| #!/bin/bash -eu |
| # Copyright 2016 Google Inc. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # |
| ################################################################################ |
| |
| # afl++ configuration options. |
| # The 'env|grep' setup ensures we do not trigger the linter. |
| # The variables need to be set to "1" here - or before running this script. |
| |
| # AFL++ settings. |
| export AFL_LLVM_MODE_WORKAROUND=0 |
| export AFL_ENABLE_DICTIONARY=0 |
| export AFL_ENABLE_CMPLOG=1 |
| export AFL_LAF_CHANCE=3 |
| |
| # Start compiling afl++. |
| echo "Copying precompiled afl++" |
| |
| # Copy afl++ tools necessary for fuzzing. |
| pushd $SRC/aflplusplus > /dev/null |
| |
| cp -f libAFLDriver.a $LIB_FUZZING_ENGINE |
| |
| # Some important projects include libraries, copy those even when they don't |
| # start with "afl-". Use "sort -u" to avoid a warning about duplicates. |
| ls afl-* *.txt *.a *.o *.so | sort -u | xargs cp -t $OUT |
| export CC="$SRC/aflplusplus/afl-clang-fast" |
| export CXX="$SRC/aflplusplus/afl-clang-fast++" |
| |
| # Set sane afl++ environment defaults: |
| # Be quiet, otherwise this can break some builds. |
| export AFL_QUIET=1 |
| # No leak errors during builds. |
| export ASAN_OPTIONS="detect_leaks=0:symbolize=0:detect_odr_violation=0:abort_on_error=1" |
| |
| # AFL compile option roulette. It is OK if they all happen together. |
| |
| # 20% chance for CTX-2 coverage instrumentation (Caller conTeXt sensitive |
| # edge coverage). |
| test $(($RANDOM % 100)) -lt 20 && { |
| export AFL_LLVM_INSTRUMENT=CLASSIC,CTX-2 |
| export AFL_ENABLE_CMPLOG=0 |
| export AFL_LAF_CHANCE=30 |
| } |
| |
| # 40% chance to create a dictionary. |
| test $(($RANDOM % 100)) -lt 40 && { |
| export AFL_ENABLE_DICTIONARY=1 |
| } |
| |
| # 60% chance to perform CMPLOG/REDQUEEN. |
| rm -f "$OUT/afl_cmplog.txt" |
| test "$AFL_ENABLE_CMPLOG" = "1" -a $(($RANDOM % 100)) -lt 60 && { |
| export AFL_LLVM_CMPLOG=1 |
| touch "$OUT/afl_cmplog.txt" |
| } |
| |
| # 3% chance to perform COMPCOV/LAF_INTEL. |
| test $(($RANDOM % 100)) -lt $AFL_LAF_CHANCE && { |
| export AFL_LLVM_LAF_ALL=1 |
| } |
| |
| # Create a dictionary if one is wanted. |
| test "$AFL_ENABLE_DICTIONARY" = "1" && { |
| export AFL_LLVM_DICT2FILE="$OUT/afl++.dict" |
| } |
| |
| # In case afl-clang-fast ever breaks, this is a workaround: |
| test "$AFL_LLVM_MODE_WORKAROUND" = "1" && { |
| export CC=clang |
| export CXX=clang++ |
| WORKAROUND_FLAGS=-fsanitize-coverage=trace-pc-guard |
| # We can still do CMPLOG light: |
| test -e "$OUT/afl_cmplog.txt" && { |
| WORKAROUND_FLAGS="$WORKAROUND_FLAGS",trace-cmp |
| } |
| export CFLAGS="$CFLAGS $WORKAROUND_FLAGS" |
| export CXXFLAGS="$CXXFLAGS $WORKAROUND_FLAGS" |
| unset AFL_LLVM_LAF_ALL |
| unset AFL_LLVM_DICT2FILE |
| unset AFL_ENABLE_DICTIONARY |
| # We need to create a new fuzzer lib however. |
| ar ru libAFLDrivernew.a afl-compiler-rt.o utils/aflpp_driver/aflpp_driver.o |
| cp -f libAFLDrivernew.a $LIB_FUZZING_ENGINE |
| } |
| |
| # Provide a way to document the afl++ options used in this build: |
| echo |
| echo afl++ target compilation setup: |
| env | grep AFL_ | tee "$OUT/afl_options.txt" |
| echo |
| |
| popd > /dev/null |
| |
| echo " done." |