mirror of
https://github.com/AFLplusplus/AFLplusplus.git
synced 2025-06-08 08:11:34 +00:00
1137 lines
46 KiB
Bash
Executable File
1137 lines
46 KiB
Bash
Executable File
#!/bin/sh
|
|
|
|
#
|
|
# Ensure we have: test, type, diff, grep -qE
|
|
#
|
|
test -z "" 2>/dev/null || { echo Error: test command not found ; exit 1 ; }
|
|
GREP=`type grep > /dev/null 2>&1 && echo OK`
|
|
test "$GREP" = OK || { echo Error: grep command not found ; exit 1 ; }
|
|
echo foobar | grep -qE 'asd|oob' 2>/dev/null || { echo Error: grep command does not support -q and/or -E option ; exit 1 ; }
|
|
echo 1 > test.1
|
|
echo 1 > test.2
|
|
OK=OK
|
|
diff test.1 test.2 >/dev/null 2>&1 || OK=
|
|
rm -f test.1 test.2
|
|
test -z "$OK" && { echo Error: diff is not working ; exit 1 ; }
|
|
test -z "$LLVM_CONFIG" && LLVM_CONFIG=llvm-config
|
|
|
|
# check for '-a' option of grep
|
|
if grep -a test test.sh >/dev/null 2>&1; then
|
|
GREPAOPTION=' -a'
|
|
else
|
|
GREPAOPTION=
|
|
fi
|
|
|
|
test_compcov_binary_functionality() {
|
|
RUN="../afl-showmap -m ${MEM_LIMIT} -o /dev/null -- $1"
|
|
$RUN 'LIBTOKENCAP' | grep 'your string was LIBTOKENCAP' \
|
|
&& $RUN 'BUGMENOT' | grep 'your string was BUGMENOT' \
|
|
&& $RUN 'BANANA' | grep 'your string started with BAN' \
|
|
&& $RUN 'APRI' | grep 'your string was APRI' \
|
|
&& $RUN 'kiWI' | grep 'your string was Kiwi' \
|
|
&& $RUN 'Avocado' | grep 'your string was avocado' \
|
|
&& $RUN 'GRAX' 3 | grep 'your string was a prefix of Grapes' \
|
|
&& $RUN 'LOCALVARIABLE' | grep 'local var memcmp works!' \
|
|
&& $RUN 'abc' | grep 'short local var memcmp works!' \
|
|
&& $RUN 'GLOBALVARIABLE' | grep 'global var memcmp works!'
|
|
} > /dev/null
|
|
|
|
ECHO="printf %b\\n"
|
|
$ECHO \\101 2>&1 | grep -qE '^A' || {
|
|
ECHO=
|
|
test -e /bin/printf && {
|
|
ECHO="/bin/printf %b\\n"
|
|
$ECHO "\\101" 2>&1 | grep -qE '^A' || ECHO=
|
|
}
|
|
}
|
|
test -z "$ECHO" && { printf Error: printf command does not support octal character codes ; exit 1 ; }
|
|
|
|
CODE=0
|
|
INCOMPLETE=0
|
|
|
|
export AFL_EXIT_WHEN_DONE=1
|
|
export AFL_SKIP_CPUFREQ=1
|
|
export AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES=1
|
|
unset AFL_NO_X86
|
|
unset AFL_QUIET
|
|
unset AFL_DEBUG
|
|
unset AFL_HARDEN
|
|
unset AFL_USE_ASAN
|
|
unset AFL_USE_MSAN
|
|
unset AFL_USE_UBSAN
|
|
unset AFL_TMPDIR
|
|
unset AFL_CC
|
|
unset AFL_PRELOAD
|
|
unset AFL_GCC_INSTRUMENT_FILE
|
|
unset AFL_LLVM_INSTRUMENT_FILE
|
|
unset AFL_LLVM_INSTRIM
|
|
unset AFL_LLVM_LAF_SPLIT_SWITCHES
|
|
unset AFL_LLVM_LAF_TRANSFORM_COMPARES
|
|
unset AFL_LLVM_LAF_SPLIT_COMPARES
|
|
unset AFL_QEMU_PERSISTENT_ADDR
|
|
unset AFL_QEMU_PERSISTENT_RETADDR_OFFSET
|
|
unset AFL_QEMU_PERSISTENT_GPR
|
|
unset AFL_QEMU_PERSISTENT_RET
|
|
unset AFL_QEMU_PERSISTENT_HOOK
|
|
unset AFL_QEMU_PERSISTENT_CNT
|
|
unset AFL_CUSTOM_MUTATOR_LIBRARY
|
|
unset AFL_PYTHON_MODULE
|
|
unset AFL_PRELOAD
|
|
unset LD_PRELOAD
|
|
|
|
rm -rf in in2 out
|
|
|
|
export ASAN_OPTIONS=detect_leaks=0:allocator_may_return_null=1:abort_on_error=1:symbolize=0
|
|
export AFL_LLVM_INSTRUMENT=AFL
|
|
|
|
# on OpenBSD we need to work with llvm from /usr/local/bin
|
|
test -e /usr/local/bin/opt && {
|
|
export PATH="/usr/local/bin:${PATH}"
|
|
}
|
|
# on MacOS X we prefer afl-clang over afl-gcc, because
|
|
# afl-gcc does not work there
|
|
test `uname -s` = 'Darwin' -o `uname -s` = 'FreeBSD' && {
|
|
AFL_GCC=afl-clang
|
|
} || {
|
|
AFL_GCC=afl-gcc
|
|
}
|
|
command -v gcc >/dev/null 2>&1 || AFL_GCC=afl-clang
|
|
|
|
SYS=`uname -m`
|
|
|
|
GREY="\\033[1;90m"
|
|
BLUE="\\033[1;94m"
|
|
GREEN="\\033[0;32m"
|
|
RED="\\033[0;31m"
|
|
YELLOW="\\033[1;93m"
|
|
RESET="\\033[0m"
|
|
|
|
MEM_LIMIT=none
|
|
|
|
export PATH="${PATH}:/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin"
|
|
|
|
$ECHO "${RESET}${GREY}[*] starting afl++ test framework ..."
