mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-09 16:51:34 +00:00
* sync (#886) * Create FUNDING.yml * Update FUNDING.yml * moved custom_mutator examples * unicorn speedtest makefile cleanup * fixed example location * fix qdbi * update util readme * Frida persistent (#880) * Added x64 support for persistent mode (function call only), in-memory teest cases and complog * Review changes, fix NeverZero and code to parse the .text section of the main executable. Excluded ranges TBC * Various minor fixes and finished support for AFL_INST_LIBS * Review changes Co-authored-by: Your Name <you@example.com> * nits * fix frida mode * Integer overflow/underflow fixes in libdislocator (#889) * libdislocator: fixing integer overflow in 'max_mem' variable and setting 'max_mem' type to 'size_t' * libdislocator: fixing potential integer underflow in 'total_mem' variable due to its different values in different threads * Bumped warnings up to the max and fixed remaining issues (#890) Co-authored-by: Your Name <you@example.com> * nits * frida mode - support non-pie * nits * nit * update grammar mutator * Fixes for aarch64, OSX and other minor issues (#891) Co-authored-by: Your Name <you@example.com> * nits * nits * fix PCGUARD, build aflpp_driver with fPIC * Added representative fuzzbench test and test for libxml (#893) * Added representative fuzzbench test and test for libxml * Added support for building FRIDA from source with FRIDA_SOURCE=1 Co-authored-by: Your Name <you@example.com> * nits * update changelog * typos * fixed potential double free in custom trim (#881) * error handling, freeing mem * frida: complog -> cmplog * fix statsd writing * let aflpp_qemu_driver_hook.so build fail gracefully * fix stdin trimming * Support for AFL_ENTRYPOINT (#898) Co-authored-by: Your Name <you@example.com> * remove the input file .cur_input at the end of the fuzzing, if AFL_TMPDIR is used * reverse push (#901) * Create FUNDING.yml * Update FUNDING.yml * disable QEMU static pie Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> * clarify that no modifications are required. * add new test for frida_mode (please review) * typos * fix persistent mode (64-bit) * set ARCH for linux intel 32-bit for frida-gum-devkit * prepare for 32-bit support (later) * not on qemu 3 anymore * unicorn mips fixes * instrumentation further move to C++11 (#900) * unicorn fixes * more unicorn fixes * Fix memory errors when trim causes testcase growth (#881) (#903) * Revert "fixed potential double free in custom trim (#881)" This reverts commit e9d2f72382cab75832721d859c3e731da071435d. * Revert "fix custom trim for increasing data" This reverts commit 86a8ef168dda766d2f25f15c15c4d3ecf21d0667. * Fix memory errors when trim causes testcase growth Modify trim_case_custom to avoid writing into in_buf because some custom mutators can cause the testcase to grow rather than shrink. Instead of modifying in_buf directly, we write the update out to the disk when trimming is complete, and then the caller is responsible for refreshing the in-memory buffer from the file. This is still a bit sketchy because it does need to modify q->len in order to notify the upper layers that something changed, and it could end up telling upper layer code that the q->len is *bigger* than the buffer (q->testcase_buf) that contains