aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--README.md57
-rw-r--r--TODO.md2
-rwxr-xr-xafl-cmin42
-rw-r--r--docs/Changelog.md7
-rw-r--r--docs/parallel_fuzzing.md8
-rw-r--r--frida_mode/.gitignore2
-rw-r--r--frida_mode/GNUmakefile59
-rw-r--r--frida_mode/Makefile3
-rw-r--r--frida_mode/README.md4
-rw-r--r--frida_mode/Scripting.md850
-rw-r--r--frida_mode/hook/hook.c50
-rw-r--r--frida_mode/include/asan.h3
-rw-r--r--frida_mode/include/ctx.h2
-rw-r--r--frida_mode/include/entry.h8
-rw-r--r--frida_mode/include/frida_cmplog.h1
-rw-r--r--frida_mode/include/instrument.h16
-rw-r--r--frida_mode/include/intercept.h11
-rw-r--r--frida_mode/include/interceptor.h11
-rw-r--r--frida_mode/include/js.h26
-rw-r--r--frida_mode/include/lib.h4
-rw-r--r--frida_mode/include/output.h6
-rw-r--r--frida_mode/include/persistent.h7
-rw-r--r--frida_mode/include/prefetch.h5
-rw-r--r--frida_mode/include/ranges.h9
-rw-r--r--frida_mode/include/stalker.h3
-rw-r--r--frida_mode/include/stats.h7
-rw-r--r--frida_mode/include/util.h2
-rw-r--r--frida_mode/src/asan/asan.c21
-rw-r--r--frida_mode/src/asan/asan_arm32.c2
-rw-r--r--frida_mode/src/asan/asan_arm64.c2
-rw-r--r--frida_mode/src/asan/asan_x64.c2
-rw-r--r--frida_mode/src/asan/asan_x86.c2
-rw-r--r--frida_mode/src/cmplog/cmplog.c156
-rw-r--r--frida_mode/src/cmplog/cmplog_arm32.c2
-rw-r--r--frida_mode/src/cmplog/cmplog_arm64.c2
-rw-r--r--frida_mode/src/cmplog/cmplog_x64.c24
-rw-r--r--frida_mode/src/cmplog/cmplog_x86.c2
-rw-r--r--frida_mode/src/ctx/ctx_arm32.c2
-rw-r--r--frida_mode/src/ctx/ctx_arm64.c2
-rw-r--r--frida_mode/src/ctx/ctx_x64.c24
-rw-r--r--frida_mode/src/ctx/ctx_x86.c8
-rw-r--r--frida_mode/src/entry.c20
-rw-r--r--frida_mode/src/instrument/instrument.c77
-rw-r--r--frida_mode/src/instrument/instrument_arm32.c2
-rw-r--r--frida_mode/src/instrument/instrument_arm64.c4
-rw-r--r--frida_mode/src/instrument/instrument_debug.c23
-rw-r--r--frida_mode/src/instrument/instrument_x64.c4
-rw-r--r--frida_mode/src/instrument/instrument_x86.c4
-rw-r--r--frida_mode/src/intercept.c (renamed from frida_mode/src/interceptor.c)12
-rw-r--r--frida_mode/src/js/api.js243
-rw-r--r--frida_mode/src/js/js.c122
-rw-r--r--frida_mode/src/js/js_api.c152
-rw-r--r--frida_mode/src/lib/lib.c6
-rw-r--r--frida_mode/src/lib/lib_apple.c6
-rw-r--r--frida_mode/src/main.c59
-rw-r--r--frida_mode/src/output.c28
-rw-r--r--frida_mode/src/persistent/persistent.c65
-rw-r--r--frida_mode/src/persistent/persistent_arm32.c2
-rw-r--r--frida_mode/src/persistent/persistent_arm64.c405
-rw-r--r--frida_mode/src/persistent/persistent_x64.c180
-rw-r--r--frida_mode/src/persistent/persistent_x86.c117
-rw-r--r--frida_mode/src/prefetch.c37
-rw-r--r--frida_mode/src/ranges.c120
-rw-r--r--frida_mode/src/stalker.c31
-rw-r--r--frida_mode/src/stats/stats.c33
-rw-r--r--frida_mode/src/stats/stats_arm32.c2
-rw-r--r--frida_mode/src/stats/stats_arm64.c2
-rw-r--r--frida_mode/src/stats/stats_x64.c2
-rw-r--r--frida_mode/src/stats/stats_x86.c2
-rw-r--r--frida_mode/test/deferred/GNUmakefile2
-rw-r--r--frida_mode/test/jpeg/GNUmakefile164
-rw-r--r--frida_mode/test/jpeg/Makefile16
-rwxr-xr-xfrida_mode/test/jpeg/get_symbol_addr.py36
-rw-r--r--frida_mode/test/js/GNUmakefile80
-rw-r--r--frida_mode/test/js/Makefile25
-rw-r--r--frida_mode/test/js/entry.js20
-rw-r--r--frida_mode/test/js/patch.js34
-rw-r--r--frida_mode/test/js/replace.js43
-rw-r--r--frida_mode/test/js/stalker.js109
-rw-r--r--frida_mode/test/js/test.c115
-rw-r--r--frida_mode/test/js/test2.c177
-rw-r--r--frida_mode/test/libpcap/GNUmakefile10
-rw-r--r--frida_mode/test/libpcap/aflpp_qemu_driver_hook.c97
-rw-r--r--frida_mode/test/persistent_ret/GNUmakefile19
-rw-r--r--frida_mode/test/persistent_ret/test.js48
-rw-r--r--frida_mode/test/persistent_ret/testinstr.c11
-rw-r--r--frida_mode/test/png/persistent/hook/GNUmakefile30
-rw-r--r--frida_mode/test/png/persistent/hook/Makefile3
-rw-r--r--frida_mode/test/png/persistent/hook/aflpp_qemu_driver_hook.c193
-rw-r--r--frida_mode/test/png/persistent/hook/cmodule.js39
-rw-r--r--frida_mode/test/png/persistent/hook/load.js27
-rw-r--r--frida_mode/test/proj4/GNUmakefile164
-rw-r--r--frida_mode/test/proj4/Makefile17
-rwxr-xr-xfrida_mode/test/proj4/get_symbol_addr.py36
-rw-r--r--frida_mode/test/re2/GNUmakefile10
-rw-r--r--frida_mode/test/re2/Makefile2
-rw-r--r--frida_mode/test/re2/aflpp_qemu_driver_hook.c97
-rw-r--r--frida_mode/ts/lib/afl.ts373
-rw-r--r--frida_mode/ts/package-lock.json12
-rw-r--r--frida_mode/ts/package.json32
-rw-r--r--frida_mode/ts/tsconfig.json14
-rw-r--r--frida_mode/ts/tslint.json256
-rw-r--r--include/afl-fuzz.h3
-rw-r--r--include/envs.h3
-rw-r--r--include/forkserver.h1
-rw-r--r--instrumentation/afl-compiler-rt.o.c34
-rw-r--r--instrumentation/split-compares-pass.so.cc10
-rw-r--r--src/afl-forkserver.c13
-rw-r--r--src/afl-fuzz-init.c115
-rw-r--r--src/afl-fuzz-one.c1
-rw-r--r--src/afl-fuzz-queue.c5
-rw-r--r--src/afl-fuzz-stats.c17
-rw-r--r--src/afl-fuzz.c12
-rw-r--r--src/afl-showmap.c206
-rw-r--r--test/test-int_cases.c95
-rwxr-xr-xtest/test-llvm.sh2
-rw-r--r--test/test-uint_cases.c73
-rw-r--r--unicorn_mode/UNICORNAFL_VERSION2
-rwxr-xr-xunicorn_mode/samples/speedtest/get_offsets.py2
-rw-r--r--unicorn_mode/samples/speedtest/rust/Makefile2
-rw-r--r--unicorn_mode/samples/speedtest/rust/src/main.rs8
m---------unicorn_mode/unicornafl0
122 files changed, 4642 insertions, 1489 deletions
diff --git a/README.md b/README.md
index 91f28118..bc5b333c 100644
--- a/README.md
+++ b/README.md
@@ -25,12 +25,17 @@
For comparisons use the fuzzbench `aflplusplus` setup, or use `afl-clang-fast`
with `AFL_LLVM_CMPLOG=1`.
-## Major changes in afl++ 3.00 onwards:
+## Major behaviour changes in afl++ 3.00 onwards:
With afl++ 3.13-3.20 we introduce frida_mode (-O) to have an alternative for
binary-only fuzzing. It is slower than Qemu mode but works on MacOS, Android,
iOS etc.
+With afl++ 3.14 we introduced the following changes from previous behaviours:
+ * afl-fuzz: deterministic fuzzing it not a default for -M main anymore
+ * afl-cmin/afl-showmap -i now descends into subdirectories (afl-cmin.bash
+ however does not)
+
With afl++ 3.10 we introduced the following changes from previous behaviours:
* The '+' feature of the '-t' option now means to auto-calculate the timeout
with the value given being the maximum timeout. The original meaning of
@@ -38,7 +43,6 @@ With afl++ 3.10 we introduced the following changes from previous behaviours:
With afl++ 3.00 we introduced changes that break some previous afl and afl++
behaviours and defaults:
-
* There are no llvm_mode and gcc_plugin subdirectories anymore and there is
only one compiler: afl-cc. All previous compilers now symlink to this one.
All instrumentation source code is now in the `instrumentation/` folder.
@@ -109,7 +113,7 @@ behaviours and defaults:
4. with pcguard mode and LTO mode for LLVM 11 and newer
5. upcoming, development in the branch
6. not compatible with LTO instrumentation and needs at least LLVM v4.1
- 7. automatic in LTO mode with LLVM 11 and newer, an extra pass for all LLVM version that writes to a file to use with afl-fuzz' `-x`
+ 7. automatic in LTO mode with LLVM 11 and newer, an extra pass for all LLVM versions that write to a file to use with afl-fuzz' `-x`
8. the snapshot LKM is currently unmaintained due to too many kernel changes coming too fast :-(
Among others, the following features and patches have been integrated:
@@ -572,8 +576,15 @@ to use afl-clang-lto as the compiler. You also have the option to generate
a dictionary yourself, see [utils/libtokencap/README.md](utils/libtokencap/README.md).
afl-fuzz has a variety of options that help to workaround target quirks like
-specific locations for the input file (`-f`), not performing deterministic
-fuzzing (`-d`) and many more. Check out `afl-fuzz -h`.
+specific locations for the input file (`-f`), performing deterministic
+fuzzing (`-D`) and many more. Check out `afl-fuzz -h`.
+
+We highly recommend that you set a memory limit for running the target with `-m`
+which defines the maximum memory in MB. This prevents a potential
+out-of-memory problem for your system plus helps you detect missing `malloc()`
+failure handling in the target.
+Play around with various -m values until you find one that safely works for all
+your input seeds (if you have good ones and then double or quadrouple that.
By default afl-fuzz never stops fuzzing. To terminate afl++ simply press Control-C
or send a signal SIGINT. You can limit the number of executions or approximate runtime
@@ -614,23 +625,28 @@ For every secondary fuzzer there should be a variation, e.g.:
* one to three fuzzers should fuzz a target compiled with laf-intel/COMPCOV
(see above). Important note: If you run more than one laf-intel/COMPCOV
fuzzer and you want them to share their intermediate results, the main
- fuzzer (`-M`) must be one of the them!
+ fuzzer (`-M`) must be one of the them! (Although this is not really
+ recommended.)
All other secondaries should be used like this:
- * A third to a half with the MOpt mutator enabled: `-L 0`
- * run with a different power schedule, available are:
- `fast (default), explore, coe, lin, quad, exploit, mmopt, rare, seek`
- which you can set with e.g. `-p seek`
+ * A quarter to a third with the MOpt mutator enabled: `-L 0`
+ * run with a different power schedule, recommended are:
+ `fast (default), explore, coe, lin, quad, exploit and rare`
+ which you can set with e.g. `-p explore`
+ * a few instances should use the old queue cycling with `-Z`
Also it is recommended to set `export AFL_IMPORT_FIRST=1` to load testcases
from other fuzzers in the campaign first.
+If you have a large corpus, a corpus from a previous run or are fuzzing in
+a CI, then also set `export AFL_CMPLOG_ONLY_NEW=1` and `export AFL_FAST_CAL=1`.
+
You can also use different fuzzers.
If you are using afl spinoffs or afl conforming fuzzers, then just use the
same -o directory and give it a unique `-S` name.
Examples are:
* [Eclipser](https://github.com/SoftSec-KAIST/Eclipser/)
- * [Untracer](https://github.com/FoRTE-Research/UnTracer-AFL)
+ * [symcc](https://github.com/eurecom-s/symcc/)
* [AFLsmart](https://github.com/aflsmart/aflsmart)
* [FairFuzz](https://github.com/carolemieux/afl-rb)
* [Neuzz](https://github.com/Dongdongshe/neuzz)
@@ -638,9 +654,11 @@ Examples are:
A long list can be found at [https://github.com/Microsvuln/Awesome-AFL](https://github.com/Microsvuln/Awesome-AFL)
-However you can also sync afl++ with honggfuzz, libfuzzer with -entropic, etc.
+However you can also sync afl++ with honggfuzz, libfuzzer with `-entropic=1`, etc.
Just show the main fuzzer (-M) with the `-F` option where the queue/work
directory of a different fuzzer is, e.g. `-F /src/target/honggfuzz`.
+Using honggfuzz (with `-n 1` or `-n 2`) and libfuzzer in parallel is highly
+recommended!
#### c) The status of the fuzz campaign
@@ -767,25 +785,26 @@ campaigns as these are much shorter runnings.
corpus needs to be loaded.
* `AFL_CMPLOG_ONLY_NEW` - only perform cmplog on new found paths, not the
initial corpus as this very likely has been done for them already.
- * Keep the generated corpus, use afl-cmin and reuse it everytime!
+ * Keep the generated corpus, use afl-cmin and reuse it every time!
2. Additionally randomize the afl++ compilation options, e.g.
* 40% for `AFL_LLVM_CMPLOG`
* 10% for `AFL_LLVM_LAF_ALL`
3. Also randomize the afl-fuzz runtime options, e.g.
- * 60% for `AFL_DISABLE_TRIM`
+ * 65% for `AFL_DISABLE_TRIM`
* 50% use a dictionary generated by `AFL_LLVM_DICT2FILE`
- * 50% use MOpt (`-L 0`)
+ * 40% use MOpt (`-L 0`)
* 40% for `AFL_EXPAND_HAVOC_NOW`
- * 30% for old queue processing (`-Z`)
+ * 20% for old queue processing (`-Z`)
* for CMPLOG targets, 60% for `-l 2`, 40% for `-l 3`
4. Do *not* run any `-M` modes, just running `-S` modes is better for CI fuzzing.
- `-M` enables deterministic fuzzing, old queue handling etc. which is good for
- a fuzzing campaign but not good for short CI runs.
+ `-M` enables old queue handling etc. which is good for a fuzzing campaign but
+ not good for short CI runs.
-How this can look like can e.g. be seen at afl++'s setup in Google's [oss-fuzz](https://github.com/google/oss-fuzz/blob/4bb61df7905c6005000f5766e966e6fe30ab4559/infra/base-images/base-builder/compile_afl#L69).
+How this can look like can e.g. be seen at afl++'s setup in Google's [oss-fuzz](https://github.com/google/oss-fuzz/blob/master/infra/base-images/base-builder/compile_afl)
+and [clusterfuzz](https://github.com/google/clusterfuzz/blob/master/src/python/bot/fuzzers/afl/launcher.py).
## Fuzzing binary-only targets
diff --git a/TODO.md b/TODO.md
index 398f3d11..1c616b4a 100644
--- a/TODO.md
+++ b/TODO.md
@@ -2,13 +2,11 @@
## Roadmap 3.00+
- - align map to 64 bytes but keep real IDs
- Update afl->pending_not_fuzzed for MOpt
- put fuzz target in top line of UI
- afl-plot to support multiple plot_data
- afl_custom_fuzz_splice_optin()
- afl_custom_splice()
- - intel-pt tracer
- better autodetection of shifting runtime timeout values
- cmplog: use colorization input for havoc?
- parallel builds for source-only targets
diff --git a/afl-cmin b/afl-cmin
index 9fa63ec6..e71873d3 100755
--- a/afl-cmin
+++ b/afl-cmin
@@ -296,13 +296,13 @@ BEGIN {
exit 1
}
- if (0 == system( "test -d "in_dir"/default" )) {
- in_dir = in_dir "/default"
- }
-
- if (0 == system( "test -d "in_dir"/queue" )) {
- in_dir = in_dir "/queue"
- }
+ #if (0 == system( "test -d "in_dir"/default" )) {
+ # in_dir = in_dir "/default"
+ #}
+ #
+ #if (0 == system( "test -d "in_dir"/queue" )) {
+ # in_dir = in_dir "/queue"
+ #}
system("rm -rf "trace_dir" 2>/dev/null");
system("rm "out_dir"/id[:_]* 2>/dev/null")
@@ -355,30 +355,35 @@ BEGIN {
} else {
stat_format = "-f '%z %N'" # *BSD, MacOS
}
- cmdline = "(cd "in_dir" && find . \\( ! -name . -a -type d -prune \\) -o -type f -exec stat "stat_format" \\{\\} + | sort -k1n -k2r)"
+ cmdline = "(cd "in_dir" && find . \\( ! -name \".*\" -a -type d \\) -o -type f -exec stat "stat_format" \\{\\} + | sort -k1n -k2r)"
#cmdline = "ls "in_dir" | (cd "in_dir" && xargs stat "stat_format" 2>/dev/null) | sort -k1n -k2r"
#cmdline = "(cd "in_dir" && stat "stat_format" *) | sort -k1n -k2r"
#cmdline = "(cd "in_dir" && ls | xargs stat "stat_format" ) | sort -k1n -k2r"
while (cmdline | getline) {
sub(/^[0-9]+ (\.\/)?/,"",$0)
- infilesSmallToBig[i++] = $0
+ infilesSmallToBigFull[i] = $0
+ sub(/.*\//, "", $0)
+ infilesSmallToBig[i] = $0
+ infilesSmallToBigMap[infilesSmallToBig[i]] = infilesSmallToBigFull[i]
+ infilesSmallToBigFullMap[infilesSmallToBigFull[i]] = infilesSmallToBig[i]
+ i++
}
in_count = i
- first_file = infilesSmallToBig[0]
+ first_file = infilesSmallToBigFull[0]
- # Make sure that we're not dealing with a directory.
-
- if (0 == system("test -d ""\""in_dir"/"first_file"\"")) {
- print "[-] Error: The input directory is empty or contains subdirectories - please fix." > "/dev/stderr"
- exit 1
- }
+ #if (0 == system("test -d ""\""in_dir"/"first_file"\"")) {
+ # print "[-] Error: The input directory is empty or contains subdirectories - please fix." > "/dev/stderr"
+ # exit 1
+ #}
- if (0 == system("ln \""in_dir"/"first_file"\" "trace_dir"/.link_test")) {
+ system(">\""in_dir"/.afl-cmin.test\"")
+ if (0 == system("ln \""in_dir"/.afl-cmin.test\" "trace_dir"/.link_test")) {
cp_tool = "ln"
} else {
cp_tool = "cp"
}
+ system("rm -f \""in_dir"/.afl-cmin.test\"")
if (!ENVIRON["AFL_SKIP_BIN_CHECK"]) {
# Make sure that we can actually get anything out of afl-showmap before we
@@ -511,7 +516,8 @@ BEGIN {
# copy file unless already done
if (! (fn in file_already_copied)) {
- system(cp_tool" \""in_dir"/"fn"\" \""out_dir"/"fn"\"")
+ realfile = infilesSmallToBigMap[fn]
+ system(cp_tool" \""in_dir"/"realfile"\" \""out_dir"/"fn"\"")
file_already_copied[fn] = ""
++out_count
#printf "tuple nr %d (%d cnt=%d) -> %s\n",tcnt,key,key_count[key],fn > trace_dir"/.log"
diff --git a/docs/Changelog.md b/docs/Changelog.md
index 9f70535a..475240c2 100644
--- a/docs/Changelog.md
+++ b/docs/Changelog.md
@@ -16,6 +16,7 @@ sending a mail to <afl-users+subscribe@googlegroups.com>.
- if the target becomes unavailable check out out/default/error.txt
for an indicator why
- AFL_CAL_FAST was a dead env, now does the same as AFL_FAST_CAL
+ - reverse read the queue on resumes (more effective)
- afl-cc:
- Update to COMPCOV/laf-intel that speeds up the instrumentation
process a lot - thanks to Michael Rodler/f0rki for the PR!
@@ -24,10 +25,14 @@ sending a mail to <afl-users+subscribe@googlegroups.com>.
- support partial linking
- We do support llvm versions from 3.8 to 5.0 again
- frida_mode:
- - fix for cmplog
+ - several fixes for cmplog
- remove need for AFL_FRIDA_PERSISTENT_RETADDR_OFFSET
- feature parity of aarch64 with intel now (persistent, cmplog,
in-memory testcases, asan)
+ - qemu_mode:
+ - performance fix when cmplog was used
+ - afl-cmin and afl-showmap -i do now descend into subdirectories
+ (like afl-fuzz does) - note that afl-cmin.bash does not!
- afl_analyze:
- fix timeout handling
- add forkserver support for better performance
diff --git a/docs/parallel_fuzzing.md b/docs/parallel_fuzzing.md
index 8f2afe1b..23872899 100644
--- a/docs/parallel_fuzzing.md
+++ b/docs/parallel_fuzzing.md
@@ -1,7 +1,11 @@
# Tips for parallel fuzzing
- This document talks about synchronizing afl-fuzz jobs on a single machine
- or across a fleet of systems. See README.md for the general instruction manual.
+This document talks about synchronizing afl-fuzz jobs on a single machine
+or across a fleet of systems. See README.md for the general instruction manual.
+
+Note that this document is rather outdated. please refer to the main document
+section on multiple core usage [../README.md#Using multiple cores](../README.md#b-using-multiple-coresthreads)
+for up to date strategies!
## 1) Introduction
diff --git a/frida_mode/.gitignore b/frida_mode/.gitignore
index 956b9911..32cca51f 100644
--- a/frida_mode/.gitignore
+++ b/frida_mode/.gitignore
@@ -3,3 +3,5 @@ frida_test.dat
qemu_test.dat
frida_out/**
qemu_out/**
+ts/dist/
+ts/node_modules/
diff --git a/frida_mode/GNUmakefile b/frida_mode/GNUmakefile
index 329d9f7f..f5a96501 100644
--- a/frida_mode/GNUmakefile
+++ b/frida_mode/GNUmakefile
@@ -6,6 +6,11 @@ INCLUDES:=$(wildcard $(INC_DIR)*.h)
BUILD_DIR:=$(PWD)build/
OBJ_DIR:=$(BUILD_DIR)obj/
+JS_DIR:=$(SRC_DIR)js/
+JS_NAME:=api.js
+JS:=$(JS_DIR)$(JS_NAME)
+JS_SRC:=$(BUILD_DIR)api.c
+JS_OBJ:=$(BUILD_DIR)api.o
SOURCES:=$(wildcard $(SRC_DIR)**/*.c) $(wildcard $(SRC_DIR)*.c)
OBJS:=$(foreach src,$(SOURCES),$(OBJ_DIR)$(notdir $(patsubst %.c, %.o, $(src))))
CFLAGS+=-fPIC \
@@ -25,8 +30,7 @@ RT_CFLAGS:=-Wno-unused-parameter \
LDFLAGS+=-shared \
-lpthread \
-lresolv \
- -ldl \
- -z noexecstack \
+ -ldl
ifdef DEBUG
CFLAGS+=-Werror \
@@ -60,6 +64,7 @@ else
ifdef DEBUG
RT_CFLAGS:=$(RT_CFLAGS) -Wno-prio-ctor-dtor
endif
+LDFLAGS+=-z noexecstack
endif
ifeq "$(shell uname)" "Linux"
@@ -71,29 +76,33 @@ ifndef OS
endif
GUM_DEVKIT_VERSION=14.2.18
-GUM_DEVKIT_FILENAME=frida-gum-devkit-$(GUM_DEVKIT_VERSION)-$(OS)-$(ARCH).tar.xz
+GUM_DEVKIT_FILENAME=frida-gumjs-devkit-$(GUM_DEVKIT_VERSION)-$(OS)-$(ARCH).tar.xz
GUM_DEVKIT_URL="https://github.com/frida/frida/releases/download/$(GUM_DEVKIT_VERSION)/$(GUM_DEVKIT_FILENAME)"
GUM_DEVKIT_TARBALL:=$(FRIDA_BUILD_DIR)$(GUM_DEVKIT_FILENAME)
-GUM_DEVIT_LIBRARY=$(FRIDA_BUILD_DIR)libfrida-gum.a
-GUM_DEVIT_HEADER=$(FRIDA_BUILD_DIR)frida-gum.h
+GUM_DEVIT_LIBRARY=$(FRIDA_BUILD_DIR)libfrida-gumjs.a
+GUM_DEVIT_HEADER=$(FRIDA_BUILD_DIR)frida-gumjs.h
FRIDA_DIR:=$(PWD)build/frida-source/
FRIDA_MAKEFILE:=$(FRIDA_DIR)Makefile
-FRIDA_GUM:=$(FRIDA_DIR)build/frida-linux-x86_64/lib/libfrida-gum-1.0.a
+FRIDA_GUM:=$(FRIDA_DIR)build/frida-linux-x86_64/lib/libfrida-gumjs-1.0.a
FRIDA_GUM_DEVKIT_DIR:=$(FRIDA_DIR)build/gum-devkit/
-FRIDA_GUM_DEVKIT_HEADER:=$(FRIDA_GUM_DEVKIT_DIR)frida-gum.h
-FRIDA_GUM_DEVKIT_TARBALL:=$(FRIDA_DIR)build/frida-gum-devkit-$(GUM_DEVKIT_VERSION)-$(OS)-$(ARCH).tar
+FRIDA_GUM_DEVKIT_HEADER:=$(FRIDA_GUM_DEVKIT_DIR)frida-gumjs.h
+FRIDA_GUM_DEVKIT_TARBALL:=$(FRIDA_DIR)build/frida-gumjs-devkit-$(GUM_DEVKIT_VERSION)-$(OS)-$(ARCH).tar
FRIDA_GUM_DEVKIT_COMPRESSED_TARBALL:=$(FRIDA_DIR)build/$(GUM_DEVKIT_FILENAME)
AFL_COMPILER_RT_SRC:=$(ROOT)instrumentation/afl-compiler-rt.o.c
AFL_COMPILER_RT_OBJ:=$(OBJ_DIR)afl-compiler-rt.o
-.PHONY: all 32 clean format $(FRIDA_GUM)
+HOOK_DIR:=$(PWD)hook/
+AFLPP_DRIVER_HOOK_SRC=$(HOOK_DIR)hook.c
+AFLPP_DRIVER_HOOK_OBJ=$(BUILD_DIR)hook.so
+
+.PHONY: all 32 clean format hook $(FRIDA_GUM)
############################## ALL #############################################
-all: $(FRIDA_TRACE)
+all: $(FRIDA_TRACE) $(AFLPP_DRIVER_HOOK_OBJ)
32:
CFLAGS="-m32" LDFLAGS="-m32" ARCH="x86" make all
@@ -113,7 +122,7 @@ $(FRIDA_GUM): $(FRIDA_MAKEFILE)
cd $(FRIDA_DIR) && make gum-linux-$(ARCH)
$(FRIDA_GUM_DEVKIT_HEADER): $(FRIDA_GUM)
- $(FRIDA_DIR)releng/devkit.py frida-gum linux-$(ARCH) $(FRIDA_DIR)build/gum-devkit/
+ $(FRIDA_DIR)releng/devkit.py frida-gumjs linux-$(ARCH) $(FRIDA_DIR)build/gum-devkit/
$(FRIDA_GUM_DEVKIT_TARBALL): $(FRIDA_GUM_DEVKIT_HEADER)
cd $(FRIDA_GUM_DEVKIT_DIR) && tar cvf $(FRIDA_GUM_DEVKIT_TARBALL) .
@@ -150,6 +159,20 @@ $(AFL_COMPILER_RT_OBJ): $(AFL_COMPILER_RT_SRC)
-o $@ \
-c $<
+############################### JS #############################################
+
+$(JS_SRC): $(JS) | $(BUILD_DIR)
+ cd $(JS_DIR) && xxd -i $(JS_NAME) $@
+
+$(JS_OBJ): $(JS_SRC)
+ $(CC) \
+ $(CFLAGS) \
+ -I $(ROOT)include \
+ -I $(FRIDA_BUILD_DIR) \
+ -I $(INC_DIR) \
+ -c $< \
+ -o $@
+
############################# SOURCE ###########################################
define BUILD_SOURCE
@@ -167,9 +190,10 @@ $(foreach src,$(SOURCES),$(eval $(call BUILD_SOURCE,$(src),$(OBJ_DIR)$(notdir $(
######################## AFL-FRIDA-TRACE #######################################
-$(FRIDA_TRACE): $(GUM_DEVIT_LIBRARY) $(GUM_DEVIT_HEADER) $(OBJS) $(AFL_COMPILER_RT_OBJ) GNUmakefile | $(BUILD_DIR)
- $(CC) \
+$(FRIDA_TRACE): $(GUM_DEVIT_LIBRARY) $(GUM_DEVIT_HEADER) $(OBJS) $(JS_OBJ) $(AFL_COMPILER_RT_OBJ) GNUmakefile | $(BUILD_DIR)
+ $(CXX) \
$(OBJS) \
+ $(JS_OBJ) \
$(GUM_DEVIT_LIBRARY) \
$(AFL_COMPILER_RT_OBJ) \
$(LDFLAGS) \
@@ -177,13 +201,20 @@ $(FRIDA_TRACE): $(GUM_DEVIT_LIBRARY) $(GUM_DEVIT_HEADER) $(OBJS) $(AFL_COMPILER_
cp -v $(FRIDA_TRACE) $(ROOT)
+############################# HOOK #############################################
+
+$(AFLPP_DRIVER_HOOK_OBJ): $(AFLPP_DRIVER_HOOK_SRC) | $(BUILD_DIR)
+ $(CC) $(CFLAGS) $(LDFLAGS) -I $(FRIDA_BUILD_DIR) $< -o $@
+
+hook: $(AFLPP_DRIVER_HOOK_OBJ)
+
############################# CLEAN ############################################
clean:
rm -rf $(BUILD_DIR)
############################# FORMAT ###########################################
format:
- cd $(ROOT) && echo $(SOURCES) | xargs -L1 ./.custom-format.py -i
+ cd $(ROOT) && echo $(SOURCES) $(AFLPP_DRIVER_HOOK_SRC) | xargs -L1 ./.custom-format.py -i
cd $(ROOT) && echo $(INCLUDES) | xargs -L1 ./.custom-format.py -i
############################# RUN #############################################
diff --git a/frida_mode/Makefile b/frida_mode/Makefile
index 6cd1a64e..1922c7e6 100644
--- a/frida_mode/Makefile
+++ b/frida_mode/Makefile
@@ -11,3 +11,6 @@ clean:
format:
@gmake format
+
+hook:
+ @gmake hook
diff --git a/frida_mode/README.md b/frida_mode/README.md
index 296e6405..6bed52b7 100644
--- a/frida_mode/README.md
+++ b/frida_mode/README.md
@@ -78,6 +78,10 @@ following options are currently supported:
To enable the powerful CMPLOG mechanism, set `-c 0` for `afl-fuzz`.
+## Scripting
+
+One of the more powerful features of FRIDA mode is it's support for configuration by JavaScript, rather than using environment variables. For details of how this works see [here](Scripting.md).
+
## Performance
Additionally, the intention is to be able to make a direct performance
diff --git a/frida_mode/Scripting.md b/frida_mode/Scripting.md
new file mode 100644
index 00000000..4c6fe6b2
--- /dev/null
+++ b/frida_mode/Scripting.md
@@ -0,0 +1,850 @@
+# Scripting
+FRIDA now supports the ability to configure itself using JavaScript. This allows
+the user to make use of the convenience of FRIDA's scripting engine (along with
+it's support for debug symbols and exports) to configure all of the things which
+were traditionally configured using environment variables.
+
+By default FRIDA mode will look for the file `afl.js` in the current working
+directory of the target. Alternatively, a script file can be configured using
+the environment variable `AFL_FRIDA_JS_SCRIPT`.
+
+This script can make use of all of the standard [frida api functions](https://frida.re/docs/javascript-api/), but FRIDA mode adds some additional functions to allow
+you to interact with FRIDA mode itself. These can all be accessed via the global
+`Afl` parameter. e.g. `Afl.print("HELLO WORLD");`,
+
+If you encounter a problem with your script, then you should set the environment
+variable `AFL_DEBUG_CHILD=1` to view any diagnostic information.
+
+
+# Example
+Most of the time, users will likely be wanting to call the functions which configure an address (e.g. for the entry point, or the persistent address).
+
+The example below uses the API [`DebugSymbol.fromName()`](https://frida.re/docs/javascript-api/#debugsymbol). Another use API is [`Module.getExportByName()`](https://frida.re/docs/javascript-api/#module).
+
+```js
+/* Use Afl.print instead of console.log */
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+/* Print some useful diagnostics stuff */
+Afl.print(`PID: ${Process.id}`);
+
+new ModuleMap().values().forEach(m => {
+ Afl.print(`${m.base}-${m.base.add(m.size)} ${m.name}`);
+});
+
+/*
+ * Configure entry-point, persistence etc. This will be what most
+ * people want to do.
+ */
+const persistent_addr = DebugSymbol.fromName('main');
+Afl.print(`persistent_addr: ${persistent_addr.address}`);
+
+if (persistent_addr.address.equals(ptr(0))) {
+ Afl.error('Cannot find symbol main');
+}
+
+const persistent_ret = DebugSymbol.fromName('slow');
+Afl.print(`persistent_ret: ${persistent_ret.address}`);
+
+if (persistent_ret.address.equals(ptr(0))) {
+ Afl.error('Cannot find symbol slow');
+}
+
+Afl.setPersistentAddress(persistent_addr.address);
+Afl.setPersistentReturn(persistent_ret.address);
+Afl.setPersistentCount(1000000);
+
+/* Control instrumentation, you may want to do this too */
+Afl.setInstrumentLibraries();
+const mod = Process.findModuleByName("libc-2.31.so")
+Afl.addExcludedRange(mod.base, mod.size);
+
+/* Some useful options to configure logging */
+Afl.setStdOut("/tmp/stdout.txt");
+Afl.setStdErr("/tmp/stderr.txt");
+
+/* Show the address layout. Sometimes helpful */
+Afl.setDebugMaps();
+
+/*
+ * If you are using these options, then things aren't going
+ * very well for you.
+ */
+Afl.setInstrumentDebugFile("/tmp/instr.log");
+Afl.setPrefetchDisable();
+Afl.setInstrumentNoOptimize();
+Afl.setInstrumentEnableTracing();
+Afl.setInstrumentTracingUnique();
+Afl.setStatsFile("/tmp/stats.txt");
+Afl.setStatsInterval(1);
+Afl.setStatsTransitions();
+
+/* *ALWAYS* call this when you have finished all your configuration */
+Afl.done();
+Afl.print("done");
+```
+
+# Stripped Binaries
+
+Lastly, if the binary you attempting to fuzz has no symbol information, and no
+exports, then the following approach can be used.
+
+```js
+const module = Process.getModuleByName('target.exe');
+/* Hardcoded offset within the target image */
+const address = module.base.add(0xdeadface);
+Afl.setPersistentAddress(address);
+```
+
+# Persisent Hook
+A persistent hook can be implemented using a conventional shared object, sample
+source code for a hook suitable for the prototype of `LLVMFuzzerTestOneInput`
+can be found [here](hook/hook.c). This can be configured using code similar to
+the following.
+
+```js
+const path = Afl.module.path;
+const dir = path.substring(0, path.lastIndexOf("/"));
+const mod = Module.load(`${dir}/frida_mode/build/hook.so`);
+const hook = mod.getExportByName('afl_persistent_hook');
+Afl.setPersistentHook(hook);
+```
+
+Alternatively, the hook can be provided by using FRIDAs built in support for `CModule`, powered by TinyCC.
+
+```js
+const cm = new CModule(`
+
+ #include <string.h>
+ #include <gum/gumdefs.h>
+
+ void afl_persistent_hook(GumCpuContext *regs, uint8_t *input_buf,
+ uint32_t input_buf_len) {
+
+ memcpy((void *)regs->rdi, input_buf, input_buf_len);
+ regs->rsi = input_buf_len;
+
+ }
+ `,
+ {
+ memcpy: Module.getExportByName(null, 'memcpy')
+ });
+Afl.setPersistentHook(cm.afl_persistent_hook);
+```
+
+# Advanced Persistence
+Consider the following target code...
+```c
+
+#include <fcntl.h>
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <unistd.h>
+
+void LLVMFuzzerTestOneInput(char *buf, int len) {
+
+ if (len < 1) return;
+ buf[len] = 0;
+
+ // we support three input cases
+ if (buf[0] == '0')
+ printf("Looks like a zero to me!\n");
+ else if (buf[0] == '1')
+ printf("Pretty sure that is a one!\n");
+ else
+ printf("Neither one or zero? How quaint!\n");
+
+}
+
+int run(char *file) {
+
+ int fd = -1;
+ off_t len;
+ char * buf = NULL;
+ size_t n_read;
+ int result = -1;
+
+ do {
+
+ dprintf(STDERR_FILENO, "Running: %s\n", file);
+
+ fd = open(file, O_RDONLY);
+ if (fd < 0) {
+
+ perror("open");
+ break;
+
+ }
+
+ len = lseek(fd, 0, SEEK_END);
+ if (len < 0) {
+
+ perror("lseek (SEEK_END)");
+ break;
+
+ }
+
+ if (lseek(fd, 0, SEEK_SET) != 0) {
+
+ perror("lseek (SEEK_SET)");
+ break;
+
+ }
+
+ buf = malloc(len);
+ if (buf == NULL) {
+
+ perror("malloc");
+ break;
+
+ }
+
+ n_read = read(fd, buf, len);
+ if (n_read != len) {
+
+ perror("read");
+ break;
+
+ }
+
+ dprintf(STDERR_FILENO, "Running: %s: (%zd bytes)\n", file, n_read);
+
+ LLVMFuzzerTestOneInput(buf, len);
+ dprintf(STDERR_FILENO, "Done: %s: (%zd bytes)\n", file, n_read);
+
+ result = 0;
+
+ } while (false);
+
+ if (buf != NULL) { free(buf); }
+
+ if (fd != -1) { close(fd); }
+
+ return result;
+
+}
+
+void slow() {
+
+ usleep(100000);
+
+}
+
+int main(int argc, char **argv) {
+
+ if (argc != 2) { return 1; }
+ slow();
+ return run(argv[1]);
+
+}
+```
+
+FRIDA mode supports the replacement of any function, with an implementation
+generated by CModule. This allows for a bespoke harness to be written as
+follows:
+
+```
+const slow = DebugSymbol.fromName('slow').address;
+Afl.print(`slow: ${slow}`);
+
+const LLVMFuzzerTestOneInput = DebugSymbol.fromName('LLVMFuzzerTestOneInput').address;
+Afl.print(`LLVMFuzzerTestOneInput: ${LLVMFuzzerTestOneInput}`);
+
+const cm = new CModule(`
+
+ extern unsigned char * __afl_fuzz_ptr;
+ extern unsigned int * __afl_fuzz_len;
+ extern void LLVMFuzzerTestOneInput(char *buf, int len);
+
+ void slow(void) {
+
+ LLVMFuzzerTestOneInput(__afl_fuzz_ptr, *__afl_fuzz_len);
+ }
+ `,
+ {
+ LLVMFuzzerTestOneInput: LLVMFuzzerTestOneInput,
+ __afl_fuzz_ptr: Afl.getAflFuzzPtr(),
+ __afl_fuzz_len: Afl.getAflFuzzLen()
+ });
+
+Afl.setEntryPoint(cm.slow);
+Afl.setPersistentAddress(cm.slow);
+Afl.setInMemoryFuzzing();
+Interceptor.replace(slow, cm.slow);
+Afl.print("done");
+Afl.done();
+```
+
+Here, we replace the function `slow` with our own code. This code is then
+selected as the entry point as well as the persistent loop address.
