Frida switch from walk-proc-maps to frida-gum based extraction of ranges (#149)
* Bump frida-gum version * Move from walk of /proc/pid/maps to frida based range/module locatoin
This commit is contained in:
parent
156ed08905
commit
636194de0e
@ -24,7 +24,7 @@ which = "4.1"
|
||||
libafl = { path = "../../libafl/", features = [ "std", "llmp_bind_public" ] } #, "llmp_small_maps", "llmp_debug"]}
|
||||
libafl_frida = { path = "../../libafl_frida" }
|
||||
capstone = "0.8.0"
|
||||
frida-gum = { version = "0.5.1", features = [ "auto-download", "backtrace", "event-sink", "invocation-listener"] }
|
||||
frida-gum = { version = "0.5.2", features = [ "auto-download", "backtrace", "event-sink", "invocation-listener"] }
|
||||
lazy_static = "1.4.0"
|
||||
libc = "0.2"
|
||||
libloading = "0.7.0"
|
||||
|
@ -242,7 +242,6 @@ pub fn main() {
|
||||
.value_of("modules_to_instrument")
|
||||
.unwrap()
|
||||
.split(':')
|
||||
.map(|module_name| std::fs::canonicalize(module_name).unwrap())
|
||||
.collect::<Vec<_>>(),
|
||||
//modules_to_instrument,
|
||||
&[PathBuf::from("./corpus")],
|
||||
@ -278,7 +277,7 @@ fn fuzz(
|
||||
unsafe fn fuzz(
|
||||
module_name: &str,
|
||||
symbol_name: &str,
|
||||
modules_to_instrument: &[PathBuf],
|
||||
modules_to_instrument: &[&str],
|
||||
corpus_dirs: &[PathBuf],
|
||||
objective_dir: &Path,
|
||||
broker_port: u16,
|
||||
|
@ -90,75 +90,6 @@ pub fn startable_self() -> Result<Command, Error> {
|
||||
Ok(startable)
|
||||
}
|
||||
|
||||
/// Allows one to walk the mappings in /proc/self/maps, caling a callback function for each
|
||||
/// mapping.
|
||||
/// If the callback returns true, we stop the walk.
|
||||
#[cfg(all(feature = "std", any(target_os = "linux", target_os = "android")))]
|
||||
pub fn walk_self_maps(visitor: &mut dyn FnMut(usize, usize, String, String) -> bool) {
|
||||
use regex::Regex;
|
||||
use std::io::{BufRead, BufReader};
|
||||
let re = Regex::new(r"^(?P<start>[0-9a-f]{8,16})-(?P<end>[0-9a-f]{8,16}) (?P<perm>[-rwxp]{4}) (?P<offset>[0-9a-f]{8}) [0-9a-f]+:[0-9a-f]+ [0-9]+\s+(?P<path>.*)$")
|
||||
.unwrap();
|
||||
|
||||
let mapsfile = File::open("/proc/self/maps").expect("Unable to open /proc/self/maps");
|
||||
|
||||
for line in BufReader::new(mapsfile).lines() {
|
||||
let line = line.unwrap();
|
||||
if let Some(caps) = re.captures(&line) {
|
||||
if visitor(
|
||||
usize::from_str_radix(caps.name("start").unwrap().as_str(), 16).unwrap(),
|
||||
usize::from_str_radix(caps.name("end").unwrap().as_str(), 16).unwrap(),
|
||||
caps.name("perm").unwrap().as_str().to_string(),
|
||||
caps.name("path").unwrap().as_str().to_string(),
|
||||
) {
|
||||
break;
|
||||
};
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Get the start and end address, permissions and path of the mapping containing a particular address
|
||||
#[cfg(all(feature = "std", any(target_os = "linux", target_os = "android")))]
|
||||
pub fn find_mapping_for_address(address: usize) -> Result<(usize, usize, String, String), Error> {
|
||||
let mut result = (0, 0, "".to_string(), "".to_string());
|
||||
walk_self_maps(&mut |start, end, permissions, path| {
|
||||
if start <= address && address < end {
|
||||
result = (start, end, permissions, path);
|
||||
true
|
||||
} else {
|
||||
false
|
||||
}
|
||||
});
|
||||
|
||||
if result.0 == 0 {
|
||||
Err(Error::Unknown(
|
||||
"Couldn't find a mapping for this address".to_string(),
|
||||
))
|
||||
} else {
|
||||
Ok(result)
|
||||
}
|
||||
}
|
||||
|
||||
