mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-13 10:38:07 +00:00
* Output afl-clang-fast stuffs only if necessary (#1912)
* afl-cc header
* afl-cc common declarations
- Add afl-cc-state.c
- Strip includes, find_object, debug/be_quiet/have_*/callname setting from afl-cc.c
- Use debugf_args in main
- Modify execvp stuffs to fit new aflcc struct
* afl-cc show usage
* afl-cc mode selecting
1. compiler_mode by callname in argv[0]
2. compiler_mode by env "AFL_CC_COMPILER"
3. compiler_mode/instrument_mode by command line options "--afl-..."
4. instrument_mode/compiler_mode by various env vars including "AFL_LLVM_INSTRUMENT"
5. final checking steps
6. print "... - mode: %s-%s\n"
7. determine real argv[0] according to compiler_mode
* afl-cc macro defs
* afl-cc linking behaviors
* afl-cc fsanitize behaviors
* afl-cc misc
* afl-cc body update
* afl-cc all-in-one
formated with custom-format.py
* nits
---------
Co-authored-by: vanhauser-thc <vh@thc.org>
* changelog
* update grammar mutator
* lto llvm 12+
* docs(custom_mutators): fix missing ':' (#1953)
* Fix broken LTO mode and response file support (#1948)
* Strip `-Wl,-no-undefined` during compilation (#1952)
Make the compiler wrapper stripping `-Wl,-no-undefined` in addition to `-Wl,--no-undefined`.
Both versions of the flag are accepted by clang and, therefore, used by building systems in the wild (e.g., samba will not build without this fix).
* Remove dead code in write_to_testcase (#1955)
The custom_mutators_count check in if case is duplicate with if condition.
The else case is custom_mutators_count == 0, neither custom_mutator_list iteration nor sent check needed.
Signed-off-by: Xeonacid <h.dwwwwww@gmail.com>
* update qemuafl
* WIP: Add ability to generate drcov trace using QEMU backend (#1956)
* Document new drcov QEMU plugin
* Add link to lightkeeper for QEMU drcov file loading
---------
Co-authored-by: Jean-Romain Garnier <jean-romain.garnier@airbus.com>
* code format
* changelog
* sleep on uid != 0 afl-system-config
* fix segv about skip_next, warn on unsupported cases of linking options (#1958)
* todos
* ensure afl-cc only allows available compiler modes
* update grammar mutator
* disable aslr on apple
* fix for arm64
* help selective instrumentation
* typos
* macos
* add compiler test script
* apple fixes
* bump nyx submodules (#1963)
* fix docs
* update changelog
* update grammar mutator
* improve compiler test script
* gcc asan workaround (#1966)
* fix github merge fuckup
* fix
* Fix afl-cc (#1968)
- Check if too many cmdline params here, each time before insert a new param.
- Check if it is "-fsanitize=..." before we do sth.
- Remove improper param_st transfer.
* Avoid adding llvmnative instrumentation when linking rust sanitizer runtime (#1969)
* Dynamic instrumentation filtering for LLVM native (#1971)
* Add two dynamic instrumentation filter methods to runtime
* Always use pc-table with native pcguard
* Add make_symbol_list.py and README
* changelog
* todos
* new forkserver check
* fix
* nyx test for CI
* improve nyx docs
* Fixes to afl-cc and documentation (#1974)
* Always compile with -ldl when building for CODE_COVERAGE
When building with CODE_COVERAGE, the afl runtime contains code that
calls `dladdr` which requires -ldl. Under most circumstances, clang
already adds this (e.g. when building with pc-table), but there are some
circumstances where it isn't added automatically.
* Add visibility declaration to __afl_connected
When building with hidden visibility, the use of __AFL_LOOP inside such
code can cause linker errors due to __afl_connected being declared
"hidden".
