Restructure the fuzzers folder (#2409)
* move fuzzers in subfolders * add readme * remove redundent fuzzers
This commit is contained in:
parent
c22a62c32a
commit
1205c2144c
154
.github/workflows/build_and_test.yml
vendored
154
.github/workflows/build_and_test.yml
vendored
@ -243,7 +243,7 @@ jobs:
|
|||||||
- name: Run a maturin build
|
- name: Run a maturin build
|
||||||
run: export LLVM_CONFIG=llvm-config-16 && cd ./bindings/pylibafl && python3 -m venv .env && . .env/bin/activate && pip install --upgrade --force-reinstall . && ./test.sh
|
run: export LLVM_CONFIG=llvm-config-16 && cd ./bindings/pylibafl && python3 -m venv .env && . .env/bin/activate && pip install --upgrade --force-reinstall . && ./test.sh
|
||||||
- name: Run python test
|
- name: Run python test
|
||||||
run: . ./bindings/pylibafl/.env/bin/activate # && cd ./fuzzers/python_qemu/ && python3 fuzzer.py 2>&1 | grep "Bye"
|
run: . ./bindings/pylibafl/.env/bin/activate # && cd ./fuzzers/qemu/python_qemu/ && python3 fuzzer.py 2>&1 | grep "Bye"
|
||||||
|
|
||||||
cargo-fmt:
|
cargo-fmt:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
@ -282,62 +282,76 @@ jobs:
|
|||||||
matrix:
|
matrix:
|
||||||
os: [ ubuntu-latest ]
|
os: [ ubuntu-latest ]
|
||||||
fuzzer:
|
fuzzer:
|
||||||
- ./fuzzers/cargo_fuzz
|
# Baby
|
||||||
- ./fuzzers/fuzzbench_fork_qemu
|
- ./fuzzers/baby/baby_fuzzer_with_forkexecutor
|
||||||
- ./fuzzers/libfuzzer_stb_image_sugar
|
- ./fuzzers/baby/baby_no_std
|
||||||
- ./fuzzers/nyx_libxml2_standalone
|
- ./fuzzers/baby/baby_fuzzer_swap_differential
|
||||||
- ./fuzzers/baby_fuzzer_gramatron
|
- ./fuzzers/baby/baby_fuzzer_grimoire
|
||||||
- ./fuzzers/tinyinst_simple
|
- ./fuzzers/baby/baby_fuzzer_gramatron
|
||||||
- ./fuzzers/baby_fuzzer_with_forkexecutor
|
- ./fuzzers/baby/baby_fuzzer
|
||||||
- ./fuzzers/baby_no_std
|
- ./fuzzers/baby/baby_fuzzer_nautilus
|
||||||
- ./fuzzers/baby_fuzzer_swap_differential
|
# - ./fuzzers/baby/backtrace_baby_fuzzers
|
||||||
- ./fuzzers/baby_fuzzer_grimoire
|
- ./fuzzers/baby/baby_fuzzer_unicode
|
||||||
- ./fuzzers/baby_fuzzer
|
- ./fuzzers/baby/baby_fuzzer_multi
|
||||||
- ./fuzzers/libfuzzer_libpng_launcher
|
- ./fuzzers/baby/baby_fuzzer_wasm
|
||||||
- ./fuzzers/libfuzzer_libpng_accounting
|
- ./fuzzers/baby/baby_fuzzer_minimizing
|
||||||
- ./fuzzers/forkserver_libafl_cc
|
- ./fuzzers/baby/baby_fuzzer_tokens
|
||||||
# - ./fuzzers/libfuzzer_libpng_tcp_manager
|
- ./fuzzers/baby/backtrace_baby_fuzzers/c_code_with_fork_executor
|
||||||
# - ./fuzzers/sqlite_centralized_multi_machine
|
- ./fuzzers/baby/backtrace_baby_fuzzers/c_code_with_inprocess_executor
|
||||||
- ./fuzzers/backtrace_baby_fuzzers
|
- ./fuzzers/baby/backtrace_baby_fuzzers/rust_code_with_fork_executor
|
||||||
- ./fuzzers/fuzzbench_qemu
|
- ./fuzzers/baby/backtrace_baby_fuzzers/rust_code_with_inprocess_executor
|
||||||
- ./fuzzers/nyx_libxml2_parallel
|
- ./fuzzers/baby/backtrace_baby_fuzzers/command_executor
