mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-11 17:51:32 +00:00
* Output afl-clang-fast stuffs only if necessary (#1912) * afl-cc header * afl-cc common declarations - Add afl-cc-state.c - Strip includes, find_object, debug/be_quiet/have_*/callname setting from afl-cc.c - Use debugf_args in main - Modify execvp stuffs to fit new aflcc struct * afl-cc show usage * afl-cc mode selecting 1. compiler_mode by callname in argv[0] 2. compiler_mode by env "AFL_CC_COMPILER" 3. compiler_mode/instrument_mode by command line options "--afl-..." 4. instrument_mode/compiler_mode by various env vars including "AFL_LLVM_INSTRUMENT" 5. final checking steps 6. print "... - mode: %s-%s\n" 7. determine real argv[0] according to compiler_mode * afl-cc macro defs * afl-cc linking behaviors * afl-cc fsanitize behaviors * afl-cc misc * afl-cc body update * afl-cc all-in-one formated with custom-format.py * nits --------- Co-authored-by: vanhauser-thc <vh@thc.org> * changelog * update grammar mutator * lto llvm 12+ * docs(custom_mutators): fix missing ':' (#1953) * Fix broken LTO mode and response file support (#1948) * Strip `-Wl,-no-undefined` during compilation (#1952) Make the compiler wrapper stripping `-Wl,-no-undefined` in addition to `-Wl,--no-undefined`. Both versions of the flag are accepted by clang and, therefore, used by building systems in the wild (e.g., samba will not build without this fix). * Remove dead code in write_to_testcase (#1955) The custom_mutators_count check in if case is duplicate with if condition. The else case is custom_mutators_count == 0, neither custom_mutator_list iteration nor sent check needed. Signed-off-by: Xeonacid <h.dwwwwww@gmail.com> * update qemuafl * WIP: Add ability to generate drcov trace using QEMU backend (#1956) * Document new drcov QEMU plugin * Add link to lightkeeper for QEMU drcov file loading --------- Co-authored-by: Jean-Romain Garnier <jean-romain.garnier@airbus.com> * code format * changelog * sleep on uid != 0 afl-system-config * fix segv about skip_next, warn on unsupported cases of linking options (#1958) * todos * ensure afl-cc only allows available compiler modes * update grammar mutator * disable aslr on apple * fix for arm64 * help selective instrumentation * typos * macos * add compiler test script * apple fixes * bump nyx submodules (#1963) * fix docs * update changelog * update grammar mutator * improve compiler test script * gcc asan workaround (#1966) * fix github merge fuckup * fix * Fix afl-cc (#1968) - Check if too many cmdline params here, each time before insert a new param. - Check if it is "-fsanitize=..." before we do sth. - Remove improper param_st transfer. * Avoid adding llvmnative instrumentation when linking rust sanitizer runtime (#1969) * Dynamic instrumentation filtering for LLVM native (#1971) * Add two dynamic instrumentation filter methods to runtime * Always use pc-table with native pcguard * Add make_symbol_list.py and README * changelog * todos * new forkserver check * fix * nyx test for CI * improve nyx docs * Fixes to afl-cc and documentation (#1974) * Always compile with -ldl when building for CODE_COVERAGE When building with CODE_COVERAGE, the afl runtime contains code that calls `dladdr` which requires -ldl. Under most circumstances, clang already adds this (e.g. when building with pc-table), but there are some circumstances where it isn't added automatically. * Add visibility declaration to __afl_connected When building with hidden visibility, the use of __AFL_LOOP inside such code can cause linker errors due to __afl_connected being declared "hidden". * Update docs to clarify that CODE_COVERAGE=1 is required for dynamic_covfilter * nits * nyx build script updates * test error output * debug ci * debug ci * Improve afl-cc (#1975) * update response file support - full support of rsp file - fix some segv issues * Improve afl-cc - remove dead code about allow/denylist options of sancov - missing `if (!aflcc->have_msan)` - add docs for each function - typo * enable nyx * debug ci * debug ci * debug ci * debug ci * debug ci * debug ci * debug ci * debug ci * fix ci * clean test script * NO_NYX * NO_NYX * fix ci * debug ci * fix ci * finalize ci fix * Enhancement on Deterministic stage (#1972) * fuzzer: init commit based on aflpp 60dc37a8cf09f8e9048e4b6a2204d6c90b27655a * fuzzers: adding the skip variables and initialize * log: profile the