,
+run these commands as root:
```bash
sysctl kern.sysv.shmmax=8388608
sysctl kern.sysv.shmall=4096
```
-If you're running more than one instance of AFL, you likely want to make `shmall` bigger and increase `shmseg` as well:
+If you're running more than one instance of AFL, you likely want to make
+`shmall` bigger and increase `shmseg` as well:
```bash
sysctl kern.sysv.shmmax=8388608
@@ -151,4 +168,6 @@ sysctl kern.sysv.shmseg=48
sysctl kern.sysv.shmall=98304
```
-See [https://www.spy-hill.com/help/apple/SharedMemory.html](https://www.spy-hill.com/help/apple/SharedMemory.html) for documentation for these settings and how to make them permanent.
\ No newline at end of file
+See
+[https://www.spy-hill.com/help/apple/SharedMemory.html](https://www.spy-hill.com/help/apple/SharedMemory.html)
+for documentation for these settings and how to make them permanent.
\ No newline at end of file
diff --git a/docs/afl-fuzz_approach.md b/docs/afl-fuzz_approach.md
index fefde029..3804f5a0 100644
--- a/docs/afl-fuzz_approach.md
+++ b/docs/afl-fuzz_approach.md
@@ -445,8 +445,8 @@ involve any state transitions not seen in previously-recorded faults. If a
single bug can be reached in multiple ways, there will be some count inflation
early in the process, but this should quickly taper off.
-The file names for crashes and hangs are correlated with the parent, non-faulting
-queue entries. This should help with debugging.
+The file names for crashes and hangs are correlated with the parent,
+non-faulting queue entries. This should help with debugging.
## Visualizing
diff --git a/docs/best_practices.md b/docs/best_practices.md
index 6a406bde..e6b252f6 100644
--- a/docs/best_practices.md
+++ b/docs/best_practices.md
@@ -18,7 +18,8 @@
### Fuzzing a target with source code available
-To learn how to fuzz a target if source code is available, see [fuzzing_in_depth.md](fuzzing_in_depth.md).
+To learn how to fuzz a target if source code is available, see
+[fuzzing_in_depth.md](fuzzing_in_depth.md).
### Fuzzing a binary-only target
@@ -27,11 +28,16 @@ For a comprehensive guide, see
### Fuzzing a GUI program
-If the GUI program can read the fuzz data from a file (via the command line, a fixed location or via an environment variable) without needing any user interaction, then it would be suitable for fuzzing.
+If the GUI program can read the fuzz data from a file (via the command line, a
+fixed location or via an environment variable) without needing any user
+interaction, then it would be suitable for fuzzing.
-Otherwise, it is not possible without modifying the source code - which is a very good idea anyway as the GUI functionality is a huge CPU/time overhead for the fuzzing.
+Otherwise, it is not possible without modifying the source code - which is a
+very good idea anyway as the GUI functionality is a huge CPU/time overhead for
+the fuzzing.
-So create a new `main()` that just reads the test case and calls the functionality for processing the input that the GUI program is using.
+So create a new `main()` that just reads the test case and calls the
+functionality for processing the input that the GUI program is using.
### Fuzzing a network service
@@ -40,13 +46,16 @@ Fuzzing a network service does not work "out of the box".
Using a network channel is inadequate for several reasons:
- it has a slow-down of x10-20 on the fuzzing speed
- it does not scale to fuzzing multiple instances easily,
-- instead of one initial data packet often a back-and-forth interplay of packets is needed for stateful protocols (which is totally unsupported by most coverage aware fuzzers).
+- instead of one initial data packet often a back-and-forth interplay of packets
+ is needed for stateful protocols (which is totally unsupported by most
+ coverage aware fuzzers).
-The established method to fuzz network services is to modify the source code
-to read from a file or stdin (fd 0) (or even faster via shared memory, combine
-this with persistent mode [instrumentation/README.persistent_mode.md](../instrumentation/README.persistent_mode.md)
-and you have a performance gain of x10 instead of a performance loss of over
-x10 - that is a x100 difference!).
+The established method to fuzz network services is to modify the source code to
+read from a file or stdin (fd 0) (or even faster via shared memory, combine this
+with persistent mode
+[instrumentation/README.persistent_mode.md](../instrumentation/README.persistent_mode.md)
+and you have a performance gain of x10 instead of a performance loss of over x10
+- that is a x100 difference!).
If modifying the source is not an option (e.g., because you only have a binary
and perform binary fuzzing) you can also use a shared library with AFL_PRELOAD
@@ -64,13 +73,25 @@ allows you to define network state with different type of data packets.
### Improving speed
-1. Use [llvm_mode](../instrumentation/README.llvm.md): afl-clang-lto (llvm >= 11) or afl-clang-fast (llvm >= 9 recommended).
-2. Use [persistent mode](../instrumentation/README.persistent_mode.md) (x2-x20 speed increase).
-3. Instrument just what you are interested in, see [instrumentation/README.instrument_list.md](../instrumentation/README.instrument_list.md).
-4. If you do not use shmem persistent mode, use `AFL_TMPDIR` to put the input file directory on a tempfs location, see [env_variables.md](env_variables.md).
-5. Improve Linux kernel performance: modify `/etc/default/grub`, set `GRUB_CMDLINE_LINUX_DEFAULT="ibpb=off ibrs=off kpti=off l1tf=off mds=off mitigations=off no_stf_barrier noibpb noibrs nopcid nopti nospec_store_bypass_disable nospectre_v1 nospectre_v2 pcid=off pti=off spec_store_bypass_disable=off spectre_v2=off stf_barrier=off"`; then `update-grub` and `reboot` (warning: makes the system less secure).
-6. Running on an `ext2` filesystem with `noatime` mount option will be a bit faster than on any other journaling filesystem.
-7. Use your cores ([fuzzing_in_depth.md:3c) Using multiple cores](fuzzing_in_depth.md#c-using-multiple-cores))!
+1. Use [llvm_mode](../instrumentation/README.llvm.md): afl-clang-lto (llvm >=
+ 11) or afl-clang-fast (llvm >= 9 recommended).
+2. Use [persistent mode](../instrumentation/README.persistent_mode.md) (x2-x20
+ speed increase).
+3. Instrument just what you are interested in, see
+ [instrumentation/README.instrument_list.md](../instrumentation/README.instrument_list.md).
+4. If you do not use shmem persistent mode, use `AFL_TMPDIR` to put the input
+ file directory on a tempfs location, see
+ [env_variables.md](env_variables.md).