/// Get the start and end address of the mapping containing with a particular path
|
||||
#[cfg(all(feature = "std", any(target_os = "linux", target_os = "android")))]
|
||||
#[must_use]
|
||||
pub fn find_mapping_for_path(libpath: &str) -> (usize, usize) {
|
||||
let mut libstart = 0;
|
||||
let mut libend = 0;
|
||||
walk_self_maps(&mut |start, end, _permissions, path| {
|
||||
if libpath == path {
|
||||
if libstart == 0 {
|
||||
libstart = start;
|
||||
}
|
||||
|
||||
libend = end;
|
||||
}
|
||||
false
|
||||
});
|
||||
|
||||
(libstart, libend)
|
||||
}
|
||||
|
||||
/// "Safe" wrapper around dup2
|
||||
#[cfg(all(unix, feature = "std"))]
|
||||
pub fn dup2(fd: i32, device: i32) -> Result<(), Error> {
|
||||
|
@ -450,21 +450,11 @@ mod unix_signal_handler {
|
||||
target_arch = "aarch64"
|
||||
))]
|
||||
{
|
||||
use crate::bolts::os::find_mapping_for_address;
|
||||
println!("{:━^100}", " CRASH ");
|
||||
println!(
|
||||
"Received signal {} at 0x{:016x}, fault address: 0x{:016x}",
|
||||
_signal, _context.uc_mcontext.pc, _context.uc_mcontext.fault_address
|
||||
);
|
||||
if let Ok((start, _, _, path)) =
|
||||
find_mapping_for_address(_context.uc_mcontext.pc as usize)
|
||||
{
|
||||
println!(
|
||||
"pc is at offset 0x{:08x} in {}",
|
||||
_context.uc_mcontext.pc as usize - start,
|
||||
path
|
||||
);
|
||||
}
|
||||
|
||||
println!("{:━^100}", " REGISTERS ");
|
||||
for reg in 0..31 {
|
||||
|
@ -22,7 +22,7 @@ hashbrown = "0.11"
|
||||
libloading = "0.7.0"
|
||||
rangemap = "0.1.10"
|
||||
frida-gum-sys = { version = "0.3", features = [ "auto-download", "event-sink", "invocation-listener"] }
|
||||
frida-gum = { version = "0.5.1", features = [ "auto-download", "backtrace", "event-sink", "invocation-listener"] }
|
||||
frida-gum = { version = "0.5.2", features = [ "auto-download", "backtrace", "event-sink", "invocation-listener"] }
|
||||
core_affinity = { version = "0.5", git = "https://github.com/s1341/core_affinity_rs" }
|
||||
regex = "1.4"
|
||||
dynasmrt = "1.0.1"
|
||||
|
@ -1,6 +1,5 @@
|
||||
use frida_gum::{PageProtection, RangeDetails};
|
||||
use hashbrown::HashMap;
|
||||
#[cfg(any(target_os = "linux", target_os = "android"))]
|
||||
use libafl::bolts::os::walk_self_maps;
|
||||
use nix::{
|
||||
libc::memset,
|
||||
sys::mman::{mmap, MapFlags, ProtFlags},
|
||||
@ -220,19 +219,18 @@ impl Allocator {
|
||||
metadata
|
||||
} else {
|
||||
if !ptr.is_null() {
|
||||
AsanErrors::get_mut().report_error(
|
||||
AsanError::UnallocatedFree((ptr as usize, Backtrace::new())),
|
||||
None,
|
||||
);
|
||||
AsanErrors::get_mut()
|
||||
.report_error(AsanError::UnallocatedFree((ptr as usize, Backtrace::new())));
|
||||
}
|
||||
return;
|
||||
};
|
||||
|
||||
if metadata.freed {
|
||||
AsanErrors::get_mut().report_error(
|
||||
AsanError::DoubleFree((ptr as usize, metadata.clone(), Backtrace::new())),
|
||||
None,
|
||||
);
|
||||
AsanErrors::get_mut().report_error(AsanError::DoubleFree((
|
||||
ptr as usize,
|
||||
metadata.clone(),
|
||||
Backtrace::new(),
|
||||
)));
|
||||
}
|
||||
let shadow_mapping_start = map_to_shadow!(self, ptr as usize);
|
||||
|
||||
@ -389,21 +387,23 @@ impl Allocator {
|
||||
for metadata in self.allocations.values() {
|
||||
if !metadata.freed {
|
||||
AsanErrors::get_mut()
|
||||
.report_error(AsanError::Leak((metadata.address, metadata.clone())), None);
|
||||
.report_error(AsanError::Leak((metadata.address, metadata.clone())));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Unpoison all the memory that is currently mapped with read/write permissions.