det/havoc finding * log: add profile log output * fuzzers: sperate log/skipdet module * fuzzers: add quick eff_map calc * fuzzers: add skip_eff_map in fuzz_one * fuzzers: mark whole input space in eff_map * fuzzers: add undet bit threshold to skip some seeds * fuzzers: fix one byte overflow * fuzzers: fix overflow * fix code format * add havoc only again * code format * remove log to INTROSPECTION, rename skipdet module * rename skipdet module * remove log to stats * clean redundant code * code format * remove redundant code format check * remove redundant doc * remove redundant objects * clean files * change -d to default skipdet * disable deterministic when using CUSTOM_MUTATOR * revert fix * final touches for skipdet * remove unused var * remove redundant eff struct (#1977) * update QEMU-Nyx submodule (#1978) * update QEMU-Nyx submodule (#1980) * Fix type in AFL_NOOPT env variable in afl-cc help message (#1982) * nits * 2024 v4.10c release * fixes --------- Signed-off-by: Xeonacid <h.dwwwwww@gmail.com> Co-authored-by: Sonic <50692172+SonicStark@users.noreply.github.com> Co-authored-by: Xeonacid <h.dwwwwww@gmail.com> Co-authored-by: Nils Bars <nils.bars@rub.de> Co-authored-by: Jean-Romain Garnier <7504819+JRomainG@users.noreply.github.com> Co-authored-by: Jean-Romain Garnier <jean-romain.garnier@airbus.com> Co-authored-by: Sergej Schumilo <sergej@schumilo.de> Co-authored-by: Christian Holler (:decoder) <choller@mozilla.com> Co-authored-by: Han Zheng <35988108+kdsjZh@users.noreply.github.com> Co-authored-by: Khaled Yakdan <yakdan@code-intelligence.com>
368 lines
8.6 KiB
C
368 lines
8.6 KiB
C
/*
|
|
american fuzzy lop++ - shared memory related code
|
|
-------------------------------------------------
|
|
|
|
Originally written by Michal Zalewski
|
|
|
|
Forkserver design by Jann Horn <jannhorn@googlemail.com>
|
|
|
|
Now maintained by Marc Heuse <mh@mh-sec.de>,
|
|
Heiko Eißfeldt <heiko.eissfeldt@hexco.de> and
|
|
Andrea Fioraldi <andreafioraldi@gmail.com>
|
|
|
|
Copyright 2016, 2017 Google Inc. All rights reserved.
|
|
Copyright 2019-2024 AFLplusplus Project. All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at:
|
|
|
|
https://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Shared code to handle the shared memory. This is used by the fuzzer
|
|
as well the other components like afl-tmin, afl-showmap, etc...
|
|
|
|
*/
|
|
|
|
#define AFL_MAIN
|
|
|
|
#ifdef __ANDROID__
|
|
#include "android-ashmem.h"
|
|
#endif
|
|
#include "config.h"
|
|
#include "types.h"
|
|
#include "debug.h"
|
|
#include "alloc-inl.h"
|
|
#include "hash.h"
|
|
#include "sharedmem.h"
|
|
#include "cmplog.h"
|
|
#include "list.h"
|
|
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
#include <dirent.h>
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/wait.h>
|
|
#include <sys/time.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#include <sys/resource.h>
|
|
#include <sys/mman.h>
|
|
|
|
#ifndef USEMMAP
|
|
#include <sys/ipc.h>
|
|
#include <sys/shm.h>
|
|
#endif
|
|
|
|
static list_t shm_list = {.element_prealloc_count = 0};
|
|
|
|
/* Get rid of shared memory. */
|
|
|
|
void afl_shm_deinit(sharedmem_t *shm) {
|
|
|
|
if (shm == NULL) { return; }
|
|
list_remove(&shm_list, shm);
|
|
if (shm->shmemfuzz_mode) {
|
|
|
|
unsetenv(SHM_FUZZ_ENV_VAR);
|
|
|
|
} else {
|
|
|
|
unsetenv(SHM_ENV_VAR);
|
|
|
|
}
|
|
|
|
#ifdef USEMMAP
|
|
if (shm->map != NULL) {
|
|
|
|
munmap(shm->map, shm->map_size);
|
|
shm->map = NULL;
|
|
|
|
}
|
|
|
|
if (shm->g_shm_fd != -1) {
|
|
|
|
close(shm->g_shm_fd);
|
|
shm->g_shm_fd = -1;
|
|
|
|
}
|
|
|
|
if (shm->g_shm_file_path[0]) {
|
|
|
|
shm_unlink(shm->g_shm_file_path);
|
|
shm->g_shm_file_path[0] = 0;
|
|
|
|
}
|
|
|
|
if (shm->cmplog_mode) {
|
|
|
|
unsetenv(CMPLOG_SHM_ENV_VAR);
|
|
|
|
if (shm->cmp_map != NULL) {
|
|
|
|
munmap(shm->cmp_map, shm->map_size);
|
|
shm->cmp_map = NULL;
|
|
|
|
}
|
|
|
|
if (shm->cmplog_g_shm_fd != -1) {
|
|
|
|
close(shm->cmplog_g_shm_fd);
|
|
shm->cmplog_g_shm_fd = -1;
|
|
|
|
}
|
|
|
|
if (shm->cmplog_g_shm_file_path[0]) {
|
|
|
|
shm_unlink(shm->cmplog_g_shm_file_path);
|
|
shm->cmplog_g_shm_file_path[0] = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else
|
|
shmctl(shm->shm_id, IPC_RMID, NULL);
|
|
if (shm->cmplog_mode) { shmctl(shm->cmplog_shm_id, IPC_RMID, NULL); }
|
|
#endif
|
|
|
|
shm->map = NULL;
|
|
|
|
}
|
|
|
|
/* Configure shared memory.