|
||||||
- ./fuzzers/frida_gdiplus
|
- ./fuzzers/baby/backtrace_baby_fuzzers/forkserver_executor
|
||||||
- ./fuzzers/libfuzzer_stb_image_concolic
|
|
||||||
- ./fuzzers/nautilus_sync
|
# Forkserver
|
||||||
- ./fuzzers/push_harness
|
- ./fuzzers/forkserver/forkserver_simple
|
||||||
- ./fuzzers/libfuzzer_libpng_centralized
|
- ./fuzzers/forkserver/forkserver_libafl_cc
|
||||||
- ./fuzzers/baby_fuzzer_nautilus
|
|
||||||
- ./fuzzers/fuzzbench_text
|
# Frida
|
||||||
- ./fuzzers/libfuzzer_libpng_cmin
|
- ./fuzzers/frida/frida_executable_libpng
|
||||||
- ./fuzzers/forkserver_simple
|
- ./fuzzers/frida/frida_gdiplus
|
||||||
- ./fuzzers/baby_fuzzer_unicode
|
- ./fuzzers/frida/frida_libpng
|
||||||
- ./fuzzers/libfuzzer_libpng_norestart
|
|
||||||
- ./fuzzers/baby_fuzzer_multi
|
# Fuzzbench
|
||||||
- ./fuzzers/libafl_atheris
|
- ./fuzzers/fuzzbench/fuzzbench
|
||||||
- ./fuzzers/frida_libpng
|
- ./fuzzers/fuzzbench/fuzzbench_qemu
|
||||||
- ./fuzzers/fuzzbench_ctx
|
- ./fuzzers/fuzzbench/fuzzbench_fork_qemu
|
||||||
- ./fuzzers/fuzzbench_forkserver_cmplog
|
- ./fuzzers/fuzzbench/fuzzbench_text
|
||||||
- ./fuzzers/push_stage_harness
|
- ./fuzzers/fuzzbench/fuzzbench_ctx
|
||||||
- ./fuzzers/libfuzzer_libmozjpeg
|
- ./fuzzers/fuzzbench/fuzzbench_forkserver_cmplog
|
||||||
- ./fuzzers/libfuzzer_libpng_aflpp_ui
|
- ./fuzzers/fuzzbench/fuzzbench_forkserver
|
||||||
- ./fuzzers/libfuzzer_libpng
|
|
||||||
- ./fuzzers/baby_fuzzer_wasm
|
# LibPNG
|
||||||
- ./fuzzers/fuzzbench
|
- ./fuzzers/libpng/libfuzzer_libpng
|
||||||
- ./fuzzers/libfuzzer_stb_image
|
- ./fuzzers/libpng/libfuzzer_libpng_launcher
|
||||||
- ./fuzzers/fuzzbench_forkserver
|
- ./fuzzers/libpng/libfuzzer_libpng_accounting
|
||||||
# - ./fuzzers/libfuzzer_windows_asan
|
- ./fuzzers/libpng/libfuzzer_libpng_centralized
|
||||||
# - ./fuzzers/dynamic_analysis
|
- ./fuzzers/libpng/libfuzzer_libpng_cmin
|
||||||
- ./fuzzers/baby_fuzzer_minimizing
|
- ./fuzzers/libpng/libfuzzer_libpng_norestart
|
||||||
- ./fuzzers/frida_executable_libpng
|
# - ./fuzzers/libpng/libfuzzer_libpng_tcp_manager
|
||||||
- ./fuzzers/tutorial
|
|
||||||
- ./fuzzers/baby_fuzzer_tokens
|
# Nyx
|
||||||
- ./fuzzers/backtrace_baby_fuzzers/rust_code_with_inprocess_executor
|
- ./fuzzers/nyx/nyx_libxml2_standalone
|
||||||
- ./fuzzers/backtrace_baby_fuzzers/c_code_with_fork_executor
|
- ./fuzzers/nyx/nyx_libxml2_parallel
|
||||||
- ./fuzzers/backtrace_baby_fuzzers/command_executor
|
|
||||||
- ./fuzzers/backtrace_baby_fuzzers/forkserver_executor
|
# Stb
|
||||||
- ./fuzzers/backtrace_baby_fuzzers/c_code_with_inprocess_executor
|
- ./fuzzers/stb/libfuzzer_stb_image_sugar
|
||||||
- ./fuzzers/backtrace_baby_fuzzers/rust_code_with_fork_executor
|
- ./fuzzers/stb/libfuzzer_stb_image
|
||||||
- ./fuzzers/libafl-fuzz
|
- ./fuzzers/stb/libfuzzer_stb_image_concolic
|
||||||
|
|
||||||
|
# Others
|
||||||
|
- ./fuzzers/others/cargo_fuzz
|
||||||
|
