nim-eth/tests/fuzzing/fuzz_helpers.nim

94 lines
3.1 KiB
Nim
Raw Normal View History

2019-10-02 11:01:50 +00:00
import strformat, ospaths
2019-09-30 13:41:15 +00:00
# Dependencies:
# - afl fuzzing: afl and gcc or clang/llvm
# - libFuzzer fuzzing: libFuzzer and clang/llvm
# - in afl experimental modes clang/llvm is also required
# TODO:
# - switch clang / gcc option for afl
# - afl init and persistent modes
# - parallel fuzzing options
# - custom generate test cases from this script?
# - rerun testcases option (or create tests from failed cases)
# - currently not cross platform
# - ...
const
aflGcc = "--cc=gcc " &
"--gcc.exe=afl-gcc " &
"--gcc.linkerexe=afl-gcc"
aflClang = "--cc=clang " &
"--clang.exe=afl-clang " &
"--clang.linkerexe=afl-clang"
aflClangFast = "--cc=clang " &
"--clang.exe=afl-clang-fast " &
"--clang.linkerexe=afl-clang-fast"
libFuzzerClang = "--cc=clang " &
"--passC='-fsanitize=fuzzer,address' " &
"--passL='-fsanitize=fuzzer,address'"
# Can also test in debug mode obviously, but might be slower
# Can turn on more logging, in case of libFuzzer it will get very verbose though
2019-10-02 09:50:51 +00:00
defaultFlags = "-d:release -d:chronicles_log_level=fatal " &
"--hints:off --warnings:off --verbosity:0"
2019-09-30 13:41:15 +00:00
type
Fuzzer* = enum
afl,
libFuzzer
Compiler* = enum
gcc = aflGcc,
clang = aflClang,
clangFast = aflClangFast
proc aflCompile*(target: string, c: Compiler) =
let aflOptions = &"-d:standalone -d:noSignalHandler {$c}"
2019-10-02 11:01:50 +00:00
let compileCmd = &"nim c {defaultFlags} {aflOptions} {target.quoteShell()}"
2019-09-30 13:41:15 +00:00
exec compileCmd
proc aflExec*(target: string, inputDir: string, resultsDir: string,
cleanStart = false) =
2019-10-02 11:01:50 +00:00
let exe = target.addFileExt(ExeExt)
2019-09-30 13:41:15 +00:00
if not dirExists(inputDir):
# create a input dir with one 0 file for afl
mkDir(inputDir)
2019-10-02 11:01:50 +00:00
# TODO: improve
2019-09-30 13:41:15 +00:00
withDir inputDir: exec "echo '0' > test"
var fuzzCmd: string
# if there is an output dir already, continue fuzzing from previous run
if (not dirExists(resultsDir)) or cleanStart:
2019-10-02 11:01:50 +00:00
fuzzCmd = &"afl-fuzz -i {inputDir.quoteShell()} -o {resultsDir.quoteShell()} -M fuzzer01 -- {exe.quoteShell()}"
2019-09-30 13:41:15 +00:00
else:
2019-10-02 11:01:50 +00:00
fuzzCmd = &"afl-fuzz -i - -o {resultsDir.quoteShell()} -M fuzzer01 -- {exe.quoteShell()}"
2019-09-30 13:41:15 +00:00
exec fuzzCmd
proc libFuzzerCompile*(target: string) =
let libFuzzerOptions = &"--noMain {libFuzzerClang}"
2019-10-02 11:01:50 +00:00
let compileCmd = &"nim c {defaultFlags} {libFuzzerOptions} {target.quoteShell()}"
2019-09-30 13:41:15 +00:00
exec compileCmd
proc libFuzzerExec*(target: string, corpusDir: string) =
2019-10-02 11:01:50 +00:00
let exe = target.addFileExt(ExeExt)
2019-09-30 13:41:15 +00:00
if not dirExists(corpusDir):
# libFuzzer is OK when starting with empty corpus dir
mkDir(corpusDir)
2019-10-02 11:01:50 +00:00
exec &"{exe.quoteShell()} {corpusDir.quoteShell()}"
2019-09-30 13:41:15 +00:00
proc runFuzzer*(targetPath: string, fuzzer: Fuzzer) =
2019-10-02 11:01:50 +00:00
let (path, target, ext) = splitFile(targetPath)
2019-09-30 13:41:15 +00:00
case fuzzer
of afl:
aflCompile(targetPath, gcc)
aflExec(path / target, path / "input", path / "results")
2019-09-30 13:41:15 +00:00
of libFuzzer:
libFuzzerCompile(targetPath)
# Note: Lets not mix afl input with libFuzzer corpus default. This can have
# consequences on speed for afl. Better to look into merging afl results &
# libFuzzer corpus.
libFuzzerExec(path / target, path / "corpus")