|
|
Returns a pointer to shm->map for ease of use.
|
|
*/
|
|
|
|
u8 *afl_shm_init(sharedmem_t *shm, size_t map_size,
|
|
unsigned char non_instrumented_mode) {
|
|
|
|
shm->map_size = 0;
|
|
|
|
shm->map = NULL;
|
|
shm->cmp_map = NULL;
|
|
|
|
#ifdef USEMMAP
|
|
|
|
shm->g_shm_fd = -1;
|
|
shm->cmplog_g_shm_fd = -1;
|
|
|
|
const int shmflags = O_RDWR | O_EXCL;
|
|
|
|
/* ======
|
|
generate random file name for multi instance
|
|
|
|
thanks to f*cking glibc we can not use tmpnam securely, it generates a
|
|
security warning that cannot be suppressed
|
|
so we do this worse workaround */
|
|
snprintf(shm->g_shm_file_path, L_tmpnam, "/afl_%d_%ld", getpid(), random());
|
|
|
|
#ifdef SHM_LARGEPAGE_ALLOC_DEFAULT
|
|
/* trying to get large memory segment optimised and monitorable separately as
|
|
* such */
|
|
static size_t sizes[4] = {(size_t)-1};
|
|
static int psizes = 0;
|
|
int i;
|
|
if (sizes[0] == (size_t)-1) { psizes = getpagesizes(sizes, 4); }
|
|
|
|
/* very unlikely to fail even if the arch supports only two sizes */
|
|
if (likely(psizes > 0)) {
|
|
|
|
for (i = psizes - 1; shm->g_shm_fd == -1 && i >= 0; --i) {
|
|
|
|
if (sizes[i] == 0 || map_size % sizes[i]) { continue; }
|
|
|
|
shm->g_shm_fd =
|
|
shm_create_largepage(shm->g_shm_file_path, shmflags, i,
|
|
SHM_LARGEPAGE_ALLOC_DEFAULT, DEFAULT_PERMISSION);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
/* create the shared memory segment as if it was a file */
|
|
if (shm->g_shm_fd == -1) {
|
|
|
|
shm->g_shm_fd =
|
|
shm_open(shm->g_shm_file_path, shmflags | O_CREAT, DEFAULT_PERMISSION);
|
|
|
|
}
|
|
|
|
if (shm->g_shm_fd == -1) { PFATAL("shm_open() failed"); }
|
|
|
|
/* configure the size of the shared memory segment */
|
|
if (ftruncate(shm->g_shm_fd, map_size)) {
|
|
|
|
PFATAL("setup_shm(): ftruncate() failed");
|
|
|
|
}
|
|
|
|
/* map the shared memory segment to the address space of the process */
|
|
shm->map =
|
|
mmap(0, map_size, PROT_READ | PROT_WRITE, MAP_SHARED, shm->g_shm_fd, 0);
|
|
if (shm->map == MAP_FAILED) {
|
|
|
|
close(shm->g_shm_fd);
|
|
shm->g_shm_fd = -1;
|
|
shm_unlink(shm->g_shm_file_path);
|
|
shm->g_shm_file_path[0] = 0;
|
|
PFATAL("mmap() failed");
|
|
|
|
}
|
|
|
|
/* If somebody is asking us to fuzz instrumented binaries in non-instrumented
|
|
mode, we don't want them to detect instrumentation, since we won't be
|
|
sending fork server commands. This should be replaced with better
|
|
auto-detection later on, perhaps? */
|
|
|
|
if (!non_instrumented_mode) setenv(SHM_ENV_VAR, shm->g_shm_file_path, 1);
|
|
|
|
if (shm->map == (void *)-1 || !shm->map) PFATAL("mmap() failed");
|
|
|
|
if (shm->cmplog_mode) {
|
|
|
|
snprintf(shm->cmplog_g_shm_file_path, L_tmpnam, "/afl_cmplog_%d_%ld",
|
|
getpid(), random());
|
|
|
|
/* create the shared memory segment as if it was a file */
|
|
shm->cmplog_g_shm_fd =
|
|
shm_open(shm->cmplog_g_shm_file_path, O_CREAT | O_RDWR | O_EXCL,
|
|
DEFAULT_PERMISSION);
|
|
if (shm->cmplog_g_shm_fd == -1) { PFATAL("shm_open() failed"); }
|
|
|
|
/* configure the size of the shared memory segment */
|
|
if (ftruncate(shm->cmplog_g_shm_fd, map_size)) {
