Add New Fuzzer for Fuzzbench
在 Fuzzbench 中增加新的 fuzzer 适配实验环境. Refer to https://google.github.io/fuzzbench/getting-started/adding-a-new-fuzzer/
直接增加的 Fuzzer 条件: 1.不依赖 IDApro 的静态分析环境, 或者预处理流程能够在 ubuntu20.04 环境下完成, 2.动态调整流程可以在同一个 fuzzing docker 内进行.
Create fuzzer directory
在 fuzzbench/fuzzers
目录下创建文件夹 (只能是小写字母和 _ 组成), 用来存放新增的 fuzzer 文件
cd fuzzbench/fuzzers
mkdir new_fuzzer_name
# test if the name valid
# cd to fuzzbench root directory
make presubmit
确保新增的 fuzzer_name 能通过检查, 否则按报错信息排查解决
Create fuzzer files
在已有的 fuzzers
目录下查看各个 fuzzer 目录文件, 主要包括三个文件
builder.Dockerfile fuzzer.py runner.Dockerfile
首先是 builder.Dockerfile
ARG parent_image # being set outside docker
FROM $parent_image # Base builder image (Ubuntu 20.04, with latest Clang).
RUN apt-get update && \ # Install any system dependencies to build your fuzzer.
apt-get install -y pkg1 pkg2 ...
RUN git clone <git_url> /fuzzer_src # Clone your fuzzer's sources.
RUN cd /fuzzer_src && make # Build your fuzzer using its preferred build system.
# Build your `FUZZER_LIB`.
# See section below on "What is `FUZZER_LIB`?" for more details.
RUN git clone <git_url> /fuzzer_lib_src
RUN cd /fuzzer_lib_src && clang++ fuzzer_lib.o
然后是 runner.Dockerfile
FROM gcr.io/fuzzbench/base-image # Base image (Ubuntu 20.04).
RUN apt-get update && \ # Install any runtime dependencies for your fuzzer.
apt-get install -y pkg1 pkg2 ...
最后是 fuzzer.py
, 一般基于 afl
修改代码的 aflxx
版本, 可以直接沿用 fuzzers/afl
目录下的 fuzzer.py
"""Integration code for AFL fuzzer."""
import json
import os
import shutil
import subprocess
from fuzzers import utils
def prepare_build_environment():
"""Set environment variables used to build targets for AFL-based
fuzzers."""
cflags = ['-fsanitize-coverage=trace-pc-guard']
utils.append_flags('CFLAGS', cflags)
utils.append_flags('CXXFLAGS', cflags)
os.environ['CC'] = 'clang'
os.environ['CXX'] = 'clang++'
os.environ['FUZZER_LIB'] = '/libAFL.a'
def build():
"""Build benchmark."""
prepare_build_environment()
utils.build_benchmark()
print('[post_build] Copying afl-fuzz to $OUT directory')
# Copy out the afl-fuzz binary as a build artifact.
shutil.copy('/afl/afl-fuzz', os.environ['OUT'])
def get_stats(output_corpus, fuzzer_log): # pylint: disable=unused-argument
"""Gets fuzzer stats for AFL."""
# Get a dictionary containing the stats AFL reports.
stats_file = os.path.join(output_corpus, 'fuzzer_stats')
if not os.path.exists(stats_file):
print('Can\'t find fuzzer_stats')
return '{}'
with open(stats_file, encoding='utf-8') as file_handle:
stats_file_lines = file_handle.read().splitlines()
stats_file_dict = {}
for stats_line in stats_file_lines:
key, value = stats_line.split(': ')
stats_file_dict[key.strip()] = value.strip()
# Report to FuzzBench the stats it accepts.
stats = {'execs_per_sec': float(stats_file_dict['execs_per_sec'])}
return json.dumps(stats)
def prepare_fuzz_environment(input_corpus):
"""Prepare to fuzz with AFL or another AFL-based fuzzer."""
