lwip/test/fuzz
Jonathan Neuschäfer 5514d8eb63 test/fuzz: Build with -O2 by default
Fuzzers should run fast by default, since the goal is to try many
variations of input data.
2023-05-11 22:08:46 +02:00
..
inputs
config.h
fuzz2.c fuzz: add more fuzz tests 2020-02-20 21:55:13 +01:00
fuzz3.c fuzz: whitespace fixes 2020-03-09 21:50:50 +01:00
fuzz_common.c test/fuzz: Don't crash with assertion failure when a packet is too big 2023-04-07 22:25:50 +02:00
fuzz_common.h fuzz: add more fuzz tests 2020-02-20 21:55:13 +01:00
fuzz.c fuzz: add more fuzz tests 2020-02-20 21:55:13 +01:00
lwipopts.h fuzz: allow overriding LWIP_RAND for fuzz tests 2020-03-27 22:42:06 +01:00
Makefile test/fuzz: Build with -O2 by default 2023-05-11 22:08:46 +02:00
output_to_pcap.sh
README test/fuzz: Use HTTPS URLs and mention AFL++ 2023-04-07 22:27:30 +02:00

Fuzzing the lwIP stack (afl-fuzz requires linux/unix or similar)

This directory contains small apps that read Ethernet frames from stdin and
process them. They are used together with the 'american fuzzy lop' tool (found
at https://lcamtuf.coredump.cx/afl/) or its successor AFL++
(https://github.com/AFLplusplus/AFLplusplus) and the sample inputs to test how
unexpected inputs are handled. The afl tool will read the known inputs, and
try to modify them to exercise as many code paths as possible, by instrumenting
the code and keeping track of which code is executed.

Just running make will produce the test programs.

Then run afl with:

afl-fuzz -i inputs/<INPUT> -o output ./lwip_fuzz

and it should start working. It will probably complain about CPU scheduler,
set AFL_SKIP_CPUFREQ=1 to ignore it.
If it complains about invalid "/proc/sys/kernel/core_pattern" setting, try
executing "sudo bash -c 'echo core > /proc/sys/kernel/core_pattern'".

The input is split into different subdirectories since they test different
parts of the code, and since you want to run one instance of afl-fuzz on each
core.

When afl finds a crash or a hang, the input that caused it will be placed in
the output directory. If you have hexdump and text2pcap tools installed,
running output_to_pcap.sh <outputdir> will create pcap files for each input
file to simplify viewing in wireshark.

The lwipopts.h file needs to have checksum checking off, otherwise almost every
packet will be discarded because of that. The other options can be tuned to
expose different parts of the code.