|
|
|
|
PFATAL("setup_shm(): cmplog ftruncate() failed");
|
|
|
|
}
|
|
|
|
/* map the shared memory segment to the address space of the process */
|
|
shm->cmp_map = mmap(0, map_size, PROT_READ | PROT_WRITE, MAP_SHARED,
|
|
shm->cmplog_g_shm_fd, 0);
|
|
if (shm->cmp_map == MAP_FAILED) {
|
|
|
|
close(shm->cmplog_g_shm_fd);
|
|
shm->cmplog_g_shm_fd = -1;
|
|
shm_unlink(shm->cmplog_g_shm_file_path);
|
|
shm->cmplog_g_shm_file_path[0] = 0;
|
|
PFATAL("mmap() failed");
|
|
|
|
}
|
|
|
|
/* If somebody is asking us to fuzz instrumented binaries in
|
|
non-instrumented mode, we don't want them to detect instrumentation,
|
|
since we won't be sending fork server commands. This should be replaced
|
|
with better auto-detection later on, perhaps? */
|
|
|
|
if (!non_instrumented_mode)
|
|
setenv(CMPLOG_SHM_ENV_VAR, shm->cmplog_g_shm_file_path, 1);
|
|
|
|
if (shm->cmp_map == (void *)-1 || !shm->cmp_map)
|
|
PFATAL("cmplog mmap() failed");
|
|
|
|
}
|
|
|
|
#else
|
|
u8 *shm_str;
|
|
|
|
// for qemu+unicorn we have to increase by 8 to account for potential
|
|
// compcov map overwrite
|
|
shm->shm_id =
|
|
shmget(IPC_PRIVATE, map_size == MAP_SIZE ? map_size + 8 : map_size,
|
|
IPC_CREAT | IPC_EXCL | DEFAULT_PERMISSION);
|
|
if (shm->shm_id < 0) {
|
|
|
|
PFATAL("shmget() failed, try running afl-system-config");
|
|
|
|
}
|
|
|
|
if (shm->cmplog_mode) {
|
|
|
|
shm->cmplog_shm_id = shmget(IPC_PRIVATE, sizeof(struct cmp_map),
|
|
IPC_CREAT | IPC_EXCL | DEFAULT_PERMISSION);
|
|
|
|
if (shm->cmplog_shm_id < 0) {
|
|
|
|
shmctl(shm->shm_id, IPC_RMID, NULL); // do not leak shmem
|
|
PFATAL("shmget() failed, try running afl-system-config");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!non_instrumented_mode) {
|
|
|
|
shm_str = alloc_printf("%d", shm->shm_id);
|
|
|
|
/* If somebody is asking us to fuzz instrumented binaries in
|
|
non-instrumented mode, we don't want them to detect instrumentation,
|
|
since we won't be sending fork server commands. This should be replaced
|
|
with better auto-detection later on, perhaps? */
|
|
|
|
setenv(SHM_ENV_VAR, shm_str, 1);
|
|
|
|
ck_free(shm_str);
|
|
|
|
}
|
|
|
|
if (shm->cmplog_mode && !non_instrumented_mode) {
|
|
|
|
shm_str = alloc_printf("%d", shm->cmplog_shm_id);
|
|
|
|
setenv(CMPLOG_SHM_ENV_VAR, shm_str, 1);
|
|
|
|
ck_free(shm_str);
|
|
|
|
}
|
|
|
|
shm->map = shmat(shm->shm_id, NULL, 0);
|
|
|
|
if (shm->map == (void *)-1 || !shm->map) {
|
|
|
|
shmctl(shm->shm_id, IPC_RMID, NULL); // do not leak shmem
|
|
|
|
if (shm->cmplog_mode) {
|
|
|
|
shmctl(shm->cmplog_shm_id, IPC_RMID, NULL); // do not leak shmem
|
|
|
|
}
|
|
|
|
PFATAL("shmat() failed");
|
|
|
|
}
|
|
|
|
if (shm->cmplog_mode) {
|
|
|
|
shm->cmp_map = shmat(shm->cmplog_shm_id, NULL, 0);
|
|
|
|
if (shm->cmp_map == (void *)-1 || !shm->cmp_map) {
|
|
|
|
shmctl(shm->shm_id, IPC_RMID, NULL); // do not leak shmem
|
|
|
|
shmctl(shm->cmplog_shm_id, IPC_RMID, NULL); // do not leak shmem
|
|
|
|
PFATAL("shmat() failed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
shm->map_size = map_size;
|
|
list_append(&shm_list, shm);
|
|
|
|
return shm->map;
|
|
|
|
}
|
|
|