aboutsummaryrefslogtreecommitdiff
path: root/linux/arch.c
AgeCommit message (Collapse)Author
2022-11-22set the current process as init process on FreeBSD.David CARLIER
2021-09-07subproc/libhfuzz: move prctl(PDEATHSIG) to libhfcommonRobert Swiecki
2021-05-08musl build fix proposalDavid Carlier
2020-08-31libhfcommon/ns: separate unshare and setup of the user namespaceRobert Swiecki
2020-08-31linux/arch: enable namespacing during clone()Robert Swiecki
2020-08-31linux/arch: enable namespacing for each fuzzed instance instead of enabling ↵Robert Swiecki
it globally
2020-07-30Remove redundant F_SETSIG call from process forkStefan Bucur
Setting the signal on a file descriptor to SIGIO should be redundant, according to the POSIX specification. Moreover, this system call currently prevents Honggfuzz from running inside a gVisor sandbox.
2020-05-05subproc: simpler subproc_StatusToStr())Robert Swiecki
2020-04-29New directives in .clang-formatRobert Swiecki
2020-04-23all: rename linux/netbsd to arch_linux/arch_netbsd as -std=gnu11 complains ↵Robert Swiecki
about linux as an identifier
2020-03-29linux: enable network namespacing by default (if available)Robert Swiecki
2020-03-28libhfcommon/files: implement files_writeStrToFile and move some callers of ↵Robert Swiecki
files_writeBufToFile to it
2020-03-24subproc: set nice(1) for fuzzed processesRobert Swiecki
2020-01-20arch: move arch.c logging to subproc.cRobert Swiecki
2020-01-20subproc: move execve argument preparation into a separate funcRobert Swiecki
2020-01-20subproc: move argument generation to subproc.cRobert Swiecki
2020-01-19*/arch.c: fix https://github.com/google/honggfuzz/issues/302 - check ret ↵Robert Swiecki
value of strstr
2019-12-04sanitizers: move arch_hashCallstack to sanitizersRobert Swiecki
2019-12-04sanitizers/linux: remove monitorSIGABRT convention: now SIGABRT is always ↵Robert Swiecki
monitored. For Android another option will be implemented to avoid extensive SIGABRT system logging - 'kill upon SIGABRT'
2019-09-12linux/arch: adjust oom score for fuzzed tasksRobert Swiecki
2019-09-03No need to use a special signal to emulate SIGUSR1Robert Swiecki
2019-08-28arch: use shorter form of concatenating stringsRobert Swiecki
2019-08-28*/arch.c: use _HF_INPUT_FD instead of run->dynamicFileFd b/c the latter if ↵Robert Swiecki
O_CLOEXEC
2019-08-27subproc: allow to use ___FILE___ and -s with persistent modeRobert Swiecki
2019-03-01hfuzz-cc: better way of looking for fsanitize=fuzzerRobert Swiecki
2019-02-26linux/arch: make longjmp'ing function noreturnRobert Swiecki
2019-02-18linux/arch: do perfClose in the new forkRobert Swiecki
2019-02-18linux/arch: close perf once the process is killedRobert Swiecki
2019-02-14create a signal thread to distribute SIGCHLD as SIGUSR1Robert Swiecki
2019-02-12linux/arch: use sigtimedwait just in caseRobert Swiecki
2019-02-12linux/arch: move waiting sigset to globalRobert Swiecki
2019-02-11honggfuzz: move thread pinging routine to a separate functionRobert Swiecki
2019-02-10linux/arch: fixesRobert Swiecki
2019-02-10linux: remove forced useCloneRobert Swiecki
2019-02-10linux/arch: commentRobert Swiecki
2019-02-10time limit checks based on USR1Robert Swiecki
2019-01-30linux/arch: remove TODORobert Swiecki
2019-01-30ALL: remove -p (pid), simplify the subproc state machine. NetBSD will stop ↵Robert Swiecki
working for some time, will be fixed in the coming days
2018-08-23sancov: remove, since it's old (clang-4), slower, and requires complex code. ↵Robert Swiecki
Android seems to be supporting in-process counters now
2018-03-07honggfuzz: even more fields into substructsRobert Swiecki
2018-03-02honggfuzz: move more vars to substructsRobert Swiecki
2018-02-27Update copyright/authors headersRobert Swiecki
2018-01-29linux: remove run->global->linux.useClone=true which was set for testingRobert Swiecki
2018-01-21Support external fuzzer and provide code coveragedobin
Aka The FFW honggfuzz patch. This proposed patch for honggfuzz is used by the fuzzing for worms (FFW) framework available here: github.com/dobin/ffw This patch makes it possible to use honggfuzz as a code coverage tool for long-living (network-) servers. It provides the following functionality: * A socket interface for an external fuzzer * Support for code coverage of long living processes The socket interface supports the following messages: * Honggfuzz -> Fuzzer: "Fuzz": Send fuzz data to target * Honggfuzz -> Fuzzer: "Cras": Target crashed * Honggfuzz -> Fuzzer: "New!": New basic block reached * Fuzzer -> Honggfuzz: "okay": Fuzzer sent his stuff to target * Fuzzer -> Honggfuzz: "bad!": The server is unreachable Honggfuzz will implement the following tasks: * Start the target * Restart the target if it crashes * Restart the target if a crash/hang is detected by the fuzzer * Provide code coverage information about new basic blocks An example vulnerable server plus tests have been provided in the `socketfuzzer/` directory.
2018-01-16cmdline: discover both persistent and netdriver modesRobert Swiecki
2018-01-15subproc: use copy of a dynamic file to pass for stdin and ___FILE___ fuzzingRobert Swiecki
2018-01-12posix: allow to use _HF_MONETARY_MOD with posixRobert Swiecki
2018-01-11Remove notion of the inputFile, in favor of input file-descriptors ↵Robert Swiecki
accessible as /dev/fd/<x>
2018-01-10subproc: receiving the ready message from the fuzzed process is not necessaryRobert Swiecki
2018-01-10arch: simplify arch handling a bitRobert Swiecki