aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorEdznux <edznux@gmail.com>2020-10-04 16:03:15 +0200
committerEdznux <edznux@gmail.com>2020-10-04 16:03:15 +0200
commit1e0bc2e5c3fff506bc8bdba9ba96530975c730f1 (patch)
tree6cfe62b78d6d91482a1f4c240246e14458735856 /src
parentb0de6fed11d4a8de8f016f1d8db0cb19a6b96eb2 (diff)
parent44c0dc6d961853806a07fa05b948686392ea93fc (diff)
downloadafl++-1e0bc2e5c3fff506bc8bdba9ba96530975c730f1.tar.gz
Merge remote-tracking branch 'origin/dev' into statsd_implem
Diffstat (limited to 'src')
-rw-r--r--src/README.md33
-rw-r--r--src/afl-cc.c1553
-rw-r--r--src/afl-common.c4
-rw-r--r--src/afl-forkserver.c7
-rw-r--r--src/afl-fuzz-extras.c113
-rw-r--r--src/afl-fuzz-init.c164
-rw-r--r--src/afl-fuzz-mutators.c4
-rw-r--r--src/afl-fuzz-one.c31
-rw-r--r--src/afl-fuzz-queue.c19
-rw-r--r--src/afl-fuzz-run.c2
-rw-r--r--src/afl-fuzz-state.c2
-rw-r--r--src/afl-fuzz-stats.c32
-rw-r--r--src/afl-fuzz.c164
-rw-r--r--src/afl-gcc.c488
-rw-r--r--src/afl-ld-lto.c358
15 files changed, 2293 insertions, 681 deletions
diff --git a/src/README.md b/src/README.md
index 6da534c3..35af6ab9 100644
--- a/src/README.md
+++ b/src/README.md
@@ -2,23 +2,28 @@
Quick explanation about the files here:
-- `afl-analyze.c` - afl-analyze binary tool
+- `afl-analyze.c` - afl-analyze binary tool
- `afl-as.c` - afl-as binary tool
-- `afl-gotcpu.c` - afl-gotcpu binary tool
-- `afl-showmap.c` - afl-showmap binary tool
-- `afl-tmin.c` - afl-tmin binary tool
-- `afl-fuzz.c` - afl-fuzz binary tool (just main() and usage())
+- `afl-cc.c` - afl-cc binary tool
+- `afl-common.c` - common functions, used by afl-analyze, afl-fuzz, afl-showmap and afl-tmin
+- `afl-forkserver.c` - forkserver implementation, used by afl-fuzz afl-showmap, afl-tmin
- `afl-fuzz-bitmap.c` - afl-fuzz bitmap handling
+- `afl-fuzz.c` - afl-fuzz binary tool (just main() and usage())
+- `afl-fuzz-cmplog.c` - afl-fuzz cmplog functions
- `afl-fuzz-extras.c` - afl-fuzz the *extra* function calls
-- `afl-fuzz-state.c` - afl-fuzz state and globals
-- `afl-fuzz-init.c` - afl-fuzz initialization
-- `afl-fuzz-misc.c` - afl-fuzz misc functions
-- `afl-fuzz-one.c` - afl-fuzz fuzzer_one big loop, this is where the mutation is happening
+- `afl-fuzz-init.c` - afl-fuzz initialization
+- `afl-fuzz-misc.c` - afl-fuzz misc functions
+- `afl-fuzz-mutators.c` - afl-fuzz custom mutator and python support
+- `afl-fuzz-one.c` - afl-fuzz fuzzer_one big loop, this is where the mutation is happening
+- `afl-fuzz-performance.c` - hash64 and rand functions
- `afl-fuzz-python.c` - afl-fuzz the python mutator extension
- `afl-fuzz-queue.c` - afl-fuzz handling the queue
-- `afl-fuzz-run.c` - afl-fuzz running the target
+- `afl-fuzz-redqueen.c` - afl-fuzz redqueen implemention
+- `afl-fuzz-run.c` - afl-fuzz running the target
+- `afl-fuzz-state.c` - afl-fuzz state and globals
- `afl-fuzz-stats.c` - afl-fuzz writing the statistics file
-- `afl-gcc.c` - afl-gcc binary tool (deprecated)
-- `afl-common.c` - common functions, used by afl-analyze, afl-fuzz, afl-showmap and afl-tmin
-- `afl-forkserver.c` - forkserver implementation, used by afl-fuzz and afl-tmin
-afl-sharedmem.c - sharedmem implementation, used by afl-fuzz and afl-tmin
+- `afl-gotcpu.c` - afl-gotcpu binary tool
+- `afl-ld-lto.c` - LTO linker helper
+- `afl-sharedmem.c` - sharedmem implementation, used by afl-fuzz, afl-showmap, afl-tmin
+- `afl-showmap.c` - afl-showmap binary tool
+- `afl-tmin.c` - afl-tmin binary tool
diff --git a/src/afl-cc.c b/src/afl-cc.c
new file mode 100644
index 00000000..c3b8959d
--- /dev/null
+++ b/src/afl-cc.c
@@ -0,0 +1,1553 @@
+/*
+ american fuzzy lop++ - compiler instrumentation wrapper
+ -------------------------------------------------------
+
+ Written by Michal Zalewski, Laszlo Szekeres and Marc Heuse
+
+ Copyright 2015, 2016 Google Inc. All rights reserved.
+ Copyright 2019-2020 AFLplusplus Project. All rights reserved.
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at:
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ */
+
+#define AFL_MAIN
+
+#include "common.h"
+#include "config.h"
+#include "types.h"
+#include "debug.h"
+#include "alloc-inl.h"
+#include "llvm-ngram-coverage.h"
+
+#include <stdio.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <string.h>
+#include <strings.h>
+#include <limits.h>
+#include <assert.h>
+
+#if (LLVM_MAJOR - 0 == 0)
+ #undef LLVM_MAJOR
+#endif
+#if !defined(LLVM_MAJOR)
+ #define LLVM_MAJOR 0
+#endif
+
+static u8 * obj_path; /* Path to runtime libraries */
+static u8 **cc_params; /* Parameters passed to the real CC */
+static u32 cc_par_cnt = 1; /* Param count, including argv0 */
+static u8 llvm_fullpath[PATH_MAX];
+static u8 instrument_mode, instrument_opt_mode, ngram_size, lto_mode,
+ compiler_mode, plusplus_mode;
+static u8 have_gcc, have_llvm, have_gcc_plugin, have_lto;
+static u8 *lto_flag = AFL_CLANG_FLTO, *argvnull;
+static u8 debug;
+static u8 cwd[4096];
+static u8 cmplog_mode;
+u8 use_stdin; /* dummy */
+// static u8 *march_opt = CFLAGS_OPT;
+
+enum {
+
+ INSTURMENT_DEFAULT = 0,
+ INSTRUMENT_CLASSIC = 1,
+ INSTRUMENT_AFL = 1,
+ INSTRUMENT_PCGUARD = 2,
+ INSTRUMENT_INSTRIM = 3,
+ INSTRUMENT_CFG = 3,
+ INSTRUMENT_LTO = 4,
+ INSTRUMENT_OPT_CTX = 8,
+ INSTRUMENT_OPT_NGRAM = 16
+
+};
+
+char instrument_mode_string[18][18] = {
+
+ "DEFAULT", "CLASSIC", "PCGUARD", "CFG", "LTO", "", "", "", "CTX", "",
+ "", "", "", "", "", "", "NGRAM", ""
+
+};
+
+enum {
+
+ UNSET = 0,
+ LTO = 1,
+ LLVM = 2,
+ GCC_PLUGIN = 3,
+ GCC = 4
+
+};
+
+char compiler_mode_string[6][12] = {
+
+ "AUTOSELECT", "LLVM-LTO", "LLVM", "GCC_PLUGIN",
+ "GCC", ""
+
+};
+
+u8 *getthecwd() {
+
+ static u8 fail[] = "";
+ if (getcwd(cwd, sizeof(cwd)) == NULL) return fail;
+ return cwd;
+
+}
+
+/* Try to find the runtime libraries. If that fails, abort. */
+
+static u8 *find_object(u8 *obj, u8 *argv0) {
+
+ u8 *afl_path = getenv("AFL_PATH");
+ u8 *slash = NULL, *tmp;
+
+ if (afl_path) {
+
+#ifdef __ANDROID__
+ tmp = alloc_printf("%s/%s", afl_path, obj);
+#else
+ tmp = alloc_printf("%s/%s", afl_path, obj);
+#endif
+
+ if (!access(tmp, R_OK)) {
+
+ obj_path = afl_path;
+ return tmp;
+
+ }
+
+ ck_free(tmp);
+
+ }
+
+ if (argv0) slash = strrchr(argv0, '/');
+
+ if (slash) {
+
+ u8 *dir;
+
+ *slash = 0;
+ dir = ck_strdup(argv0);
+ *slash = '/';
+
+#ifdef __ANDROID__
+ tmp = alloc_printf("%s/%s", dir, obj);
+#else
+ tmp = alloc_printf("%s/%s", dir, obj);
+#endif
+
+ if (!access(tmp, R_OK)) {
+
+ obj_path = dir;
+ return tmp;
+
+ }
+
+ ck_free(tmp);
+ ck_free(dir);
+
+ }
+
+ tmp = alloc_printf("%s/%s", AFL_PATH, obj);
+#ifdef __ANDROID__
+ if (!access(tmp, R_OK)) {
+
+#else
+ if (!access(tmp, R_OK)) {
+
+#endif
+
+ obj_path = AFL_PATH;
+ return tmp;
+
+ }
+
+ ck_free(tmp);
+ return NULL;
+
+}
+
+/* Try to find the runtime libraries. If that fails, abort. */
+
+static void find_obj(u8 *argv0) {
+
+ u8 *afl_path = getenv("AFL_PATH");
+ u8 *slash, *tmp;
+
+ if (afl_path) {
+
+#ifdef __ANDROID__
+ tmp = alloc_printf("%s/afl-compiler-rt.so", afl_path);
+#else
+ tmp = alloc_printf("%s/afl-compiler-rt.o", afl_path);
+#endif
+
+ if (!access(tmp, R_OK)) {
+
+ obj_path = afl_path;
+ ck_free(tmp);
+ return;
+
+ }
+
+ ck_free(tmp);
+
+ }
+
+ slash = strrchr(argv0, '/');
+
+ if (slash) {
+
+ u8 *dir;
+
+ *slash = 0;
+ dir = ck_strdup(argv0);
+ *slash = '/';
+
+#ifdef __ANDROID__
+ tmp = alloc_printf("%s/afl-compiler-rt.so", dir);
+#else
+ tmp = alloc_printf("%s/afl-compiler-rt.o", dir);
+#endif
+
+ if (!access(tmp, R_OK)) {
+
+ obj_path = dir;
+ ck_free(tmp);
+ return;
+
+ }
+
+ ck_free(tmp);
+ ck_free(dir);
+
+ }
+
+#ifdef __ANDROID__
+ if (!access(AFL_PATH "/afl-compiler-rt.so", R_OK)) {
+
+#else
+ if (!access(AFL_PATH "/afl-compiler-rt.o", R_OK)) {
+
+#endif
+
+ obj_path = AFL_PATH;
+ return;
+
+ }
+
+ FATAL(
+ "Unable to find 'afl-compiler-rt.o' or 'afl-llvm-pass.so'. Please set "
+ "AFL_PATH");
+
+}
+
+/* Copy argv to cc_params, making the necessary edits. */
+
+static void edit_params(u32 argc, char **argv, char **envp) {
+
+ u8 fortify_set = 0, asan_set = 0, x_set = 0, bit_mode = 0, shared_linking = 0,
+ preprocessor_only = 0, have_unroll = 0, have_o = 0, have_pic = 0;
+ u8 *name;
+
+ cc_params = ck_alloc((argc + 128) * sizeof(u8 *));
+
+ name = strrchr(argv[0], '/');
+ if (!name)
+ name = argv[0];
+ else
+ ++name;
+
+ if (lto_mode) {
+
+ if (lto_flag[0] != '-')
+ FATAL(
+ "Using afl-clang-lto is not possible because Makefile magic did not "
+ "identify the correct -flto flag");
+ else
+ compiler_mode = LTO;
+
+ }
+
+ if (plusplus_mode) {
+
+ u8 *alt_cxx = getenv("AFL_CXX");
+
+ if (!alt_cxx) {
+
+ if (compiler_mode >= GCC_PLUGIN) {
+
+ alt_cxx = "g++";
+
+ } else {
+
+ if (USE_BINDIR)
+ snprintf(llvm_fullpath, sizeof(llvm_fullpath), "%s/clang++",
+ LLVM_BINDIR);
+ else
+ snprintf(llvm_fullpath, sizeof(llvm_fullpath), CLANGPP_BIN);
+ alt_cxx = llvm_fullpath;
+
+ }
+
+ }
+
+ cc_params[0] = alt_cxx;
+
+ } else {
+
+ u8 *alt_cc = getenv("AFL_CC");
+
+ if (!alt_cc) {
+
+ if (compiler_mode >= GCC_PLUGIN) {
+
+ alt_cc = "gcc";
+
+ } else {
+
+ if (USE_BINDIR)
+ snprintf(llvm_fullpath, sizeof(llvm_fullpath), "%s/clang",
+ LLVM_BINDIR);
+ else
+ snprintf(llvm_fullpath, sizeof(llvm_fullpath), CLANGPP_BIN);
+ alt_cc = llvm_fullpath;
+
+ }
+
+ }
+
+ cc_params[0] = alt_cc;
+
+ }
+
+ if (compiler_mode == GCC) {
+
+ cc_params[cc_par_cnt++] = "-B";
+ cc_params[cc_par_cnt++] = obj_path;
+
+ }
+
+ if (compiler_mode == GCC_PLUGIN) {
+
+ char *fplugin_arg =
+ alloc_printf("-fplugin=%s", find_object("afl-gcc-pass.so", argvnull));
+ cc_params[cc_par_cnt++] = fplugin_arg;
+
+ }
+
+ if (compiler_mode == LLVM || compiler_mode == LTO) {
+
+ cc_params[cc_par_cnt++] = "-Wno-unused-command-line-argument";
+
+ if (lto_mode && plusplus_mode)
+ cc_params[cc_par_cnt++] = "-lc++"; // needed by fuzzbench, early
+
+ if (lto_mode) {
+
+ if (getenv("AFL_LLVM_INSTRUMENT_FILE") != NULL ||
+ getenv("AFL_LLVM_WHITELIST") || getenv("AFL_LLVM_ALLOWLIST") ||
+ getenv("AFL_LLVM_DENYLIST") || getenv("AFL_LLVM_BLOCKLIST")) {
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-llvm-lto-instrumentlist.so", obj_path);
+
+ }
+
+ }
+
+ if (getenv("AFL_LLVM_DICT2FILE")) {
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-llvm-dict2file.so", obj_path);
+
+ }
+
+ // laf
+ if (getenv("LAF_SPLIT_SWITCHES") || getenv("AFL_LLVM_LAF_SPLIT_SWITCHES")) {
+
+ if (lto_mode) {
+
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/split-switches-pass.so", obj_path);
+
+ } else {
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/split-switches-pass.so", obj_path);
+
+ }
+
+ }
+
+ if (getenv("LAF_TRANSFORM_COMPARES") ||
+ getenv("AFL_LLVM_LAF_TRANSFORM_COMPARES")) {
+
+ if (lto_mode) {
+
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/compare-transform-pass.so", obj_path);
+
+ } else {
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/compare-transform-pass.so", obj_path);
+
+ }
+
+ }
+
+ if (getenv("LAF_SPLIT_COMPARES") || getenv("AFL_LLVM_LAF_SPLIT_COMPARES") ||
+ getenv("AFL_LLVM_LAF_SPLIT_FLOATS")) {
+
+ if (lto_mode) {
+
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/split-compares-pass.so", obj_path);
+
+ } else {
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/split-compares-pass.so", obj_path);
+
+ }
+
+ }
+
+ // /laf
+
+ unsetenv("AFL_LD");
+ unsetenv("AFL_LD_CALLER");
+ if (cmplog_mode) {
+
+ if (lto_mode) {
+
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/cmplog-routines-pass.so", obj_path);
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/split-switches-pass.so", obj_path);
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/cmplog-instructions-pass.so", obj_path);
+
+ } else {
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/cmplog-routines-pass.so", obj_path);
+
+ // reuse split switches from laf
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/split-switches-pass.so", obj_path);
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/cmplog-instructions-pass.so", obj_path);
+
+ }
+
+ cc_params[cc_par_cnt++] = "-fno-inline";
+
+ }
+
+ if (lto_mode) {
+
+ u8 *ld_path = strdup(AFL_REAL_LD);
+ if (!*ld_path) ld_path = "ld.lld";
+#if defined(AFL_CLANG_LDPATH) && LLVM_MAJOR >= 12
+ cc_params[cc_par_cnt++] = alloc_printf("--ld-path=%s", ld_path);
+#else
+ cc_params[cc_par_cnt++] = alloc_printf("-fuse-ld=%s", ld_path);
+#endif
+
+ cc_params[cc_par_cnt++] = "-Wl,--allow-multiple-definition";
+
+ if (instrument_mode == INSTRUMENT_CFG)
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/SanitizerCoverageLTO.so", obj_path);
+ else
+
+ cc_params[cc_par_cnt++] = alloc_printf(
+ "-Wl,-mllvm=-load=%s/afl-llvm-lto-instrumentation.so", obj_path);
+ cc_params[cc_par_cnt++] = lto_flag;
+
+ } else {
+
+ if (instrument_mode == INSTRUMENT_PCGUARD) {
+
+#if LLVM_MAJOR >= 4
+ cc_params[cc_par_cnt++] =
+ "-fsanitize-coverage=trace-pc-guard"; // edge coverage by default
+#else
+ FATAL("pcguard instrumentation requires llvm 4.0.1+");
+#endif
+
+ } else {
+
+ cc_params[cc_par_cnt++] = "-Xclang";
+ cc_params[cc_par_cnt++] = "-load";
+ cc_params[cc_par_cnt++] = "-Xclang";
+ if (instrument_mode == INSTRUMENT_CFG)
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/libLLVMInsTrim.so", obj_path);
+ else
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-llvm-pass.so", obj_path);
+
+ }
+
+ }
+
+ // cc_params[cc_par_cnt++] = "-Qunused-arguments";
+
+ // in case LLVM is installed not via a package manager or "make install"
+ // e.g. compiled download or compiled from github then its ./lib directory
+ // might not be in the search path. Add it if so.