it, which is asking for trouble down the line somewhere... * Fix an unlikely situation Put back some `unlikely()` calls that were in the e9d2f72382cab75832721d859c3e731da071435d commit that was reverted. * typo * Exit on time (#904) * Variable AFL_EXIT_ON_TIME description has been added. Variables AFL_EXIT_ON_TIME and afl_exit_on_time has been added. afl->exit_on_time variable initialization has been added. The asignment of a value to the afl->afl_env.afl_exit_on_time variable from environment variables has been added. Code to exit on timeout if new path not found has been added. * Type of afl_exit_on_time variable has been changed. Variable exit_on_time has been added to the afl_state_t structure. * Command `export AFL_EXIT_WHEN_DONE=1` has been added. * Millisecond to second conversion has been added. Call get_cur_time() has been added. * Revert to using the saved current time value. * Useless check has been removed. * fix new path to custom-mutators * ensure crashes/README.txt exists * fix * Changes to bump FRIDA version and to clone FRIDA repo in to build directory rather than use a submodule as the FRIDA build scripts don't like it (#906) Co-authored-by: Your Name <you@example.com> * Fix numeric overflow in cmplog implementation (#907) Co-authored-by: Your Name <you@example.com> * testcase fixes for unicorn * remove merge conflict artifacts * fix afl-plot * Changes to remove binaries from frida_mode (#913) Co-authored-by: Your Name <you@example.com> * Frida cmplog fail fast (#914) * Changes to remove binaries from frida_mode * Changes to make cmplog fail fast Co-authored-by: Your Name <you@example.com> * afl-plot: relative time * arch linux and mac os support for afl-system-config * typo * code-format * update documentation Co-authored-by: Dominik Maier <domenukk@gmail.com> Co-authored-by: WorksButNotTested <62701594+WorksButNotTested@users.noreply.github.com> Co-authored-by: Your Name <you@example.com> Co-authored-by: Dmitry Zheregelya <zheregelya.d@gmail.com> Co-authored-by: hexcoder <hexcoder-@users.noreply.github.com> Co-authored-by: hexcoder- <heiko@hexco.de> Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> Co-authored-by: David CARLIER <devnexen@gmail.com> Co-authored-by: realmadsci <71108352+realmadsci@users.noreply.github.com> Co-authored-by: Roman M. Iudichev <SecNotice@ya.ru>
343 lines
7.1 KiB
C
343 lines
7.1 KiB
C
#ifndef CUSTOM_MUTATOR_HELPERS
|
|
#define CUSTOM_MUTATOR_HELPERS
|
|
|
|
#include "config.h"
|
|
#include "types.h"
|
|
#include <stdlib.h>
|
|
|
|
#define INITIAL_GROWTH_SIZE (64)
|
|
|
|
#define RAND_BELOW(limit) (rand() % (limit))
|
|
|
|
/* Use in a struct: creates a name_buf and a name_size variable. */
|
|
#define BUF_VAR(type, name) \
|
|
type * name##_buf; \
|
|
size_t name##_size;
|
|
/* this fills in `&structptr->something_buf, &structptr->something_size`. */
|
|
#define BUF_PARAMS(struct, name) \
|
|
(void **)&struct->name##_buf, &struct->name##_size
|
|
|
|
typedef struct {
|
|
|
|
} afl_t;
|
|
|
|
static void surgical_havoc_mutate(u8 *out_buf, s32 begin, s32 end) {
|
|
|
|
static s8 interesting_8[] = {INTERESTING_8};
|
|
static s16 interesting_16[] = {INTERESTING_8, INTERESTING_16};
|
|
static s32 interesting_32[] = {INTERESTING_8, INTERESTING_16, INTERESTING_32};
|
|
|
|
switch (RAND_BELOW(12)) {
|
|
|
|