+
+**WARNING** There are two key limitations in replacing a function in this way:
+- The function which is to be replaced must not be `main` this is because this
+is the point at which FRIDA mode is initialized and at the point the the JS has
+been run, the start of the `main` function has already been instrumented and
+cached.
+- The replacement function must not call itself. e.g. in this example we
+couldn't replace `LLVMFuzzerTestOneInput` and call itself.
+
+# Patching
+Consider the [following](test/js/test2.c) test code...
+
+```c
+/*
+ american fuzzy lop++ - a trivial program to test the build
+ --------------------------------------------------------
+ Originally written by Michal Zalewski
+ Copyright 2014 Google Inc. All rights reserved.
+ Copyright 2019-2020 AFLplusplus Project. All rights reserved.
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at:
+ http://www.apache.org/licenses/LICENSE-2.0
+ */
+
+#include <fcntl.h>
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdint.h>
+#include <stdlib.h>
+#include <unistd.h>
+
+const uint32_t crc32_tab[] = {
+ 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,
+
+ ...
+
+ 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
+};
+
+uint32_t
+crc32(const void *buf, size_t size)
+{
+ const uint8_t *p = buf;
+ uint32_t crc;
+ crc = ~0U;
+ while (size--)
+ crc = crc32_tab[(crc ^ *p++) & 0xFF] ^ (crc >> 8);
+ return crc ^ ~0U;
+}
+
+/*
+ * Don't you hate those contrived examples which CRC their data. We can use
+ * FRIDA to patch this function out and always return success. Otherwise, we
+ * could change it to actually correct the checksum.
+ */
+int crc32_check (char * buf, int len) {
+ if (len < sizeof(uint32_t)) { return 0; }
+ uint32_t expected = *(uint32_t *)&buf[len - sizeof(uint32_t)];
+ uint32_t calculated = crc32(buf, len - sizeof(uint32_t));
+ return expected == calculated;
+}
+
+/*
+ * So you've found a really boring bug in an earlier campaign which results in
+ * a NULL dereference or something like that. That bug can get in the way,
+ * causing the persistent loop to exit whenever it is triggered, and can also
+ * cloud your output unnecessarily. Again, we can use FRIDA to patch it out.
+ */
+void some_boring_bug(char c) {
+ switch (c) {
+ case 'A'...'Z':
+ case 'a'...'z':
+ __builtin_trap();
+ break;
+ }
+}
+
+void LLVMFuzzerTestOneInput(char *buf, int len) {
+
+ if (!crc32_check(buf, len)) return;
+
+ some_boring_bug(buf[0]);
+
+ if (buf[0] == '0') {
+ printf("Looks like a zero to me!\n");
+ }
+ else if (buf[0] == '1') {
+ printf("Pretty sure that is a one!\n");
+ }
+ else if (buf[0] == '2') {
+ if (buf[1] == '3') {
+ if (buf[2] == '4') {
+ printf("Oh we, weren't expecting that!");
+ __builtin_trap();
+ }
+ }
+ }
+ else
+ printf("Neither one or zero? How quaint!\n");
+
+}
+
+int main(int argc, char **argv) {
+
+ int fd = -1;
+ off_t len;
+ char * buf = NULL;
+ size_t n_read;
+ int result = -1;
+
+ if (argc != 2) { return 1; }
+
+ printf("Running: %s\n", argv[1]);
+
+ fd = open(argv[1], O_RDONLY);
+ if (fd < 0) { return 1; }
+
+ len = lseek(fd, 0, SEEK_END);
+ if (len < 0) { return 1; }
+
+ if (lseek(fd, 0, SEEK_SET) != 0) { return 1; }
+
+ buf = malloc(len);
+ if (buf == NULL) { return 1; }
+
+ n_read = read(fd, buf, len);
+ if (n_read != len) { return 1; }
+
+ printf("Running: %s: (%zd bytes)\n", argv[1], n_read);
+
+ LLVMFuzzerTestOneInput(buf, len);
+ printf("Done: %s: (%zd bytes)\n", argv[1], n_read);
+
+ return 0;
+}
+```
+
+There are a couple of obstacles with our target application. Unlike when fuzzing
+source code, though, we can't simply edit it and recompile it. The following
+script shows how we can use the normal functionality of FRIDA to modify any
+troublesome behaviour.
+
+```js
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+const main = DebugSymbol.fromName('main').address;
+Afl.print(`main: ${main}`);
+Afl.setEntryPoint(main);
+Afl.setPersistentAddress(main);
+Afl.setPersistentCount(10000000);
+
+const crc32_check = DebugSymbol.fromName('crc32_check').address;
+const crc32_replacement = new NativeCallback(
+ (buf, len) => {
+ Afl.print(`len: ${len}`);
+ if (len < 4) {
+ return 0;
+ }
+
+ return 1;
+ },
+ 'int',
+ ['pointer', 'int']);
+Interceptor.replace(crc32_check, crc32_replacement);
+
+const some_boring_bug = DebugSymbol.fromName('some_boring_bug').address
+const boring_replacement = new NativeCallback(
+ (c) => { },
+ 'void',
+ ['char']);
+Interceptor.replace(some_boring_bug, boring_replacement);
+
+Afl.done();
+Afl.print("done");
+```
+
+# Advanced Patching
+Consider the following code fragment...
+```c
+extern void some_boring_bug2(char c);
+
+__asm__ (
+ ".text \n"
+ "some_boring_bug2: \n"
+ ".global some_boring_bug2 \n"
+ ".type some_boring_bug2, @function \n"
+ "mov %edi, %eax \n"
+ "cmp $0xb4, %al \n"
+ "jne ok \n"
+ "ud2 \n"
+ "ok: \n"
+ "ret \n");
+
+void LLVMFuzzerTestOneInput(char *buf, int len) {
+
+ ...
+
+ some_boring_bug2(buf[0]);
+
+ ...
+
+}
+```
+
+Rather than using FRIDAs `Interceptor.replace` or `Interceptor.attach` APIs, it
+is possible to apply much more fine grained modification to the target
+application by means of using the Stalker APIs.
+
+The following code locates the function of interest and patches out the UD2
+instruction signifying a crash.
+
+```js
+/* Modify the instructions */
+const some_boring_bug2 = DebugSymbol.fromName('some_boring_bug2').address
+const pid = Memory.alloc(4);
+pid.writeInt(Process.id);
+
+const cm = new CModule(`
+ #include <stdio.h>
+ #include <gum/gumstalker.h>
+
+ typedef int pid_t;
+
+ #define STDERR_FILENO 2
+ #define BORING2_LEN 10
+
+ extern int dprintf(int fd, const char *format, ...);
+ extern void some_boring_bug2(char c);
+ extern pid_t getpid(void);
+ extern pid_t pid;
+
+ gboolean js_stalker_callback(const cs_insn *insn, gboolean begin,
+ gboolean excluded, GumStalkerOutput *output)
+ {
+ pid_t my_pid = getpid();
+ GumX86Writer *cw = output->writer.x86;
+
+ if (GUM_ADDRESS(insn->address) < GUM_ADDRESS(some_boring_bug2)) {
+
+ return TRUE;
+
+ }
+
+ if (GUM_ADDRESS(insn->address) >=
+ GUM_ADDRESS(some_boring_bug2) + BORING2_LEN) {
+
+ return TRUE;
+
+ }
+
+ if (my_pid == pid) {
+
+ if (begin) {
+
+ dprintf(STDERR_FILENO, "\n> 0x%016lX: %s %s\n", insn->address,
+ insn->mnemonic, insn->op_str);
+
+ } else {
+
+ dprintf(STDERR_FILENO, " 0x%016lX: %s %s\n", insn->address,
+ insn->mnemonic, insn->op_str);
+
+ }
+
+ }
+
+ if (insn->id == X86_INS_UD2) {
+
+ gum_x86_writer_put_nop(cw);
+ return FALSE;
+
+ } else {
+
+ return TRUE;
+
+ }
+ }
+ `,
+ {
+ dprintf: Module.getExportByName(null, 'dprintf'),
+ getpid: Module.getExportByName(null, 'getpid'),
+ some_boring_bug2: some_boring_bug2,
+ pid: pid
+ });
+Afl.setStalkerCallback(cm.js_stalker_callback)
+Afl.setStdErr("/tmp/stderr.txt");
+```
+
+Note that you will more likely want to find the
+patch address by using:
+
+```js
+const module = Process.getModuleByName('target.exe');
+/* Hardcoded offset within the target image */
+const address = module.base.add(0xdeadface);
+```
+OR
+```
+const address = DebugSymbol.fromName("my_function").address.add(0xdeadface);
+```
+OR
+```
+const address = Module.getExportByName(null, "my_function").add(0xdeadface);
+```
+
+The function `js_stalker_callback` should return `TRUE` if the original
+instruction should be emitted in the instrumented code, or `FALSE` otherwise.
+In the example above, we can see it is replaced with a `NOP`.
+
+Lastly, note that the same callback will be called when compiling instrumented
+code both in the child of the forkserver (as it is executed) and also in the
+parent of the forserver (when prefetching is enabled) so that it can be
+inherited by the next forked child. It is **VERY** important that the same
+instructions be generated in both the parent and the child, or if prefetching is
+disabled that the same instructions are generated every time the block is
+compiled. Failure to do so will likely lead to bugs which are incredibly
+difficult to diagnose. The code above only prints the instructions when running
+in the parent process (the one provided by `Process.id` when the JS script is
+executed).
+
+# API
+```js
+class Afl {
+
+ /**
+ * Field containing the `Module` object for `afl-frida-trace.so` (the FRIDA mode
+ * implementation).
+ */
+ public static module: Module = Process.getModuleByName("afl-frida-trace.so");
+
+ /**
+ * This is equivalent to setting a value in `AFL_FRIDA_EXCLUDE_RANGES`,
+ * it takes as arguments a `NativePointer` and a `number`. It can be
+ * called multiple times to exclude several ranges.
+ */
+ public static addExcludedRange(addressess: NativePointer, size: number): void {
+ Afl.jsApiAddExcludeRange(addressess, size);
+ }
+
+ /**
+ * This is equivalent to setting a value in `AFL_FRIDA_INST_RANGES`,
+ * it takes as arguments a `NativePointer` and a `number`. It can be
+ * called multiple times to include several ranges.
+ */
+ public static addIncludedRange(addressess: NativePointer, size: number): void {
+ Afl.jsApiAddIncludeRange(addressess, size);
+ }
+
+ /**
+ * This must always be called at the end of your script. This lets
+ * FRIDA mode know that your configuration is finished and that
+ * execution has reached the end of your script. Failure to call
+ * this will result in a fatal error.
+ */
+ public static done(): void {
+ Afl.jsApiDone();
+ }
+
+ /**
+ * This function can be called within your script to cause FRIDA
+ * mode to trigger a fatal error. This is useful if for example you
+ * discover a problem you weren't expecting and want everything to
+ * stop. The user will need to enable `AFL_DEBUG_CHILD=1` to view
+ * this error message.
+ */
+ public static error(msg: string): void {
+ const buf = Memory.allocUtf8String(msg);
+ Afl.jsApiError(buf);
+ }
+
+ /**
+ * Function used to provide access to `__afl_fuzz_ptr`, which contains the length of
+ * fuzzing data when using in-memory test case fuzzing.
+ */
+ public static getAflFuzzLen(): NativePointer {
+
+ return Afl.jsApiGetSymbol("__afl_fuzz_len");
+ }
+
+ /**
+ * Function used to provide access to `__afl_fuzz_ptr`, which contains the fuzzing
+ * data when using in-memory test case fuzzing.
+ */
+ public static getAflFuzzPtr(): NativePointer {
+
+ return Afl.jsApiGetSymbol("__afl_fuzz_ptr");
+ }
+
+ /**
+ * Print a message to the STDOUT. This should be preferred to
+ * FRIDA's `console.log` since FRIDA will queue it's log messages.
+ * If `console.log` is used in a callback in particular, then there
+ * may no longer be a thread running to service this queue.
+ */
+ public static print(msg: string): void {
+ const STDOUT_FILENO = 2;
+ const log = `${msg}\n`;
+ const buf = Memory.allocUtf8String(log);
+ Afl.jsApiWrite(STDOUT_FILENO, buf, log.length);
+ }
+
+ /**
+ * See `AFL_FRIDA_DEBUG_MAPS`.
+ */
+ public static setDebugMaps(): void {
+ Afl.jsApiSetDebugMaps();
+ }
+
+ /**
+ * This has the same effect as setting `AFL_ENTRYPOINT`, but has the
+ * convenience of allowing you to use FRIDAs APIs to determine the
+ * address you would like to configure, rather than having to grep
+ * the output of `readelf` or something similarly ugly. This
+ * function should be called with a `NativePointer` as its
+ * argument.
+ */
+ public static setEntryPoint(address: NativePointer): void {
+ Afl.jsApiSetEntryPoint(address);
+ }
+
+ /**
+ * Function used to enable in-memory test cases for fuzzing.
+ */
+ public static setInMemoryFuzzing(): void {
+ Afl.jsApiAflSharedMemFuzzing.writeInt(1);
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_DEBUG_FILE`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setInstrumentDebugFile(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetInstrumentDebugFile(buf);
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_TRACE`.
+ */
+ public static setInstrumentEnableTracing(): void {
+ Afl.jsApiSetInstrumentTrace();
+ }
+
+ /**
+ * See `AFL_INST_LIBS`.
+ */
+ public static setInstrumentLibraries(): void {
+ Afl.jsApiSetInstrumentLibraries();
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_NO_OPTIMIZE`
+ */
+ public static setInstrumentNoOptimize(): void {
+ Afl.jsApiSetInstrumentNoOptimize();
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_TRACE_UNIQUE`.
+ */
+ public static setInstrumentTracingUnique(): void {
+ Afl.jsApiSetInstrumentTraceUnique();
+ }
+
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_ADDR`, again a
+ * `NativePointer` should be provided as it's argument.
+ */
+ public static setPersistentAddress(address: NativePointer): void {
+ Afl.jsApiSetPersistentAddress(address);
+ }
+
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_CNT`, a
+ * `number` should be provided as it's argument.
+ */
+ public static setPersistentCount(count: number): void {
+ Afl.jsApiSetPersistentCount(count);
+ }
+
+ /**
+ * See `AFL_FRIDA_PERSISTENT_DEBUG`.
+ */
+ public static setPersistentDebug(): void {
+ Afl.jsApiSetPersistentDebug();
+ }
+
+ /**
+ * See `AFL_FRIDA_PERSISTENT_ADDR`. This function takes a NativePointer as an
+ * argument. See above for examples of use.
+ */
+ public static setPersistentHook(address: NativePointer): void {
+ Afl.jsApiSetPersistentHook(address);
+ }
+
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_RET`, again a
+ * `NativePointer` should be provided as it's argument.
+ */
+ public static setPersistentReturn(address: NativePointer): void {
+ Afl.jsApiSetPersistentReturn(address);
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_NO_PREFETCH`.
+ */
+ public static setPrefetchDisable(): void {
+ Afl.jsApiSetPrefetchDisable();
+ }
+
+ /*
+ * Set a function to be called for each instruction which is instrumented
+ * by AFL FRIDA mode.
+ */
+ public static setStalkerCallback(callback: NativePointer): void {
+ Afl.jsApiSetStalkerCallback(callback);
+ }
+
+ /**
+ * See `AFL_FRIDA_STATS_FILE`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setStatsFile(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStatsFile(buf);
+ }
+
+ /**
+ * See `AFL_FRIDA_STATS_INTERVAL`. This function takes a `number` as an
+ * argument
+ */
+ public static setStatsInterval(interval: number): void {
+ Afl.jsApiSetStatsInterval(interval);
+ }
+
+ /**
+ * See `AFL_FRIDA_STATS_TRANSITIONS`
+ */
+ public static setStatsTransitions(): void {
+ Afl.jsApiSetStatsTransitions();
+ }
+
+ /**
+ * See `AFL_FRIDA_OUTPUT_STDERR`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setStdErr(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStdErr(buf);
+ }
+
+ /**
+ * See `AFL_FRIDA_OUTPUT_STDOUT`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setStdOut(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStdOut(buf);
+ }
+
+}
+
+```
diff --git a/frida_mode/hook/hook.c b/frida_mode/hook/hook.c
new file mode 100644
index 00000000..7d08101f
--- /dev/null
+++ b/frida_mode/hook/hook.c
@@ -0,0 +1,50 @@
+#include <stdint.h>
+#include <string.h>
+
+#include "frida-gumjs.h"
+
+#if defined(__x86_64__)
+
+void afl_persistent_hook(GumCpuContext *regs, uint8_t *input_buf,
+ uint32_t input_buf_len) {
+
+ memcpy((void *)regs->rdi, input_buf, input_buf_len);
+ regs->rsi = input_buf_len;
+
+}
+
+#elif defined(__i386__)
+
+void afl_persistent_hook(GumCpuContext *regs, uint8_t *input_buf,
+ uint32_t input_buf_len) {
+
+ void **esp = (void **)regs->esp;
+ void * arg1 = esp[0];
+ void **arg2 = &esp[1];
+ memcpy(arg1, input_buf, input_buf_len);
+ *arg2 = (void *)input_buf_len;
+
+}
+
+#elif defined(__aarch64__)
+
+void afl_persistent_hook(GumCpuContext *regs, uint8_t *input_buf,
+ uint32_t input_buf_len) {
+
+ memcpy((void *)regs->x[0], input_buf, input_buf_len);
+ regs->x[1] = input_buf_len;
+
+}
+
+#else
+ #pragma error "Unsupported architecture"
+#endif
+
+int afl_persistent_hook_init(void) {
+
+ // 1 for shared memory input (faster), 0 for normal input (you have to use
+ // read(), input_buf will be NULL)
+ return 1;
+
+}
+
diff --git a/frida_mode/include/asan.h b/frida_mode/include/asan.h
index 7a8726e0..67d33591 100644
--- a/frida_mode/include/asan.h
+++ b/frida_mode/include/asan.h
@@ -1,10 +1,11 @@
#ifndef _ASAN_H
#define _ASAN_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
extern gboolean asan_initialized;
+void asan_config(void);
void asan_init(void);
void asan_arch_init(void);
void asan_instrument(const cs_insn *instr, GumStalkerIterator *iterator);
diff --git a/frida_mode/include/ctx.h b/frida_mode/include/ctx.h
index 67274aee..c669478e 100644
--- a/frida_mode/include/ctx.h
+++ b/frida_mode/include/ctx.h
@@ -1,7 +1,7 @@
#ifndef _CTX_H
#define _CTX_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#if defined(__x86_64__)
gsize ctx_read_reg(GumX64CpuContext *ctx, x86_reg reg);
diff --git a/frida_mode/include/entry.h b/frida_mode/include/entry.h
index 967831af..801c2bbe 100644
--- a/frida_mode/include/entry.h
+++ b/frida_mode/include/entry.h
@@ -1,13 +1,15 @@
#ifndef _ENTRY_H
#define _ENTRY_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
-extern guint64 entry_start;
+extern guint64 entry_point;
+
+void entry_config(void);
void entry_init(void);
-void entry_run(void);
+void entry_start(void);
void entry_prologue(GumStalkerIterator *iterator, GumStalkerOutput *output);
diff --git a/frida_mode/include/frida_cmplog.h b/frida_mode/include/frida_cmplog.h
index b620a472..a665e970 100644
--- a/frida_mode/include/frida_cmplog.h
+++ b/frida_mode/include/frida_cmplog.h
@@ -3,6 +3,7 @@
extern struct cmp_map *__afl_cmp_map;
+void cmplog_config(void);
void cmplog_init(void);
/* Functions to be implemented by the different architectures */
diff --git a/frida_mode/include/instrument.h b/frida_mode/include/instrument.h
index 577481d1..9c8d3a5d 100644
--- a/frida_mode/include/instrument.h
+++ b/frida_mode/include/instrument.h
@@ -1,13 +1,20 @@
#ifndef _INSTRUMENT_H
#define _INSTRUMENT_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
-extern __thread uint64_t previous_pc;
-extern uint8_t * __afl_area_ptr;
-extern uint32_t __afl_map_size;
+extern char * instrument_debug_filename;
+extern gboolean instrument_tracing;
+extern gboolean instrument_optimize;
+extern gboolean instrument_unique;
+extern __thread uint64_t instrument_previous_pc;
+
+extern uint8_t *__afl_area_ptr;
+extern uint32_t __afl_map_size;
+
+void instrument_config(void);
void instrument_init(void);
@@ -19,6 +26,7 @@ gboolean instrument_is_coverage_optimize_supported(void);
void instrument_coverage_optimize(const cs_insn * instr,
GumStalkerOutput *output);
+void instrument_debug_config(void);
void instrument_debug_init(void);
void instrument_debug_start(uint64_t address, GumStalkerOutput *output);
void instrument_debug_instruction(uint64_t address, uint16_t size);
diff --git a/frida_mode/include/intercept.h b/frida_mode/include/intercept.h
new file mode 100644
index 00000000..8fe93b10
--- /dev/null
+++ b/frida_mode/include/intercept.h
@@ -0,0 +1,11 @@
+#ifndef _INTERCEPTOR_H
+#define _INTERCEPTOR_H
+
+#include "frida-gumjs.h"
+
+void intercept_hook(void *address, gpointer replacement, gpointer user_data);
+void intercept_unhook(void *address);
+void intercept_unhook_self(void);
+
+#endif
+
diff --git a/frida_mode/include/interceptor.h b/frida_mode/include/interceptor.h
deleted file mode 100644
index 0ff754a4..00000000
--- a/frida_mode/include/interceptor.h
+++ /dev/null
@@ -1,11 +0,0 @@
-#ifndef _INTERCEPTOR_H
-#define _INTERCEPTOR_H
-
-#include "frida-gum.h"
-
-void intercept(void *address, gpointer replacement, gpointer user_data);
-void unintercept(void *address);
-void unintercept_self(void);
-
-#endif
-
diff --git a/frida_mode/include/js.h b/frida_mode/include/js.h
new file mode 100644
index 00000000..a5ecb712
--- /dev/null
+++ b/frida_mode/include/js.h
@@ -0,0 +1,26 @@
+#ifndef _JS_H
+#define _JS_H
+
+#include "frida-gumjs.h"
+
+typedef gboolean (*js_api_stalker_callback_t)(const cs_insn *insn,
+ gboolean begin, gboolean excluded,
+ GumStalkerOutput *output);
+
+extern unsigned char api_js[];
+extern unsigned int api_js_len;
+
+extern gboolean js_done;
+extern js_api_stalker_callback_t js_user_callback;
+
+/* Frida Mode */
+
+void js_config(void);
+
+void js_start(void);
+
+gboolean js_stalker_callback(const cs_insn *insn, gboolean begin,
+ gboolean excluded, GumStalkerOutput *output);
+
+#endif
+
diff --git a/frida_mode/include/lib.h b/frida_mode/include/lib.h
index 237aecb0..a9d56e4e 100644
--- a/frida_mode/include/lib.h
+++ b/frida_mode/include/lib.h
@@ -1,7 +1,9 @@
#ifndef _LIB_H
#define _LIB_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
+
+void lib_config(void);
void lib_init(void);
diff --git a/frida_mode/include/output.h b/frida_mode/include/output.h
index 53a9fdd3..743b2fe6 100644
--- a/frida_mode/include/output.h
+++ b/frida_mode/include/output.h
@@ -1,8 +1,12 @@
#ifndef _OUTPUT_H
#define _OUTPUT_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
+extern char *output_stdout;
+extern char *output_stderr;
+
+void output_config(void);
void output_init(void);
#endif
diff --git a/frida_mode/include/persistent.h b/frida_mode/include/persistent.h
index 25b44ab0..8f00196c 100644
--- a/frida_mode/include/persistent.h
+++ b/frida_mode/include/persistent.h
@@ -2,7 +2,7 @@
#ifndef _PERSISTENT_H
#define _PERSISTENT_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
typedef struct arch_api_regs api_regs;
@@ -19,9 +19,10 @@ extern unsigned char *__afl_fuzz_ptr;
extern guint64 persistent_start;
extern guint64 persistent_count;
extern guint64 persistent_ret;
-extern guint64 persistent_ret_offset;
extern gboolean persistent_debug;
-extern afl_persistent_hook_fn hook;
+extern afl_persistent_hook_fn persistent_hook;
+
+void persistent_config(void);
void persistent_init(void);
diff --git a/frida_mode/include/prefetch.h b/frida_mode/include/prefetch.h
index 8f0cee68..835d5e8a 100644
--- a/frida_mode/include/prefetch.h
+++ b/frida_mode/include/prefetch.h
@@ -1,8 +1,11 @@
#ifndef _PREFETCH_H
#define _PREFETCH_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
+extern gboolean prefetch_enable;
+
+void prefetch_config(void);
void prefetch_init(void);
void prefetch_write(void *addr);
void prefetch_read(void);
diff --git a/frida_mode/include/ranges.h b/frida_mode/include/ranges.h
index c623f473..a667fb76 100644
--- a/frida_mode/include/ranges.h
+++ b/frida_mode/include/ranges.h
@@ -1,13 +1,20 @@
#ifndef _RANGES_H
#define _RANGES_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
+extern gboolean ranges_debug_maps;
+extern gboolean ranges_inst_libs;
+
+void ranges_config(void);
void ranges_init(void);
gboolean range_is_excluded(gpointer address);
void ranges_exclude();
+void ranges_add_include(GumMemoryRange *range);
+void ranges_add_exclude(GumMemoryRange *range);
+
#endif
diff --git a/frida_mode/include/stalker.h b/frida_mode/include/stalker.h
index 186ead11..2136fe52 100644
--- a/frida_mode/include/stalker.h
+++ b/frida_mode/include/stalker.h
@@ -1,8 +1,9 @@
#ifndef _STALKER_H
#define _STALKER_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
+void stalker_config(void);
void stalker_init(void);
GumStalker *stalker_get(void);
void stalker_start(void);
diff --git a/frida_mode/include/stats.h b/frida_mode/include/stats.h
index 4271132a..1cfd6b8f 100644
--- a/frida_mode/include/stats.h
+++ b/frida_mode/include/stats.h
@@ -1,7 +1,7 @@
#ifndef _STATS_H
#define _STATS_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
typedef struct {
@@ -15,6 +15,11 @@ typedef struct {
extern stats_data_header_t *stats_data;
+extern char * stats_filename;
+extern guint64 stats_interval;
+extern gboolean stats_transitions;
+
+void stats_config(void);
void stats_init(void);
void stats_collect(const cs_insn *instr, gboolean begin);
void stats_print(char *format, ...);
diff --git a/frida_mode/include/util.h b/frida_mode/include/util.h
index 7b443b5e..525e9d40 100644
--- a/frida_mode/include/util.h
+++ b/frida_mode/include/util.h
@@ -1,7 +1,7 @@
#ifndef _UTIL_H
#define _UTIL_H
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#define UNUSED_PARAMETER(x) (void)(x)
#define IGNORED_RETURN(x) (void)!(x)
diff --git a/frida_mode/src/asan/asan.c b/frida_mode/src/asan/asan.c
index f78f690c..b2e763ca 100644
--- a/frida_mode/src/asan/asan.c
+++ b/frida_mode/src/asan/asan.c
@@ -1,18 +1,18 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
#include "asan.h"
-gboolean asan_initialized = FALSE;
+static gboolean asan_enabled = FALSE;
+gboolean asan_initialized = FALSE;
-void asan_init(void) {
+void asan_config(void) {
if (getenv("AFL_USE_FASAN") != NULL) {
OKF("Frida ASAN mode enabled");
- asan_arch_init();
- asan_initialized = TRUE;
+ asan_enabled = TRUE;
} else {
@@ -22,3 +22,14 @@ void asan_init(void) {
}
+void asan_init(void) {
+
+ if (asan_enabled) {
+
+ asan_arch_init();
+ asan_initialized = TRUE;
+
+ }
+
+}
+
diff --git a/frida_mode/src/asan/asan_arm32.c b/frida_mode/src/asan/asan_arm32.c
index 79475ced..f5fa4713 100644
--- a/frida_mode/src/asan/asan_arm32.c
+++ b/frida_mode/src/asan/asan_arm32.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/asan/asan_arm64.c b/frida_mode/src/asan/asan_arm64.c
index 66138e42..65524e03 100644
--- a/frida_mode/src/asan/asan_arm64.c
+++ b/frida_mode/src/asan/asan_arm64.c
@@ -1,5 +1,5 @@
#include <dlfcn.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/asan/asan_x64.c b/frida_mode/src/asan/asan_x64.c
index a2eabe3c..5c12669f 100644
--- a/frida_mode/src/asan/asan_x64.c
+++ b/frida_mode/src/asan/asan_x64.c
@@ -1,5 +1,5 @@
#include <dlfcn.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/asan/asan_x86.c b/frida_mode/src/asan/asan_x86.c
index 8490b490..6d2f9e2b 100644
--- a/frida_mode/src/asan/asan_x86.c
+++ b/frida_mode/src/asan/asan_x86.c
@@ -1,5 +1,5 @@
#include <dlfcn.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/cmplog/cmplog.c b/frida_mode/src/cmplog/cmplog.c
index 3df7d13d..a2609c8e 100644
--- a/frida_mode/src/cmplog/cmplog.c
+++ b/frida_mode/src/cmplog/cmplog.c
@@ -1,27 +1,32 @@
#include <errno.h>
#include <fcntl.h>
#include <limits.h>
-#include <syscall.h>
+#include <sys/mman.h>
+#include <sys/syscall.h>
+#include <unistd.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
#include "util.h"
#define DEFAULT_MMAP_MIN_ADDR (32UL << 10)
-#define FD_TMP_MAX_SIZE 65536
+#define MAX_MEMFD_SIZE (64UL << 10)
extern struct cmp_map *__afl_cmp_map;
+static GArray * cmplog_ranges = NULL;
+static GHashTable * hash_yes = NULL;
+static GHashTable * hash_no = NULL;
-static GArray *cmplog_ranges = NULL;
-static int fd_tmp = -1;
-static ssize_t fd_tmp_size = 0;
+static long page_size = 0;
+static long page_offset_mask = 0;
+static long page_mask = 0;
static gboolean cmplog_range(const GumRangeDetails *details,
gpointer user_data) {
- UNUSED_PARAMETER(user_data);
+ GArray * cmplog_ranges = (GArray *)user_data;
GumMemoryRange range = *details->range;
g_array_append_val(cmplog_ranges, range);
return TRUE;
@@ -35,70 +40,98 @@ static gint cmplog_sort(gconstpointer a, gconstpointer b) {
}
-static int cmplog_create_temp(void) {
+static void cmplog_get_ranges(void) {
- const char *tmpdir = g_get_tmp_dir();
- OKF("CMPLOG Temporary directory: %s", tmpdir);
- gchar *fname = g_strdup_printf("%s/frida-cmplog-XXXXXX", tmpdir);
- OKF("CMPLOG Temporary file template: %s", fname);
- int fd = mkstemp(fname);
- OKF("CMPLOG Temporary file: %s", fname);
+ OKF("CMPLOG - Collecting ranges");
- if (fd < 0) {
+ cmplog_ranges = g_array_sized_new(false, false, sizeof(GumMemoryRange), 100);
+ gum_process_enumerate_ranges(GUM_PAGE_READ, cmplog_range, cmplog_ranges);
+ g_array_sort(cmplog_ranges, cmplog_sort);
- FATAL("Failed to create temp file: %s, errno: %d", fname, errno);
+}
- }
+void cmplog_config(void) {
- if (unlink(fname) < 0) {
+}
+
+void cmplog_init(void) {
- FATAL("Failed to unlink temp file: %s (%d), errno: %d", fname, fd, errno);
+ if (__afl_cmp_map != NULL) { OKF("CMPLOG mode enabled"); }
+
+ cmplog_get_ranges();
+
+ for (guint i = 0; i < cmplog_ranges->len; i++) {
+
+ GumMemoryRange *range = &g_array_index(cmplog_ranges, GumMemoryRange, i);
+ OKF("CMPLOG Range - %3u: 0x%016" G_GINT64_MODIFIER
+ "X - 0x%016" G_GINT64_MODIFIER "X",
+ i, range->base_address, range->base_address + range->size);
}
- if (ftruncate(fd, 0) < 0) {
+ page_size = sysconf(_SC_PAGE_SIZE);
+ page_offset_mask = page_size - 1;
+ page_mask = ~(page_offset_mask);
+
+ hash_yes = g_hash_table_new(g_direct_hash, g_direct_equal);
+ if (hash_yes == NULL) {
- FATAL("Failed to ftruncate temp file: %s (%d), errno: %d", fname, fd,
- errno);
+ FATAL("Failed to g_hash_table_new, errno: %d", errno);
}
- g_free(fname);
+ hash_no = g_hash_table_new(g_direct_hash, g_direct_equal);
+ if (hash_no == NULL) {
+
+ FATAL("Failed to g_hash_table_new, errno: %d", errno);
- return fd;
+ }
}
-void cmplog_init(void) {
+static gboolean cmplog_contains(GumAddress inner_base, GumAddress inner_limit,
+ GumAddress outer_base, GumAddress outer_limit) {
- if (__afl_cmp_map != NULL) { OKF("CMPLOG mode enabled"); }
+ return (inner_base >= outer_base && inner_limit <= outer_limit);
- cmplog_ranges = g_array_sized_new(false, false, sizeof(GumMemoryRange), 100);
- gum_process_enumerate_ranges(GUM_PAGE_READ, cmplog_range, NULL);
- g_array_sort(cmplog_ranges, cmplog_sort);
+}
- for (guint i = 0; i < cmplog_ranges->len; i++) {
+gboolean cmplog_test_addr(guint64 addr, size_t size) {
- GumMemoryRange *range = &g_array_index(cmplog_ranges, GumMemoryRange, i);
- OKF("CMPLOG Range - 0x%016" G_GINT64_MODIFIER "X - 0x%016" G_GINT64_MODIFIER
- "X",
- range->base_address, range->base_address + range->size);
+ if (g_hash_table_contains(hash_yes, GSIZE_TO_POINTER(addr))) { return true; }
+ if (g_hash_table_contains(hash_no, GSIZE_TO_POINTER(addr))) { return false; }
- }
+ void * page_addr = GSIZE_TO_POINTER(addr & page_mask);
+ size_t page_offset = addr & page_offset_mask;
+
+ /* If it spans a page, then bail */
+ if (page_size - page_offset < size) { return false; }
/*
- * We can't use /dev/null or /dev/zero for this since it appears that they
- * don't validate the input buffer. Persumably as an optimization because they
- * don't actually write any data. The file will be deleted on close.
+ * Our address map can change (e.g. stack growth), use msync as a fallback to
+ * validate our address.
*/
- fd_tmp = cmplog_create_temp();
+ if (msync(page_addr, page_offset + size, MS_ASYNC) < 0) {
-}
+ if (!g_hash_table_add(hash_no, GSIZE_TO_POINTER(addr))) {
-static gboolean cmplog_contains(GumAddress inner_base, GumAddress inner_limit,
- GumAddress outer_base, GumAddress outer_limit) {
+ FATAL("Failed - g_hash_table_add");
- return (inner_base >= outer_base && inner_limit <= outer_limit);
+ }
+
+ return false;
+
+ } else {
+
+ if (!g_hash_table_add(hash_yes, GSIZE_TO_POINTER(addr))) {
+
+ FATAL("Failed - g_hash_table_add");
+
+ }
+
+ return true;
+
+ }
}
@@ -125,45 +158,16 @@ gboolean cmplog_is_readable(guint64 addr, size_t size) {
for (guint i = 0; i < cmplog_ranges->len; i++) {
GumMemoryRange *range = &g_array_index(cmplog_ranges, GumMemoryRange, i);
- GumAddress outer_base = range->base_address;
- GumAddress outer_limit = outer_base + range->size;
+
+ GumAddress outer_base = range->base_address;
+ GumAddress outer_limit = outer_base + range->size;
if (cmplog_contains(inner_base, inner_limit, outer_base, outer_limit))
return true;
}
- /*
- * Our address map can change (e.g. stack growth), use write as a fallback to
- * validate our address.
- */
- ssize_t written = syscall(__NR_write, fd_tmp, (void *)addr, size);
-
- /*
- * If the write succeeds, then the buffer must be valid otherwise it would
- * return EFAULT
- */
- if (written > 0) {
-
- fd_tmp_size += written;
- if (fd_tmp_size > FD_TMP_MAX_SIZE) {
-
- /*
- * Truncate the file, we don't want our temp file to continue growing!