|
|
|
|
test -z "$SYS" && $ECHO "$YELLOW[-] uname -m did not succeed"
|
|
|
|
$ECHO "$BLUE[*] Testing: ${AFL_GCC}, afl-showmap, afl-fuzz, afl-cmin and afl-tmin"
|
|
test "$SYS" = "i686" -o "$SYS" = "x86_64" -o "$SYS" = "amd64" -o "$SYS" = "i86pc" -o "$SYS" = "i386" && {
|
|
test -e ../${AFL_GCC} -a -e ../afl-showmap -a -e ../afl-fuzz && {
|
|
../${AFL_GCC} -o test-instr.plain ../test-instr.c > /dev/null 2>&1
|
|
AFL_HARDEN=1 ../${AFL_GCC} -o test-compcov.harden test-compcov.c > /dev/null 2>&1
|
|
test -e test-instr.plain && {
|
|
$ECHO "$GREEN[+] ${AFL_GCC} compilation succeeded"
|
|
echo 0 | ../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.0 -r -- ./test-instr.plain > /dev/null 2>&1
|
|
../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.1 -r -- ./test-instr.plain < /dev/null > /dev/null 2>&1
|
|
test -e test-instr.plain.0 -a -e test-instr.plain.1 && {
|
|
diff test-instr.plain.0 test-instr.plain.1 > /dev/null 2>&1 && {
|
|
$ECHO "$RED[!] ${AFL_GCC} instrumentation should be different on different input but is not"
|
|
CODE=1
|
|
} || {
|
|
$ECHO "$GREEN[+] ${AFL_GCC} instrumentation present and working correctly"
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] ${AFL_GCC} instrumentation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-instr.plain.0 test-instr.plain.1
|
|
TUPLES=`echo 0|../afl-showmap -m ${MEM_LIMIT} -o /dev/null -- ./test-instr.plain 2>&1 | grep Captur | awk '{print$3}'`
|
|
test "$TUPLES" -gt 3 -a "$TUPLES" -lt 11 && {
|
|
$ECHO "$GREEN[+] ${AFL_GCC} run reported $TUPLES instrumented locations which is fine"
|
|
} || {
|
|
$ECHO "$RED[!] ${AFL_GCC} instrumentation produces weird numbers: $TUPLES"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] ${AFL_GCC} failed"
|
|
echo CUT------------------------------------------------------------------CUT
|
|
uname -a
|
|
../${AFL_GCC} -o test-instr.plain ../test-instr.c
|
|
echo CUT------------------------------------------------------------------CUT
|
|
CODE=1
|
|
}
|
|
test -e test-compcov.harden && {
|
|
grep -Eq$GREPAOPTION 'stack_chk_fail|fstack-protector-all|fortified' test-compcov.harden > /dev/null 2>&1 && {
|
|
$ECHO "$GREEN[+] ${AFL_GCC} hardened mode succeeded and is working"
|
|
} || {
|
|
$ECHO "$RED[!] ${AFL_GCC} hardened mode is not hardened"
|
|
CODE=1
|
|
}
|
|
rm -f test-compcov.harden
|
|
} || {
|
|
$ECHO "$RED[!] ${AFL_GCC} hardened mode compilation failed"
|
|
CODE=1
|
|
}
|
|
# now we want to be sure that afl-fuzz is working
|
|
# make sure core_pattern is set to core on linux
|
|
(test "$(uname -s)" = "Linux" && test "$(sysctl kernel.core_pattern)" != "kernel.core_pattern = core" && {
|
|
$ECHO "$YELLOW[-] we should not run afl-fuzz with enabled core dumps. Run 'sudo sh afl-system-config'.$RESET"
|
|
true
|
|
}) ||
|
|
# make sure crash reporter is disabled on Mac OS X
|
|
(test "$(uname -s)" = "Darwin" && test $(launchctl list 2>/dev/null | grep -q '\.ReportCrash$') && {
|
|
$ECHO "$RED[!] we cannot run afl-fuzz with enabled crash reporter. Run 'sudo sh afl-system-config'.$RESET"
|
|
true
|
|
}) || {
|
|
mkdir -p in
|
|
echo 0 > in/in
|
|
$ECHO "$GREY[*] running afl-fuzz for ${AFL_GCC}, this will take approx 10 seconds"
|
|
{
|
|
../afl-fuzz -V10 -m ${MEM_LIMIT} -i in -o out -- ./test-instr.plain >>errors 2>&1
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000002* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with ${AFL_GCC}"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with ${AFL_GCC}"
|
|
CODE=1
|
|
}
|
|
echo 000000000000000000000000 > in/in2
|
|
echo 111 > in/in3
|
|
mkdir -p in2
|
|
../afl-cmin -m ${MEM_LIMIT} -i in -o in2 -- ./test-instr.plain >/dev/null 2>&1 # why is afl-forkserver writing to stderr?
|
|
CNT=`ls in2/* 2>/dev/null | wc -l`
|
|
case "$CNT" in
|
|
*2) $ECHO "$GREEN[+] afl-cmin correctly minimized the number of testcases" ;;
|
|
*) $ECHO "$RED[!] afl-cmin did not correctly minimize the number of testcases ($CNT)"
|
|
CODE=1
|
|
;;
|
|
esac
|
|
rm -f in2/in*
|
|
export AFL_QUIET=1
|
|
if command -v bash >/dev/null ; then {
|
|
AFL_PATH=`pwd`/.. ../afl-cmin.bash -m ${MEM_LIMIT} -i in -o in2 -- ./test-instr.plain >/dev/null
|
|
CNT=`ls in2/* 2>/dev/null | wc -l`
|
|
case "$CNT" in
|
|
*2) $ECHO "$GREEN[+] afl-cmin.bash correctly minimized the number of testcases" ;;
|
|
*) $ECHO "$RED[!] afl-cmin.bash did not correctly minimize the number of testcases ($CNT)"
|
|
CODE=1
|
|
;;
|
|
esac
|
|
} else {
|
|
$ECHO "$YELLOW[-] no bash available, cannot test afl-cmin.bash"
|
|
INCOMPLETE=1
|
|
}
|
|
fi
|
|
../afl-tmin -m ${MEM_LIMIT} -i in/in2 -o in2/in2 -- ./test-instr.plain > /dev/null 2>&1
|
|
SIZE=`ls -l in2/in2 2>/dev/null | awk '{print$5}'`
|
|
test "$SIZE" = 1 && $ECHO "$GREEN[+] afl-tmin correctly minimized the testcase"
|
|
test "$SIZE" = 1 || {
|
|
$ECHO "$RED[!] afl-tmin did incorrectly minimize the testcase to $SIZE"
|
|
CODE=1
|
|
}
|
|
rm -rf in out errors in2
|
|
unset AFL_QUIET
|
|
}
|
|
rm -f test-instr.plain
|
|
} || {
|
|
$ECHO "$YELLOW[-] afl is not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
} || {
|
|
$ECHO "$YELLOW[-] not an intel platform, cannot test afl-gcc"
|
|
}
|
|
|
|
$ECHO "$BLUE[*] Testing: llvm_mode, afl-showmap, afl-fuzz, afl-cmin and afl-tmin"
|
|
test -e ../afl-clang-fast -a -e ../split-switches-pass.so && {
|
|
# on FreeBSD need to set AFL_CC
|
|
test `uname -s` = 'FreeBSD' && {
|
|
if type clang >/dev/null; then
|
|
export AFL_CC=`command -v clang`
|
|
else
|
|
export AFL_CC=`$LLVM_CONFIG --bindir`/clang
|
|
fi
|
|
}
|
|
../afl-clang-fast -o test-instr.plain ../test-instr.c > /dev/null 2>&1
|
|
AFL_HARDEN=1 ../afl-clang-fast -o test-compcov.harden test-compcov.c > /dev/null 2>&1
|
|
test -e test-instr.plain && {
|
|
$ECHO "$GREEN[+] llvm_mode compilation succeeded"
|
|