# - ./fuzzers/others/dynamic_analysis
|
||||||
|
- ./fuzzers/others/libafl_atheris
|
||||||
|
- ./fuzzers/others/libafl-fuzz
|
||||||
|
- ./fuzzers/others/libfuzzer_libmozjpeg
|
||||||
|
# - ./fuzzers/others/libfuzzer_windows_asan
|
||||||
|
- ./fuzzers/others/nautilus_sync
|
||||||
|
- ./fuzzers/others/push_harness
|
||||||
|
- ./fuzzers/others/push_stage_harness
|
||||||
|
# - ./fuzzers/others/sqlite_centralized_multi_machine
|
||||||
|
- ./fuzzers/others/tinyinst_simple
|
||||||
|
- ./fuzzers/others/tutorial
|
||||||
runs-on: ${{ matrix.os }}
|
runs-on: ${{ matrix.os }}
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
@ -374,10 +388,10 @@ jobs:
|
|||||||
matrix:
|
matrix:
|
||||||
os: [ubuntu-latest]
|
os: [ubuntu-latest]
|
||||||
fuzzer:
|
fuzzer:
|
||||||
- ./fuzzers/qemu_cmin
|
- ./fuzzers/qemu/qemu_cmin
|
||||||
- ./fuzzers/qemu_systemmode
|
- ./fuzzers/qemu/qemu_systemmode
|
||||||
- ./fuzzers/qemu_coverage
|
- ./fuzzers/qemu/qemu_coverage
|
||||||
- ./fuzzers/qemu_launcher
|
- ./fuzzers/qemu/qemu_launcher
|
||||||
|
|
||||||
runs-on: [ self-hosted, qemu ]
|
runs-on: [ self-hosted, qemu ]
|
||||||
container: registry.gitlab.com/qemu-project/qemu/qemu/ubuntu2204:latest
|
container: registry.gitlab.com/qemu-project/qemu/qemu/ubuntu2204:latest
|
||||||
@ -403,9 +417,9 @@ jobs:
|
|||||||
- name: Add targets
|
- name: Add targets
|
||||||
run: rustup target add arm-linux-androideabi && rustup target add thumbv6m-none-eabi
|
run: rustup target add arm-linux-androideabi && rustup target add thumbv6m-none-eabi
|
||||||
- name: Build aarch64-unknown-none
|
- name: Build aarch64-unknown-none
|
||||||
run: cd ./fuzzers/baby_no_std && cargo +nightly build -Zbuild-std=core,alloc --target aarch64-unknown-none -v --release && cd ../..
|
run: cd ./fuzzers/baby/baby_no_std && cargo +nightly build -Zbuild-std=core,alloc --target aarch64-unknown-none -v --release && cd ../..
|
||||||
- name: run x86_64 until panic!
|
- name: run x86_64 until panic!
|
||||||
run: cd ./fuzzers/baby_no_std && cargo +nightly run || test $? -ne 0 || exit 1
|
run: cd ./fuzzers/baby/baby_no_std && cargo +nightly run || test $? -ne 0 || exit 1
|
||||||
- name: no_std tests
|
- name: no_std tests
|
||||||
run: cd ./libafl && cargo test --no-default-features
|
run: cd ./libafl && cargo test --no-default-features
|
||||||
|
|
||||||
@ -442,7 +456,7 @@ jobs:
|
|||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: ./.github/workflows/windows-tester-prepare
|
- uses: ./.github/workflows/windows-tester-prepare
|
||||||
- name: Build fuzzers/frida_libpng
|
- name: Build fuzzers/frida_libpng
|
||||||
run: cd fuzzers/frida_libpng/ && cargo make test
|
run: cd fuzzers/frida/frida_libpng/ && cargo make test
|
||||||
|
|
||||||
windows-frida-libfuzzer-stb-image:
|
windows-frida-libfuzzer-stb-image:
|
||||||
runs-on: windows-latest
|
runs-on: windows-latest
|
||||||
@ -451,8 +465,8 @@ jobs:
|
|||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: ./.github/workflows/windows-tester-prepare