- */
- if (ftruncate(fd_tmp, 0) < 0) {
-
- FATAL("Failed to truncate fd_tmp (%d), errno: %d", fd_tmp, errno);
-
- }
-
- fd_tmp_size = 0;
-
- }
-
- if ((size_t)written == size) { return true; }
-
- }
+ if (cmplog_test_addr(addr, size)) { return true; }
return false;
diff --git a/frida_mode/src/cmplog/cmplog_arm32.c b/frida_mode/src/cmplog/cmplog_arm32.c
index 5af28f3f..ac703408 100644
--- a/frida_mode/src/cmplog/cmplog_arm32.c
+++ b/frida_mode/src/cmplog/cmplog_arm32.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/cmplog/cmplog_arm64.c b/frida_mode/src/cmplog/cmplog_arm64.c
index 04631ff8..dd97f38d 100644
--- a/frida_mode/src/cmplog/cmplog_arm64.c
+++ b/frida_mode/src/cmplog/cmplog_arm64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
#include "cmplog.h"
diff --git a/frida_mode/src/cmplog/cmplog_x64.c b/frida_mode/src/cmplog/cmplog_x64.c
index 9f56c32a..0d18767a 100644
--- a/frida_mode/src/cmplog/cmplog_x64.c
+++ b/frida_mode/src/cmplog/cmplog_x64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
#include "cmplog.h"
@@ -177,7 +177,7 @@ static void cmplog_handle_cmp_sub(GumCpuContext *context, gsize operand1,
register uintptr_t k = (uintptr_t)address;
k = (k >> 4) ^ (k << 8);
- k &= CMP_MAP_W - 1;
+ k &= CMP_MAP_W - 7;
__afl_cmp_map->headers[k].type = CMP_TYPE_INS;
@@ -198,8 +198,6 @@ static void cmplog_cmp_sub_callout(GumCpuContext *context, gpointer user_data) {
gsize operand1;
gsize operand2;
- if (ctx->operand1.size != ctx->operand2.size) FATAL("Operand size mismatch");
-
if (!cmplog_get_operand_value(context, &ctx->operand1, &operand1)) { return; }
if (!cmplog_get_operand_value(context, &ctx->operand2, &operand2)) { return; }
@@ -233,6 +231,15 @@ static void cmplog_instrument_cmp_sub(const cs_insn * instr,
case X86_INS_CMP:
case X86_INS_SUB:
+ case X86_INS_SCASB:
+ case X86_INS_SCASD:
+ case X86_INS_SCASQ:
+ case X86_INS_SCASW:
+ case X86_INS_CMPSB:
+ case X86_INS_CMPSD:
+ case X86_INS_CMPSQ:
+ case X86_INS_CMPSS:
+ case X86_INS_CMPSW:
break;
default:
return;
@@ -247,13 +254,8 @@ static void cmplog_instrument_cmp_sub(const cs_insn * instr,
if (operand1->type == X86_OP_INVALID) return;
if (operand2->type == X86_OP_INVALID) return;
- if ((operand1->type == X86_OP_MEM) &&
- (operand1->mem.segment != X86_REG_INVALID))
- return;
-
- if ((operand2->type == X86_OP_MEM) &&
- (operand2->mem.segment != X86_REG_INVALID))
- return;
+ /* Both operands are the same size */
+ if (operand1->size == 1) { return; }
cmplog_instrument_cmp_sub_put_callout(iterator, operand1, operand2);
diff --git a/frida_mode/src/cmplog/cmplog_x86.c b/frida_mode/src/cmplog/cmplog_x86.c
index a27df0af..dd666c34 100644
--- a/frida_mode/src/cmplog/cmplog_x86.c
+++ b/frida_mode/src/cmplog/cmplog_x86.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
#include "cmplog.h"
diff --git a/frida_mode/src/ctx/ctx_arm32.c b/frida_mode/src/ctx/ctx_arm32.c
index a5c6f6d4..a354c117 100644
--- a/frida_mode/src/ctx/ctx_arm32.c
+++ b/frida_mode/src/ctx/ctx_arm32.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/ctx/ctx_arm64.c b/frida_mode/src/ctx/ctx_arm64.c
index d09896af..a735401b 100644
--- a/frida_mode/src/ctx/ctx_arm64.c
+++ b/frida_mode/src/ctx/ctx_arm64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/ctx/ctx_x64.c b/frida_mode/src/ctx/ctx_x64.c
index c5900533..da5cb13a 100644
--- a/frida_mode/src/ctx/ctx_x64.c
+++ b/frida_mode/src/ctx/ctx_x64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
@@ -49,9 +49,18 @@ gsize ctx_read_reg(GumX64CpuContext *ctx, x86_reg reg) {
X86_REG_8L(X86_REG_BL, ctx->rbx)
X86_REG_8L(X86_REG_CL, ctx->rcx)
X86_REG_8L(X86_REG_DL, ctx->rdx)
+ X86_REG_8L(X86_REG_SPL, ctx->rsp)
X86_REG_8L(X86_REG_BPL, ctx->rbp)
X86_REG_8L(X86_REG_SIL, ctx->rsi)
X86_REG_8L(X86_REG_DIL, ctx->rdi)
+ X86_REG_8L(X86_REG_R8B, ctx->r8)
+ X86_REG_8L(X86_REG_R9B, ctx->r9)
+ X86_REG_8L(X86_REG_R10B, ctx->r10)
+ X86_REG_8L(X86_REG_R11B, ctx->r11)
+ X86_REG_8L(X86_REG_R12B, ctx->r12)
+ X86_REG_8L(X86_REG_R13B, ctx->r13)
+ X86_REG_8L(X86_REG_R14B, ctx->r14)
+ X86_REG_8L(X86_REG_R15B, ctx->r15)
X86_REG_8H(X86_REG_AH, ctx->rax)
X86_REG_8H(X86_REG_BH, ctx->rbx)
@@ -62,14 +71,23 @@ gsize ctx_read_reg(GumX64CpuContext *ctx, x86_reg reg) {
X86_REG_16(X86_REG_BX, ctx->rbx)
X86_REG_16(X86_REG_CX, ctx->rcx)
X86_REG_16(X86_REG_DX, ctx->rdx)
+ X86_REG_16(X86_REG_SP, ctx->rsp)
+ X86_REG_16(X86_REG_BP, ctx->rbp)
X86_REG_16(X86_REG_DI, ctx->rdi)
X86_REG_16(X86_REG_SI, ctx->rsi)
- X86_REG_16(X86_REG_BP, ctx->rbp)
+ X86_REG_16(X86_REG_R8W, ctx->r8)
+ X86_REG_16(X86_REG_R9W, ctx->r9)
+ X86_REG_16(X86_REG_R10W, ctx->r10)
+ X86_REG_16(X86_REG_R11W, ctx->r11)
+ X86_REG_16(X86_REG_R12W, ctx->r12)
+ X86_REG_16(X86_REG_R13W, ctx->r13)
+ X86_REG_16(X86_REG_R14W, ctx->r14)
+ X86_REG_16(X86_REG_R15W, ctx->r15)
X86_REG_32(X86_REG_EAX, ctx->rax)
+ X86_REG_32(X86_REG_EBX, ctx->rbx)
X86_REG_32(X86_REG_ECX, ctx->rcx)
X86_REG_32(X86_REG_EDX, ctx->rdx)
- X86_REG_32(X86_REG_EBX, ctx->rbx)
X86_REG_32(X86_REG_ESP, ctx->rsp)
X86_REG_32(X86_REG_EBP, ctx->rbp)
X86_REG_32(X86_REG_ESI, ctx->rsi)
diff --git a/frida_mode/src/ctx/ctx_x86.c b/frida_mode/src/ctx/ctx_x86.c
index 45308272..1a587702 100644
--- a/frida_mode/src/ctx/ctx_x86.c
+++ b/frida_mode/src/ctx/ctx_x86.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
@@ -42,6 +42,7 @@ gsize ctx_read_reg(GumIA32CpuContext *ctx, x86_reg reg) {
X86_REG_8L(X86_REG_BL, ctx->ebx)
X86_REG_8L(X86_REG_CL, ctx->ecx)
X86_REG_8L(X86_REG_DL, ctx->edx)
+ X86_REG_8L(X86_REG_SPL, ctx->esp)
X86_REG_8L(X86_REG_BPL, ctx->ebp)
X86_REG_8L(X86_REG_SIL, ctx->esi)
X86_REG_8L(X86_REG_DIL, ctx->edi)
@@ -55,14 +56,15 @@ gsize ctx_read_reg(GumIA32CpuContext *ctx, x86_reg reg) {
X86_REG_16(X86_REG_BX, ctx->ebx)
X86_REG_16(X86_REG_CX, ctx->ecx)
X86_REG_16(X86_REG_DX, ctx->edx)
+ X86_REG_16(X86_REG_SP, ctx->esp)
+ X86_REG_16(X86_REG_BP, ctx->ebp)
X86_REG_16(X86_REG_DI, ctx->edi)
X86_REG_16(X86_REG_SI, ctx->esi)
- X86_REG_16(X86_REG_BP, ctx->ebp)
X86_REG_32(X86_REG_EAX, ctx->eax)
+ X86_REG_32(X86_REG_EBX, ctx->ebx)
X86_REG_32(X86_REG_ECX, ctx->ecx)
X86_REG_32(X86_REG_EDX, ctx->edx)
- X86_REG_32(X86_REG_EBX, ctx->ebx)
X86_REG_32(X86_REG_ESP, ctx->esp)
X86_REG_32(X86_REG_EBP, ctx->ebp)
X86_REG_32(X86_REG_ESI, ctx->esi)
diff --git a/frida_mode/src/entry.c b/frida_mode/src/entry.c
index e71386a0..e95b923b 100644
--- a/frida_mode/src/entry.c
+++ b/frida_mode/src/entry.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
@@ -9,27 +9,33 @@
extern void __afl_manual_init();
-guint64 entry_start = 0;
+guint64 entry_point = 0;
static void entry_launch(void) {
+ OKF("Entry point reached");
__afl_manual_init();
/* Child here */
- previous_pc = 0;
+ instrument_previous_pc = 0;
+
+}
+
+void entry_config(void) {
+
+ entry_point = util_read_address("AFL_ENTRYPOINT");
}
void entry_init(void) {
- entry_start = util_read_address("AFL_ENTRYPOINT");
- OKF("entry_point: 0x%016" G_GINT64_MODIFIER "X", entry_start);
+ OKF("entry_point: 0x%016" G_GINT64_MODIFIER "X", entry_point);
}
-void entry_run(void) {
+void entry_start(void) {
- if (entry_start == 0) { entry_launch(); }
+ if (entry_point == 0) { entry_launch(); }
}
diff --git a/frida_mode/src/instrument/instrument.c b/frida_mode/src/instrument/instrument.c
index ba82b89f..2a217d96 100644
--- a/frida_mode/src/instrument/instrument.c
+++ b/frida_mode/src/instrument/instrument.c
@@ -2,7 +2,7 @@
#include <sys/shm.h>
#include <sys/mman.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
#include "debug.h"
@@ -11,6 +11,7 @@
#include "entry.h"
#include "frida_cmplog.h"
#include "instrument.h"
+#include "js.h"
#include "persistent.h"
#include "prefetch.h"
#include "ranges.h"
@@ -18,12 +19,13 @@
#include "stats.h"
#include "util.h"
-static gboolean tracing = false;
-static gboolean optimize = false;
-static gboolean unique = false;
+gboolean instrument_tracing = false;
+gboolean instrument_optimize = false;
+gboolean instrument_unique = false;
+
static GumStalkerTransformer *transformer = NULL;
-__thread uint64_t previous_pc = 0;
+__thread uint64_t instrument_previous_pc = 0;
static GumAddress previous_rip = 0;
static u8 * edges_notified = NULL;
@@ -61,7 +63,7 @@ __attribute__((hot)) static void on_basic_block(GumCpuContext *context,
current_pc = (current_rip >> 4) ^ (current_rip << 8);
current_pc &= MAP_SIZE - 1;
- edge = current_pc ^ previous_pc;
+ edge = current_pc ^ instrument_previous_pc;
cursor = &__afl_area_ptr[edge];
value = *cursor;
@@ -77,11 +79,11 @@ __attribute__((hot)) static void on_basic_block(GumCpuContext *context,
}
*cursor = value;
- previous_pc = current_pc >> 1;
+ instrument_previous_pc = current_pc >> 1;
- if (unlikely(tracing)) {
+ if (unlikely(instrument_tracing)) {
- if (!unique || edges_notified[edge] == 0) {
+ if (!instrument_unique || edges_notified[edge] == 0) {
trace_debug("TRACE: edge: %10" G_GINT64_MODIFIER
"d, current_rip: 0x%016" G_GINT64_MODIFIER
@@ -90,7 +92,7 @@ __attribute__((hot)) static void on_basic_block(GumCpuContext *context,
}
- if (unique) { edges_notified[edge] = 1; }
+ if (instrument_unique) { edges_notified[edge] = 1; }
previous_rip = current_rip;
@@ -98,8 +100,9 @@ __attribute__((hot)) static void on_basic_block(GumCpuContext *context,
}
-static void instr_basic_block(GumStalkerIterator *iterator,
- GumStalkerOutput *output, gpointer user_data) {
+static void instrument_basic_block(GumStalkerIterator *iterator,
+ GumStalkerOutput * output,
+ gpointer user_data) {
UNUSED_PARAMETER(user_data);
@@ -111,7 +114,7 @@ static void instr_basic_block(GumStalkerIterator *iterator,
if (unlikely(begin)) { instrument_debug_start(instr->address, output); }
- if (instr->address == entry_start) { entry_prologue(iterator, output); }
+ if (instr->address == entry_point) { entry_prologue(iterator, output); }
if (instr->address == persistent_start) { persistent_prologue(output); }
if (instr->address == persistent_ret) { persistent_epilogue(output); }
@@ -150,7 +153,7 @@ static void instr_basic_block(GumStalkerIterator *iterator,
if (likely(!excluded)) {
- if (likely(optimize)) {
+ if (likely(instrument_optimize)) {
instrument_coverage_optimize(instr, output);
@@ -163,8 +166,6 @@ static void instr_basic_block(GumStalkerIterator *iterator,
}
- begin = FALSE;
-
}
instrument_debug_instruction(instr->address, instr->size);
@@ -176,7 +177,13 @@ static void instr_basic_block(GumStalkerIterator *iterator,
}
- gum_stalker_iterator_keep(iterator);
+ if (js_stalker_callback(instr, begin, excluded, output)) {
+
+ gum_stalker_iterator_keep(iterator);
+
+ }
+
+ begin = FALSE;
}
@@ -185,31 +192,39 @@ static void instr_basic_block(GumStalkerIterator *iterator,
}
-void instrument_init(void) {
+void instrument_config(void) {
+
+ instrument_optimize = (getenv("AFL_FRIDA_INST_NO_OPTIMIZE") == NULL);
+ instrument_tracing = (getenv("AFL_FRIDA_INST_TRACE") != NULL);
+ instrument_unique = (getenv("AFL_FRIDA_INST_TRACE_UNIQUE") != NULL);
+
+ instrument_debug_config();
+ asan_config();
+ cmplog_config();
- optimize = (getenv("AFL_FRIDA_INST_NO_OPTIMIZE") == NULL);
- tracing = (getenv("AFL_FRIDA_INST_TRACE") != NULL);
- unique = (getenv("AFL_FRIDA_INST_TRACE_UNIQUE") != NULL);
+}
+
+void instrument_init(void) {
- if (!instrument_is_coverage_optimize_supported()) optimize = false;
+ if (!instrument_is_coverage_optimize_supported()) instrument_optimize = false;
- OKF("Instrumentation - optimize [%c]", optimize ? 'X' : ' ');
- OKF("Instrumentation - tracing [%c]", tracing ? 'X' : ' ');
- OKF("Instrumentation - unique [%c]", unique ? 'X' : ' ');
+ OKF("Instrumentation - optimize [%c]", instrument_optimize ? 'X' : ' ');
+ OKF("Instrumentation - tracing [%c]", instrument_tracing ? 'X' : ' ');
+ OKF("Instrumentation - unique [%c]", instrument_unique ? 'X' : ' ');
- if (tracing && optimize) {
+ if (instrument_tracing && instrument_optimize) {
FATAL("AFL_FRIDA_INST_TRACE requires AFL_FRIDA_INST_NO_OPTIMIZE");
}
- if (unique && optimize) {
+ if (instrument_unique && instrument_optimize) {
FATAL("AFL_FRIDA_INST_TRACE_UNIQUE requires AFL_FRIDA_INST_NO_OPTIMIZE");
}
- if (unique) { tracing = TRUE; }
+ if (instrument_unique) { instrument_tracing = TRUE; }
if (__afl_map_size != 0x10000) {
@@ -217,10 +232,10 @@ void instrument_init(void) {
}
- transformer =
- gum_stalker_transformer_make_from_callback(instr_basic_block, NULL, NULL);
+ transformer = gum_stalker_transformer_make_from_callback(
+ instrument_basic_block, NULL, NULL);
- if (unique) {
+ if (instrument_unique) {
int shm_id = shmget(IPC_PRIVATE, MAP_SIZE, IPC_CREAT | IPC_EXCL | 0600);
if (shm_id < 0) { FATAL("shm_id < 0 - errno: %d\n", errno); }
diff --git a/frida_mode/src/instrument/instrument_arm32.c b/frida_mode/src/instrument/instrument_arm32.c
index 450a69a3..0e15940a 100644
--- a/frida_mode/src/instrument/instrument_arm32.c
+++ b/frida_mode/src/instrument/instrument_arm32.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/instrument/instrument_arm64.c b/frida_mode/src/instrument/instrument_arm64.c
index 49ee86a2..17f97c97 100644
--- a/frida_mode/src/instrument/instrument_arm64.c
+++ b/frida_mode/src/instrument/instrument_arm64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
#include "debug.h"
@@ -72,7 +72,7 @@ void instrument_coverage_optimize(const cs_insn * instr,
gum_arm64_writer_put_bytes(cw, afl_log_code, sizeof(afl_log_code));
uint8_t **afl_area_ptr_ptr = &__afl_area_ptr;
- uint64_t *afl_prev_loc_ptr = &previous_pc;
+ uint64_t *afl_prev_loc_ptr = &instrument_previous_pc;
gum_arm64_writer_put_bytes(cw, (const guint8 *)&afl_area_ptr_ptr,
sizeof(afl_area_ptr_ptr));
gum_arm64_writer_put_bytes(cw, (const guint8 *)&afl_prev_loc_ptr,
diff --git a/frida_mode/src/instrument/instrument_debug.c b/frida_mode/src/instrument/instrument_debug.c
index 0ce26a1c..b8cca634 100644
--- a/frida_mode/src/instrument/instrument_debug.c
+++ b/frida_mode/src/instrument/instrument_debug.c
@@ -3,7 +3,7 @@
#include <stdio.h>
#include <unistd.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
@@ -13,6 +13,8 @@
static int debugging_fd = -1;
static gpointer instrument_gen_start = NULL;
+char *instrument_debug_filename = NULL;
+
static void instrument_debug(char *format, ...) {
va_list ap;
@@ -79,18 +81,25 @@ static void instrument_disasm(guint8 *start, guint8 *end) {
}
+void instrument_debug_config(void) {
+
+ instrument_debug_filename = getenv("AFL_FRIDA_INST_DEBUG_FILE");
+
+}
+
void instrument_debug_init(void) {
- char *filename = getenv("AFL_FRIDA_INST_DEBUG_FILE");
- OKF("Instrumentation debugging - enabled [%c]", filename == NULL ? ' ' : 'X');
+ OKF("Instrumentation debugging - enabled [%c]",
+ instrument_debug_filename == NULL ? ' ' : 'X');
- if (filename == NULL) { return; }
+ if (instrument_debug_filename == NULL) { return; }
- OKF("Instrumentation debugging - file [%s]", filename);
+ OKF("Instrumentation debugging - file [%s]", instrument_debug_filename);
- if (filename == NULL) { return; }
+ if (instrument_debug_filename == NULL) { return; }
- char *path = g_canonicalize_filename(filename, g_get_current_dir());
+ char *path =
+ g_canonicalize_filename(instrument_debug_filename, g_get_current_dir());
OKF("Instrumentation debugging - path [%s]", path);
diff --git a/frida_mode/src/instrument/instrument_x64.c b/frida_mode/src/instrument/instrument_x64.c
index 7000e65d..a38b5b14 100644
--- a/frida_mode/src/instrument/instrument_x64.c
+++ b/frida_mode/src/instrument/instrument_x64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
@@ -68,7 +68,7 @@ void instrument_coverage_optimize(const cs_insn * instr,
current_log_impl = cw->pc;
gum_x86_writer_put_bytes(cw, afl_log_code, sizeof(afl_log_code));
- uint64_t *afl_prev_loc_ptr = &previous_pc;
+ uint64_t *afl_prev_loc_ptr = &instrument_previous_pc;
gum_x86_writer_put_bytes(cw, (const guint8 *)&__afl_area_ptr,
sizeof(__afl_area_ptr));
gum_x86_writer_put_bytes(cw, (const guint8 *)&afl_prev_loc_ptr,
diff --git a/frida_mode/src/instrument/instrument_x86.c b/frida_mode/src/instrument/instrument_x86.c
index 04a19e08..3c3dc272 100644
--- a/frida_mode/src/instrument/instrument_x86.c
+++ b/frida_mode/src/instrument/instrument_x86.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
@@ -16,7 +16,7 @@ static void instrument_coverage_function(GumX86Writer *cw) {
gum_x86_writer_put_push_reg(cw, GUM_REG_EDX);
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_ECX,
- GUM_ADDRESS(&previous_pc));
+ GUM_ADDRESS(&instrument_previous_pc));
gum_x86_writer_put_mov_reg_reg_ptr(cw, GUM_REG_EDX, GUM_REG_ECX);
gum_x86_writer_put_xor_reg_reg(cw, GUM_REG_EDX, GUM_REG_EDI);
diff --git a/frida_mode/src/interceptor.c b/frida_mode/src/intercept.c
index d2802752..ed8d27bd 100644
--- a/frida_mode/src/interceptor.c
+++ b/frida_mode/src/intercept.c
@@ -1,10 +1,10 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
-#include "interceptor.h"
+#include "intercept.h"
-void intercept(void *address, gpointer replacement, gpointer user_data) {
+void intercept_hook(void *address, gpointer replacement, gpointer user_data) {
GumInterceptor *interceptor = gum_interceptor_obtain();
gum_interceptor_begin_transaction(interceptor);
@@ -15,7 +15,7 @@ void intercept(void *address, gpointer replacement, gpointer user_data) {
}
-void unintercept(void *address) {
+void intercept_unhook(void *address) {
GumInterceptor *interceptor = gum_interceptor_obtain();
@@ -26,10 +26,10 @@ void unintercept(void *address) {
}
-void unintercept_self(void) {
+void intercept_unhook_self(void) {
GumInvocationContext *ctx = gum_interceptor_get_current_invocation();
- unintercept(ctx->function);
+ intercept_unhook(ctx->function);
}
diff --git a/frida_mode/src/js/api.js b/frida_mode/src/js/api.js
new file mode 100644
index 00000000..4cb04704
--- /dev/null
+++ b/frida_mode/src/js/api.js
@@ -0,0 +1,243 @@
+"use strict";
+class Afl {
+ /**
+ * This is equivalent to setting a value in `AFL_FRIDA_EXCLUDE_RANGES`,
+ * it takes as arguments a `NativePointer` and a `number`. It can be
+ * called multiple times to exclude several ranges.
+ */
+ static addExcludedRange(addressess, size) {
+ Afl.jsApiAddExcludeRange(addressess, size);
+ }
+ /**
+ * This is equivalent to setting a value in `AFL_FRIDA_INST_RANGES`,
+ * it takes as arguments a `NativePointer` and a `number`. It can be
+ * called multiple times to include several ranges.
+ */
+ static addIncludedRange(addressess, size) {
+ Afl.jsApiAddIncludeRange(addressess, size);
+ }
+ /**
+ * This must always be called at the end of your script. This lets
+ * FRIDA mode know that your configuration is finished and that
+ * execution has reached the end of your script. Failure to call
+ * this will result in a fatal error.
+ */
+ static done() {
+ Afl.jsApiDone();
+ }
+ /**
+ * This function can be called within your script to cause FRIDA
+ * mode to trigger a fatal error. This is useful if for example you
+ * discover a problem you weren't expecting and want everything to
+ * stop. The user will need to enable `AFL_DEBUG_CHILD=1` to view
+ * this error message.
+ */
+ static error(msg) {
+ const buf = Memory.allocUtf8String(msg);
+ Afl.jsApiError(buf);
+ }
+ /**
+ * Function used to provide access to `__afl_fuzz_ptr`, which contains the length of
+ * fuzzing data when using in-memory test case fuzzing.
+ */
+ static getAflFuzzLen() {
+ return Afl.jsApiGetSymbol("__afl_fuzz_len");
+ }
+ /**
+ * Function used to provide access to `__afl_fuzz_ptr`, which contains the fuzzing
+ * data when using in-memory test case fuzzing.
+ */
+ static getAflFuzzPtr() {
+ return Afl.jsApiGetSymbol("__afl_fuzz_ptr");
+ }
+ /**
+ * Print a message to the STDOUT. This should be preferred to
+ * FRIDA's `console.log` since FRIDA will queue it's log messages.
+ * If `console.log` is used in a callback in particular, then there
+ * may no longer be a thread running to service this queue.
+ */
+ static print(msg) {
+ const STDOUT_FILENO = 2;
+ const log = `${msg}\n`;
+ const buf = Memory.allocUtf8String(log);
+ Afl.jsApiWrite(STDOUT_FILENO, buf, log.length);
+ }
+ /**
+ * See `AFL_FRIDA_DEBUG_MAPS`.
+ */
+ static setDebugMaps() {
+ Afl.jsApiSetDebugMaps();
+ }
+ /**
+ * This has the same effect as setting `AFL_ENTRYPOINT`, but has the
+ * convenience of allowing you to use FRIDAs APIs to determine the
+ * address you would like to configure, rather than having to grep
+ * the output of `readelf` or something similarly ugly. This
+ * function should be called with a `NativePointer` as its
+ * argument.
+ */
+ static setEntryPoint(address) {
+ Afl.jsApiSetEntryPoint(address);
+ }
+ /**
+ * Function used to enable in-memory test cases for fuzzing.
+ */
+ static setInMemoryFuzzing() {
+ Afl.jsApiAflSharedMemFuzzing.writeInt(1);
+ }
+ /**
+ * See `AFL_FRIDA_INST_DEBUG_FILE`. This function takes a single `string` as
+ * an argument.
+ */
+ static setInstrumentDebugFile(file) {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetInstrumentDebugFile(buf);
+ }
+ /**
+ * See `AFL_FRIDA_INST_TRACE`.
+ */
+ static setInstrumentEnableTracing() {
+ Afl.jsApiSetInstrumentTrace();
+ }
+ /**
+ * See `AFL_INST_LIBS`.
+ */
+ static setInstrumentLibraries() {
+ Afl.jsApiSetInstrumentLibraries();
+ }
+ /**
+ * See `AFL_FRIDA_INST_NO_OPTIMIZE`
+ */
+ static setInstrumentNoOptimize() {
+ Afl.jsApiSetInstrumentNoOptimize();
+ }
+ /**
+ * See `AFL_FRIDA_INST_TRACE_UNIQUE`.
+ */
+ static setInstrumentTracingUnique() {
+ Afl.jsApiSetInstrumentTraceUnique();
+ }
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_ADDR`, again a
+ * `NativePointer` should be provided as it's argument.
+ */
+ static setPersistentAddress(address) {
+ Afl.jsApiSetPersistentAddress(address);
+ }
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_CNT`, a
+ * `number` should be provided as it's argument.
+ */
+ static setPersistentCount(count) {
+ Afl.jsApiSetPersistentCount(count);
+ }
+ /**
+ * See `AFL_FRIDA_PERSISTENT_DEBUG`.
+ */
+ static setPersistentDebug() {
+ Afl.jsApiSetPersistentDebug();
+ }
+ /**
+ * See `AFL_FRIDA_PERSISTENT_ADDR`. This function takes a NativePointer as an
+ * argument. See above for examples of use.
+ */
+ static setPersistentHook(address) {
+ Afl.jsApiSetPersistentHook(address);
+ }
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_RET`, again a
+ * `NativePointer` should be provided as it's argument.
+ */
+ static setPersistentReturn(address) {
+ Afl.jsApiSetPersistentReturn(address);
+ }
+ /**
+ * See `AFL_FRIDA_INST_NO_PREFETCH`.
+ */
+ static setPrefetchDisable() {
+ Afl.jsApiSetPrefetchDisable();
+ }
+ /*
+ * Set a function to be called for each instruction which is instrumented
+ * by AFL FRIDA mode.
+ */
+ static setStalkerCallback(callback) {
+ Afl.jsApiSetStalkerCallback(callback);
+ }
+ /**
+ * See `AFL_FRIDA_STATS_FILE`. This function takes a single `string` as
+ * an argument.
+ */
+ static setStatsFile(file) {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStatsFile(buf);
+ }
+ /**
+ * See `AFL_FRIDA_STATS_INTERVAL`. This function takes a `number` as an
+ * argument
+ */
+ static setStatsInterval(interval) {
+ Afl.jsApiSetStatsInterval(interval);
+ }
+ /**
+ * See `AFL_FRIDA_STATS_TRANSITIONS`
+ */
+ static setStatsTransitions() {
+ Afl.jsApiSetStatsTransitions();
+ }
+ /**
+ * See `AFL_FRIDA_OUTPUT_STDERR`. This function takes a single `string` as
+ * an argument.
+ */
+ static setStdErr(file) {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStdErr(buf);
+ }
+ /**
+ * See `AFL_FRIDA_OUTPUT_STDOUT`. This function takes a single `string` as
+ * an argument.
+ */
+ static setStdOut(file) {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStdOut(buf);
+ }
+ static jsApiGetFunction(name, retType, argTypes) {
+ const addr = Afl.module.getExportByName(name);
+ return new NativeFunction(addr, retType, argTypes);
+ }
+ static jsApiGetSymbol(name) {
+ return Afl.module.getExportByName(name);
+ }
+}
+/**
+ * Field containing the `Module` object for `afl-frida-trace.so` (the FRIDA mode
+ * implementation).