* Update docs to clarify that CODE_COVERAGE=1 is required for dynamic_covfilter
* nits
* nyx build script updates
* test error output
* debug ci
* debug ci
* Improve afl-cc (#1975)
* update response file support
- full support of rsp file
- fix some segv issues
* Improve afl-cc
- remove dead code about allow/denylist options of sancov
- missing `if (!aflcc->have_msan)`
- add docs for each function
- typo
* enable nyx
* debug ci
* debug ci
* debug ci
* debug ci
* debug ci
* debug ci
* debug ci
* debug ci
* fix ci
* clean test script
* NO_NYX
* NO_NYX
* fix ci
* debug ci
* fix ci
* finalize ci fix
* Enhancement on Deterministic stage (#1972)
* fuzzer: init commit based on aflpp 60dc37a8cf
* fuzzers: adding the skip variables and initialize
* log: profile the det/havoc finding
* log: add profile log output
* fuzzers: sperate log/skipdet module
* fuzzers: add quick eff_map calc
* fuzzers: add skip_eff_map in fuzz_one
* fuzzers: mark whole input space in eff_map
* fuzzers: add undet bit threshold to skip some seeds
* fuzzers: fix one byte overflow
* fuzzers: fix overflow
* fix code format
* add havoc only again
* code format
* remove log to INTROSPECTION, rename skipdet module
* rename skipdet module
* remove log to stats
* clean redundant code
* code format
* remove redundant code format check
* remove redundant doc
* remove redundant objects
* clean files
* change -d to default skipdet
* disable deterministic when using CUSTOM_MUTATOR
* revert fix
* final touches for skipdet
* remove unused var
* remove redundant eff struct (#1977)
* update QEMU-Nyx submodule (#1978)
* update QEMU-Nyx submodule (#1980)
* Fix type in AFL_NOOPT env variable in afl-cc help message (#1982)
* nits
* 2024 v4.10c release
* fixes
---------
Signed-off-by: Xeonacid <h.dwwwwww@gmail.com>
Co-authored-by: Sonic <50692172+SonicStark@users.noreply.github.com>
Co-authored-by: Xeonacid <h.dwwwwww@gmail.com>
Co-authored-by: Nils Bars <nils.bars@rub.de>
Co-authored-by: Jean-Romain Garnier <7504819+JRomainG@users.noreply.github.com>
Co-authored-by: Jean-Romain Garnier <jean-romain.garnier@airbus.com>
Co-authored-by: Sergej Schumilo <sergej@schumilo.de>
Co-authored-by: Christian Holler (:decoder) <choller@mozilla.com>
Co-authored-by: Han Zheng <35988108+kdsjZh@users.noreply.github.com>
Co-authored-by: Khaled Yakdan <yakdan@code-intelligence.com>
252 lines
5.4 KiB
C
252 lines
5.4 KiB
C
/*
|
|
american fuzzy lop++ - afl-proxy skeleton example
|
|
---------------------------------------------------
|
|
|
|
Written by Marc Heuse <mh@mh-sec.de>
|
|
|
|
Copyright 2019-2024 AFLplusplus Project. All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at:
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
HOW-TO
|
|
======
|
|
|
|
You only need to change the while() loop of the main() to send the
|
|
data of buf[] with length len to the target and write the coverage
|
|
information to __afl_area_ptr[__afl_map_size]
|
|
|
|
|
|
*/
|
|
|
|
#ifdef __ANDROID__
|
|
#include "android-ashmem.h"
|
|
#endif
|
|
#include "config.h"
|
|
#include "types.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <signal.h>
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <assert.h>
|
|
#include <stdint.h>
|
|
#include <errno.h>
|
|
|
|
#include <sys/mman.h>
|
|
#include <sys/shm.h>
|
|
#include <sys/wait.h>
|
|
#include <sys/types.h>
|
|
#include <fcntl.h>
|
|
|
|
u8 *__afl_area_ptr;
|
|
|
|
#ifdef __ANDROID__
|
|
u32 __afl_map_size = MAP_SIZE;
|
|
#else
|
|
__thread u32 __afl_map_size = MAP_SIZE;
|
|
#endif
|
|
|
|
/* Error reporting to forkserver controller */
|
|
|
|
void send_forkserver_error(int error) {
|
|
|
|
u32 status;
|
|
if (!error || error > 0xffff) return;
|
|
status = (FS_OPT_ERROR | FS_OPT_SET_ERROR(error));
|
|
if (write(FORKSRV_FD + 1, (char *)&status, 4) != 4) return;
|
|
|
|
}
|
|
|
|
/* SHM setup. */
|
|
|
|
static void __afl_map_shm(void) {
|
|
|
|
char *id_str = getenv(SHM_ENV_VAR);
|
|
char *ptr;
|
|
|
|
/* NOTE TODO BUG FIXME: if you want to supply a variable sized map then
|
|
uncomment the following: */
|
|
|
|
/*
|
|
if ((ptr = getenv("AFL_MAP_SIZE")) != NULL) {
|
|
|
