mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-09 08:41:32 +00:00
* sync (#886) * Create FUNDING.yml * Update FUNDING.yml * moved custom_mutator examples * unicorn speedtest makefile cleanup * fixed example location * fix qdbi * update util readme * Frida persistent (#880) * Added x64 support for persistent mode (function call only), in-memory teest cases and complog * Review changes, fix NeverZero and code to parse the .text section of the main executable. Excluded ranges TBC * Various minor fixes and finished support for AFL_INST_LIBS * Review changes Co-authored-by: Your Name <you@example.com> * nits * fix frida mode * Integer overflow/underflow fixes in libdislocator (#889) * libdislocator: fixing integer overflow in 'max_mem' variable and setting 'max_mem' type to 'size_t' * libdislocator: fixing potential integer underflow in 'total_mem' variable due to its different values in different threads * Bumped warnings up to the max and fixed remaining issues (#890) Co-authored-by: Your Name <you@example.com> * nits * frida mode - support non-pie * nits * nit * update grammar mutator * Fixes for aarch64, OSX and other minor issues (#891) Co-authored-by: Your Name <you@example.com> * nits * nits * fix PCGUARD, build aflpp_driver with fPIC * Added representative fuzzbench test and test for libxml (#893) * Added representative fuzzbench test and test for libxml * Added support for building FRIDA from source with FRIDA_SOURCE=1 Co-authored-by: Your Name <you@example.com> * nits * update changelog * typos * fixed potential double free in custom trim (#881) * error handling, freeing mem * frida: complog -> cmplog * fix statsd writing * let aflpp_qemu_driver_hook.so build fail gracefully * fix stdin trimming * Support for AFL_ENTRYPOINT (#898) Co-authored-by: Your Name <you@example.com> * remove the input file .cur_input at the end of the fuzzing, if AFL_TMPDIR is used * reverse push (#901) * Create FUNDING.yml * Update FUNDING.yml * disable QEMU static pie Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> * clarify that no modifications are required. * add new test for frida_mode (please review) * typos * fix persistent mode (64-bit) * set ARCH for linux intel 32-bit for frida-gum-devkit * prepare for 32-bit support (later) * not on qemu 3 anymore * unicorn mips fixes * instrumentation further move to C++11 (#900) * unicorn fixes * more unicorn fixes * Fix memory errors when trim causes testcase growth (#881) (#903) * Revert "fixed potential double free in custom trim (#881)" This reverts commit e9d2f72382cab75832721d859c3e731da071435d. * Revert "fix custom trim for increasing data" This reverts commit 86a8ef168dda766d2f25f15c15c4d3ecf21d0667. * Fix memory errors when trim causes testcase growth Modify trim_case_custom to avoid writing into in_buf because some custom mutators can cause the testcase to grow rather than shrink. Instead of modifying in_buf directly, we write the update out to the disk when trimming is complete, and then the caller is responsible for refreshing the in-memory buffer from the file. This is still a bit sketchy because it does need to modify q->len in order to notify the upper layers that something changed, and it could end up telling upper layer code that the q->len is *bigger* than the buffer (q->testcase_buf) that contains it, which is asking for trouble down the line somewhere... * Fix an unlikely situation Put back some `unlikely()` calls that were in the e9d2f72382cab75832721d859c3e731da071435d commit that was reverted. * typo * Exit on time (#904) * Variable AFL_EXIT_ON_TIME description has been added. Variables AFL_EXIT_ON_TIME and afl_exit_on_time has been added. afl->exit_on_time variable initialization has been added. The asignment of a value to the afl->afl_env.afl_exit_on_time variable from environment variables has been added. Code to exit on timeout if new path not found has been added. * Type of afl_exit_on_time variable has been changed. Variable exit_on_time has been added to the afl_state_t structure. * Command `export AFL_EXIT_WHEN_DONE=1` has been added. * Millisecond to second conversion has been added. Call get_cur_time() has been added. * Revert to using the saved current time value. * Useless check has been removed. * fix new path to custom-mutators * ensure crashes/README.txt exists * fix * Changes to bump FRIDA version and to clone FRIDA repo in to build directory rather than use a submodule as the FRIDA build scripts don't like it (#906) Co-authored-by: Your Name <you@example.com> * Fix numeric overflow in cmplog implementation (#907) Co-authored-by: Your Name <you@example.com> * testcase fixes for unicorn * remove merge conflict artifacts * fix afl-plot * Changes to remove binaries from frida_mode (#913) Co-authored-by: Your Name <you@example.com> * Frida cmplog fail fast (#914) * Changes to remove binaries from frida_mode * Changes to make cmplog fail fast Co-authored-by: Your Name <you@example.com> * afl-plot: relative time * arch linux and mac os support for afl-system-config * typo * code-format * update documentation Co-authored-by: Dominik Maier <domenukk@gmail.com> Co-authored-by: WorksButNotTested <62701594+WorksButNotTested@users.noreply.github.com> Co-authored-by: Your Name <you@example.com> Co-authored-by: Dmitry Zheregelya <zheregelya.d@gmail.com> Co-authored-by: hexcoder <hexcoder-@users.noreply.github.com> Co-authored-by: hexcoder- <heiko@hexco.de> Co-authored-by: Andrea Fioraldi <andreafioraldi@gmail.com> Co-authored-by: David CARLIER <devnexen@gmail.com> Co-authored-by: realmadsci <71108352+realmadsci@users.noreply.github.com> Co-authored-by: Roman M. Iudichev <SecNotice@ya.ru>