+5. Improve Linux kernel performance: modify `/etc/default/grub`, set
+ `GRUB_CMDLINE_LINUX_DEFAULT="ibpb=off ibrs=off kpti=off l1tf=off mds=off
+ mitigations=off no_stf_barrier noibpb noibrs nopcid nopti
+ nospec_store_bypass_disable nospectre_v1 nospectre_v2 pcid=off pti=off
+ spec_store_bypass_disable=off spectre_v2=off stf_barrier=off"`; then
+ `update-grub` and `reboot` (warning: makes the system less secure).
+6. Running on an `ext2` filesystem with `noatime` mount option will be a bit
+ faster than on any other journaling filesystem.
+7. Use your cores
+ ([fuzzing_in_depth.md:3c) Using multiple cores](fuzzing_in_depth.md#c-using-multiple-cores))!
### Improving stability
@@ -78,46 +99,60 @@ For fuzzing a 100% stable target that covers all edges is the best case. A 90%
stable target that covers all edges is, however, better than a 100% stable
target that ignores 10% of the edges.
-With instability, you basically have a partial coverage loss on an edge, with ignored functions you have a full loss on that edges.
+With instability, you basically have a partial coverage loss on an edge, with
+ignored functions you have a full loss on that edges.
There are functions that are unstable, but also provide value to coverage, e.g.,
init functions that use fuzz data as input. If, however, a function that has
nothing to do with the input data is the source of instability, e.g., checking
jitter, or is a hash map function etc., then it should not be instrumented.
-To be able to exclude these functions (based on AFL++'s measured stability), the following process will allow to identify functions with variable edges.
+To be able to exclude these functions (based on AFL++'s measured stability), the
+following process will allow to identify functions with variable edges.
-Four steps are required to do this and it also requires quite some knowledge of coding and/or disassembly and is effectively possible only with `afl-clang-fast` `PCGUARD` and `afl-clang-lto` `LTO` instrumentation.
+Four steps are required to do this and it also requires quite some knowledge of
+coding and/or disassembly and is effectively possible only with `afl-clang-fast`
+`PCGUARD` and `afl-clang-lto` `LTO` instrumentation.
1. Instrument to be able to find the responsible function(s):
- a) For LTO instrumented binaries, this can be documented during compile time, just set `export AFL_LLVM_DOCUMENT_IDS=/path/to/a/file`.
- This file will have one assigned edge ID and the corresponding function per line.
-
- b) For PCGUARD instrumented binaries, it is much more difficult. Here you can either modify the `__sanitizer_cov_trace_pc_guard` function in `instrumentation/afl-llvm-rt.o.c` to write a backtrace to a file if the ID in `__afl_area_ptr[*guard]` is one of the unstable edge IDs.
- (Example code is already there).
- Then recompile and reinstall `llvm_mode` and rebuild your target.
- Run the recompiled target with `afl-fuzz` for a while and then check the file that you wrote with the backtrace information.
- Alternatively, you can use `gdb` to hook `__sanitizer_cov_trace_pc_guard_init` on start, check to which memory address the edge ID value is written, and set a write breakpoint to that address (`watch 0x.....`).
-
- c) In other instrumentation types, this is not possible.
- So just recompile with the two mentioned above.
- This is just for identifying the functions that have unstable edges.
+ a) For LTO instrumented binaries, this can be documented during compile
+ time, just set `export AFL_LLVM_DOCUMENT_IDS=/path/to/a/file`. This file
+ will have one assigned edge ID and the corresponding function per line.
+
+ b) For PCGUARD instrumented binaries, it is much more difficult. Here you
+ can either modify the `__sanitizer_cov_trace_pc_guard` function in
+ `instrumentation/afl-llvm-rt.o.c` to write a backtrace to a file if the
+ ID in `__afl_area_ptr[*guard]` is one of the unstable edge IDs. (Example
+ code is already there). Then recompile and reinstall `llvm_mode` and
+ rebuild your target. Run the recompiled target with `afl-fuzz` for a
+ while and then check the file that you wrote with the backtrace
+ information. Alternatively, you can use `gdb` to hook
+ `__sanitizer_cov_trace_pc_guard_init` on start, check to which memory
+ address the edge ID value is written, and set a write breakpoint to that
+ address (`watch 0x.....`).
+
+ c) In other instrumentation types, this is not possible. So just recompile
+ with the two mentioned above. This is just for identifying the functions
+ that have unstable edges.
2. Identify which edge ID numbers are unstable.
Run the target with `export AFL_DEBUG=1` for a few minutes then terminate.
The out/fuzzer_stats file will then show the edge IDs that were identified
- as unstable in the `var_bytes` entry. You can match these numbers
- directly to the data you created in the first step.
- Now you know which functions are responsible for the instability
+ as unstable in the `var_bytes` entry. You can match these numbers directly
+ to the data you created in the first step. Now you know which functions are
+ responsible for the instability
3. Create a text file with the filenames/functions
- Identify which source code files contain the functions that you need to remove from instrumentation, or just specify the functions you want to skip for instrumentation.
- Note that optimization might inline functions!
+ Identify which source code files contain the functions that you need to
+ remove from instrumentation, or just specify the functions you want to skip
+ for instrumentation. Note that optimization might inline functions!
+
+ Follow this document on how to do this:
+ [instrumentation/README.instrument_list.md](../instrumentation/README.instrument_list.md).
- Follow this document on how to do this: [instrumentation/README.instrument_list.md](../instrumentation/README.instrument_list.md).
If `PCGUARD` is used, then you need to follow this guide (needs llvm 12+!):
[https://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation](https://clang.llvm.org/docs/SanitizerCoverage.html#partially-disabling-instrumentation)
@@ -132,4 +167,5 @@ Four steps are required to do this and it also requires quite some knowledge of
Recompile, fuzz it, be happy :)
- This link explains this process for [Fuzzbench](https://github.com/google/fuzzbench/issues/677).
+ This link explains this process for
+ [Fuzzbench](https://github.com/google/fuzzbench/issues/677).
\ No newline at end of file
diff --git a/docs/custom_mutators.md b/docs/custom_mutators.md
index 6bee5413..2a77db82 100644
--- a/docs/custom_mutators.md
+++ b/docs/custom_mutators.md
@@ -4,13 +4,13 @@ This file describes how you can implement custom mutations to be used in AFL.
For now, we support C/C++ library and Python module, collectivelly named as the
custom mutator.
-There is also experimental support for Rust in `custom_mutators/rust`.
-For documentation, refer to that directory.
-Run ```cargo doc -p custom_mutator --open``` in that directory to view the
-documentation in your web browser.
+There is also experimental support for Rust in `custom_mutators/rust`. For
+documentation, refer to that directory. Run `cargo doc -p custom_mutator --open`
+in that directory to view the documentation in your web browser.
