mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-09 00:31:33 +00:00
* Output afl-clang-fast stuffs only if necessary (#1912) * afl-cc header * afl-cc common declarations - Add afl-cc-state.c - Strip includes, find_object, debug/be_quiet/have_*/callname setting from afl-cc.c - Use debugf_args in main - Modify execvp stuffs to fit new aflcc struct * afl-cc show usage * afl-cc mode selecting 1. compiler_mode by callname in argv[0] 2. compiler_mode by env "AFL_CC_COMPILER" 3. compiler_mode/instrument_mode by command line options "--afl-..." 4. instrument_mode/compiler_mode by various env vars including "AFL_LLVM_INSTRUMENT" 5. final checking steps 6. print "... - mode: %s-%s\n" 7. determine real argv[0] according to compiler_mode * afl-cc macro defs * afl-cc linking behaviors * afl-cc fsanitize behaviors * afl-cc misc * afl-cc body update * afl-cc all-in-one formated with custom-format.py * nits --------- Co-authored-by: vanhauser-thc <vh@thc.org> * changelog * update grammar mutator * lto llvm 12+ * docs(custom_mutators): fix missing ':' (#1953) * Fix broken LTO mode and response file support (#1948) * Strip `-Wl,-no-undefined` during compilation (#1952) Make the compiler wrapper stripping `-Wl,-no-undefined` in addition to `-Wl,--no-undefined`. Both versions of the flag are accepted by clang and, therefore, used by building systems in the wild (e.g., samba will not build without this fix). * Remove dead code in write_to_testcase (#1955) The custom_mutators_count check in if case is duplicate with if condition. The else case is custom_mutators_count == 0, neither custom_mutator_list iteration nor sent check needed. Signed-off-by: Xeonacid <h.dwwwwww@gmail.com> * update qemuafl * WIP: Add ability to generate drcov trace using QEMU backend (#1956) * Document new drcov QEMU plugin * Add link to lightkeeper for QEMU drcov file loading --------- Co-authored-by: Jean-Romain Garnier <jean-romain.garnier@airbus.com> * code format * changelog * sleep on uid != 0 afl-system-config * fix segv about skip_next, warn on unsupported cases of linking options (#1958) * todos * ensure afl-cc only allows available compiler modes * update grammar mutator * disable aslr on apple * fix for arm64 * help selective instrumentation * typos * macos * add compiler test script * apple fixes * bump nyx submodules (#1963) * fix docs * update changelog * update grammar mutator * improve compiler test script * gcc asan workaround (#1966) * fix github merge fuckup * fix * Fix afl-cc (#1968) - Check if too many cmdline params here, each time before insert a new param. - Check if it is "-fsanitize=..." before we do sth. - Remove improper param_st transfer. * Avoid adding llvmnative instrumentation when linking rust sanitizer runtime (#1969) * Dynamic instrumentation filtering for LLVM native (#1971) * Add two dynamic instrumentation filter methods to runtime * Always use pc-table with native pcguard * Add make_symbol_list.py and README * changelog * todos * new forkserver check * fix * nyx test for CI * improve nyx docs * Fixes to afl-cc and documentation (#1974) * Always compile with -ldl when building for CODE_COVERAGE When building with CODE_COVERAGE, the afl runtime contains code that calls `dladdr` which requires -ldl. Under most circumstances, clang already adds this (e.g. when building with pc-table), but there are some circumstances where it isn't added automatically. * Add visibility declaration to __afl_connected When building with hidden visibility, the use of __AFL_LOOP inside such code can cause linker errors due to __afl_connected being declared "hidden". * Update docs to clarify that CODE_COVERAGE=1 is required for dynamic_covfilter * nits * nyx build script updates * test error output * debug ci * debug ci * Improve afl-cc (#1975) * update response file support - full support of rsp file - fix some segv issues * Improve afl-cc - remove dead code about allow/denylist options of sancov - missing `if (!aflcc->have_msan)` - add docs for each function - typo * enable nyx * debug ci * debug ci * debug ci * debug ci * debug ci * debug ci * debug ci * debug ci * fix ci * clean test script * NO_NYX * NO_NYX * fix ci * debug ci * fix ci * finalize ci fix * Enhancement on Deterministic stage (#1972) * fuzzer: init commit based on aflpp 60dc37a8cf09f8e9048e4b6a2204d6c90b27655a * fuzzers: adding the skip variables and initialize * log: profile the det/havoc finding * log: add profile log output * fuzzers: sperate log/skipdet module * fuzzers: add quick eff_map calc * fuzzers: add skip_eff_map in fuzz_one * fuzzers: mark whole input space in eff_map * fuzzers: add undet bit threshold to skip some seeds * fuzzers: fix one byte overflow * fuzzers: fix overflow * fix code format * add havoc only again * code format * remove log to INTROSPECTION, rename skipdet module * rename skipdet module * remove log to stats * clean redundant code * code format * remove redundant code format check * remove redundant doc * remove redundant objects * clean files * change -d to default skipdet * disable deterministic when using CUSTOM_MUTATOR * revert fix * final touches for skipdet * remove unused var * remove redundant eff struct (#1977) * update QEMU-Nyx submodule (#1978) * update QEMU-Nyx submodule (#1980) * Fix type in AFL_NOOPT env variable in afl-cc help message (#1982) * nits * 2024 v4.10c release * fixes --------- Signed-off-by: Xeonacid <h.dwwwwww@gmail.com> Co-authored-by: Sonic <50692172+SonicStark@users.noreply.github.com> Co-authored-by: Xeonacid <h.dwwwwww@gmail.com> Co-authored-by: Nils Bars <nils.bars@rub.de> Co-authored-by: Jean-Romain Garnier <7504819+JRomainG@users.noreply.github.com> Co-authored-by: Jean-Romain Garnier <jean-romain.garnier@airbus.com> Co-authored-by: Sergej Schumilo <sergej@schumilo.de> Co-authored-by: Christian Holler (:decoder) <choller@mozilla.com> Co-authored-by: Han Zheng <35988108+kdsjZh@users.noreply.github.com> Co-authored-by: Khaled Yakdan <yakdan@code-intelligence.com>
527 lines
11 KiB
C
527 lines
11 KiB
C
/*
|
|
|
|
american fuzzy lop++ - strcmp() / memcmp() CompareCoverage library
|
|
------------------------------------------------------------------
|
|
|
|
Written and maintained by Andrea Fioraldi <andreafioraldi@gmail.com>
|
|
|
|
Copyright 2019-2024 AFLplusplus Project. All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at:
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
This Linux-only companion library allows you to instrument strcmp(),
|
|
memcmp(), and related functions to get compare coverage.
|
|
See README.md for more info.
|
|
|
|
*/
|
|
|
|
#ifndef _GNU_SOURCE
|
|
#define _GNU_SOURCE
|
|
#endif
|
|
#include <dlfcn.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
#include <sys/types.h>
|
|
#include <sys/shm.h>
|
|
#include <stdbool.h>
|
|
#include <stdint.h>
|
|
#include <inttypes.h>
|
|
|
|
#include "types.h"
|
|
#include "config.h"
|
|
|
|
#include "pmparser.h"
|
|
|
|
#ifndef __linux__
|
|
#error "Sorry, this library is Linux-specific for now!"