+ u8 *libdir = strdup(LLVM_LIBDIR);
+ if (plusplus_mode && strlen(libdir) && strncmp(libdir, "/usr", 4) &&
+ strncmp(libdir, "/lib", 4)) {
+
+ cc_params[cc_par_cnt++] = "-rpath";
+ cc_params[cc_par_cnt++] = libdir;
+
+ } else {
+
+ free(libdir);
+
+ }
+
+ u32 idx;
+ if (lto_mode && argc > 1) {
+
+ for (idx = 1; idx < argc; idx++) {
+
+ if (!strncasecmp(argv[idx], "-fpic", 5)) have_pic = 1;
+
+ }
+
+ if (!have_pic) cc_params[cc_par_cnt++] = "-fPIC";
+
+ }
+
+ }
+
+ /* Detect stray -v calls from ./configure scripts. */
+
+ while (--argc) {
+
+ u8 *cur = *(++argv);
+
+ if (!strncmp(cur, "--afl", 5)) continue;
+ if (lto_mode && !strncmp(cur, "-fuse-ld=", 9)) continue;
+ if (lto_mode && !strncmp(cur, "--ld-path=", 10)) continue;
+ if (!strcmp(cur, "-Wl,-z,defs") || !strcmp(cur, "-Wl,--no-undefined"))
+ continue;
+
+ if (!strcmp(cur, "-m32")) bit_mode = 32;
+ if (!strcmp(cur, "armv7a-linux-androideabi")) bit_mode = 32;
+ if (!strcmp(cur, "-m64")) bit_mode = 64;
+
+ if (!strcmp(cur, "-fsanitize=address") || !strcmp(cur, "-fsanitize=memory"))
+ asan_set = 1;
+
+ if (strstr(cur, "FORTIFY_SOURCE")) fortify_set = 1;
+
+ if (!strcmp(cur, "-x")) x_set = 1;
+ if (!strcmp(cur, "-E")) preprocessor_only = 1;
+ if (!strcmp(cur, "-shared")) shared_linking = 1;
+
+ if (!strncmp(cur, "-O", 2)) have_o = 1;
+ if (!strncmp(cur, "-f", 2) && strstr(cur, "unroll-loop")) have_unroll = 1;
+
+ cc_params[cc_par_cnt++] = cur;
+
+ }
+
+ if (getenv("AFL_HARDEN")) {
+
+ cc_params[cc_par_cnt++] = "-fstack-protector-all";
+
+ if (!fortify_set) cc_params[cc_par_cnt++] = "-D_FORTIFY_SOURCE=2";
+
+ }
+
+ if (!asan_set) {
+
+ if (getenv("AFL_USE_ASAN")) {
+
+ if (getenv("AFL_USE_MSAN")) FATAL("ASAN and MSAN are mutually exclusive");
+
+ if (getenv("AFL_HARDEN"))
+ FATAL("ASAN and AFL_HARDEN are mutually exclusive");
+
+ cc_params[cc_par_cnt++] = "-U_FORTIFY_SOURCE";
+ cc_params[cc_par_cnt++] = "-fsanitize=address";
+
+ } else if (getenv("AFL_USE_MSAN")) {
+
+ if (getenv("AFL_USE_ASAN")) FATAL("ASAN and MSAN are mutually exclusive");
+
+ if (getenv("AFL_HARDEN"))
+ FATAL("MSAN and AFL_HARDEN are mutually exclusive");
+
+ cc_params[cc_par_cnt++] = "-U_FORTIFY_SOURCE";
+ cc_params[cc_par_cnt++] = "-fsanitize=memory";
+
+ }
+
+ }
+
+ if (getenv("AFL_USE_UBSAN")) {
+
+ cc_params[cc_par_cnt++] = "-fsanitize=undefined";
+ cc_params[cc_par_cnt++] = "-fsanitize-undefined-trap-on-error";
+ cc_params[cc_par_cnt++] = "-fno-sanitize-recover=all";
+
+ }
+
+ if (getenv("AFL_USE_CFISAN")) {
+
+ if (!lto_mode) {
+
+ uint32_t i = 0, found = 0;
+ while (envp[i] != NULL && !found)
+ if (strncmp("-flto", envp[i++], 5) == 0) found = 1;
+ if (!found) cc_params[cc_par_cnt++] = "-flto";
+
+ }
+
+ cc_params[cc_par_cnt++] = "-fsanitize=cfi";
+ cc_params[cc_par_cnt++] = "-fvisibility=hidden";
+
+ }
+
+ if (!getenv("AFL_DONT_OPTIMIZE")) {
+
+ cc_params[cc_par_cnt++] = "-g";
+ if (!have_o) cc_params[cc_par_cnt++] = "-O3";
+ if (!have_unroll) cc_params[cc_par_cnt++] = "-funroll-loops";
+ // if (strlen(march_opt) > 1 && march_opt[0] == '-')
+ // cc_params[cc_par_cnt++] = march_opt;
+
+ }
+
+ if (getenv("AFL_NO_BUILTIN") || getenv("AFL_LLVM_LAF_TRANSFORM_COMPARES") ||
+ getenv("LAF_TRANSFORM_COMPARES") || lto_mode) {
+
+ cc_params[cc_par_cnt++] = "-fno-builtin-strcmp";
+ cc_params[cc_par_cnt++] = "-fno-builtin-strncmp";
+ cc_params[cc_par_cnt++] = "-fno-builtin-strcasecmp";
+ cc_params[cc_par_cnt++] = "-fno-builtin-strncasecmp";
+ cc_params[cc_par_cnt++] = "-fno-builtin-memcmp";
+ cc_params[cc_par_cnt++] = "-fno-builtin-bcmp";
+ cc_params[cc_par_cnt++] = "-fno-builtin-strstr";
+ cc_params[cc_par_cnt++] = "-fno-builtin-strcasestr";
+
+ }
+
+#if defined(USEMMAP) && !defined(__HAIKU__)
+ cc_params[cc_par_cnt++] = "-lrt";
+#endif
+
+ cc_params[cc_par_cnt++] = "-D__AFL_HAVE_MANUAL_CONTROL=1";
+ cc_params[cc_par_cnt++] = "-D__AFL_COMPILER=1";
+ cc_params[cc_par_cnt++] = "-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION=1";
+
+ /* When the user tries to use persistent or deferred forkserver modes by
+ appending a single line to the program, we want to reliably inject a
+ signature into the binary (to be picked up by afl-fuzz) and we want
+ to call a function from the runtime .o file. This is unnecessarily
+ painful for three reasons:
+
+ 1) We need to convince the compiler not to optimize out the signature.
+ This is done with __attribute__((used)).
+
+ 2) We need to convince the linker, when called with -Wl,--gc-sections,
+ not to do the same. This is done by forcing an assignment to a
+ 'volatile' pointer.
+
+ 3) We need to declare __afl_persistent_loop() in the global namespace,
+ but doing this within a method in a class is hard - :: and extern "C"
+ are forbidden and __attribute__((alias(...))) doesn't work. Hence the
+ __asm__ aliasing trick.
+
+ */
+
+ cc_params[cc_par_cnt++] =
+ "-D__AFL_FUZZ_INIT()="
+ "int __afl_sharedmem_fuzzing = 1;"
+ "extern unsigned int *__afl_fuzz_len;"
+ "extern unsigned char *__afl_fuzz_ptr;"
+ "unsigned char __afl_fuzz_alt[1024000];"
+ "unsigned char *__afl_fuzz_alt_ptr = __afl_fuzz_alt;";
+ cc_params[cc_par_cnt++] =
+ "-D__AFL_FUZZ_TESTCASE_BUF=(__afl_fuzz_ptr ? __afl_fuzz_ptr : "
+ "__afl_fuzz_alt_ptr)";
+ cc_params[cc_par_cnt++] =
+ "-D__AFL_FUZZ_TESTCASE_LEN=(__afl_fuzz_ptr ? *__afl_fuzz_len : "
+ "(*__afl_fuzz_len = read(0, __afl_fuzz_alt_ptr, 1024000)) == 0xffffffff "
+ "? 0 : *__afl_fuzz_len)";
+
+ cc_params[cc_par_cnt++] =
+ "-D__AFL_LOOP(_A)="
+ "({ static volatile char *_B __attribute__((used)); "
+ " _B = (char*)\"" PERSIST_SIG
+ "\"; "
+#ifdef __APPLE__
+ "__attribute__((visibility(\"default\"))) "
+ "int _L(unsigned int) __asm__(\"___afl_persistent_loop\"); "
+#else
+ "__attribute__((visibility(\"default\"))) "
+ "int _L(unsigned int) __asm__(\"__afl_persistent_loop\"); "
+#endif /* ^__APPLE__ */
+ "_L(_A); })";
+
+ cc_params[cc_par_cnt++] =
+ "-D__AFL_INIT()="
+ "do { static volatile char *_A __attribute__((used)); "
+ " _A = (char*)\"" DEFER_SIG
+ "\"; "
+#ifdef __APPLE__
+ "__attribute__((visibility(\"default\"))) "
+ "void _I(void) __asm__(\"___afl_manual_init\"); "
+#else
+ "__attribute__((visibility(\"default\"))) "
+ "void _I(void) __asm__(\"__afl_manual_init\"); "
+#endif /* ^__APPLE__ */
+ "_I(); } while (0)";
+
+ if (x_set) {
+
+ cc_params[cc_par_cnt++] = "-x";
+ cc_params[cc_par_cnt++] = "none";
+
+ }
+
+ if (preprocessor_only) {
+
+ /* In the preprocessor_only case (-E), we are not actually compiling at
+ all but requesting the compiler to output preprocessed sources only.
