# Persistent fuzzing # Honggfuzz is capable of fuzzing APIs, which is to say; to test new data within the same process. This speeds-up the process of fuzzing APIs greatly # Requirements for hardware-based counter-based fuzzing # * GNU/Linux or POSIX interface (e.g. FreeBSD, Windows/CygWin) # HowTo # One can prepare a binary in the two following ways: ## ASAN-style ## Two functions must be prepared ```int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len)``` and (optional) ```int LLVMFuzzerInitialize(int *argc, char ***argv)``` Example (test.c): ``` int LLVMFuzzerTestOneInput(uint8_t *buf, size_t len) { TestAPI(buf, len); return 0; } ``` Compilation: ``` $ hfuzz_cc/hfuzz_clang test.c -o test ``` Execution: ``` $ honggfuzz -P -- ./test ``` ## HF_ITER style ## A complete program needs to be prepared, using ```HF_ITER``` symbol to obtain new inputs Example (test.c): ```c #include extern HF_ITER(uint8_t** buf, size_t* len); int main(void) { for (;;) { size_t len; uint8_t *buf; HF_ITER(&buf, &len); TestAPI(buf, len); } } ``` Compilation: ``` $ hfuzz_cc/hfuzz_clang test.c -o test ~/honggfuzz/libfuzz/libfuzz.a ``` Execution: ``` $ honggfuzz -P -- ./test ``` # Feedback-driven modes # The persistent fuzzing can be easily used together with feedback-driven fuzzing. In order to achieve that, one needs to compile binary with compile-time instrumentation, or use hardware-based instrumentation (BTS, Intel PT). More can be found in this [document](FeedbackDrivenFuzzing.md) Example (compile-time) ``` $ honggfuzz -P -z -- ./test ``` Example (hardware-based) ``` $ honggfuzz -P --linux_perf_bts_edge -- ./test $ honggfuzz -P --linux_perf_ipt_block -- ./test ```