|
- uses: ./.github/workflows/windows-tester-prepare
|
||||||
- name: Build fuzzers/libfuzzer_stb_image
|
- name: Build fuzzers/stb/libfuzzer_stb_image
|
||||||
run: cd fuzzers/libfuzzer_stb_image && cargo build --release
|
run: cd fuzzers/stb/libfuzzer_stb_image && cargo build --release
|
||||||
|
|
||||||
windows-frida-gdiplus:
|
windows-frida-gdiplus:
|
||||||
runs-on: windows-latest
|
runs-on: windows-latest
|
||||||
@ -461,8 +475,8 @@ jobs:
|
|||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: ./.github/workflows/windows-tester-prepare
|
- uses: ./.github/workflows/windows-tester-prepare
|
||||||
- name: Build fuzzers/frida_gdiplus
|
- name: Build fuzzers/frida/frida_gdiplus
|
||||||
run: cd fuzzers/frida_gdiplus/ && cargo make test && cargo make test_cmplog
|
run: cd fuzzers/frida/frida_gdiplus/ && cargo make test && cargo make test_cmplog
|
||||||
|
|
||||||
windows-tinyinst-simple:
|
windows-tinyinst-simple:
|
||||||
runs-on: windows-latest
|
runs-on: windows-latest
|
||||||
@ -473,8 +487,8 @@ jobs:
|
|||||||
- uses: ./.github/workflows/windows-tester-prepare
|
- uses: ./.github/workflows/windows-tester-prepare
|
||||||
- name: install cxx bridge
|
- name: install cxx bridge
|
||||||
run: cargo install cxxbridge-cmd
|
run: cargo install cxxbridge-cmd
|
||||||
- name: Build fuzzers/tinyinst_simple
|
- name: Build fuzzers/others/tinyinst_simple
|
||||||
run: cd fuzzers/tinyinst_simple/ && cargo make test
|
run: cd fuzzers/others/tinyinst_simple/ && cargo make test
|
||||||
|
|
||||||
windows-clippy:
|
windows-clippy:
|
||||||
runs-on: windows-latest
|
runs-on: windows-latest
|
||||||
|
1
.gitignore
vendored
1
.gitignore
vendored
@ -39,7 +39,6 @@ test.dict
|
|||||||
.idea/
|
.idea/
|
||||||
|
|
||||||
# Ignore all built fuzzers
|
# Ignore all built fuzzers
|
||||||
fuzzer_*
|
|
||||||
AFLplusplus
|
AFLplusplus
|
||||||
test_*
|
test_*
|
||||||
*_fuzzer
|
*_fuzzer
|
||||||
|
24
fuzzers/README.md
Normal file
24
fuzzers/README.md
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
# LibAFL Fuzzers
|
||||||
|
|
||||||
|
## Example fuzzers
|
||||||
|
|
||||||
|
You can find here all the example fuzzers built on top of LibAFL.
|
||||||
|
They are sorted by fuzzer types:
|
||||||
|
|
||||||
|
- `baby`: Minimal fuzzers demonstrating a specific feature.
|
||||||
|
- `forkserver`: Fuzzers using a forkserver-style executor.
|
||||||
|
- `frida`: Fuzzers using [Frida](../libafl_frida).
|
||||||
|
- `fuzzbench`: Fuzzbench fuzzers.
|
||||||
|
- `libpng`: Fuzzers targeting libpng.
|
||||||
|
- `nyx`: Fuzzers based on [Nyx](../libafl_nyx).
|
||||||
|
- `others`: Various fuzzers, with no specific categories.
|
||||||
|
- `qemu`: Fuzzers using [Qemu](../libafl_qemu).
|
||||||
|
- `stb`: Fuzzers targeting stb.
|
||||||
|
|
||||||
|
## Paper Artifacts
|
||||||
|
|
||||||
|
Multiple papers based on LibAFL have been published alongside artifacts.