126 lines
5.1 KiB
Bash
Executable File
126 lines
5.1 KiB
Bash
Executable File
#!/bin/sh
|
|
|
|
. ./test-pre.sh
|
|
|
|
$ECHO "$BLUE[*] Testing: custom mutator"
|
|
test "1" = "`../afl-fuzz | grep -i 'without python' >/dev/null; echo $?`" && {
|
|
# normalize path
|
|
CUSTOM_MUTATOR_PATH=$(cd $(pwd)/../custom_mutators/examples;pwd)
|
|
test -e test-custom-mutator.c -a -e ${CUSTOM_MUTATOR_PATH}/example.c -a -e ${CUSTOM_MUTATOR_PATH}/example.py && {
|
|
unset AFL_CC
|
|
# Compile the vulnerable program for single mutator
|
|
test -e ../afl-clang-fast && {
|
|
../afl-clang-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
|
|
} || {
|
|
test -e ../afl-gcc-fast && {
|
|
../afl-gcc-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
|
|
} || {
|
|
../afl-gcc -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
|
|
}
|
|
}
|
|
# Compile the vulnerable program for multiple mutators
|
|
test -e ../afl-clang-fast && {
|
|
../afl-clang-fast -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&1
|
|
} || {
|
|
test -e ../afl-gcc-fast && {
|
|
../afl-gcc-fast -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&1
|
|
} || {
|
|
../afl-gcc -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&1
|
|
}
|
|
}
|
|
# Compile the custom mutator
|
|
cc -D_FIXED_CHAR=0x41 -g -fPIC -shared -I../include ../custom_mutators/examples/simple_example.c -o libexamplemutator.so > /dev/null 2>&1
|
|
cc -D_FIXED_CHAR=0x42 -g -fPIC -shared -I../include ../custom_mutators/examples/simple_example.c -o libexamplemutator2.so > /dev/null 2>&1
|
|
test -e test-custom-mutator -a -e ./libexamplemutator.so && {
|
|
# Create input directory
|
|
mkdir -p in
|
|
echo "00000" > in/in
|
|
|
|
# Run afl-fuzz w/ the C mutator
|
|
$ECHO "$GREY[*] running afl-fuzz for the C mutator, this will take approx 10 seconds"
|
|
{
|
|
AFL_CUSTOM_MUTATOR_LIBRARY=./libexamplemutator.so AFL_CUSTOM_MUTATOR_ONLY=1 ../afl-fuzz -V10 -m ${MEM_LIMIT} -i in -o out -- ./test-custom-mutator >>errors 2>&1
|
|
} >>errors 2>&1
|
|
|
|
# Check results
|
|
test -n "$( ls out/default/crashes/id:000000* 2>/dev/null )" && { # TODO: update here
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with the C mutator"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with the C mutator"
|
|
CODE=1
|
|
}
|
|
|
|
# Clean
|
|
rm -rf out errors core.*
|
|
|
|
# Run afl-fuzz w/ multiple C mutators
|
|
$ECHO "$GREY[*] running afl-fuzz with multiple custom C mutators, this will take approx 10 seconds"
|
|
{
|
|
AFL_CUSTOM_MUTATOR_LIBRARY="./libexamplemutator.so;./libexamplemutator2.so" AFL_CUSTOM_MUTATOR_ONLY=1 ../afl-fuzz -V10 -m ${MEM_LIMIT} -i in -o out -- ./test-multiple-mutators >>errors 2>&1
|
|
} >>errors 2>&1
|
|
|
|
test -n "$( ls out/default/crashes/id:000000* 2>/dev/null )" && { # TODO: update here
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with multiple C mutators"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with multiple C mutators"
|
|
CODE=1
|
|
}
|
|
|
|
# Clean
|
|
rm -rf out errors core.*
|
|
|
|
# Run afl-fuzz w/ the Python mutator
|
|
$ECHO "$GREY[*] running afl-fuzz for the Python mutator, this will take approx 10 seconds"
|
|
{
|
|
export PYTHONPATH=${CUSTOM_MUTATOR_PATH}
|
|
export AFL_PYTHON_MODULE=example
|
|
AFL_CUSTOM_MUTATOR_ONLY=1 ../afl-fuzz -V10 -m ${MEM_LIMIT} -i in -o out -- ./test-custom-mutator >>errors 2>&1
|
|
unset PYTHONPATH
|
|
unset AFL_PYTHON_MODULE
|
|
} >>errors 2>&1
|
|
|
|
# Check results
|
|
test -n "$( ls out/default/crashes/id:000000* 2>/dev/null )" && { # TODO: update here
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with the Python mutator"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with the Python mutator"
|
|
CODE=1
|
|
}
|
|
|
|
# Clean
|
|
rm -rf in out errors core.*
|
|
rm -rf ${CUSTOM_MUTATOR_PATH}/__pycache__/
|
|
rm -f test-multiple-mutators test-custom-mutator libexamplemutator.so libexamplemutator2.so
|
|
} || {
|
|
ls .
|
|
ls ${CUSTOM_MUTATOR_PATH}
|
|
$ECHO "$RED[!] cannot compile the test program or the custom mutator"
|
|
CODE=1
|
|
}
|
|
|
|
#test "$CODE" = 1 && { $ECHO "$YELLOW[!] custom mutator tests currently will not fail travis" ; CODE=0 ; }
|
|
|
|
make -C ../utils/custom_mutators clean > /dev/null 2>&1
|
|
rm -f test-custom-mutator
|
|
rm -f test-custom-mutators
|
|
} || {
|
|
$ECHO "$YELLOW[-] no custom mutators in $CUSTOM_MUTATOR_PATH, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
unset CUSTOM_MUTATOR_PATH
|
|
} || {
|
|
$ECHO "$YELLOW[-] no python support in afl-fuzz, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
|
|
. ./test-post.sh
|