+ We must not add the runtime in this case because the compiler will
+ simply output its binary content back on stdout, breaking any build
+ systems that rely on a separate source preprocessing step. */
+ cc_params[cc_par_cnt] = NULL;
+ return;
+
+ }
+
+#ifndef __ANDROID__
+
+ if (compiler_mode != GCC) {
+
+ switch (bit_mode) {
+
+ case 0:
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-compiler-rt.o", obj_path);
+ if (lto_mode)
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-llvm-rt-lto.o", obj_path);
+ break;
+
+ case 32:
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-compiler-rt-32.o", obj_path);
+ if (access(cc_params[cc_par_cnt - 1], R_OK))
+ FATAL("-m32 is not supported by your compiler");
+ if (lto_mode) {
+
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-llvm-rt-lto-32.o", obj_path);
+ if (access(cc_params[cc_par_cnt - 1], R_OK))
+ FATAL("-m32 is not supported by your compiler");
+
+ }
+
+ break;
+
+ case 64:
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-compiler-rt-64.o", obj_path);
+ if (access(cc_params[cc_par_cnt - 1], R_OK))
+ FATAL("-m64 is not supported by your compiler");
+ if (lto_mode) {
+
+ cc_params[cc_par_cnt++] =
+ alloc_printf("%s/afl-llvm-rt-lto-64.o", obj_path);
+ if (access(cc_params[cc_par_cnt - 1], R_OK))
+ FATAL("-m64 is not supported by your compiler");
+
+ }
+
+ break;
+
+ }
+
+ #ifndef __APPLE__
+ if (!shared_linking)
+ cc_params[cc_par_cnt++] =
+ alloc_printf("-Wl,--dynamic-list=%s/dynamic_list.txt", obj_path);
+ #endif
+
+ }
+
+#endif
+
+ cc_params[cc_par_cnt] = NULL;
+
+}
+
+/* Main entry point */
+
+int main(int argc, char **argv, char **envp) {
+
+ int i;
+ char *callname = argv[0], *ptr = NULL;
+
+ if (getenv("AFL_DEBUG")) {
+
+ debug = 1;
+ if (strcmp(getenv("AFL_DEBUG"), "0") == 0) unsetenv("AFL_DEBUG");
+
+ } else if (getenv("AFL_QUIET"))
+
+ be_quiet = 1;
+
+ if ((ptr = strrchr(callname, '/')) != NULL) callname = ptr + 1;
+ argvnull = (u8 *)argv[0];
+ check_environment_vars(envp);
+
+ if ((ptr = find_object("as", argv[0])) != NULL) {
+
+ have_gcc = 1;
+ ck_free(ptr);
+
+ }
+
+#if (LLVM_MAJOR > 2)
+
+ if ((ptr = find_object("SanitizerCoverageLTO.so", argv[0])) != NULL) {
+
+ have_lto = 1;
+ ck_free(ptr);
+
+ }
+
+ if ((ptr = find_object("cmplog-routines-pass.so", argv[0])) != NULL) {
+
+ have_llvm = 1;
+ ck_free(ptr);
+
+ }
+
+#endif
+
+ if ((ptr = find_object("afl-gcc-pass.so", argv[0])) != NULL) {
+
+ have_gcc_plugin = 1;
+ ck_free(ptr);
+
+ }
+
+#if (LLVM_MAJOR > 2)
+
+ if (strncmp(callname, "afl-clang-fast", 14) == 0) {
+
+ compiler_mode = LLVM;
+
+ } else if (strncmp(callname, "afl-clang-lto", 13) == 0 ||
+
+ strncmp(callname, "afl-lto", 7) == 0) {
+
+ compiler_mode = LTO;
+
+ } else
+
+#endif
+ if (strncmp(callname, "afl-gcc-fast", 12) == 0 ||
+
+ strncmp(callname, "afl-g++-fast", 12) == 0) {
+
+ compiler_mode = GCC_PLUGIN;
+
+ } else if (strncmp(callname, "afl-gcc", 7) == 0 ||
+
+ strncmp(callname, "afl-g++", 7) == 0) {
+
+ compiler_mode = GCC;
+
+ }
+
+ if ((ptr = getenv("AFL_CC_COMPILER"))) {
+
+ if (compiler_mode) {
+
+ WARNF(
+ "\"AFL_CC_COMPILER\" is set but a specific compiler was already "
+ "selected by command line parameter or symlink, ignoring the "
+ "environment variable!");
+
+ } else {
+
+ if (strncasecmp(ptr, "LTO", 3) == 0) {
+
+ compiler_mode = LTO;
+
+ } else if (strncasecmp(ptr, "LLVM", 4) == 0) {
+
+ compiler_mode = LLVM;
+
+ } else if (strncasecmp(ptr, "GCC_P", 5) == 0 ||
+
+ strncasecmp(ptr, "GCC-P", 5) == 0 ||
+ strncasecmp(ptr, "GCCP", 4) == 0) {
+
+ compiler_mode = GCC_PLUGIN;
+
+ } else if (strcasecmp(ptr, "GCC") == 0) {
+
+ compiler_mode = GCC;
+
+ } else
+
+ FATAL("Unknown AFL_CC_COMPILER mode: %s\n", ptr);
+
+ }
+
+ }
+
+ for (i = 1; i < argc; i++) {
+
+ if (strncmp(argv[i], "--afl", 5) == 0) {
+
+ if (compiler_mode)
+ WARNF(
+ "--afl-... compiler mode supersedes the AFL_CC_COMPILER and "
+ "symlink compiler selection!");
+
+ ptr = argv[i];
+ ptr += 5;
+ while (*ptr == '-')
+ ptr++;
+
+ if (strncasecmp(ptr, "LTO", 3) == 0) {
+
+ compiler_mode = LTO;
+
+ } else if (strncasecmp(ptr, "LLVM", 4) == 0) {
+
+ compiler_mode = LLVM;
+
+ } else if (strncasecmp(ptr, "GCC_P", 5) == 0 ||
+
+ strncasecmp(ptr, "GCC-P", 5) == 0 ||
+ strncasecmp(ptr, "GCCP", 4) == 0) {
+
+ compiler_mode = GCC_PLUGIN;
+
+ } else if (strcasecmp(ptr, "GCC") == 0) {
+
+ compiler_mode = GCC;
+
+ } else
+
+ FATAL("Unknown --afl-... compiler mode: %s\n", argv[i]);
+
+ }
+
+ }
+
+ if (strlen(callname) > 2 &&
+ (strncmp(callname + strlen(callname) - 2, "++", 2) == 0 ||
+ strstr(callname, "-g++") != NULL))
+ plusplus_mode = 1;
+
+ if (getenv("USE_TRACE_PC") || getenv("AFL_USE_TRACE_PC") ||
+ getenv("AFL_LLVM_USE_TRACE_PC") || getenv("AFL_TRACE_PC")) {
+
+ if (instrument_mode == 0)
+ instrument_mode = INSTRUMENT_PCGUARD;
+ else if (instrument_mode != INSTRUMENT_PCGUARD)
+ FATAL("you can not set AFL_LLVM_INSTRUMENT and AFL_TRACE_PC together");
+
+ }
+
+ if ((getenv("AFL_LLVM_INSTRUMENT_FILE") != NULL ||
+ getenv("AFL_LLVM_WHITELIST") || getenv("AFL_LLVM_ALLOWLIST") ||
+ getenv("AFL_LLVM_DENYLIST") || getenv("AFL_LLVM_BLOCKLIST")) &&
+ getenv("AFL_DONT_OPTIMIZE"))
+ WARNF(
+ "AFL_LLVM_ALLOWLIST/DENYLIST and AFL_DONT_OPTIMIZE cannot be combined "
+ "for file matching, only function matching!");
+
+ if (getenv("AFL_LLVM_INSTRIM") || getenv("INSTRIM") ||
+ getenv("INSTRIM_LIB")) {
+
+ if (instrument_mode == 0)
+ instrument_mode = INSTRUMENT_CFG;
+ else if (instrument_mode != INSTRUMENT_CFG)
+ FATAL(
+ "you can not set AFL_LLVM_INSTRUMENT and AFL_LLVM_INSTRIM together");
+
+ }
+
+ if (getenv("AFL_LLVM_CTX")) instrument_opt_mode |= INSTRUMENT_OPT_CTX;
+
+ if (getenv("AFL_LLVM_NGRAM_SIZE")) {
+
+ instrument_opt_mode |= INSTRUMENT_OPT_NGRAM;
+ ngram_size = atoi(getenv("AFL_LLVM_NGRAM_SIZE"));
+ if (ngram_size < 2 || ngram_size > NGRAM_SIZE_MAX)
+ FATAL(
+ "NGRAM instrumentation mode must be between 2 and NGRAM_SIZE_MAX "
+ "(%u)",
+ NGRAM_SIZE_MAX);
+
+ }
+
+ if (getenv("AFL_LLVM_INSTRUMENT")) {
+
+ u8 *ptr = strtok(getenv("AFL_LLVM_INSTRUMENT"), ":,;");
+
+ while (ptr) {
+
+ if (strncasecmp(ptr, "afl", strlen("afl")) == 0 ||
+ strncasecmp(ptr, "classic", strlen("classic")) == 0) {
+
+ if (instrument_mode == INSTRUMENT_LTO) {
+
+ instrument_mode = INSTRUMENT_CLASSIC;
+ lto_mode = 1;
+
+ } else if (!instrument_mode || instrument_mode == INSTRUMENT_AFL)
+
+ instrument_mode = INSTRUMENT_AFL;
+ else
+ FATAL("main instrumentation mode already set with %s",
+ instrument_mode_string[instrument_mode]);
+
+ }
+
+ if (strncasecmp(ptr, "pc-guard", strlen("pc-guard")) == 0 ||
+ strncasecmp(ptr, "pcguard", strlen("pcguard")) == 0) {
+
+ if (!instrument_mode || instrument_mode == INSTRUMENT_PCGUARD)
+ instrument_mode = INSTRUMENT_PCGUARD;
+ else
+ FATAL("main instrumentation mode already set with %s",
+ instrument_mode_string[instrument_mode]);
+
+ }
+
+ if (strncasecmp(ptr, "cfg", strlen("cfg")) == 0 ||
+ strncasecmp(ptr, "instrim", strlen("instrim")) == 0) {
+
+ if (instrument_mode == INSTRUMENT_LTO) {
+
+ instrument_mode = INSTRUMENT_CFG;
+ lto_mode = 1;
+
+ } else if (!instrument_mode || instrument_mode == INSTRUMENT_CFG)
+
+ instrument_mode = INSTRUMENT_CFG;
+ else
+ FATAL("main instrumentation mode already set with %s",
+ instrument_mode_string[instrument_mode]);
+
+ }
+
+ if (strncasecmp(ptr, "lto", strlen("lto")) == 0) {
+
+ lto_mode = 1;
+ if (!instrument_mode || instrument_mode == INSTRUMENT_LTO)
+ instrument_mode = INSTRUMENT_LTO;
+ else if (instrument_mode != INSTRUMENT_CFG)
+ FATAL("main instrumentation mode already set with %s",
+ instrument_mode_string[instrument_mode]);
+
+ }
+
+ if (strncasecmp(ptr, "ctx", strlen("ctx")) == 0) {
+
+ instrument_opt_mode |= INSTRUMENT_OPT_CTX;
+ setenv("AFL_LLVM_CTX", "1", 1);
+
+ }
+
+ if (strncasecmp(ptr, "ngram", strlen("ngram")) == 0) {
+
+ ptr += strlen("ngram");
+ while (*ptr && (*ptr < '0' || *ptr > '9'))
+ ptr++;
+
+ if (!*ptr) {
+
+ if ((ptr = getenv("AFL_LLVM_NGRAM_SIZE")) == NULL)
+ FATAL(
+ "you must set the NGRAM size with (e.g. for value 2) "
+ "AFL_LLVM_INSTRUMENT=ngram-2");
+
+ }
+
+ ngram_size = atoi(ptr);
+ if (ngram_size < 2 || ngram_size > NGRAM_SIZE_MAX)
+ FATAL(
+ "NGRAM instrumentation option must be between 2 and "
+ "NGRAM_SIZE_MAX "
+ "(%u)",
+ NGRAM_SIZE_MAX);
+ instrument_opt_mode |= (INSTRUMENT_OPT_NGRAM);
+ ptr = alloc_printf("%u", ngram_size);
+ setenv("AFL_LLVM_NGRAM_SIZE", ptr, 1);
+
+ }
+
+ ptr = strtok(NULL, ":,;");
+
+ }
+
+ }
+
+ if (!compiler_mode) {
+
+ // lto is not a default because outside of afl-cc RANLIB and AR have to
+ // be set to llvm versions so this would work
+ if (have_llvm)
+ compiler_mode = LLVM;
+ else if (have_gcc_plugin)
+ compiler_mode = GCC_PLUGIN;
+ else if (have_gcc)
+ compiler_mode = GCC;
+ else if (have_lto)
+ compiler_mode = LTO;
+ else
+ FATAL("no compiler mode available");
+
+ }
+
+ if (argc < 2 || strncmp(argv[1], "-h", 2) == 0) {
+
+ printf("afl-cc" VERSION
+ " by Michal Zalewski, Laszlo Szekeres, Marc Heuse\n");
+
+ SAYF(
+ "\n"
+ "afl-cc/afl-c++ [options]\n"
+ "\n"
+ "This is a helper application for afl-fuzz. It serves as a drop-in "
+ "replacement\n"
+ "for gcc and clang, letting you recompile third-party code with the "
+ "required\n"
+ "runtime instrumentation. A common use pattern would be one of the "
+ "following:\n\n"
+
+ " CC=afl-cc CXX=afl-c++ ./configure --disable-shared\n"
+ " cmake -DCMAKE_C_COMPILERC=afl-cc -DCMAKE_CXX_COMPILER=afl-c++ .\n"
+ " CC=afl-cc CXX=afl-c++ meson\n\n");
+
+ SAYF(
+ " |---------------- FEATURES "
+ "---------------|\n"
+ "MODES: NCC PERSIST SNAP DICT LAF "
+ "CMPLOG SELECT\n"
+ " [LTO] llvm LTO: %s%s\n"
+ " PCGUARD DEFAULT yes yes yes yes yes yes "
+ " yes\n"
+ " CLASSIC yes yes yes yes yes yes "
+ " yes\n"
+ " [LLVM] llvm: %s%s\n"
+ " PCGUARD %s yes yes yes module yes yes "
+ "extern\n"
+ " CLASSIC %s no yes yes module yes yes "
+ "yes\n"
+ " - NORMAL\n"
+ " - CTX\n"
+ " - NGRAM-{2-16}\n"
+ " INSTRIM no yes yes module yes yes "
+ " yes\n"
+ " - NORMAL\n"
+ " - CTX\n"
+ " - NGRAM-{2-16}\n"
+ " [GCC_PLUGIN] gcc plugin: %s%s\n"
+ " CLASSIC DEFAULT no yes yes no no no "
+ " yes\n"
+ " [GCC] simple gcc: %s%s\n"
+ " CLASSIC DEFAULT no no no no no no "
+ " no\n\n",
+ have_lto ? "AVAILABLE" : "unavailable!",
+ compiler_mode == LTO ? " [SELECTED]" : "",
+ have_llvm ? "AVAILABLE" : "unavailable!",
+ compiler_mode == LLVM ? " [SELECTED]" : "",
+ LLVM_MAJOR > 6 ? "DEFAULT" : " ",
+ LLVM_MAJOR > 6 ? " " : "DEFAULT",
+ have_gcc_plugin ? "AVAILABLE" : "unavailable!",
+ compiler_mode == GCC_PLUGIN ? " [SELECTED]" : "",
+ have_gcc ? "AVAILABLE" : "unavailable!",
+ compiler_mode == GCC ? " [SELECTED]" : "");
+
+ SAYF(
+ "Modes:\n"
+ " To select the compiler mode use a symlink version (e.g. "
+ "afl-clang-fast), set\n"
+ " the environment variable AFL_CC_COMPILER to a mode (e.g. LLVM) or "
+ "use the\n"
+ " command line parameter --afl-MODE (e.g. --afl-llvm). If none is "
+ "selected,\n"
+ " afl-cc will select the best available (LLVM -> GCC_PLUGIN -> GCC).\n"
+ " The best is LTO but it often needs RANLIB and AR settings outside "
+ "of afl-cc.\n\n");
+
+ SAYF(
+ "Sub-Modes: (set via env AFL_LLVM_INSTRUMENT, afl-cc selects the best "
+ "available)\n"
+ " PCGUARD: Dominator tree instrumentation (best!) (README.llvm.md)\n"
+ " CLASSIC: decision target instrumentation (README.llvm.md)\n"
+ " CTX: CLASSIC + callee context (instrumentation/README.ctx.md)\n"
+ " NGRAM-x: CLASSIC + previous path "
+ "((instrumentation/README.ngram.md)\n"
+ " INSTRIM: Dominator tree (for LLVM <= 6.0) "
+ "(instrumentation/README.instrim.md)\n\n");
+
+ SAYF(
+ "Features: (see documentation links)\n"
+ " NCC: non-colliding coverage [automatic] (that is an amazing "
+ "thing!)\n"
+ " (instrumentation/README.lto.md)\n"
+ " PERSIST: persistent mode support [code] (huge speed increase!)\n"
+ " (instrumentation/README.persistent_mode.md)\n"
+ " SNAP: linux lkm snapshot module support [automatic] (speed "
+ "increase)\n"
+ " (https://github.com/AFLplusplus/AFL-Snapshot-LKM/)\n"
+ " DICT: dictionary in the target [yes=automatic or llvm module "
+ "pass]\n"
+ " (instrumentation/README.lto.md + "
+ "instrumentation/README.llvm.md)\n"
+ " LAF: comparison splitting [env] "
+ "(instrumentation/README.laf-intel.md)\n"
+ " CMPLOG: input2state exploration [env] "
+ "(instrumentation/README.cmplog.md)\n"
+ " SELECT: selective instrumentation (allow/deny) on filename or "
+ "function [env]\n"
+ " (instrumentation/README.instrument_list.md)\n\n");
+
+ if (argc < 2 || strncmp(argv[1], "-hh", 3)) {
+
+ SAYF(
+ "To see all environment variables for the configuration of afl-cc "
+ "use \"-hh\".\n");
+
+ } else {
+
+ SAYF(
+ "Environment variables used:\n"
+ " AFL_CC: path to the C compiler to use\n"
+ " AFL_CXX: path to the C++ compiler to use\n"
+ " AFL_DEBUG: enable developer debugging output\n"
+ " AFL_DONT_OPTIMIZE: disable optimization instead of -O3\n"
+ " AFL_NO_BUILTIN: no builtins for string compare functions (for "
+ "libtokencap.so)\n"
+ " AFL_PATH: path to instrumenting pass and runtime "
+ "(afl-compiler-rt.*o)\n"
+ " AFL_INST_RATIO: percentage of branches to instrument\n"
+ " AFL_QUIET: suppress verbose output\n"
+ " AFL_HARDEN: adds code hardening to catch memory bugs\n"
+ " AFL_USE_ASAN: activate address sanitizer\n"
+ " AFL_USE_CFISAN: activate control flow sanitizer\n"
+ " AFL_USE_MSAN: activate memory sanitizer\n"