|
u32 val = atoi(ptr);
|
|
if (val > 0) __afl_map_size = val;
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
if (__afl_map_size > MAP_SIZE) {
|
|
|
|
if (__afl_map_size > FS_OPT_MAX_MAPSIZE) {
|
|
|
|
fprintf(stderr,
|
|
"Error: AFL++ tools *require* to set AFL_MAP_SIZE to %u to "
|
|
"be able to run this instrumented program!\n",
|
|
__afl_map_size);
|
|
if (id_str) {
|
|
|
|
send_forkserver_error(FS_ERROR_MAP_SIZE);
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
fprintf(stderr,
|
|
"Warning: AFL++ tools will need to set AFL_MAP_SIZE to %u to "
|
|
"be able to run this instrumented program!\n",
|
|
__afl_map_size);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (id_str) {
|
|
|
|
#ifdef USEMMAP
|
|
const char *shm_file_path = id_str;
|
|
int shm_fd = -1;
|
|
unsigned char *shm_base = NULL;
|
|
|
|
/* create the shared memory segment as if it was a file */
|
|
shm_fd = shm_open(shm_file_path, O_RDWR, 0600);
|
|
if (shm_fd == -1) {
|
|
|
|
fprintf(stderr, "shm_open() failed\n");
|
|
send_forkserver_error(FS_ERROR_SHM_OPEN);
|
|
exit(1);
|
|
|
|
}
|
|
|
|
/* map the shared memory segment to the address space of the process */
|
|
shm_base =
|
|
mmap(0, __afl_map_size, PROT_READ | PROT_WRITE, MAP_SHARED, shm_fd, 0);
|
|
|
|
if (shm_base == MAP_FAILED) {
|
|
|
|
close(shm_fd);
|
|
shm_fd = -1;
|
|
|
|
fprintf(stderr, "mmap() failed\n");
|
|
send_forkserver_error(FS_ERROR_MMAP);
|
|
exit(2);
|
|
|
|
}
|
|
|
|
__afl_area_ptr = shm_base;
|
|
#else
|
|
u32 shm_id = atoi(id_str);
|
|
|
|
__afl_area_ptr = shmat(shm_id, 0, 0);
|
|
|
|
#endif
|
|
|
|
if (__afl_area_ptr == (void *)-1) {
|
|
|
|
send_forkserver_error(FS_ERROR_SHMAT);
|
|
exit(1);
|
|
|
|
}
|
|
|
|
/* Write something into the bitmap so that the parent doesn't give up */
|
|
|
|
__afl_area_ptr[0] = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Fork server logic. */
|
|
|
|
static void __afl_start_forkserver(void) {
|
|
|
|
u8 tmp[4] = {0, 0, 0, 0};
|
|
u32 status = 0;
|
|
|
|
if (__afl_map_size <= FS_OPT_MAX_MAPSIZE)
|
|
status |= (FS_OPT_SET_MAPSIZE(__afl_map_size) | FS_OPT_MAPSIZE);
|
|
if (status) status |= (FS_OPT_ENABLED);
|
|
memcpy(tmp, &status, 4);
|
|
|
|
/* Phone home and tell the parent that we're OK. */
|
|
|
|
if (write(FORKSRV_FD + 1, tmp, 4) != 4) return;
|
|
|
|
}
|
|
|
|
static u32 __afl_next_testcase(u8 *buf, u32 max_len) {
|
|
|
|
s32 status, res = 0xffffff;
|
|
|
|
/* Wait for parent by reading from the pipe. Abort if read fails. */
|
|
if (read(FORKSRV_FD, &status, 4) != 4) return 0;
|
|
|
|
/* we have a testcase - read it */
|
|
status = read(0, buf, max_len);
|
|
|
|
/* report that we are starting the target */
|
|
if (write(FORKSRV_FD + 1, &res, 4) != 4) return 0;
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
static void __afl_end_testcase(void) {
|
|
|
|
int status = 0xffffff;
|
|
|
|
if (write(FORKSRV_FD + 1, &status, 4) != 4) exit(1);
|
|
|
|
}
|
|
|
|
/* you just need to modify the while() loop in this main() */
|
|
|
|
int main(int argc, char *argv[]) {
|
|
|
|
/* This is were the testcase data is written into */
|
|
u8 buf[1024]; // this is the maximum size for a test case! set it!
|
|
s32 len;
|
|
|
|
/* here you specify the map size you need that you are reporting to
|
|
afl-fuzz. Any value is fine as long as it can be divided by 32. */
|
|
__afl_map_size = MAP_SIZE; // default is 65536
|
|
|
|
/* then we initialize the shared memory map and start the forkserver */
|
|
__afl_map_shm();
|
|
__afl_start_forkserver();
|
|
|
|
while ((len = __afl_next_testcase(buf, sizeof(buf))) > 0) {
|
|
|
|
if (len > 4) { // the minimum data size you need for the target
|
|
|
|
/* here you have to create the magic that feeds the buf/len to the
|
|
target and write the coverage to __afl_area_ptr */
|
|
|
|
// ... the magic ...
|
|
|
|
// remove this, this is just to make afl-fuzz not complain when run
|
|
if (buf[0] == 0xff)
|
|
__afl_area_ptr[1] = 1;
|
|
else
|
|
__afl_area_ptr[2] = 2;
|
|
|
|
}
|
|
|
|
/* report the test case is done and wait for the next */
|
|
__afl_end_testcase();
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|