|
|
#endif /* !__linux__ */
|
|
|
|
#ifndef likely
|
|
#define likely(x) __builtin_expect((!!(x)), 1)
|
|
#endif
|
|
#ifndef unlikely
|
|
#define unlikely(x) __builtin_expect((!!(x)), 0)
|
|
#endif
|
|
|
|
/* Change this value to tune the compare coverage */
|
|
|
|
#define MAX_CMP_LENGTH 32
|
|
|
|
static void *__compcov_code_start, *__compcov_code_end;
|
|
|
|
static u8 *__compcov_afl_map;
|
|
|
|
static u32 __compcov_level;
|
|
|
|
static int (*__libc_strcmp)(const char *, const char *);
|
|
static int (*__libc_strncmp)(const char *, const char *, size_t);
|
|
static int (*__libc_strcasecmp)(const char *, const char *);
|
|
static int (*__libc_strncasecmp)(const char *, const char *, size_t);
|
|
static int (*__libc_memcmp)(const void *, const void *, size_t);
|
|
|
|
static int debug_fd = -1;
|
|
|
|
#define MAX_MAPPINGS 1024
|
|
|
|
static struct mapping {
|
|
|
|
void *st, *en;
|
|
|
|
} __compcov_ro[MAX_MAPPINGS];
|
|
|
|
static u32 __compcov_ro_cnt;
|
|
|
|
/* Check an address against the list of read-only mappings. */
|
|
|
|
static u8 __compcov_is_ro(const void *ptr) {
|
|
|
|
u32 i;
|
|
|
|
for (i = 0; i < __compcov_ro_cnt; i++)
|
|
if (ptr >= __compcov_ro[i].st && ptr <= __compcov_ro[i].en) return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
static size_t __strlen2(const char *s1, const char *s2, size_t max_length) {
|
|
|
|
// from https://github.com/googleprojectzero/CompareCoverage
|
|
|
|
size_t len = 0;
|
|
for (; len < max_length && s1[len] != '\0' && s2[len] != '\0'; len++) {}
|
|
return len;
|
|
|
|
}
|
|
|
|
/* Identify the binary boundaries in the memory mapping */
|
|
|
|
static void __compcov_load(void) {
|
|
|
|
__libc_strcmp = dlsym(RTLD_NEXT, "strcmp");
|
|
__libc_strncmp = dlsym(RTLD_NEXT, "strncmp");
|
|
__libc_strcasecmp = dlsym(RTLD_NEXT, "strcasecmp");
|
|
__libc_strncasecmp = dlsym(RTLD_NEXT, "strncasecmp");
|
|
__libc_memcmp = dlsym(RTLD_NEXT, "memcmp");
|
|
|
|
if (getenv("AFL_QEMU_COMPCOV")) { __compcov_level = 1; }
|
|
if (getenv("AFL_COMPCOV_LEVEL")) {
|
|
|
|
__compcov_level = atoi(getenv("AFL_COMPCOV_LEVEL"));
|
|
|
|
}
|
|
|
|
char *id_str = getenv(SHM_ENV_VAR);
|
|
int shm_id;
|
|
|
|
if (id_str) {
|
|
|
|
shm_id = atoi(id_str);
|
|
__compcov_afl_map = shmat(shm_id, NULL, 0);
|
|
|
|
if (__compcov_afl_map == (void *)-1) exit(1);
|
|
|
|
} else {
|
|
|
|
__compcov_afl_map = calloc(1, MAP_SIZE);
|
|
|
|
}
|
|
|
|
if (getenv("AFL_INST_LIBS")) {
|
|
|
|
__compcov_code_start = (void *)0;
|
|
__compcov_code_end = (void *)-1;
|
|
return;
|
|
|
|
}
|
|
|
|
char *bin_name = getenv("AFL_COMPCOV_BINNAME");
|
|
|
|
procmaps_iterator *maps = pmparser_parse(-1);
|
|
procmaps_struct *maps_tmp = NULL;
|
|
|
|
while ((maps_tmp = pmparser_next(maps)) != NULL) {
|
|
|
|
/* If AFL_COMPCOV_BINNAME is not set pick the first executable segment */
|
|