Implemented by
-- C/C++ library (`*.so`): Khaled Yakdan from Code Intelligence ()
+- C/C++ library (`*.so`): Khaled Yakdan from Code Intelligence
+ ()
- Python module: Christian Holler from Mozilla ()
## 1) Introduction
@@ -29,7 +29,8 @@ export AFL_CUSTOM_MUTATOR_LIBRARY="full/path/to/mutator_first.so;full/path/to/mu
For details, see [APIs](#2-apis) and [Usage](#3-usage).
-The custom mutation stage is set to be the first non-deterministic stage (right before the havoc stage).
+The custom mutation stage is set to be the first non-deterministic stage (right
+before the havoc stage).
Note: If `AFL_CUSTOM_MUTATOR_ONLY` is set, all mutations will solely be
performed with the custom mutator.
@@ -103,7 +104,8 @@ def deinit(): # optional for Python
- `init`:
- This method is called when AFL++ starts up and is used to seed RNG and set up buffers and state.
+ This method is called when AFL++ starts up and is used to seed RNG and set
+ up buffers and state.
- `queue_get` (optional):
@@ -121,18 +123,17 @@ def deinit(): # optional for Python
- `fuzz` (optional):
This method performs custom mutations on a given input. It also accepts an
- additional test case.
- Note that this function is optional - but it makes sense to use it.
- You would only skip this if `post_process` is used to fix checksums etc.
- so if you are using it, e.g., as a post processing library.
+ additional test case. Note that this function is optional - but it makes
+ sense to use it. You would only skip this if `post_process` is used to fix
+ checksums etc. so if you are using it, e.g., as a post processing library.
Note that a length > 0 *must* be returned!
- `describe` (optional):
When this function is called, it shall describe the current test case,
- generated by the last mutation. This will be called, for example,
- to name the written test case file after a crash occurred.
- Using it can help to reproduce crashing mutations.
+ generated by the last mutation. This will be called, for example, to name
+ the written test case file after a crash occurred. Using it can help to
+ reproduce crashing mutations.
- `havoc_mutation` and `havoc_mutation_probability` (optional):
@@ -144,21 +145,21 @@ def deinit(): # optional for Python
- `post_process` (optional):
For some cases, the format of the mutated data returned from the custom
- mutator is not suitable to directly execute the target with this input.
- For example, when using libprotobuf-mutator, the data returned is in a
- protobuf format which corresponds to a given grammar. In order to execute
- the target, the protobuf data must be converted to the plain-text format
- expected by the target. In such scenarios, the user can define the
- `post_process` function. This function is then transforming the data into the
- format expected by the API before executing the target.
+ mutator is not suitable to directly execute the target with this input. For
+ example, when using libprotobuf-mutator, the data returned is in a protobuf
+ format which corresponds to a given grammar. In order to execute the target,
+ the protobuf data must be converted to the plain-text format expected by the
+ target. In such scenarios, the user can define the `post_process` function.
+ This function is then transforming the data into the format expected by the
+ API before executing the target.
This can return any python object that implements the buffer protocol and
supports PyBUF_SIMPLE. These include bytes, bytearray, etc.
- `queue_new_entry` (optional):
- This methods is called after adding a new test case to the queue.
- If the contents of the file was changed return True, False otherwise.
+ This methods is called after adding a new test case to the queue. If the
+ contents of the file was changed, return True, False otherwise.
- `introspection` (optional):
@@ -170,8 +171,8 @@ def deinit(): # optional for Python
The last method to be called, deinitializing the state.
-Note that there are also three functions for trimming as described in the
-next section.
+Note that there are also three functions for trimming as described in the next
+section.
### Trimming Support
@@ -179,8 +180,8 @@ The generic trimming routines implemented in AFL++ can easily destroy the
structure of complex formats, possibly leading to a point where you have a lot
of test cases in the queue that your Python module cannot process anymore but
your target application still accepts. This is especially the case when your
-target can process a part of the input (causing coverage) and then errors out
-on the remaining input.
+target can process a part of the input (causing coverage) and then errors out on
+the remaining input.
In such cases, it makes sense to implement a custom trimming routine. The API
consists of multiple methods because after each trimming step, we have to go
@@ -213,10 +214,10 @@ trimmed input. Here's a quick API description:
- `post_trim` (optional)
This method is called after each trim operation to inform you if your
- trimming step was successful or not (in terms of coverage). If you receive
- a failure here, you should reset your input to the last known good state.
- In any case, this method must return the next trim iteration index (from 0
- to the maximum amount of steps you returned in `init_trim`).
+ trimming step was successful or not (in terms of coverage). If you receive a
+ failure here, you should reset your input to the last known good state. In
+ any case, this method must return the next trim iteration index (from 0 to
+ the maximum amount of steps you returned in `init_trim`).
Omitting any of three trimming methods will cause the trimming to be disabled
and trigger a fallback to the built-in default trimming routine.
@@ -227,10 +228,10 @@ Optionally, the following environment variables are supported:
- `AFL_CUSTOM_MUTATOR_ONLY`
- Disable all other mutation stages. This can prevent broken test cases
- (those that your Python module can't work with anymore) to fill up your
- queue. Best combined with a custom trimming routine (see below) because
- trimming can cause the same test breakage like havoc and splice.
+ Disable all other mutation stages. This can prevent broken test cases (those
+ that your Python module can't work with anymore) to fill up your queue. Best
+ combined with a custom trimming routine (see below) because trimming can
+ cause the same test breakage like havoc and splice.
- `AFL_PYTHON_ONLY`
@@ -270,9 +271,10 @@ For C/C++ mutators, the source code must be compiled as a shared object:
```bash
gcc -shared -Wall -O3 example.c -o example.so
```
-Note that if you specify multiple custom mutators, the corresponding functions will
-be called in the order in which they are specified. e.g first `post_process` function of
-`example_first.so` will be called and then that of `example_second.so`.
+Note that if you specify multiple custom mutators, the corresponding functions
+will be called in the order in which they are specified. e.g first
+`post_process` function of `example_first.so` will be called and then that of
+`example_second.so`.