+ */
+Afl.module = Process.getModuleByName("afl-frida-trace.so");
+Afl.jsApiAddExcludeRange = Afl.jsApiGetFunction("js_api_add_exclude_range", "void", ["pointer", "size_t"]);
+Afl.jsApiAddIncludeRange = Afl.jsApiGetFunction("js_api_add_include_range", "void", ["pointer", "size_t"]);
+Afl.jsApiAflSharedMemFuzzing = Afl.jsApiGetSymbol("__afl_sharedmem_fuzzing");
+Afl.jsApiDone = Afl.jsApiGetFunction("js_api_done", "void", []);
+Afl.jsApiError = Afl.jsApiGetFunction("js_api_error", "void", ["pointer"]);
+Afl.jsApiSetDebugMaps = Afl.jsApiGetFunction("js_api_set_debug_maps", "void", []);
+Afl.jsApiSetEntryPoint = Afl.jsApiGetFunction("js_api_set_entrypoint", "void", ["pointer"]);
+Afl.jsApiSetInstrumentDebugFile = Afl.jsApiGetFunction("js_api_set_instrument_debug_file", "void", ["pointer"]);
+Afl.jsApiSetInstrumentLibraries = Afl.jsApiGetFunction("js_api_set_instrument_libraries", "void", []);
+Afl.jsApiSetInstrumentNoOptimize = Afl.jsApiGetFunction("js_api_set_instrument_no_optimize", "void", []);
+Afl.jsApiSetInstrumentTrace = Afl.jsApiGetFunction("js_api_set_instrument_trace", "void", []);
+Afl.jsApiSetInstrumentTraceUnique = Afl.jsApiGetFunction("js_api_set_instrument_trace_unique", "void", []);
+Afl.jsApiSetPersistentAddress = Afl.jsApiGetFunction("js_api_set_persistent_address", "void", ["pointer"]);
+Afl.jsApiSetPersistentCount = Afl.jsApiGetFunction("js_api_set_persistent_count", "void", ["uint64"]);
+Afl.jsApiSetPersistentDebug = Afl.jsApiGetFunction("js_api_set_persistent_debug", "void", []);
+Afl.jsApiSetPersistentHook = Afl.jsApiGetFunction("js_api_set_persistent_hook", "void", ["pointer"]);
+Afl.jsApiSetPersistentReturn = Afl.jsApiGetFunction("js_api_set_persistent_return", "void", ["pointer"]);
+Afl.jsApiSetPrefetchDisable = Afl.jsApiGetFunction("js_api_set_prefetch_disable", "void", []);
+Afl.jsApiSetStalkerCallback = Afl.jsApiGetFunction("js_api_set_stalker_callback", "void", ["pointer"]);
+Afl.jsApiSetStatsFile = Afl.jsApiGetFunction("js_api_set_stats_file", "void", ["pointer"]);
+Afl.jsApiSetStatsInterval = Afl.jsApiGetFunction("js_api_set_stats_interval", "void", ["uint64"]);
+Afl.jsApiSetStatsTransitions = Afl.jsApiGetFunction("js_api_set_stats_transitions", "void", []);
+Afl.jsApiSetStdErr = Afl.jsApiGetFunction("js_api_set_stderr", "void", ["pointer"]);
+Afl.jsApiSetStdOut = Afl.jsApiGetFunction("js_api_set_stdout", "void", ["pointer"]);
+Afl.jsApiWrite = new NativeFunction(
+/* tslint:disable-next-line:no-null-keyword */
+Module.getExportByName(null, "write"), "int", ["int", "pointer", "int"]);
diff --git a/frida_mode/src/js/js.c b/frida_mode/src/js/js.c
new file mode 100644
index 00000000..ed378d2c
--- /dev/null
+++ b/frida_mode/src/js/js.c
@@ -0,0 +1,122 @@
+#include "frida-gumjs.h"
+
+#include "debug.h"
+
+#include "js.h"
+#include "util.h"
+
+static char * js_script = NULL;
+gboolean js_done = FALSE;
+js_api_stalker_callback_t js_user_callback = NULL;
+
+static gchar * filename = "afl.js";
+static gchar * contents;
+static GumScriptBackend *backend;
+static GCancellable * cancellable = NULL;
+static GError * error = NULL;
+static GumScript * script;
+
+static void js_msg(GumScript *script, const gchar *message, GBytes *data,
+ gpointer user_data) {
+
+ UNUSED_PARAMETER(script);
+ UNUSED_PARAMETER(data);
+ UNUSED_PARAMETER(user_data);
+ OKF("%s", message);
+
+}
+
+void js_config(void) {
+
+ js_script = getenv("AFL_FRIDA_JS_SCRIPT");
+
+}
+
+static gchar *js_get_script() {
+
+ gsize length;
+ if (js_script != NULL) { filename = js_script; }
+
+ filename = g_canonicalize_filename(filename, g_get_current_dir());
+
+ if (!g_file_get_contents(filename, &contents, &length, NULL)) {
+
+ if (js_script == NULL) {
+
+ return NULL;
+
+ } else {
+
+ FATAL("Could not load script file: %s", filename);
+
+ }
+
+ } else {
+
+ OKF("Loaded AFL script: %s, %" G_GSIZE_MODIFIER "d bytes", filename,
+ length);
+
+ gchar *source = g_malloc0(api_js_len + length + 1);
+ memcpy(source, api_js, api_js_len);
+ memcpy(&source[api_js_len], contents, length);
+
+ return source;
+
+ }
+
+}
+
+static void js_print_script(gchar *source) {
+
+ gchar **split = g_strsplit(source, "\n", 0);
+
+ for (size_t i = 0; split[i] != NULL; i++) {
+
+ OKF("%3" G_GSIZE_MODIFIER "d. %s", i + 1, split[i]);
+
+ }
+
+ g_strfreev(split);
+
+}
+
+void js_start(void) {
+
+ GMainContext *context;
+
+ gchar *source = js_get_script();
+ if (source == NULL) { return; }
+ js_print_script(source);
+
+ backend = gum_script_backend_obtain_qjs();
+
+ script = gum_script_backend_create_sync(backend, "example", source,
+ cancellable, &error);
+
+ if (error != NULL) {
+
+ g_printerr("%s\n", error->message);
+ FATAL("Error processing script");
+
+ }
+
+ gum_script_set_message_handler(script, js_msg, NULL, NULL);
+
+ gum_script_load_sync(script, cancellable);
+
+ context = g_main_context_get_thread_default();
+ while (g_main_context_pending(context))
+ g_main_context_iteration(context, FALSE);
+
+ if (!js_done) { FATAL("Script didn't call Afl.done()"); }
+
+}
+
+gboolean js_stalker_callback(const cs_insn *insn, gboolean begin,
+ gboolean excluded, GumStalkerOutput *output) {
+
+ if (js_user_callback == NULL) { return TRUE; }
+ return js_user_callback(insn, begin, excluded, output);
+
+}
+
diff --git a/frida_mode/src/js/js_api.c b/frida_mode/src/js/js_api.c
new file mode 100644
index 00000000..91dccab2
--- /dev/null
+++ b/frida_mode/src/js/js_api.c
@@ -0,0 +1,152 @@
+#include "debug.h"
+
+#include "entry.h"
+#include "instrument.h"
+#include "js.h"
+#include "output.h"
+#include "persistent.h"
+#include "prefetch.h"
+#include "ranges.h"
+#include "stats.h"
+#include "util.h"
+
+void js_api_done() {
+
+ js_done = TRUE;
+
+}
+
+void js_api_error(char *msg) {
+
+ FATAL("%s", msg);
+
+}
+
+void js_api_set_entrypoint(void *address) {
+
+ entry_point = GPOINTER_TO_SIZE(address);
+
+}
+
+void js_api_set_persistent_address(void *address) {
+
+ persistent_start = GPOINTER_TO_SIZE(address);
+
+}
+
+void js_api_set_persistent_return(void *address) {
+
+ persistent_ret = GPOINTER_TO_SIZE(address);
+
+}
+
+void js_api_set_persistent_count(uint64_t count) {
+
+ persistent_count = count;
+
+}
+
+void js_api_set_persistent_debug() {
+
+ persistent_debug = TRUE;
+
+}
+
+void js_api_set_debug_maps() {
+
+ ranges_debug_maps = TRUE;
+
+}
+
+void js_api_add_include_range(void *address, gsize size) {
+
+ GumMemoryRange range = {.base_address = GUM_ADDRESS(address), .size = size};
+ ranges_add_include(&range);
+
+}
+
+void js_api_add_exclude_range(void *address, gsize size) {
+
+ GumMemoryRange range = {.base_address = GUM_ADDRESS(address), .size = size};
+ ranges_add_exclude(&range);
+
+}
+
+void js_api_set_instrument_libraries() {
+
+ ranges_inst_libs = TRUE;
+
+}
+
+void js_api_set_instrument_debug_file(char *path) {
+
+ instrument_debug_filename = g_strdup(path);
+
+}
+
+void js_api_set_prefetch_disable(void) {
+
+ prefetch_enable = FALSE;
+
+}
+
+void js_api_set_instrument_no_optimize(void) {
+
+ instrument_optimize = FALSE;
+
+}
+
+void js_api_set_instrument_trace(void) {
+
+ instrument_tracing = TRUE;
+
+}
+
+void js_api_set_instrument_trace_unique(void) {
+
+ instrument_unique = TRUE;
+
+}
+
+void js_api_set_stdout(char *file) {
+
+ output_stdout = g_strdup(file);
+
+}
+
+void js_api_set_stderr(char *file) {
+
+ output_stderr = g_strdup(file);
+
+}
+
+void js_api_set_stats_file(char *file) {
+
+ stats_filename = g_strdup(file);
+
+}
+
+void js_api_set_stats_interval(uint64_t interval) {
+
+ stats_interval = interval;
+
+}
+
+void js_api_set_stats_transitions() {
+
+ stats_transitions = TRUE;
+
+}
+
+void js_api_set_persistent_hook(void *address) {
+
+ persistent_hook = address;
+
+}
+
+void js_api_set_stalker_callback(const js_api_stalker_callback_t callback) {
+
+ js_user_callback = callback;
+
+}
+
diff --git a/frida_mode/src/lib/lib.c b/frida_mode/src/lib/lib.c
index 13a7d1e7..59a3fcf9 100644
--- a/frida_mode/src/lib/lib.c
+++ b/frida_mode/src/lib/lib.c
@@ -6,7 +6,7 @@
#include <sys/mman.h>
#include <unistd.h>
- #include "frida-gum.h"
+ #include "frida-gumjs.h"
#include "debug.h"
@@ -151,6 +151,10 @@ static void lib_get_text_section(lib_details_t *details) {
}
+void lib_config(void) {
+
+}
+
void lib_init(void) {
lib_details_t lib_details;
diff --git a/frida_mode/src/lib/lib_apple.c b/frida_mode/src/lib/lib_apple.c
index 8f863861..2aa48a13 100644
--- a/frida_mode/src/lib/lib_apple.c
+++ b/frida_mode/src/lib/lib_apple.c
@@ -1,5 +1,5 @@
#ifdef __APPLE__
- #include "frida-gum.h"
+ #include "frida-gumjs.h"
#include "debug.h"
@@ -56,6 +56,10 @@ gboolean lib_get_text_section(const GumDarwinSectionDetails *details,
}
+void lib_config(void) {
+
+}
+
void lib_init(void) {
GumDarwinModule *module = NULL;
diff --git a/frida_mode/src/main.c b/frida_mode/src/main.c
index 7ff23755..85b0bbf3 100644
--- a/frida_mode/src/main.c
+++ b/frida_mode/src/main.c
@@ -11,14 +11,15 @@
#include <sys/personality.h>
#endif
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
#include "debug.h"
#include "entry.h"
#include "instrument.h"
-#include "interceptor.h"
+#include "intercept.h"
+#include "js.h"
#include "lib.h"
#include "output.h"
#include "persistent.h"
@@ -44,13 +45,6 @@ typedef int *(*main_fn_t)(int argc, char **argv, char **envp);
static main_fn_t main_fn = NULL;
-static int on_fork(void) {
-
- prefetch_read();
- return fork();
-
-}
-
#ifdef __APPLE__
static void on_main_os(int argc, char **argv, char **envp) {
@@ -101,7 +95,8 @@ static void afl_print_cmdline(void) {
if (fd < 0) {
- FATAL("Failed to open /proc/self/cmdline, errno: (%d)", errno);
+ WARNF("Failed to open /proc/self/cmdline, errno: (%d)", errno);
+ return;
}
@@ -138,7 +133,8 @@ static void afl_print_env(void) {
if (fd < 0) {
- FATAL("Failed to open /proc/self/cmdline, errno: (%d)", errno);
+ WARNF("Failed to open /proc/self/cmdline, errno: (%d)", errno);
+ return;
}
@@ -172,23 +168,36 @@ void afl_frida_start(void) {
afl_print_cmdline();
afl_print_env();
+ /* Configure */
+ entry_config();
+ instrument_config();
+ js_config();
+ lib_config();
+ output_config();
+ persistent_config();
+ prefetch_config();
+ ranges_config();
+ stalker_config();
+ stats_config();
+
+ js_start();
+
+ /* Initialize */
+ output_init();
+
embedded_init();
- stalker_init();
- lib_init();
entry_init();
instrument_init();
- output_init();
+ lib_init();
persistent_init();
prefetch_init();
+ stalker_init();
ranges_init();
stats_init();
- void *fork_addr =
- GSIZE_TO_POINTER(gum_module_find_export_by_name(NULL, "fork"));
- intercept(fork_addr, on_fork, NULL);
-
+ /* Start */
stalker_start();
- entry_run();
+ entry_start();
}
@@ -196,7 +205,7 @@ static int *on_main(int argc, char **argv, char **envp) {
on_main_os(argc, argv, envp);
- unintercept_self();
+ intercept_unhook_self();
afl_frida_start();
@@ -210,7 +219,7 @@ extern int *main(int argc, char **argv, char **envp);
static void intercept_main(void) {
main_fn = main;
- intercept(main, on_main, NULL);
+ intercept_hook(main, on_main, NULL);
}
@@ -223,7 +232,7 @@ static void intercept_main(void) {
OKF("Entry Point: 0x%016" G_GINT64_MODIFIER "x", entry);
void *main = GSIZE_TO_POINTER(entry);
main_fn = main;
- intercept(main, on_main, NULL);
+ intercept_hook(main, on_main, NULL);
}
@@ -234,8 +243,8 @@ static int on_libc_start_main(int *(main)(int, char **, char **), int argc,
void(*stack_end)) {
main_fn = main;
- unintercept_self();
- intercept(main, on_main, NULL);
+ intercept_unhook_self();
+ intercept_hook(main, on_main, NULL);
return __libc_start_main(main, argc, ubp_av, init, fini, rtld_fini,
stack_end);
@@ -243,7 +252,7 @@ static int on_libc_start_main(int *(main)(int, char **, char **), int argc,
static void intercept_main(void) {
- intercept(__libc_start_main, on_libc_start_main, NULL);
+ intercept_hook(__libc_start_main, on_libc_start_main, NULL);
}
diff --git a/frida_mode/src/output.c b/frida_mode/src/output.c
index 8a222b25..e2b744e7 100644
--- a/frida_mode/src/output.c
+++ b/frida_mode/src/output.c
@@ -2,17 +2,17 @@
#include <fcntl.h>
#include <unistd.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
#include "output.h"
-static int output_fd = -1;
+char *output_stdout = NULL;
+char *output_stderr = NULL;
-static void output_redirect(int fd, char *variable) {
+static void output_redirect(int fd, char *filename) {
- char *filename = getenv(variable);
char *path = NULL;
if (filename == NULL) { return; }
@@ -21,8 +21,8 @@ static void output_redirect(int fd, char *variable) {
OKF("Redirect %d -> '%s'", fd, path);
- output_fd = open(path, O_RDWR | O_CREAT | O_TRUNC,
- S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
+ int output_fd = open(path, O_RDWR | O_CREAT | O_TRUNC,
+ S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
g_free(path);
@@ -34,12 +34,24 @@ static void output_redirect(int fd, char *variable) {
}
+ close(output_fd);
+
+}
+
+void output_config(void) {
+
+ output_stdout = getenv("AFL_FRIDA_OUTPUT_STDOUT");
+ output_stderr = getenv("AFL_FRIDA_OUTPUT_STDERR");
+
}
void output_init(void) {
- output_redirect(STDOUT_FILENO, "AFL_FRIDA_OUTPUT_STDOUT");
- output_redirect(STDERR_FILENO, "AFL_FRIDA_OUTPUT_STDERR");
+ OKF("Output - StdOut: %s", output_stdout);
+ OKF("Output - StdErr: %s", output_stderr);
+
+ output_redirect(STDOUT_FILENO, output_stdout);
+ output_redirect(STDERR_FILENO, output_stderr);
}
diff --git a/frida_mode/src/persistent/persistent.c b/frida_mode/src/persistent/persistent.c
index 243d501d..bcc59ea7 100644
--- a/frida_mode/src/persistent/persistent.c
+++ b/frida_mode/src/persistent/persistent.c
@@ -1,6 +1,6 @@
#include <dlfcn.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
#include "debug.h"
@@ -8,17 +8,18 @@
#include "persistent.h"
#include "util.h"
-int __afl_sharedmem_fuzzing = 0;
-afl_persistent_hook_fn hook = NULL;
+int __afl_sharedmem_fuzzing = 0;
+static char *hook_name = NULL;
+
+afl_persistent_hook_fn persistent_hook = NULL;
guint64 persistent_start = 0;
guint64 persistent_count = 0;
guint64 persistent_ret = 0;
gboolean persistent_debug = FALSE;
-void persistent_init(void) {
-
- char *hook_name = getenv("AFL_FRIDA_PERSISTENT_HOOK");
+void persistent_config(void) {
+ hook_name = getenv("AFL_FRIDA_PERSISTENT_HOOK");
persistent_start = util_read_address("AFL_FRIDA_PERSISTENT_ADDR");
persistent_count = util_read_num("AFL_FRIDA_PERSISTENT_CNT");
persistent_ret = util_read_address("AFL_FRIDA_PERSISTENT_RET");
@@ -33,6 +34,11 @@ void persistent_init(void) {
}
+ if (persistent_start != 0 && persistent_count == 0) persistent_count = 1000;
+
+ if (persistent_start != 0 && !persistent_is_supported())
+ FATAL("Persistent mode not supported on this architecture");
+
if (persistent_ret != 0 && persistent_start == 0) {
FATAL(
@@ -41,13 +47,28 @@ void persistent_init(void) {
}
- if (persistent_start != 0 && persistent_count == 0) persistent_count = 1000;
+ if (hook_name == NULL) { return; }
- if (persistent_count != 0 && persistent_count < 100)
- WARNF("Persistent count out of recommended range (<100)");
+ void *hook_obj = dlopen(hook_name, RTLD_NOW);
+ if (hook_obj == NULL)
+ FATAL("Failed to load AFL_FRIDA_PERSISTENT_HOOK (%s)", hook_name);
- if (persistent_start != 0 && !persistent_is_supported())
- FATAL("Persistent mode not supported on this architecture");
+ int (*afl_persistent_hook_init_ptr)(void) =
+ dlsym(hook_obj, "afl_persistent_hook_init");
+ if (afl_persistent_hook_init_ptr == NULL)
+ FATAL("Failed to find afl_persistent_hook_init in %s", hook_name);
+
+ if (afl_persistent_hook_init_ptr() == 0)
+ FATAL("afl_persistent_hook_init returned a failure");
+
+ persistent_hook =
+ (afl_persistent_hook_fn)dlsym(hook_obj, "afl_persistent_hook");
+ if (persistent_hook == NULL)
+ FATAL("Failed to find afl_persistent_hook in %s", hook_name);
+
+}
+
+void persistent_init(void) {
OKF("Instrumentation - persistent mode [%c] (0x%016" G_GINT64_MODIFIER "X)",
persistent_start == 0 ? ' ' : 'X', persistent_start);
@@ -58,27 +79,7 @@ void persistent_init(void) {
OKF("Instrumentation - persistent ret [%c] (0x%016" G_GINT64_MODIFIER "X)",
persistent_ret == 0 ? ' ' : 'X', persistent_ret);
- if (hook_name != NULL) {
-
- void *hook_obj = dlopen(hook_name, RTLD_NOW);
- if (hook_obj == NULL)
- FATAL("Failed to load AFL_FRIDA_PERSISTENT_HOOK (%s)", hook_name);
-
- int (*afl_persistent_hook_init_ptr)(void) =
- dlsym(hook_obj, "afl_persistent_hook_init");
- if (afl_persistent_hook_init_ptr == NULL)
- FATAL("Failed to find afl_persistent_hook_init in %s", hook_name);
-
- if (afl_persistent_hook_init_ptr() == 0)
- FATAL("afl_persistent_hook_init returned a failure");
-
- hook = (afl_persistent_hook_fn)dlsym(hook_obj, "afl_persistent_hook");
- if (hook == NULL)
- FATAL("Failed to find afl_persistent_hook in %s", hook_name);
-
- __afl_sharedmem_fuzzing = 1;
-
- }
+ if (persistent_hook != NULL) { __afl_sharedmem_fuzzing = 1; }
}
diff --git a/frida_mode/src/persistent/persistent_arm32.c b/frida_mode/src/persistent/persistent_arm32.c
index 6a3c06fa..f12f1af8 100644
--- a/frida_mode/src/persistent/persistent_arm32.c
+++ b/frida_mode/src/persistent/persistent_arm32.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/persistent/persistent_arm64.c b/frida_mode/src/persistent/persistent_arm64.c
index d7c6c76b..003f058a 100644
--- a/frida_mode/src/persistent/persistent_arm64.c
+++ b/frida_mode/src/persistent/persistent_arm64.c
@@ -1,5 +1,5 @@
#include <unistd.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
#include "debug.h"
@@ -9,99 +9,15 @@
#include "util.h"
#if defined(__aarch64__)
+typedef struct {
-struct arm64_regs {
+ GumCpuContext ctx;
+ uint64_t rflags;
- uint64_t x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10;
+} persistent_ctx_t;
- union {
-
- uint64_t x11;
- uint32_t fp_32;
-
- };
-
- union {
-
- uint64_t x12;
- uint32_t ip_32;
-
- };
-
- union {
-
- uint64_t x13;
- uint32_t sp_32;
-
- };
-
- union {
-
- uint64_t x14;
- uint32_t lr_32;
-
- };
-
- union {
-
- uint64_t x15;
- uint32_t pc_32;
-
- };
-
- union {
-
- uint64_t x16;
- uint64_t ip0;
-
- };
-
- union {
-
- uint64_t x17;
- uint64_t ip1;
-
- };
-
- uint64_t x18, x19, x20, x21, x22, x23, x24, x25, x26, x27, x28;
-
- union {
-
- uint64_t x29;
- uint64_t fp;
-
- };
-
- union {
-
- uint64_t x30;
- uint64_t lr;
-
- };
-
- union {
-
- uint64_t x31;
- uint64_t sp;
-
- };
-
- // the zero register is not saved here ofc
-
- uint64_t pc;
-
- uint32_t cpsr;
-
- uint8_t vfp_zregs[32][16 * 16];
- uint8_t vfp_pregs[17][32];
- uint32_t vfp_xregs[16];
-
-};
-
-typedef struct arm64_regs arch_api_regs;
-
-static arch_api_regs saved_regs = {0};
-static gpointer saved_lr = NULL;
+static persistent_ctx_t saved_regs = {0};
+static gpointer saved_lr = NULL;
gboolean persistent_is_supported(void) {
@@ -109,8 +25,8 @@ gboolean persistent_is_supported(void) {
}
-static void instrument_persitent_save_regs(GumArm64Writer * cw,
- struct arm64_regs *regs) {
+static void instrument_persitent_save_regs(GumArm64Writer * cw,
+ persistent_ctx_t *regs) {
GumAddress regs_address = GUM_ADDRESS(regs);
const guint32 mrs_x1_nzcv = 0xd53b4201;
@@ -129,83 +45,87 @@ static void instrument_persitent_save_regs(GumArm64Writer * cw,
/* Skip x0 & x1 we'll do that later */
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X3,
- ARM64_REG_X0, (16 * 1),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X4, ARM64_REG_X5,
- ARM64_REG_X0, (16 * 2),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X6, ARM64_REG_X7,
- ARM64_REG_X0, (16 * 3),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X8, ARM64_REG_X9,
- ARM64_REG_X0, (16 * 4),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X10, ARM64_REG_X11,
- ARM64_REG_X0, (16 * 5),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X12, ARM64_REG_X13,
- ARM64_REG_X0, (16 * 6),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X14, ARM64_REG_X15,
- ARM64_REG_X0, (16 * 7),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X16, ARM64_REG_X17,
- ARM64_REG_X0, (16 * 8),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X18, ARM64_REG_X19,
- ARM64_REG_X0, (16 * 9),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X20, ARM64_REG_X21,
- ARM64_REG_X0, (16 * 10),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X22, ARM64_REG_X23,
- ARM64_REG_X0, (16 * 11),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X24, ARM64_REG_X25,
- ARM64_REG_X0, (16 * 12),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X26, ARM64_REG_X27,
- ARM64_REG_X0, (16 * 13),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X28, ARM64_REG_X29,
- ARM64_REG_X0, (16 * 14),
- GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X2, ARM64_REG_X3, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[2]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X4, ARM64_REG_X5, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[4]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X6, ARM64_REG_X7, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[6]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X8, ARM64_REG_X9, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[8]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X10, ARM64_REG_X11, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[10]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X12, ARM64_REG_X13, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[12]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X14, ARM64_REG_X15, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[14]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X16, ARM64_REG_X17, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[16]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X18, ARM64_REG_X19, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[18]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X20, ARM64_REG_X21, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[20]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X22, ARM64_REG_X23, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[22]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X24, ARM64_REG_X25, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[24]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X26, ARM64_REG_X27, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[26]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X28, ARM64_REG_X29, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[28]), GUM_INDEX_SIGNED_OFFSET);
- /* LR & Adjusted SP */
- gum_arm64_writer_put_add_reg_reg_imm(cw, ARM64_REG_X2, ARM64_REG_SP,
- (GUM_RED_ZONE_SIZE + 32));
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X30, ARM64_REG_X2,
- ARM64_REG_X0, (16 * 15),
- GUM_INDEX_SIGNED_OFFSET);
+ /* LR (x30) */
+ gum_arm64_writer_put_str_reg_reg_offset(cw, ARM64_REG_X30, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[30]));
- /* PC & CPSR */
+ /* PC & Adjusted SP (31) */
gum_arm64_writer_put_ldr_reg_address(cw, ARM64_REG_X2,
GUM_ADDRESS(persistent_start));
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X1,
- ARM64_REG_X0, (16 * 16),
- GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_add_reg_reg_imm(cw, ARM64_REG_X3, ARM64_REG_SP,
+ (GUM_RED_ZONE_SIZE + 32));
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X2, ARM64_REG_X3, ARM64_REG_X0, offsetof(GumCpuContext, pc),
+ GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_Q0, ARM64_REG_Q1,
- ARM64_REG_X0, (16 * 17),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_Q2, ARM64_REG_Q3,
- ARM64_REG_X0, (16 * 18),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_Q4, ARM64_REG_Q5,
- ARM64_REG_X0, (16 * 19),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_Q6, ARM64_REG_Q7,
- ARM64_REG_X0, (16 * 20),
- GUM_INDEX_SIGNED_OFFSET);
+ /* CPSR */
+ gum_arm64_writer_put_str_reg_reg_offset(cw, ARM64_REG_X1, ARM64_REG_X0,
+ offsetof(persistent_ctx_t, rflags));
+
+ /* Q */
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q0, ARM64_REG_Q1, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[0]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q2, ARM64_REG_Q3, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[16]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q4, ARM64_REG_Q5, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[32]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q6, ARM64_REG_Q7, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[48]), GUM_INDEX_SIGNED_OFFSET);
/* x0 & x1 */
gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X3,
ARM64_REG_SP, 16,
GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_stp_reg_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X3,
- ARM64_REG_X0, (16 * 0),
- GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_stp_reg_reg_reg_offset(
+ cw, ARM64_REG_X2, ARM64_REG_X3, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[0]), GUM_INDEX_SIGNED_OFFSET);
/* Pop the saved values */
gum_arm64_writer_put_ldp_reg_reg_reg_offset(
@@ -217,8 +137,8 @@ static void instrument_persitent_save_regs(GumArm64Writer * cw,
}
-static void instrument_persitent_restore_regs(GumArm64Writer * cw,
- struct arm64_regs *regs) {
+static void instrument_persitent_restore_regs(GumArm64Writer * cw,
+ persistent_ctx_t *regs) {
GumAddress regs_address = GUM_ADDRESS(regs);
const guint32 msr_nzcv_x1 = 0xd51b4201;
@@ -228,82 +148,81 @@ static void instrument_persitent_restore_regs(GumArm64Writer * cw,
/* Skip x0 - x3 we'll do that last */
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X4, ARM64_REG_X5,
- ARM64_REG_X0, (16 * 2),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X6, ARM64_REG_X7,
- ARM64_REG_X0, (16 * 3),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X8, ARM64_REG_X9,
- ARM64_REG_X0, (16 * 4),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X10, ARM64_REG_X11,
- ARM64_REG_X0, (16 * 5),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X12, ARM64_REG_X13,
- ARM64_REG_X0, (16 * 6),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X14, ARM64_REG_X15,
- ARM64_REG_X0, (16 * 7),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X16, ARM64_REG_X17,
- ARM64_REG_X0, (16 * 8),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X18, ARM64_REG_X19,
- ARM64_REG_X0, (16 * 9),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X20, ARM64_REG_X21,
- ARM64_REG_X0, (16 * 10),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X22, ARM64_REG_X23,
- ARM64_REG_X0, (16 * 11),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X24, ARM64_REG_X25,
- ARM64_REG_X0, (16 * 12),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X26, ARM64_REG_X27,
- ARM64_REG_X0, (16 * 13),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X28, ARM64_REG_X29,
- ARM64_REG_X0, (16 * 14),
- GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X4, ARM64_REG_X5, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[4]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X6, ARM64_REG_X7, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[6]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X8, ARM64_REG_X9, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[8]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X10, ARM64_REG_X11, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[10]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X12, ARM64_REG_X13, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[12]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X14, ARM64_REG_X15, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[14]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X16, ARM64_REG_X17, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[16]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X18, ARM64_REG_X19, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[18]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X20, ARM64_REG_X21, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[20]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X22, ARM64_REG_X23, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[22]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X24, ARM64_REG_X25, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[24]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X26, ARM64_REG_X27, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[26]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X28, ARM64_REG_X29, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[28]), GUM_INDEX_SIGNED_OFFSET);
- /* LR & Adjusted SP (use x1 as clobber) */
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X30, ARM64_REG_X1,
- ARM64_REG_X0, (16 * 15),
- GUM_INDEX_SIGNED_OFFSET);
+ /* LR (x30) */
+ gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X30, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[30]));
+ /* Adjusted SP (31) (use x1 as clobber)*/
+ gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X1, ARM64_REG_X0,
+ offsetof(GumCpuContext, sp));
gum_arm64_writer_put_mov_reg_reg(cw, ARM64_REG_SP, ARM64_REG_X1);
- /* Don't restore RIP use x1-x3 as clobber */
-
- /* PC (x2) & CPSR (x1) */
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X1,
- ARM64_REG_X0, (16 * 16),
- GUM_INDEX_SIGNED_OFFSET);
+ /* CPSR */
+ gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X1, ARM64_REG_X0,
+ offsetof(persistent_ctx_t, rflags));
gum_arm64_writer_put_instruction(cw, msr_nzcv_x1);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_Q0, ARM64_REG_Q1,
- ARM64_REG_X0, (16 * 17),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_Q2, ARM64_REG_Q3,
- ARM64_REG_X0, (16 * 18),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_Q4, ARM64_REG_Q5,
- ARM64_REG_X0, (16 * 19),
- GUM_INDEX_SIGNED_OFFSET);
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_Q6, ARM64_REG_Q7,
- ARM64_REG_X0, (16 * 20),
- GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q0, ARM64_REG_Q1, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[0]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q2, ARM64_REG_Q3, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[16]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q4, ARM64_REG_Q5, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[32]), GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_Q6, ARM64_REG_Q7, ARM64_REG_X0,
+ offsetof(GumCpuContext, q[48]), GUM_INDEX_SIGNED_OFFSET);
/* x2 & x3 */
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X3,
- ARM64_REG_X0, (16 * 1),
- GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X2, ARM64_REG_X3, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[2]), GUM_INDEX_SIGNED_OFFSET);
/* x0 & x1 */
- gum_arm64_writer_put_ldp_reg_reg_reg_offset(cw, ARM64_REG_X0, ARM64_REG_X1,
- ARM64_REG_X0, (16 * 0),
- GUM_INDEX_SIGNED_OFFSET);
+ gum_arm64_writer_put_ldp_reg_reg_reg_offset(
+ cw, ARM64_REG_X0, ARM64_REG_X1, ARM64_REG_X0,
+ offsetof(GumCpuContext, x[0]), GUM_INDEX_SIGNED_OFFSET);
}
@@ -318,7 +237,7 @@ static void instrument_exit(GumArm64Writer *cw) {
static int instrument_afl_persistent_loop_func(void) {
int ret = __afl_persistent_loop(persistent_count);
- previous_pc = 0;
+ instrument_previous_pc = 0;
return ret;
}
@@ -334,29 +253,29 @@ static void instrument_afl_persistent_loop(GumArm64Writer *cw) {
}
-static void persistent_prologue_hook(GumArm64Writer * cw,
- struct arm64_regs *regs) {
+static void persistent_prologue_hook(GumArm64Writer * cw,
+ persistent_ctx_t *regs) {
- if (hook == NULL) return;
+ if (persistent_hook == NULL) return;
gum_arm64_writer_put_sub_reg_reg_imm(cw, ARM64_REG_SP, ARM64_REG_SP,
GUM_RED_ZONE_SIZE);
- gum_arm64_writer_put_ldr_reg_address(cw, ARM64_REG_X3,
+ gum_arm64_writer_put_ldr_reg_address(cw, ARM64_REG_X2,
GUM_ADDRESS(&__afl_fuzz_len));
- gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X3, ARM64_REG_X3, 0);
- gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X3, ARM64_REG_X3, 0);
+ gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X2, 0);
+ gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X2, 0);
- gum_arm64_writer_put_and_reg_reg_imm(cw, ARM64_REG_X3, ARM64_REG_X3,
+ gum_arm64_writer_put_and_reg_reg_imm(cw, ARM64_REG_X2, ARM64_REG_X2,
G_MAXULONG);
- gum_arm64_writer_put_ldr_reg_address(cw, ARM64_REG_X2,
+ gum_arm64_writer_put_ldr_reg_address(cw, ARM64_REG_X1,
GUM_ADDRESS(&__afl_fuzz_ptr));
- gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X2, ARM64_REG_X2, 0);
+ gum_arm64_writer_put_ldr_reg_reg_offset(cw, ARM64_REG_X1, ARM64_REG_X1, 0);
gum_arm64_writer_put_call_address_with_arguments(
- cw, GUM_ADDRESS(hook), 4, GUM_ARG_ADDRESS, GUM_ADDRESS(regs),
- GUM_ARG_ADDRESS, GUM_ADDRESS(0), GUM_ARG_REGISTER, ARM64_REG_X2,
- GUM_ARG_REGISTER, ARM64_REG_X3);
+ cw, GUM_ADDRESS(persistent_hook), 3, GUM_ARG_ADDRESS,
+ GUM_ADDRESS(&regs->ctx), GUM_ARG_REGISTER, ARM64_REG_X1, GUM_ARG_REGISTER,
+ ARM64_REG_X2);
gum_arm64_writer_put_add_reg_reg_imm(cw, ARM64_REG_SP, ARM64_REG_SP,
GUM_RED_ZONE_SIZE);
@@ -406,6 +325,8 @@ void persistent_prologue(GumStalkerOutput *output) {
gconstpointer loop = cw->code + 1;
+ OKF("Persistent loop reached");
+
instrument_persitent_save_regs(cw, &saved_regs);
/* loop: */
diff --git a/frida_mode/src/persistent/persistent_x64.c b/frida_mode/src/persistent/persistent_x64.c
index 653acefe..b2186db1 100644
--- a/frida_mode/src/persistent/persistent_x64.c
+++ b/frida_mode/src/persistent/persistent_x64.c
@@ -1,5 +1,5 @@
#include <unistd.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
#include "debug.h"
@@ -10,40 +10,15 @@
#if defined(__x86_64__)
-struct x86_64_regs {
+typedef struct {
- uint64_t rax, rbx, rcx, rdx, rdi, rsi, rbp, r8, r9, r10, r11, r12, r13, r14,
- r15;
+ GumCpuContext ctx;
+ uint64_t rflags;
- union {
+} persistent_ctx_t;
- uint64_t rip;
- uint64_t pc;
-
- };
-
- union {
-
- uint64_t rsp;
- uint64_t sp;
-
- };
-
- union {
-
- uint64_t rflags;
- uint64_t flags;
-
- };
-
- uint8_t zmm_regs[32][64];
-
-};
-
-typedef struct x86_64_regs arch_api_regs;
-
-static arch_api_regs saved_regs = {0};
-static gpointer saved_ret = NULL;
+static persistent_ctx_t saved_regs = {0};
+static gpointer saved_ret = NULL;
gboolean persistent_is_supported(void) {
@@ -51,8 +26,8 @@ gboolean persistent_is_supported(void) {
}
-static void instrument_persitent_save_regs(GumX86Writer * cw,
- struct x86_64_regs *regs) {
+static void instrument_persitent_save_regs(GumX86Writer * cw,
+ persistent_ctx_t *regs) {
GumAddress regs_address = GUM_ADDRESS(regs);
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_RSP, GUM_REG_RSP,
@@ -64,41 +39,41 @@ static void instrument_persitent_save_regs(GumX86Writer * cw,
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_RAX, regs_address);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 1),
- GUM_REG_RBX);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 2),
- GUM_REG_RCX);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 3),
- GUM_REG_RDX);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 4),
- GUM_REG_RDI);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 5),
- GUM_REG_RSI);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 6),
- GUM_REG_RBP);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 7),
- GUM_REG_R8);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 8),
- GUM_REG_R9);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 9),
- GUM_REG_R10);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 10),
- GUM_REG_R11);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 11),
- GUM_REG_R12);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 12),
- GUM_REG_R13);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 13),
- GUM_REG_R14);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 14),
- GUM_REG_R15);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rbx), GUM_REG_RBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rcx), GUM_REG_RCX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rdx), GUM_REG_RDX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rdi), GUM_REG_RDI);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rsi), GUM_REG_RSI);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rbp), GUM_REG_RBP);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r8), GUM_REG_R8);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r9), GUM_REG_R9);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r10), GUM_REG_R10);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r11), GUM_REG_R11);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r12), GUM_REG_R12);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r13), GUM_REG_R13);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r14), GUM_REG_R14);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, r15), GUM_REG_R15);
/* Store RIP */
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_RBX,
GUM_ADDRESS(persistent_start));
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 15),
- GUM_REG_RBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rip), GUM_REG_RBX);
/* Store adjusted RSP */
gum_x86_writer_put_mov_reg_reg(cw, GUM_REG_RBX, GUM_REG_RSP);
@@ -106,18 +81,18 @@ static void instrument_persitent_save_regs(GumX86Writer * cw,
/* RED_ZONE + Saved flags, RAX, alignment */
gum_x86_writer_put_add_reg_imm(cw, GUM_REG_RBX,
GUM_RED_ZONE_SIZE + (0x8 * 2));
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 16),
- GUM_REG_RBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rsp), GUM_REG_RBX);
/* Save the flags */
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RBX, GUM_REG_RSP, 0x8);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 17),
- GUM_REG_RBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(persistent_ctx_t, rflags), GUM_REG_RBX);
/* Save the RAX */
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RBX, GUM_REG_RSP, 0x0);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_RAX, (0x8 * 0),
- GUM_REG_RBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_RAX, offsetof(GumCpuContext, rax), GUM_REG_RBX);
/* Pop the saved values */
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_RSP, GUM_REG_RSP, 0x10);