if (!bin_name || strstr(maps_tmp->pathname, bin_name) != NULL) {
|
|
|
|
if (maps_tmp->is_x) {
|
|
|
|
if (!__compcov_code_start) __compcov_code_start = maps_tmp->addr_start;
|
|
if (!__compcov_code_end) __compcov_code_end = maps_tmp->addr_end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ((maps_tmp->is_w && !maps_tmp->is_r) || __compcov_ro_cnt == MAX_MAPPINGS)
|
|
continue;
|
|
|
|
__compcov_ro[__compcov_ro_cnt].st = maps_tmp->addr_start;
|
|
__compcov_ro[__compcov_ro_cnt].en = maps_tmp->addr_end;
|
|
++__compcov_ro_cnt;
|
|
|
|
}
|
|
|
|
pmparser_free(maps);
|
|
|
|
}
|
|
|
|
static void __compcov_trace(uintptr_t cur_loc, const u8 *v0, const u8 *v1,
|
|
size_t n) {
|
|
|
|
size_t i;
|
|
|
|
if (debug_fd != 1) {
|
|
|
|
char debugbuf[4096];
|
|
snprintf(debugbuf, sizeof(debugbuf), "0x%" PRIxPTR " %s %s %zu\n", cur_loc,
|
|
v0 == NULL ? "(null)" : (char *)v0,
|
|
v1 == NULL ? "(null)" : (char *)v1, n);
|
|
write(debug_fd, debugbuf, strlen(debugbuf));
|
|
|
|
}
|
|
|
|
for (i = 0; i < n && v0[i] == v1[i]; ++i) {
|
|
|
|
__compcov_afl_map[cur_loc + i]++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Check an address against the list of read-only mappings. */
|
|
|
|
static u8 __compcov_is_in_bound(const void *ptr) {
|
|
|
|
return ptr >= __compcov_code_start && ptr < __compcov_code_end;
|
|
|
|
}
|
|
|
|
/* Replacements for strcmp(), memcmp(), and so on. Note that these will be used
|
|
only if the target is compiled with -fno-builtins and linked dynamically. */
|
|
|
|
#undef strcmp
|
|
|
|
int strcmp(const char *str1, const char *str2) {
|
|
|
|
if (unlikely(!__libc_strcmp)) { __libc_strcmp = dlsym(RTLD_NEXT, "strcmp"); }
|
|
void *retaddr = __builtin_return_address(0);
|
|
|
|
if (__compcov_is_in_bound(retaddr) &&
|
|
!(__compcov_level < 2 && !__compcov_is_ro(str1) &&
|
|
!__compcov_is_ro(str2))) {
|
|
|
|
size_t n = __strlen2(str1, str2, MAX_CMP_LENGTH + 1);
|
|
|
|
if (n <= MAX_CMP_LENGTH) {
|
|
|
|
uintptr_t cur_loc = (uintptr_t)retaddr;
|
|
cur_loc = (cur_loc >> 4) ^ (cur_loc << 8);
|
|
cur_loc &= MAP_SIZE - 1;
|
|
|
|
__compcov_trace(cur_loc, str1, str2, n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return __libc_strcmp(str1, str2);
|
|
|
|
}
|
|
|
|
#undef strncmp
|
|
|
|
int strncmp(const char *str1, const char *str2, size_t len) {
|
|
|
|
if (unlikely(!__libc_strncmp)) {
|
|
|
|
__libc_strncmp = dlsym(RTLD_NEXT, "strncmp");
|
|
|
|
}
|
|
|
|
void *retaddr = __builtin_return_address(0);
|
|
|
|
if (__compcov_is_in_bound(retaddr) &&
|
|
!(__compcov_level < 2 && !__compcov_is_ro(str1) &&
|
|
!__compcov_is_ro(str2))) {
|
|
|
|
size_t n = __strlen2(str1, str2, MAX_CMP_LENGTH + 1);
|
|
n = MIN(n, len);
|
|
|
|
if (n <= MAX_CMP_LENGTH) {
|
|
|
|
uintptr_t cur_loc = (uintptr_t)retaddr;
|
|
cur_loc = (cur_loc >> 4) ^ (cur_loc << 8);
|
|
cur_loc &= MAP_SIZE - 1;
|
|
|
|