### Run
@@ -300,4 +302,4 @@ See [example.c](../custom_mutators/examples/example.c) and
- [bruce30262/libprotobuf-mutator_fuzzing_learning](https://github.com/bruce30262/libprotobuf-mutator_fuzzing_learning/tree/master/4_libprotobuf_aflpp_custom_mutator)
- [thebabush/afl-libprotobuf-mutator](https://github.com/thebabush/afl-libprotobuf-mutator)
- [XML Fuzzing@NullCon 2017](https://www.agarri.fr/docs/XML_Fuzzing-NullCon2017-PUBLIC.pdf)
- - [A bug detected by AFL + XML-aware mutators](https://bugs.chromium.org/p/chromium/issues/detail?id=930663)
+ - [A bug detected by AFL + XML-aware mutators](https://bugs.chromium.org/p/chromium/issues/detail?id=930663)
\ No newline at end of file
diff --git a/docs/env_variables.md b/docs/env_variables.md
index 771bf157..3f7bdadb 100644
--- a/docs/env_variables.md
+++ b/docs/env_variables.md
@@ -590,79 +590,81 @@ the preferred way to configure FRIDA mode is through its
* `AFL_FRIDA_DEBUG_MAPS` - See `AFL_QEMU_DEBUG_MAPS`
* `AFL_FRIDA_DRIVER_NO_HOOK` - See `AFL_QEMU_DRIVER_NO_HOOK`. When using the
-QEMU driver to provide a `main` loop for a user provided
-`LLVMFuzzerTestOneInput`, this option configures the driver to read input from
-`stdin` rather than using in-memory test cases.
+ QEMU driver to provide a `main` loop for a user provided
+ `LLVMFuzzerTestOneInput`, this option configures the driver to read input from
+ `stdin` rather than using in-memory test cases.
* `AFL_FRIDA_EXCLUDE_RANGES` - See `AFL_QEMU_EXCLUDE_RANGES`
* `AFL_FRIDA_INST_COVERAGE_FILE` - File to write DynamoRio format coverage
-information (e.g., to be loaded within IDA lighthouse).
+ information (e.g., to be loaded within IDA lighthouse).
* `AFL_FRIDA_INST_DEBUG_FILE` - File to write raw assembly of original blocks
-and their instrumented counterparts during block compilation.
+ and their instrumented counterparts during block compilation.
* `AFL_FRIDA_INST_JIT` - Enable the instrumentation of Just-In-Time compiled
-code. Code is considered to be JIT if the executable segment is not backed by a
-file.
+ code. Code is considered to be JIT if the executable segment is not backed by
+ a file.
* `AFL_FRIDA_INST_NO_OPTIMIZE` - Don't use optimized inline assembly coverage
-instrumentation (the default where available). Required to use
-`AFL_FRIDA_INST_TRACE`.
+ instrumentation (the default where available). Required to use
+ `AFL_FRIDA_INST_TRACE`.
* `AFL_FRIDA_INST_NO_BACKPATCH` - Disable backpatching. At the end of executing
-each block, control will return to FRIDA to identify the next block to execute.
+ each block, control will return to FRIDA to identify the next block to
+ execute.
* `AFL_FRIDA_INST_NO_PREFETCH` - Disable prefetching. By default the child will
-report instrumented blocks back to the parent so that it can also instrument
-them and they be inherited by the next child on fork, implies
-`AFL_FRIDA_INST_NO_PREFETCH_BACKPATCH`.
+ report instrumented blocks back to the parent so that it can also instrument
+ them and they be inherited by the next child on fork, implies
+ `AFL_FRIDA_INST_NO_PREFETCH_BACKPATCH`.
* `AFL_FRIDA_INST_NO_PREFETCH_BACKPATCH` - Disable prefetching of stalker
-backpatching information. By default the child will report applied backpatches
-to the parent so that they can be applied and then be inherited by the next
-child on fork.
+ backpatching information. By default the child will report applied backpatches
+ to the parent so that they can be applied and then be inherited by the next
+ child on fork.
* `AFL_FRIDA_INST_RANGES` - See `AFL_QEMU_INST_RANGES`
* `AFL_FRIDA_INST_SEED` - Sets the initial seed for the hash function used to
-generate block (and hence edge) IDs. Setting this to a constant value may be
-useful for debugging purposes, e.g., investigating unstable edges.
-* `AFL_FRIDA_INST_TRACE` - Log to stdout the address of executed blocks,
-implies `AFL_FRIDA_INST_NO_OPTIMIZE`.
+ generate block (and hence edge) IDs. Setting this to a constant value may be
+ useful for debugging purposes, e.g., investigating unstable edges.
+* `AFL_FRIDA_INST_TRACE` - Log to stdout the address of executed blocks, implies
+ `AFL_FRIDA_INST_NO_OPTIMIZE`.
* `AFL_FRIDA_INST_TRACE_UNIQUE` - As per `AFL_FRIDA_INST_TRACE`, but each edge
-is logged only once, requires `AFL_FRIDA_INST_NO_OPTIMIZE`.
+ is logged only once, requires `AFL_FRIDA_INST_NO_OPTIMIZE`.
* `AFL_FRIDA_INST_UNSTABLE_COVERAGE_FILE` - File to write DynamoRio format
-coverage information for unstable edges (e.g., to be loaded within IDA
-lighthouse).
+ coverage information for unstable edges (e.g., to be loaded within IDA
+ lighthouse).
* `AFL_FRIDA_JS_SCRIPT` - Set the script to be loaded by the FRIDA scripting
-engine. See [here](Scripting.md) for details.
+ engine. See [here](Scripting.md) for details.
* `AFL_FRIDA_OUTPUT_STDOUT` - Redirect the standard output of the target
-application to the named file (supersedes the setting of `AFL_DEBUG_CHILD`)
+ application to the named file (supersedes the setting of `AFL_DEBUG_CHILD`)
* `AFL_FRIDA_OUTPUT_STDERR` - Redirect the standard error of the target
-application to the named file (supersedes the setting of `AFL_DEBUG_CHILD`)
+ application to the named file (supersedes the setting of `AFL_DEBUG_CHILD`)
* `AFL_FRIDA_PERSISTENT_ADDR` - See `AFL_QEMU_PERSISTENT_ADDR`
* `AFL_FRIDA_PERSISTENT_CNT` - See `AFL_QEMU_PERSISTENT_CNT`
* `AFL_FRIDA_PERSISTENT_DEBUG` - Insert a Breakpoint into the instrumented code
-at `AFL_FRIDA_PERSISTENT_HOOK` and `AFL_FRIDA_PERSISTENT_RET` to allow the user
-to detect issues in the persistent loop using a debugger.
+ at `AFL_FRIDA_PERSISTENT_HOOK` and `AFL_FRIDA_PERSISTENT_RET` to allow the
+ user to detect issues in the persistent loop using a debugger.
* `AFL_FRIDA_PERSISTENT_HOOK` - See `AFL_QEMU_PERSISTENT_HOOK`
* `AFL_FRIDA_PERSISTENT_RET` - See `AFL_QEMU_PERSISTENT_RET`
* `AFL_FRIDA_SECCOMP_FILE` - Write a log of any syscalls made by the target to
-the specified file.