@@ -127,56 +102,56 @@ static void instrument_persitent_save_regs(GumX86Writer * cw,
}
-static void instrument_persitent_restore_regs(GumX86Writer * cw,
- struct x86_64_regs *regs) {
+static void instrument_persitent_restore_regs(GumX86Writer * cw,
+ persistent_ctx_t *regs) {
GumAddress regs_address = GUM_ADDRESS(regs);
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_RAX, regs_address);
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RCX, GUM_REG_RAX,
- (0x8 * 2));
+ offsetof(GumCpuContext, rcx));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RDX, GUM_REG_RAX,
- (0x8 * 3));
+ offsetof(GumCpuContext, rdx));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RDI, GUM_REG_RAX,
- (0x8 * 4));
+ offsetof(GumCpuContext, rdi));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RSI, GUM_REG_RAX,
- (0x8 * 5));
+ offsetof(GumCpuContext, rsi));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RBP, GUM_REG_RAX,
- (0x8 * 6));
+ offsetof(GumCpuContext, rbp));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R8, GUM_REG_RAX,
- (0x8 * 7));
+ offsetof(GumCpuContext, r8));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R9, GUM_REG_RAX,
- (0x8 * 8));
+ offsetof(GumCpuContext, r9));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R10, GUM_REG_RAX,
- (0x8 * 9));
+ offsetof(GumCpuContext, r10));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R11, GUM_REG_RAX,
- (0x8 * 10));
+ offsetof(GumCpuContext, r11));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R12, GUM_REG_RAX,
- (0x8 * 11));
+ offsetof(GumCpuContext, r12));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R13, GUM_REG_RAX,
- (0x8 * 12));
+ offsetof(GumCpuContext, r13));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R14, GUM_REG_RAX,
- (0x8 * 13));
+ offsetof(GumCpuContext, r14));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_R15, GUM_REG_RAX,
- (0x8 * 14));
+ offsetof(GumCpuContext, r15));
/* Don't restore RIP */
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RSP, GUM_REG_RAX,
- (0x8 * 16));
+ offsetof(GumCpuContext, rsp));
/* Restore RBX, RAX & Flags */
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_RSP, GUM_REG_RSP,
-(GUM_RED_ZONE_SIZE));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RBX, GUM_REG_RAX,
- (0x8 * 1));
+ offsetof(GumCpuContext, rbx));
gum_x86_writer_put_push_reg(cw, GUM_REG_RBX);
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RBX, GUM_REG_RAX,
- (0x8 * 0));
+ offsetof(GumCpuContext, rax));
gum_x86_writer_put_push_reg(cw, GUM_REG_RBX);
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RBX, GUM_REG_RAX,
- (0x8 * 17));
+ offsetof(persistent_ctx_t, rflags));
gum_x86_writer_put_push_reg(cw, GUM_REG_RBX);
gum_x86_writer_put_popfx(cw);
@@ -199,7 +174,7 @@ static void instrument_exit(GumX86Writer *cw) {
static int instrument_afl_persistent_loop_func(void) {
int ret = __afl_persistent_loop(persistent_count);
- previous_pc = 0;
+ instrument_previous_pc = 0;
return ret;
}
@@ -217,28 +192,27 @@ static void instrument_afl_persistent_loop(GumX86Writer *cw) {
}
-static void persistent_prologue_hook(GumX86Writer * cw,
- struct x86_64_regs *regs) {
+static void persistent_prologue_hook(GumX86Writer *cw, persistent_ctx_t *regs) {
- if (hook == NULL) return;
+ if (persistent_hook == NULL) return;
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_RSP, GUM_REG_RSP,
-(GUM_RED_ZONE_SIZE));
- gum_x86_writer_put_mov_reg_address(cw, GUM_REG_RCX,
+ gum_x86_writer_put_mov_reg_address(cw, GUM_REG_RDX,
GUM_ADDRESS(&__afl_fuzz_len));
- gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RCX, GUM_REG_RCX, 0);
- gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RCX, GUM_REG_RCX, 0);
+ gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RDX, GUM_REG_RDX, 0);
+ gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RDX, GUM_REG_RDX, 0);
gum_x86_writer_put_mov_reg_u64(cw, GUM_REG_RDI, 0xffffffff);
- gum_x86_writer_put_and_reg_reg(cw, GUM_REG_RCX, GUM_REG_RDI);
+ gum_x86_writer_put_and_reg_reg(cw, GUM_REG_RDX, GUM_REG_RDI);
- gum_x86_writer_put_mov_reg_address(cw, GUM_REG_RDX,
+ gum_x86_writer_put_mov_reg_address(cw, GUM_REG_RSI,
GUM_ADDRESS(&__afl_fuzz_ptr));
- gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RDX, GUM_REG_RDX, 0);
+ gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_RSI, GUM_REG_RSI, 0);
gum_x86_writer_put_call_address_with_arguments(
- cw, GUM_CALL_CAPI, GUM_ADDRESS(hook), 4, GUM_ARG_ADDRESS,
- GUM_ADDRESS(regs), GUM_ARG_ADDRESS, GUM_ADDRESS(0), GUM_ARG_REGISTER,
- GUM_REG_RDX, GUM_ARG_REGISTER, GUM_REG_RCX);
+ cw, GUM_CALL_CAPI, GUM_ADDRESS(persistent_hook), 3, GUM_ARG_ADDRESS,
+ GUM_ADDRESS(&regs->ctx), GUM_ARG_REGISTER, GUM_REG_RSI, GUM_ARG_REGISTER,
+ GUM_REG_RDX);
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_RSP, GUM_REG_RSP,
(GUM_RED_ZONE_SIZE));
@@ -296,6 +270,8 @@ void persistent_prologue(GumStalkerOutput *output) {
gconstpointer loop = cw->code + 1;
+ OKF("Persistent loop reached");
+
/* Pop the return value */
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_RSP, GUM_REG_RSP, 8);
diff --git a/frida_mode/src/persistent/persistent_x86.c b/frida_mode/src/persistent/persistent_x86.c
index 7add6e99..f50bccb0 100644
--- a/frida_mode/src/persistent/persistent_x86.c
+++ b/frida_mode/src/persistent/persistent_x86.c
@@ -1,45 +1,23 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
+#include "debug.h"
#include "instrument.h"
#include "persistent.h"
#if defined(__i386__)
-struct x86_regs {
+typedef struct {
- uint32_t eax, ebx, ecx, edx, edi, esi, ebp;
+ GumCpuContext ctx;
+ uint32_t eflags;
- union {
+} persistent_ctx_t;
- uint32_t eip;
- uint32_t pc;
+static persistent_ctx_t saved_regs = {0};
- };
-
- union {
-
- uint32_t esp;
- uint32_t sp;
-
- };
-
- union {
-
- uint32_t eflags;
- uint32_t flags;
-
- };
-
- uint8_t xmm_regs[8][16];
-
-};
-
-typedef struct x86_regs arch_api_regs;
-
-static arch_api_regs saved_regs = {0};
-static gpointer saved_ret = NULL;
+static gpointer saved_ret = NULL;
gboolean persistent_is_supported(void) {
@@ -47,8 +25,8 @@ gboolean persistent_is_supported(void) {
}
-static void instrument_persitent_save_regs(GumX86Writer * cw,
- struct x86_regs *regs) {
+static void instrument_persitent_save_regs(GumX86Writer * cw,
+ persistent_ctx_t *regs) {
GumAddress regs_address = GUM_ADDRESS(regs);
@@ -58,80 +36,80 @@ static void instrument_persitent_save_regs(GumX86Writer * cw,
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_EAX, regs_address);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 1),
- GUM_REG_EBX);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 2),
- GUM_REG_ECX);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 3),
- GUM_REG_EDX);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 4),
- GUM_REG_EDI);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 5),
- GUM_REG_ESI);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 6),
- GUM_REG_EBP);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, ebx), GUM_REG_EBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, ecx), GUM_REG_ECX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, edx), GUM_REG_EDX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, edi), GUM_REG_EDI);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, esi), GUM_REG_ESI);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, ebp), GUM_REG_EBP);
/* Store RIP */
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_EBX,
GUM_ADDRESS(persistent_start));
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 7),
- GUM_REG_EBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, eip), GUM_REG_EBX);
/* Store adjusted RSP */
gum_x86_writer_put_mov_reg_reg(cw, GUM_REG_EBX, GUM_REG_ESP);
/* RED_ZONE + Saved flags, RAX */
gum_x86_writer_put_add_reg_imm(cw, GUM_REG_EBX, (0x4 * 2));
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 8),
- GUM_REG_EBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, esp), GUM_REG_EBX);
/* Save the flags */
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EBX, GUM_REG_ESP, 0x4);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 9),
- GUM_REG_EBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(persistent_ctx_t, eflags), GUM_REG_EBX);
/* Save the RAX */
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EBX, GUM_REG_ESP, 0x0);
- gum_x86_writer_put_mov_reg_offset_ptr_reg(cw, GUM_REG_EAX, (0x4 * 0),
- GUM_REG_EBX);
+ gum_x86_writer_put_mov_reg_offset_ptr_reg(
+ cw, GUM_REG_EAX, offsetof(GumCpuContext, eax), GUM_REG_EBX);
/* Pop the saved values */
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_ESP, GUM_REG_ESP, 0x8);
}
-static void instrument_persitent_restore_regs(GumX86Writer * cw,
- struct x86_regs *regs) {
+static void instrument_persitent_restore_regs(GumX86Writer * cw,
+ persistent_ctx_t *regs) {
GumAddress regs_address = GUM_ADDRESS(regs);
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_EAX, regs_address);
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_ECX, GUM_REG_EAX,
- (0x4 * 2));
+ offsetof(GumCpuContext, ecx));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EDX, GUM_REG_EAX,
- (0x4 * 3));
+ offsetof(GumCpuContext, edx));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EDI, GUM_REG_EAX,
- (0x4 * 4));
+ offsetof(GumCpuContext, edi));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_ESI, GUM_REG_EAX,
- (0x4 * 5));
+ offsetof(GumCpuContext, esi));
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EBP, GUM_REG_EAX,
- (0x4 * 6));
+ offsetof(GumCpuContext, ebp));
/* Don't restore RIP */
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_ESP, GUM_REG_EAX,
- (0x4 * 8));
+ offsetof(GumCpuContext, esp));
/* Restore RBX, RAX & Flags */
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EBX, GUM_REG_EAX,
- (0x4 * 1));
+ offsetof(GumCpuContext, ebx));
gum_x86_writer_put_push_reg(cw, GUM_REG_EBX);
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EBX, GUM_REG_EAX,
- (0x4 * 0));
+ offsetof(GumCpuContext, eax));
gum_x86_writer_put_push_reg(cw, GUM_REG_EBX);
gum_x86_writer_put_mov_reg_reg_offset_ptr(cw, GUM_REG_EBX, GUM_REG_EAX,
- (0x4 * 9));
+ offsetof(persistent_ctx_t, eflags));
gum_x86_writer_put_push_reg(cw, GUM_REG_EBX);
gum_x86_writer_put_popfx(cw);
@@ -152,7 +130,7 @@ static void instrument_exit(GumX86Writer *cw) {
static int instrument_afl_persistent_loop_func(void) {
int ret = __afl_persistent_loop(persistent_count);
- previous_pc = 0;
+ instrument_previous_pc = 0;
return ret;
}
@@ -165,9 +143,9 @@ static void instrument_afl_persistent_loop(GumX86Writer *cw) {
}
-static void persistent_prologue_hook(GumX86Writer *cw, struct x86_regs *regs) {
+static void persistent_prologue_hook(GumX86Writer *cw, persistent_ctx_t *regs) {
- if (hook == NULL) return;
+ if (persistent_hook == NULL) return;
gum_x86_writer_put_mov_reg_address(cw, GUM_REG_ECX,
GUM_ADDRESS(&__afl_fuzz_len));
@@ -180,9 +158,8 @@ static void persistent_prologue_hook(GumX86Writer *cw, struct x86_regs *regs) {
/* Base address is 64-bits (hence two zero arguments) */
gum_x86_writer_put_call_address_with_arguments(
- cw, GUM_CALL_CAPI, GUM_ADDRESS(hook), 5, GUM_ARG_ADDRESS,
- GUM_ADDRESS(regs), GUM_ARG_ADDRESS, GUM_ADDRESS(0), GUM_ARG_ADDRESS,
- GUM_ADDRESS(0), GUM_ARG_REGISTER, GUM_REG_EDX, GUM_ARG_REGISTER,
+ cw, GUM_CALL_CAPI, GUM_ADDRESS(persistent_hook), 3, GUM_ARG_ADDRESS,
+ GUM_ADDRESS(&regs->ctx), GUM_ARG_REGISTER, GUM_REG_EDX, GUM_ARG_REGISTER,
GUM_REG_ECX);
}
@@ -233,6 +210,8 @@ void persistent_prologue(GumStalkerOutput *output) {
gconstpointer loop = cw->code + 1;
+ OKF("Persistent loop reached");
+
/* Pop the return value */
gum_x86_writer_put_lea_reg_reg_offset(cw, GUM_REG_ESP, GUM_REG_ESP, 4);
diff --git a/frida_mode/src/prefetch.c b/frida_mode/src/prefetch.c
index 65c09fba..50d10c9e 100644
--- a/frida_mode/src/prefetch.c
+++ b/frida_mode/src/prefetch.c
@@ -2,10 +2,11 @@
#include <sys/shm.h>
#include <sys/mman.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
+#include "intercept.h"
#include "prefetch.h"
#include "stalker.h"
@@ -20,9 +21,10 @@ typedef struct {
} prefetch_data_t;
-static prefetch_data_t *prefetch_data = NULL;
+gboolean prefetch_enable = TRUE;
-static int prefetch_shm_id = -1;
+static prefetch_data_t *prefetch_data = NULL;
+static int prefetch_shm_id = -1;
/*
* We do this from the transformer since we need one anyway for coverage, this
@@ -72,14 +74,33 @@ void prefetch_read(void) {
}
+void prefetch_config(void) {
+
+ prefetch_enable = (getenv("AFL_FRIDA_INST_NO_PREFETCH") == NULL);
+
+}
+
+static int prefetch_on_fork(void) {
+
+ prefetch_read();
+ return fork();
+
+}
+
+static void prefetch_hook_fork(void) {
+
+ void *fork_addr =
+ GSIZE_TO_POINTER(gum_module_find_export_by_name(NULL, "fork"));
+ intercept_hook(fork_addr, prefetch_on_fork, NULL);
+
+}
+
void prefetch_init(void) {
g_assert_cmpint(sizeof(prefetch_data_t), ==, PREFETCH_SIZE);
- gboolean prefetch = (getenv("AFL_FRIDA_INST_NO_PREFETCH") == NULL);
+ OKF("Instrumentation - prefetch [%c]", prefetch_enable ? 'X' : ' ');
- OKF("Instrumentation - prefetch [%c]", prefetch ? 'X' : ' ');
-
- if (!prefetch) { return; }
+ if (!prefetch_enable) { return; }
/*
* Make our shared memory, we can attach before we fork, just like AFL does
* with the coverage bitmap region and fork will take care of ensuring both
@@ -108,5 +129,7 @@ void prefetch_init(void) {
/* Clear it, not sure it's necessary, just seems like good practice */
memset(prefetch_data, '\0', sizeof(prefetch_data_t));
+ prefetch_hook_fork();
+
}
diff --git a/frida_mode/src/ranges.c b/frida_mode/src/ranges.c
index ef25b371..534f202b 100644
--- a/frida_mode/src/ranges.c
+++ b/frida_mode/src/ranges.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
@@ -17,11 +17,14 @@ typedef struct {
} convert_name_ctx_t;
-GArray *module_ranges = NULL;
-GArray *libs_ranges = NULL;
-GArray *include_ranges = NULL;
-GArray *exclude_ranges = NULL;
-GArray *ranges = NULL;
+gboolean ranges_debug_maps = FALSE;
+gboolean ranges_inst_libs = FALSE;
+
+static GArray *module_ranges = NULL;
+static GArray *libs_ranges = NULL;
+static GArray *include_ranges = NULL;
+static GArray *exclude_ranges = NULL;
+static GArray *ranges = NULL;
static void convert_address_token(gchar *token, GumMemoryRange *range) {
@@ -225,6 +228,43 @@ static GArray *collect_module_ranges(void) {
}
+static void check_for_overlaps(GArray *array) {
+
+ for (guint i = 1; i < array->len; i++) {
+
+ GumMemoryRange *prev = &g_array_index(array, GumMemoryRange, i - 1);
+ GumMemoryRange *curr = &g_array_index(array, GumMemoryRange, i);
+ GumAddress prev_limit = prev->base_address + prev->size;
+ GumAddress curr_limit = curr->base_address + curr->size;
+ if (prev_limit > curr->base_address) {
+
+ FATAL("OVerlapping ranges 0x%016" G_GINT64_MODIFIER
+ "x-0x%016" G_GINT64_MODIFIER "x 0x%016" G_GINT64_MODIFIER
+ "x-0x%016" G_GINT64_MODIFIER "x",
+ prev->base_address, prev_limit, curr->base_address, curr_limit);
+
+ }
+
+ }
+
+}
+
+void ranges_add_include(GumMemoryRange *range) {
+
+ g_array_append_val(include_ranges, *range);
+ g_array_sort(include_ranges, range_sort);
+ check_for_overlaps(include_ranges);
+
+}
+
+void ranges_add_exclude(GumMemoryRange *range) {
+
+ g_array_append_val(exclude_ranges, *range);
+ g_array_sort(exclude_ranges, range_sort);
+ check_for_overlaps(exclude_ranges);
+
+}
+
static GArray *collect_ranges(char *env_key) {
char * env_val;
@@ -253,23 +293,7 @@ static GArray *collect_ranges(char *env_key) {
g_array_sort(result, range_sort);
- /* Check for overlaps */
- for (i = 1; i < token_count; i++) {
-
- GumMemoryRange *prev = &g_array_index(result, GumMemoryRange, i - 1);
- GumMemoryRange *curr = &g_array_index(result, GumMemoryRange, i);
- GumAddress prev_limit = prev->base_address + prev->size;
- GumAddress curr_limit = curr->base_address + curr->size;
- if (prev_limit > curr->base_address) {
-
- FATAL("OVerlapping ranges 0x%016" G_GINT64_MODIFIER
- "x-0x%016" G_GINT64_MODIFIER "x 0x%016" G_GINT64_MODIFIER
- "x-0x%016" G_GINT64_MODIFIER "x",
- prev->base_address, prev_limit, curr->base_address, curr_limit);
-
- }
-
- }
+ check_for_overlaps(result);
print_ranges(env_key, result);
@@ -285,15 +309,15 @@ static GArray *collect_libs_ranges(void) {
GumMemoryRange range;
result = g_array_new(false, false, sizeof(GumMemoryRange));
- if (getenv("AFL_INST_LIBS") == NULL) {
+ if (ranges_inst_libs) {
- range.base_address = lib_get_text_base();
- range.size = lib_get_text_limit() - lib_get_text_base();
+ range.base_address = 0;
+ range.size = G_MAXULONG;
} else {
- range.base_address = 0;
- range.size = G_MAXULONG;
+ range.base_address = lib_get_text_base();
+ range.size = lib_get_text_limit() - lib_get_text_base();
}
@@ -480,30 +504,13 @@ static GArray *merge_ranges(GArray *a) {
}
-static gboolean exclude_ranges_callback(const GumRangeDetails *details,
- gpointer user_data) {
+void ranges_config(void) {
- UNUSED_PARAMETER(user_data);
- gchar * name;
- gboolean found;
- GumStalker *stalker;
- if (details->file == NULL) { return TRUE; }
- name = g_path_get_basename(details->file->path);
-
- found = (g_strcmp0(name, "afl-frida-trace.so") == 0);
- g_free(name);
- if (!found) { return TRUE; }
-
- stalker = stalker_get();
- gum_stalker_exclude(stalker, details->range);
-
- return FALSE;
+ if (getenv("AFL_FRIDA_DEBUG_MAPS") != NULL) { ranges_debug_maps = TRUE; }
+ if (getenv("AFL_INST_LIBS") != NULL) { ranges_inst_libs = TRUE; }
-}
-
-static void ranges_exclude_self(void) {
-
- gum_process_enumerate_ranges(GUM_PAGE_EXECUTE, exclude_ranges_callback, NULL);
+ include_ranges = collect_ranges("AFL_FRIDA_INST_RANGES");
+ exclude_ranges = collect_ranges("AFL_FRIDA_EXCLUDE_RANGES");
}
@@ -515,16 +522,20 @@ void ranges_init(void) {
GArray * step3;
GArray * step4;
- if (getenv("AFL_FRIDA_DEBUG_MAPS") != NULL) {
+ if (ranges_debug_maps) {
gum_process_enumerate_ranges(GUM_PAGE_NO_ACCESS, print_ranges_callback,
NULL);
}
+ OKF("Ranges - Instrument libraries [%c]", ranges_inst_libs ? 'X' : ' ');
+
+ print_ranges("AFL_FRIDA_INST_RANGES", include_ranges);
+ print_ranges("AFL_FRIDA_EXCLUDE_RANGES", exclude_ranges);
+
module_ranges = collect_module_ranges();
libs_ranges = collect_libs_ranges();
- include_ranges = collect_ranges("AFL_FRIDA_INST_RANGES");
/* If include ranges is empty, then assume everything is included */
if (include_ranges->len == 0) {
@@ -535,8 +546,6 @@ void ranges_init(void) {
}
- exclude_ranges = collect_ranges("AFL_FRIDA_EXCLUDE_RANGES");
-
/* Intersect with .text section of main executable unless AFL_INST_LIBS */
step1 = intersect_ranges(module_ranges, libs_ranges);
print_ranges("step1", step1);
@@ -565,9 +574,6 @@ void ranges_init(void) {
g_array_free(step2, TRUE);
g_array_free(step1, TRUE);
- /* *NEVER* stalk the stalker, only bad things will ever come of this! */
- ranges_exclude_self();
-
ranges_exclude();
}
diff --git a/frida_mode/src/stalker.c b/frida_mode/src/stalker.c
index 63f3c529..98483cde 100644
--- a/frida_mode/src/stalker.c
+++ b/frida_mode/src/stalker.c
@@ -2,18 +2,47 @@
#include "instrument.h"
#include "stalker.h"
+#include "util.h"
static GumStalker *stalker = NULL;
-void stalker_init(void) {
+void stalker_config(void) {
if (!gum_stalker_is_supported()) { FATAL("Failed to initialize embedded"); }
+}
+
+static gboolean stalker_exclude_self(const GumRangeDetails *details,
+ gpointer user_data) {
+
+ UNUSED_PARAMETER(user_data);
+ gchar * name;
+ gboolean found;
+ GumStalker *stalker;
+ if (details->file == NULL) { return TRUE; }
+ name = g_path_get_basename(details->file->path);
+
+ found = (g_strcmp0(name, "afl-frida-trace.so") == 0);
+ g_free(name);
+ if (!found) { return TRUE; }
+
+ stalker = stalker_get();
+ gum_stalker_exclude(stalker, details->range);
+
+ return FALSE;
+
+}
+
+void stalker_init(void) {
+
stalker = gum_stalker_new();
if (stalker == NULL) { FATAL("Failed to initialize stalker"); }
gum_stalker_set_trust_threshold(stalker, 0);
+ /* *NEVER* stalk the stalker, only bad things will ever come of this! */
+ gum_process_enumerate_ranges(GUM_PAGE_EXECUTE, stalker_exclude_self, NULL);
+
}
GumStalker *stalker_get(void) {
diff --git a/frida_mode/src/stats/stats.c b/frida_mode/src/stats/stats.c
index 0d7b9fb0..0dd8be70 100644
--- a/frida_mode/src/stats/stats.c
+++ b/frida_mode/src/stats/stats.c
@@ -5,7 +5,7 @@
#include <sys/shm.h>
#include <sys/mman.h>
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "config.h"
#include "debug.h"
@@ -17,15 +17,16 @@
stats_data_header_t *stats_data = NULL;
-static int stats_parent_pid = -1;
-static int stats_fd = -1;
-static gboolean stats_transitions = FALSE;
-static guint64 stats_interval = 0;
+static int stats_parent_pid = -1;
+static int stats_fd = -1;
-void stats_init(void) {
+char * stats_filename = NULL;
+guint64 stats_interval = 0;
+gboolean stats_transitions = FALSE;
- stats_parent_pid = getpid();
- char *filename = getenv("AFL_FRIDA_STATS_FILE");
+void stats_config(void) {
+
+ stats_filename = getenv("AFL_FRIDA_STATS_FILE");
stats_interval = util_read_num("AFL_FRIDA_STATS_INTERVAL");
if (getenv("AFL_FRIDA_STATS_TRANSITIONS") != NULL) {
@@ -33,10 +34,16 @@ void stats_init(void) {
}
- OKF("Stats - file [%s]", filename);
+}
+
+void stats_init(void) {
+
+ stats_parent_pid = getpid();
+
+ OKF("Stats - file [%s]", stats_filename);
OKF("Stats - interval [%" G_GINT64_MODIFIER "u]", stats_interval);
- if (stats_interval != 0 && filename == NULL) {
+ if (stats_interval != 0 && stats_filename == NULL) {
FATAL(
"AFL_FRIDA_STATS_FILE must be specified if "
@@ -46,7 +53,7 @@ void stats_init(void) {
if (stats_interval == 0) { stats_interval = 10; }
- if (filename == NULL) { return; }
+ if (stats_filename == NULL) { return; }
if (!stats_is_supported_arch()) {
@@ -56,11 +63,11 @@ void stats_init(void) {
char *path = NULL;
- if (filename == NULL) { return; }
+ if (stats_filename == NULL) { return; }
if (stats_transitions) { gum_stalker_set_counters_enabled(TRUE); }
- path = g_canonicalize_filename(filename, g_get_current_dir());
+ path = g_canonicalize_filename(stats_filename, g_get_current_dir());
OKF("Stats - path [%s]", path);
diff --git a/frida_mode/src/stats/stats_arm32.c b/frida_mode/src/stats/stats_arm32.c
index 7eea7f91..71953af3 100644
--- a/frida_mode/src/stats/stats_arm32.c
+++ b/frida_mode/src/stats/stats_arm32.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/stats/stats_arm64.c b/frida_mode/src/stats/stats_arm64.c
index 592af87a..d9d374a4 100644
--- a/frida_mode/src/stats/stats_arm64.c
+++ b/frida_mode/src/stats/stats_arm64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/stats/stats_x64.c b/frida_mode/src/stats/stats_x64.c
index c3e8742a..7c3a90d7 100644
--- a/frida_mode/src/stats/stats_x64.c
+++ b/frida_mode/src/stats/stats_x64.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/src/stats/stats_x86.c b/frida_mode/src/stats/stats_x86.c
index 1906e809..d9c4f652 100644
--- a/frida_mode/src/stats/stats_x86.c
+++ b/frida_mode/src/stats/stats_x86.c
@@ -1,4 +1,4 @@
-#include "frida-gum.h"
+#include "frida-gumjs.h"
#include "debug.h"
diff --git a/frida_mode/test/deferred/GNUmakefile b/frida_mode/test/deferred/GNUmakefile
index c268ef66..ae580e3f 100644
--- a/frida_mode/test/deferred/GNUmakefile
+++ b/frida_mode/test/deferred/GNUmakefile
@@ -37,7 +37,7 @@ ifeq "$(ARCH)" "x86"
AFL_ENTRYPOINT=$(shell $(GET_SYMBOL_ADDR) -f $(TESTINSTBIN) -s run -b 0x56555000)
endif
-.PHONY: all clean qemu frida
+.PHONY: all clean frida
all: $(TESTINSTBIN)
make -C $(ROOT)frida_mode/
diff --git a/frida_mode/test/jpeg/GNUmakefile b/frida_mode/test/jpeg/GNUmakefile
new file mode 100644
index 00000000..e3a8f321
--- /dev/null
+++ b/frida_mode/test/jpeg/GNUmakefile
@@ -0,0 +1,164 @@
+PWD:=$(shell pwd)/
+ROOT:=$(shell realpath $(PWD)../../..)/
+BUILD_DIR:=$(PWD)build/
+
+AFLPP_DRIVER_HOOK_OBJ=$(ROOT)frida_mode/build/hook.so
+
+LIBJPEG_BUILD_DIR:=$(BUILD_DIR)libjpeg/
+HARNESS_BUILD_DIR:=$(BUILD_DIR)harness/
+JPEGTEST_BUILD_DIR:=$(BUILD_DIR)jpegtest/
+
+LIBJPEG_URL:=https://github.com/libjpeg-turbo/libjpeg-turbo.git
+LIBJPEG_DIR:=$(LIBJPEG_BUILD_DIR)libjpeg/
+LIBJPEG_CONFIGURE:=$(LIBJPEG_DIR)configure.ac
+LIBJPEG_MAKEFILE:=$(LIBJPEG_DIR)Makefile
+LIBJPEG_LIB:=$(LIBJPEG_DIR).libs/libturbojpeg.a
+
+HARNESS_FILE:=$(HARNESS_BUILD_DIR)StandaloneFuzzTargetMain.c
+HARNESS_OBJ:=$(HARNESS_BUILD_DIR)StandaloneFuzzTargetMain.o
+HARNESS_URL:="https://raw.githubusercontent.com/AFLplusplus/AFLplusplus/stable/utils/aflpp_driver/aflpp_qemu_driver.c"
+
+JPEGTEST_FILE:=$(JPEGTEST_BUILD_DIR)target.cc
+JPEGTEST_OBJ:=$(JPEGTEST_BUILD_DIR)target.o
+JPEGTEST_URL:="https://raw.githubusercontent.com/google/fuzzbench/master/benchmarks/libjpeg-turbo-07-2017/libjpeg_turbo_fuzzer.cc"
+
+LDFLAGS += -lpthread
+
+TEST_BIN:=$(BUILD_DIR)test
+ifeq "$(shell uname)" "Darwin"
+TEST_BIN_LDFLAGS:=-undefined dynamic_lookup
+endif
+
+TEST_DATA_DIR:=$(BUILD_DIR)in/
+TEST_DATA_FILE:=$(TEST_DATA_DIR)default_seed
+
+FRIDA_OUT:=$(BUILD_DIR)frida-out
+
+ifndef ARCH
+
+ARCH=$(shell uname -m)
+ifeq "$(ARCH)" "aarch64"
+ ARCH:=arm64
+endif
+
+ifeq "$(ARCH)" "i686"
+ ARCH:=x86
+endif
+endif
+
+ifeq "$(ARCH)" "aarch64"
+ AFL_FRIDA_PERSISTENT_ADDR=$(shell $(PWD)get_symbol_addr.py -f $(TEST_BIN) -s LLVMFuzzerTestOneInput -b 0x0000aaaaaaaaa000)
+endif
+
+ifeq "$(ARCH)" "x86_64"
+ AFL_FRIDA_PERSISTENT_ADDR=$(shell $(PWD)get_symbol_addr.py -f $(TEST_BIN) -s LLVMFuzzerTestOneInput -b 0x0000555555554000)
+endif
+
+ifeq "$(ARCH)" "x86"
+ AFL_FRIDA_PERSISTENT_ADDR=$(shell $(PWD)get_symbol_addr.py -f $(TEST_BIN) -s LLVMFuzzerTestOneInput -b 0x56555000)
+endif
+
+.PHONY: all clean frida hook
+
+all: $(TEST_BIN)
+ make -C $(ROOT)frida_mode/
+
+32:
+ CXXFLAGS="-m32" LDFLAGS="-m32" ARCH="x86" make all
+
+$(BUILD_DIR):
+ mkdir -p $@
+
+######### HARNESS ########
+$(HARNESS_BUILD_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(HARNESS_FILE): | $(HARNESS_BUILD_DIR)
+ wget -O $@ $(HARNESS_URL)
+
+$(HARNESS_OBJ): $(HARNESS_FILE)
+ $(CC) $(CXXFLAGS) $(LDFLAGS) -o $@ -c $<
+
+######### JPEGTEST ########
+
+$(JPEGTEST_BUILD_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(JPEGTEST_FILE): | $(JPEGTEST_BUILD_DIR)
+ wget -O $@ $(JPEGTEST_URL)
+
+$(JPEGTEST_OBJ): $(JPEGTEST_FILE) | $(LIBJPEG_MAKEFILE)
+ $(CXX) $(CXXFLAGS) $(LDFLAGS) -std=c++11 -I $(LIBJPEG_DIR) -o $@ -c $<
+
+######### LIBJPEG ########
+
+$(LIBJPEG_BUILD_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(LIBJPEG_CONFIGURE): $(LIBJPEG_BUILD_DIR)
+ git clone $(LIBJPEG_URL) $(LIBJPEG_DIR)
+ cd $(LIBJPEG_DIR) && git checkout b0971e47d76fdb81270e93bbf11ff5558073350d
+
+$(LIBJPEG_MAKEFILE): $(LIBJPEG_CONFIGURE)
+ cd $(LIBJPEG_DIR) && autoreconf -fiv
+ cd $(LIBJPEG_DIR) && ./configure
+
+$(LIBJPEG_LIB): $(LIBJPEG_MAKEFILE)
+ make -C $(LIBJPEG_DIR) -j $(shell nproc)
+
+######### TEST ########
+
+$(TEST_BIN): $(HARNESS_OBJ) $(JPEGTEST_OBJ) $(LIBJPEG_LIB)
+ $(CXX) \
+ $(CFLAGS) \
+ -o $@ \
+ $(HARNESS_OBJ) $(JPEGTEST_OBJ) $(LIBJPEG_LIB) \
+ -lz \
+ $(LDFLAGS) \
+ $(TEST_BIN_LDFLAGS) \
+
+########## DUMMY #######
+
+$(TEST_DATA_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(TEST_DATA_FILE): | $(TEST_DATA_DIR)
+ echo "hi" > $(TEST_DATA_FILE)
+
+###### TEST DATA #######
+
+clean:
+ rm -rf $(BUILD_DIR)
+
+frida: $(TEST_BIN) $(AFLPP_DRIVER_HOOK_OBJ) $(TEST_DATA_FILE)
+ AFL_DEBUG_CHILD=1 \
+ AFL_DISABLE_TRIM=1 \
+ AFL_FRIDA_PERSISTENT_CNT=1000000 \
+ AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES=1 \
+ AFL_NO_AFFINITY=1 \
+ X__AFL_NO_UI=1 \
+ AFL_PATH=/out \
+ AFL_SHUFFLE_QUEUE=1 \
+ AFL_SKIP_CPUFREQ=1 \
+ AFL_SKIP_CRASHES=1 \
+ AFL_TESTCACHE_SIZE=2 \
+ AFL_FRIDA_PERSISTENT_HOOK=$(AFLPP_DRIVER_HOOK_OBJ) \
+ AFL_FRIDA_PERSISTENT_ADDR=$(AFL_FRIDA_PERSISTENT_ADDR) \
+ AFL_ENTRYPOINT=$(AFL_FRIDA_PERSISTENT_ADDR) \
+ $(ROOT)afl-fuzz \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -m none \
+ -t 1000+ \
+ -d \
+ -O \
+ -c 0\
+ -V 30 \
+ -- \
+ $(TEST_BIN) 2147483647
+
+debug:
+ gdb \
+ --ex 'set environment LD_PRELOAD=$(ROOT)afl-frida-trace.so' \
+ --ex 'set disassembly-flavor intel' \
+ --args $(TEST_BIN) $(TEST_DATA_DIR)basn0g01.jpeg
diff --git a/frida_mode/test/jpeg/Makefile b/frida_mode/test/jpeg/Makefile
new file mode 100644
index 00000000..7a237f99
--- /dev/null
+++ b/frida_mode/test/jpeg/Makefile
@@ -0,0 +1,16 @@
+all:
+ @echo trying to use GNU make...
+ @gmake all || echo please install GNUmake
+
+32:
+ @echo trying to use GNU make...
+ @gmake 32 || echo please install GNUmake
+
+clean:
+ @gmake clean
+
+frida:
+ @gmake frida
+
+debug:
+ @gmake debug
diff --git a/frida_mode/test/jpeg/get_symbol_addr.py b/frida_mode/test/jpeg/get_symbol_addr.py
new file mode 100755
index 00000000..1c46e010
--- /dev/null
+++ b/frida_mode/test/jpeg/get_symbol_addr.py
@@ -0,0 +1,36 @@
+#!/usr/bin/python3
+import argparse
+from elftools.elf.elffile import ELFFile
+
+def process_file(file, symbol, base):
+ with open(file, 'rb') as f:
+ elf = ELFFile(f)
+ symtab = elf.get_section_by_name('.symtab')
+ mains = symtab.get_symbol_by_name(symbol)
+ if len(mains) != 1:
+ print ("Failed to find main")
+ return 1
+
+ main_addr = mains[0]['st_value']
+ main = base + main_addr
+ print ("0x%016x" % main)
+ return 0
+
+def hex_value(x):
+ return int(x, 16)
+
+def main():
+ parser = argparse.ArgumentParser(description='Process some integers.')
+ parser.add_argument('-f', '--file', dest='file', type=str,
+ help='elf file name', required=True)
+ parser.add_argument('-s', '--symbol', dest='symbol', type=str,
+ help='symbol name', required=True)
+ parser.add_argument('-b', '--base', dest='base', type=hex_value,
+ help='elf base address', required=True)
+
+ args = parser.parse_args()
+ return process_file (args.file, args.symbol, args.base)
+
+if __name__ == "__main__":
+ ret = main()
+ exit(ret)
diff --git a/frida_mode/test/js/GNUmakefile b/frida_mode/test/js/GNUmakefile
new file mode 100644
index 00000000..af40c1c4
--- /dev/null
+++ b/frida_mode/test/js/GNUmakefile
@@ -0,0 +1,80 @@
+PWD:=$(shell pwd)/
+ROOT:=$(shell realpath $(PWD)../../..)/
+BUILD_DIR:=$(PWD)build/
+TEST_DATA_DIR:=$(BUILD_DIR)in/
+TEST_DATA_FILE:=$(TEST_DATA_DIR)in
+
+TESTINSTBIN:=$(BUILD_DIR)test
+TESTINSTSRC:=$(PWD)test.c
+
+TESTINSTBIN2:=$(BUILD_DIR)test2
+TESTINSTSRC2:=$(PWD)test2.c
+
+QEMU_OUT:=$(BUILD_DIR)qemu-out
+FRIDA_OUT:=$(BUILD_DIR)frida-out
+
+.PHONY: all 32 clean qemu frida
+
+all: $(TESTINSTBIN) $(TESTINSTBIN2)
+ make -C $(ROOT)frida_mode/
+
+32:
+ CFLAGS="-m32" LDFLAGS="-m32" ARCH="x86" make all
+
+$(BUILD_DIR):
+ mkdir -p $@
+
+$(TEST_DATA_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(TEST_DATA_FILE): | $(TEST_DATA_DIR)
+ echo -n "000" > $@
+
+$(TESTINSTBIN): $(TESTINSTSRC) | $(BUILD_DIR)
+ $(CC) $(CFLAGS) $(LDFLAGS) -o $@ $<
+
+$(TESTINSTBIN2): $(TESTINSTSRC2) | $(BUILD_DIR)
+ $(CC) $(CFLAGS) $(LDFLAGS) -o $@ $<
+
+clean:
+ rm -rf $(BUILD_DIR)
+
+frida_js_entry: $(TESTINSTBIN) $(TEST_DATA_FILE)
+ AFL_FRIDA_JS_SCRIPT=entry.js \
+ $(ROOT)afl-fuzz \
+ -D \
+ -O \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -- \
+ $(TESTINSTBIN) @@
+
+frida_js_replace: $(TESTINSTBIN) $(TEST_DATA_FILE)
+ AFL_FRIDA_JS_SCRIPT=replace.js \
+ $(ROOT)afl-fuzz \
+ -D \
+ -O \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -- \
+ $(TESTINSTBIN) @@
+
+frida_js_patch: $(TESTINSTBIN2) $(TEST_DATA_FILE)
+ AFL_FRIDA_JS_SCRIPT=patch.js \
+ $(ROOT)afl-fuzz \
+ -D \
+ -O \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -- \
+ $(TESTINSTBIN2) @@
+
+frida_js_stalker: $(TESTINSTBIN2) $(TEST_DATA_FILE)
+ AFL_FRIDA_JS_SCRIPT=stalker.js \
+ $(ROOT)afl-fuzz \
+ -D \
+ -O \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -- \
+ $(TESTINSTBIN2) @@
diff --git a/frida_mode/test/js/Makefile b/frida_mode/test/js/Makefile
new file mode 100644
index 00000000..8a2b6fb0
--- /dev/null
+++ b/frida_mode/test/js/Makefile
@@ -0,0 +1,25 @@
+all:
+ @echo trying to use GNU make...
+ @gmake all || echo please install GNUmake
+
+32:
+ @echo trying to use GNU make...
+ @gmake 32 || echo please install GNUmake
+
+clean:
+ @gmake clean
+
+frida_js_entry:
+ @gmake frida_js_entry
+
+frida_js_replace:
+ @gmake frida_js_replace
+
+frida_js_patch:
+ @gmake frida_js_patch
+
+frida_js_stalker:
+ @gmake frida_js_stalker
+
+debug:
+ @gmake debug
diff --git a/frida_mode/test/js/entry.js b/frida_mode/test/js/entry.js
new file mode 100644
index 00000000..f10ef2d1
--- /dev/null
+++ b/frida_mode/test/js/entry.js
@@ -0,0 +1,20 @@
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+Afl.print(`PID: ${Process.id}`);
+
+new ModuleMap().values().forEach(m => {
+ Afl.print(`${m.base}-${m.base.add(m.size)} ${m.name}`);
+});
+
+const entry_point = DebugSymbol.fromName('run');
+Afl.print(`entry_point: ${entry_point.address}`);
+
+Afl.setEntryPoint(entry_point.address);
+
+// Afl.error('HARD NOPE');
+
+Afl.done();
+Afl.print("done");
diff --git a/frida_mode/test/js/patch.js b/frida_mode/test/js/patch.js
new file mode 100644
index 00000000..485a434f
--- /dev/null
+++ b/frida_mode/test/js/patch.js
@@ -0,0 +1,34 @@
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+const main = DebugSymbol.fromName('main').address;
+Afl.print(`main: ${main}`);
+Afl.setEntryPoint(main);
+Afl.setPersistentAddress(main);
+Afl.setPersistentCount(10000000);
+
+const crc32_check = DebugSymbol.fromName('crc32_check').address;
+const crc32_replacement = new NativeCallback(
+ (buf, len) => {
+ Afl.print(`len: ${len}`);
+ if (len < 4) {
+ return 0;
+ }
+
+ return 1;
+ },
+ 'int',
+ ['pointer', 'int']);
+Interceptor.replace(crc32_check, crc32_replacement);
+
+const some_boring_bug = DebugSymbol.fromName('some_boring_bug').address
+const boring_replacement = new NativeCallback(
+ (c) => { },
+ 'void',
+ ['char']);
+Interceptor.replace(some_boring_bug, boring_replacement);
+
+Afl.done();
+Afl.print("done");
diff --git a/frida_mode/test/js/replace.js b/frida_mode/test/js/replace.js
new file mode 100644
index 00000000..4e1e7eb7
--- /dev/null
+++ b/frida_mode/test/js/replace.js
@@ -0,0 +1,43 @@
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+Afl.print(`PID: ${Process.id}`);
+
+const name = Process.enumerateModules()[0].name;
+Afl.print(`Name: ${name}`);
+
+new ModuleMap().values().forEach(m => {
+ Afl.print(`${m.base}-${m.base.add(m.size)} ${m.name}`);
+});
+
+const slow = DebugSymbol.fromName('slow').address;
+Afl.print(`slow: ${slow}`);
+
+const LLVMFuzzerTestOneInput = DebugSymbol.fromName('LLVMFuzzerTestOneInput').address;
+Afl.print(`LLVMFuzzerTestOneInput: ${LLVMFuzzerTestOneInput}`);
+
+const cm = new CModule(`
+
+ extern unsigned char * __afl_fuzz_ptr;
+ extern unsigned int * __afl_fuzz_len;
+ extern void LLVMFuzzerTestOneInput(char *buf, int len);
+
+ void slow(void) {
+
+ LLVMFuzzerTestOneInput(__afl_fuzz_ptr, *__afl_fuzz_len);
+ }
+ `,
+ {
+ LLVMFuzzerTestOneInput: LLVMFuzzerTestOneInput,
+ __afl_fuzz_ptr: Afl.getAflFuzzPtr(),
+ __afl_fuzz_len: Afl.getAflFuzzLen()
+ });
+
+Afl.setEntryPoint(cm.slow);
+Afl.setPersistentAddress(cm.slow);
+Afl.setInMemoryFuzzing();
+Interceptor.replace(slow, cm.slow);
+Afl.print("done");
+Afl.done();
diff --git a/frida_mode/test/js/stalker.js b/frida_mode/test/js/stalker.js
new file mode 100644
index 00000000..33f024f5
--- /dev/null
+++ b/frida_mode/test/js/stalker.js
@@ -0,0 +1,109 @@
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+const main = DebugSymbol.fromName('main').address;
+Afl.print(`main: ${main}`);
+Afl.setEntryPoint(main);
+Afl.setPersistentAddress(main);
+Afl.setPersistentCount(10000000);
+
+/* Replace CRC-32 check */
+const crc32_check = DebugSymbol.fromName('crc32_check').address;
+const crc32_replacement = new NativeCallback(
+ (buf, len) => {
+ if (len < 4) {
+ return 0;
+ }
+
+ return 1;
+ },
+ 'int',
+ ['pointer', 'int']);
+Interceptor.replace(crc32_check, crc32_replacement);
+
+/* Patch out the first boring bug */
+const some_boring_bug = DebugSymbol.fromName('some_boring_bug').address
+const boring_replacement = new NativeCallback(
+ (c) => { },
+ 'void',
+ ['char']);
+Interceptor.replace(some_boring_bug, boring_replacement);
+
+/* Modify the instructions */
+const some_boring_bug2 = DebugSymbol.fromName('some_boring_bug2').address
+const pid = Memory.alloc(4);
+pid.writeInt(Process.id);
+
+const cm = new CModule(`
+ #include <stdio.h>
+ #include <gum/gumstalker.h>
+
+ typedef int pid_t;
+
+ #define STDERR_FILENO 2
+ #define BORING2_LEN 10
+
+ extern int dprintf(int fd, const char *format, ...);
+ extern void some_boring_bug2(char c);
+ extern pid_t getpid(void);
+ extern pid_t pid;
+
+ gboolean js_stalker_callback(const cs_insn *insn, gboolean begin,
+ gboolean excluded, GumStalkerOutput *output)
+ {
+ pid_t my_pid = getpid();
+ GumX86Writer *cw = output->writer.x86;
+
+ if (GUM_ADDRESS(insn->address) < GUM_ADDRESS(some_boring_bug2)) {
+
+ return TRUE;
+
+ }
+
+ if (GUM_ADDRESS(insn->address) >=
+ GUM_ADDRESS(some_boring_bug2) + BORING2_LEN) {
+
+ return TRUE;
+
+ }
+
+ if (my_pid == pid) {
+
+ if (begin) {
+
+ dprintf(STDERR_FILENO, "\n> 0x%016lX: %s %s\n", insn->address,
+ insn->mnemonic, insn->op_str);
+
+ } else {
+
+ dprintf(STDERR_FILENO, " 0x%016lX: %s %s\n", insn->address,
+ insn->mnemonic, insn->op_str);
+
+ }
+
+ }
+
+ if (insn->id == X86_INS_UD2) {
+
+ gum_x86_writer_put_nop(cw);
+ return FALSE;
+
+ } else {
+
+ return TRUE;
+
+ }
+ }
+ `,
+ {
+ dprintf: Module.getExportByName(null, 'dprintf'),
+ getpid: Module.getExportByName(null, 'getpid'),
+ some_boring_bug2: some_boring_bug2,
+ pid: pid
+ });
+Afl.setStalkerCallback(cm.js_stalker_callback)
+Afl.setStdErr("/tmp/stderr.txt");
+Afl.done();
+Afl.print("done");
diff --git a/frida_mode/test/js/test.c b/frida_mode/test/js/test.c
new file mode 100644
index 00000000..bbda5ccf
--- /dev/null
+++ b/frida_mode/test/js/test.c
@@ -0,0 +1,115 @@
+/*
+ american fuzzy lop++ - a trivial program to test the build
+ --------------------------------------------------------
+ Originally written by Michal Zalewski
+ Copyright 2014 Google Inc. All rights reserved.