+ " AFL_USE_UBSAN: activate undefined behaviour sanitizer\n");
+
+ if (have_gcc_plugin)
+ SAYF(
+ "\nGCC Plugin-specific environment variables:\n"
+ " AFL_GCC_OUT_OF_LINE: disable inlined instrumentation\n"
+ " AFL_GCC_SKIP_NEVERZERO: do not skip zero on trace counters\n"
+ " AFL_GCC_INSTRUMENT_FILE: enable selective instrumentation by "
+ "filename\n");
+
+ if (have_llvm)
+ SAYF(
+ "\nLLVM/LTO/afl-clang-fast/afl-clang-lto specific environment "
+ "variables:\n"
+#if LLVM_MAJOR < 9
+ " AFL_LLVM_NOT_ZERO: use cycling trace counters that skip zero\n"
+#else
+ " AFL_LLVM_SKIP_NEVERZERO: do not skip zero on trace counters\n"
+#endif
+ " AFL_LLVM_DICT2FILE: generate an afl dictionary based on found "
+ "comparisons\n"
+ " AFL_LLVM_LAF_ALL: enables all LAF splits/transforms\n"
+ " AFL_LLVM_LAF_SPLIT_COMPARES: enable cascaded comparisons\n"
+ " AFL_LLVM_LAF_SPLIT_COMPARES_BITW: size limit (default 8)\n"
+ " AFL_LLVM_LAF_SPLIT_SWITCHES: cascaded comparisons on switches\n"
+ " AFL_LLVM_LAF_SPLIT_FLOATS: cascaded comparisons on floats\n"
+ " AFL_LLVM_LAF_TRANSFORM_COMPARES: cascade comparisons for string "
+ "functions\n"
+ " AFL_LLVM_INSTRUMENT_ALLOW/AFL_LLVM_INSTRUMENT_DENY: enable "
+ "instrument allow/\n"
+ " deny listing (selective instrumentation)\n");
+
+ if (have_llvm)
+ SAYF(
+ " AFL_LLVM_CMPLOG: log operands of comparisons (RedQueen "
+ "mutator)\n"
+ " AFL_LLVM_INSTRUMENT: set instrumentation mode:\n"
+ " CLASSIC, INSTRIM, PCGUARD, LTO, CTX, NGRAM-2 ... NGRAM-16\n"
+ " You can also use the old environment variables instead:\n"
+ " AFL_LLVM_USE_TRACE_PC: use LLVM trace-pc-guard instrumentation\n"
+ " AFL_LLVM_INSTRIM: use light weight instrumentation InsTrim\n"
+ " AFL_LLVM_INSTRIM_LOOPHEAD: optimize loop tracing for speed "
+ "(option to INSTRIM)\n"
+ " AFL_LLVM_CTX: use context sensitive coverage (for CLASSIC and "
+ "INSTRIM)\n"
+ " AFL_LLVM_NGRAM_SIZE: use ngram prev_loc count coverage (for "
+ "CLASSIC & INSTRIM)\n");
+
+#ifdef AFL_CLANG_FLTO
+ if (have_lto)
+ SAYF(
+ "\nLTO/afl-clang-lto specific environment variables:\n"
+ " AFL_LLVM_MAP_ADDR: use a fixed coverage map address (speed), "
+ "e.g. "
+ "0x10000\n"
+ " AFL_LLVM_DOCUMENT_IDS: write all edge IDs and the corresponding "
+ "functions\n"
+ " into this file\n"
+ " AFL_LLVM_LTO_DONTWRITEID: don't write the highest ID used to a "
+ "global var\n"
+ " AFL_LLVM_LTO_STARTID: from which ID to start counting from for "
+ "a "
+ "bb\n"
+ " AFL_REAL_LD: use this lld linker instead of the compiled in "
+ "path\n"
+ "If anything fails - be sure to read README.lto.md!\n");
+#endif
+
+ }
+
+ SAYF(
+ "\nFor any information on the available instrumentations and options "
+ "please \n"
+ "consult the README.md, especially section 3.1 about instrumenting "
+ "targets.\n\n");
+
+#if (LLVM_MAJOR > 2)
+ if (have_lto)
+ SAYF("afl-cc LTO with ld=%s %s\n", AFL_REAL_LD, AFL_CLANG_FLTO);
+ if (have_llvm)
+ SAYF("afl-cc LLVM version %d with the the binary path \"%s\".\n",
+ LLVM_MAJOR, LLVM_BINDIR);
+ if (have_lto || have_llvm) SAYF("\n");
+#endif
+
+ SAYF(
+ "Do not be overwhelmed :) afl-cc uses good defaults if no options are "
+ "selected.\n"
+ "Read the documentation for FEATURES though, all are good but few are "
+ "defaults.\n\n");
+
+ exit(1);
+
+ }
+
+ if (compiler_mode == LTO) {
+
+ if (instrument_mode == 0 || instrument_mode == INSTRUMENT_LTO ||
+ instrument_mode == INSTRUMENT_CFG) {
+
+ lto_mode = 1;
+ if (!instrument_mode) {
+
+ instrument_mode = INSTRUMENT_CFG;
+ ptr = instrument_mode_string[instrument_mode];
+
+ }
+
+ } else if (instrument_mode == INSTRUMENT_LTO ||
+
+ instrument_mode == INSTRUMENT_CLASSIC) {
+
+ lto_mode = 1;
+
+ } else {
+
+ if (!be_quiet)
+ WARNF("afl-clang-lto called with mode %s, using that mode instead",
+ instrument_mode_string[instrument_mode]);
+
+ }
+
+ }
+
+ if (instrument_mode == 0 && compiler_mode < GCC_PLUGIN) {
+
+#if LLVM_MAJOR <= 6
+ instrument_mode = INSTRUMENT_AFL;
+#else
+ if (getenv("AFL_LLVM_INSTRUMENT_FILE") != NULL ||
+ getenv("AFL_LLVM_WHITELIST") || getenv("AFL_LLVM_ALLOWLIST") ||
+ getenv("AFL_LLVM_DENYLIST") || getenv("AFL_LLVM_BLOCKLIST")) {
+
+ instrument_mode = INSTRUMENT_AFL;
+ WARNF(
+ "switching to classic instrumentation because "
+ "AFL_LLVM_ALLOWLIST/DENYLIST does not work with PCGUARD. Use "
+ "-fsanitize-coverage-allowlist=allowlist.txt or "
+ "-fsanitize-coverage-blocklist=denylist.txt if you want to use "
+ "PCGUARD. Requires llvm 12+. See https://clang.llvm.org/docs/ "
+ "SanitizerCoverage.html#partially-disabling-instrumentation");
+
+ } else
+
+ instrument_mode = INSTRUMENT_PCGUARD;
+#endif
+
+ }
+
+ if (instrument_opt_mode && compiler_mode != LLVM)
+ FATAL("CTX and NGRAM can only be used in LLVM mode");
+
+ if (!instrument_opt_mode) {
+
+ if (lto_mode && instrument_mode == INSTRUMENT_CFG)
+ instrument_mode = INSTRUMENT_PCGUARD;
+ ptr = instrument_mode_string[instrument_mode];
+
+ } else {
+
+ if (instrument_opt_mode == INSTRUMENT_OPT_CTX)
+
+ ptr = alloc_printf("%s + CTX", instrument_mode_string[instrument_mode]);
+ else if (instrument_opt_mode == INSTRUMENT_OPT_NGRAM)
+ ptr = alloc_printf("%s + NGRAM-%u",
+ instrument_mode_string[instrument_mode], ngram_size);
+ else
+ ptr = alloc_printf("%s + CTX + NGRAM-%u",
+ instrument_mode_string[instrument_mode], ngram_size);
+
+ }
+
+#ifndef AFL_CLANG_FLTO
+ if (lto_mode)
+ FATAL(
+ "instrumentation mode LTO specified but LLVM support not available "
+ "(requires LLVM 11 or higher)");
+#endif
+
+ if (instrument_opt_mode && instrument_mode != INSTRUMENT_CLASSIC &&
+ instrument_mode != INSTRUMENT_CFG)
+ FATAL(
+ "CTX and NGRAM instrumentation options can only be used with CFG "
+ "(recommended) and CLASSIC instrumentation modes!");
+
+ if (getenv("AFL_LLVM_SKIP_NEVERZERO") && getenv("AFL_LLVM_NOT_ZERO"))
+ FATAL(
+ "AFL_LLVM_NOT_ZERO and AFL_LLVM_SKIP_NEVERZERO can not be set "
+ "together");
+
+ if (instrument_mode == INSTRUMENT_PCGUARD &&
+ (getenv("AFL_LLVM_INSTRUMENT_FILE") != NULL ||
+ getenv("AFL_LLVM_WHITELIST") || getenv("AFL_LLVM_ALLOWLIST") ||
+ getenv("AFL_LLVM_DENYLIST") || getenv("AFL_LLVM_BLOCKLIST")))
+ FATAL(
+ "Instrumentation type PCGUARD does not support "
+ "AFL_LLVM_ALLOWLIST/DENYLIST! Use "
+ "-fsanitize-coverage-allowlist=allowlist.txt or "
+ "-fsanitize-coverage-blocklist=denylist.txt instead (requires llvm "
+ "12+), see "
+ "https://clang.llvm.org/docs/"
+ "SanitizerCoverage.html#partially-disabling-instrumentation");
+
+ u8 *ptr2;
+
+ if ((ptr2 = getenv("AFL_LLVM_DICT2FILE")) != NULL && *ptr2 != '/')
+ FATAL("AFL_LLVM_DICT2FILE must be set to an absolute file path");
+
+ if ((isatty(2) && !be_quiet) || debug) {
+
+ SAYF(cCYA
+ "afl-cc " VERSION cRST
+ " by Michal Zalewski, Laszlo Szekeres, Marc Heuse - mode: %s-%s\n",
+ compiler_mode_string[compiler_mode], ptr);
+
+ }
+
+ if (!be_quiet && !lto_mode &&
+ ((ptr2 = getenv("AFL_MAP_SIZE")) || (ptr2 = getenv("AFL_MAPSIZE")))) {
+
+ u32 map_size = atoi(ptr2);
+ if (map_size != MAP_SIZE)
+ WARNF("AFL_MAP_SIZE is not supported by afl-clang-fast");
+
+ }
+
+ if (debug) {
+
+ SAYF(cMGN "[D]" cRST " cd '%s';", getthecwd());
+ for (i = 0; i < argc; i++)
+ SAYF(" '%s'", argv[i]);
+ SAYF("\n");
+
+ }
+
+ if (getenv("AFL_LLVM_LAF_ALL")) {
+
+ setenv("AFL_LLVM_LAF_SPLIT_SWITCHES", "1", 1);
+ setenv("AFL_LLVM_LAF_SPLIT_COMPARES", "1", 1);
+ setenv("AFL_LLVM_LAF_SPLIT_FLOATS", "1", 1);
+ setenv("AFL_LLVM_LAF_TRANSFORM_COMPARES", "1", 1);
+
+ }
+
+ cmplog_mode = getenv("AFL_CMPLOG") || getenv("AFL_LLVM_CMPLOG");
+ if (!be_quiet && cmplog_mode)
+ printf("CmpLog mode by <andreafioraldi@gmail.com>\n");
+
+#ifndef __ANDROID__
+ find_obj(argv[0]);
+#endif
+
+ edit_params(argc, argv, envp);
+
+ if (debug) {
+
+ SAYF(cMGN "[D]" cRST " cd '%s';", getthecwd());
+ for (i = 0; i < cc_par_cnt; i++)
+ SAYF(" '%s'", cc_params[i]);
+ SAYF("\n");
+
+ }
+
+ execvp(cc_params[0], (char **)cc_params);
+
+ FATAL("Oops, failed to execute '%s' - check your PATH", cc_params[0]);
+
+ return 0;
+
+}
+
diff --git a/src/afl-common.c b/src/afl-common.c
index d66440aa..ddae2ac1 100644
--- a/src/afl-common.c
+++ b/src/afl-common.c
@@ -146,7 +146,7 @@ char **get_qemu_argv(u8 *own_loc, u8 **target_path_p, int argc, char **argv) {
u8 * tmp, *cp = NULL, *rsl, *own_copy;
memcpy(&new_argv[3], &argv[1], (int)(sizeof(char *)) * (argc - 1));
- new_argv[argc - 1] = NULL;
+ new_argv[argc + 2] = NULL;
new_argv[2] = *target_path_p;
new_argv[1] = "--";
@@ -228,7 +228,7 @@ char **get_wine_argv(u8 *own_loc, u8 **target_path_p, int argc, char **argv) {
u8 * tmp, *cp = NULL, *rsl, *own_copy;
memcpy(&new_argv[2], &argv[1], (int)(sizeof(char *)) * (argc - 1));
- new_argv[argc - 1] = NULL;
+ new_argv[argc + 2] = NULL;
new_argv[1] = *target_path_p;
diff --git a/src/afl-forkserver.c b/src/afl-forkserver.c
index 58932bc4..33b16817 100644
--- a/src/afl-forkserver.c
+++ b/src/afl-forkserver.c
@@ -1043,7 +1043,12 @@ fsrv_run_result_t afl_fsrv_run_target(afl_forkserver_t *fsrv, u32 timeout,
}
- if (fsrv->child_pid <= 0) { FATAL("Fork server is misbehaving (OOM?)"); }
+ if (fsrv->child_pid <= 0) {
+
+ if (*stop_soon_p) { return 0; }
+ FATAL("Fork server is misbehaving (OOM?)");
+
+ }
exec_ms = read_s32_timed(fsrv->fsrv_st_fd, &fsrv->child_status, timeout,
stop_soon_p);
diff --git a/src/afl-fuzz-extras.c b/src/afl-fuzz-extras.c
index d6c368d1..58ce5b6f 100644
--- a/src/afl-fuzz-extras.c
+++ b/src/afl-fuzz-extras.c
@@ -101,7 +101,8 @@ void load_extras_file(afl_state_t *afl, u8 *fname, u32 *min_len, u32 *max_len,
if (rptr < lptr || *rptr != '"') {
- FATAL("Malformed name=\"value\" pair in line %u.", cur_line);
+ WARNF("Malformed name=\"value\" pair in line %u.", cur_line);
+ continue;
}
@@ -141,13 +142,19 @@ void load_extras_file(afl_state_t *afl, u8 *fname, u32 *min_len, u32 *max_len,
if (*lptr != '"') {
- FATAL("Malformed name=\"keyword\" pair in line %u.", cur_line);
+ WARNF("Malformed name=\"keyword\" pair in line %u.", cur_line);
+ continue;
}
++lptr;
- if (!*lptr) { FATAL("Empty keyword in line %u.", cur_line); }
+ if (!*lptr) {
+
+ WARNF("Empty keyword in line %u.", cur_line);
+ continue;
+
+ }
/* Okay, let's allocate memory and copy data between "...", handling
\xNN escaping, \\, and \". */
@@ -169,7 +176,9 @@ void load_extras_file(afl_state_t *afl, u8 *fname, u32 *min_len, u32 *max_len,
case 1 ... 31:
case 128 ... 255:
- FATAL("Non-printable characters in line %u.", cur_line);
+ WARNF("Non-printable characters in line %u.", cur_line);
+ continue;
+ break;
case '\\':
@@ -185,7 +194,8 @@ void load_extras_file(afl_state_t *afl, u8 *fname, u32 *min_len, u32 *max_len,
if (*lptr != 'x' || !isxdigit(lptr[1]) || !isxdigit(lptr[2])) {
- FATAL("Invalid escaping (not \\xNN) in line %u.", cur_line);
+ WARNF("Invalid escaping (not \\xNN) in line %u.", cur_line);
+ continue;
}
@@ -209,10 +219,11 @@ void load_extras_file(afl_state_t *afl, u8 *fname, u32 *min_len, u32 *max_len,
if (afl->extras[afl->extras_cnt].len > MAX_DICT_FILE) {
- FATAL(
+ WARNF(
"Keyword too big in line %u (%s, limit is %s)", cur_line,
stringify_mem_size(val_bufs[0], sizeof(val_bufs[0]), klen),
stringify_mem_size(val_bufs[1], sizeof(val_bufs[1]), MAX_DICT_FILE));
+ continue;
}
@@ -232,14 +243,19 @@ static void extras_check_and_sort(afl_state_t *afl, u32 min_len, u32 max_len,
u8 val_bufs[2][STRINGIFY_VAL_SIZE_MAX];
- if (!afl->extras_cnt) { FATAL("No usable files in '%s'", dir); }
+ if (!afl->extras_cnt) {
+
+ WARNF("No usable data in '%s'", dir);
+ return;
+
+ }
qsort(afl->extras, afl->extras_cnt, sizeof(struct extra_data),
compare_extras_len);
- OKF("Loaded %u extra tokens, size range %s to %s.", afl->extras_cnt,
- stringify_mem_size(val_bufs[0], sizeof(val_bufs[0]), min_len),
- stringify_mem_size(val_bufs[1], sizeof(val_bufs[1]), max_len));
+ ACTF("Loaded %u extra tokens, size range %s to %s.", afl->extras_cnt,
+ stringify_mem_size(val_bufs[0], sizeof(val_bufs[0]), min_len),
+ stringify_mem_size(val_bufs[1], sizeof(val_bufs[1]), max_len));
if (max_len > 32) {
@@ -250,8 +266,8 @@ static void extras_check_and_sort(afl_state_t *afl, u32 min_len, u32 max_len,
if (afl->extras_cnt > afl->max_det_extras) {
- OKF("More than %d tokens - will use them probabilistically.",
- afl->max_det_extras);
+ WARNF("More than %d tokens - will use them probabilistically.",
+ afl->max_det_extras);
}
@@ -320,9 +336,10 @@ void load_extras(afl_state_t *afl, u8 *dir) {
if (st.st_size > MAX_DICT_FILE) {
WARNF(
- "Extra '%s' is very big (%s, limit is %s)", fn,
+ "Extra '%s' is too big (%s, limit is %s)", fn,
stringify_mem_size(val_bufs[0], sizeof(val_bufs[0]), st.st_size),
stringify_mem_size(val_bufs[1], sizeof(val_bufs[1]), MAX_DICT_FILE));
+ continue;
}
@@ -370,16 +387,74 @@ static inline u8 memcmp_nocase(u8 *m1, u8 *m2, u32 len) {
}
-/* Adds a new extra / dict entry. Used for LTO autodict. */
+/* Removes duplicates from the loaded extras. This can happen if multiple files
+ are loaded */
+
+void dedup_extras(afl_state_t *afl) {
+
+ if (afl->extras_cnt < 2) return;
+
+ u32 i, j, orig_cnt = afl->extras_cnt;
+
+ for (i = 0; i < afl->extras_cnt - 1; i++) {
+
+ for (j = i + 1; j < afl->extras_cnt; j++) {
+
+ restart_dedup:
+
+ // if the goto was used we could be at the end of the list
+ if (j >= afl->extras_cnt || afl->extras[i].len != afl->extras[j].len)
+ break;
+
+ if (memcmp(afl->extras[i].data, afl->extras[j].data,
+ afl->extras[i].len) == 0) {
+
+ ck_free(afl->extras[j].data);
+ if (j + 1 < afl->extras_cnt) // not at the end of the list?
