зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1289194 - Experimental LibFuzzer integration. r=glandium
MozReview-Commit-ID: 9njDcbltyow --HG-- extra : rebase_source : 774d25f2ac4e4b1a876e48159333188bc722f940
This commit is contained in:
Родитель
5a051cc6d9
Коммит
3c7149e85d
|
@ -33,6 +33,9 @@ USE_LIBS += [
|
|||
'mozglue',
|
||||
]
|
||||
|
||||
if CONFIG['LIBFUZZER']:
|
||||
USE_LIBS += [ 'fuzzer' ]
|
||||
|
||||
if CONFIG['_MSC_VER']:
|
||||
# Always enter a Windows program through wmain, whether or not we're
|
||||
# a console application.
|
||||
|
|
|
@ -127,6 +127,10 @@ XRE_GetProcessTypeType XRE_GetProcessType;
|
|||
XRE_SetProcessTypeType XRE_SetProcessType;
|
||||
XRE_InitChildProcessType XRE_InitChildProcess;
|
||||
XRE_EnableSameExecutableForContentProcType XRE_EnableSameExecutableForContentProc;
|
||||
#ifdef LIBFUZZER
|
||||
XRE_LibFuzzerSetMainType XRE_LibFuzzerSetMain;
|
||||
XRE_LibFuzzerGetFuncsType XRE_LibFuzzerGetFuncs;
|
||||
#endif
|
||||
|
||||
static const nsDynamicFunctionLoad kXULFuncs[] = {
|
||||
{ "XRE_GetFileFromPath", (NSFuncPtr*) &XRE_GetFileFromPath },
|
||||
|
@ -141,9 +145,24 @@ static const nsDynamicFunctionLoad kXULFuncs[] = {
|
|||
{ "XRE_SetProcessType", (NSFuncPtr*) &XRE_SetProcessType },
|
||||
{ "XRE_InitChildProcess", (NSFuncPtr*) &XRE_InitChildProcess },
|
||||
{ "XRE_EnableSameExecutableForContentProc", (NSFuncPtr*) &XRE_EnableSameExecutableForContentProc },
|
||||
#ifdef LIBFUZZER
|
||||
{ "XRE_LibFuzzerSetMain", (NSFuncPtr*) &XRE_LibFuzzerSetMain },
|
||||
{ "XRE_LibFuzzerGetFuncs", (NSFuncPtr*) &XRE_LibFuzzerGetFuncs },
|
||||
#endif
|
||||
{ nullptr, nullptr }
|
||||
};
|
||||
|
||||
#ifdef LIBFUZZER
|
||||
int libfuzzer_main(int argc, char **argv);
|
||||
|
||||
/* This wrapper is used by the libFuzzer main to call into libxul */
|
||||
|
||||
void libFuzzerGetFuncs(const char* moduleName, LibFuzzerInitFunc* initFunc,
|
||||
LibFuzzerTestingFunc* testingFunc) {
|
||||
return XRE_LibFuzzerGetFuncs(moduleName, initFunc, testingFunc);
|
||||
}
|
||||
#endif
|
||||
|
||||
static int do_main(int argc, char* argv[], char* envp[], nsIFile *xreDirectory)
|
||||
{
|
||||
nsCOMPtr<nsIFile> appini;
|
||||
|
@ -254,6 +273,11 @@ static int do_main(int argc, char* argv[], char* envp[], nsIFile *xreDirectory)
|
|||
appData.sandboxBrokerServices = brokerServices;
|
||||
#endif
|
||||
|
||||
#ifdef LIBFUZZER
|
||||
if (getenv("LIBFUZZER"))
|
||||
XRE_LibFuzzerSetMain(argc, argv, libfuzzer_main);
|
||||
#endif
|
||||
|
||||
return XRE_main(argc, argv, &appData, mainFlags);
|
||||
}
|
||||
|
||||
|
|
|
@ -57,6 +57,7 @@ DIRS += [
|
|||
'memory',
|
||||
'mfbt',
|
||||
'mozglue',
|
||||
'tools/fuzzing',
|
||||
]
|
||||
|
||||
if not CONFIG['JS_STANDALONE']:
|
||||
|
|
|
@ -764,3 +764,15 @@ def skia_includes(skia, skia_gpu):
|
|||
return includes
|
||||
|
||||
set_config('SKIA_INCLUDES', skia_includes)
|
||||
|
||||
# Support various fuzzing options
|
||||
# ==============================================================
|
||||
option('--enable-libfuzzer', help='Enable libfuzzer support')
|
||||
|
||||
@depends('--enable-libfuzzer')
|
||||
def enable_libfuzzer(value):
|
||||
if value:
|