echo 0 | ../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.0 -r -- ./test-instr.plain > /dev/null 2>&1
|
|
../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.1 -r -- ./test-instr.plain < /dev/null > /dev/null 2>&1
|
|
test -e test-instr.plain.0 -a -e test-instr.plain.1 && {
|
|
diff test-instr.plain.0 test-instr.plain.1 > /dev/null 2>&1 && {
|
|
$ECHO "$RED[!] llvm_mode instrumentation should be different on different input but is not"
|
|
CODE=1
|
|
} || {
|
|
$ECHO "$GREEN[+] llvm_mode instrumentation present and working correctly"
|
|
TUPLES=`echo 0|../afl-showmap -m ${MEM_LIMIT} -o /dev/null -- ./test-instr.plain 2>&1 | grep Captur | awk '{print$3}'`
|
|
test "$TUPLES" -gt 3 -a "$TUPLES" -lt 7 && {
|
|
$ECHO "$GREEN[+] llvm_mode run reported $TUPLES instrumented locations which is fine"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode instrumentation produces weird numbers: $TUPLES"
|
|
CODE=1
|
|
}
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode instrumentation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-instr.plain.0 test-instr.plain.1
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode failed"
|
|
CODE=1
|
|
}
|
|
test -e test-compcov.harden && test_compcov_binary_functionality ./test-compcov.harden && {
|
|
grep -Eq$GREPAOPTION 'stack_chk_fail|fstack-protector-all|fortified' test-compcov.harden > /dev/null 2>&1 && {
|
|
$ECHO "$GREEN[+] llvm_mode hardened mode succeeded and is working"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode hardened mode is not hardened"
|
|
CODE=1
|
|
}
|
|
rm -f test-compcov.harden
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode hardened mode compilation failed"
|
|
CODE=1
|
|
}
|
|
# now we want to be sure that afl-fuzz is working
|
|
(test "$(uname -s)" = "Linux" && test "$(sysctl kernel.core_pattern)" != "kernel.core_pattern = core" && {
|
|
$ECHO "$YELLOW[-] we should not run afl-fuzz with enabled core dumps. Run 'sudo sh afl-system-config'.$RESET"
|
|
true
|
|
}) ||
|
|
# make sure crash reporter is disabled on Mac OS X
|
|
(test "$(uname -s)" = "Darwin" && test $(launchctl list 2>/dev/null | grep -q '\.ReportCrash$') && {
|
|
$ECHO "$RED[!] we cannot run afl-fuzz with enabled crash reporter. Run 'sudo sh afl-system-config'.$RESET"
|
|
CODE=1
|
|
true
|
|
}) || {
|
|
mkdir -p in
|
|
echo 0 > in/in
|
|
$ECHO "$GREY[*] running afl-fuzz for llvm_mode, this will take approx 10 seconds"
|
|
{
|
|
../afl-fuzz -V10 -m ${MEM_LIMIT} -i in -o out -- ./test-instr.plain >>errors 2>&1
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000002* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with llvm_mode"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with llvm_mode"
|
|
CODE=1
|
|
}
|
|
test "$SYS" = "i686" -o "$SYS" = "x86_64" -o "$SYS" = "amd64" -o "$SYS" = "i86pc" || {
|
|
echo 000000000000000000000000 > in/in2
|
|
echo 111 > in/in3
|
|
mkdir -p in2
|
|
../afl-cmin -m ${MEM_LIMIT} -i in -o in2 -- ./test-instr.plain >/dev/null 2>&1 # why is afl-forkserver writing to stderr?
|
|
CNT=`ls in2/* 2>/dev/null | wc -l`
|
|
case "$CNT" in
|
|
*2) $ECHO "$GREEN[+] afl-cmin correctly minimized the number of testcases" ;;
|
|
*) $ECHO "$RED[!] afl-cmin did not correctly minimize the number of testcases ($CNT)"
|
|
CODE=1
|
|
;;
|
|
esac
|
|
rm -f in2/in*
|
|
export AFL_QUIET=1
|
|
if type bash >/dev/null ; then {
|
|
AFL_PATH=`pwd`/.. ../afl-cmin.bash -m ${MEM_LIMIT} -i in -o in2 -- ./test-instr.plain >/dev/null
|
|
CNT=`ls in2/* 2>/dev/null | wc -l`
|
|
case "$CNT" in
|
|
*2) $ECHO "$GREEN[+] afl-cmin.bash correctly minimized the number of testcases" ;;
|
|
*) $ECHO "$RED[!] afl-cmin.bash did not correctly minimize the number of testcases ($CNT)"
|
|
CODE=1
|
|
;;
|
|
esac
|
|
} else {
|
|
$ECHO "$YELLOW[-] no bash available, cannot test afl-cmin.bash"
|
|
INCOMPLETE=1
|
|
}
|
|
fi
|
|
../afl-tmin -m ${MEM_LIMIT} -i in/in2 -o in2/in2 -- ./test-instr.plain > /dev/null 2>&1
|
|
SIZE=`ls -l in2/in2 2>/dev/null | awk '{print$5}'`
|
|
test "$SIZE" = 1 && $ECHO "$GREEN[+] afl-tmin correctly minimized the testcase"
|
|
test "$SIZE" = 1 || {
|
|
$ECHO "$RED[!] afl-tmin did incorrectly minimize the testcase to $SIZE"
|
|
CODE=1
|
|
}
|
|
rm -rf in2
|
|
}
|
|
rm -rf in out errors
|
|
}
|
|
rm -f test-instr.plain
|
|
|
|
# now for the special llvm_mode things
|
|
test -e ../libLLVMInsTrim.so && {
|
|
AFL_LLVM_INSTRUMENT=CFG AFL_LLVM_INSTRIM_LOOPHEAD=1 ../afl-clang-fast -o test-instr.instrim ../test-instr.c > /dev/null 2>test.out
|
|
test -e test-instr.instrim && {
|
|
TUPLES=`echo 0|../afl-showmap -m ${MEM_LIMIT} -o /dev/null -- ./test-instr.instrim 2>&1 | grep Captur | awk '{print$3}'`
|
|
test "$TUPLES" -gt 2 -a "$TUPLES" -lt 5 && {
|
|
$ECHO "$GREEN[+] llvm_mode InsTrim reported $TUPLES instrumented locations which is fine"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode InsTrim instrumentation produces weird numbers: $TUPLES"
|
|
CODE=1
|
|
}
|
|
rm -f test-instr.instrim test.out
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode InsTrim compilation failed"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$YELLOW[-] llvm_mode InsTrim not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
AFL_LLVM_INSTRUMENT=AFL
|
|
AFL_DEBUG=1 AFL_LLVM_LAF_SPLIT_SWITCHES=1 AFL_LLVM_LAF_TRANSFORM_COMPARES=1 AFL_LLVM_LAF_SPLIT_COMPARES=1 ../afl-clang-fast -o test-compcov.compcov test-compcov.c > test.out 2>&1
|
|
test -e test-compcov.compcov && test_compcov_binary_functionality ./test-compcov.compcov && {
|
|
grep --binary-files=text -Eq " [ 123][0-9][0-9] location| [3-9][0-9] location" test.out && {
|
|
$ECHO "$GREEN[+] llvm_mode laf-intel/compcov feature works correctly"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode laf-intel/compcov feature failed"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode laf-intel/compcov feature compilation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-compcov.compcov test.out
