Merge branch 'vh' into vh_dcm

This commit is contained in:
van Hauser 2020-12-20 16:09:01 +01:00 committed by GitHub
commit ae9d77ee99
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 41 additions and 16 deletions

View File

@ -149,6 +149,12 @@ where
I: Input,
R: Rand,
{
/// Returns the number of elements
#[inline]
fn count(&self) -> usize {
self.entries().len()
}
/// Gets the next entry
#[inline]
fn next(&mut self, rand: &mut R) -> Result<(&RefCell<Testcase<I>>, usize), AflError> {

View File

@ -1,7 +1,12 @@
#include <stdio.h>
#include <stdint.h>
#define MAP_SIZE 65536
int orig_argc;
char **orig_argv;
char **orig_envp;
uint8_t __lafl_dummy_map[MAP_SIZE];
uint8_t *__lafl_edges_map = __lafl_dummy_map;
@ -119,13 +124,22 @@ void __sanitizer_cov_trace_switch(uint64_t val, uint64_t *cases) {
}
static void afl_libfuzzer_copy_args(int argc, char** argv, char** envp) {
orig_argc = argc;
orig_argv = argv;
orig_envp = envp;
}
__attribute__((section(".init_array"))) void (* p_afl_libfuzzer_copy_args)(int,char*[],char*[]) = &afl_libfuzzer_copy_args;
__attribute__((weak)) int LLVMFuzzerInitialize(int *argc, char ***argv);
void afl_libfuzzer_main();
int afl_libfuzzer_init(int argc, char **argv) {
int afl_libfuzzer_init() {
if (LLVMFuzzerInitialize)
return LLVMFuzzerInitialize(&argc, &argv);
return LLVMFuzzerInitialize(&orig_argc, &orig_argv);
else
return 0;

View File

@ -7,6 +7,7 @@ extern crate alloc;
use clap::{App, Arg};
use std::env;
use afl::corpus::Corpus;
use afl::corpus::InMemoryCorpus;
use afl::engines::Engine;
use afl::engines::Fuzzer;
@ -28,8 +29,8 @@ extern "C" {
/// int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
fn LLVMFuzzerTestOneInput(data: *const u8, size: usize) -> i32;
/// int LLVMFuzzerInitialize(int argc, char **argv)
fn afl_libfuzzer_init(argc: u32, argv: *const *const u8) -> i32;
// afl_libfuzzer_init calls LLVMFUzzerInitialize()
fn afl_libfuzzer_init() -> i32;
static __lafl_edges_map: *mut u8;
static __lafl_cmp_map: *mut u8;
@ -143,11 +144,12 @@ pub extern "C" fn afl_libfuzzer_main() {
let mut engine = Engine::new(executor);
// unsafe {
// if afl_libfuzzer_init(...) == -1 {
// println("Warning: LLVMFuzzerInitialize failed with -1")
// }
// }
// Call LLVMFUzzerInitialize() if present.
unsafe {
if afl_libfuzzer_init() == -1 {
println!("Warning: LLVMFuzzerInitialize failed with -1")
}
}
if input != None {
state
@ -159,7 +161,9 @@ pub extern "C" fn afl_libfuzzer_main() {
input.unwrap(),
)
.expect("Failed to load initial corpus");
} else {
}
if corpus.count() < 1 {
state
.generate_initial_inputs(
&mut rand,
@ -169,9 +173,11 @@ pub extern "C" fn afl_libfuzzer_main() {
&mut mgr,
4,
)
.expect("Failed to load initial inputs");
.expect("Failed to generate initial inputs");
}
println!("We have {} inputs.", corpus.count());
let mut mutator = HavocBytesMutator::new_default();
mutator.set_max_size(4096);

View File

@ -8,15 +8,14 @@ rm -f test_fuzz.elf test_fuzz.o
./compiler -flto=thin test_fuzz.o -o test_fuzz.elf || exit 1
RUST_BACKTRACE=1 ./test_fuzz.elf &
PID1=$!
test "$PID1" -gt 0 && {
test "$!" -gt 0 && {
usleep 250
RUST_BACKTRACE=1 ./test_fuzz.elf -x a -x b -T5 in1 in2 &
sleep 10
kill $!
}
sleep 10
kill $PID1
killall test_fuzz.elf