|
||||
pub fn unpoison_all_existing_memory(&mut self) {
|
||||
walk_self_maps(&mut |start, end, permissions, _path| {
|
||||
if permissions.as_bytes()[0] == b'r' || permissions.as_bytes()[1] == b'w' {
|
||||
RangeDetails::enumerate_with_prot(PageProtection::NoAccess, &mut |range: &RangeDetails| {
|
||||
if range.protection() as u32 & PageProtection::ReadWrite as u32 != 0 {
|
||||
let start = range.memory_range().base_address().0 as usize;
|
||||
let end = start + range.memory_range().size();
|
||||
if self.pre_allocated_shadow && start == 1 << self.shadow_bit {
|
||||
return false;
|
||||
return true;
|
||||
}
|
||||
self.map_shadow_for_region(start, end, true);
|
||||
}
|
||||
false
|
||||
true
|
||||
});
|
||||
}
|
||||
}
|
||||
|
@ -3,9 +3,7 @@ use capstone::{arch::BuildsCapstone, Capstone};
|
||||
use color_backtrace::{default_output_stream, BacktracePrinter, Verbosity};
|
||||
#[cfg(target_arch = "aarch64")]
|
||||
use frida_gum::interceptor::Interceptor;
|
||||
|
||||
#[cfg(any(target_os = "linux", target_os = "android"))]
|
||||
use libafl::bolts::os::find_mapping_for_address;
|
||||
use frida_gum::ModuleDetails;
|
||||
|
||||
use libafl::{
|
||||
bolts::{ownedref::OwnedPtr, tuples::Named},
|
||||
@ -18,7 +16,6 @@ use libafl::{
|
||||
state::HasMetadata,
|
||||
Error, SerdeAny,
|
||||
};
|
||||
use rangemap::RangeMap;
|
||||
use serde::{Deserialize, Serialize};
|
||||
use std::io::Write;
|
||||
use termcolor::{Color, ColorSpec, WriteColor};
|
||||
@ -111,11 +108,7 @@ impl AsanErrors {
|
||||
|
||||
/// Report an error
|
||||
#[allow(clippy::too_many_lines)]
|
||||
pub(crate) fn report_error(
|
||||
&mut self,
|
||||
error: AsanError,
|
||||
instrumented_ranges: Option<&RangeMap<usize, String>>,
|
||||
) {
|
||||
pub(crate) fn report_error(&mut self, error: AsanError) {
|
||||
self.errors.push(error.clone());
|
||||
|
||||
let mut out_stream = default_output_stream();
|
||||
@ -144,13 +137,13 @@ impl AsanErrors {
|
||||
| AsanError::WriteAfterFree(mut error) => {
|
||||
let (basereg, indexreg, _displacement, fault_address) = error.fault;
|
||||
|
||||
if let Some((range, path)) = instrumented_ranges.unwrap().get_key_value(&error.pc) {
|
||||
if let Some(module_details) = ModuleDetails::with_address(error.pc as u64) {
|
||||
writeln!(
|
||||
output,
|
||||
" at 0x{:x} ({}@0x{:04x}), faulting address 0x{:x}",
|
||||
error.pc,
|
||||
path,
|
||||
error.pc - range.start,
|
||||
module_details.path(),
|
||||
error.pc - module_details.range().base_address().0 as usize,
|
||||
fault_address
|
||||
)
|
||||
.unwrap();
|
||||
@ -267,17 +260,17 @@ impl AsanErrors {
|
||||
{
|
||||
let invocation = Interceptor::current_invocation();
|
||||
let cpu_context = invocation.cpu_context();
|
||||
if let Some((range, path)) = instrumented_ranges.unwrap().get_key_value(&pc) {
|
||||
if let Some(module_details) = ModuleDetails::with_address(pc as u64) {
|
||||
writeln!(
|
||||
output,
|
||||
" at 0x{:x} ({}@0x{:04x})",
|
||||
pc,
|
||||
path,
|
||||
pc - range.start,