|
|
echo foobar.c > instrumentlist.txt
|
|
AFL_DEBUG=1 AFL_LLVM_INSTRUMENT_FILE=instrumentlist.txt ../afl-clang-fast -o test-compcov test-compcov.c > test.out 2>&1
|
|
test -e test-compcov && test_compcov_binary_functionality ./test-compcov && {
|
|
grep -q "No instrumentation targets found" test.out && {
|
|
$ECHO "$GREEN[+] llvm_mode instrumentlist feature works correctly"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode instrumentlist feature failed"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode instrumentlist feature compilation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-compcov test.out instrumentlist.txt
|
|
../afl-clang-fast -o test-persistent ../examples/persistent_demo/persistent_demo.c > /dev/null 2>&1
|
|
test -e test-persistent && {
|
|
echo foo | ../afl-showmap -m ${MEM_LIMIT} -o /dev/null -q -r ./test-persistent && {
|
|
$ECHO "$GREEN[+] llvm_mode persistent mode feature works correctly"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode persistent mode feature failed to work"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode persistent mode feature compilation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-persistent
|
|
} || {
|
|
$ECHO "$YELLOW[-] llvm_mode not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
|
|
$ECHO "$BLUE[*] Testing: LTO llvm_mode"
|
|
test -e ../afl-clang-lto -a -e ../afl-llvm-lto-instrumentation.so && {
|
|
# on FreeBSD need to set AFL_CC
|
|
test `uname -s` = 'FreeBSD' && {
|
|
if type clang >/dev/null; then
|
|
export AFL_CC=`command -v clang`
|
|
else
|
|
export AFL_CC=`$LLVM_CONFIG --bindir`/clang
|
|
fi
|
|
}
|
|
|
|
../afl-clang-lto -o test-instr.plain ../test-instr.c > /dev/null 2>&1
|
|
test -e test-instr.plain && {
|
|
$ECHO "$GREEN[+] llvm_mode LTO compilation succeeded"
|
|
echo 0 | ../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.0 -r -- ./test-instr.plain > /dev/null 2>&1
|
|
../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.1 -r -- ./test-instr.plain < /dev/null > /dev/null 2>&1
|
|
test -e test-instr.plain.0 -a -e test-instr.plain.1 && {
|
|
diff -q test-instr.plain.0 test-instr.plain.1 > /dev/null 2>&1 && {
|
|
$ECHO "$RED[!] llvm_mode LTO instrumentation should be different on different input but is not"
|
|
CODE=1
|
|
} || {
|
|
$ECHO "$GREEN[+] llvm_mode LTO instrumentation present and working correctly"
|
|
TUPLES=`echo 0|../afl-showmap -m ${MEM_LIMIT} -o /dev/null -- ./test-instr.plain 2>&1 | grep Captur | awk '{print$3}'`
|
|
test "$TUPLES" -gt 3 -a "$TUPLES" -lt 7 && {
|
|
$ECHO "$GREEN[+] llvm_mode LTO run reported $TUPLES instrumented locations which is fine"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode LTO instrumentation produces weird numbers: $TUPLES"
|
|
CODE=1
|
|
}
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode LTO instrumentation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-instr.plain.0 test-instr.plain.1
|
|
} || {
|
|
$ECHO "$RED[!] LTO llvm_mode failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-instr.plain
|
|
|
|
echo foobar.c > instrumentlist.txt
|
|
AFL_DEBUG=1 AFL_LLVM_INSTRUMENT_FILE=instrumentlist.txt ../afl-clang-lto -o test-compcov test-compcov.c > test.out 2>&1
|
|
test -e test-compcov && {
|
|
grep -q "No instrumentation targets found" test.out && {
|
|
$ECHO "$GREEN[+] llvm_mode LTO instrumentlist feature works correctly"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode LTO instrumentlist feature failed"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode LTO instrumentlist feature compilation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-compcov test.out instrumentlist.txt
|
|
../afl-clang-lto -o test-persistent ../examples/persistent_demo/persistent_demo.c > /dev/null 2>&1
|
|
test -e test-persistent && {
|
|
echo foo | ../afl-showmap -m none -o /dev/null -q -r ./test-persistent && {
|
|
$ECHO "$GREEN[+] llvm_mode LTO persistent mode feature works correctly"
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode LTO persistent mode feature failed to work"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] llvm_mode LTO persistent mode feature compilation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-persistent
|
|
} || {
|
|
$ECHO "$YELLOW[-] LTO llvm_mode not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
|
|
$ECHO "$BLUE[*] Testing: gcc_plugin"
|
|
test -e ../afl-gcc-fast -a -e ../afl-gcc-rt.o && {
|
|
SAVE_AFL_CC=${AFL_CC}
|
|
export AFL_CC=`command -v gcc`
|
|
../afl-gcc-fast -o test-instr.plain.gccpi ../test-instr.c > /dev/null 2>&1
|
|
AFL_HARDEN=1 ../afl-gcc-fast -o test-compcov.harden.gccpi test-compcov.c > /dev/null 2>&1
|
|
test -e test-instr.plain.gccpi && {
|
|
$ECHO "$GREEN[+] gcc_plugin compilation succeeded"
|
|
echo 0 | ../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.0 -r -- ./test-instr.plain.gccpi > /dev/null 2>&1
|
|
../afl-showmap -m ${MEM_LIMIT} -o test-instr.plain.1 -r -- ./test-instr.plain.gccpi < /dev/null > /dev/null 2>&1
|
|
test -e test-instr.plain.0 -a -e test-instr.plain.1 && {
|
|
diff test-instr.plain.0 test-instr.plain.1 > /dev/null 2>&1 && {
|
|
$ECHO "$RED[!] gcc_plugin instrumentation should be different on different input but is not"
|
|
CODE=1
|
|
} || {
|
|
$ECHO "$GREEN[+] gcc_plugin instrumentation present and working correctly"
|
|
TUPLES=`echo 0|../afl-showmap -m ${MEM_LIMIT} -o /dev/null -- ./test-instr.plain.gccpi 2>&1 | grep Captur | awk '{print$3}'`
|
|
test "$TUPLES" -gt 3 -a "$TUPLES" -lt 7 && {
|
|
$ECHO "$GREEN[+] gcc_plugin run reported $TUPLES instrumented locations which is fine"
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin instrumentation produces a weird numbers: $TUPLES"
|
|