case 0: {
|
|
|
|
/* Flip a single bit somewhere. Spooky! */
|
|
|
|
s32 bit_idx = ((RAND_BELOW(end - begin) + begin) << 3) + RAND_BELOW(8);
|
|
|
|
out_buf[bit_idx >> 3] ^= 128 >> (bit_idx & 7);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 1: {
|
|
|
|
/* Set byte to interesting value. */
|
|
|
|
u8 val = interesting_8[RAND_BELOW(sizeof(interesting_8))];
|
|
out_buf[(RAND_BELOW(end - begin) + begin)] = val;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 2: {
|
|
|
|
/* Set word to interesting value, randomly choosing endian. */
|
|
|
|
if (end - begin < 2) break;
|
|
|
|
s32 byte_idx = (RAND_BELOW(end - begin) + begin);
|
|
|
|
if (byte_idx >= end - 1) break;
|
|
|
|
switch (RAND_BELOW(2)) {
|
|
|
|
case 0:
|
|
*(u16 *)(out_buf + byte_idx) =
|
|
interesting_16[RAND_BELOW(sizeof(interesting_16) >> 1)];
|
|
break;
|
|
case 1:
|
|
*(u16 *)(out_buf + byte_idx) =
|
|
SWAP16(interesting_16[RAND_BELOW(sizeof(interesting_16) >> 1)]);
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 3: {
|
|
|
|
/* Set dword to interesting value, randomly choosing endian. */
|
|
|
|
if (end - begin < 4) break;
|
|
|
|
s32 byte_idx = (RAND_BELOW(end - begin) + begin);
|
|
|
|
if (byte_idx >= end - 3) break;
|
|
|
|
switch (RAND_BELOW(2)) {
|
|
|
|
case 0:
|
|
*(u32 *)(out_buf + byte_idx) =
|
|
interesting_32[RAND_BELOW(sizeof(interesting_32) >> 2)];
|
|
break;
|
|
case 1:
|
|
*(u32 *)(out_buf + byte_idx) =
|
|
SWAP32(interesting_32[RAND_BELOW(sizeof(interesting_32) >> 2)]);
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 4: {
|
|
|
|
/* Set qword to interesting value, randomly choosing endian. */
|
|
|
|
if (end - begin < 8) break;
|
|
|
|
s32 byte_idx = (RAND_BELOW(end - begin) + begin);
|
|
|
|
if (byte_idx >= end - 7) break;
|
|
|
|
switch (RAND_BELOW(2)) {
|
|
|
|
case 0:
|
|
*(u64 *)(out_buf + byte_idx) =
|
|
(s64)interesting_32[RAND_BELOW(sizeof(interesting_32) >> 2)];
|
|
break;
|
|
case 1:
|
|
*(u64 *)(out_buf + byte_idx) = SWAP64(
|
|
(s64)interesting_32[RAND_BELOW(sizeof(interesting_32) >> 2)]);
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 5: {
|
|
|
|
/* Randomly subtract from byte. */
|
|
|
|
out_buf[(RAND_BELOW(end - begin) + begin)] -= 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 6: {
|
|
|
|
/* Randomly add to byte. */
|
|
|
|
out_buf[(RAND_BELOW(end - begin) + begin)] += 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 7: {
|
|
|
|
/* Randomly subtract from word, random endian. */
|
|
|
|
if (end - begin < 2) break;
|
|
|
|
s32 byte_idx = (RAND_BELOW(end - begin) + begin);
|
|
|
|
if (byte_idx >= end - 1) break;
|
|
|
|
if (RAND_BELOW(2)) {
|
|
|
|
*(u16 *)(out_buf + byte_idx) -= 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
} else {
|
|
|
|
u16 num = 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
*(u16 *)(out_buf + byte_idx) =
|
|
SWAP16(SWAP16(*(u16 *)(out_buf + byte_idx)) - num);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 8: {
|
|
|
|
/* Randomly add to word, random endian. */
|
|
|
|
if (end - begin < 2) break;
|
|
|
|
s32 byte_idx = (RAND_BELOW(end - begin) + begin);
|
|
|
|
if (byte_idx >= end - 1) break;
|
|
|
|
if (RAND_BELOW(2)) {
|
|
|
|
*(u16 *)(out_buf + byte_idx) += 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
} else {
|
|
|
|
u16 num = 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