|
||||||
|
Here is a list of LibAFL artifacts:
|
||||||
|
|
||||||
|
- Fuzzbench implementation: https://github.com/AFLplusplus/libafl_fuzzbench
|
||||||
|
- LibAFL QEMU experiments: https://github.com/AFLplusplus/libafl_qemu_artifacts
|
@ -20,5 +20,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/" }
|
libafl = { path = "../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
@ -19,6 +19,6 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/" }
|
libafl = { path = "../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
||||||
postcard = { version = "1.0", features = ["alloc"], default-features = false } # no_std compatible serde serialization format
|
postcard = { version = "1.0", features = ["alloc"], default-features = false } # no_std compatible serde serialization format
|
@ -19,5 +19,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/" }
|
libafl = { path = "../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
@ -20,5 +20,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/", features = ["prelude"] }
|
libafl = { path = "../../../libafl/", features = ["prelude"] }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/", features = ["prelude"] }
|
libafl_bolts = { path = "../../../libafl_bolts/", features = ["prelude"] }
|
@ -20,5 +20,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/", features = ["multipart_inputs"] }
|
libafl = { path = "../../../libafl/", features = ["multipart_inputs"] }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
@ -19,5 +19,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/", features = ["default", "nautilus"] }
|
libafl = { path = "../../../libafl/", features = ["default", "nautilus"] }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
@ -25,12 +25,12 @@ bindgen = "0.69.4"
|
|||||||
cc = "1.0"
|
cc = "1.0"
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl" }
|
libafl = { path = "../../../libafl" }
|
||||||
libafl_bolts = { path = "../../libafl_bolts" }
|
libafl_bolts = { path = "../../../libafl_bolts" }
|
||||||
libafl_targets = { path = "../../libafl_targets", features = ["sancov_pcguard_hitcounts", "libfuzzer", "sancov_cmplog", "pointer_maps"] }
|
libafl_targets = { path = "../../../libafl_targets", features = ["sancov_pcguard_hitcounts", "libfuzzer", "sancov_cmplog", "pointer_maps"] }
|
||||||
mimalloc = { version = "*", default-features = false }
|
mimalloc = { version = "*", default-features = false }
|
||||||
|
|
||||||
libafl_cc = { path = "../../libafl_cc/" }
|
libafl_cc = { path = "../../../libafl_cc/" }
|
||||||
|
|
||||||
[[bin]]
|
[[bin]]
|
||||||
name = "fuzzer_sd"
|
name = "fuzzer_sd"
|
@ -19,5 +19,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/" }
|
libafl = { path = "../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
@ -20,5 +20,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/", features = ["unicode"] }
|
libafl = { path = "../../../libafl/", features = ["unicode"] }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
@ -14,8 +14,8 @@ default = ["console_error_panic_hook"]
|
|||||||
js-sys = "0.3"
|
js-sys = "0.3"
|
||||||
wasm-bindgen = "0.2.63"
|
wasm-bindgen = "0.2.63"
|
||||||
|
|
||||||
libafl = { path = "../../libafl", default-features = false }
|
libafl = { path = "../../../libafl", default-features = false }
|
||||||
libafl_bolts = { path = "../../libafl_bolts", default-features = false }
|
libafl_bolts = { path = "../../../libafl_bolts", default-features = false }
|
||||||
|
|
||||||
# The `console_error_panic_hook` crate provides better debugging of panics by
|
# The `console_error_panic_hook` crate provides better debugging of panics by
|
||||||
# logging them with `console.error`. This is great for development, but requires
|
# logging them with `console.error`. This is great for development, but requires
|
@ -19,5 +19,5 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../libafl/" }
|
libafl = { path = "../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../libafl_bolts/" }
|
@ -15,8 +15,8 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { default-features = false, path = "../../libafl/" }
|
libafl = { default-features = false, path = "../../../libafl/" }
|
||||||
libafl_bolts = { default-features = false, path = "../../libafl_bolts/" }
|
libafl_bolts = { default-features = false, path = "../../../libafl_bolts/" }
|
||||||
static-alloc = "0.2.3"
|
static-alloc = "0.2.3"
|
||||||
|
|
||||||
[target.'cfg(unix)'.dependencies]
|
[target.'cfg(unix)'.dependencies]
|
@ -15,8 +15,8 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../../libafl/" }
|
libafl = { path = "../../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../../libafl_bolts/" }
|
||||||
libc = "0.2"
|
libc = "0.2"
|
||||||
|
|
||||||
[build-dependencies]
|
[build-dependencies]
|
@ -15,8 +15,8 @@ opt-level = 3
|
|||||||
debug = true
|
debug = true
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../../libafl/" }
|
libafl = { path = "../../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../../libafl_bolts/" }
|
||||||
libc = "0.2"
|
libc = "0.2"
|
||||||
|
|
||||||
[build-dependencies]
|
[build-dependencies]
|
@ -17,5 +17,5 @@ debug = true
|
|||||||
cc = "*"
|
cc = "*"
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../../libafl/" }
|
libafl = { path = "../../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../../libafl_bolts/" }
|
@ -14,5 +14,5 @@ codegen-units = 1
|
|||||||
opt-level = 3
|
opt-level = 3
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libafl = { path = "../../../libafl/" }
|
libafl = { path = "../../../../libafl/" }
|
||||||
libafl_bolts = { path = "../../../libafl_bolts/" }
|
libafl_bolts = { path = "../../../../libafl_bolts/" }
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user