4cabb81996
Better handling of exit codes used by sanitzers
2025-03-24 16:30:05 +01:00
ecaddc09e8
code format
2025-02-10 13:29:22 +01:00
1c9925c7d7
Initial integration
2025-01-19 23:49:52 +08:00
4a1cf0b9af
code format
2024-10-07 13:43:19 +02:00
1d6cd5dd19
fix AFL_AUTORESUME=1 for Nyx mode
2024-09-14 03:51:20 +02:00
ba7313b521
AFL_CUSTOM_MUTATOR_LATE_SEND added
2024-06-27 18:51:58 +02:00
8fcca6fb41
Collect persistent coverage data and dump it at the end of the run
...
With CODE_COVERAGE builds, we need to collect the coverage data of each
iteration in a persistant buffer that has the same size as the regular
trace buffer used for fuzzing. We dump this information at the end of
the run and when combined with pointer data and module info, this can be
used to calculate code coverage.
2024-06-19 12:36:58 +02:00
831b8f35d5
Keep a backup of max_length in the afl_forkserver_t structure
2024-05-14 18:23:53 +08:00
476aca5b67
nits
2024-04-19 15:45:00 +02:00
ed1a6f8a57
2024 v4.10c release
2024-02-03 11:01:31 +01:00
06f0982f0f
Enhancement on Deterministic stage ( #1972 )
...
* fuzzer: init commit based on aflpp 60dc37a8cf
* fuzzers: adding the skip variables and initialize
* log: profile the det/havoc finding
* log: add profile log output
* fuzzers: sperate log/skipdet module
* fuzzers: add quick eff_map calc
* fuzzers: add skip_eff_map in fuzz_one
* fuzzers: mark whole input space in eff_map
* fuzzers: add undet bit threshold to skip some seeds
* fuzzers: fix one byte overflow
* fuzzers: fix overflow
* fix code format
* add havoc only again
* code format
* remove log to INTROSPECTION, rename skipdet module
* rename skipdet module
* remove log to stats
* clean redundant code
* code format
* remove redundant code format check
* remove redundant doc
* remove redundant objects
* clean files
* change -d to default skipdet
* disable deterministic when using CUSTOM_MUTATOR
* revert fix
2024-02-01 14:13:21 +00:00
bfb841d013
Use proper AFL_NYX_AUX_SIZE for nyx_aux_string
2023-10-20 00:07:35 +02:00
247d8539fe
Add AFL_NYX_LOG to redirect NYX hprintf messages to a file.
2023-08-04 15:39:57 -04:00
79640acbf1
nits
2023-08-04 09:25:19 +02:00
8f31086a7f
make nyx aux buffer size configurable
2023-08-03 14:40:10 +02:00
56f7e3aa08
hidden -Y option for nyx, code format
2023-04-16 12:42:32 +02:00
059d470e8d
improved Nyx tmp dir handling (additional sanity checks)
2023-04-16 04:42:09 +02:00
a96cdc649f
switch to latest libnyx API
2023-04-14 05:59:12 +02:00
eefd98f374
add Nyx support in various tools (like afl-cmin)
2023-04-14 02:25:33 +02:00
c86d06849b
Update forkserver.h
...
Fix typo
2023-02-08 15:54:27 +01:00
35f09e11a4
welcome 2023
2023-01-03 09:38:07 +01:00
05e0825d66
changelog update
2022-10-24 20:06:57 +02:00
7512316b46
Add AFL_FORK_SERVER_KILL_SIGNAL environment variable.
...
The AFL_FORK_SERVER_KILL_SIGNAL variable allows to configure the signal
used to kill the fork server on termination.
2022-10-21 12:47:00 +02:00
f84ea69660
Fix child reaping on fuzzer termination
...
This commit contains the following changes:
- Call `waitpid()` on the child and the fork server when terminating the
fuzzer; thus, we do not end up with zombies.
- Rename `fsrv.kill_signal` to `fsrv.child_kill_signal`, since the
documentation states that the signal is used to terminate the *child*.
- Use SIGTERM instead of fsrv.(child)_kill_signal, thus the fork server
can always reap the child.
2022-10-20 18:08:07 +02:00
b847e0f414
clang format 14
2022-07-12 09:04:54 +02:00
2eeba2dbf0
code format
2022-03-04 09:41:21 +01:00
0f7419fc91
write nyx crash logs to AFL++ work directory
2022-03-04 05:41:40 +01:00
d4c01c057b
test support for forced persistent mode
2022-02-04 12:09:07 +01:00
61d79f85c5
code format
2022-01-23 19:20:32 +01:00
9d3e6a869e
add LTO support in nyx_mode
2022-01-21 07:33:42 +01:00
e1082f2548
welcome 2022
2022-01-01 00:49:17 +01:00
8b8aaa93bd
nyx code format
2021-12-28 17:26:54 +01:00
41291d8c72
add Nyx mode
2021-12-28 15:51:43 +01:00
9100f3c416
Add initial CoreSight mode support
...
The original code is:
https://github.com/RICSecLab/AFLplusplus-cs/tree/retrage/coresight-mode-pr
Signed-off-by: Akira Moroo <retrage01@gmail.com >
2021-11-11 09:52:21 +00:00
9325a4fcbb
http->https
2021-11-06 10:28:22 +01:00
35153e9b49
correct map size for small targets
2021-06-16 15:33:03 +02:00
e40c0c2da1
FASAN Support ( #918 )
...
* FASAN Support
* Fix handling of Address Sanitizer DSO
* Changes to identification of Address Sanitizer DSO
Co-authored-by: Your Name <you@example.com >
2021-05-17 20:02:45 +02:00
c169cb3911
integrate frida_mode, code-format
2021-03-25 20:10:09 +01:00
00a53a870d
Merge pull request #833 from WorksButNotTested/frida
...
Frida
2021-03-25 19:42:27 +01:00
ab394836a9
remove warnings
2021-03-25 08:40:33 +01:00
e1384b5086
Add support for FRIDA mode
2021-03-24 18:17:10 +00:00
7f062524c9
fixes
2021-03-06 23:01:13 +01:00
4a0d4c50fc
complete implemenation, still no test
2021-03-06 19:12:25 +01:00
81442ba3f9
implementation without testing
2021-03-06 15:48:49 +01:00
84f0b4f187
persistent replay env setup
2021-02-07 08:27:35 +01:00
981ffb27a8
making AFL_MAP_SIZE obsolete
2021-02-01 12:01:23 +01:00
60764ebdf1
forkserver debug flag support
2021-01-21 18:43:06 +01:00
9cdf5c4150
User defined kill signal value ( #678 )
...
* Adding AFL_KILL_SIGNAL environment variable
Controlling the kill signal used to end forked processes.
* Checking validity of AFL_KILL_SIGNAL env variable
This commit also sets a valid value in the environment to avoid
duplicating code in at_exit(). Changing data type of
fsrv->kill_signal to u8 to match last_kill_signal.
* Adding afl_kill_signal to AFL (environment) state
This commit simply introduces a struct member for future use. The
env variable is not used from the afl struct but from fsrv, where
its validity is checked, resulting in a FATAL in case of errors.
2021-01-07 22:35:34 +01:00
e1a7ed9d6e
fixed typo in include/forkserver.h
2020-12-20 18:54:32 +09:00
a2e2fae840
AFL_CRASH_EXITCODE env var added, u8->bool
2020-12-03 14:43:06 +01:00