+ the specified file.
* `AFL_FRIDA_STALKER_ADJACENT_BLOCKS` - Configure the number of adjacent blocks
- to fetch when generating instrumented code. By fetching blocks in the same
- order they appear in the original program, rather than the order of execution
- should help reduce locallity and adjacency. This includes allowing us to vector
- between adjancent blocks using a NOP slide rather than an immediate branch.
+ to fetch when generating instrumented code. By fetching blocks in the same
+ order they appear in the original program, rather than the order of execution
+ should help reduce locallity and adjacency. This includes allowing us to
+ vector between adjancent blocks using a NOP slide rather than an immediate
+ branch.
* `AFL_FRIDA_STALKER_IC_ENTRIES` - Configure the number of inline cache entries
-stored along-side branch instructions which provide a cache to avoid having to
-call back into FRIDA to find the next block. Default is 32.
+ stored along-side branch instructions which provide a cache to avoid having to
+ call back into FRIDA to find the next block. Default is 32.
* `AFL_FRIDA_STATS_FILE` - Write statistics information about the code being
-instrumented to the given file name. The statistics are written only for the
-child process when new block is instrumented (when the
-`AFL_FRIDA_STATS_INTERVAL` has expired). Note that just because a new path is
-found does not mean a new block needs to be compiled. It could be that
-the existing blocks instrumented have been executed in a different order.
+ instrumented to the given file name. The statistics are written only for the
+ child process when new block is instrumented (when the
+ `AFL_FRIDA_STATS_INTERVAL` has expired). Note that just because a new path is
+ found does not mean a new block needs to be compiled. It could be that the
+ existing blocks instrumented have been executed in a different order.
* `AFL_FRIDA_STATS_INTERVAL` - The maximum frequency to output statistics
-information. Stats will be written whenever they are updated if the given
-interval has elapsed since last time they were written.
+ information. Stats will be written whenever they are updated if the given
+ interval has elapsed since last time they were written.
* `AFL_FRIDA_TRACEABLE` - Set the child process to be traceable by any process
-to aid debugging and overcome the restrictions imposed by YAMA. Supported on
-Linux only. Permits a non-root user to use `gcore` or similar to collect a core
-dump of the instrumented target. Note that in order to capture the core dump you
-must set a sufficient timeout (using `-t`) to avoid `afl-fuzz` killing the
-process whilst it is being dumped.
+ to aid debugging and overcome the restrictions imposed by YAMA. Supported on
+ Linux only. Permits a non-root user to use `gcore` or similar to collect a
+ core dump of the instrumented target. Note that in order to capture the core
+ dump you must set a sufficient timeout (using `-t`) to avoid `afl-fuzz`
+ killing the process whilst it is being dumped.
## 8) Settings for afl-cmin
diff --git a/docs/fuzzing_binary-only_targets.md b/docs/fuzzing_binary-only_targets.md
index a786fd8b..b3d9ca02 100644
--- a/docs/fuzzing_binary-only_targets.md
+++ b/docs/fuzzing_binary-only_targets.md
@@ -84,7 +84,8 @@ Wine, python3, and the pefile python package installed.
It is included in AFL++.
-For more information, see [qemu_mode/README.wine.md](../qemu_mode/README.wine.md).
+For more information, see
+[qemu_mode/README.wine.md](../qemu_mode/README.wine.md).
### Frida_mode
@@ -169,7 +170,8 @@ Fore more information, see
## Binary rewriters
-An alternative solution are binary rewriters. They are faster then the solutions native to AFL++ but don't always work.
+An alternative solution are binary rewriters. They are faster then the solutions
+native to AFL++ but don't always work.
### ZAFL
ZAFL is a static rewriting platform supporting x86-64 C/C++,
diff --git a/docs/fuzzing_in_depth.md b/docs/fuzzing_in_depth.md
index d408aa91..9611d6b7 100644
--- a/docs/fuzzing_in_depth.md
+++ b/docs/fuzzing_in_depth.md
@@ -259,6 +259,7 @@ Then build the target. (Usually with `make`)
#### configure
For `configure` build systems this is usually done by:
+
`CC=afl-clang-fast CXX=afl-clang-fast++ ./configure --disable-shared`
Note that if you are using the (better) afl-clang-lto compiler you also have to
@@ -268,6 +269,7 @@ described in [instrumentation/README.lto.md](../instrumentation/README.lto.md).
#### cmake
For `cmake` build systems this is usually done by:
+
`mkdir build; cd build; cmake -DCMAKE_C_COMPILER=afl-cc -DCMAKE_CXX_COMPILER=afl-c++ ..`
Note that if you are using the (better) afl-clang-lto compiler you also have to
@@ -307,8 +309,8 @@ it for a hobby and not professionally :-).
### g) libfuzzer fuzzer harnesses with LLVMFuzzerTestOneInput()
-libfuzzer `LLVMFuzzerTestOneInput()` harnesses are the defacto standard
-for fuzzing, and they can be used with AFL++ (and honggfuzz) as well!
+libfuzzer `LLVMFuzzerTestOneInput()` harnesses are the defacto standard for
+fuzzing, and they can be used with AFL++ (and honggfuzz) as well!
Compiling them is as simple as:
@@ -358,8 +360,11 @@ Put all files from step a) into one directory, e.g., INPUTS.
If the target program is to be called by fuzzing as `bin/target -d INPUTFILE`
the run afl-cmin like this:
+
`afl-cmin -i INPUTS -o INPUTS_UNIQUE -- bin/target -d @@`
-Note that the INPUTFILE argument that the target program would read from has to be set as `@@`.
+
+Note that the INPUTFILE argument that the target program would read from has to
+be set as `@@`.
If the target reads from stdin instead, just omit the `@@` as this is the
default.
@@ -420,22 +425,25 @@ as test data in there.
If you do not want anything special, the defaults are already usually best,
hence all you need is to specify the seed input directory with the result of
step [2a) Collect inputs](#a-collect-inputs):
+
`afl-fuzz -i input -o output -- bin/target -d @@`
-Note that the directory specified with -o will be created if it does not exist.
+
+Note that the directory specified with `-o` will be created if it does not
+exist.
It can be valuable to run afl-fuzz in a screen or tmux shell so you can log off,
or afl-fuzz is not aborted if you are running it in a remote ssh session where
-the connection fails in between.
-Only do that though once you have verified that your fuzzing setup works!
