Merge branch 'vh' into vh_dcm

This commit is contained in:
van Hauser 2020-12-20 16:09:01 +01:00 committed by GitHub
commit ae9d77ee99
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 41 additions and 16 deletions

View File

@ -149,6 +149,12 @@ where
I: Input, I: Input,
R: Rand, R: Rand,
{ {
/// Returns the number of elements
#[inline]
fn count(&self) -> usize {
self.entries().len()
}
/// Gets the next entry /// Gets the next entry
#[inline] #[inline]
fn next(&mut self, rand: &mut R) -> Result<(&RefCell<Testcase<I>>, usize), AflError> { fn next(&mut self, rand: &mut R) -> Result<(&RefCell<Testcase<I>>, usize), AflError> {

View File

@ -1,7 +1,12 @@
#include <stdio.h>
#include <stdint.h> #include <stdint.h>
#define MAP_SIZE 65536 #define MAP_SIZE 65536
int orig_argc;
char **orig_argv;
char **orig_envp;
uint8_t __lafl_dummy_map[MAP_SIZE]; uint8_t __lafl_dummy_map[MAP_SIZE];
uint8_t *__lafl_edges_map = __lafl_dummy_map; uint8_t *__lafl_edges_map = __lafl_dummy_map;
@ -119,13 +124,22 @@ void __sanitizer_cov_trace_switch(uint64_t val, uint64_t *cases) {
} }
static void afl_libfuzzer_copy_args(int argc, char** argv, char** envp) {
orig_argc = argc;
orig_argv = argv;
orig_envp = envp;
}
__attribute__((section(".init_array"))) void (* p_afl_libfuzzer_copy_args)(int,char*[],char*[]) = &afl_libfuzzer_copy_args;
__attribute__((weak)) int LLVMFuzzerInitialize(int *argc, char ***argv); __attribute__((weak)) int LLVMFuzzerInitialize(int *argc, char ***argv);
void afl_libfuzzer_main(); void afl_libfuzzer_main();
int afl_libfuzzer_init(int argc, char **argv) { int afl_libfuzzer_init() {
if (LLVMFuzzerInitialize) if (LLVMFuzzerInitialize)
return LLVMFuzzerInitialize(&argc, &argv); return LLVMFuzzerInitialize(&orig_argc, &orig_argv);
else else
return 0; return 0;

View File

@ -7,6 +7,7 @@ extern crate alloc;
use clap::{App, Arg}; use clap::{App, Arg};
use std::env; use std::env;
use afl::corpus::Corpus;
use afl::corpus::InMemoryCorpus; use afl::corpus::InMemoryCorpus;
use afl::engines::Engine; use afl::engines::Engine;
use afl::engines::Fuzzer; use afl::engines::Fuzzer;
@ -28,8 +29,8 @@ extern "C" {
/// int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) /// int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
fn LLVMFuzzerTestOneInput(data: *const u8, size: usize) -> i32; fn LLVMFuzzerTestOneInput(data: *const u8, size: usize) -> i32;
/// int LLVMFuzzerInitialize(int argc, char **argv) // afl_libfuzzer_init calls LLVMFUzzerInitialize()
fn afl_libfuzzer_init(argc: u32, argv: *const *const u8) -> i32; fn afl_libfuzzer_init() -> i32;
static __lafl_edges_map: *mut u8; static __lafl_edges_map: *mut u8;
static __lafl_cmp_map: *mut u8; static __lafl_cmp_map: *mut u8;
@ -143,11 +144,12 @@ pub extern "C" fn afl_libfuzzer_main() {
let mut engine = Engine::new(executor); let mut engine = Engine::new(executor);
// unsafe { // Call LLVMFUzzerInitialize() if present.
// if afl_libfuzzer_init(...) == -1 { unsafe {
// println("Warning: LLVMFuzzerInitialize failed with -1") if afl_libfuzzer_init() == -1 {
// } println!("Warning: LLVMFuzzerInitialize failed with -1")
// } }
}
if input != None { if input != None {
state state
@ -159,7 +161,9 @@ pub extern "C" fn afl_libfuzzer_main() {
input.unwrap(), input.unwrap(),
) )
.expect("Failed to load initial corpus"); .expect("Failed to load initial corpus");
} else { }
if corpus.count() < 1 {
state state
.generate_initial_inputs( .generate_initial_inputs(
&mut rand, &mut rand,
@ -169,9 +173,11 @@ pub extern "C" fn afl_libfuzzer_main() {
&mut mgr, &mut mgr,
4, 4,
) )
.expect("Failed to load initial inputs"); .expect("Failed to generate initial inputs");
} }
println!("We have {} inputs.", corpus.count());
let mut mutator = HavocBytesMutator::new_default(); let mut mutator = HavocBytesMutator::new_default();
mutator.set_max_size(4096); mutator.set_max_size(4096);

View File

@ -8,15 +8,14 @@ rm -f test_fuzz.elf test_fuzz.o
./compiler -flto=thin test_fuzz.o -o test_fuzz.elf || exit 1 ./compiler -flto=thin test_fuzz.o -o test_fuzz.elf || exit 1
RUST_BACKTRACE=1 ./test_fuzz.elf & RUST_BACKTRACE=1 ./test_fuzz.elf &
PID1=$!
test "$PID1" -gt 0 && { test "$!" -gt 0 && {
usleep 250 usleep 250
RUST_BACKTRACE=1 ./test_fuzz.elf -x a -x b -T5 in1 in2 & RUST_BACKTRACE=1 ./test_fuzz.elf -x a -x b -T5 in1 in2 &
sleep 10
kill $!
} }
sleep 10 sleep 10
kill $PID1 killall test_fuzz.elf