||||
return True
|
||||
|
||||
set_config('LIBFUZZER', enable_libfuzzer)
|
||||
set_define('LIBFUZZER', enable_libfuzzer)
|
||||
|
|
|
@ -259,6 +259,18 @@ nsString gAbsoluteArgv0Path;
|
|||
extern "C" MFBT_API bool IsSignalHandlingBroken();
|
||||
#endif
|
||||
|
||||
#ifdef LIBFUZZER
|
||||
#include "LibFuzzerRunner.h"
|
||||
|
||||
namespace mozilla {
|
||||
LibFuzzerRunner* libFuzzerRunner = 0;
|
||||
} // namespace mozilla
|
||||
|
||||
extern "C" MOZ_EXPORT void XRE_LibFuzzerSetMain(int argc, char** argv, LibFuzzerMain main) {
|
||||
mozilla::libFuzzerRunner->setParams(argc, argv, main);
|
||||
}
|
||||
#endif
|
||||
|
||||
namespace mozilla {
|
||||
int (*RunGTest)() = 0;
|
||||
} // namespace mozilla
|
||||
|
@ -3669,6 +3681,13 @@ XREMain::XRE_mainStartup(bool* aExitFlag)
|
|||
return 1;
|
||||
#endif /* MOZ_WIDGET_GTK */
|
||||
|
||||
#ifdef LIBFUZZER
|
||||
if (PR_GetEnv("LIBFUZZER")) {
|
||||
*aExitFlag = true;
|
||||
return mozilla::libFuzzerRunner->Run();
|
||||
}
|
||||
#endif
|
||||
|
||||
if (PR_GetEnv("MOZ_RUN_GTEST")) {
|
||||
int result;
|
||||
#ifdef XP_WIN
|
||||
|
|
|
@ -0,0 +1,37 @@
|
|||
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
||||
* * This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* * License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||
|
||||
#include <cstdlib>
|
||||
|
||||
#include "FuzzerInterface.h"
|
||||
#include "FuzzerInternal.h"
|
||||
#include "harness/LibFuzzerRegistry.h"
|
||||
|
||||
/* This is a wrapper defined in browser/app/nsBrowserApp.cpp,
|
||||
* encapsulating the XRE_ equivalent defined in libxul */
|
||||
extern void libFuzzerGetFuncs(const char*, LibFuzzerInitFunc*,
|
||||
LibFuzzerTestingFunc*);
|
||||
|
||||
int libfuzzer_main(int argc, char **argv) {
|
||||
LibFuzzerInitFunc initFunc = nullptr;
|
||||
LibFuzzerTestingFunc testingFunc = nullptr;
|
||||
|
||||
libFuzzerGetFuncs(getenv("LIBFUZZER"), &initFunc, &testingFunc);
|
||||
|
||||
if (initFunc) {
|
||||
int ret = initFunc(&argc, &argv);
|
||||
if (ret) {
|
||||
fprintf(stderr, "LibFuzzer: Error: Initialize callback failed\n");
|
||||
return ret;
|
||||
}
|
||||
}
|
||||
|
||||
if (!testingFunc) {
|
||||
fprintf(stderr, "LibFuzzer: Error: No testing callback found\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
return fuzzer::FuzzerDriver(&argc, &argv, testingFunc);
|
||||
}
|
|
@ -0,0 +1,12 @@
|
|||
# This Source Code Form is subject to the terms of the Mozilla Public
|
||||
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
include $(topsrcdir)/config/rules.mk
|
||||
|
||||
# According to the LLVM docs, LibFuzzer isn't supposed to be built with any
|
||||
# sanitizer flags and in fact, building it with ASan coverage currently causes
|
||||
# Clang 3.9+ to crash, so we filter out all sanitizer-related flags here.
|
||||
CXXFLAGS := $(filter-out -fsanitize%,$(CXXFLAGS))
|
||||
CFLAGS := $(filter-out -fsanitize%,$(CFLAGS))
|
||||
LDFLAGS := $(filter-out -fsanitize%,$(LDFLAGS))
|
|
@ -0,0 +1,7 @@
|
|||
#!/bin/sh
|
||||
|
||||
mkdir tmp/
|
||||
git clone --no-checkout --depth 1 https://chromium.googlesource.com/chromium/llvm-project/llvm/lib/Fuzzer tmp/
|
||||
mv tmp/.git .