|
||||
module_details.path(),
|
||||
pc - module_details.range().base_address().0 as usize,
|
||||
)
|
||||
.unwrap();
|
||||
} else {
|
||||
writeln!(output, " at 0x{:x}", pc,).unwrap();
|
||||
writeln!(output, " at 0x{:x}", pc).unwrap();
|
||||
}
|
||||
|
||||
#[allow(clippy::non_ascii_literal)]
|
||||
@ -364,13 +357,13 @@ impl AsanErrors {
|
||||
| AsanError::StackOobWrite((registers, pc, fault, backtrace)) => {
|
||||
let (basereg, indexreg, _displacement, fault_address) = fault;
|
||||
|
||||
if let Ok((start, _, _, path)) = find_mapping_for_address(pc) {
|
||||
if let Some(module_details) = ModuleDetails::with_address(pc as u64) {
|
||||
writeln!(
|
||||
output,
|
||||
" at 0x{:x} ({}:0x{:04x}), faulting address 0x{:x}",
|
||||
pc,
|
||||
path,
|
||||
pc - start,
|
||||
module_details.path(),
|
||||
pc - module_details.range().base_address().0 as usize,
|
||||
fault_address
|
||||
)
|
||||
.unwrap();
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -3,9 +3,6 @@ use std::hash::Hasher;
|
||||
|
||||
use libafl::inputs::{HasTargetBytes, Input};
|
||||
|
||||
#[cfg(any(target_os = "linux", target_os = "android"))]
|
||||
use libafl::bolts::os::find_mapping_for_path;
|
||||
|
||||
use libafl_targets::drcov::{DrCovBasicBlock, DrCovWriter};
|
||||
|
||||
#[cfg(target_arch = "aarch64")]
|
||||
@ -26,14 +23,13 @@ use frida_gum::instruction_writer::{Aarch64Register, IndexMode};
|
||||
use frida_gum::{
|
||||
instruction_writer::InstructionWriter,
|
||||
stalker::{StalkerOutput, Transformer},
|
||||
CpuContext,
|
||||
CpuContext, ModuleDetails, ModuleMap,
|
||||
};
|
||||
use frida_gum::{Gum, Module, PageProtection};
|
||||
#[cfg(target_arch = "aarch64")]
|
||||
use num_traits::cast::FromPrimitive;
|
||||
|
||||
use rangemap::RangeMap;
|
||||
use std::path::PathBuf;
|
||||
|
||||
use nix::sys::mman::{mmap, MapFlags, ProtFlags};
|
||||
|
||||
@ -59,7 +55,7 @@ pub trait FridaHelper<'a> {
|
||||
/// pointer to the frida coverage map
|
||||
fn map_ptr(&mut self) -> *mut u8;
|
||||
|
||||
fn ranges(&self) -> &RangeMap<usize, (u16, &str)>;
|
||||
fn ranges(&self) -> &RangeMap<usize, (u16, String)>;
|
||||
}
|
||||
|
||||
/// (Default) map size for frida coverage reporting
|
||||
@ -77,7 +73,8 @@ pub struct FridaInstrumentationHelper<'a> {
|
||||
#[cfg(target_arch = "aarch64")]
|
||||
capstone: Capstone,
|
||||
asan_runtime: AsanRuntime,
|
||||
ranges: RangeMap<usize, (u16, &'a str)>,
|
||||
ranges: RangeMap<usize, (u16, String)>,
|
||||
module_map: ModuleMap,
|
||||
options: &'a FridaOptions,
|
||||
drcov_basic_blocks: Vec<DrCovBasicBlock>,
|
||||
}
|
||||
@ -125,7 +122,7 @@ impl<'a> FridaHelper<'a> for FridaInstrumentationHelper<'a> {
|
||||
self.map.as_mut_ptr()
|
||||
}
|
||||
|
||||
fn ranges(&self) -> &RangeMap<usize, (u16, &str)> {
|
||||
fn ranges(&self) -> &RangeMap<usize, (u16, String)> {
|
||||
&self.ranges
|
||||
}
|
||||
}
|
||||
@ -220,7 +217,7 @@ impl<'a> FridaInstrumentationHelper<'a> {
|
||||
gum: &'a Gum,
|
||||
options: &'a FridaOptions,
