Skip to content

Qemu tmin #3118

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 16 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions fuzzers/baby/baby_fuzzer/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ opt-level = 3
debug = true

[dependencies]
env_logger = "0.11.7"
libafl = { path = "../../../libafl", features = ["tui_monitor"] }
libafl_bolts = { path = "../../../libafl_bolts" }
log = { version = "0.4.22", features = ["release_max_level_info"] }
1 change: 1 addition & 0 deletions fuzzers/baby/baby_fuzzer/src/main.rs
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ fn signals_set(idx: usize) {

#[expect(clippy::manual_assert)]
pub fn main() {
env_logger::init();
// The closure that we want to fuzz
let mut harness = |input: &BytesInput| {
let target = input.target_bytes();
Expand Down
2 changes: 1 addition & 1 deletion fuzzers/binary_only/qemu_cmin/src/fuzzer.rs
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
//! A libfuzzer-like fuzzer using qemu for binary-only coverage
//! A binary-only corpus minimizer using qemu, similar to AFL++ afl-cmin
#[cfg(feature = "i386")]
use core::mem::size_of;
#[cfg(feature = "snapshot")]
Expand Down
2 changes: 1 addition & 1 deletion fuzzers/binary_only/qemu_cmin/src/main.rs
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
//! A libfuzzer-like fuzzer using qemu for binary-only coverage
//! A binary-only corpus minimizer using qemu, similar to AFL++ afl-cmin
#[cfg(target_os = "linux")]
mod fuzzer;

Expand Down
2 changes: 1 addition & 1 deletion fuzzers/binary_only/qemu_coverage/src/fuzzer.rs
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
//! A libfuzzer-like fuzzer using qemu for binary-only coverage
//! A qemu test case runner to generate drcov coverage outputs
#[cfg(feature = "i386")]
use core::mem::size_of;
use core::time::Duration;
Expand Down
2 changes: 1 addition & 1 deletion fuzzers/binary_only/qemu_coverage/src/main.rs
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
//! A libfuzzer-like fuzzer using qemu for binary-only coverage
//! A qemu test case runner to generate drcov coverage outputs
#[cfg(target_os = "linux")]
mod fuzzer;

Expand Down
8 changes: 8 additions & 0 deletions fuzzers/binary_only/qemu_tmin/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
libpng-*
libpng_harness
libpng_harness_crashing
zlib-*
crashes
target
output
corpus/
Loading
Loading