__compcov_trace(cur_loc, str1, str2, n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return __libc_strncmp(str1, str2, len);
|
|
|
|
}
|
|
|
|
#undef strcasecmp
|
|
|
|
int strcasecmp(const char *str1, const char *str2) {
|
|
|
|
if (unlikely(!__libc_strcasecmp)) {
|
|
|
|
__libc_strncasecmp = dlsym(RTLD_NEXT, "strcasecmp");
|
|
|
|
}
|
|
|
|
void *retaddr = __builtin_return_address(0);
|
|
|
|
if (__compcov_is_in_bound(retaddr) &&
|
|
!(__compcov_level < 2 && !__compcov_is_ro(str1) &&
|
|
!__compcov_is_ro(str2))) {
|
|
|
|
/* Fallback to strcmp, maybe improve in future */
|
|
|
|
size_t n = __strlen2(str1, str2, MAX_CMP_LENGTH + 1);
|
|
|
|
if (n <= MAX_CMP_LENGTH) {
|
|
|
|
uintptr_t cur_loc = (uintptr_t)retaddr;
|
|
cur_loc = (cur_loc >> 4) ^ (cur_loc << 8);
|
|
cur_loc &= MAP_SIZE - 1;
|
|
|
|
__compcov_trace(cur_loc, str1, str2, n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return __libc_strcasecmp(str1, str2);
|
|
|
|
}
|
|
|
|
#undef strncasecmp
|
|
|
|
int strncasecmp(const char *str1, const char *str2, size_t len) {
|
|
|
|
if (unlikely(!__libc_strncasecmp)) {
|
|
|
|
__libc_strncasecmp = dlsym(RTLD_NEXT, "strncasecmp");
|
|
|
|
}
|
|
|
|
void *retaddr = __builtin_return_address(0);
|
|
|
|
if (__compcov_is_in_bound(retaddr) &&
|
|
!(__compcov_level < 2 && !__compcov_is_ro(str1) &&
|
|
!__compcov_is_ro(str2))) {
|
|
|
|
/* Fallback to strncmp, maybe improve in future */
|
|
|
|
size_t n = __strlen2(str1, str2, MAX_CMP_LENGTH + 1);
|
|
n = MIN(n, len);
|
|
|
|
if (n <= MAX_CMP_LENGTH) {
|
|
|
|
uintptr_t cur_loc = (uintptr_t)retaddr;
|
|
cur_loc = (cur_loc >> 4) ^ (cur_loc << 8);
|
|
cur_loc &= MAP_SIZE - 1;
|
|
|
|
__compcov_trace(cur_loc, str1, str2, n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return __libc_strncasecmp(str1, str2, len);
|
|
|
|
}
|
|
|
|
#undef memcmp
|
|
|
|
int memcmp(const void *mem1, const void *mem2, size_t len) {
|
|
|
|
if (unlikely(!__libc_memcmp)) { __libc_memcmp = dlsym(RTLD_NEXT, "memcmp"); }
|
|
void *retaddr = __builtin_return_address(0);
|
|
|
|
if (__compcov_is_in_bound(retaddr) &&
|
|
!(__compcov_level < 2 && !__compcov_is_ro(mem1) &&
|
|
!__compcov_is_ro(mem2))) {
|
|
|
|
size_t n = len;
|
|
|
|
if (n <= MAX_CMP_LENGTH) {
|
|
|
|
uintptr_t cur_loc = (uintptr_t)retaddr;
|
|
cur_loc = (cur_loc >> 4) ^ (cur_loc << 8);
|
|
cur_loc &= MAP_SIZE - 1;
|
|
|
|
__compcov_trace(cur_loc, mem1, mem2, n);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return __libc_memcmp(mem1, mem2, len);
|
|
|
|
}
|
|
|
|
// TODO bcmp
|
|
|
|
/* Common libraries wrappers (from honggfuzz) */
|
|
|
|
/*
|
|
* Apache's httpd wrappers
|
|
*/
|
|
int ap_cstr_casecmp(const char *s1, const char *s2) {
|
|
|
|
return strcasecmp(s1, s2);
|
|
|
|
}
|
|
|
|
int ap_cstr_casecmpn(const char *s1, const char *s2, size_t n) {
|
|
|
|
return strncasecmp(s1, s2, n);
|
|
|
|
}
|
|
|
|
int apr_cstr_casecmp(const char *s1, const char *s2) {