+ memmove((char *)&afl->extras[j], (char *)&afl->extras[j + 1],
+ (afl->extras_cnt - j - 1) * sizeof(struct extra_data));
+ afl->extras_cnt--;
+ goto restart_dedup; // restart if several duplicates are in a row
+
+ }
+
+ }
+
+ }
+
+ if (afl->extras_cnt != orig_cnt)
+ afl->extras = afl_realloc((void **)&afl->extras,
+ afl->extras_cnt * sizeof(struct extra_data));
+
+}
+
+/* Adds a new extra / dict entry. */
void add_extra(afl_state_t *afl, u8 *mem, u32 len) {
- u8 val_bufs[2][STRINGIFY_VAL_SIZE_MAX];
+ u8 val_bufs[2][STRINGIFY_VAL_SIZE_MAX];
+ u32 i, found = 0;
+
+ for (i = 0; i < afl->extras_cnt; i++) {
+
+ if (afl->extras[i].len == len) {
+
+ if (memcmp(afl->extras[i].data, mem, len) == 0) return;
+ found = 1;
+
+ } else {
+
+ if (found) break;
+
+ }
+
+ }
if (len > MAX_DICT_FILE) {
- WARNF("Extra '%.*s' is very big (%s, limit is %s)", (int)len, mem,
+ WARNF("Extra '%.*s' is too big (%s, limit is %s)", (int)len, mem,
stringify_mem_size(val_bufs[0], sizeof(val_bufs[0]), len),
stringify_mem_size(val_bufs[1], sizeof(val_bufs[1]), MAX_DICT_FILE));
+ return;
} else if (len > 32) {
@@ -405,8 +480,8 @@ void add_extra(afl_state_t *afl, u8 *mem, u32 len) {
if (afl->extras_cnt == afl->max_det_extras + 1) {
- OKF("More than %d tokens - will use them probabilistically.",
- afl->max_det_extras);
+ WARNF("More than %d tokens - will use them probabilistically.",
+ afl->max_det_extras);
}
@@ -609,7 +684,7 @@ void load_auto(afl_state_t *afl) {
} else {
- OKF("No auto-generated dictionary tokens to reuse.");
+ ACTF("No auto-generated dictionary tokens to reuse.");
}
diff --git a/src/afl-fuzz-init.c b/src/afl-fuzz-init.c
index 102f04b9..cbac3822 100644
--- a/src/afl-fuzz-init.c
+++ b/src/afl-fuzz-init.c
@@ -311,7 +311,7 @@ void bind_to_free_cpu(afl_state_t *afl) {
}
- for (i = 0; i < proccount; i++) {
+ for (i = 0; i < (s32)proccount; i++) {
if (procs[i].p_cpuid < sizeof(cpu_used) && procs[i].p_pctcpu > 0)
cpu_used[procs[i].p_cpuid] = 1;
@@ -611,37 +611,43 @@ void read_foreign_testcases(afl_state_t *afl, int first) {
/* Read all testcases from the input directory, then queue them for testing.
Called at startup. */
-void read_testcases(afl_state_t *afl) {
+void read_testcases(afl_state_t *afl, u8 *directory) {
struct dirent **nl;
- s32 nl_cnt;
+ s32 nl_cnt, subdirs = 1;
u32 i;
- u8 * fn1;
-
- u8 val_buf[2][STRINGIFY_VAL_SIZE_MAX];
+ u8 * fn1, *dir = directory;
+ u8 val_buf[2][STRINGIFY_VAL_SIZE_MAX];
/* Auto-detect non-in-place resumption attempts. */
- fn1 = alloc_printf("%s/queue", afl->in_dir);
- if (!access(fn1, F_OK)) {
+ if (dir == NULL) {
- afl->in_dir = fn1;
+ fn1 = alloc_printf("%s/queue", afl->in_dir);
+ if (!access(fn1, F_OK)) {
- } else {
+ afl->in_dir = fn1;
+ subdirs = 0;
- ck_free(fn1);
+ } else {
+
+ ck_free(fn1);
+
+ }
+
+ dir = afl->in_dir;
}
- ACTF("Scanning '%s'...", afl->in_dir);
+ ACTF("Scanning '%s'...", dir);
/* We use scandir() + alphasort() rather than readdir() because otherwise,
the ordering of test cases would vary somewhat randomly and would be
difficult to control. */
- nl_cnt = scandir(afl->in_dir, &nl, NULL, alphasort);
+ nl_cnt = scandir(dir, &nl, NULL, alphasort);
- if (nl_cnt < 0) {
+ if (nl_cnt < 0 && directory == NULL) {
if (errno == ENOENT || errno == ENOTDIR) {
@@ -656,7 +662,7 @@ void read_testcases(afl_state_t *afl) {
}
- PFATAL("Unable to open '%s'", afl->in_dir);
+ PFATAL("Unable to open '%s'", dir);
}
@@ -674,19 +680,29 @@ void read_testcases(afl_state_t *afl) {
u8 dfn[PATH_MAX];
snprintf(dfn, PATH_MAX, "%s/.state/deterministic_done/%s", afl->in_dir,
nl[i]->d_name);
- u8 *fn2 = alloc_printf("%s/%s", afl->in_dir, nl[i]->d_name);
+ u8 *fn2 = alloc_printf("%s/%s", dir, nl[i]->d_name);
u8 passed_det = 0;
- free(nl[i]); /* not tracked */
-
if (lstat(fn2, &st) || access(fn2, R_OK)) {
PFATAL("Unable to access '%s'", fn2);
}
- /* This also takes care of . and .. */
+ /* obviously we want to skip "descending" into . and .. directories,
+ however it is a good idea to skip also directories that start with
+ a dot */
+ if (subdirs && S_ISDIR(st.st_mode) && nl[i]->d_name[0] != '.') {
+
+ free(nl[i]); /* not tracked */
+ read_testcases(afl, fn2);
+ ck_free(fn2);
+ continue;
+
+ }
+
+ free(nl[i]);
if (!S_ISREG(st.st_mode) || !st.st_size || strstr(fn2, "/README.txt")) {
@@ -697,11 +713,9 @@ void read_testcases(afl_state_t *afl) {
if (st.st_size > MAX_FILE) {
- WARNF("Test case '%s' is too big (%s, limit is %s), skipping", fn2,
+ WARNF("Test case '%s' is too big (%s, limit is %s), partial reading", fn2,
stringify_mem_size(val_buf[0], sizeof(val_buf[0]), st.st_size),
stringify_mem_size(val_buf[1], sizeof(val_buf[1]), MAX_FILE));
- ck_free(fn2);
- continue;
}
@@ -712,13 +726,14 @@ void read_testcases(afl_state_t *afl) {
if (!access(dfn, F_OK)) { passed_det = 1; }
- add_to_queue(afl, fn2, st.st_size, passed_det);
+ add_to_queue(afl, fn2, st.st_size >= MAX_FILE ? MAX_FILE : st.st_size,
+ passed_det);
}
free(nl); /* not tracked */
- if (!afl->queued_paths) {
+ if (!afl->queued_paths && directory == NULL) {
SAYF("\n" cLRD "[-] " cRST
"Looks like there are no valid test cases in the input directory! The "
@@ -931,7 +946,31 @@ void perform_dry_run(afl_state_t *afl) {
#undef MSG_ULIMIT_USAGE
#undef MSG_FORK_ON_APPLE
- FATAL("Test case '%s' results in a crash", fn);
+ WARNF("Test case '%s' results in a crash, skipping", fn);
+
+ /* Remove from fuzzing queue but keep for splicing */
+
+ struct queue_entry *p = afl->queue;
+ while (p && p->next != q)
+ p = p->next;
+
+ if (p)
+ p->next = q->next;
+ else
+ afl->queue = q->next;
+
+ --afl->pending_not_fuzzed;
+
+ afl->max_depth = 0;
+ p = afl->queue;
+ while (p) {
+
+ if (p->depth > afl->max_depth) afl->max_depth = p->depth;
+ p = p->next;
+
+ }
+
+ break;
case FSRV_RUN_ERROR:
@@ -985,6 +1024,76 @@ void perform_dry_run(afl_state_t *afl) {
}
+ /* Now we remove all entries from the queue that have a duplicate trace map */
+
+ q = afl->queue;
+ struct queue_entry *p, *prev = NULL;
+ int duplicates = 0;
+
+restart_outer_cull_loop:
+
+ while (q) {
+
+ if (q->cal_failed || !q->exec_cksum) continue;
+
+ restart_inner_cull_loop:
+
+ p = q->next;
+
+ while (p) {
+
+ if (!p->cal_failed && p->exec_cksum == q->exec_cksum) {
+
+ duplicates = 1;
+ --afl->pending_not_fuzzed;
+
+ // We do not remove any of the memory allocated because for
+ // splicing the data might still be interesting.
+ // We only decouple them from the linked list.
+ // This will result in some leaks at exit, but who cares.