|
||||
_harness_module_name: &str,
|
||||
modules_to_instrument: &'a [PathBuf],
|
||||
modules_to_instrument: &'a [&str],
|
||||
) -> Self {
|
||||
// workaround frida's frida-gum-allocate-near bug:
|
||||
unsafe {
|
||||
@ -262,31 +259,23 @@ impl<'a> FridaInstrumentationHelper<'a> {
|
||||
.expect("Failed to create Capstone object"),
|
||||
asan_runtime: AsanRuntime::new(options.clone()),
|
||||
ranges: RangeMap::new(),
|
||||
module_map: ModuleMap::new_from_names(modules_to_instrument),
|
||||
options,
|
||||
drcov_basic_blocks: vec![],
|
||||
};
|
||||
|
||||
if helper.options().stalker_enabled() {
|
||||
for (id, module_name) in modules_to_instrument.iter().enumerate() {
|
||||
let (lib_start, lib_end) = find_mapping_for_path(module_name.to_str().unwrap());
|
||||
println!(
|
||||
"including range {:x}-{:x} for {:?}",
|
||||
lib_start, lib_end, module_name
|
||||
);
|
||||
helper.ranges.insert(
|
||||
lib_start..lib_end,
|
||||
(id as u16, module_name.to_str().unwrap()),
|
||||
);
|
||||
for (i, module) in helper.module_map.values().iter().enumerate() {
|
||||
let range = module.range();
|
||||
let start = range.base_address().0 as usize;
|
||||
helper
|
||||
.ranges
|
||||
.insert(start..(start + range.size()), (i as u16, module.path()));
|
||||
}
|
||||
|
||||
if let Some(suppressed_specifiers) = helper.options().dont_instrument_locations() {
|
||||
for (module_name, offset) in suppressed_specifiers {
|
||||
let (lib_start, _) = find_mapping_for_path(
|
||||
std::fs::canonicalize(&module_name)
|
||||
.unwrap()
|
||||
.to_str()
|
||||
.unwrap(),
|
||||
);
|
||||
let module_details = ModuleDetails::with_name(module_name).unwrap();
|
||||
let lib_start = module_details.range().base_address().0 as usize;
|
||||
println!("removing address: {:#x}", lib_start + offset);
|
||||
helper
|
||||
.ranges
|
||||
|
@ -18,7 +18,7 @@ pub struct DrCovBasicBlock {
|
||||
/// A writer for `DrCov` files
|
||||
pub struct DrCovWriter<'a> {
|
||||
writer: BufWriter<File>,
|
||||
module_mapping: &'a RangeMap<usize, (u16, &'a str)>,
|
||||
module_mapping: &'a RangeMap<usize, (u16, String)>,
|
||||
basic_blocks: &'a mut Vec<DrCovBasicBlock>,
|
||||
}
|
||||
|
||||
@ -40,7 +40,7 @@ impl<'a> DrCovWriter<'a> {
|
||||
/// Create a new [`DrCovWriter`]
|
||||
pub fn new(
|
||||
path: &str,
|
||||
module_mapping: &'a RangeMap<usize, (u16, &str)>,
|
||||
module_mapping: &'a RangeMap<usize, (u16, String)>,
|
||||
basic_blocks: &'a mut Vec<DrCovBasicBlock>,
|
||||
) -> Self {
|
||||
Self {
|
||||
@ -58,7 +58,7 @@ impl<'a> DrCovWriter<'a> {
|
||||
.write_all(b"DRCOV VERSION: 2\nDRCOV FLAVOR: libafl\n")
|
||||
.unwrap();
|
||||
|
||||
let modules: Vec<(&std::ops::Range<usize>, &(u16, &str))> =
|
||||
let modules: Vec<(&std::ops::Range<usize>, &(u16, String))> =
|
||||
self.module_mapping.iter().collect();
|
||||
self.writer
|
||||
.write_all(format!("Module Table: version 2, count {}\n", modules.len()).as_bytes())
|
||||
|
Loading…
x
Reference in New Issue
Block a user