$ECHO "$YELLOW[-] this is a known issue in gcc, not afl++. It is not flagged as an error because travis builds would all fail otherwise :-("
|
|
#CODE=1
|
|
}
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin instrumentation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-instr.plain.0 test-instr.plain.1
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin failed"
|
|
CODE=1
|
|
}
|
|
|
|
test -e test-compcov.harden.gccpi && test_compcov_binary_functionality ./test-compcov.harden.gccpi && {
|
|
grep -Eq$GREPAOPTION 'stack_chk_fail|fstack-protector-all|fortified' test-compcov.harden.gccpi > /dev/null 2>&1 && {
|
|
$ECHO "$GREEN[+] gcc_plugin hardened mode succeeded and is working"
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin hardened mode is not hardened"
|
|
CODE=1
|
|
}
|
|
rm -f test-compcov.harden.gccpi
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin hardened mode compilation failed"
|
|
CODE=1
|
|
}
|
|
# now we want to be sure that afl-fuzz is working
|
|
(test "$(uname -s)" = "Linux" && test "$(sysctl kernel.core_pattern)" != "kernel.core_pattern = core" && {
|
|
$ECHO "$YELLOW[-] we should not run afl-fuzz with enabled core dumps. Run 'sudo sh afl-system-config'.$RESET"
|
|
true
|
|
}) ||
|
|
# make sure crash reporter is disabled on Mac OS X
|
|
(test "$(uname -s)" = "Darwin" && test $(launchctl list 2>/dev/null | grep -q '\.ReportCrash$') && {
|
|
$ECHO "$RED[!] we cannot run afl-fuzz with enabled crash reporter. Run 'sudo sh afl-system-config'.$RESET"
|
|
CODE=1
|
|
true
|
|
}) || {
|
|
mkdir -p in
|
|
echo 0 > in/in
|
|
$ECHO "$GREY[*] running afl-fuzz for gcc_plugin, this will take approx 10 seconds"
|
|
{
|
|
../afl-fuzz -V10 -m ${MEM_LIMIT} -i in -o out -- ./test-instr.plain.gccpi >>errors 2>&1
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000002* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with gcc_plugin"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with gcc_plugin"
|
|
CODE=1
|
|
}
|
|
rm -rf in out errors
|
|
}
|
|
rm -f test-instr.plain.gccpi
|
|
|
|
# now for the special gcc_plugin things
|
|
echo foobar.c > instrumentlist.txt
|
|
AFL_GCC_INSTRUMENT_FILE=instrumentlist.txt ../afl-gcc-fast -o test-compcov test-compcov.c > /dev/null 2>&1
|
|
test -e test-compcov && test_compcov_binary_functionality ./test-compcov && {
|
|
echo 1 | ../afl-showmap -m ${MEM_LIMIT} -o - -r -- ./test-compcov 2>&1 | grep -q "Captured 1 tuples" && {
|
|
$ECHO "$GREEN[+] gcc_plugin instrumentlist feature works correctly"
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin instrumentlist feature failed"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin instrumentlist feature compilation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-compcov test.out instrumentlist.txt
|
|
../afl-gcc-fast -o test-persistent ../examples/persistent_demo/persistent_demo.c > /dev/null 2>&1
|
|
test -e test-persistent && {
|
|
echo foo | ../afl-showmap -m ${MEM_LIMIT} -o /dev/null -q -r ./test-persistent && {
|
|
$ECHO "$GREEN[+] gcc_plugin persistent mode feature works correctly"
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin persistent mode feature failed to work"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] gcc_plugin persistent mode feature compilation failed"
|
|
CODE=1
|
|
}
|
|
rm -f test-persistent
|
|
export AFL_CC=${SAVE_AFL_CC}
|
|
} || {
|
|
$ECHO "$YELLOW[-] gcc_plugin not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
|
|
test -z "$AFL_CC" && unset AFL_CC
|
|
|
|
$ECHO "$BLUE[*] Testing: shared library extensions"
|
|
cc $CFLAGS -o test-compcov test-compcov.c > /dev/null 2>&1
|
|
test -e ../libtokencap.so && {
|
|
AFL_TOKEN_FILE=token.out LD_PRELOAD=../libtokencap.so DYLD_INSERT_LIBRARIES=../libtokencap.so DYLD_FORCE_FLAT_NAMESPACE=1 ./test-compcov foobar > /dev/null 2>&1
|
|
grep -q BUGMENOT token.out > /dev/null 2>&1 && {
|
|
$ECHO "$GREEN[+] libtokencap did successfully capture tokens"
|
|
} || {
|
|
$ECHO "$RED[!] libtokencap did not capture tokens"
|
|
CODE=1
|
|
}
|
|
rm -f token.out
|
|
} || {
|
|
$ECHO "$YELLOW[-] libtokencap is not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
test -e ../libdislocator.so && {
|
|
{
|
|
ulimit -c 1
|
|
# DYLD_INSERT_LIBRARIES and DYLD_FORCE_FLAT_NAMESPACE is used on Darwin/MacOSX
|
|
LD_PRELOAD=../libdislocator.so DYLD_INSERT_LIBRARIES=../libdislocator.so DYLD_FORCE_FLAT_NAMESPACE=1 ./test-compcov BUFFEROVERFLOW > test.out 2>/dev/null
|
|
} > /dev/null 2>&1
|
|
grep -q BUFFEROVERFLOW test.out > /dev/null 2>&1 && {
|
|
$ECHO "$RED[!] libdislocator did not detect the memory corruption"
|
|
CODE=1
|
|
} || {
|
|
$ECHO "$GREEN[+] libdislocator did successfully detect the memory corruption"
|
|
}
|
|
rm -f test.out core test-compcov.core core.test-compcov
|
|
} || {
|
|
$ECHO "$YELLOW[-] libdislocator is not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
rm -f test-compcov
|
|
#test -e ../libradamsa.so && {
|
|
# # on FreeBSD need to set AFL_CC
|
|
# test `uname -s` = 'FreeBSD' && {
|
|
# if type clang >/dev/null; then
|
|
# export AFL_CC=`command -v clang`
|
|
# else
|
|
# export AFL_CC=`$LLVM_CONFIG --bindir`/clang
|
|
# fi
|
|
# }
|
|
# test -e test-instr.plain || ../afl-clang-fast -o test-instr.plain ../test-instr.c > /dev/null 2>&1
|
|
# test -e test-instr.plain || ../afl-gcc-fast -o test-instr.plain ../test-instr.c > /dev/null 2>&1
|
|
# test -e test-instr.plain || ../${AFL_GCC} -o test-instr.plain ../test-instr.c > /dev/null 2>&1
|
|
# test -e test-instr.plain && {
|
|
# mkdir -p in
|
|
# printf 1 > in/in
|
|
# $ECHO "$GREY[*] running afl-fuzz with radamsa, this will take approx 10 seconds"
|
|
# {
|
|
# ../afl-fuzz -RR -V10 -m ${MEM_LIMIT} -i in -o out -- ./test-instr.plain
|
|
# } >>errors 2>&1
|
|
# test -n "$( ls out/queue/id:000001* 2>/dev/null )" && {
|