+
+ // we keep the shorter file
+ if (p->len >= q->len) {
+
+ q->next = p->next;
+ goto restart_inner_cull_loop;
+
+ } else {
+
+ if (prev)
+ prev->next = q = p;
+ else
+ afl->queue = q = p;
+ goto restart_outer_cull_loop;
+
+ }
+
+ }
+
+ p = p->next;
+
+ }
+
+ prev = q;
+ q = q->next;
+
+ }
+
+ if (duplicates) {
+
+ afl->max_depth = 0;
+ q = afl->queue;
+ while (q) {
+
+ if (q->depth > afl->max_depth) afl->max_depth = q->depth;
+ q = q->next;
+
+ }
+
+ afl->queue_top = afl->queue;
+
+ }
+
OKF("All test cases processed.");
}
@@ -1666,7 +1775,6 @@ int check_main_node_exists(afl_state_t *afl) {
void setup_dirs_fds(afl_state_t *afl) {
u8 *tmp;
- s32 fd;
ACTF("Setting up output directories...");
@@ -1792,7 +1900,7 @@ void setup_dirs_fds(afl_state_t *afl) {
/* Gnuplot output file. */
tmp = alloc_printf("%s/plot_data", afl->out_dir);
- fd = open(tmp, O_WRONLY | O_CREAT | O_EXCL, 0600);
+ int fd = open(tmp, O_WRONLY | O_CREAT | O_EXCL, 0600);
if (fd < 0) { PFATAL("Unable to create '%s'", tmp); }
ck_free(tmp);
@@ -2074,6 +2182,8 @@ void check_cpu_governor(afl_state_t *afl) {
"drop.\n",
min / 1024, max / 1024);
FATAL("Suboptimal CPU scaling governor");
+#else
+ (void)afl;
#endif
}
diff --git a/src/afl-fuzz-mutators.c b/src/afl-fuzz-mutators.c
index d24b7db9..c4d7233c 100644
--- a/src/afl-fuzz-mutators.c
+++ b/src/afl-fuzz-mutators.c
@@ -93,9 +93,9 @@ void setup_custom_mutators(afl_state_t *afl) {
}
- struct custom_mutator *mutator = load_custom_mutator_py(afl, module_name);
+ struct custom_mutator *m = load_custom_mutator_py(afl, module_name);
afl->custom_mutators_count++;
- list_append(&afl->custom_mutator_list, mutator);
+ list_append(&afl->custom_mutator_list, m);
}
diff --git a/src/afl-fuzz-one.c b/src/afl-fuzz-one.c
index bf568c38..5737c1f5 100644
--- a/src/afl-fuzz-one.c
+++ b/src/afl-fuzz-one.c
@@ -1707,20 +1707,8 @@ custom_mutator_stage:
} while (tid == afl->current_entry && afl->queued_paths > 1);
- target = afl->queue;
-
- while (tid >= 100) {
-
- target = target->next_100;
- tid -= 100;
-
- }
-
- while (tid--) {
-
- target = target->next;
-
- }
+ afl->splicing_with = tid;
+ target = afl->queue_buf[tid];
/* Make sure that the target has a reasonable length. */
@@ -4518,20 +4506,7 @@ pacemaker_fuzzing:
} while (tid == afl->current_entry);
afl->splicing_with = tid;
- target = afl->queue;
-
- while (tid >= 100) {
-
- target = target->next_100;
- tid -= 100;
-
- }
-
- while (tid--) {
-
- target = target->next;
-
- }
+ target = afl->queue_buf[tid];
/* Make sure that the target has a reasonable length. */
diff --git a/src/afl-fuzz-queue.c b/src/afl-fuzz-queue.c
index c6d8225f..336b7f4f 100644
--- a/src/afl-fuzz-queue.c
+++ b/src/afl-fuzz-queue.c
@@ -230,7 +230,7 @@ void add_to_queue(afl_state_t *afl, u8 *fname, u32 len, u8 passed_det) {
} else {
- afl->q_prev100 = afl->queue = afl->queue_top = q;
+ afl->queue = afl->queue_top = q;
}
@@ -239,13 +239,6 @@ void add_to_queue(afl_state_t *afl, u8 *fname, u32 len, u8 passed_det) {
afl->cycles_wo_finds = 0;
- if (!(afl->queued_paths % 100)) {
-
- afl->q_prev100->next_100 = q;
- afl->q_prev100 = q;
-
- }
-
struct queue_entry **queue_buf = afl_realloc(
AFL_BUF_PARAM(queue), afl->queued_paths * sizeof(struct queue_entry *));
if (unlikely(!queue_buf)) { PFATAL("alloc"); }
@@ -281,15 +274,15 @@ void add_to_queue(afl_state_t *afl, u8 *fname, u32 len, u8 passed_det) {
void destroy_queue(afl_state_t *afl) {
- struct queue_entry *q = afl->queue, *n;
+ struct queue_entry *q;
+ u32 i;
- while (q) {
+ for (i = 0; i < afl->queued_paths; i++) {
- n = q->next;
+ q = afl->queue_buf[i];
ck_free(q->fname);
ck_free(q->trace_mini);
ck_free(q);
- q = n;
}
@@ -509,7 +502,7 @@ u32 calculate_score(afl_state_t *afl, struct queue_entry *q) {
// Longer execution time means longer work on the input, the deeper in
// coverage, the better the fuzzing, right? -mh
- if (afl->schedule >= RARE && likely(!afl->fixed_seed)) {
+ if (likely(afl->schedule < RARE) && likely(!afl->fixed_seed)) {
if (q->exec_us * 0.1 > avg_exec_us) {
diff --git a/src/afl-fuzz-run.c b/src/afl-fuzz-run.c
index 6fa142d2..5e74dff3 100644
--- a/src/afl-fuzz-run.c
+++ b/src/afl-fuzz-run.c
@@ -394,6 +394,8 @@ u8 calibrate_case(afl_state_t *afl, struct queue_entry *q, u8 *use_mem,
unlikely(afl->first_trace[i] != afl->fsrv.trace_bits[i])) {
afl->var_bytes[i] = 1;
+ // ignore the variable edge by setting it to fully discovered
+ afl->virgin_bits[i] = 0;
}
diff --git a/src/afl-fuzz-state.c b/src/afl-fuzz-state.c
index 577fc34f..4e817843 100644
--- a/src/afl-fuzz-state.c
+++ b/src/afl-fuzz-state.c
@@ -87,7 +87,7 @@ void afl_state_init(afl_state_t *afl, uint32_t map_size) {
afl->w_end = 0.3;
afl->g_max = 5000;
afl->period_pilot_tmp = 5000.0;
- afl->schedule = EXPLORE; /* Power schedule (default: EXPLORE)*/
+ afl->schedule = SEEK; /* Power schedule (default: SEEK) */
afl->havoc_max_mult = HAVOC_MAX_MULT;
afl->clear_screen = 1; /* Window resized? */
diff --git a/src/afl-fuzz-stats.c b/src/afl-fuzz-stats.c
index ffef7647..2f1e3367 100644
--- a/src/afl-fuzz-stats.c
+++ b/src/afl-fuzz-stats.c
@@ -35,12 +35,12 @@ void write_setup_file(afl_state_t *afl, u32 argc, char **argv) {
u8 fn[PATH_MAX];
snprintf(fn, PATH_MAX, "%s/fuzzer_setup", afl->out_dir);
FILE *f = create_ffile(fn);
- u32 i;
+ u32 i;
fprintf(f, "# environment variables:\n");
- u32 s_afl_env = (u32)
- sizeof(afl_environment_variables) / sizeof(afl_environment_variables[0]) -
- 1U;
+ u32 s_afl_env = (u32)sizeof(afl_environment_variables) /
+ sizeof(afl_environment_variables[0]) -
+ 1U;
for (i = 0; i < s_afl_env; ++i) {
@@ -75,6 +75,7 @@ void write_setup_file(afl_state_t *afl, u32 argc, char **argv) {
}
}
+
fprintf(f, "\n");
fclose(f);
@@ -992,10 +993,9 @@ void show_stats(afl_state_t *afl) {
void show_init_stats(afl_state_t *afl) {
struct queue_entry *q = afl->queue;
- u32 min_bits = 0, max_bits = 0;
+ u32 min_bits = 0, max_bits = 0, max_len = 0, count = 0;
u64 min_us = 0, max_us = 0;
u64 avg_us = 0;
- u32 max_len = 0;
u8 val_bufs[4][STRINGIFY_VAL_SIZE_MAX];
#define IB(i) val_bufs[(i)], sizeof(val_bufs[(i)])
@@ -1016,6 +1016,7 @@ void show_init_stats(afl_state_t *afl) {
if (q->len > max_len) { max_len = q->len; }
+ ++count;
q = q->next;
}
@@ -1031,7 +1032,11 @@ void show_init_stats(afl_state_t *afl) {
/* Let's keep things moving with slow binaries. */
- if (avg_us > 50000) {
+ if (unlikely(afl->fixed_seed)) {
+
+ afl->havoc_div = 1;
+
+ } else if (avg_us > 50000) {
afl->havoc_div = 10; /* 0-19 execs/sec */
@@ -1082,11 +1087,12 @@ void show_init_stats(afl_state_t *afl) {
OKF("Here are some useful stats:\n\n"
cGRA " Test case count : " cRST
- "%u favored, %u variable, %u total\n" cGRA " Bitmap range : " cRST
+ "%u favored, %u variable, %u ignored, %u total\n" cGRA
+ " Bitmap range : " cRST
"%u to %u bits (average: %0.02f bits)\n" cGRA
" Exec timing : " cRST "%s to %s us (average: %s us)\n",
- afl->queued_favored, afl->queued_variable, afl->queued_paths, min_bits,
- max_bits,
+ afl->queued_favored, afl->queued_variable, afl->queued_paths - count,
+ afl->queued_paths, min_bits, max_bits,
((double)afl->total_bitmap_size) /
(afl->total_bitmap_entries ? afl->total_bitmap_entries : 1),
stringify_int(IB(0), min_us), stringify_int(IB(1), max_us),
@@ -1101,7 +1107,11 @@ void show_init_stats(afl_state_t *afl) {
random scheduler jitter is less likely to have any impact, and because
our patience is wearing thin =) */
- if (avg_us > 50000) {
+ if (unlikely(afl->fixed_seed)) {
+
+ afl->fsrv.exec_tmout = avg_us * 5 / 1000;
+
+ } else if (avg_us > 50000) {
afl->fsrv.exec_tmout = avg_us * 2 / 1000;
diff --git a/src/afl-fuzz.c b/src/afl-fuzz.c
index c12d5db5..ea24011e 100644
--- a/src/afl-fuzz.c
+++ b/src/afl-fuzz.c
@@ -89,11 +89,10 @@ static void usage(u8 *argv0, int more_help) {
" -o dir - output directory for fuzzer findings\n\n"
"Execution control settings:\n"
- " -p schedule - power schedules compute a seed's performance score. "
- "<explore\n"
- " (default), fast, coe, lin, quad, exploit, mmopt, "
- "rare, seek>\n"
- " see docs/power_schedules.md\n"
+ " -p schedule - power schedules compute a seed's performance score:\n"
+ " <seek (default), explore, rare, exploit, mmopt, coe, "
+ "fast,\n"
+ " lin, quad> -- see docs/power_schedules.md\n"
" -f file - location read by the fuzzed program (default: stdin "
"or @@)\n"
" -t msec - timeout for each run (auto-scaled, 50-%d ms)\n"
@@ -119,8 +118,8 @@ static void usage(u8 *argv0, int more_help) {
"etc.)\n"
" -d - quick & dirty mode (skips deterministic steps)\n"
" -n - fuzz without instrumentation (non-instrumented mode)\n"
- " -x dict_file - optional fuzzer dictionary (see README.md, its really "
- "good!)\n\n"
+ " -x dict_file - fuzzer dictionary (see README.md, specify up to 4 "
+ "times)\n\n"
"Testing settings:\n"
" -s seed - use a fixed seed for the RNG\n"
@@ -243,11 +242,11 @@ static int stricmp(char const *a, char const *b) {
int main(int argc, char **argv_orig, char **envp) {
- s32 opt;
- u64 prev_queued = 0;
- u32 sync_interval_cnt = 0, seek_to, show_help = 0, map_size = MAP_SIZE;
- u8 * extras_dir = 0;
- u8 mem_limit_given = 0, exit_1 = 0, debug = 0;
+ s32 opt, i;
+ u64 prev_queued = 0;
+ u32 sync_interval_cnt = 0, seek_to, show_help = 0, map_size = MAP_SIZE;
+ u8 *extras_dir[4];
+ u8 mem_limit_given = 0, exit_1 = 0, debug = 0, extras_dir_cnt = 0, have_p = 0;
char **use_argv;
struct timeval tv;
@@ -349,15 +348,15 @@ int main(int argc, char **argv_orig, char **envp) {
afl->schedule = RARE;
- } else if (!stricmp(optarg, "seek")) {
+ } else if (!stricmp(optarg, "explore") || !stricmp(optarg, "afl")) {
- afl->schedule = SEEK;
+ afl->schedule = EXPLORE;
- } else if (!stricmp(optarg, "explore") || !stricmp(optarg, "default") ||
+ } else if (!stricmp(optarg, "seek") || !stricmp(optarg, "default") ||
- !stricmp(optarg, "normal") || !stricmp(optarg, "afl")) {
+ !stricmp(optarg, "normal")) {
- afl->schedule = EXPLORE;
+ afl->schedule = SEEK;
} else {
@@ -365,6 +364,8 @@ int main(int argc, char **argv_orig, char **envp) {
}
+ have_p = 1;
+
break;
case 'e':
@@ -450,8 +451,13 @@ int main(int argc, char **argv_orig, char **envp) {
case 'x': /* dictionary */
- if (extras_dir) { FATAL("Multiple -x options not supported"); }
- extras_dir = optarg;
+ if (extras_dir_cnt >= 4) {
+
+ FATAL("More than four -x options are not supported");
+
+ }
+
+ extras_dir[extras_dir_cnt++] = optarg;
break;
case 't': { /* timeout */
@@ -694,7 +700,7 @@ int main(int argc, char **argv_orig, char **envp) {
afl->swarm_now = 0;
if (afl->limit_time_puppet == 0) { afl->key_puppet = 1; }
- int i;
+ int j;
int tmp_swarm = 0;
if (afl->g_now > afl->g_max) { afl->g_now = 0; }
@@ -707,70 +713,70 @@ int main(int argc, char **argv_orig, char **envp) {
double total_puppet_temp = 0.0;
afl->swarm_fitness[tmp_swarm] = 0.0;
- for (i = 0; i < operator_num; ++i) {
+ for (j = 0; j < operator_num; ++j) {
- afl->stage_finds_puppet[tmp_swarm][i] = 0;
- afl->probability_now[tmp_swarm][i] = 0.0;
- afl->x_now[tmp_swarm][i] =
+ afl->stage_finds_puppet[tmp_swarm][j] = 0;
+ afl->probability_now[tmp_swarm][j] = 0.0;
+ afl->x_now[tmp_swarm][j] =
((double)(random() % 7000) * 0.0001 + 0.1);
- total_puppet_temp += afl->x_now[tmp_swarm][i];
- afl->v_now[tmp_swarm][i] = 0.1;
- afl->L_best[tmp_swarm][i] = 0.5;
- afl->G_best[i] = 0.5;
- afl->eff_best[tmp_swarm][i] = 0.0;
+ total_puppet_temp += afl->x_now[tmp_swarm][j];
+ afl->v_now[tmp_swarm][j] = 0.1;
+ afl->L_best[tmp_swarm][j] = 0.5;
+ afl->G_best[j] = 0.5;
+ afl->eff_best[tmp_swarm][j] = 0.0;
}
- for (i = 0; i < operator_num; ++i) {
+ for (j = 0; j < operator_num; ++j) {
- afl->stage_cycles_puppet_v2[tmp_swarm][i] =
- afl->stage_cycles_puppet[tmp_swarm][i];
- afl->stage_finds_puppet_v2[tmp_swarm][i] =
- afl->stage_finds_puppet[tmp_swarm][i];
- afl->x_now[tmp_swarm][i] =
- afl->x_now[tmp_swarm][i] / total_puppet_temp;
+ afl->stage_cycles_puppet_v2[tmp_swarm][j] =
+ afl->stage_cycles_puppet[tmp_swarm][j];
+ afl->stage_finds_puppet_v2[tmp_swarm][j] =
+ afl->stage_finds_puppet[tmp_swarm][j];
+ afl->x_now[tmp_swarm][j] =
+ afl->x_now[tmp_swarm][j] / total_puppet_temp;
}
double x_temp = 0.0;