-Run it like `screen -dmS afl-main -- afl-fuzz -M main-$HOSTNAME -i ...`
-and it will start away in a screen session. To enter this session, type
-`screen -r afl-main`. You see - it makes sense to name the screen session
-same as the afl-fuzz -M/-S naming :-)
-For more information on screen or tmux, check their documentation.
+the connection fails in between. Only do that though once you have verified that
+your fuzzing setup works! Run it like `screen -dmS afl-main -- afl-fuzz -M
+main-$HOSTNAME -i ...` and it will start away in a screen session. To enter this
+session, type `screen -r afl-main`. You see - it makes sense to name the screen
+session same as the afl-fuzz -M/-S naming :-) For more information on screen or
+tmux, check their documentation.
If you need to stop and re-start the fuzzing, use the same command line options
(or even change them by selecting a different power schedule or another mutation
mode!) and switch the input directory with a dash (`-`):
+
`afl-fuzz -i - -o output -- bin/target -d @@`
Adding a dictionary is helpful. See the directory
@@ -457,12 +465,13 @@ handling in the target. Play around with various -m values until you find one
that safely works for all your input seeds (if you have good ones and then
double or quadruple that.
-By default afl-fuzz never stops fuzzing. To terminate AFL++, press
-Control-C or send a signal SIGINT. You can limit the number of executions or
-approximate runtime in seconds with options also.
+By default afl-fuzz never stops fuzzing. To terminate AFL++, press Control-C or
+send a signal SIGINT. You can limit the number of executions or approximate
+runtime in seconds with options also.
When you start afl-fuzz you will see a user interface that shows what the status
is:
+

All labels are explained in [status_screen.md](status_screen.md).
@@ -528,8 +537,8 @@ All other secondaries should be used like this:
Also, it is recommended to set `export AFL_IMPORT_FIRST=1` to load test cases
from other fuzzers in the campaign first.
-If you have a large corpus, a corpus from a previous run or are fuzzing in
-a CI, then also set `export AFL_CMPLOG_ONLY_NEW=1` and `export AFL_FAST_CAL=1`.
+If you have a large corpus, a corpus from a previous run or are fuzzing in a CI,
+then also set `export AFL_CMPLOG_ONLY_NEW=1` and `export AFL_FAST_CAL=1`.
You can also use different fuzzers. If you are using AFL spinoffs or AFL
conforming fuzzers, then just use the same -o directory and give it a unique
@@ -553,11 +562,10 @@ recommended!
### d) Using multiple machines for fuzzing
-Maybe you have more than one machine you want to fuzz the same target on.
-Start the `afl-fuzz` (and perhaps libfuzzer, honggfuzz, ...)
-orchestra as you like, just ensure that your have one and only one `-M`
-instance per server, and that its name is unique, hence the recommendation
-for `-M main-$HOSTNAME`.
+Maybe you have more than one machine you want to fuzz the same target on. Start
+the `afl-fuzz` (and perhaps libfuzzer, honggfuzz, ...) orchestra as you like,
+just ensure that your have one and only one `-M` instance per server, and that
+its name is unique, hence the recommendation for `-M main-$HOSTNAME`.
Now there are three strategies on how you can sync between the servers:
* never: sounds weird, but this makes every server an island and has the chance
diff --git a/docs/ideas.md b/docs/ideas.md
index 8193983b..1a578313 100644
--- a/docs/ideas.md
+++ b/docs/ideas.md
@@ -1,31 +1,29 @@
# Ideas for AFL++
-In the following, we describe a variety of ideas that could be implemented
-for future AFL++ versions.
+In the following, we describe a variety of ideas that could be implemented for
+future AFL++ versions.
## Analysis software
-Currently analysis is done by using afl-plot, which is rather outdated.
-A GTK or browser tool to create run-time analysis based on fuzzer_stats,
-queue/id* information and plot_data that allows for zooming in and out,
-changing min/max display values etc. and doing that for a single run,
-different runs and campaigns vs campaigns.
-Interesting values are execs, and execs/s, edges discovered (total, when
-each edge was discovered and which other fuzzer share finding that edge),
-test cases executed.
-It should be clickable which value is X and Y axis, zoom factor, log scaling
-on-off, etc.
+Currently analysis is done by using afl-plot, which is rather outdated. A GTK or
+browser tool to create run-time analysis based on fuzzer_stats, queue/id*
+information and plot_data that allows for zooming in and out, changing min/max
+display values etc. and doing that for a single run, different runs and
+campaigns vs campaigns. Interesting values are execs, and execs/s, edges
+discovered (total, when each edge was discovered and which other fuzzer share
+finding that edge), test cases executed. It should be clickable which value is X
+and Y axis, zoom factor, log scaling on-off, etc.
Mentor: vanhauser-thc
## WASM Instrumentation
Currently, AFL++ can be used for source code fuzzing and traditional binaries.
-With the rise of WASM as compile target, however, a novel way of
-instrumentation needs to be implemented for binaries compiled to Webassembly.
-This can either be done by inserting instrumentation directly into the
-WASM AST, or by patching feedback into a WASM VMs of choice, similar to
-the current Unicorn instrumentation.
+With the rise of WASM as compile target, however, a novel way of instrumentation
+needs to be implemented for binaries compiled to Webassembly. This can either be
+done by inserting instrumentation directly into the WASM AST, or by patching
+feedback into a WASM VMs of choice, similar to the current Unicorn
+instrumentation.
Mentor: any
@@ -34,25 +32,26 @@ Mentor: any
Other programming languages also use llvm hence they could (easily?) supported
for fuzzing, e.g., mono, swift, go, kotlin native, fortran, ...
-GCC also supports: Objective-C, Fortran, Ada, Go, and D
-(according to [Gcc homepage](https://gcc.gnu.org/))
+GCC also supports: Objective-C, Fortran, Ada, Go, and D (according to
+[Gcc homepage](https://gcc.gnu.org/))
-LLVM is also used by: Rust, LLGo (Go), kaleidoscope (Haskell), flang (Fortran), emscripten (JavaScript, WASM), ilwasm (CIL (C#))
-(according to [LLVM frontends](https://gist.github.com/axic/62d66fb9d8bccca6cc48fa9841db9241))
+LLVM is also used by: Rust, LLGo (Go), kaleidoscope (Haskell), flang (Fortran),
+emscripten (JavaScript, WASM), ilwasm (CIL (C#)) (according to
+[LLVM frontends](https://gist.github.com/axic/62d66fb9d8bccca6cc48fa9841db9241))
Mentor: vanhauser-thc
## Machine Learning
-Something with machine learning, better than [NEUZZ](https://github.com/dongdongshe/neuzz) :-)
-Either improve a single mutator thorugh learning of many different bugs
-(a bug class) or gather deep insights about a single target beforehand
-(CFG, DFG, VFG, ...?) and improve performance for a single target.