|
# $ECHO "$GREEN[+] libradamsa performs good - and very slow - mutations"
|
|
# } || {
|
|
# echo CUT------------------------------------------------------------------CUT
|
|
# cat errors
|
|
# echo CUT------------------------------------------------------------------CUT
|
|
# $ECHO "$RED[!] libradamsa failed"
|
|
# CODE=1
|
|
# }
|
|
# rm -rf in out errors test-instr.plain
|
|
# } || {
|
|
# $ECHO "$YELLOW[-] compilation of test target failed, cannot test libradamsa"
|
|
# INCOMPLETE=1
|
|
# }
|
|
#} || {
|
|
# $ECHO "$YELLOW[-] libradamsa is not compiled, cannot test"
|
|
# INCOMPLETE=1
|
|
#}
|
|
|
|
test -z "$AFL_CC" && {
|
|
if type gcc >/dev/null; then
|
|
export AFL_CC=gcc
|
|
else
|
|
if type clang >/dev/null; then
|
|
export AFL_CC=clang
|
|
fi
|
|
fi
|
|
}
|
|
|
|
$ECHO "$BLUE[*] Testing: qemu_mode"
|
|
test -e ../afl-qemu-trace && {
|
|
cc -pie -fPIE -o test-instr ../test-instr.c
|
|
cc -o test-compcov test-compcov.c
|
|
test -e test-instr -a -e test-compcov && {
|
|
{
|
|
mkdir -p in
|
|
echo 00000 > in/in
|
|
$ECHO "$GREY[*] running afl-fuzz for qemu_mode, this will take approx 10 seconds"
|
|
{
|
|
../afl-fuzz -m ${MEM_LIMIT} -V10 -Q -i in -o out -- ./test-instr >>errors 2>&1
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000002* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with qemu_mode"
|
|
RUNTIME=`grep execs_done out/fuzzer_stats | awk '{print$3}'`
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with qemu_mode"
|
|
CODE=1
|
|
}
|
|
rm -f errors
|
|
|
|
$ECHO "$GREY[*] running afl-fuzz for qemu_mode AFL_ENTRYPOINT, this will take approx 6 seconds"
|
|
{
|
|
{
|
|
if file test-instr | grep -q "32-bit"; then
|
|
# for 32-bit reduce 8 nibbles to the lower 7 nibbles
|
|
ADDR_LOWER_PART=`nm test-instr | grep "T main" | awk '{print $1}' | sed 's/^.//'`
|
|
else
|
|
# for 64-bit reduce 16 nibbles to the lower 9 nibbles
|
|
ADDR_LOWER_PART=`nm test-instr | grep "T main" | awk '{print $1}' | sed 's/^.......//'`
|
|
fi
|
|
export AFL_ENTRYPOINT=`expr 0x4${ADDR_LOWER_PART}`
|
|
$ECHO AFL_ENTRYPOINT=$AFL_ENTRYPOINT - $(nm test-instr | grep "T main") - $(file ./test-instr)
|
|
../afl-fuzz -m ${MEM_LIMIT} -V2 -Q -i in -o out -- ./test-instr
|
|
unset AFL_ENTRYPOINT
|
|
} >>errors 2>&1
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000001* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with qemu_mode AFL_ENTRYPOINT"
|
|
RUNTIME=`grep execs_done out/fuzzer_stats | awk '{print$3}'`
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with qemu_mode AFL_ENTRYPOINT"
|
|
CODE=1
|
|
}
|
|
rm -f errors
|
|
|
|
test "$SYS" = "i686" -o "$SYS" = "x86_64" -o "$SYS" = "amd64" -o "$SYS" = "i86pc" -o "$SYS" = "aarch64" -o ! "${SYS%%arm*}" && {
|
|
test -e ../libcompcov.so && {
|
|
$ECHO "$GREY[*] running afl-fuzz for qemu_mode compcov, this will take approx 10 seconds"
|
|
{
|
|
export AFL_PRELOAD=../libcompcov.so
|
|
export AFL_COMPCOV_LEVEL=2
|
|
../afl-fuzz -m ${MEM_LIMIT} -V10 -Q -i in -o out -- ./test-compcov >>errors 2>&1
|
|
unset AFL_PRELOAD
|
|
unset AFL_COMPCOV_LEVEL
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000001* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with qemu_mode compcov"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with qemu_mode compcov"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$YELLOW[-] we cannot test qemu_mode compcov because it is not present"
|
|
INCOMPLETE=1
|
|
}
|
|
rm -f errors
|
|
} || {
|
|
$ECHO "$YELLOW[-] not an intel or arm platform, cannot test qemu_mode compcov"
|
|
}
|
|
|
|
test "$SYS" = "i686" -o "$SYS" = "x86_64" -o "$SYS" = "amd64" -o "$SYS" = "i86pc" -o "$SYS" = "aarch64" -o ! "${SYS%%arm*}" && {
|
|
$ECHO "$GREY[*] running afl-fuzz for qemu_mode cmplog, this will take approx 10 seconds"
|
|
{
|
|
../afl-fuzz -m none -V10 -Q -c 0 -i in -o out -- ./test-compcov >>errors 2>&1
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000001* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with qemu_mode cmplog"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with qemu_mode cmplog"
|
|
CODE=1
|
|
}
|
|
rm -f errors
|
|
} || {
|
|
$ECHO "$YELLOW[-] not an intel or arm platform, cannot test qemu_mode cmplog"
|
|
}
|
|
|
|
test "$SYS" = "i686" -o "$SYS" = "x86_64" -o "$SYS" = "amd64" -o "$SYS" = "i86pc" -o "$SYS" = "aarch64" -o ! "${SYS%%arm*}" && {
|
|
$ECHO "$GREY[*] running afl-fuzz for persistent qemu_mode, this will take approx 10 seconds"
|
|
{
|
|
if file test-instr | grep -q "32-bit"; then
|
|
# for 32-bit reduce 8 nibbles to the lower 7 nibbles
|
|
ADDR_LOWER_PART=`nm test-instr | grep "T main" | awk '{print $1}' | sed 's/^.//'`
|
|
else
|
|
# for 64-bit reduce 16 nibbles to the lower 9 nibbles
|
|
ADDR_LOWER_PART=`nm test-instr | grep "T main" | awk '{print $1}' | sed 's/^.......//'`
|
|
fi
|
|
export AFL_QEMU_PERSISTENT_ADDR=`expr 0x4${ADDR_LOWER_PART}`
|
|
export AFL_QEMU_PERSISTENT_GPR=1
|
|
$ECHO "Info: AFL_QEMU_PERSISTENT_ADDR=$AFL_QEMU_PERSISTENT_ADDR <= $(nm test-instr | grep "T main" | awk '{print $1}')"
|
|
env|grep AFL_|sort
|
|
file test-instr
|
|
../afl-fuzz -m ${MEM_LIMIT} -V10 -Q -i in -o out -- ./test-instr
|
|
unset AFL_QEMU_PERSISTENT_ADDR
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000002* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with persistent qemu_mode"
|
|
RUNTIMEP=`grep execs_done out/fuzzer_stats | awk '{print$3}'`
|
|
test -n "$RUNTIME" -a -n "$RUNTIMEP" && {
|
|
DIFF=`expr $RUNTIMEP / $RUNTIME`
|
|
test "$DIFF" -gt 1 && { # must be at least twice as fast
|
|
$ECHO "$GREEN[+] persistent qemu_mode was noticeable faster than standard qemu_mode"
|
|
} || {
|
|
$ECHO "$YELLOW[-] persistent qemu_mode was not noticeable faster than standard qemu_mode"
|
|
}
|
|
} || {
|
|
$ECHO "$YELLOW[-] we got no data on executions performed? weird!"