- for (i = 0; i < operator_num; ++i) {
+ for (j = 0; j < operator_num; ++j) {
- afl->probability_now[tmp_swarm][i] = 0.0;
- afl->v_now[tmp_swarm][i] =
- afl->w_now * afl->v_now[tmp_swarm][i] +
+ afl->probability_now[tmp_swarm][j] = 0.0;
+ afl->v_now[tmp_swarm][j] =
+ afl->w_now * afl->v_now[tmp_swarm][j] +
RAND_C *
- (afl->L_best[tmp_swarm][i] - afl->x_now[tmp_swarm][i]) +
- RAND_C * (afl->G_best[i] - afl->x_now[tmp_swarm][i]);
+ (afl->L_best[tmp_swarm][j] - afl->x_now[tmp_swarm][j]) +
+ RAND_C * (afl->G_best[j] - afl->x_now[tmp_swarm][j]);
- afl->x_now[tmp_swarm][i] += afl->v_now[tmp_swarm][i];
+ afl->x_now[tmp_swarm][j] += afl->v_now[tmp_swarm][j];
- if (afl->x_now[tmp_swarm][i] > v_max) {
+ if (afl->x_now[tmp_swarm][j] > v_max) {
- afl->x_now[tmp_swarm][i] = v_max;
+ afl->x_now[tmp_swarm][j] = v_max;
- } else if (afl->x_now[tmp_swarm][i] < v_min) {
+ } else if (afl->x_now[tmp_swarm][j] < v_min) {
- afl->x_now[tmp_swarm][i] = v_min;
+ afl->x_now[tmp_swarm][j] = v_min;
}
- x_temp += afl->x_now[tmp_swarm][i];
+ x_temp += afl->x_now[tmp_swarm][j];
}
- for (i = 0; i < operator_num; ++i) {
+ for (j = 0; j < operator_num; ++j) {
- afl->x_now[tmp_swarm][i] = afl->x_now[tmp_swarm][i] / x_temp;
- if (likely(i != 0)) {
+ afl->x_now[tmp_swarm][j] = afl->x_now[tmp_swarm][j] / x_temp;
+ if (likely(j != 0)) {
- afl->probability_now[tmp_swarm][i] =
- afl->probability_now[tmp_swarm][i - 1] +
- afl->x_now[tmp_swarm][i];
+ afl->probability_now[tmp_swarm][j] =
+ afl->probability_now[tmp_swarm][j - 1] +
+ afl->x_now[tmp_swarm][j];
} else {
- afl->probability_now[tmp_swarm][i] = afl->x_now[tmp_swarm][i];
+ afl->probability_now[tmp_swarm][j] = afl->x_now[tmp_swarm][j];
}
@@ -785,13 +791,13 @@ int main(int argc, char **argv_orig, char **envp) {
}
- for (i = 0; i < operator_num; ++i) {
+ for (j = 0; j < operator_num; ++j) {
- afl->core_operator_finds_puppet[i] = 0;
- afl->core_operator_finds_puppet_v2[i] = 0;
- afl->core_operator_cycles_puppet[i] = 0;
- afl->core_operator_cycles_puppet_v2[i] = 0;
- afl->core_operator_cycles_puppet_v3[i] = 0;
+ afl->core_operator_finds_puppet[j] = 0;
+ afl->core_operator_finds_puppet_v2[j] = 0;
+ afl->core_operator_cycles_puppet[j] = 0;
+ afl->core_operator_cycles_puppet_v2[j] = 0;
+ afl->core_operator_cycles_puppet_v3[j] = 0;
}
@@ -828,10 +834,6 @@ int main(int argc, char **argv_orig, char **envp) {
"Eißfeldt, Andrea Fioraldi and Dominik Maier");
OKF("afl++ is open source, get it at "
"https://github.com/AFLplusplus/AFLplusplus");
- OKF("Power schedules from github.com/mboehme/aflfast");
- OKF("Python Mutator and llvm_mode instrument file list from "
- "github.com/choller/afl");
- OKF("MOpt Mutator from github.com/puppet-meteor/MOpt-AFL");
if (afl->sync_id && afl->is_main_node &&
afl->afl_env.afl_custom_mutator_only) {
@@ -1010,10 +1012,10 @@ int main(int argc, char **argv_orig, char **envp) {
u8 *afl_preload = getenv("AFL_PRELOAD");
u8 *buf;
- s32 i, afl_preload_size = strlen(afl_preload);
- for (i = 0; i < afl_preload_size; ++i) {
+ s32 j, afl_preload_size = strlen(afl_preload);
+ for (j = 0; j < afl_preload_size; ++j) {
- if (afl_preload[i] == ',') {
+ if (afl_preload[j] == ',') {
PFATAL(
"Comma (',') is not allowed in AFL_PRELOAD when -Q is "
@@ -1132,14 +1134,23 @@ int main(int argc, char **argv_orig, char **envp) {
setup_cmdline_file(afl, argv + optind);
- read_testcases(afl);
+ read_testcases(afl, NULL);
// read_foreign_testcases(afl, 1); for the moment dont do this
+ OKF("Loaded a total of %u seeds.", afl->queued_paths);
load_auto(afl);
pivot_inputs(afl);
- if (extras_dir) { load_extras(afl, extras_dir); }
+ if (extras_dir_cnt) {
+
+ for (i = 0; i < extras_dir_cnt; i++)
+ load_extras(afl, extras_dir[i]);
+
+ dedup_extras(afl);
+ OKF("Loaded a total of %u extras.", afl->extras_cnt);
+
+ }
if (!afl->timeout_given) { find_timeout(afl); }
@@ -1179,10 +1190,10 @@ int main(int argc, char **argv_orig, char **envp) {
if (!afl->fsrv.out_file) {
- u32 i = optind + 1;
- while (argv[i]) {
+ u32 j = optind + 1;
+ while (argv[j]) {
- u8 *aa_loc = strstr(argv[i], "@@");
+ u8 *aa_loc = strstr(argv[j], "@@");
if (aa_loc && !afl->fsrv.out_file) {
@@ -1205,7 +1216,7 @@ int main(int argc, char **argv_orig, char **envp) {
}
- ++i;
+ ++j;
}
@@ -1272,6 +1283,9 @@ int main(int argc, char **argv_orig, char **envp) {
cull_queue(afl);
+ if (!afl->pending_not_fuzzed)
+ FATAL("We need at least on valid input seed that does not crash!");
+
show_init_stats(afl);
seek_to = find_start_position(afl);
@@ -1352,7 +1366,7 @@ int main(int argc, char **argv_orig, char **envp) {
afl->expand_havoc = 2;
break;
case 2:
- // afl->cycle_schedules = 1;
+ if (!have_p) afl->schedule = EXPLOIT;
afl->expand_havoc = 3;
break;
case 3:
diff --git a/src/afl-gcc.c b/src/afl-gcc.c
deleted file mode 100644
index 97564aea..00000000
--- a/src/afl-gcc.c
+++ /dev/null
@@ -1,488 +0,0 @@
-/*
- american fuzzy lop++ - wrapper for GCC and clang
- ------------------------------------------------
-
- Originally written by Michal Zalewski
-
- Now maintained by Marc Heuse <mh@mh-sec.de>,
- Heiko Eißfeldt <heiko.eissfeldt@hexco.de> and
- Andrea Fioraldi <andreafioraldi@gmail.com>
-
- Copyright 2016, 2017 Google Inc. All rights reserved.
- Copyright 2019-2020 AFLplusplus Project. All rights reserved.
-
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at:
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- This program is a drop-in replacement for GCC or clang. The most common way
- of using it is to pass the path to afl-gcc or afl-clang via CC when invoking
- ./configure.
-
- (Of course, use CXX and point it to afl-g++ / afl-clang++ for C++ code.)
-
- The wrapper needs to know the path to afl-as (renamed to 'as'). The default
- is /usr/local/lib/afl/. A convenient way to specify alternative directories
- would be to set AFL_PATH.
-
- If AFL_HARDEN is set, the wrapper will compile the target app with various
- hardening options that may help detect memory management issues more
- reliably. You can also specify AFL_USE_ASAN to enable ASAN.
-
- If you want to call a non-default compiler as a next step of the chain,
- specify its location via AFL_CC or AFL_CXX.
-
- */
-
-#define AFL_MAIN
-
-#include "config.h"
-#include "types.h"
-#include "debug.h"
-#include "alloc-inl.h"
-
-#include <stdio.h>
-#include <unistd.h>
-#include <stdlib.h>
-#include <string.h>
-
-static u8 * as_path; /* Path to the AFL 'as' wrapper */
-static u8 **cc_params; /* Parameters passed to the real CC */
-static u32 cc_par_cnt = 1; /* Param count, including argv0 */
-static u8 be_quiet, /* Quiet mode */
- clang_mode; /* Invoked as afl-clang*? */
-
-/* Try to find our "fake" GNU assembler in AFL_PATH or at the location derived
- from argv[0]. If that fails, abort. */
-
-static void find_as(u8 *argv0) {
-
- u8 *afl_path = getenv("AFL_PATH");
- u8 *slash, *tmp;
-
- if (afl_path) {
-
- tmp = alloc_printf("%s/as", afl_path);
-
- if (!access(tmp, X_OK)) {
-
- as_path = afl_path;
- ck_free(tmp);
- return;
-
- }
-
- ck_free(tmp);
-
- }
-
- slash = strrchr(argv0, '/');
-
- if (slash) {
-
- u8 *dir;
-
- *slash = 0;
- dir = ck_strdup(argv0);
- *slash = '/';
-
- tmp = alloc_printf("%s/afl-as", dir);
-
- if (!access(tmp, X_OK)) {
-
- as_path = dir;
- ck_free(tmp);
- return;
-
- }
-
- ck_free(tmp);
- ck_free(dir);
-
- }
-
- if (!access(AFL_PATH "/as", X_OK)) {
-
- as_path = AFL_PATH;
- return;
-
- }
-
- FATAL("Unable to find AFL wrapper binary for 'as'. Please set AFL_PATH");
-
-}
-
-/* Copy argv to cc_params, making the necessary edits. */
-
-static void edit_params(u32 argc, char **argv) {
-
- u8 fortify_set = 0, asan_set = 0;
- u8 *name;
-
-#if defined(__FreeBSD__) && defined(WORD_SIZE_64)
- u8 m32_set = 0;
-#endif
-
- cc_params = ck_alloc((argc + 128) * sizeof(u8 *));
-
- name = strrchr(argv[0], '/');
- if (!name) {
-
- name = argv[0];
-
- /* This should never happen but fixes a scan-build warning */
- if (!name) { FATAL("Empty argv set"); }
-
- } else {
-
- ++name;
-
- }
-
- if (!strncmp(name, "afl-clang", 9)) {
-
- clang_mode = 1;
-
- setenv(CLANG_ENV_VAR, "1", 1);
-
- if (!strcmp(name, "afl-clang++")) {
-
- u8 *alt_cxx = getenv("AFL_CXX");
- cc_params[0] = alt_cxx && *alt_cxx ? alt_cxx : (u8 *)"clang++";
-
- } else if (!strcmp(name, "afl-clang")) {
-
- u8 *alt_cc = getenv("AFL_CC");
- cc_params[0] = alt_cc && *alt_cc ? alt_cc : (u8 *)"clang";
-
- } else {
-
- fprintf(stderr, "Name of the binary: %s\n", argv[0]);
- FATAL("Name of the binary is not a known name, expected afl-clang(++)");
-
- }
-
- } else {
-
- /* With GCJ and Eclipse installed, you can actually compile Java! The
- instrumentation will work (amazingly). Alas, unhandled exceptions do
- not call abort(), so afl-fuzz would need to be modified to equate
- non-zero exit codes with crash conditions when working with Java
- binaries. Meh. */
-
-#ifdef __APPLE__
-
- if (!strcmp(name, "afl-g++")) {
-
- cc_params[0] = getenv("AFL_CXX");
-
- } else if (!strcmp(name, "afl-gcj")) {
-
- cc_params[0] = getenv("AFL_GCJ");
-
- } else if (!strcmp(name, "afl-gcc")) {
-
- cc_params[0] = getenv("AFL_CC");
-
- } else {
-
- fprintf(stderr, "Name of the binary: %s\n", argv[0]);
- FATAL("Name of the binary is not a known name, expected afl-gcc/g++/gcj");
-
- }
-
- if (!cc_params[0]) {
-
- SAYF("\n" cLRD "[-] " cRST
- "On Apple systems, 'gcc' is usually just a wrapper for clang. "
- "Please use the\n"
- " 'afl-clang' utility instead of 'afl-gcc'. If you really have "
- "GCC installed,\n"
- " set AFL_CC or AFL_CXX to specify the correct path to that "
- "compiler.\n");
-
- FATAL("AFL_CC or AFL_CXX required on MacOS X");
-
- }
-
-#else
-
- if (!strcmp(name, "afl-g++")) {
-
- u8 *alt_cxx = getenv("AFL_CXX");
- cc_params[0] = alt_cxx && *alt_cxx ? alt_cxx : (u8 *)"g++";
-
- } else if (!strcmp(name, "afl-gcj")) {
-
- u8 *alt_cc = getenv("AFL_GCJ");
- cc_params[0] = alt_cc && *alt_cc ? alt_cc : (u8 *)"gcj";
-
- } else if (!strcmp(name, "afl-gcc")) {
-
- u8 *alt_cc = getenv("AFL_CC");
- cc_params[0] = alt_cc && *alt_cc ? alt_cc : (u8 *)"gcc";
-
- } else {
-
- fprintf(stderr, "Name of the binary: %s\n", argv[0]);
- FATAL("Name of the binary is not a known name, expected afl-gcc/g++/gcj");
-
- }
-
-#endif /* __APPLE__ */
-
- }
-
- while (--argc) {
-
- u8 *cur = *(++argv);
-
- if (!strncmp(cur, "-B", 2)) {
-
- if (!be_quiet) { WARNF("-B is already set, overriding"); }
-
- if (!cur[2] && argc > 1) {
-
- argc--;
- argv++;
-
- }
-
- continue;
-
- }
-
- if (!strcmp(cur, "-integrated-as")) { continue; }
-
- if (!strcmp(cur, "-pipe")) { continue; }
-
-#if defined(__FreeBSD__) && defined(WORD_SIZE_64)
- if (!strcmp(cur, "-m32")) m32_set = 1;
-#endif
-
- if (!strcmp(cur, "-fsanitize=address") ||
- !strcmp(cur, "-fsanitize=memory")) {
-
- asan_set = 1;
-
- }
-
- if (strstr(cur, "FORTIFY_SOURCE")) { fortify_set = 1; }
-
- cc_params[cc_par_cnt++] = cur;
-
- }
-
- cc_params[cc_par_cnt++] = "-B";
- cc_params[cc_par_cnt++] = as_path;
-
- if (clang_mode) { cc_params[cc_par_cnt++] = "-no-integrated-as"; }
-
- if (getenv("AFL_HARDEN")) {
-
- cc_params[cc_par_cnt++] = "-fstack-protector-all";
-
- if (!fortify_set) { cc_params[cc_par_cnt++] = "-D_FORTIFY_SOURCE=2"; }
-
- }
-
- if (asan_set) {
-
- /* Pass this on to afl-as to adjust map density. */
-
- setenv("AFL_USE_ASAN", "1", 1);
-
- } else if (getenv("AFL_USE_ASAN")) {
-
- if (getenv("AFL_USE_MSAN")) {
-
- FATAL("ASAN and MSAN are mutually exclusive");
-
- }
-
- if (getenv("AFL_HARDEN")) {
-
- FATAL("ASAN and AFL_HARDEN are mutually exclusive");
-
- }
-
- cc_params[cc_par_cnt++] = "-U_FORTIFY_SOURCE";
- cc_params[cc_par_cnt++] = "-fsanitize=address";
-
- } else if (getenv("AFL_USE_MSAN")) {
-
- if (getenv("AFL_USE_ASAN")) {
-
- FATAL("ASAN and MSAN are mutually exclusive");
-
- }
-
- if (getenv("AFL_HARDEN")) {
-
- FATAL("MSAN and AFL_HARDEN are mutually exclusive");
-
- }
-
- cc_params[cc_par_cnt++] = "-U_FORTIFY_SOURCE";
- cc_params[cc_par_cnt++] = "-fsanitize=memory";
-
- }
-
- if (getenv("AFL_USE_UBSAN")) {
-
- cc_params[cc_par_cnt++] = "-fsanitize=undefined";
- cc_params[cc_par_cnt++] = "-fsanitize-undefined-trap-on-error";