|
|
|
|
return strcasecmp(s1, s2);
|
|
|
|
}
|
|
|
|
int apr_cstr_casecmpn(const char *s1, const char *s2, size_t n) {
|
|
|
|
return strncasecmp(s1, s2, n);
|
|
|
|
}
|
|
|
|
/*
|
|
* *SSL wrappers
|
|
*/
|
|
int CRYPTO_memcmp(const void *m1, const void *m2, size_t len) {
|
|
|
|
return memcmp(m1, m2, len);
|
|
|
|
}
|
|
|
|
int OPENSSL_memcmp(const void *m1, const void *m2, size_t len) {
|
|
|
|
return memcmp(m1, m2, len);
|
|
|
|
}
|
|
|
|
int OPENSSL_strcasecmp(const char *s1, const char *s2) {
|
|
|
|
return strcasecmp(s1, s2);
|
|
|
|
}
|
|
|
|
int OPENSSL_strncasecmp(const char *s1, const char *s2, size_t len) {
|
|
|
|
return strncasecmp(s1, s2, len);
|
|
|
|
}
|
|
|
|
int32_t memcmpct(const void *s1, const void *s2, size_t len) {
|
|
|
|
return memcmp(s1, s2, len);
|
|
|
|
}
|
|
|
|
/*
|
|
* libXML wrappers
|
|
*/
|
|
int xmlStrncmp(const char *s1, const char *s2, int len) {
|
|
|
|
if (len <= 0) { return 0; }
|
|
if (s1 == s2) { return 0; }
|
|
if (s1 == NULL) { return -1; }
|
|
if (s2 == NULL) { return 1; }
|
|
return strncmp(s1, s2, (size_t)len);
|
|
|
|
}
|
|
|
|
int xmlStrcmp(const char *s1, const char *s2) {
|
|
|
|
if (s1 == s2) { return 0; }
|
|
if (s1 == NULL) { return -1; }
|
|
if (s2 == NULL) { return 1; }
|
|
return strcmp(s1, s2);
|
|
|
|
}
|
|
|
|
int xmlStrEqual(const char *s1, const char *s2) {
|
|
|
|
if (s1 == s2) { return 1; }
|
|
if (s1 == NULL) { return 0; }
|
|
if (s2 == NULL) { return 0; }
|
|
if (strcmp(s1, s2) == 0) { return 1; }
|
|
return 0;
|
|
|
|
}
|
|
|
|
int xmlStrcasecmp(const char *s1, const char *s2) {
|
|
|
|
if (s1 == s2) { return 0; }
|
|
if (s1 == NULL) { return -1; }
|
|
if (s2 == NULL) { return 1; }
|
|
return strcasecmp(s1, s2);
|
|
|
|
}
|
|
|
|
int xmlStrncasecmp(const char *s1, const char *s2, int len) {
|
|
|
|
if (len <= 0) { return 0; }
|
|
if (s1 == s2) { return 0; }
|
|
if (s1 == NULL) { return -1; }
|
|
if (s2 == NULL) { return 1; }
|
|
return strncasecmp(s1, s2, (size_t)len);
|
|
|
|
}
|
|
|
|
const char *xmlStrcasestr(const char *haystack, const char *needle) {
|
|
|
|
if (haystack == NULL) { return NULL; }
|
|
if (needle == NULL) { return NULL; }
|
|
return strcasestr(haystack, needle);
|
|
|
|
}
|
|
|
|
/*
|
|
* Samba wrappers
|
|
*/
|
|
int memcmp_const_time(const void *s1, const void *s2, size_t n) {
|
|
|
|
return memcmp(s1, s2, n);
|
|
|
|
}
|
|
|
|
bool strcsequal(const void *s1, const void *s2) {
|
|
|
|
if (s1 == s2) { return true; }
|
|
if (!s1 || !s2) { return false; }
|
|
return (strcmp(s1, s2) == 0);
|
|
|
|
}
|
|
|
|
/* Init code to open init the library. */
|
|
|
|
__attribute__((constructor)) void __compcov_init(void) {
|
|
|
|
if (getenv("AFL_QEMU_COMPCOV_DEBUG") != NULL)
|
|
debug_fd =
|
|
open("compcov.debug", O_WRONLY | O_CREAT | O_TRUNC | O_SYNC, 0644);
|
|
|
|
__compcov_load();
|
|
|
|
}
|
|
|