*(u16 *)(out_buf + byte_idx) =
|
|
SWAP16(SWAP16(*(u16 *)(out_buf + byte_idx)) + num);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 9: {
|
|
|
|
/* Randomly subtract from dword, random endian. */
|
|
|
|
if (end - begin < 4) break;
|
|
|
|
s32 byte_idx = (RAND_BELOW(end - begin) + begin);
|
|
|
|
if (byte_idx >= end - 3) break;
|
|
|
|
if (RAND_BELOW(2)) {
|
|
|
|
*(u32 *)(out_buf + byte_idx) -= 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
} else {
|
|
|
|
u32 num = 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
*(u32 *)(out_buf + byte_idx) =
|
|
SWAP32(SWAP32(*(u32 *)(out_buf + byte_idx)) - num);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 10: {
|
|
|
|
/* Randomly add to dword, random endian. */
|
|
|
|
if (end - begin < 4) break;
|
|
|
|
s32 byte_idx = (RAND_BELOW(end - begin) + begin);
|
|
|
|
if (byte_idx >= end - 3) break;
|
|
|
|
if (RAND_BELOW(2)) {
|
|
|
|
*(u32 *)(out_buf + byte_idx) += 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
} else {
|
|
|
|
u32 num = 1 + RAND_BELOW(ARITH_MAX);
|
|
|
|
*(u32 *)(out_buf + byte_idx) =
|
|
SWAP32(SWAP32(*(u32 *)(out_buf + byte_idx)) + num);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 11: {
|
|
|
|
/* Just set a random byte to a random value. Because,
|
|
why not. We use XOR with 1-255 to eliminate the
|
|
possibility of a no-op. */
|
|
|
|
out_buf[(RAND_BELOW(end - begin) + begin)] ^= 1 + RAND_BELOW(255);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* This function calculates the next power of 2 greater or equal its argument.
|
|
@return The rounded up power of 2 (if no overflow) or 0 on overflow.
|
|
*/
|
|
static inline size_t next_pow2(size_t in) {
|
|
|
|
if (in == 0 || in > (size_t)-1)
|
|
return 0; /* avoid undefined behaviour under-/overflow */
|
|
size_t out = in - 1;
|
|
out |= out >> 1;
|
|
out |= out >> 2;
|
|
out |= out >> 4;
|
|
out |= out >> 8;
|
|
out |= out >> 16;
|
|
return out + 1;
|
|
|
|
}
|
|
|
|
/* This function makes sure *size is > size_needed after call.
|
|
It will realloc *buf otherwise.
|
|
*size will grow exponentially as per:
|
|
https://blog.mozilla.org/nnethercote/2014/11/04/please-grow-your-buffers-exponentially/
|
|
Will return NULL and free *buf if size_needed is <1 or realloc failed.
|
|
@return For convenience, this function returns *buf.
|
|
*/
|
|
static inline void *maybe_grow(void **buf, size_t *size, size_t size_needed) {
|
|
|
|
/* No need to realloc */
|
|
if (likely(size_needed && *size >= size_needed)) return *buf;
|
|
|
|
/* No initial size was set */
|
|
if (size_needed < INITIAL_GROWTH_SIZE) size_needed = INITIAL_GROWTH_SIZE;
|
|
|
|
/* grow exponentially */
|
|
size_t next_size = next_pow2(size_needed);
|
|
|
|
/* handle overflow */
|
|
if (!next_size) { next_size = size_needed; }
|
|
|
|
/* alloc */
|
|
*buf = realloc(*buf, next_size);
|
|
*size = *buf ? next_size : 0;
|
|
|
|
return *buf;
|
|
|
|
}
|
|
|
|
/* Swaps buf1 ptr and buf2 ptr, as well as their sizes */
|
|
static inline void afl_swap_bufs(void **buf1, size_t *size1, void **buf2,
|
|
size_t *size2) {
|
|
|
|
void * scratch_buf = *buf1;
|
|
size_t scratch_size = *size1;
|
|
*buf1 = *buf2;
|
|
*size1 = *size2;
|
|
*buf2 = scratch_buf;
|
|
*size2 = scratch_size;
|
|
|
|
}
|
|
|
|
#undef INITIAL_GROWTH_SIZE
|
|
|
|
#endif
|
|
|