+Something with machine learning, better than
+[NEUZZ](https://github.com/dongdongshe/neuzz) :-) Either improve a single
+mutator thorugh learning of many different bugs (a bug class) or gather deep
+insights about a single target beforehand (CFG, DFG, VFG, ...?) and improve
+performance for a single target.
Mentor: domenukk
## Your idea!
-Finally, we are open to proposals!
-Create an issue at https://github.com/AFLplusplus/AFLplusplus/issues and let's discuss :-)
-
+Finally, we are open to proposals! Create an issue at
+https://github.com/AFLplusplus/AFLplusplus/issues and let's discuss :-)
\ No newline at end of file
diff --git a/docs/important_changes.md b/docs/important_changes.md
index 82de054f..9d4523e8 100644
--- a/docs/important_changes.md
+++ b/docs/important_changes.md
@@ -1,6 +1,7 @@
# Important changes in AFL++
-This document lists important changes in AFL++, for example, major behavior changes.
+This document lists important changes in AFL++, for example, major behavior
+changes.
## From version 3.00 onwards
@@ -10,8 +11,8 @@ iOS etc.
With AFL++ 3.15 we introduced the following changes from previous behaviors:
* Also -M main mode does not do deterministic fuzzing by default anymore
- * afl-cmin and afl-showmap -Ci now descent into subdirectories like
- afl-fuzz -i does (but note that afl-cmin.bash does not)
+ * afl-cmin and afl-showmap -Ci now descent into subdirectories like afl-fuzz
+ -i does (but note that afl-cmin.bash does not)
With AFL++ 3.14 we introduced the following changes from previous behaviors:
* afl-fuzz: deterministic fuzzing it not a default for -M main anymore
@@ -31,22 +32,22 @@ behaviors and defaults:
* The gcc_plugin was replaced with a new version submitted by AdaCore that
supports more features. Thank you!
* qemu_mode got upgraded to QEMU 5.1, but to be able to build this a current
- ninja build tool version and python3 setuptools are required.
- qemu_mode also got new options like snapshotting, instrumenting specific
- shared libraries, etc. Additionally QEMU 5.1 supports more CPU targets so
- this is really worth it.
+ ninja build tool version and python3 setuptools are required. qemu_mode also
+ got new options like snapshotting, instrumenting specific shared libraries,
+ etc. Additionally QEMU 5.1 supports more CPU targets so this is really worth
+ it.
* When instrumenting targets, afl-cc will not supersede optimizations anymore
if any were given. This allows to fuzz targets build regularly like those
for debug or release versions.
* afl-fuzz:
- * if neither -M or -S is specified, `-S default` is assumed, so more
- fuzzers can easily be added later
- * `-i` input directory option now descends into subdirectories. It also
- does not fatal on crashes and too large files, instead it skips them
- and uses them for splicing mutations
+ * if neither -M or -S is specified, `-S default` is assumed, so more fuzzers
+ can easily be added later
+ * `-i` input directory option now descends into subdirectories. It also does
+ not fatal on crashes and too large files, instead it skips them and uses
+ them for splicing mutations
* -m none is now default, set memory limits (in MB) with, e.g., -m 250
- * deterministic fuzzing is now disabled by default (unless using -M) and
- can be enabled with -D
+ * deterministic fuzzing is now disabled by default (unless using -M) and can
+ be enabled with -D
* a caching of test cases can now be performed and can be modified by
editing config.h for TESTCASE_CACHE or by specifying the environment
variable `AFL_TESTCACHE_SIZE` (in MB). Good values are between 50-500
diff --git a/docs/rpc_statsd.md b/docs/rpc_statsd.md
index 9b3d8d40..003b9c79 100644
--- a/docs/rpc_statsd.md
+++ b/docs/rpc_statsd.md
@@ -1,18 +1,29 @@
# Remote monitoring and metrics visualization
-AFL++ can send out metrics as StatsD messages. For remote monitoring and visualization of the metrics, you can set up a tool chain. For example, with Prometheus and Grafana. All tools are free and open source.
+AFL++ can send out metrics as StatsD messages. For remote monitoring and
+visualization of the metrics, you can set up a tool chain. For example, with
+Prometheus and Grafana. All tools are free and open source.
-This enables you to create nice and readable dashboards containing all the information you need on your fuzzer instances. There is no need to write your own statistics parsing system, deploy and maintain it to all your instances, and sync with your graph rendering system.
+This enables you to create nice and readable dashboards containing all the
+information you need on your fuzzer instances. There is no need to write your
+own statistics parsing system, deploy and maintain it to all your instances, and
+sync with your graph rendering system.
-Compared to the default integrated UI of AFL++, this can help you to visualize trends and the fuzzing state over time. You might be able to see when the fuzzing process has reached a state of no progress and visualize what are the "best strategies" for your targets (according to your own criteria). You can do so without logging into each instance individually.
+Compared to the default integrated UI of AFL++, this can help you to visualize
+trends and the fuzzing state over time. You might be able to see when the
+fuzzing process has reached a state of no progress and visualize what are the
+"best strategies" for your targets (according to your own criteria). You can do
+so without logging into each instance individually.

-This is an example visualization with Grafana. The dashboard can be imported with [this JSON template](resources/grafana-afl++.json).
+This is an example visualization with Grafana. The dashboard can be imported
+with [this JSON template](resources/grafana-afl++.json).
## AFL++ metrics and StatsD
-StatsD allows you to receive and aggregate metrics from a wide range of applications and retransmit them to a backend of your choice.
+StatsD allows you to receive and aggregate metrics from a wide range of
+applications and retransmit them to a backend of your choice.
From AFL++, StatsD can receive the following metrics:
- cur_path
@@ -36,35 +47,57 @@ From AFL++, StatsD can receive the following metrics:
- var_byte_count
- variable_paths
-Depending on your StatsD server, you will be able to monitor, trigger alerts, or perform actions based on these metrics (for example: alert on slow exec/s for a new build, threshold of crashes, time since last crash > X, and so on).
+Depending on your StatsD server, you will be able to monitor, trigger alerts, or
+perform actions based on these metrics (for example: alert on slow exec/s for a
+new build, threshold of crashes, time since last crash > X, and so on).
## Setting environment variables in AFL++
-1. To enable the StatsD metrics collection on your fuzzer instances, set the environment variable `AFL_STATSD=1`. By default, AFL++ will send the metrics over UDP to 127.0.0.1:8125.
+1. To enable the StatsD metrics collection on your fuzzer instances, set the
+ environment variable `AFL_STATSD=1`. By default, AFL++ will send the metrics
+ over UDP to 127.0.0.1:8125.