|
|
}
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with persistent qemu_mode"
|
|
CODE=1
|
|
}
|
|
rm -rf in out errors
|
|
} || {
|
|
$ECHO "$YELLOW[-] not an intel or arm platform, cannot test persistent qemu_mode"
|
|
}
|
|
|
|
test -e ../qemu_mode/unsigaction/unsigaction32.so && {
|
|
${AFL_CC} -o test-unsigaction32 -m32 test-unsigaction.c >> errors 2>&1 && {
|
|
./test-unsigaction32
|
|
RETVAL_NORMAL32=$?
|
|
LD_PRELOAD=../qemu_mode/unsigaction/unsigaction32.so ./test-unsigaction32
|
|
RETVAL_LIBUNSIGACTION32=$?
|
|
test $RETVAL_NORMAL32 = "2" -a $RETVAL_LIBUNSIGACTION32 = "0" && {
|
|
$ECHO "$GREEN[+] qemu_mode unsigaction library (32 bit) ignores signals"
|
|
} || {
|
|
test $RETVAL_NORMAL32 != "2" && {
|
|
$ECHO "$RED[!] cannot trigger signal in test program (32 bit)"
|
|
}
|
|
test $RETVAL_LIBUNSIGACTION32 != "0" && {
|
|
$ECHO "$RED[!] signal in test program (32 bit) is not ignored with unsigaction"
|
|
}
|
|
CODE=1
|
|
}
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] cannot compile test program (32 bit) for unsigaction library"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$YELLOW[-] we cannot test qemu_mode unsigaction library (32 bit) because it is not present"
|
|
INCOMPLETE=1
|
|
}
|
|
test -e ../qemu_mode/unsigaction/unsigaction64.so && {
|
|
${AFL_CC} -o test-unsigaction64 -m64 test-unsigaction.c >> errors 2>&1 && {
|
|
./test-unsigaction64
|
|
RETVAL_NORMAL64=$?
|
|
LD_PRELOAD=../qemu_mode/unsigaction/unsigaction64.so ./test-unsigaction64
|
|
RETVAL_LIBUNSIGACTION64=$?
|
|
test $RETVAL_NORMAL64 = "2" -a $RETVAL_LIBUNSIGACTION64 = "0" && {
|
|
$ECHO "$GREEN[+] qemu_mode unsigaction library (64 bit) ignores signals"
|
|
} || {
|
|
test $RETVAL_NORMAL64 != "2" && {
|
|
$ECHO "$RED[!] cannot trigger signal in test program (64 bit)"
|
|
}
|
|
test $RETVAL_LIBUNSIGACTION64 != "0" && {
|
|
$ECHO "$RED[!] signal in test program (64 bit) is not ignored with unsigaction"
|
|
}
|
|
CODE=1
|
|
}
|
|
unset LD_PRELOAD
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] cannot compile test program (64 bit) for unsigaction library"
|
|
CODE=1
|
|
}
|
|
} || {
|
|
$ECHO "$YELLOW[-] we cannot test qemu_mode unsigaction library (64 bit) because it is not present"
|
|
INCOMPLETE=1
|
|
}
|
|
rm -rf errors test-unsigaction32 test-unsigaction64
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] gcc compilation of test targets failed - what is going on??"
|
|
CODE=1
|
|
}
|
|
|
|
rm -f test-instr test-compcov
|
|
} || {
|
|
$ECHO "$YELLOW[-] qemu_mode is not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
|
|
$ECHO "$BLUE[*] Testing: unicorn_mode"
|
|
test -d ../unicorn_mode/unicornafl && {
|
|
test -e ../unicorn_mode/samples/simple/simple_target.bin -a -e ../unicorn_mode/samples/compcov_x64/compcov_target.bin && {
|
|
{
|
|
# We want to see python errors etc. in logs, in case something doesn't work
|
|
export AFL_DEBUG_CHILD_OUTPUT=1
|
|
|
|
# some python version should be available now
|
|
PYTHONS="`command -v python3` `command -v python` `command -v python2`"
|
|
EASY_INSTALL_FOUND=0
|
|
for PYTHON in $PYTHONS ; do
|
|
|
|
if $PYTHON -c "help('easy_install');" </dev/null | grep -q module ; then
|
|
|
|
EASY_INSTALL_FOUND=1
|
|
PY=$PYTHON
|
|
break
|
|
|
|
fi
|
|
|
|
done
|
|
if [ "0" = $EASY_INSTALL_FOUND ]; then
|
|
|
|
echo "[-] Error: Python setup-tools not found. Run 'sudo apt-get install python-setuptools'."
|
|
PREREQ_NOTFOUND=1
|
|
|
|
fi
|
|
|
|
|
|
cd ../unicorn_mode/samples/persistent
|
|
make >>errors 2>&1
|
|
$ECHO "$GREY[*] running afl-fuzz for unicorn_mode (persistent), this will take approx 25 seconds"
|
|
AFL_DEBUG_CHILD_OUTPUT=1 ../../../afl-fuzz -m none -V25 -U -i sample_inputs -o out -d -- ./harness @@ >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000002* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with unicorn_mode (persistent)"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with unicorn_mode (persistent)"
|
|
CODE=1
|
|
}
|
|
|
|
rm -rf out errors >/dev/null
|
|
make clean >/dev/null
|
|
cd ../../../test
|
|
|
|
# travis workaround
|
|
test "$PY" = "/opt/pyenv/shims/python" -a -x /usr/bin/python && PY=/usr/bin/python
|
|
mkdir -p in
|
|
echo 0 > in/in
|
|
$ECHO "$GREY[*] Using python binary $PY"
|
|
if ! $PY -c 'import unicornafl' 2>/dev/null ; then
|
|
$ECHO "$YELLOW[-] we cannot test unicorn_mode for python because it is not present"
|
|
INCOMPLETE=1
|
|
else
|
|
{
|
|
$ECHO "$GREY[*] running afl-fuzz for unicorn_mode in python, this will take approx 25 seconds"
|
|
{
|
|
../afl-fuzz -m ${MEM_LIMIT} -V25 -U -i in -o out -d -- "$PY" ../unicorn_mode/samples/simple/simple_test_harness.py @@ >>errors 2>&1
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000002* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with unicorn_mode"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with unicorn_mode"
|
|
CODE=1
|
|
}
|
|
rm -f errors
|
|
|
|
printf '\x01\x01' > in/in
|
|
# This seed is close to the first byte of the comparison.
|
|
# If CompCov works, a new tuple will appear in the map => new input in queue
|
|
$ECHO "$GREY[*] running afl-fuzz for unicorn_mode compcov, this will take approx 35 seconds"
|
|
{
|
|
export AFL_COMPCOV_LEVEL=2
|
|
../afl-fuzz -m ${MEM_LIMIT} -V35 -U -i in -o out -d -- "$PY" ../unicorn_mode/samples/compcov_x64/compcov_test_harness.py @@ >>errors 2>&1
|
|
unset AFL_COMPCOV_LEVEL
|
|
} >>errors 2>&1
|
|
test -n "$( ls out/queue/id:000001* 2>/dev/null )" && {
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with unicorn_mode compcov"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with unicorn_mode compcov"
|
|
CODE=1
|
|
}
|
|
rm -rf in out errors
|
|
}
|
|
fi
|
|
|
|
unset AFL_DEBUG_CHILD_OUTPUT
|
|
|
|
}
|
|
} || {
|
|
$ECHO "$RED[!] missing sample binaries in unicorn_mode/samples/ - what is going on??"