+ Copyright 2019-2020 AFLplusplus Project. All rights reserved.
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at:
+ http://www.apache.org/licenses/LICENSE-2.0
+ */
+
+#include <fcntl.h>
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <unistd.h>
+
+void LLVMFuzzerTestOneInput(char *buf, int len) {
+
+ if (len < 1) return;
+ buf[len] = 0;
+
+ // we support three input cases
+ if (buf[0] == '0')
+ printf("Looks like a zero to me!\n");
+ else if (buf[0] == '1')
+ printf("Pretty sure that is a one!\n");
+ else
+ printf("Neither one or zero? How quaint!\n");
+
+}
+
+int run(char *file) {
+
+ int fd = -1;
+ off_t len;
+ char * buf = NULL;
+ size_t n_read;
+ int result = -1;
+
+ do {
+
+ dprintf(STDERR_FILENO, "Running: %s\n", file);
+
+ fd = open(file, O_RDONLY);
+ if (fd < 0) {
+
+ perror("open");
+ break;
+
+ }
+
+ len = lseek(fd, 0, SEEK_END);
+ if (len < 0) {
+
+ perror("lseek (SEEK_END)");
+ break;
+
+ }
+
+ if (lseek(fd, 0, SEEK_SET) != 0) {
+
+ perror("lseek (SEEK_SET)");
+ break;
+
+ }
+
+ buf = malloc(len);
+ if (buf == NULL) {
+
+ perror("malloc");
+ break;
+
+ }
+
+ n_read = read(fd, buf, len);
+ if (n_read != len) {
+
+ perror("read");
+ break;
+
+ }
+
+ dprintf(STDERR_FILENO, "Running: %s: (%zd bytes)\n", file, n_read);
+
+ LLVMFuzzerTestOneInput(buf, len);
+ dprintf(STDERR_FILENO, "Done: %s: (%zd bytes)\n", file, n_read);
+
+ result = 0;
+
+ } while (false);
+
+ if (buf != NULL) { free(buf); }
+
+ if (fd != -1) { close(fd); }
+
+ return result;
+
+}
+
+void slow() {
+
+ usleep(100000);
+
+}
+
+int main(int argc, char **argv) {
+
+ if (argc != 2) { return 1; }
+ slow();
+ return run(argv[1]);
+
+}
+
diff --git a/frida_mode/test/js/test2.c b/frida_mode/test/js/test2.c
new file mode 100644
index 00000000..d16f35fc
--- /dev/null
+++ b/frida_mode/test/js/test2.c
@@ -0,0 +1,177 @@
+/*
+ american fuzzy lop++ - a trivial program to test the build
+ --------------------------------------------------------
+ Originally written by Michal Zalewski
+ Copyright 2014 Google Inc. All rights reserved.
+ Copyright 2019-2020 AFLplusplus Project. All rights reserved.
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at:
+ http://www.apache.org/licenses/LICENSE-2.0
+ */
+
+#include <fcntl.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdio.h>
+#include <stdint.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+
+#define IGNORED_RETURN(x) (void)!(x)
+
+const uint32_t crc32_tab[] = {
+ 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,
+ 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988,
+ 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2,
+ 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7,
+ 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9,
+ 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172,
+ 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c,
+ 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59,
+ 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423,
+ 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924,
+ 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106,
+ 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433,
+ 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d,
+ 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e,
+ 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950,
+ 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65,
+ 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7,
+ 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0,
+ 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa,
+ 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f,
+ 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81,
+ 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a,
+ 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84,
+ 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1,
+ 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb,
+ 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc,
+ 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e,
+ 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b,
+ 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55,
+ 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236,
+ 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28,
+ 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d,
+ 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f,
+ 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38,
+ 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242,
+ 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777,
+ 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69,
+ 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2,
+ 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc,
+ 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9,
+ 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693,
+ 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94,
+ 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d
+};
+
+uint32_t
+crc32(const void *buf, size_t size)
+{
+ const uint8_t *p = buf;
+ uint32_t crc;
+ crc = ~0U;
+ while (size--)
+ crc = crc32_tab[(crc ^ *p++) & 0xFF] ^ (crc >> 8);
+ return crc ^ ~0U;
+}
+
+/*
+ * Don't you hate those contrived examples which CRC their data. We can use
+ * FRIDA to patch this function out and always return success. Otherwise, we
+ * could change it to actually correct the checksum.
+ */
+int crc32_check (char * buf, int len) {
+ if (len < sizeof(uint32_t)) { return 0; }
+ uint32_t expected = *(uint32_t *)&buf[len - sizeof(uint32_t)];
+ uint32_t calculated = crc32(buf, len - sizeof(uint32_t));
+ return expected == calculated;
+}
+
+/*
+ * So you've found a really boring bug in an earlier campaign which results in
+ * a NULL dereference or something like that. That bug can get in the way,
+ * causing the persistent loop to exit whenever it is triggered, and can also
+ * cloud your output unnecessarily. Again, we can use FRIDA to patch it out.
+ */
+void some_boring_bug(char c) {
+ switch (c) {
+ case 'A'...'Z':
+ case 'a'...'z':
+ __builtin_trap();
+ break;
+ }
+}
+
+extern void some_boring_bug2(char c);
+
+__asm__ (
+ ".text \n"
+ "some_boring_bug2: \n"
+ ".global some_boring_bug2 \n"
+ ".type some_boring_bug2, @function \n"
+ "mov %edi, %eax \n"
+ "cmp $0xb4, %al \n"
+ "jne ok \n"
+ "ud2 \n"
+ "ok: \n"
+ "ret \n");
+
+void LLVMFuzzerTestOneInput(char *buf, int len) {
+
+ if (!crc32_check(buf, len)) return;
+
+ some_boring_bug(buf[0]);
+ some_boring_bug2(buf[0]);
+
+ if (buf[0] == '0') {
+ printf("Looks like a zero to me!\n");
+ }
+ else if (buf[0] == '1') {
+ printf("Pretty sure that is a one!\n");
+ }
+ else if (buf[0] == '2') {
+ printf("Oh we, weren't expecting that!");
+ __builtin_trap();
+ }
+ else
+ printf("Neither one or zero? How quaint!\n");
+
+}
+
+int main(int argc, char **argv) {
+
+ int fd = -1;
+ off_t len;
+ char * buf = NULL;
+ size_t n_read;
+ int result = -1;
+
+ if (argc != 2) { return 1; }
+
+ printf("Running: %s\n", argv[1]);
+
+ fd = open(argv[1], O_RDONLY);
+ if (fd < 0) { return 1; }
+
+ len = lseek(fd, 0, SEEK_END);
+ if (len < 0) { return 1; }
+
+ if (lseek(fd, 0, SEEK_SET) != 0) { return 1; }
+
+ buf = malloc(len);
+ if (buf == NULL) { return 1; }
+
+ n_read = read(fd, buf, len);
+ if (n_read != len) { return 1; }
+
+ printf("Running: %s: (%zd bytes)\n", argv[1], n_read);
+
+ LLVMFuzzerTestOneInput(buf, len);
+ printf("Done: %s: (%zd bytes)\n", argv[1], n_read);
+
+ return 0;
+}
+
diff --git a/frida_mode/test/libpcap/GNUmakefile b/frida_mode/test/libpcap/GNUmakefile
index e30f2049..8a10be07 100644
--- a/frida_mode/test/libpcap/GNUmakefile
+++ b/frida_mode/test/libpcap/GNUmakefile
@@ -2,8 +2,7 @@ PWD:=$(shell pwd)/
ROOT:=$(shell realpath $(PWD)../../..)/
BUILD_DIR:=$(PWD)build/
-AFLPP_DRIVER_HOOK_SRC=$(PWD)aflpp_qemu_driver_hook.c
-AFLPP_DRIVER_HOOK_OBJ=$(BUILD_DIR)aflpp_qemu_driver_hook.so
+AFLPP_DRIVER_HOOK_OBJ=$(ROOT)frida_mode/build/hook.so
LIBPCAP_BUILD_DIR:=$(BUILD_DIR)libpcap/
HARNESS_BUILD_DIR:=$(BUILD_DIR)harness/
@@ -137,11 +136,6 @@ $(TEST_BIN): $(HARNESS_OBJ) $(PCAPTEST_OBJ) $(LIBPCAP_LIB)
$(LDFLAGS) \
$(TEST_BIN_LDFLAGS) \
-########## HOOK ########
-
-$(AFLPP_DRIVER_HOOK_OBJ): $(AFLPP_DRIVER_HOOK_SRC) | $(BUILD_DIR)
- $(CC) -shared $(CFLAGS) $(LDFLAGS) $< -o $@
-
########## DUMMY #######
$(AFLPP_DRIVER_DUMMY_INPUT): | $(TCPDUMP_TESTS_DIR)
@@ -149,8 +143,6 @@ $(AFLPP_DRIVER_DUMMY_INPUT): | $(TCPDUMP_TESTS_DIR)
###### TEST DATA #######
-hook: $(AFLPP_DRIVER_HOOK_OBJ)
-
clean:
rm -rf $(BUILD_DIR)
diff --git a/frida_mode/test/libpcap/aflpp_qemu_driver_hook.c b/frida_mode/test/libpcap/aflpp_qemu_driver_hook.c
deleted file mode 100644
index 059d438d..00000000
--- a/frida_mode/test/libpcap/aflpp_qemu_driver_hook.c
+++ /dev/null
@@ -1,97 +0,0 @@
-#include <stdint.h>
-#include <string.h>
-
-#if defined(__x86_64__)
-
-struct x86_64_regs {
-
- uint64_t rax, rbx, rcx, rdx, rdi, rsi, rbp, r8, r9, r10, r11, r12, r13, r14,
- r15;
-
- union {
-
- uint64_t rip;
- uint64_t pc;
-
- };
-
- union {
-
- uint64_t rsp;
- uint64_t sp;
-
- };
-
- union {
-
- uint64_t rflags;
- uint64_t flags;
-
- };
-
- uint8_t zmm_regs[32][64];
-
-};
-
-void afl_persistent_hook(struct x86_64_regs *regs, uint64_t guest_base,
- uint8_t *input_buf, uint32_t input_buf_len) {
-
- memcpy((void *)regs->rdi, input_buf, input_buf_len);
- regs->rsi = input_buf_len;
-
-}
-
-#elif defined(__i386__)
-
-struct x86_regs {
-
- uint32_t eax, ebx, ecx, edx, edi, esi, ebp;
-
- union {
-
- uint32_t eip;
- uint32_t pc;
-
- };
-
- union {
-
- uint32_t esp;
- uint32_t sp;
-
- };
-
- union {
-
- uint32_t eflags;
- uint32_t flags;
-
- };
-
- uint8_t xmm_regs[8][16];
-
-};
-
-void afl_persistent_hook(struct x86_regs *regs, uint64_t guest_base,
- uint8_t *input_buf, uint32_t input_buf_len) {
-
- void **esp = (void **)regs->esp;
- void * arg1 = esp[1];
- void **arg2 = &esp[2];
- memcpy(arg1, input_buf, input_buf_len);
- *arg2 = (void *)input_buf_len;
-
-}
-
-#else
- #pragma error "Unsupported architecture"
-#endif
-
-int afl_persistent_hook_init(void) {
-
- // 1 for shared memory input (faster), 0 for normal input (you have to use
- // read(), input_buf will be NULL)
- return 1;
-
-}
-
diff --git a/frida_mode/test/persistent_ret/GNUmakefile b/frida_mode/test/persistent_ret/GNUmakefile
index 2de51d86..f11269e3 100644
--- a/frida_mode/test/persistent_ret/GNUmakefile
+++ b/frida_mode/test/persistent_ret/GNUmakefile
@@ -82,6 +82,16 @@ frida_ret: $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
-- \
$(TESTINSTBIN) @@
+frida_js: $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
+ AFL_FRIDA_JS_SCRIPT=test.js \
+ $(ROOT)afl-fuzz \
+ -D \
+ -O \
+ -i $(TESTINSTR_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -- \
+ $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
+
debug: $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
gdb \
--ex 'set environment AFL_FRIDA_PERSISTENT_ADDR=$(AFL_FRIDA_PERSISTENT_ADDR)' \
@@ -92,6 +102,15 @@ debug: $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
--ex 'set disassembly-flavor intel' \
--args $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
+debug_js: $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
+ gdb \
+ --ex 'set environment AFL_FRIDA_JS_SCRIPT=test.js' \
+ --ex 'set environment AFL_FRIDA_PERSISTENT_DEBUG=1' \
+ --ex 'set environment AFL_DEBUG_CHILD=1' \
+ --ex 'set environment LD_PRELOAD=$(ROOT)afl-frida-trace.so' \
+ --ex 'set disassembly-flavor intel' \
+ --args $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
+
run: $(TESTINSTBIN) $(TESTINSTR_DATA_FILE)
AFL_FRIDA_PERSISTENT_ADDR=$(AFL_FRIDA_PERSISTENT_ADDR) \
AFL_FRIDA_PERSISTENT_RET=$(AFL_FRIDA_PERSISTENT_RET) \
diff --git a/frida_mode/test/persistent_ret/test.js b/frida_mode/test/persistent_ret/test.js
new file mode 100644
index 00000000..8adb45b2
--- /dev/null
+++ b/frida_mode/test/persistent_ret/test.js
@@ -0,0 +1,48 @@
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+Afl.print(`PID: ${Process.id}`);
+
+const name = Process.enumerateModules()[0].name;
+Afl.print(`Name: ${name}`);
+
+new ModuleMap().values().forEach(m => {
+ Afl.print(`${m.base}-${m.base.add(m.size)} ${m.name}`);
+});
+
+if (name === 'testinstr') {
+ const persistent_addr = DebugSymbol.fromName('LLVMFuzzerTestOneInput').address;
+ Afl.print(`persistent_addr: ${persistent_addr}`);
+ Afl.setEntryPoint(persistent_addr);
+ Afl.setPersistentAddress(persistent_addr);
+ Afl.setInstrumentDebugFile("/dev/stdout");
+ Afl.setPersistentDebug();
+ Afl.setInstrumentNoOptimize();
+ Afl.setInstrumentEnableTracing();
+
+ const LLVMFuzzerTestOneInput = new NativeFunction(
+ persistent_addr,
+ 'void',
+ ['pointer', 'uint64'],
+ {traps: "all"});
+
+ const persistentHook = new NativeCallback(
+ (data, size) => {
+ const input = Afl.aflFuzzPtr.readPointer();
+ const len = Afl.aflFuzzLen.readPointer().readU32();
+ const hd = hexdump(input, {length: len, header: false, ansi: true});
+ Afl.print(`input: ${hd}`);
+ LLVMFuzzerTestOneInput(input, len);
+ },
+ 'void',
+ ['pointer', 'uint64']);
+
+ Afl.aflSharedMemFuzzing.writeInt(1);
+ Interceptor.replace(persistent_addr, persistentHook);
+ Interceptor.flush();
+}
+
+Afl.print("done");
+Afl.done();
diff --git a/frida_mode/test/persistent_ret/testinstr.c b/frida_mode/test/persistent_ret/testinstr.c
index 6cb88a50..42e3519a 100644
--- a/frida_mode/test/persistent_ret/testinstr.c
+++ b/frida_mode/test/persistent_ret/testinstr.c
@@ -17,13 +17,14 @@
#include <unistd.h>
#ifdef __APPLE__
- #define TESTINSTR_SECTION
+ #define MAIN_SECTION
#else
- #define TESTINSTR_SECTION __attribute__((section(".testinstr")))
+ #define MAIN_SECTION __attribute__((section(".main")))
#endif
-void testinstr(char *buf, int len) {
+void LLVMFuzzerTestOneInput(char *buf, int len) {
+ printf (">>> LLVMFuzzerTestOneInput >>>\n");
if (len < 1) return;
buf[len] = 0;
@@ -43,7 +44,7 @@ void slow() {
}
-TESTINSTR_SECTION int main(int argc, char **argv) {
+MAIN_SECTION int main(int argc, char **argv) {
char * file;
int fd = -1;
@@ -101,7 +102,7 @@ TESTINSTR_SECTION int main(int argc, char **argv) {
dprintf(STDERR_FILENO, "Running: %s: (%zd bytes)\n", file, n_read);
- testinstr(buf, len);
+ LLVMFuzzerTestOneInput(buf, len);
dprintf(STDERR_FILENO, "Done: %s: (%zd bytes)\n", file, n_read);
slow();
diff --git a/frida_mode/test/png/persistent/hook/GNUmakefile b/frida_mode/test/png/persistent/hook/GNUmakefile
index b17f3775..0ff9fe86 100644
--- a/frida_mode/test/png/persistent/hook/GNUmakefile
+++ b/frida_mode/test/png/persistent/hook/GNUmakefile
@@ -2,8 +2,7 @@ PWD:=$(shell pwd)/
ROOT:=$(shell realpath $(PWD)../../../../..)/
BUILD_DIR:=$(PWD)build/
-AFLPP_DRIVER_HOOK_SRC=$(PWD)aflpp_qemu_driver_hook.c
-AFLPP_DRIVER_HOOK_OBJ=$(BUILD_DIR)aflpp_qemu_driver_hook.so
+AFLPP_DRIVER_HOOK_OBJ=$(ROOT)frida_mode/build/hook.so
CFLAGS+=-O3 \
-funroll-loops \
@@ -48,7 +47,7 @@ endif
.PHONY: all 32 clean format qemu qemu_entry frida frida_entry debug
-all: $(AFLPP_DRIVER_HOOK_OBJ)
+all:
make -C $(ROOT)frida_mode/test/png/persistent/
32:
@@ -68,9 +67,6 @@ $(TEST_DATA_DIR): | $(BUILD_DIR)
$(AFLPP_DRIVER_DUMMY_INPUT): | $(BUILD_DIR)
truncate -s 1M $@
-$(AFLPP_DRIVER_HOOK_OBJ): $(AFLPP_DRIVER_HOOK_SRC) | $(BUILD_DIR)
- $(CC) $(CFLAGS) $(LDFLAGS) $< -o $@
-
qemu: $(AFLPP_DRIVER_DUMMY_INPUT) $(AFLPP_DRIVER_HOOK_OBJ) | $(BUILD_DIR)
AFL_QEMU_PERSISTENT_HOOK=$(AFLPP_DRIVER_HOOK_OBJ) \
AFL_QEMU_PERSISTENT_ADDR=$(AFL_QEMU_PERSISTENT_ADDR) \
@@ -124,6 +120,28 @@ frida_entry: $(AFLPP_DRIVER_DUMMY_INPUT) $(AFLPP_DRIVER_HOOK_OBJ) | $(BUILD_DIR)
-- \
$(TEST_BIN) $(AFLPP_DRIVER_DUMMY_INPUT)
+frida_js_load: $(AFLPP_DRIVER_DUMMY_INPUT) $(AFLPP_DRIVER_HOOK_OBJ) | $(BUILD_DIR)
+ AFL_FRIDA_JS_SCRIPT=load.js \
+ $(ROOT)afl-fuzz \
+ -D \
+ -V 30 \
+ -O \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -- \
+ $(TEST_BIN) $(AFLPP_DRIVER_DUMMY_INPUT)
+
+frida_js_cmodule: $(AFLPP_DRIVER_DUMMY_INPUT) $(AFLPP_DRIVER_HOOK_OBJ) | $(BUILD_DIR)
+ AFL_FRIDA_JS_SCRIPT=cmodule.js \
+ $(ROOT)afl-fuzz \
+ -D \
+ -V 30 \
+ -O \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -- \
+ $(TEST_BIN) $(AFLPP_DRIVER_DUMMY_INPUT)
+
debug: $(AFLPP_DRIVER_DUMMY_INPUT)
echo $(AFL_FRIDA_PERSISTENT_ADDR)
gdb \
diff --git a/frida_mode/test/png/persistent/hook/Makefile b/frida_mode/test/png/persistent/hook/Makefile
index 983d009e..dca51d85 100644
--- a/frida_mode/test/png/persistent/hook/Makefile
+++ b/frida_mode/test/png/persistent/hook/Makefile
@@ -24,5 +24,8 @@ frida:
frida_entry:
@gmake frida_entry
+frida_js:
+ @gmake frida_js
+
debug:
@gmake debug
diff --git a/frida_mode/test/png/persistent/hook/aflpp_qemu_driver_hook.c b/frida_mode/test/png/persistent/hook/aflpp_qemu_driver_hook.c
deleted file mode 100644
index 1542c0bf..00000000
--- a/frida_mode/test/png/persistent/hook/aflpp_qemu_driver_hook.c
+++ /dev/null
@@ -1,193 +0,0 @@
-#include <stdint.h>
-#include <string.h>
-
-#if defined(__x86_64__)
-
-struct x86_64_regs {
-
- uint64_t rax, rbx, rcx, rdx, rdi, rsi, rbp, r8, r9, r10, r11, r12, r13, r14,
- r15;
-
- union {
-
- uint64_t rip;
- uint64_t pc;
-
- };
-
- union {
-
- uint64_t rsp;
- uint64_t sp;
-
- };
-
- union {
-
- uint64_t rflags;
- uint64_t flags;
-
- };
-
- uint8_t zmm_regs[32][64];
-
-};
-
-void afl_persistent_hook(struct x86_64_regs *regs, uint64_t guest_base,
- uint8_t *input_buf, uint32_t input_buf_len) {
-
- memcpy((void *)regs->rdi, input_buf, input_buf_len);
- regs->rsi = input_buf_len;
-
-}
-
-#elif defined(__i386__)
-
-struct x86_regs {
-
- uint32_t eax, ebx, ecx, edx, edi, esi, ebp;
-
- union {
-
- uint32_t eip;
- uint32_t pc;
-
- };
-
- union {
-
- uint32_t esp;
- uint32_t sp;
-
- };
-
- union {
-
- uint32_t eflags;
- uint32_t flags;
-
- };
-
- uint8_t xmm_regs[8][16];
-
-};
-
-void afl_persistent_hook(struct x86_regs *regs, uint64_t guest_base,
- uint8_t *input_buf, uint32_t input_buf_len) {
-
- void **esp = (void **)regs->esp;
- void * arg1 = esp[1];
- void **arg2 = &esp[2];
- memcpy(arg1, input_buf, input_buf_len);
- *arg2 = (void *)input_buf_len;
-
-}
-#elif defined(__aarch64__)
-
-struct arm64_regs {
-
- uint64_t x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10;
-
- union {
-
- uint64_t x11;
- uint32_t fp_32;
-
- };
-
- union {
-
- uint64_t x12;
- uint32_t ip_32;
-
- };
-
- union {
-
- uint64_t x13;
- uint32_t sp_32;
-
- };
-
- union {
-
- uint64_t x14;
- uint32_t lr_32;
-
- };
-
- union {
-
- uint64_t x15;
- uint32_t pc_32;
-
- };
-
- union {
-
- uint64_t x16;
- uint64_t ip0;
-
- };
-
- union {
-
- uint64_t x17;
- uint64_t ip1;
-
- };
-
- uint64_t x18, x19, x20, x21, x22, x23, x24, x25, x26, x27, x28;
-
- union {
-
- uint64_t x29;
- uint64_t fp;
-
- };
-
- union {
-
- uint64_t x30;
- uint64_t lr;
-
- };
-
- union {
-
- uint64_t x31;
- uint64_t sp;
-
- };
-
- // the zero register is not saved here ofc
-
- uint64_t pc;
-
- uint32_t cpsr;
-
- uint8_t vfp_zregs[32][16 * 16];
- uint8_t vfp_pregs[17][32];
- uint32_t vfp_xregs[16];
-
-};
-
-void afl_persistent_hook(struct arm64_regs *regs, uint64_t guest_base,
- uint8_t *input_buf, uint32_t input_buf_len) {
-
- memcpy((void *)regs->x0, input_buf, input_buf_len);
- regs->x1 = input_buf_len;
-}
-
-#else
- #pragma error "Unsupported architecture"
-#endif
-
-int afl_persistent_hook_init(void) {
-
- // 1 for shared memory input (faster), 0 for normal input (you have to use
- // read(), input_buf will be NULL)
- return 1;
-
-}
-
diff --git a/frida_mode/test/png/persistent/hook/cmodule.js b/frida_mode/test/png/persistent/hook/cmodule.js
new file mode 100644
index 00000000..ab8bdc66
--- /dev/null
+++ b/frida_mode/test/png/persistent/hook/cmodule.js
@@ -0,0 +1,39 @@
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+Afl.print(`PID: ${Process.id}`);
+
+const name = Process.enumerateModules()[0].name;
+Afl.print(`Name: ${name}`);
+
+new ModuleMap().values().forEach(m => {
+ Afl.print(`${m.base}-${m.base.add(m.size)} ${m.name}`);
+});
+
+const persistent_addr = DebugSymbol.fromName('LLVMFuzzerTestOneInput').address;
+Afl.print(`persistent_addr: ${persistent_addr}`);
+Afl.setEntryPoint(persistent_addr);
+Afl.setPersistentAddress(persistent_addr);
+
+const cm = new CModule(`
+
+ #include <string.h>
+ #include <gum/gumdefs.h>
+
+ void afl_persistent_hook(GumCpuContext *regs, uint8_t *input_buf,
+ uint32_t input_buf_len) {
+
+ memcpy((void *)regs->rdi, input_buf, input_buf_len);
+ regs->rsi = input_buf_len;
+
+ }
+ `,
+ {
+ memcpy: Module.getExportByName(null, 'memcpy')
+ });
+Afl.setPersistentHook(cm.afl_persistent_hook);
+
+Afl.print("done");
+Afl.done();
diff --git a/frida_mode/test/png/persistent/hook/load.js b/frida_mode/test/png/persistent/hook/load.js
new file mode 100644
index 00000000..ce4374ae
--- /dev/null
+++ b/frida_mode/test/png/persistent/hook/load.js
@@ -0,0 +1,27 @@
+Afl.print('******************');
+Afl.print('* AFL FRIDA MODE *');
+Afl.print('******************');
+Afl.print('');
+
+Afl.print(`PID: ${Process.id}`);
+
+const name = Process.enumerateModules()[0].name;
+Afl.print(`Name: ${name}`);
+
+new ModuleMap().values().forEach(m => {
+ Afl.print(`${m.base}-${m.base.add(m.size)} ${m.name}`);
+});
+
+const persistent_addr = DebugSymbol.fromName('LLVMFuzzerTestOneInput').address;
+Afl.print(`persistent_addr: ${persistent_addr}`);
+Afl.setEntryPoint(persistent_addr);
+Afl.setPersistentAddress(persistent_addr);
+
+const path = Afl.module.path;
+const dir = path.substring(0, path.lastIndexOf("/"));
+const mod = Module.load(`${dir}/frida_mode/build/hook.so`);
+const hook = mod.getExportByName('afl_persistent_hook');
+Afl.setPersistentHook(hook);
+
+Afl.print("done");
+Afl.done();
diff --git a/frida_mode/test/proj4/GNUmakefile b/frida_mode/test/proj4/GNUmakefile
new file mode 100644
index 00000000..e324a5d0
--- /dev/null
+++ b/frida_mode/test/proj4/GNUmakefile
@@ -0,0 +1,164 @@
+PWD:=$(shell pwd)/
+ROOT:=$(shell realpath $(PWD)../../..)/
+BUILD_DIR:=$(PWD)build/
+
+AFLPP_DRIVER_HOOK_OBJ=$(ROOT)frida_mode/build/hook.so
+
+LIBPROJ4_BUILD_DIR:=$(BUILD_DIR)libproj4/
+HARNESS_BUILD_DIR:=$(BUILD_DIR)harness/
+PROJ4TEST_BUILD_DIR:=$(BUILD_DIR)proj4test/
+
+LIBPROJ4_URL:=https://github.com/OSGeo/PROJ
+LIBPROJ4_DIR:=$(LIBPROJ4_BUILD_DIR)libproj4/
+LIBPROJ4_CONFIGURE:=$(LIBPROJ4_DIR)configure.ac
+LIBPROJ4_MAKEFILE:=$(LIBPROJ4_DIR)Makefile
+LIBPROJ4_LIB:=$(LIBPROJ4_DIR)src/.libs/libproj.a
+
+HARNESS_FILE:=$(HARNESS_BUILD_DIR)StandaloneFuzzTargetMain.c
+HARNESS_OBJ:=$(HARNESS_BUILD_DIR)StandaloneFuzzTargetMain.o
+HARNESS_URL:="https://raw.githubusercontent.com/AFLplusplus/AFLplusplus/stable/utils/aflpp_driver/aflpp_qemu_driver.c"
+
+PROJ4TEST_FILE:=$(PROJ4TEST_BUILD_DIR)target.cc
+PROJ4TEST_OBJ:=$(PROJ4TEST_BUILD_DIR)target.o
+PROJ4TEST_URL:="https://raw.githubusercontent.com/OSGeo/PROJ/d00501750b210a73f9fb107ac97a683d4e3d8e7a/test/fuzzers/standard_fuzzer.cpp"
+
+LDFLAGS += -lpthread
+
+TEST_BIN:=$(BUILD_DIR)test
+ifeq "$(shell uname)" "Darwin"
+TEST_BIN_LDFLAGS:=-undefined dynamic_lookup
+endif
+
+TEST_DATA_DIR:=$(BUILD_DIR)in/
+TEST_DATA_FILE:=$(TEST_DATA_DIR)default_seed
+
+FRIDA_OUT:=$(BUILD_DIR)frida-out
+
+ifndef ARCH
+
+ARCH=$(shell uname -m)
+ifeq "$(ARCH)" "aarch64"
+ ARCH:=arm64
+endif
+
+ifeq "$(ARCH)" "i686"
+ ARCH:=x86
+endif
+endif
+
+ifeq "$(ARCH)" "aarch64"
+ AFL_FRIDA_PERSISTENT_ADDR=$(shell $(PWD)get_symbol_addr.py -f $(TEST_BIN) -s LLVMFuzzerTestOneInput -b 0x0000aaaaaaaaa000)
+endif
+
+ifeq "$(ARCH)" "x86_64"
+ AFL_FRIDA_PERSISTENT_ADDR=$(shell $(PWD)get_symbol_addr.py -f $(TEST_BIN) -s LLVMFuzzerTestOneInput -b 0x0000555555554000)
+endif
+
+ifeq "$(ARCH)" "x86"
+ AFL_FRIDA_PERSISTENT_ADDR=$(shell $(PWD)get_symbol_addr.py -f $(TEST_BIN) -s LLVMFuzzerTestOneInput -b 0x56555000)
+endif
+
+.PHONY: all clean frida hook
+
+all: $(TEST_BIN)
+ make -C $(ROOT)frida_mode/
+
+32:
+ CXXFLAGS="-m32" LDFLAGS="-m32" ARCH="x86" make all
+
+$(BUILD_DIR):
+ mkdir -p $@
+
+######### HARNESS ########
+$(HARNESS_BUILD_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(HARNESS_FILE): | $(HARNESS_BUILD_DIR)
+ wget -O $@ $(HARNESS_URL)
+
+$(HARNESS_OBJ): $(HARNESS_FILE)
+ $(CC) $(CXXFLAGS) $(LDFLAGS) -o $@ -c $<
+
+######### PROJ4TEST ########
+
+$(PROJ4TEST_BUILD_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(PROJ4TEST_FILE): | $(PROJ4TEST_BUILD_DIR)
+ wget -O $@ $(PROJ4TEST_URL)
+
+$(PROJ4TEST_OBJ): $(PROJ4TEST_FILE) | $(LIBPROJ4_MAKEFILE)
+ $(CXX) $(CXXFLAGS) $(LDFLAGS) -std=c++11 -I $(LIBPROJ4_DIR)src/ -o $@ -c $<
+
+######### LIBPROJ4 ########
+
+$(LIBPROJ4_BUILD_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(LIBPROJ4_CONFIGURE): $(LIBPROJ4_BUILD_DIR)
+ git clone $(LIBPROJ4_URL) $(LIBPROJ4_DIR)
+ cd $(LIBPROJ4_DIR) && git checkout d00501750b210a73f9fb107ac97a683d4e3d8e7a
+
+$(LIBPROJ4_MAKEFILE): $(LIBPROJ4_CONFIGURE)
+ cd $(LIBPROJ4_DIR) && ./autogen.sh
+ cd $(LIBPROJ4_DIR) && ./configure
+
+$(LIBPROJ4_LIB): $(LIBPROJ4_MAKEFILE)
+ make -C $(LIBPROJ4_DIR) -j $(shell nproc)
+
+######### TEST ########
+
+$(TEST_BIN): $(HARNESS_OBJ) $(PROJ4TEST_OBJ) $(LIBPROJ4_LIB)
+ $(CXX) \
+ $(CFLAGS) \
+ -o $@ \
+ $(HARNESS_OBJ) $(PROJ4TEST_OBJ) $(LIBPROJ4_LIB) \
+ -lz \
+ $(LDFLAGS) \
+ $(TEST_BIN_LDFLAGS) \
+
+########## DUMMY #######
+
+$(TEST_DATA_DIR): | $(BUILD_DIR)
+ mkdir -p $@
+
+$(TEST_DATA_FILE): | $(TEST_DATA_DIR)
+ echo "hi" > $(TEST_DATA_FILE)
+
+###### TEST DATA #######
+
+clean:
+ rm -rf $(BUILD_DIR)
+
+frida: $(TEST_BIN) $(AFLPP_DRIVER_HOOK_OBJ) $(TEST_DATA_FILE)
+ AFL_DEBUG_CHILD=1 \
+ AFL_DISABLE_TRIM=1 \
+ AFL_FRIDA_PERSISTENT_CNT=1000000 \
+ AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES=1 \
+ AFL_NO_AFFINITY=1 \
+ X__AFL_NO_UI=1 \
+ AFL_PATH=/out \
+ AFL_SHUFFLE_QUEUE=1 \
+ AFL_SKIP_CPUFREQ=1 \
+ AFL_SKIP_CRASHES=1 \
+ AFL_TESTCACHE_SIZE=2 \
+ AFL_FRIDA_PERSISTENT_HOOK=$(AFLPP_DRIVER_HOOK_OBJ) \
+ AFL_FRIDA_PERSISTENT_ADDR=$(AFL_FRIDA_PERSISTENT_ADDR) \
+ AFL_ENTRYPOINT=$(AFL_FRIDA_PERSISTENT_ADDR) \
+ $(ROOT)afl-fuzz \
+ -i $(TEST_DATA_DIR) \
+ -o $(FRIDA_OUT) \
+ -m none \
+ -t 1000+ \
+ -d \
+ -O \
+ -c 0\
+ -V 30 \
+ -- \
+ $(TEST_BIN) 2147483647
+
+debug:
+ gdb \
+ --ex 'set environment LD_PRELOAD=$(ROOT)afl-frida-trace.so' \
+ --ex 'set disassembly-flavor intel' \
+ --args $(TEST_BIN) $(TEST_DATA_DIR)basn0g01.proj4
diff --git a/frida_mode/test/proj4/Makefile b/frida_mode/test/proj4/Makefile
new file mode 100644
index 00000000..f83e2992
--- /dev/null
+++ b/frida_mode/test/proj4/Makefile
@@ -0,0 +1,17 @@
+all:
+ @echo trying to use GNU make...
+ @gmake all || echo please install GNUmake
+
+32:
+ @echo trying to use GNU make...
+ @gmake 32 || echo please install GNUmake
+
+clean:
+ @gmake clean
+
+frida:
+ @gmake frida
+
+debug:
+ @gmake debug
+
diff --git a/frida_mode/test/proj4/get_symbol_addr.py b/frida_mode/test/proj4/get_symbol_addr.py
new file mode 100755
index 00000000..1c46e010
--- /dev/null
+++ b/frida_mode/test/proj4/get_symbol_addr.py
@@ -0,0 +1,36 @@
+#!/usr/bin/python3
+import argparse
+from elftools.elf.elffile import ELFFile
+
+def process_file(file, symbol, base):
+ with open(file, 'rb') as f:
+ elf = ELFFile(f)
+ symtab = elf.get_section_by_name('.symtab')
+ mains = symtab.get_symbol_by_name(symbol)
+ if len(mains) != 1:
+ print ("Failed to find main")
+ return 1
+
+ main_addr = mains[0]['st_value']
+ main = base + main_addr
+ print ("0x%016x" % main)
+ return 0
+
+def hex_value(x):
+ return int(x, 16)
+
+def main():
+ parser = argparse.ArgumentParser(description='Process some integers.')