-2. To enable tags for each metric based on their format (banner and afl_version), set the environment variable `AFL_STATSD_TAGS_FLAVOR`. By default, no tags will be added to the metrics.
+2. To enable tags for each metric based on their format (banner and
+ afl_version), set the environment variable `AFL_STATSD_TAGS_FLAVOR`. By
+ default, no tags will be added to the metrics.
The available values are the following:
- `dogstatsd`
- `influxdb`
- `librato`
- `signalfx`
-
- For more information on environment variables, see [env_variables.md](env_variables.md).
- Note: When using multiple fuzzer instances with StatsD it is *strongly* recommended to set up `AFL_STATSD_TAGS_FLAVOR` to match your StatsD server. This will allow you to see individual fuzzer performance, detect bad ones, and see the progress of each strategy.
+ For more information on environment variables, see
+ [env_variables.md](env_variables.md).
-3. Optional: To set the host and port of your StatsD daemon, set `AFL_STATSD_HOST` and `AFL_STATSD_PORT`. The default values are `localhost` and `8125`.
+ Note: When using multiple fuzzer instances with StatsD it is *strongly*
+ recommended to set up `AFL_STATSD_TAGS_FLAVOR` to match your StatsD server.
+ This will allow you to see individual fuzzer performance, detect bad ones,
+ and see the progress of each strategy.
+
+3. Optional: To set the host and port of your StatsD daemon, set
+ `AFL_STATSD_HOST` and `AFL_STATSD_PORT`. The default values are `localhost`
+ and `8125`.
## Installing and setting up StatsD, Prometheus, and Grafana
-The easiest way to install and set up the infrastructure is with Docker and Docker Compose.
+The easiest way to install and set up the infrastructure is with Docker and
+Docker Compose.
-Depending on your fuzzing setup and infrastructure, you may not want to run these applications on your fuzzer instances. This setup may be modified before use in a production environment; for example, adding passwords, creating volumes for storage, tweaking the metrics gathering to get host metrics (CPU, RAM, and so on).
+Depending on your fuzzing setup and infrastructure, you may not want to run
+these applications on your fuzzer instances. This setup may be modified before
+use in a production environment; for example, adding passwords, creating volumes
+for storage, tweaking the metrics gathering to get host metrics (CPU, RAM, and
+so on).
-For all your fuzzing instances, only one instance of Prometheus and Grafana is required. The [statsd exporter](https://registry.hub.docker.com/r/prom/statsd-exporter) converts the StatsD metrics to Prometheus. If you are using a provider that supports StatsD directly, you can skip this part of the setup."
+For all your fuzzing instances, only one instance of Prometheus and Grafana is
+required. The
+[statsd exporter](https://registry.hub.docker.com/r/prom/statsd-exporter)
+converts the StatsD metrics to Prometheus. If you are using a provider that
+supports StatsD directly, you can skip this part of the setup."
-You can create and move the infrastructure files into a directory of your choice. The directory will store all the required configuration files.
+You can create and move the infrastructure files into a directory of your
+choice. The directory will store all the required configuration files.
To install and set up Prometheus and Grafana:
@@ -76,6 +109,7 @@ To install and set up Prometheus and Grafana:
```
2. Create a `docker-compose.yml` containing the following:
+
```yml
version: '3'
@@ -109,7 +143,7 @@ To install and set up Prometheus and Grafana:
- "8125:9125/udp"
networks:
- statsd-net
-
+
grafana:
image: grafana/grafana
container_name: grafana
@@ -134,7 +168,8 @@ To install and set up Prometheus and Grafana:
```
4. Create a `statsd_mapping.yml` containing the following:
- ```yml
+
+ ```yml
mappings:
- match: "fuzzing.*"
name: "fuzzing"
@@ -152,4 +187,4 @@ To run your fuzzing instances:
AFL_STATSD_TAGS_FLAVOR=dogstatsd AFL_STATSD=1 afl-fuzz -M test-fuzzer-1 -i i -o o [./bin/my-application] @@
AFL_STATSD_TAGS_FLAVOR=dogstatsd AFL_STATSD=1 afl-fuzz -S test-fuzzer-2 -i i -o o [./bin/my-application] @@
...
-```
+```
\ No newline at end of file
diff --git a/frida_mode/Scripting.md b/frida_mode/Scripting.md
index fd4282db..63ab1718 100644
--- a/frida_mode/Scripting.md
+++ b/frida_mode/Scripting.md
@@ -334,8 +334,8 @@ Interceptor.replace(LLVMFuzzerTestOneInput, cm.My_LLVMFuzzerTestOneInput);
### Hooking `main`
-Lastly, it should be noted that using FRIDA mode's scripting support to hook
-the `main` function is a special case. This is because the `main` function is
+Lastly, it should be noted that using FRIDA mode's scripting support to hook the
+`main` function is a special case. This is because the `main` function is
already hooked by the FRIDA mode engine itself and hence the function `main` (or
at least the first basic block already been compiled by Stalker ready for
execution). Hence any attempt to use `Interceptor.replace` like in the example
@@ -405,22 +405,22 @@ Consider the [following](test/js/test2.c) test code...
#include
const uint32_t crc32_tab[] = {
- 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,
+ 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,
...
- 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
+ 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
};
uint32_t
crc32(const void *buf, size_t size)
{
- const uint8_t *p = buf;
- uint32_t crc;
- crc = ~0U;
- while (size--)
- crc = crc32_tab[(crc ^ *p++) & 0xFF] ^ (crc >> 8);
- return crc ^ ~0U;
+ const uint8_t *p = buf;
+ uint32_t crc;
+ crc = ~0U;
+ while (size--)
+ crc = crc32_tab[(crc ^ *p++) & 0xFF] ^ (crc >> 8);
+ return crc ^ ~0U;
}
/*
diff --git a/instrumentation/README.gcc_plugin.md b/instrumentation/README.gcc_plugin.md
index f251415b..ef38662b 100644
--- a/instrumentation/README.gcc_plugin.md
+++ b/instrumentation/README.gcc_plugin.md
@@ -1,7 +1,7 @@
# GCC-based instrumentation for afl-fuzz
-For the general instruction manual, see [../README.md](../README.md).
-For the LLVM-based instrumentation, see [README.llvm.md](README.llvm.md).
+For the general instruction manual, see [../README.md](../README.md). For the
+LLVM-based instrumentation, see [README.llvm.md](README.llvm.md).
This document describes how to build and use `afl-gcc-fast` and `afl-g++-fast`,
which instrument the target with the help of gcc plugins.
--
cgit 1.4.1