|
|
CODE=1
|
|
}
|
|
|
|
} || {
|
|
$ECHO "$YELLOW[-] unicorn_mode is not compiled, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
|
|
$ECHO "$BLUE[*] Testing: custom mutator"
|
|
test "1" = "`../afl-fuzz | grep -i 'without python' >/dev/null; echo $?`" && {
|
|
# normalize path
|
|
CUSTOM_MUTATOR_PATH=$(cd $(pwd)/../examples/custom_mutators;pwd)
|
|
test -e test-custom-mutator.c -a -e ${CUSTOM_MUTATOR_PATH}/example.c -a -e ${CUSTOM_MUTATOR_PATH}/example.py && {
|
|
unset AFL_CC
|
|
# Compile the vulnerable program for single mutator
|
|
test -e ../afl-clang-fast && {
|
|
../afl-clang-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
|
|
} || {
|
|
test -e ../afl-gcc-fast && {
|
|
../afl-gcc-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
|
|
} || {
|
|
../afl-gcc -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
|
|
}
|
|
}
|
|
# Compile the vulnerable program for multiple mutators
|
|
test -e ../afl-clang-fast && {
|
|
../afl-clang-fast -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&1
|
|
} || {
|
|
test -e ../afl-gcc-fast && {
|
|
../afl-gcc-fast -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&1
|
|
} || {
|
|
../afl-gcc -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&1
|
|
}
|
|
}
|
|
# Compile the custom mutator
|
|
cc -D_FIXED_CHAR=0x41 -g -fPIC -shared -I../include ../examples/custom_mutators/simple_example.c -o libexamplemutator.so > /dev/null 2>&1
|
|
cc -D_FIXED_CHAR=0x42 -g -fPIC -shared -I../include ../examples/custom_mutators/simple_example.c -o libexamplemutator2.so > /dev/null 2>&1
|
|
test -e test-custom-mutator -a -e ./libexamplemutator.so && {
|
|
# Create input directory
|
|
mkdir -p in
|
|
echo "00000" > in/in
|
|
|
|
# Run afl-fuzz w/ the C mutator
|
|
$ECHO "$GREY[*] running afl-fuzz for the C mutator, this will take approx 5 seconds"
|
|
{
|
|
AFL_CUSTOM_MUTATOR_LIBRARY=./libexamplemutator.so AFL_CUSTOM_MUTATOR_ONLY=1 ../afl-fuzz -V1 -m ${MEM_LIMIT} -i in -o out -- ./test-custom-mutator >>errors 2>&1
|
|
} >>errors 2>&1
|
|
|
|
# Check results
|
|
test -n "$( ls out/crashes/id:000000* 2>/dev/null )" && { # TODO: update here
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with the C mutator"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with the C mutator"
|
|
CODE=1
|
|
}
|
|
|
|
# Clean
|
|
rm -rf out errors
|
|
|
|
# Run afl-fuzz w/ multiple C mutators
|
|
$ECHO "$GREY[*] running afl-fuzz with multiple custom C mutators, this will take approx 5 seconds"
|
|
{
|
|
AFL_CUSTOM_MUTATOR_LIBRARY="./libexamplemutator.so;./libexamplemutator2.so" AFL_CUSTOM_MUTATOR_ONLY=1 ../afl-fuzz -V1 -m ${MEM_LIMIT} -i in -o out -- ./test-multiple-mutators >>errors 2>&1
|
|
} >>errors 2>&1
|
|
|
|
test -n "$( ls out/crashes/id:000000* 2>/dev/null )" && { # TODO: update here
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with multiple C mutators"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with multiple C mutators"
|
|
CODE=1
|
|
}
|
|
|
|
# Clean
|
|
rm -rf out errors
|
|
|
|
# Run afl-fuzz w/ the Python mutator
|
|
$ECHO "$GREY[*] running afl-fuzz for the Python mutator, this will take approx 5 seconds"
|
|
{
|
|
export PYTHONPATH=${CUSTOM_MUTATOR_PATH}
|
|
export AFL_PYTHON_MODULE=example
|
|
AFL_CUSTOM_MUTATOR_ONLY=1 ../afl-fuzz -V5 -m ${MEM_LIMIT} -i in -o out -- ./test-custom-mutator >>errors 2>&1
|
|
unset PYTHONPATH
|
|
unset AFL_PYTHON_MODULE
|
|
} >>errors 2>&1
|
|
|
|
# Check results
|
|
test -n "$( ls out/crashes/id:000000* 2>/dev/null )" && { # TODO: update here
|
|
$ECHO "$GREEN[+] afl-fuzz is working correctly with the Python mutator"
|
|
} || {
|
|
echo CUT------------------------------------------------------------------CUT
|
|
cat errors
|
|
echo CUT------------------------------------------------------------------CUT
|
|
$ECHO "$RED[!] afl-fuzz is not working correctly with the Python mutator"
|
|
CODE=1
|
|
}
|
|
|
|
# Clean
|
|
rm -rf in out errors
|
|
rm -rf ${CUSTOM_MUTATOR_PATH}/__pycache__/
|
|
rm -f test-multiple-mutators test-custom-mutator libexamplemutator.so libexamplemutator2.so
|
|
} || {
|
|
ls .
|
|
ls ${CUSTOM_MUTATOR_PATH}
|
|
$ECHO "$RED[!] cannot compile the test program or the custom mutator"
|
|
CODE=1
|
|
}
|
|
|
|
#test "$CODE" = 1 && { $ECHO "$YELLOW[!] custom mutator tests currently will not fail travis" ; CODE=0 ; }
|
|
|
|
make -C ../examples/custom_mutators clean > /dev/null 2>&1
|
|
rm -f test-custom-mutator
|
|
rm -f test-custom-mutators
|
|
} || {
|
|
$ECHO "$YELLOW[-] no custom mutators in $CUSTOM_MUTATOR_PATH, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
unset CUSTOM_MUTATOR_PATH
|
|
} || {
|
|
$ECHO "$YELLOW[-] no python support in afl-fuzz, cannot test"
|
|
INCOMPLETE=1
|
|
}
|
|
|
|
$ECHO "$BLUE[*] Execution cmocka Unit-Tests $GREY"
|
|
unset AFL_CC
|
|
make -C .. unit || CODE=1 INCOMPLETE=1 :
|
|
|
|
$ECHO "$GREY[*] all test cases completed.$RESET"
|
|
test "$INCOMPLETE" = "0" && $ECHO "$GREEN[+] all test cases executed"
|
|
test "$INCOMPLETE" = "1" && $ECHO "$YELLOW[-] not all test cases were executed"
|
|
test "$CODE" = "0" && $ECHO "$GREEN[+] all tests were successful :-)$RESET"
|
|
test "$CODE" = "0" || $ECHO "$RED[!] failure in tests :-($RESET"
|
|
exit $CODE
|