+ parser.add_argument('-f', '--file', dest='file', type=str,
+ help='elf file name', required=True)
+ parser.add_argument('-s', '--symbol', dest='symbol', type=str,
+ help='symbol name', required=True)
+ parser.add_argument('-b', '--base', dest='base', type=hex_value,
+ help='elf base address', required=True)
+
+ args = parser.parse_args()
+ return process_file (args.file, args.symbol, args.base)
+
+if __name__ == "__main__":
+ ret = main()
+ exit(ret)
diff --git a/frida_mode/test/re2/GNUmakefile b/frida_mode/test/re2/GNUmakefile
index 9f0b31d3..e1c5347d 100644
--- a/frida_mode/test/re2/GNUmakefile
+++ b/frida_mode/test/re2/GNUmakefile
@@ -2,8 +2,7 @@ PWD:=$(shell pwd)/
ROOT:=$(shell realpath $(PWD)../../..)/
BUILD_DIR:=$(PWD)build/
-AFLPP_DRIVER_HOOK_SRC=$(PWD)aflpp_qemu_driver_hook.c
-AFLPP_DRIVER_HOOK_OBJ=$(BUILD_DIR)aflpp_qemu_driver_hook.so
+AFLPP_DRIVER_HOOK_OBJ=$(ROOT)frida_mode/build/hook.so
LIBRE2_BUILD_DIR:=$(BUILD_DIR)libre2/
HARNESS_BUILD_DIR:=$(BUILD_DIR)harness/
@@ -116,11 +115,6 @@ $(TEST_BIN): $(HARNESS_OBJ) $(RE2TEST_OBJ) $(LIBRE2_LIB)
$(LDFLAGS) \
$(TEST_BIN_LDFLAGS) \
-########## HOOK ########
-
-$(AFLPP_DRIVER_HOOK_OBJ): $(AFLPP_DRIVER_HOOK_SRC) | $(BUILD_DIR)
- $(CC) -shared $(CFLAGS) $(LDFLAGS) $< -o $@
-
########## DUMMY #######
$(TEST_DATA_DIR): | $(BUILD_DIR)
@@ -131,8 +125,6 @@ $(AFLPP_DRIVER_DUMMY_INPUT): | $(TEST_DATA_DIR)
###### TEST DATA #######
-hook: $(AFLPP_DRIVER_HOOK_OBJ)
-
clean:
rm -rf $(BUILD_DIR)
diff --git a/frida_mode/test/re2/Makefile b/frida_mode/test/re2/Makefile
index 00b2b287..360cdc44 100644
--- a/frida_mode/test/re2/Makefile
+++ b/frida_mode/test/re2/Makefile
@@ -18,5 +18,3 @@ frida:
debug:
@gmake debug
-hook:
- @gmake hook
diff --git a/frida_mode/test/re2/aflpp_qemu_driver_hook.c b/frida_mode/test/re2/aflpp_qemu_driver_hook.c
deleted file mode 100644
index 059d438d..00000000
--- a/frida_mode/test/re2/aflpp_qemu_driver_hook.c
+++ /dev/null
@@ -1,97 +0,0 @@
-#include <stdint.h>
-#include <string.h>
-
-#if defined(__x86_64__)
-
-struct x86_64_regs {
-
- uint64_t rax, rbx, rcx, rdx, rdi, rsi, rbp, r8, r9, r10, r11, r12, r13, r14,
- r15;
-
- union {
-
- uint64_t rip;
- uint64_t pc;
-
- };
-
- union {
-
- uint64_t rsp;
- uint64_t sp;
-
- };
-
- union {
-
- uint64_t rflags;
- uint64_t flags;
-
- };
-
- uint8_t zmm_regs[32][64];
-
-};
-
-void afl_persistent_hook(struct x86_64_regs *regs, uint64_t guest_base,
- uint8_t *input_buf, uint32_t input_buf_len) {
-
- memcpy((void *)regs->rdi, input_buf, input_buf_len);
- regs->rsi = input_buf_len;
-
-}
-
-#elif defined(__i386__)
-
-struct x86_regs {
-
- uint32_t eax, ebx, ecx, edx, edi, esi, ebp;
-
- union {
-
- uint32_t eip;
- uint32_t pc;
-
- };
-
- union {
-
- uint32_t esp;
- uint32_t sp;
-
- };
-
- union {
-
- uint32_t eflags;
- uint32_t flags;
-
- };
-
- uint8_t xmm_regs[8][16];
-
-};
-
-void afl_persistent_hook(struct x86_regs *regs, uint64_t guest_base,
- uint8_t *input_buf, uint32_t input_buf_len) {
-
- void **esp = (void **)regs->esp;
- void * arg1 = esp[1];
- void **arg2 = &esp[2];
- memcpy(arg1, input_buf, input_buf_len);
- *arg2 = (void *)input_buf_len;
-
-}
-
-#else
- #pragma error "Unsupported architecture"
-#endif
-
-int afl_persistent_hook_init(void) {
-
- // 1 for shared memory input (faster), 0 for normal input (you have to use
- // read(), input_buf will be NULL)
- return 1;
-
-}
-
diff --git a/frida_mode/ts/lib/afl.ts b/frida_mode/ts/lib/afl.ts
new file mode 100644
index 00000000..6da7fabc
--- /dev/null
+++ b/frida_mode/ts/lib/afl.ts
@@ -0,0 +1,373 @@
+class Afl {
+
+ /**
+ * Field containing the `Module` object for `afl-frida-trace.so` (the FRIDA mode
+ * implementation).
+ */
+ public static module: Module = Process.getModuleByName("afl-frida-trace.so");
+
+ /**
+ * This is equivalent to setting a value in `AFL_FRIDA_EXCLUDE_RANGES`,
+ * it takes as arguments a `NativePointer` and a `number`. It can be
+ * called multiple times to exclude several ranges.
+ */
+ public static addExcludedRange(addressess: NativePointer, size: number): void {
+ Afl.jsApiAddExcludeRange(addressess, size);
+ }
+
+ /**
+ * This is equivalent to setting a value in `AFL_FRIDA_INST_RANGES`,
+ * it takes as arguments a `NativePointer` and a `number`. It can be
+ * called multiple times to include several ranges.
+ */
+ public static addIncludedRange(addressess: NativePointer, size: number): void {
+ Afl.jsApiAddIncludeRange(addressess, size);
+ }
+
+ /**
+ * This must always be called at the end of your script. This lets
+ * FRIDA mode know that your configuration is finished and that
+ * execution has reached the end of your script. Failure to call
+ * this will result in a fatal error.
+ */
+ public static done(): void {
+ Afl.jsApiDone();
+ }
+
+ /**
+ * This function can be called within your script to cause FRIDA
+ * mode to trigger a fatal error. This is useful if for example you
+ * discover a problem you weren't expecting and want everything to
+ * stop. The user will need to enable `AFL_DEBUG_CHILD=1` to view
+ * this error message.
+ */
+ public static error(msg: string): void {
+ const buf = Memory.allocUtf8String(msg);
+ Afl.jsApiError(buf);
+ }
+
+ /**
+ * Function used to provide access to `__afl_fuzz_ptr`, which contains the length of
+ * fuzzing data when using in-memory test case fuzzing.
+ */
+ public static getAflFuzzLen(): NativePointer {
+
+ return Afl.jsApiGetSymbol("__afl_fuzz_len");
+ }
+
+ /**
+ * Function used to provide access to `__afl_fuzz_ptr`, which contains the fuzzing
+ * data when using in-memory test case fuzzing.
+ */
+ public static getAflFuzzPtr(): NativePointer {
+
+ return Afl.jsApiGetSymbol("__afl_fuzz_ptr");
+ }
+
+ /**
+ * Print a message to the STDOUT. This should be preferred to
+ * FRIDA's `console.log` since FRIDA will queue it's log messages.
+ * If `console.log` is used in a callback in particular, then there
+ * may no longer be a thread running to service this queue.
+ */
+ public static print(msg: string): void {
+ const STDOUT_FILENO = 2;
+ const log = `${msg}\n`;
+ const buf = Memory.allocUtf8String(log);
+ Afl.jsApiWrite(STDOUT_FILENO, buf, log.length);
+ }
+
+ /**
+ * See `AFL_FRIDA_DEBUG_MAPS`.
+ */
+ public static setDebugMaps(): void {
+ Afl.jsApiSetDebugMaps();
+ }
+
+ /**
+ * This has the same effect as setting `AFL_ENTRYPOINT`, but has the
+ * convenience of allowing you to use FRIDAs APIs to determine the
+ * address you would like to configure, rather than having to grep
+ * the output of `readelf` or something similarly ugly. This
+ * function should be called with a `NativePointer` as its
+ * argument.
+ */
+ public static setEntryPoint(address: NativePointer): void {
+ Afl.jsApiSetEntryPoint(address);
+ }
+
+ /**
+ * Function used to enable in-memory test cases for fuzzing.
+ */
+ public static setInMemoryFuzzing(): void {
+ Afl.jsApiAflSharedMemFuzzing.writeInt(1);
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_DEBUG_FILE`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setInstrumentDebugFile(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetInstrumentDebugFile(buf);
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_TRACE`.
+ */
+ public static setInstrumentEnableTracing(): void {
+ Afl.jsApiSetInstrumentTrace();
+ }
+
+ /**
+ * See `AFL_INST_LIBS`.
+ */
+ public static setInstrumentLibraries(): void {
+ Afl.jsApiSetInstrumentLibraries();
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_NO_OPTIMIZE`
+ */
+ public static setInstrumentNoOptimize(): void {
+ Afl.jsApiSetInstrumentNoOptimize();
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_TRACE_UNIQUE`.
+ */
+ public static setInstrumentTracingUnique(): void {
+ Afl.jsApiSetInstrumentTraceUnique();
+ }
+
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_ADDR`, again a
+ * `NativePointer` should be provided as it's argument.
+ */
+ public static setPersistentAddress(address: NativePointer): void {
+ Afl.jsApiSetPersistentAddress(address);
+ }
+
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_CNT`, a
+ * `number` should be provided as it's argument.
+ */
+ public static setPersistentCount(count: number): void {
+ Afl.jsApiSetPersistentCount(count);
+ }
+
+ /**
+ * See `AFL_FRIDA_PERSISTENT_DEBUG`.
+ */
+ public static setPersistentDebug(): void {
+ Afl.jsApiSetPersistentDebug();
+ }
+
+ /**
+ * See `AFL_FRIDA_PERSISTENT_ADDR`. This function takes a NativePointer as an
+ * argument. See above for examples of use.
+ */
+ public static setPersistentHook(address: NativePointer): void {
+ Afl.jsApiSetPersistentHook(address);
+ }
+
+ /**
+ * This is equivalent to setting `AFL_FRIDA_PERSISTENT_RET`, again a
+ * `NativePointer` should be provided as it's argument.
+ */
+ public static setPersistentReturn(address: NativePointer): void {
+ Afl.jsApiSetPersistentReturn(address);
+ }
+
+ /**
+ * See `AFL_FRIDA_INST_NO_PREFETCH`.
+ */
+ public static setPrefetchDisable(): void {
+ Afl.jsApiSetPrefetchDisable();
+ }
+
+ /*
+ * Set a function to be called for each instruction which is instrumented
+ * by AFL FRIDA mode.
+ */
+ public static setStalkerCallback(callback: NativePointer): void {
+ Afl.jsApiSetStalkerCallback(callback);
+ }
+
+ /**
+ * See `AFL_FRIDA_STATS_FILE`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setStatsFile(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStatsFile(buf);
+ }
+
+ /**
+ * See `AFL_FRIDA_STATS_INTERVAL`. This function takes a `number` as an
+ * argument
+ */
+ public static setStatsInterval(interval: number): void {
+ Afl.jsApiSetStatsInterval(interval);
+ }
+
+ /**
+ * See `AFL_FRIDA_STATS_TRANSITIONS`
+ */
+ public static setStatsTransitions(): void {
+ Afl.jsApiSetStatsTransitions();
+ }
+
+ /**
+ * See `AFL_FRIDA_OUTPUT_STDERR`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setStdErr(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStdErr(buf);
+ }
+
+ /**
+ * See `AFL_FRIDA_OUTPUT_STDOUT`. This function takes a single `string` as
+ * an argument.
+ */
+ public static setStdOut(file: string): void {
+ const buf = Memory.allocUtf8String(file);
+ Afl.jsApiSetStdOut(buf);
+ }
+
+ private static readonly jsApiAddExcludeRange = Afl.jsApiGetFunction(
+ "js_api_add_exclude_range",
+ "void",
+ ["pointer", "size_t"]);
+
+ private static readonly jsApiAddIncludeRange = Afl.jsApiGetFunction(
+ "js_api_add_include_range",
+ "void",
+ ["pointer", "size_t"]);
+
+ private static readonly jsApiAflSharedMemFuzzing = Afl.jsApiGetSymbol("__afl_sharedmem_fuzzing");
+
+ private static readonly jsApiDone = Afl.jsApiGetFunction(
+ "js_api_done",
+ "void",
+ []);
+
+ private static readonly jsApiError = Afl.jsApiGetFunction(
+ "js_api_error",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetDebugMaps = Afl.jsApiGetFunction(
+ "js_api_set_debug_maps",
+ "void",
+ []);
+
+ private static readonly jsApiSetEntryPoint = Afl.jsApiGetFunction(
+ "js_api_set_entrypoint",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetInstrumentDebugFile = Afl.jsApiGetFunction(
+ "js_api_set_instrument_debug_file",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetInstrumentLibraries = Afl.jsApiGetFunction(
+ "js_api_set_instrument_libraries",
+ "void",
+ []);
+
+ private static readonly jsApiSetInstrumentNoOptimize = Afl.jsApiGetFunction(
+ "js_api_set_instrument_no_optimize",
+ "void",
+ []);
+
+ private static readonly jsApiSetInstrumentTrace = Afl.jsApiGetFunction(
+ "js_api_set_instrument_trace",
+ "void",
+ []);
+
+ private static readonly jsApiSetInstrumentTraceUnique = Afl.jsApiGetFunction(
+ "js_api_set_instrument_trace_unique",
+ "void",
+ []);
+
+ private static readonly jsApiSetPersistentAddress = Afl.jsApiGetFunction(
+ "js_api_set_persistent_address",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetPersistentCount = Afl.jsApiGetFunction(
+ "js_api_set_persistent_count",
+ "void",
+ ["uint64"]);
+
+ private static readonly jsApiSetPersistentDebug = Afl.jsApiGetFunction(
+ "js_api_set_persistent_debug",
+ "void",
+ []);
+
+ private static readonly jsApiSetPersistentHook = Afl.jsApiGetFunction(
+ "js_api_set_persistent_hook",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetPersistentReturn = Afl.jsApiGetFunction(
+ "js_api_set_persistent_return",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetPrefetchDisable = Afl.jsApiGetFunction(
+ "js_api_set_prefetch_disable",
+ "void",
+ []);
+
+ private static readonly jsApiSetStalkerCallback = Afl.jsApiGetFunction(
+ "js_api_set_stalker_callback",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetStatsFile = Afl.jsApiGetFunction(
+ "js_api_set_stats_file",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetStatsInterval = Afl.jsApiGetFunction(
+ "js_api_set_stats_interval",
+ "void",
+ ["uint64"]);
+
+ private static readonly jsApiSetStatsTransitions = Afl.jsApiGetFunction(
+ "js_api_set_stats_transitions",
+ "void",
+ []);
+
+ private static readonly jsApiSetStdErr = Afl.jsApiGetFunction(
+ "js_api_set_stderr",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiSetStdOut = Afl.jsApiGetFunction(
+ "js_api_set_stdout",
+ "void",
+ ["pointer"]);
+
+ private static readonly jsApiWrite = new NativeFunction(
+ /* tslint:disable-next-line:no-null-keyword */
+ Module.getExportByName(null, "write"),
+ "int",
+ ["int", "pointer", "int"]);
+
+ private static jsApiGetFunction(name: string, retType: NativeType, argTypes: NativeType[]): NativeFunction {
+ const addr: NativePointer = Afl.module.getExportByName(name);
+
+ return new NativeFunction(addr, retType, argTypes);
+ }
+
+ private static jsApiGetSymbol(name: string): NativePointer {
+
+ return Afl.module.getExportByName(name);
+ }
+
+}
diff --git a/frida_mode/ts/package-lock.json b/frida_mode/ts/package-lock.json
new file mode 100644
index 00000000..e766c2c2
--- /dev/null
+++ b/frida_mode/ts/package-lock.json
@@ -0,0 +1,12 @@
+{
+ "requires": true,
+ "lockfileVersion": 1,
+ "dependencies": {
+ "tsc": {
+ "version": "2.0.3",
+ "resolved": "https://registry.npmjs.org/tsc/-/tsc-2.0.3.tgz",
+ "integrity": "sha512-SN+9zBUtrpUcOpaUO7GjkEHgWtf22c7FKbKCA4e858eEM7Qz86rRDpgOU2lBIDf0fLCsEg65ms899UMUIB2+Ow==",
+ "dev": true
+ }
+ }
+}
diff --git a/frida_mode/ts/package.json b/frida_mode/ts/package.json
new file mode 100644
index 00000000..47b693ed
--- /dev/null
+++ b/frida_mode/ts/package.json
@@ -0,0 +1,32 @@
+{
+ "name": "@worksbutnottested/aflplusplus-frida",
+ "version": "1.0.0",
+ "description": "AFLplusplus Frida Mode",
+ "main": "./dist/frida.js",
+ "types": "./dist/frida.d.ts",
+ "files": [
+ "/dist/"
+ ],
+ "repository": {
+ "type": "git",
+ "url": "git@github.com:worksbutnottested/AFLplusplus.git"
+ },
+ "publishConfig": {
+ "cache": "~/.npm",
+ "registry": "https://npm.pkg.github.com/@worksbutnottested"
+ },
+ "scripts": {
+ "prepare": "npm run build",
+ "build": "tsc",
+ "lint": "tslint -p tslint.json"
+ },
+ "devDependencies": {
+ "@types/node": "^14.14.2",
+ "typescript": "^4.0.3",
+ "typescript-tslint-plugin": "^0.5.5",
+ "tslint": "^6.1.3"
+ },
+ "dependencies": {
+ "@types/frida-gum": "^16.2.0"
+ }
+ }
diff --git a/frida_mode/ts/tsconfig.json b/frida_mode/ts/tsconfig.json
new file mode 100644
index 00000000..624e4496
--- /dev/null
+++ b/frida_mode/ts/tsconfig.json
@@ -0,0 +1,14 @@
+{
+ "compilerOptions": {
+ "target": "es2020",
+ "lib": ["es2020"],
+ "strict": true,
+ "module": "commonjs",
+ "esModuleInterop": true,
+ "declaration": true,
+ "outDir": "./dist"
+ },
+ "include": [
+ "lib/**/*"
+ ]
+ }
diff --git a/frida_mode/ts/tslint.json b/frida_mode/ts/tslint.json
new file mode 100644
index 00000000..0e7a77ed
--- /dev/null
+++ b/frida_mode/ts/tslint.json
@@ -0,0 +1,256 @@
+{
+ "rules": {
+ "adjacent-overload-signatures": true,
+ "ban-types": {
+ "options": [
+ ["Object", "Avoid using the `Object` type. Did you mean `object`?"],
+ [
+ "Function",
+ "Avoid using the `Function` type. Prefer a specific function type, like `() => void`."
+ ],
+ ["Boolean", "Avoid using the `Boolean` type. Did you mean `boolean`?"],
+ ["Number", "Avoid using the `Number` type. Did you mean `number`?"],
+ ["String", "Avoid using the `String` type. Did you mean `string`?"],
+ ["Symbol", "Avoid using the `Symbol` type. Did you mean `symbol`?"]
+ ]
+ },
+ "ban-ts-ignore": true,
+ "member-access": {
+ "options": ["check-accessor", "check-constructor", "check-parameter-property"]
+ },
+ "member-ordering": {
+ "options": {
+ "order": "statics-first",
+ "alphabetize": true
+ }
+ },
+ "no-any": true,
+ "no-empty-interface": true,
+ "no-for-in": true,
+ "no-import-side-effect": true,
+ "no-inferrable-types": { "options": ["ignore-params"] },
+ "no-internal-module": true,
+ "no-magic-numbers": true,
+ "no-namespace": true,
+ "no-non-null-assertion": true,
+ "no-reference": true,
+ "no-restricted-globals": true,
+ "no-this-assignment": true,
+ "no-var-requires": true,
+ "only-arrow-functions": true,
+ "prefer-for-of": true,
+ "prefer-readonly": true,
+ "promise-function-async": true,
+ "typedef": {
+ "options": [
+ "call-signature",
+ "parameter",
+ "property-declaration"
+ ]
+ },
+ "typedef-whitespace": {
+ "options": [
+ {
+ "call-signature": "nospace",
+ "index-signature": "nospace",
+ "parameter": "nospace",
+ "property-declaration": "nospace",
+ "variable-declaration": "nospace"
+ },
+ {
+ "call-signature": "onespace",
+ "index-signature": "onespace",
+ "parameter": "onespace",
+ "property-declaration": "onespace",
+ "variable-declaration": "onespace"
+ }
+ ]
+ },
+ "unified-signatures": true,
+ "await-promise": true,
+ "ban-comma-operator": true,
+ "curly": true,
+ "forin": true,
+ "function-constructor": true,
+ "label-position": true,
+ "no-arg": true,
+ "no-async-without-await": true,
+ "no-bitwise": true,
+ "no-conditional-assignment": true,
+ "no-console": true,
+ "no-construct": true,
+ "no-debugger": true,
+ "no-duplicate-super": true,
+ "no-duplicate-switch-case": true,
+ "no-duplicate-variable": { "options": ["check-parameters"] },
+ "no-dynamic-delete": true,
+ "no-empty": true,
+ "no-eval": true,
+ "no-floating-promises": true,
+ "no-for-in-array": true,
+ "no-implicit-dependencies": true,
+ "no-inferred-empty-object-type": true,
+ "no-invalid-template-strings": true,
+ "no-misused-new": true,
+ "no-null-keyword": true,
+ "no-null-undefined-union": true,
+ "no-object-literal-type-assertion": true,
+ "no-promise-as-boolean": true,
+ "no-return-await": true,
+ "no-shadowed-variable": true,
+ "no-string-literal": true,
+ "no-string-throw": true,
+ "no-sparse-arrays": true,
+ "no-submodule-imports": true,
+ "no-tautology-expression": true,
+ "no-unbound-method": true,
+ "no-unnecessary-class": { "options": ["allow-empty-class", "allow-static-only"] },
+ "no-unsafe-any": false,
+ "no-unsafe-finally": true,
+ "no-unused-expression": true,
+ "no-var-keyword": true,
+ "no-void-expression": true,
+ "prefer-conditional-expression": true,
+ "radix": true,
+ "restrict-plus-operands": true,
+ "static-this": true,
+ "strict-boolean-expressions": true,
+ "strict-string-expressions": true,
+ "strict-comparisons": true,
+ "strict-type-predicates": true,
+ "switch-default": true,
+ "triple-equals": true,
+ "unnecessary-constructor": true,
+ "use-default-type-parameter": true,
+ "use-isnan": true,
+ "cyclomatic-complexity": true,
+ "eofline": true,
+ "indent": { "options": ["spaces"] },
+ "invalid-void": true,
+ "linebreak-style": { "options": "LF" },
+ "max-classes-per-file": { "options": 1 },
+ "max-file-line-count": { "options": 1000 },
+ "max-line-length": {
+ "options": { "limit": 120 }
+ },
+ "no-default-export": true,
+ "no-default-import": true,
+ "no-duplicate-imports": true,
+ "no-irregular-whitespace": true,
+ "no-mergeable-namespace": true,
+ "no-parameter-reassignment": true,
+ "no-require-imports": true,
+ "no-trailing-whitespace": true,
+ "object-literal-sort-keys": true,
+ "prefer-const": true,
+ "trailing-comma": {
+ "options": {
+ "esSpecCompliant": true,
+ "multiline": "always",
+ "singleline": "never"
+ }
+ },
+ "align": {
+ "options": ["parameters", "arguments", "statements", "elements", "members"]
+ },
+ "array-type": { "options": "array-simple" },
+ "arrow-parens": true,
+ "arrow-return-shorthand": { "options": "multiline" },
+ "binary-expression-operand-order": true,
+ "callable-types": true,
+ "class-name": true,
+ "comment-format": { "options": ["check-space", "check-uppercase"] },
+ "comment-type": { "options": ["singleline", "multiline", "doc", "directive"] },
+ "completed-docs": [
+ true,
+ {
+ "enums": true,
+ "methods": {"locations": "all", "privacies": ["public", "protected"]},
+ "properties": {"locations": "all", "privacies": ["public", "protected"]}
+ }
+ ],
+ "deprecation": true,
+ "encoding": true,
+ "file-name-casing": { "options": "camel-case" },
+ "import-spacing": true,
+ "increment-decrement": true,
+ "interface-name": true,
+ "interface-over-type-literal": true,
+ "jsdoc-format": { "options": "check-multiline-start" },
+ "match-default-export-name": true,
+ "new-parens": true,
+ "newline-before-return": true,
+ "newline-per-chained-call": true,
+ "no-angle-bracket-type-assertion": true,
+ "no-boolean-literal-compare": true,
+ "no-consecutive-blank-lines": true,
+ "no-parameter-properties": true,
+ "no-redundant-jsdoc": true,
+ "no-reference-import": true,
+ "no-unnecessary-callback-wrapper": true,
+ "no-unnecessary-initializer": true,
+ "no-unnecessary-qualifier": true,
+ "no-unnecessary-type-assertion": true,
+ "number-literal-format": true,
+ "object-literal-key-quotes": { "options": "consistent-as-needed" },
+ "object-literal-shorthand": true,
+ "one-line": {
+ "options": [
+ "check-catch",
+ "check-else",
+ "check-finally",
+ "check-open-brace",
+ "check-whitespace"
+ ]
+ },
+ "one-variable-per-declaration": true,
+ "ordered-imports": {
+ "options": {
+ "grouped-imports": true,
+ "import-sources-order": "case-insensitive",
+ "named-imports-order": "case-insensitive",
+ "module-source-path": "full"
+ }
+ },
+ "prefer-function-over-method": true,
+ "prefer-method-signature": true,
+ "prefer-object-spread": true,
+ "prefer-switch": true,
+ "prefer-template": true,
+ "prefer-while": true,
+ "quotemark": {
+ "options": ["double", "avoid-escape", "avoid-template"]
+ },
+ "return-undefined": true,
+ "semicolon": { "options": ["always"] },
+ "space-before-function-paren": {
+ "options": {
+ "anonymous": "never",
+ "asyncArrow": "always",
+ "constructor": "never",
+ "method": "never",
+ "named": "never"
+ }
+ },
+ "space-within-parens": { "options": 0 },
+ "switch-final-break": true,
+ "type-literal-delimiter": true,
+ "unnecessary-bind": true,
+ "unnecessary-else": true,
+ "variable-name": { "options": ["ban-keywords", "check-format", "require-const-for-all-caps"] },
+ "whitespace": {
+ "options": [
+ "check-branch",
+ "check-decl",
+ "check-operator",
+ "check-module",
+ "check-separator",
+ "check-type",
+ "check-typecast",
+ "check-preblock",
+ "check-type-operator",
+ "check-rest-spread"
+ ]
+ }
+ }
+}
diff --git a/include/afl-fuzz.h b/include/afl-fuzz.h
index 2920f905..2e2c78ef 100644
--- a/include/afl-fuzz.h
+++ b/include/afl-fuzz.h
@@ -519,7 +519,8 @@ typedef struct afl_state {
shmem_testcase_mode, /* If sharedmem testcases are used */
expand_havoc, /* perform expensive havoc after no find */
cycle_schedules, /* cycle power schedules? */
- old_seed_selection; /* use vanilla afl seed selection */
+ old_seed_selection, /* use vanilla afl seed selection */
+ reinit_table; /* reinit the queue weight table */
u8 *virgin_bits, /* Regions yet untouched by fuzzing */
*virgin_tmout, /* Bits we haven't seen in tmouts */
diff --git a/include/envs.h b/include/envs.h
index 54bb6597..f89e8e62 100644
--- a/include/envs.h
+++ b/include/envs.h
@@ -60,7 +60,8 @@ static char *afl_environment_variables[] = {
"AFL_FRIDA_INST_NO_PREFETCH",
"AFL_FRIDA_INST_RANGES",
"AFL_FRIDA_INST_TRACE",
- "AFL_FRIDA_INST_UNSTABLE",
+ "AFL_FRIDA_INST_TRACE_UNIQUE",
+ "AFL_FRIDA_JS_SCRIPT",
"AFL_FRIDA_OUTPUT_STDOUT",
"AFL_FRIDA_OUTPUT_STDERR",
"AFL_FRIDA_PERSISTENT_ADDR",
diff --git a/include/forkserver.h b/include/forkserver.h
index 2baa6f0a..c6f7de00 100644
--- a/include/forkserver.h
+++ b/include/forkserver.h
@@ -54,6 +54,7 @@ typedef struct afl_forkserver {
u32 exec_tmout; /* Configurable exec timeout (ms) */
u32 init_tmout; /* Configurable init timeout (ms) */
u32 map_size; /* map size used by the target */
+ u32 real_map_size; /* real map size, unaligned */
u32 snapshot; /* is snapshot feature used */
u64 mem_limit; /* Memory cap for child (MB) */
diff --git a/instrumentation/afl-compiler-rt.o.c b/instrumentation/afl-compiler-rt.o.c
index 50117012..3f518b55 100644
--- a/instrumentation/afl-compiler-rt.o.c
+++ b/instrumentation/afl-compiler-rt.o.c
@@ -271,12 +271,6 @@ static void __afl_map_shm(void) {
if (__afl_final_loc) {
- if (__afl_final_loc % 64) {
-
- __afl_final_loc = (((__afl_final_loc + 63) >> 6) << 6);
-
- }
-
__afl_map_size = __afl_final_loc;
if (__afl_final_loc > MAP_SIZE) {
@@ -623,6 +617,7 @@ static void __afl_unmap_shm(void) {
#endif
__afl_cmp_map = NULL;
+ __afl_cmp_map_backup = NULL;
}
@@ -632,7 +627,7 @@ static void __afl_unmap_shm(void) {
#define write_error(text) write_error_with_location(text, __FILE__, __LINE__)
-void write_error_with_location(char *text, char* filename, int linenumber) {
+void write_error_with_location(char *text, char *filename, int linenumber) {
u8 * o = getenv("__AFL_OUT_DIR");
char *e = strerror(errno);
@@ -645,14 +640,16 @@ void write_error_with_location(char *text, char* filename, int linenumber) {
if (f) {
- fprintf(f, "File %s, line %d: Error(%s): %s\n", filename, linenumber, text, e);
+ fprintf(f, "File %s, line %d: Error(%s): %s\n", filename, linenumber,
+ text, e);
fclose(f);
}
}
- fprintf(stderr, "File %s, line %d: Error(%s): %s\n", filename, linenumber, text, e);
+ fprintf(stderr, "File %s, line %d: Error(%s): %s\n", filename, linenumber,
+ text, e);
}
@@ -1019,7 +1016,7 @@ static void __afl_start_forkserver(void) {
if (read(FORKSRV_FD, &was_killed, 4) != 4) {
- write_error("read from afl-fuzz");
+ // write_error("read from afl-fuzz");
_exit(1);
}
@@ -1690,7 +1687,7 @@ void __cmplog_ins_hookN(uint128_t arg1, uint128_t arg2, uint8_t attr,
void __cmplog_ins_hook16(uint128_t arg1, uint128_t arg2, uint8_t attr) {
- if (unlikely(!__afl_cmp_map)) return;
+ if (likely(!__afl_cmp_map)) return;
uintptr_t k = (uintptr_t)__builtin_return_address(0);
k = (k >> 4) ^ (k << 8);
@@ -1794,7 +1791,7 @@ void __sanitizer_cov_trace_const_cmp16(uint128_t arg1, uint128_t arg2) {
void __sanitizer_cov_trace_switch(uint64_t val, uint64_t *cases) {
- if (unlikely(!__afl_cmp_map)) return;
+ if (likely(!__afl_cmp_map)) return;
for (uint64_t i = 0; i < cases[0]; i++) {
@@ -1891,7 +1888,7 @@ void __cmplog_rtn_hook(u8 *ptr1, u8 *ptr2) {
fprintf(stderr, "\n");
*/
- if (unlikely(!__afl_cmp_map)) return;
+ if (likely(!__afl_cmp_map)) return;
// fprintf(stderr, "RTN1 %p %p\n", ptr1, ptr2);
int l1, l2;
if ((l1 = area_is_valid(ptr1, 32)) <= 0 ||
@@ -1975,7 +1972,7 @@ static u8 *get_llvm_stdstring(u8 *string) {
void __cmplog_rtn_gcc_stdstring_cstring(u8 *stdstring, u8 *cstring) {
- if (unlikely(!__afl_cmp_map)) return;
+ if (likely(!__afl_cmp_map)) return;
if (area_is_valid(stdstring, 32) <= 0 || area_is_valid(cstring, 32) <= 0)
return;
@@ -1985,7 +1982,7 @@ void __cmplog_rtn_gcc_stdstring_cstring(u8 *stdstring, u8 *cstring) {
void __cmplog_rtn_gcc_stdstring_stdstring(u8 *stdstring1, u8 *stdstring2) {
- if (unlikely(!__afl_cmp_map)) return;
+ if (likely(!__afl_cmp_map)) return;
if (area_is_valid(stdstring1, 32) <= 0 || area_is_valid(stdstring2, 32) <= 0)
return;
@@ -1996,7 +1993,7 @@ void __cmplog_rtn_gcc_stdstring_stdstring(u8 *stdstring1, u8 *stdstring2) {
void __cmplog_rtn_llvm_stdstring_cstring(u8 *stdstring, u8 *cstring) {
- if (unlikely(!__afl_cmp_map)) return;
+ if (likely(!__afl_cmp_map)) return;
if (area_is_valid(stdstring, 32) <= 0 || area_is_valid(cstring, 32) <= 0)
return;
@@ -2006,7 +2003,7 @@ void __cmplog_rtn_llvm_stdstring_cstring(u8 *stdstring, u8 *cstring) {
void __cmplog_rtn_llvm_stdstring_stdstring(u8 *stdstring1, u8 *stdstring2) {
- if (unlikely(!__afl_cmp_map)) return;
+ if (likely(!__afl_cmp_map)) return;
if (area_is_valid(stdstring1, 32) <= 0 || area_is_valid(stdstring2, 32) <= 0)
return;
@@ -2040,7 +2037,7 @@ void __afl_coverage_on() {
if (likely(__afl_selective_coverage && __afl_selective_coverage_temp)) {
__afl_area_ptr = __afl_area_ptr_backup;
- __afl_cmp_map = __afl_cmp_map_backup;
+ if (__afl_cmp_map_backup) { __afl_cmp_map = __afl_cmp_map_backup; }
}
@@ -2082,3 +2079,4 @@ void __afl_coverage_interesting(u8 val, u32 id) {
}
#undef write_error
+
diff --git a/instrumentation/split-compares-pass.so.cc b/instrumentation/split-compares-pass.so.cc
index 68f6c329..13f45b69 100644
--- a/instrumentation/split-compares-pass.so.cc
+++ b/instrumentation/split-compares-pass.so.cc
@@ -1397,11 +1397,13 @@ bool SplitComparesTransform::runOnModule(Module &M) {
}
bool brokenDebug = false;
- if (verifyModule( M, &errs()
-#if LLVM_VERSION_MAJOR > 3 || (LLVM_VERSION_MAJOR == 3 && LLVM_VERSION_MINOR >= 9)
- ,&brokenDebug // 9th May 2016
+ if (verifyModule(M, &errs()
+#if LLVM_VERSION_MAJOR > 3 || \
+ (LLVM_VERSION_MAJOR == 3 && LLVM_VERSION_MINOR >= 9)
+ ,
+ &brokenDebug // 9th May 2016
#endif
- )) {
+ )) {
reportError(
"Module Verifier failed! Consider reporting a bug with the AFL++ "
diff --git a/src/afl-forkserver.c b/src/afl-forkserver.c
index 3d472b36..5e8fb9b5 100644
--- a/src/afl-forkserver.c
+++ b/src/afl-forkserver.c
@@ -90,6 +90,7 @@ void afl_fsrv_init(afl_forkserver_t *fsrv) {
/* exec related stuff */
fsrv->child_pid = -1;
fsrv->map_size = get_map_size();
+ fsrv->real_map_size = fsrv->map_size;
fsrv->use_fauxsrv = false;
fsrv->last_run_timed_out = false;
fsrv->debug = false;
@@ -110,6 +111,7 @@ void afl_fsrv_init_dup(afl_forkserver_t *fsrv_to, afl_forkserver_t *from) {
fsrv_to->init_tmout = from->init_tmout;
fsrv_to->mem_limit = from->mem_limit;
fsrv_to->map_size = from->map_size;
+ fsrv_to->real_map_size = from->real_map_size;
fsrv_to->support_shmem_fuzz = from->support_shmem_fuzz;
fsrv_to->out_file = from->out_file;
fsrv_to->dev_urandom_fd = from->dev_urandom_fd;
@@ -416,8 +418,7 @@ void afl_fsrv_start(afl_forkserver_t *fsrv, char **argv,
struct rlimit r;
- if (!fsrv->cmplog_binary && fsrv->qemu_mode == false &&
- fsrv->frida_mode == false) {
+ if (!fsrv->cmplog_binary) {
unsetenv(CMPLOG_SHM_ENV_VAR); // we do not want that in non-cmplog fsrv
@@ -691,15 +692,15 @@ void afl_fsrv_start(afl_forkserver_t *fsrv, char **argv,
if (!fsrv->map_size) { fsrv->map_size = MAP_SIZE; }
- if (unlikely(tmp_map_size % 64)) {