- cc_params[cc_par_cnt++] = "-fno-sanitize-recover=all";
-
- }
-
-#if defined(USEMMAP) && !defined(__HAIKU__)
- cc_params[cc_par_cnt++] = "-lrt";
-#endif
-
- if (!getenv("AFL_DONT_OPTIMIZE")) {
-
-#if defined(__FreeBSD__) && defined(WORD_SIZE_64)
-
- /* On 64-bit FreeBSD systems, clang -g -m32 is broken, but -m32 itself
- works OK. This has nothing to do with us, but let's avoid triggering
- that bug. */
-
- if (!clang_mode || !m32_set) cc_params[cc_par_cnt++] = "-g";
-
-#else
-
- cc_params[cc_par_cnt++] = "-g";
-
-#endif
-
- cc_params[cc_par_cnt++] = "-O3";
- cc_params[cc_par_cnt++] = "-funroll-loops";
-
- /* Two indicators that you're building for fuzzing; one of them is
- AFL-specific, the other is shared with libfuzzer. */
-
- cc_params[cc_par_cnt++] = "-D__AFL_COMPILER=1";
- cc_params[cc_par_cnt++] = "-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION=1";
-
- }
-
- if (getenv("AFL_NO_BUILTIN")) {
-
- cc_params[cc_par_cnt++] = "-fno-builtin-strcmp";
- cc_params[cc_par_cnt++] = "-fno-builtin-strncmp";
- cc_params[cc_par_cnt++] = "-fno-builtin-strcasecmp";
- cc_params[cc_par_cnt++] = "-fno-builtin-strncasecmp";
- cc_params[cc_par_cnt++] = "-fno-builtin-memcmp";
- cc_params[cc_par_cnt++] = "-fno-builtin-bcmp";
- cc_params[cc_par_cnt++] = "-fno-builtin-strstr";
- cc_params[cc_par_cnt++] = "-fno-builtin-strcasestr";
-
- }
-
- cc_params[cc_par_cnt] = NULL;
-
-}
-
-/* Main entry point */
-
-int main(int argc, char **argv) {
-
- char *env_info =
- "Environment variables used by afl-gcc:\n"
- "AFL_CC: path to the C compiler to use\n"
- "AFL_CXX: path to the C++ compiler to use\n"
- "AFL_GCJ: path to the java compiler to use\n"
- "AFL_PATH: path to the instrumenting assembler\n"
- "AFL_DONT_OPTIMIZE: disable optimization instead of -O3\n"
- "AFL_NO_BUILTIN: compile for use with libtokencap.so\n"
- "AFL_QUIET: suppress verbose output\n"
- "AFL_CAL_FAST: speed up the initial calibration\n"
- "AFL_HARDEN: adds code hardening to catch memory bugs\n"
- "AFL_USE_ASAN: activate address sanitizer\n"
- "AFL_USE_MSAN: activate memory sanitizer\n"
- "AFL_USE_UBSAN: activate undefined behaviour sanitizer\n"
-
- "\nEnvironment variables used by afl-as (called by afl-gcc):\n"
- "AFL_AS: path to the assembler to use\n"
- "TMPDIR: set the directory for temporary files of afl-as\n"
- "TEMP: fall back path to directory for temporary files\n"
- "TMP: fall back path to directory for temporary files\n"
- "AFL_INST_RATIO: percentage of branches to instrument\n"
- "AFL_QUIET: suppress verbose output\n"
- "AFL_KEEP_ASSEMBLY: leave instrumented assembly files\n"
- "AFL_AS_FORCE_INSTRUMENT: force instrumentation for asm sources\n";
-
- if (argc == 2 && strncmp(argv[1], "-h", 2) == 0) {
-
- printf("afl-cc" VERSION " by Michal Zalewski\n\n");
- printf("%s \n\n", argv[0]);
- printf("afl-gcc has no command line options\n\n%s\n", env_info);
- printf(
- "NOTE: afl-gcc is deprecated, llvm_mode is much faster and has more "
- "options\n");
- return -1;
-
- }
-
- if ((isatty(2) && !getenv("AFL_QUIET")) || getenv("AFL_DEBUG") != NULL) {
-
- SAYF(cCYA "afl-cc" VERSION cRST " by Michal Zalewski\n");
- SAYF(cYEL "[!] " cBRI "NOTE: " cRST
- "afl-gcc is deprecated, llvm_mode is much faster and has more "
- "options\n");
-
- } else {
-
- be_quiet = 1;
-
- }
-
- if (argc < 2) {
-
- SAYF(
- "\n"
- "This is a helper application for afl-fuzz. It serves as a drop-in "
- "replacement\n"
- "for gcc or clang, letting you recompile third-party code with the "
- "required\n"
- "runtime instrumentation. A common use pattern would be one of the "
- "following:\n\n"
-
- " CC=%s/afl-gcc ./configure\n"
- " CXX=%s/afl-g++ ./configure\n\n%s"
-
- ,
- BIN_PATH, BIN_PATH, env_info);
-
- exit(1);
-
- }
-
- u8 *ptr;
- if (!be_quiet &&
- ((ptr = getenv("AFL_MAP_SIZE")) || (ptr = getenv("AFL_MAPSIZE")))) {
-
- u32 map_size = atoi(ptr);
- if (map_size != MAP_SIZE) {
-
- WARNF("AFL_MAP_SIZE is not supported by afl-gcc");
-
- }
-
- }
-
- find_as(argv[0]);
-
- edit_params(argc, argv);
-
- execvp(cc_params[0], (char **)cc_params);
-
- FATAL("Oops, failed to execute '%s' - check your PATH", cc_params[0]);
-
- return 0;
-
-}
-
diff --git a/src/afl-ld-lto.c b/src/afl-ld-lto.c
new file mode 100644
index 00000000..771e2d0d
--- /dev/null
+++ b/src/afl-ld-lto.c
@@ -0,0 +1,358 @@
+/*
+ american fuzzy lop++ - wrapper for llvm 11+ lld
+ -----------------------------------------------
+
+ Written by Marc Heuse <mh@mh-sec.de> for afl++
+
+ Maintained by Marc Heuse <mh@mh-sec.de>,
+ Heiko Eißfeldt <heiko.eissfeldt@hexco.de>
+ Andrea Fioraldi <andreafioraldi@gmail.com>
+ Dominik Maier <domenukk@gmail.com>
+
+ Copyright 2019-2020 AFLplusplus Project. All rights reserved.
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at:
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ The sole purpose of this wrapper is to preprocess clang LTO files when
+ linking with lld and performing the instrumentation on the whole program.
+
+*/
+
+#define AFL_MAIN
+#define _GNU_SOURCE
+
+#include "config.h"
+#include "types.h"
+#include "debug.h"
+#include "alloc-inl.h"
+
+#include <stdio.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <string.h>
+#include <time.h>
+#include <ctype.h>
+#include <fcntl.h>
+
+#include <sys/stat.h>
+#include <sys/types.h>
+#include <sys/wait.h>
+#include <sys/time.h>
+
+#include <dirent.h>
+
+#define MAX_PARAM_COUNT 4096
+
+static u8 **ld_params; /* Parameters passed to the real 'ld' */
+
+static u8 *afl_path = AFL_PATH;
+static u8 *real_ld = AFL_REAL_LD;
+
+static u8 be_quiet, /* Quiet mode (no stderr output) */
+ debug, /* AFL_DEBUG */
+ passthrough, /* AFL_LD_PASSTHROUGH - no link+optimize*/
+ just_version; /* Just show version? */
+
+static u32 ld_param_cnt = 1; /* Number of params to 'ld' */
+
+/* Examine and modify parameters to pass to 'ld', 'llvm-link' and 'llmv-ar'.
+ Note that the file name is always the last parameter passed by GCC,
+ so we exploit this property to keep the code "simple". */
+static void edit_params(int argc, char **argv) {
+
+ u32 i, instrim = 0, gold_pos = 0, gold_present = 0, rt_present = 0,
+ rt_lto_present = 0, inst_present = 0;
+ char *ptr;
+
+ ld_params = ck_alloc(4096 * sizeof(u8 *));
+
+ ld_params[0] = (u8 *)real_ld;
+
+ if (!passthrough) {
+
+ for (i = 1; i < argc; i++) {
+
+ if (strstr(argv[i], "/afl-llvm-rt-lto.o") != NULL) rt_lto_present = 1;
+ if (strstr(argv[i], "/afl-llvm-rt.o") != NULL) rt_present = 1;
+ if (strstr(argv[i], "/afl-llvm-lto-instr") != NULL) inst_present = 1;
+
+ }
+
+ for (i = 1; i < argc && !gold_pos; i++) {
+
+ if (strcmp(argv[i], "-plugin") == 0) {
+
+ if (strncmp(argv[i], "-plugin=", strlen("-plugin=")) == 0) {
+
+ if (strcasestr(argv[i], "LLVMgold.so") != NULL)
+ gold_present = gold_pos = i + 1;
+
+ } else if (i < argc && strcasestr(argv[i + 1], "LLVMgold.so") != NULL) {
+
+ gold_present = gold_pos = i + 2;
+
+ }
+
+ }
+
+ }
+
+ if (!gold_pos) {
+
+ for (i = 1; i + 1 < argc && !gold_pos; i++) {
+
+ if (argv[i][0] != '-') {
+
+ if (argv[i - 1][0] == '-') {
+
+ switch (argv[i - 1][1]) {
+
+ case 'b':
+ break;
+ case 'd':
+ break;
+ case 'e':
+ break;
+ case 'F':
+ break;
+ case 'f':
+ break;
+ case 'I':
+ break;
+ case 'l':
+ break;
+ case 'L':
+ break;
+ case 'm':
+ break;
+ case 'o':
+ break;
+ case 'O':
+ break;
+ case 'p':
+ if (index(argv[i - 1], '=') == NULL) gold_pos = i;
+ break;
+ case 'R':
+ break;
+ case 'T':
+ break;
+ case 'u':
+ break;
+ case 'y':
+ break;
+ case 'z':
+ break;
+ case '-': {
+
+ if (strcmp(argv[i - 1], "--oformat") == 0) break;
+ if (strcmp(argv[i - 1], "--output") == 0) break;
+ if (strncmp(argv[i - 1], "--opt-remarks-", 14) == 0) break;
+ gold_pos = i;
+ break;
+
+ }
+
+ default:
+ gold_pos = i;
+
+ }
+
+ } else
+
+ gold_pos = i;
+
+ }
+
+ }
+
+ }
+
+ if (!gold_pos) gold_pos = 1;
+
+ }
+
+ if (getenv("AFL_LLVM_INSTRIM"))
+ instrim = 1;
+ else if ((ptr = getenv("AFL_LLVM_INSTRUMENT")) &&
+ (strcasestr(ptr, "CFG") == 0 || strcasestr(ptr, "INSTRIM") == 0))
+ instrim = 1;
+
+ if (debug)
+ SAYF(cMGN "[D] " cRST
+ "passthrough=%s instrim=%d, gold_pos=%d, gold_present=%s "
+ "inst_present=%s rt_present=%s rt_lto_present=%s\n",
+ passthrough ? "true" : "false", instrim, gold_pos,
+ gold_present ? "true" : "false", inst_present ? "true" : "false",
+ rt_present ? "true" : "false", rt_lto_present ? "true" : "false");
+
+ for (i = 1; i < argc; i++) {
+
+ if (ld_param_cnt >= MAX_PARAM_COUNT)
+ FATAL(
+ "Too many command line parameters because of unpacking .a archives, "
+ "this would need to be done by hand ... sorry! :-(");
+
+ if (strcmp(argv[i], "--afl") == 0) {
+
+ if (!be_quiet) OKF("afl++ test command line flag detected, exiting.");
+ exit(0);
+
+ }
+
+ if (i == gold_pos && !passthrough) {
+
+ ld_params[ld_param_cnt++] = alloc_printf("-L%s/../lib", LLVM_BINDIR);
+
+ if (!gold_present) {
+
+ ld_params[ld_param_cnt++] = "-plugin";
+ ld_params[ld_param_cnt++] =
+ alloc_printf("%s/../lib/LLVMgold.so", LLVM_BINDIR);
+
+ }
+
+ ld_params[ld_param_cnt++] = "--allow-multiple-definition";
+
+ if (!inst_present) {
+
+ if (instrim)
+ ld_params[ld_param_cnt++] =
+ alloc_printf("-mllvm=-load=%s/afl-llvm-lto-instrim.so", afl_path);
+ else
+ ld_params[ld_param_cnt++] = alloc_printf(
+ "-mllvm=-load=%s/afl-llvm-lto-instrumentation.so", afl_path);
+
+ }
+
+ if (!rt_present)
+ ld_params[ld_param_cnt++] = alloc_printf("%s/afl-llvm-rt.o", afl_path);
+ if (!rt_lto_present)
+ ld_params[ld_param_cnt++] =
+ alloc_printf("%s/afl-llvm-rt-lto.o", afl_path);
+
+ }
+
+ ld_params[ld_param_cnt++] = argv[i];
+
+ }
+
+ ld_params[ld_param_cnt] = NULL;
+
+}
+
+/* Main entry point */
+
+int main(int argc, char **argv) {
+
+ s32 pid, i, status;
+ u8 * ptr;
+ char thecwd[PATH_MAX];
+
+ if ((ptr = getenv("AFL_LD_CALLER")) != NULL) {
+
+ FATAL("ld loop detected! Set AFL_REAL_LD!\n");
+
+ }
+
+ if (isatty(2) && !getenv("AFL_QUIET") && !getenv("AFL_DEBUG")) {
+
+ SAYF(cCYA "afl-ld-to" VERSION cRST
+ " by Marc \"vanHauser\" Heuse <mh@mh-sec.de>\n");
+
+ } else
+
+ be_quiet = 1;
+
+ if (getenv("AFL_DEBUG") != NULL) debug = 1;
+ if (getenv("AFL_PATH") != NULL) afl_path = getenv("AFL_PATH");
+ if (getenv("AFL_LD_PASSTHROUGH") != NULL) passthrough = 1;
+ if (getenv("AFL_REAL_LD") != NULL) real_ld = getenv("AFL_REAL_LD");
+
+ if (!afl_path || !*afl_path) afl_path = "/usr/local/lib/afl";
+
+ setenv("AFL_LD_CALLER", "1", 1);
+
+ if (debug) {
+
+ if (getcwd(thecwd, sizeof(thecwd)) != 0) strcpy(thecwd, ".");
+
+ SAYF(cMGN "[D] " cRST "cd \"%s\";", thecwd);
+ for (i = 0; i < argc; i++)
+ SAYF(" \"%s\"", argv[i]);
+ SAYF("\n");
+
+ }
+
+ if (argc < 2) {
+
+ SAYF(
+ "\n"
+ "This is a helper application for afl-clang-lto. It is a wrapper "
+ "around GNU "
+ "llvm's 'lld',\n"
+ "executed by the toolchain whenever using "
+ "afl-clang-lto/afl-clang-lto++.\n"
+ "You probably don't want to run this program directly but rather pass "
+ "it as LD parameter to configure scripts\n\n"
+
+ "Environment variables:\n"
+ " AFL_LD_PASSTHROUGH do not link+optimize == no instrumentation\n"
+ " AFL_REAL_LD point to the real llvm 11 lld if necessary\n"
+
+ "\nafl-ld-to was compiled with the fixed real 'ld' of %s and the "
+ "binary path of %s\n\n",
+ real_ld, LLVM_BINDIR);
+
+ exit(1);
+
+ }
+
+ edit_params(argc, argv); // here most of the magic happens :-)
+
+ if (debug) {
+
+ SAYF(cMGN "[D]" cRST " cd \"%s\";", thecwd);
+ for (i = 0; i < ld_param_cnt; i++)
+ SAYF(" \"%s\"", ld_params[i]);
+ SAYF("\n");
+
+ }
+
+ if (!(pid = fork())) {
+
+ if (strlen(real_ld) > 1) execvp(real_ld, (char **)ld_params);
+ execvp("ld", (char **)ld_params); // fallback
+ FATAL("Oops, failed to execute 'ld' - check your PATH");
+
+ }
+
+ if (pid < 0) PFATAL("fork() failed");
+
+ if (waitpid(pid, &status, 0) <= 0) PFATAL("waitpid() failed");
+ if (debug) SAYF(cMGN "[D] " cRST "linker result: %d\n", status);
+
+ if (!just_version) {
+
+ if (status == 0) {
+
+ if (!be_quiet) OKF("Linker was successful");
+
+ } else {
+
+ SAYF(cLRD "[-] " cRST
+ "Linker failed, please investigate and send a bug report. Most "
+ "likely an 'ld' option is incompatible with %s.\n",
+ AFL_CLANG_FLTO);
+
+ }
+
+ }
+
+ exit(WEXITSTATUS(status));
+
+}
+