# Tell AFL to not use its terminal UI so we get usable logs.
os.environ['AFL_NO_UI'] = '1'
# Skip AFL's CPU frequency check (fails on Docker).
os.environ['AFL_SKIP_CPUFREQ'] = '1'
# No need to bind affinity to one core, Docker enforces 1 core usage.
os.environ['AFL_NO_AFFINITY'] = '1'
# AFL will abort on startup if the core pattern sends notifications to
# external programs. We don't care about this.
os.environ['AFL_I_DONT_CARE_ABOUT_MISSING_CRASHES'] = '1'
# Don't exit when crashes are found. This can happen when corpus from
# OSS-Fuzz is used.
os.environ['AFL_SKIP_CRASHES'] = '1'
# Shuffle the queue
os.environ['AFL_SHUFFLE_QUEUE'] = '1'
# AFL needs at least one non-empty seed to start.
utils.create_seed_file_for_empty_corpus(input_corpus)
def check_skip_det_compatible(additional_flags):
""" Checks if additional flags are compatible with '-d' option"""
# AFL refuses to take in '-d' with '-M' or '-S' options for parallel mode.
# (cf. https://github.com/google/AFL/blob/8da80951/afl-fuzz.c#L7477)
if '-M' in additional_flags or '-S' in additional_flags:
return False
return True
def run_afl_fuzz(input_corpus,
output_corpus,
target_binary,
additional_flags=None,
hide_output=False):
"""Run afl-fuzz."""
# Spawn the afl fuzzing process.
print('[run_afl_fuzz] Running target with afl-fuzz')
command = [
'./afl-fuzz',
'-i',
input_corpus,
'-o',
output_corpus,
# Use no memory limit as ASAN doesn't play nicely with one.
'-m',
'none',
'-t',
'1000+', # Use same default 1 sec timeout, but add '+' to skip hangs.
]
# Use '-d' to skip deterministic mode, as long as it it compatible with
# additional flags.
if not additional_flags or check_skip_det_compatible(additional_flags):
command.append('-d')
if additional_flags:
command.extend(additional_flags)
dictionary_path = utils.get_dictionary_path(target_binary)
if dictionary_path:
command.extend(['-x', dictionary_path])
command += [
'--',
target_binary,
# Pass INT_MAX to afl the maximize the number of persistent loops it
# performs.
'2147483647'
]
print('[run_afl_fuzz] Running command: ' + ' '.join(command))
output_stream = subprocess.DEVNULL if hide_output else None
subprocess.check_call(command, stdout=output_stream, stderr=output_stream)
def fuzz(input_corpus, output_corpus, target_binary):
"""Run afl-fuzz on target."""
prepare_fuzz_environment(input_corpus)
run_afl_fuzz(input_corpus, output_corpus, target_binary)
Testing
export FUZZER_NAME=afl
export BENCHMARK_NAME=libpng-1.2.56
make build-$FUZZER_NAME-$BENCHMARK_NAME
# make debug-builder-$FUZZER_NAME-$BENCHMARK_NAME
make run-$FUZZER_NAME-$BENCHMARK_NAME
# make test-run-$FUZZER_NAME-$BENCHMARK_NAME
# build all benchmark
make build-$FUZZER_NAME-all
# make -j$(nproc) build-$FUZZER_NAME-all
报错解决
- 网络访问 github 或者其他资源失败, 国内环境目前无法通过修改
Dockerfile
解决, 具体运行时 docker 命令在docker/generated.mk
涉及非常多命令, 逐个修改增加--network=host
还需要确保正确性, 工作量很大但不是不行. 更直接的方法是修改build.Dockerfile
, 增加代理环境变量
ENV HTTP_PROXY=http://127.0.0.1:http_proxy_port
ENV HTTPS_PROXY=http://127.0.0.1:http_proxy_port
ENV ALL_PROXY=socks5://127.0.0.1:socks5_proxy_port
再修改 docker/generate_makefile.py
, 增加 --network=host
# original code
section += '\tdocker build \\\n'
section += '\t--tag ' + os.path.join(BASE_TAG, image['tag']) + ' \\\n'
# modify to
section += '\tdocker build \\\n'
section += '\t--network=host \\\n'
section += '\t--tag ' + os.path.join(BASE_TAG, image['tag']) + ' \\\n'
make presubmit
确保检查通过, 如果有个别检查不通过, 如果实验没用到可以先忽略, 否则还需要修改 docker/test_generate_makefile.py
对应的检查代码让其通过检查.
Instance
tbc: 增加一个实际 fuzzer 作为示例 ...