+ fsrv->real_map_size = tmp_map_size;
+
+ if (tmp_map_size % 64) {
- // should not happen
- WARNF("Target reported non-aligned map size of %u", tmp_map_size);
tmp_map_size = (((tmp_map_size + 63) >> 6) << 6);
}
- if (!be_quiet) { ACTF("Target map size: %u", tmp_map_size); }
+ if (!be_quiet) { ACTF("Target map size: %u", fsrv->real_map_size); }
if (tmp_map_size > fsrv->map_size) {
FATAL(
diff --git a/src/afl-fuzz-init.c b/src/afl-fuzz-init.c
index 872e3a32..5e4f1585 100644
--- a/src/afl-fuzz-init.c
+++ b/src/afl-fuzz-init.c
@@ -710,96 +710,103 @@ void read_testcases(afl_state_t *afl, u8 *directory) {
}
- for (i = 0; i < (u32)nl_cnt; ++i) {
+ if (nl_cnt) {
- struct stat st;
+ i = nl_cnt;
+ do {
- u8 dfn[PATH_MAX];
- snprintf(dfn, PATH_MAX, "%s/.state/deterministic_done/%s", afl->in_dir,
- nl[i]->d_name);
- u8 *fn2 = alloc_printf("%s/%s", dir, nl[i]->d_name);
+ --i;
- u8 passed_det = 0;
+ struct stat st;
+ u8 dfn[PATH_MAX];
+ snprintf(dfn, PATH_MAX, "%s/.state/deterministic_done/%s", afl->in_dir,
+ nl[i]->d_name);
+ u8 *fn2 = alloc_printf("%s/%s", dir, nl[i]->d_name);
- if (lstat(fn2, &st) || access(fn2, R_OK)) {
+ u8 passed_det = 0;
- PFATAL("Unable to access '%s'", fn2);
+ if (lstat(fn2, &st) || access(fn2, R_OK)) {
- }
+ PFATAL("Unable to access '%s'", fn2);
- /* obviously we want to skip "descending" into . and .. directories,
- however it is a good idea to skip also directories that start with
- a dot */
- if (subdirs && S_ISDIR(st.st_mode) && nl[i]->d_name[0] != '.') {
+ }
- free(nl[i]); /* not tracked */
- read_testcases(afl, fn2);
- ck_free(fn2);
- continue;
+ /* obviously we want to skip "descending" into . and .. directories,
+ however it is a good idea to skip also directories that start with
+ a dot */
+ if (subdirs && S_ISDIR(st.st_mode) && nl[i]->d_name[0] != '.') {
- }
+ free(nl[i]); /* not tracked */
+ read_testcases(afl, fn2);
+ ck_free(fn2);
+ continue;
- free(nl[i]);
+ }
- if (!S_ISREG(st.st_mode) || !st.st_size || strstr(fn2, "/README.txt")) {
+ free(nl[i]);
- ck_free(fn2);
- continue;
+ if (!S_ISREG(st.st_mode) || !st.st_size || strstr(fn2, "/README.txt")) {
- }
+ ck_free(fn2);
+ continue;
- if (st.st_size > MAX_FILE) {
+ }
- WARNF("Test case '%s' is too big (%s, limit is %s), partial reading", fn2,
- stringify_mem_size(val_buf[0], sizeof(val_buf[0]), st.st_size),
- stringify_mem_size(val_buf[1], sizeof(val_buf[1]), MAX_FILE));
+ if (st.st_size > MAX_FILE) {
- }
+ WARNF("Test case '%s' is too big (%s, limit is %s), partial reading",
+ fn2,
+ stringify_mem_size(val_buf[0], sizeof(val_buf[0]), st.st_size),
+ stringify_mem_size(val_buf[1], sizeof(val_buf[1]), MAX_FILE));
+
+ }
- /* Check for metadata that indicates that deterministic fuzzing
- is complete for this entry. We don't want to repeat deterministic
- fuzzing when resuming aborted scans, because it would be pointless
- and probably very time-consuming. */
+ /* Check for metadata that indicates that deterministic fuzzing
+ is complete for this entry. We don't want to repeat deterministic
+ fuzzing when resuming aborted scans, because it would be pointless
+ and probably very time-consuming. */
- if (!access(dfn, F_OK)) { passed_det = 1; }
+ if (!access(dfn, F_OK)) { passed_det = 1; }
- add_to_queue(afl, fn2, st.st_size >= MAX_FILE ? MAX_FILE : st.st_size,
- passed_det);
+ add_to_queue(afl, fn2, st.st_size >= MAX_FILE ? MAX_FILE : st.st_size,
+ passed_det);
- if (unlikely(afl->shm.cmplog_mode)) {
+ if (unlikely(afl->shm.cmplog_mode)) {
- if (afl->cmplog_lvl == 1) {
+ if (afl->cmplog_lvl == 1) {
- if (!afl->cmplog_max_filesize ||
- afl->cmplog_max_filesize < st.st_size) {
+ if (!afl->cmplog_max_filesize ||
+ afl->cmplog_max_filesize < st.st_size) {
- afl->cmplog_max_filesize = st.st_size;
+ afl->cmplog_max_filesize = st.st_size;
- }
+ }
- } else if (afl->cmplog_lvl == 2) {
+ } else if (afl->cmplog_lvl == 2) {
- if (!afl->cmplog_max_filesize ||
- afl->cmplog_max_filesize > st.st_size) {
+ if (!afl->cmplog_max_filesize ||
+ afl->cmplog_max_filesize > st.st_size) {
- afl->cmplog_max_filesize = st.st_size;
+ afl->cmplog_max_filesize = st.st_size;
+
+ }
}
}
- }
+ /*
+ if (unlikely(afl->schedule >= FAST && afl->schedule <= RARE)) {
- /*
- if (unlikely(afl->schedule >= FAST && afl->schedule <= RARE)) {
+ u64 cksum = hash64(afl->fsrv.trace_bits, afl->fsrv.map_size,
+ HASH_CONST); afl->queue_top->n_fuzz_entry = cksum % N_FUZZ_SIZE;
+ afl->n_fuzz[afl->queue_top->n_fuzz_entry] = 1;
- u64 cksum = hash64(afl->fsrv.trace_bits, afl->fsrv.map_size,
- HASH_CONST); afl->queue_top->n_fuzz_entry = cksum % N_FUZZ_SIZE;
- afl->n_fuzz[afl->queue_top->n_fuzz_entry] = 1;
+ }
- }
+ */
- */
+ } while (i > 0);
}
diff --git a/src/afl-fuzz-one.c b/src/afl-fuzz-one.c
index 11adebf4..f03249e9 100644
--- a/src/afl-fuzz-one.c
+++ b/src/afl-fuzz-one.c
@@ -2862,6 +2862,7 @@ abandon_entry:
--afl->pending_not_fuzzed;
afl->queue_cur->was_fuzzed = 1;
+ afl->reinit_table = 1;
if (afl->queue_cur->favored) { --afl->pending_favored; }
}
diff --git a/src/afl-fuzz-queue.c b/src/afl-fuzz-queue.c
index 811e805c..d2689c94 100644
--- a/src/afl-fuzz-queue.c
+++ b/src/afl-fuzz-queue.c
@@ -58,7 +58,8 @@ double compute_weight(afl_state_t *afl, struct queue_entry *q,
if (likely(afl->schedule < RARE)) { weight *= (avg_exec_us / q->exec_us); }
weight *= (log(q->bitmap_size) / avg_bitmap_size);
weight *= (1 + (q->tc_ref / avg_top_size));
- if (unlikely(q->favored)) weight *= 5;
+ if (unlikely(q->favored)) { weight *= 5; }
+ if (unlikely(!q->was_fuzzed)) { weight *= 2; }
return weight;
@@ -198,6 +199,8 @@ void create_alias_table(afl_state_t *afl) {
while (nS)
afl->alias_probability[S[--nS]] = 1;
+ afl->reinit_table = 0;
+
/*
#ifdef INTROSPECTION
u8 fn[PATH_MAX];
diff --git a/src/afl-fuzz-stats.c b/src/afl-fuzz-stats.c
index 9648d795..e0930234 100644
--- a/src/afl-fuzz-stats.c
+++ b/src/afl-fuzz-stats.c
@@ -264,6 +264,7 @@ void write_stats_file(afl_state_t *afl, u32 t_bytes, double bitmap_cvg,
"peak_rss_mb : %lu\n"
"cpu_affinity : %d\n"
"edges_found : %u\n"
+ "total_edges : %u\n"
"var_byte_count : %u\n"
"havoc_expansion : %u\n"
"testcache_size : %llu\n"
@@ -303,10 +304,10 @@ void write_stats_file(afl_state_t *afl, u32 t_bytes, double bitmap_cvg,
#else
-1,
#endif
- t_bytes, afl->var_byte_count, afl->expand_havoc,
- afl->q_testcase_cache_size, afl->q_testcase_cache_count,
- afl->q_testcase_evictions, afl->use_banner,
- afl->unicorn_mode ? "unicorn" : "",
+ t_bytes, afl->fsrv.real_map_size, afl->var_byte_count,
+ afl->expand_havoc, afl->q_testcase_cache_size,
+ afl->q_testcase_cache_count, afl->q_testcase_evictions,
+ afl->use_banner, afl->unicorn_mode ? "unicorn" : "",
afl->fsrv.qemu_mode ? "qemu " : "",
afl->non_instrumented_mode ? " non_instrumented " : "",
afl->no_forkserver ? "no_fsrv " : "", afl->crash_mode ? "crash " : "",
@@ -326,7 +327,7 @@ void write_stats_file(afl_state_t *afl, u32 t_bytes, double bitmap_cvg,
u32 i = 0;
fprintf(f, "virgin_bytes :");
- for (i = 0; i < afl->fsrv.map_size; i++) {
+ for (i = 0; i < afl->fsrv.real_map_size; i++) {
if (afl->virgin_bits[i] != 0xff) {
@@ -338,7 +339,7 @@ void write_stats_file(afl_state_t *afl, u32 t_bytes, double bitmap_cvg,
fprintf(f, "\n");
fprintf(f, "var_bytes :");
- for (i = 0; i < afl->fsrv.map_size; i++) {
+ for (i = 0; i < afl->fsrv.real_map_size; i++) {
if (afl->var_bytes[i]) { fprintf(f, " %u", i); }
@@ -520,7 +521,7 @@ void show_stats(afl_state_t *afl) {
/* Do some bitmap stats. */
t_bytes = count_non_255_bytes(afl, afl->virgin_bits);
- t_byte_ratio = ((double)t_bytes * 100) / afl->fsrv.map_size;
+ t_byte_ratio = ((double)t_bytes * 100) / afl->fsrv.real_map_size;
if (likely(t_bytes) && unlikely(afl->var_byte_count)) {
@@ -781,7 +782,7 @@ void show_stats(afl_state_t *afl) {
SAYF(bV bSTOP " now processing : " cRST "%-18s " bSTG bV bSTOP, tmp);
sprintf(tmp, "%0.02f%% / %0.02f%%",
- ((double)afl->queue_cur->bitmap_size) * 100 / afl->fsrv.map_size,
+ ((double)afl->queue_cur->bitmap_size) * 100 / afl->fsrv.real_map_size,
t_byte_ratio);
SAYF(" map density : %s%-19s" bSTG bV "\n",
diff --git a/src/afl-fuzz.c b/src/afl-fuzz.c
index e9a67ac5..bd9b6691 100644
--- a/src/afl-fuzz.c
+++ b/src/afl-fuzz.c
@@ -125,7 +125,7 @@ static void usage(u8 *argv0, int more_help) {
"entering the\n"
" pacemaker mode (minutes of no new paths). 0 = "
"immediately,\n"
- " -1 = immediately and together with normal mutation).\n"
+ " -1 = immediately and together with normal mutation.\n"
" See docs/README.MOpt.md\n"
" -c program - enable CmpLog by specifying a binary compiled for "
"it.\n"
@@ -1911,7 +1911,12 @@ int main(int argc, char **argv_orig, char **envp) {
if (unlikely(afl->old_seed_selection)) seek_to = find_start_position(afl);
afl->start_time = get_cur_time();
- if (afl->in_place_resume || afl->afl_env.afl_autoresume) load_stats_file(afl);
+ if (afl->in_place_resume || afl->afl_env.afl_autoresume) {
+
+ load_stats_file(afl);
+
+ }
+
write_stats_file(afl, 0, 0, 0, 0);
maybe_update_plot_file(afl, 0, 0, 0);
save_auto(afl);
@@ -2149,7 +2154,8 @@ int main(int argc, char **argv_orig, char **envp) {
if (likely(!afl->old_seed_selection)) {
- if (unlikely(prev_queued_paths < afl->queued_paths)) {
+ if (unlikely(prev_queued_paths < afl->queued_paths ||
+ afl->reinit_table)) {
// we have new queue entries since the last run, recreate alias table
prev_queued_paths = afl->queued_paths;
diff --git a/src/afl-showmap.c b/src/afl-showmap.c
index 96b72dd9..936d3bc4 100644
--- a/src/afl-showmap.c
+++ b/src/afl-showmap.c
@@ -67,6 +67,8 @@ static char *stdin_file; /* stdin file */
static u8 *in_dir = NULL, /* input folder */
*out_file = NULL, *at_file = NULL; /* Substitution string for @@ */
+static u8 outfile[PATH_MAX];
+
static u8 *in_data, /* Input data */
*coverage_map; /* Coverage map */
@@ -88,7 +90,8 @@ static bool quiet_mode, /* Hide non-essential messages? */
have_coverage, /* have coverage? */
no_classify, /* do not classify counts */
debug, /* debug mode */
- print_filenames; /* print the current filename */
+ print_filenames, /* print the current filename */
+ wait_for_gdb;
static volatile u8 stop_soon, /* Ctrl-C pressed? */
child_crashed; /* Child crashed? */
@@ -230,7 +233,11 @@ static u32 write_results_to_file(afl_forkserver_t *fsrv, u8 *outfile) {
u8 cco = !!getenv("AFL_CMIN_CRASHES_ONLY"),
caa = !!getenv("AFL_CMIN_ALLOW_ANY");
- if (!outfile) { FATAL("Output filename not set (Bug in AFL++?)"); }
+ if (!outfile || !*outfile) {
+
+ FATAL("Output filename not set (Bug in AFL++?)");
+
+ }
if (cmin_mode &&
(fsrv->last_run_timed_out || (!caa && child_crashed != cco))) {
@@ -692,6 +699,96 @@ static void setup_signal_handlers(void) {
}
+u32 execute_testcases(u8 *dir) {
+
+ struct dirent **nl;
+ s32 nl_cnt, subdirs = 1;
+ u32 i, done = 0;
+ u8 val_buf[2][STRINGIFY_VAL_SIZE_MAX];
+
+ if (!be_quiet) { ACTF("Scanning '%s'...", dir); }
+
+ /* We use scandir() + alphasort() rather than readdir() because otherwise,
+ the ordering of test cases would vary somewhat randomly and would be
+ difficult to control. */
+
+ nl_cnt = scandir(dir, &nl, NULL, alphasort);
+
+ if (nl_cnt < 0) { return 0; }
+
+ for (i = 0; i < (u32)nl_cnt; ++i) {
+
+ struct stat st;
+
+ u8 *fn2 = alloc_printf("%s/%s", dir, nl[i]->d_name);
+
+ if (lstat(fn2, &st) || access(fn2, R_OK)) {
+
+ PFATAL("Unable to access '%s'", fn2);
+
+ }
+
+ /* obviously we want to skip "descending" into . and .. directories,
+ however it is a good idea to skip also directories that start with
+ a dot */
+ if (subdirs && S_ISDIR(st.st_mode) && nl[i]->d_name[0] != '.') {
+
+ free(nl[i]); /* not tracked */
+ done += execute_testcases(fn2);
+ ck_free(fn2);
+ continue;
+
+ }
+
+ if (!S_ISREG(st.st_mode) || !st.st_size) {
+
+ free(nl[i]);
+ ck_free(fn2);
+ continue;
+
+ }
+
+ if (st.st_size > MAX_FILE && !be_quiet) {
+
+ WARNF("Test case '%s' is too big (%s, limit is %s), partial reading", fn2,
+ stringify_mem_size(val_buf[0], sizeof(val_buf[0]), st.st_size),
+ stringify_mem_size(val_buf[1], sizeof(val_buf[1]), MAX_FILE));
+
+ }
+
+ if (!collect_coverage)
+ snprintf(outfile, sizeof(outfile), "%s/%s", out_file, nl[i]->d_name);
+
+ free(nl[i]);
+
+ if (read_file(fn2)) {
+
+ if (wait_for_gdb) {
+
+ fprintf(stderr, "exec: gdb -p %d\n", fsrv->child_pid);
+ fprintf(stderr, "exec: kill -CONT %d\n", getpid());
+ kill(0, SIGSTOP);
+
+ }
+
+ showmap_run_target_forkserver(fsrv, in_data, in_len);
+ ck_free(in_data);
+ ++done;
+
+ if (collect_coverage)
+ analyze_results(fsrv);
+ else
+ tcnt = write_results_to_file(fsrv, outfile);
+
+ }
+
+ }
+
+ free(nl); /* not tracked */
+ return done;
+
+}
+
/* Show banner. */
static void show_banner(void) {
@@ -710,31 +807,31 @@ static void usage(u8 *argv0) {
"\n%s [ options ] -- /path/to/target_app [ ... ]\n\n"
"Required parameters:\n"
- " -o file - file to write the trace data to\n\n"
+ " -o file - file to write the trace data to\n\n"
"Execution control settings:\n"
- " -t msec - timeout for each run (none)\n"
- " -m megs - memory limit for child process (%u MB)\n"
- " -O - use binary-only instrumentation (FRIDA mode)\n"
- " -Q - use binary-only instrumentation (QEMU mode)\n"
- " -U - use Unicorn-based instrumentation (Unicorn mode)\n"
- " -W - use qemu-based instrumentation with Wine (Wine mode)\n"
- " (Not necessary, here for consistency with other afl-* "
+ " -t msec - timeout for each run (none)\n"
+ " -m megs - memory limit for child process (%u MB)\n"
+ " -O - use binary-only instrumentation (FRIDA mode)\n"
+ " -Q - use binary-only instrumentation (QEMU mode)\n"
+ " -U - use Unicorn-based instrumentation (Unicorn mode)\n"
+ " -W - use qemu-based instrumentation with Wine (Wine mode)\n"
+ " (Not necessary, here for consistency with other afl-* "
"tools)\n\n"
"Other settings:\n"
- " -i dir - process all files in this directory, must be combined "
+ " -i dir - process all files below this directory, must be combined "
"with -o.\n"
- " With -C, -o is a file, without -C it must be a "
+ " With -C, -o is a file, without -C it must be a "
"directory\n"
- " and each bitmap will be written there individually.\n"
- " -C - collect coverage, writes all edges to -o and gives a "
+ " and each bitmap will be written there individually.\n"
+ " -C - collect coverage, writes all edges to -o and gives a "
"summary\n"
- " Must be combined with -i.\n"
- " -q - sink program's output and don't show messages\n"
- " -e - show edge coverage only, ignore hit counts\n"
- " -r - show real tuple values instead of AFL filter values\n"
- " -s - do not classify the map\n"
- " -c - allow core dumps\n\n"
+ " Must be combined with -i.\n"
+ " -q - sink program's output and don't show messages\n"
+ " -e - show edge coverage only, ignore hit counts\n"
+ " -r - show real tuple values instead of AFL filter values\n"
+ " -s - do not classify the map\n"
+ " -c - allow core dumps\n\n"
"This tool displays raw tuple data captured by AFL instrumentation.\n"
"For additional help, consult %s/README.md.\n\n"
@@ -1136,15 +1233,7 @@ int main(int argc, char **argv_orig, char **envp) {
if (in_dir) {
- DIR * dir_in, *dir_out = NULL;
- struct dirent **file_list;
-
- // int done = 0;
- u8 infile[PATH_MAX], outfile[PATH_MAX];
- u8 wait_for_gdb = 0;
-#if !defined(DT_REG)
- struct stat statbuf;
-#endif
+ DIR *dir_in, *dir_out = NULL;
if (getenv("AFL_DEBUG_GDB")) wait_for_gdb = true;
@@ -1177,7 +1266,7 @@ int main(int argc, char **argv_orig, char **envp) {
} else {
- if ((coverage_map = (u8 *)malloc(map_size)) == NULL)
+ if ((coverage_map = (u8 *)malloc(map_size + 64)) == NULL)
FATAL("coult not grab memory");
edges_only = false;
raw_instr_output = true;
@@ -1245,65 +1334,12 @@ int main(int argc, char **argv_orig, char **envp) {
if (fsrv->support_shmem_fuzz && !fsrv->use_shmem_fuzz)
shm_fuzz = deinit_shmem(fsrv, shm_fuzz);
- int file_count = scandir(in_dir, &file_list, NULL, alphasort);
- if (file_count < 0) {
+ if (execute_testcases(in_dir) == 0) {
- PFATAL("Failed to read from input dir at %s\n", in_dir);
+ FATAL("could not read input testcases from %s", in_dir);
}
- for (int i = 0; i < file_count; i++) {
-
- struct dirent *dir_ent = file_list[i];
-
- if (dir_ent->d_name[0] == '.') {
-
- continue; // skip anything that starts with '.'
-
- }
-
-#if defined(DT_REG) /* Posix and Solaris do not know d_type and DT_REG */
- if (dir_ent->d_type != DT_REG) {
-
- continue; // only regular files
-
- }
-
-#endif
-
- snprintf(infile, sizeof(infile), "%s/%s", in_dir, dir_ent->d_name);
-
-#if !defined(DT_REG) /* use stat() */
- if (-1 == stat(infile, &statbuf) || !S_ISREG(statbuf.st_mode)) continue;
-#endif
-
- if (!collect_coverage)
- snprintf(outfile, sizeof(outfile), "%s/%s", out_file, dir_ent->d_name);
-
- if (read_file(infile)) {
-
- if (wait_for_gdb) {
-
- fprintf(stderr, "exec: gdb -p %d\n", fsrv->child_pid);
- fprintf(stderr, "exec: kill -CONT %d\n", getpid());
- kill(0, SIGSTOP);
-
- }
-
- showmap_run_target_forkserver(fsrv, in_data, in_len);
- ck_free(in_data);
- if (collect_coverage)
- analyze_results(fsrv);
- else
- tcnt = write_results_to_file(fsrv, outfile);
-
- }
-
- }
-
- free(file_list);
- file_list = NULL;
-
if (!quiet_mode) { OKF("Processed %llu input files.", fsrv->total_execs); }
if (dir_out) { closedir(dir_out); }
diff --git a/test/test-int_cases.c b/test/test-int_cases.c
index c76206c5..93848d21 100644
--- a/test/test-int_cases.c
+++ b/test/test-int_cases.c
@@ -13,7 +13,7 @@ int main() {
volatile INT_TYPE a, b;
/* different values */
a = -21;
- b = -2; /* signs equal */
+ b = -2; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -22,7 +22,7 @@ int main() {
assert(!(a == b));
a = 1;
- b = 8; /* signs equal */
+ b = 8; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -30,10 +30,10 @@ int main() {
assert((a != b));
assert(!(a == b));
- if ((unsigned)(INT_TYPE)(~0) > 255) { /* short or bigger */
+ if ((unsigned)(INT_TYPE)(~0) > 255) { /* short or bigger */
volatile short a, b;
a = 2;
- b = 256+1; /* signs equal */
+ b = 256 + 1; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -42,7 +42,7 @@ int main() {
assert(!(a == b));
a = -1 - 256;
- b = -8; /* signs equal */
+ b = -8; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -50,10 +50,10 @@ int main() {
assert((a != b));
assert(!(a == b));
- if ((unsigned)(INT_TYPE)(~0) > 65535) { /* int or bigger */
+ if ((unsigned)(INT_TYPE)(~0) > 65535) { /* int or bigger */
volatile int a, b;
a = 2;
- b = 65536+1; /* signs equal */
+ b = 65536 + 1; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -62,7 +62,7 @@ int main() {
assert(!(a == b));
a = -1 - 65536;
- b = -8; /* signs equal */
+ b = -8; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -70,10 +70,10 @@ int main() {
assert((a != b));
assert(!(a == b));
- if ((unsigned)(INT_TYPE)(~0) > 4294967295) { /* long or bigger */
+ if ((unsigned)(INT_TYPE)(~0) > 4294967295) { /* long or bigger */
volatile long a, b;
a = 2;
- b = 4294967296+1; /* signs equal */
+ b = 4294967296 + 1; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -82,7 +82,7 @@ int main() {
assert(!(a == b));
a = -1 - 4294967296;
- b = -8; /* signs equal */
+ b = -8; /* signs equal */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -91,11 +91,13 @@ int main() {
assert(!(a == b));
}
+
}
+
}
a = -1;
- b = 1; /* signs differ */
+ b = 1; /* signs differ */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -104,7 +106,7 @@ int main() {
assert(!(a == b));
a = -1;
- b = 0; /* signs differ */
+ b = 0; /* signs differ */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -113,7 +115,7 @@ int main() {
assert(!(a == b));
a = -2;
- b = 8; /* signs differ */
+ b = 8; /* signs differ */
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -122,7 +124,7 @@ int main() {
assert(!(a == b));
a = -1;
- b = -2; /* signs equal */
+ b = -2; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -131,7 +133,7 @@ int main() {
assert(!(a == b));
a = 8;
- b = 1; /* signs equal */
+ b = 1; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -140,9 +142,10 @@ int main() {
assert(!(a == b));
if ((unsigned)(INT_TYPE)(~0) > 255) {
+
volatile short a, b;
a = 1 + 256;
- b = 3; /* signs equal */
+ b = 3; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -151,7 +154,7 @@ int main() {
assert(!(a == b));
a = -1;
- b = -256; /* signs equal */
+ b = -256; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -160,9 +163,10 @@ int main() {
assert(!(a == b));
if ((unsigned)(INT_TYPE)(~0) > 65535) {
+
volatile int a, b;
a = 1 + 65536;
- b = 3; /* signs equal */
+ b = 3; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -171,7 +175,7 @@ int main() {
assert(!(a == b));
a = -1;
- b = -65536; /* signs equal */
+ b = -65536; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -180,30 +184,34 @@ int main() {
assert(!(a == b));
if ((unsigned)(INT_TYPE)(~0) > 4294967295) {
+
volatile long a, b;
a = 1 + 4294967296;
- b = 3; /* signs equal */
+ b = 3; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
assert(!(a <= b));
assert((a != b));
assert(!(a == b));
-
+
a = -1;
- b = -4294967296; /* signs equal */
+ b = -4294967296; /* signs equal */
assert((a > b));
assert((a >= b));
assert(!(a < b));
assert(!(a <= b));
assert((a != b));
assert(!(a == b));
+
}
+
}
+
}
a = 1;
- b = -1; /* signs differ */
+ b = -1; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -212,7 +220,7 @@ int main() {
assert(!(a == b));
a = 0;
- b = -1; /* signs differ */
+ b = -1; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -221,7 +229,7 @@ int main() {
assert(!(a == b));
a = 8;
- b = -2; /* signs differ */
+ b = -2; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -230,7 +238,7 @@ int main() {
assert(!(a == b));
a = 1;
- b = -2; /* signs differ */
+ b = -2; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -239,9 +247,10 @@ int main() {
assert(!(a == b));
if ((unsigned)(INT_TYPE)(~0) > 255) {
+
volatile short a, b;
a = 1 + 256;
- b = -2; /* signs differ */
+ b = -2; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -250,7 +259,7 @@ int main() {
assert(!(a == b));
a = -1;
- b = -2 - 256; /* signs differ */
+ b = -2 - 256; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -259,18 +268,19 @@ int main() {
assert(!(a == b));
if ((unsigned)(INT_TYPE)(~0) > 65535) {
+
volatile int a, b;
a = 1 + 65536;
- b = -2; /* signs differ */
+ b = -2; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
assert(!(a <= b));
assert((a != b));
assert(!(a == b));
-
+
a = -1;
- b = -2 - 65536; /* signs differ */
+ b = -2 - 65536; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -279,18 +289,19 @@ int main() {
assert(!(a == b));
if ((unsigned)(INT_TYPE)(~0) > 4294967295) {
+
volatile long a, b;
a = 1 + 4294967296;
- b = -2; /* signs differ */
+ b = -2; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
assert(!(a <= b));
assert((a != b));
assert(!(a == b));
-
+
a = -1;
- b = -2 - 4294967296; /* signs differ */
+ b = -2 - 4294967296; /* signs differ */
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -299,7 +310,9 @@ int main() {
assert(!(a == b));
}
+
}
+
}
/* equal values */
@@ -358,6 +371,7 @@ int main() {
assert((a == b));
if ((unsigned)(INT_TYPE)(~0) > 255) {
+
volatile short a, b;
a = 1 + 256;
b = 1 + 256;
@@ -378,6 +392,7 @@ int main() {
assert((a == b));
if ((unsigned)(INT_TYPE)(~0) > 65535) {
+
volatile int a, b;
a = 1 + 65536;
b = 1 + 65536;
@@ -387,7 +402,7 @@ int main() {
assert((a >= b));
assert(!(a != b));
assert((a == b));
-
+
a = -2 - 65536;
b = -2 - 65536;
assert(!(a < b));
@@ -398,6 +413,7 @@ int main() {
assert((a == b));
if ((unsigned)(INT_TYPE)(~0) > 4294967295) {
+
volatile long a, b;
a = 1 + 4294967296;
b = 1 + 4294967296;
@@ -407,7 +423,7 @@ int main() {
assert((a >= b));
assert(!(a != b));
assert((a == b));
-
+
a = -2 - 4294967296;
b = -2 - 4294967296;
assert(!(a < b));
@@ -416,9 +432,12 @@ int main() {
assert((a >= b));
assert(!(a != b));
assert((a == b));
-
+
}
+
}
+
}
+
}
diff --git a/test/test-llvm.sh b/test/test-llvm.sh
index 8090e176..aa40c5ed 100755
--- a/test/test-llvm.sh
+++ b/test/test-llvm.sh
@@ -191,7 +191,7 @@ test -e ../afl-clang-fast -a -e ../split-switches-pass.so && {
for I in char short int long "long long"; do
for BITS in 8 16 32 64; do
bin="$testcase-split-$I-$BITS.compcov"
- AFL_LLVM_INSTRUMENT=AFL AFL_DEBUG=1 AFL_LLVM_LAF_SPLIT_COMPARES_BITW=$BITS AFL_LLVM_LAF_SPLIT_COMPARES=1 ../afl-clang-fast -DINT_TYPE="$I" -o "$bin" "$testcase" > test.out 2>&1;
+ AFL_LLVM_INSTRUMENT=AFL AFL_DEBUG=1 AFL_LLVM_LAF_SPLIT_COMPARES_BITW=$BITS AFL_LLVM_LAF_SPLIT_COMPARES=1 ../afl-clang-fast -fsigned-char -DINT_TYPE="$I" -o "$bin" "$testcase" > test.out 2>&1;
if ! test -e "$bin"; then
cat test.out
$ECHO "$RED[!] llvm_mode laf-intel/compcov integer splitting failed! ($testcase with type $I split to $BITS)!";
diff --git a/test/test-uint_cases.c b/test/test-uint_cases.c
index a277e28a..bb57f408 100644
--- a/test/test-uint_cases.c
+++ b/test/test-uint_cases.c
@@ -22,9 +22,10 @@ int main() {
assert(!(a == b));
if ((INT_TYPE)(~0) > 255) {
+
volatile unsigned short a, b;
- a = 256+2;
- b = 256+21;
+ a = 256 + 2;
+ b = 256 + 21;
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -33,7 +34,7 @@ int main() {
assert(!(a == b));
a = 21;
- b = 256+1;
+ b = 256 + 1;
assert((a < b));
assert((a <= b));
assert(!(a > b));
@@ -42,46 +43,51 @@ int main() {
assert(!(a == b));
if ((INT_TYPE)(~0) > 65535) {
+
volatile unsigned int a, b;
- a = 65536+2;
- b = 65536+21;
+ a = 65536 + 2;
+ b = 65536 + 21;
assert((a < b));
assert((a <= b));
assert(!(a > b));
assert(!(a >= b));
assert((a != b));
assert(!(a == b));
-
+
a = 21;
- b = 65536+1;
+ b = 65536 + 1;
assert((a < b));
assert((a <= b));
assert(!(a > b));
assert(!(a >= b));
assert((a != b));
assert(!(a == b));
+
}
if ((INT_TYPE)(~0) > 4294967295) {
+
volatile unsigned long a, b;
- a = 4294967296+2;
- b = 4294967296+21;
+ a = 4294967296 + 2;
+ b = 4294967296 + 21;
assert((a < b));
assert((a <= b));
assert(!(a > b));
assert(!(a >= b));
assert((a != b));
assert(!(a == b));
-
+
a = 21;
- b = 4294967296+1;
+ b = 4294967296 + 1;
assert((a < b));
assert((a <= b));
assert(!(a > b));
assert(!(a >= b));
assert((a != b));
assert(!(a == b));
+
}
+
}
a = 8;
@@ -94,9 +100,10 @@ int main() {
assert(!(a == b));
if ((INT_TYPE)(~0) > 255) {
+
volatile unsigned short a, b;
- a = 256+2;
- b = 256+1;
+ a = 256 + 2;
+ b = 256 + 1;
assert((a > b));
assert((a >= b));
assert(!(a < b));
@@ -104,7 +111,7 @@ int main() {
assert((a != b));
assert(!(a == b));
- a = 256+2;
+ a = 256 + 2;
b = 6;
assert((a > b));
assert((a >= b));
@@ -114,17 +121,18 @@ int main() {
assert(!(a == b));
if ((INT_TYPE)(~0) > 65535) {
+
volatile unsigned int a, b;
- a = 65536+2;
- b = 65536+1;
+ a = 65536 + 2;
+ b = 65536 + 1;
assert((a > b));
assert((a >= b));
assert(!(a < b));
assert(!(a <= b));
assert((a != b));
assert(!(a == b));
-
- a = 65536+2;
+
+ a = 65536 + 2;
b = 6;
assert((a > b));
assert((a >= b));
@@ -134,17 +142,18 @@ int main() {
assert(!(a == b));
if ((INT_TYPE)(~0) > 4294967295) {
+
volatile unsigned long a, b;
- a = 4294967296+2;
- b = 4294967296+1;
+ a = 4294967296 + 2;
+ b = 4294967296 + 1;
assert((a > b));
assert((a >= b));
assert(!(a < b));
assert(!(a <= b));
assert((a != b));
assert(!(a == b));
-
- a = 4294967296+2;
+
+ a = 4294967296 + 2;
b = 6;
assert((a > b));
assert((a >= b));
@@ -154,9 +163,10 @@ int main() {
assert(!(a == b));
}
+
}
- }
+ }
a = 0;
b = 0;
@@ -177,9 +187,10 @@ int main() {
assert((a == b));
if ((INT_TYPE)(~0) > 255) {
+
volatile unsigned short a, b;
- a = 256+5;
- b = 256+5;
+ a = 256 + 5;
+ b = 256 + 5;
assert(!(a < b));
assert((a <= b));
assert(!(a > b));
@@ -188,9 +199,10 @@ int main() {
assert((a == b));
if ((INT_TYPE)(~0) > 65535) {
+
volatile unsigned int a, b;
- a = 65536+5;
- b = 65536+5;
+ a = 65536 + 5;
+ b = 65536 + 5;
assert(!(a < b));
assert((a <= b));
assert(!(a > b));
@@ -199,16 +211,19 @@ int main() {
assert((a == b));
if ((INT_TYPE)(~0) > 4294967295) {
+
volatile unsigned long a, b;
- a = 4294967296+5;
- b = 4294967296+5;
+ a = 4294967296 + 5;
+ b = 4294967296 + 5;
assert(!(a < b));
assert((a <= b));
assert(!(a > b));
assert((a >= b));
assert(!(a != b));
assert((a == b));
+
}
+
}
}
diff --git a/unicorn_mode/UNICORNAFL_VERSION b/unicorn_mode/UNICORNAFL_VERSION
index ffcf3b4c..5db24eec 100644
--- a/unicorn_mode/UNICORNAFL_VERSION
+++ b/unicorn_mode/UNICORNAFL_VERSION
@@ -1 +1 @@
-019b871539fe9ed3f41d882385a8b02c243d49ad
+0d82727f2b477de82fa355edef9bc158bd25d374
diff --git a/unicorn_mode/samples/speedtest/get_offsets.py b/unicorn_mode/samples/speedtest/get_offsets.py
index c9dc76df..72fb6293 100755
--- a/unicorn_mode/samples/speedtest/get_offsets.py
+++ b/unicorn_mode/samples/speedtest/get_offsets.py
@@ -59,7 +59,7 @@ for line in objdump_output.split("\n"):
last_line = line
if main_loc is None:
- raise (
+ raise Exception(
"Could not find main in ./target! Make sure objdump is installed and the target is compiled."
)
diff --git a/unicorn_mode/samples/speedtest/rust/Makefile b/unicorn_mode/samples/speedtest/rust/Makefile
index 46934c93..8b91268e 100644
--- a/unicorn_mode/samples/speedtest/rust/Makefile
+++ b/unicorn_mode/samples/speedtest/rust/Makefile
@@ -16,7 +16,7 @@ clean:
cargo build
../target:
- $(MAKE) -c ..
+ $(MAKE) -C ..
fuzz: all afl-fuzz
rm -rf ./output
diff --git a/unicorn_mode/samples/speedtest/rust/src/main.rs b/unicorn_mode/samples/speedtest/rust/src/main.rs
index 9ea1b873..105ba4b4 100644
--- a/unicorn_mode/samples/speedtest/rust/src/main.rs
+++ b/unicorn_mode/samples/speedtest/rust/src/main.rs
@@ -195,7 +195,7 @@ fn fuzz(input_file: &str) -> Result<(), uc_error> {
}
let place_input_callback =
- |mut uc: UnicornHandle<'_, _>, afl_input: &mut [u8], _persistent_round| {
+ |uc: &mut UnicornHandle<'_, _>, afl_input: &mut [u8], _persistent_round| {
// apply constraints to the mutated input
if afl_input.len() > INPUT_MAX as usize {
//println!("Skipping testcase with leng {}", afl_input.len());
@@ -209,7 +209,7 @@ fn fuzz(input_file: &str) -> Result<(), uc_error> {
// return true if the last run should be counted as crash
let crash_validation_callback =
- |_uc: UnicornHandle<'_, _>, result, _input: &[u8], _persistent_round| {
+ |_uc: &mut UnicornHandle<'_, _>, result, _input: &[u8], _persistent_round| {
result != uc_error::OK
};
@@ -217,9 +217,9 @@ fn fuzz(input_file: &str) -> Result<(), uc_error> {
let ret = uc.afl_fuzz(
input_file,
- Box::new(place_input_callback),
+ place_input_callback,
&end_addrs,
- Box::new(crash_validation_callback),
+ crash_validation_callback,
false,
1000,
);
diff --git a/unicorn_mode/unicornafl b/unicorn_mode/unicornafl
-Subproject 019b871539fe9ed3f41d882385a8b02c243d49a
+Subproject 0d82727f2b477de82fa355edef9bc158bd25d37