doc: Add bare-bones documentation for fuzzing
This commit is contained in:
parent
a4153e20ec
commit
8b15434b59
2 changed files with 67 additions and 0 deletions
|
@ -68,6 +68,7 @@ The Bitcoin repo's [root README](/README.md) contains relevant information on th
|
||||||
### Miscellaneous
|
### Miscellaneous
|
||||||
- [Assets Attribution](assets-attribution.md)
|
- [Assets Attribution](assets-attribution.md)
|
||||||
- [Files](files.md)
|
- [Files](files.md)
|
||||||
|
- [Fuzz-testing](fuzzing.md)
|
||||||
- [Reduce Traffic](reduce-traffic.md)
|
- [Reduce Traffic](reduce-traffic.md)
|
||||||
- [Tor Support](tor.md)
|
- [Tor Support](tor.md)
|
||||||
- [Init Scripts (systemd/upstart/openrc)](init.md)
|
- [Init Scripts (systemd/upstart/openrc)](init.md)
|
||||||
|
|
66
doc/fuzzing.md
Normal file
66
doc/fuzzing.md
Normal file
|
@ -0,0 +1,66 @@
|
||||||
|
Fuzz-testing Bitcoin Core
|
||||||
|
==========================
|
||||||
|
|
||||||
|
A special test harness `test_bitcoin_fuzzy` is provided to provide an easy
|
||||||
|
entry point for fuzzers and the like. In this document we'll describe how to
|
||||||
|
use it with AFL.
|
||||||
|
|
||||||
|
Building AFL
|
||||||
|
-------------
|
||||||
|
|
||||||
|
It is recommended to always use the latest version of afl:
|
||||||
|
```
|
||||||
|
wget http://lcamtuf.coredump.cx/afl/releases/afl-latest.tgz
|
||||||
|
tar -zxvf afl-latest.tgz
|
||||||
|
cd afl-<version>
|
||||||
|
make
|
||||||
|
export AFLPATH=$PWD
|
||||||
|
```
|
||||||
|
|
||||||
|
Instrumentation
|
||||||
|
----------------
|
||||||
|
|
||||||
|
To build Bitcoin Core using AFL instrumentation (this assumes that the
|
||||||
|
`AFLPATH` was set as above):
|
||||||
|
```
|
||||||
|
./configure --disable-ccache --disable-shared --enable-tests CC=${AFLPATH}/afl-gcc CXX=${AFLPATH}/afl-g++
|
||||||
|
export AFL_HARDEN=1
|
||||||
|
cd src/
|
||||||
|
make test/test_bitcoin_fuzzy
|
||||||
|
```
|
||||||
|
We disable ccache because we don't want to pollute the ccache with instrumented
|
||||||
|
objects, and similarly don't want to use non-instrumented cached objects linked
|
||||||
|
in.
|
||||||
|
|
||||||
|
Preparing fuzzing
|
||||||
|
------------------
|
||||||
|
|
||||||
|
AFL needs an input directory with examples, and an output directory where it
|
||||||
|
will place examples that it found. These can be anywhere in the file system,
|
||||||
|
we'll define environment variables to make it easy to reference them.
|
||||||
|
|
||||||
|
```
|
||||||
|
mkdir inputs
|
||||||
|
AFLIN=$PWD/inputs
|
||||||
|
mkdir outputs
|
||||||
|
AFLOUT=$PWD/outputs
|
||||||
|
```
|
||||||
|
|
||||||
|
Example inputs are available from:
|
||||||
|
|
||||||
|
- https://download.visucore.com/bitcoin/bitcoin_fuzzy_in.tar.xz
|
||||||
|
- http://strateman.ninja/fuzzing.tar.xz
|
||||||
|
|
||||||
|
Extract these (or other starting inputs) into the `inputs` directory before starting fuzzing.
|
||||||
|
|
||||||
|
Fuzzing
|
||||||
|
--------
|
||||||
|
|
||||||
|
To start the actual fuzzing use:
|
||||||
|
```
|
||||||
|
$AFLPATH/afl-fuzz -i ${AFLIN} -o ${AFLOUT} -m52 -- test/test_bitcoin_fuzzy
|
||||||
|
```
|
||||||
|
|
||||||
|
You may have to change a few kernel parameters to test optimally - `afl-fuzz`
|
||||||
|
will print an error and suggestion if so.
|
||||||
|
|
Loading…
Reference in a new issue