|
||||
rm -Rf tmp
|
||||
git reset --hard HEAD
|
|
@ -0,0 +1,32 @@
|
|||
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
||||
* * This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* * License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||
|
||||
#include "LibFuzzerRegistry.h"
|
||||
|
||||
extern "C" {
|
||||
void MOZ_EXPORT XRE_LibFuzzerGetFuncs(const char* moduleName, LibFuzzerInitFunc* initFunc, LibFuzzerTestingFunc* testingFunc) {
|
||||
std::string moduleNameStr(moduleName);
|
||||
mozilla::LibFuzzerFunctions funcs = mozilla::LibFuzzerRegistry::getInstance().getModuleFunctions(moduleNameStr);
|
||||
*initFunc = funcs.first;
|
||||
*testingFunc = funcs.second;
|
||||
}
|
||||
}
|
||||
|
||||
namespace mozilla {
|
||||
|
||||
LibFuzzerRegistry& LibFuzzerRegistry::getInstance() {
|
||||
static LibFuzzerRegistry instance;
|
||||
return instance;
|
||||
}
|
||||
|
||||
void LibFuzzerRegistry::registerModule(std::string moduleName, LibFuzzerInitFunc initFunc, LibFuzzerTestingFunc testingFunc) {
|
||||
moduleMap.insert(std::pair<std::string, LibFuzzerFunctions>(moduleName,LibFuzzerFunctions(initFunc, testingFunc)));
|
||||
}
|
||||
|
||||
LibFuzzerFunctions LibFuzzerRegistry::getModuleFunctions(std::string& moduleName) {
|
||||
return moduleMap[moduleName];
|
||||
}
|
||||
|
||||
} // namespace mozilla
|
|
@ -0,0 +1,41 @@
|
|||
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
||||
* * This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* * License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||
|
||||
#ifndef _LibFuzzerRegistry_h__
|
||||
#define _LibFuzzerRegistry_h__
|
||||
|
||||
#include <cstdint>
|
||||
#include <map>
|
||||
#include <string>
|
||||
#include <utility>
|
||||
|
||||
#include "mozilla/Attributes.h"
|
||||
|
||||
typedef int(*LibFuzzerMain)(int, char**);
|
||||
typedef int(*LibFuzzerInitFunc)(int*, char***);
|
||||
typedef int(*LibFuzzerTestingFunc)(const uint8_t*, size_t);
|
||||
|
||||
namespace mozilla {
|
||||
|
||||
typedef std::pair<LibFuzzerInitFunc, LibFuzzerTestingFunc> LibFuzzerFunctions;
|
||||
|
||||
class LibFuzzerRegistry {
|
||||
public:
|
||||
MOZ_EXPORT static LibFuzzerRegistry& getInstance();
|
||||
MOZ_EXPORT void registerModule(std::string moduleName, LibFuzzerInitFunc initFunc, LibFuzzerTestingFunc testingFunc);
|
||||
MOZ_EXPORT LibFuzzerFunctions getModuleFunctions(std::string& moduleName);
|
||||
|
||||
LibFuzzerRegistry(LibFuzzerRegistry const&) = delete;
|
||||
void operator=(LibFuzzerRegistry const&) = delete;
|
||||
|
||||
private:
|
||||
LibFuzzerRegistry() {};
|
||||
std::map<std::string, LibFuzzerFunctions> moduleMap;
|
||||
};
|
||||
|
||||
} // namespace mozilla
|
||||
|
||||
|
||||
#endif // _LibFuzzerRegistry_h__
|
|
@ -0,0 +1,37 @@
|
|||
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
||||
* * This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* * License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||
|
||||
#include "LibFuzzerRunner.h"
|
||||
#include "mozilla/Attributes.h"
|
||||
#include "testing/TestHarness.h"
|
||||
#include "prenv.h"
|
||||
|
||||
namespace mozilla {
|
||||
|
||||
// We use a static var 'libFuzzerRunner' defined in nsAppRunner.cpp.
|
||||
// libFuzzerRunner is initialized to nullptr but if LibFuzzer (this file)
|
||||
// is linked in then libFuzzerRunner will be set here indicating that
|
||||
// we want to call into LibFuzzer's main.
|
||||
class _InitLibFuzzer {
|
||||
public:
|
||||
_InitLibFuzzer() {
|
||||
libFuzzerRunner = new LibFuzzerRunner();
|
||||
}
|
||||
} InitLibFuzzer;
|
||||
|
||||
int LibFuzzerRunner::Run() {
|
||||
ScopedXPCOM xpcom("LibFuzzer");
|
||||
return mFuzzerMain(mArgc, mArgv);
|
||||
}
|
||||
|
||||
typedef int(*LibFuzzerMain)(int, char**);
|
||||
|
||||
void LibFuzzerRunner::setParams(int argc, char** argv, LibFuzzerMain main) {
|
||||
mArgc = argc;
|
||||
mArgv = argv;
|
||||
mFuzzerMain = main;
|
||||
}
|
||||
|
||||
} // namespace mozilla
|
|
@ -0,0 +1,23 @@
|
|||
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
||||
* * This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* * License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||
|
||||
namespace mozilla {
|
||||
|
||||
typedef int(*LibFuzzerMain)(int, char**);
|
||||
|
||||
class LibFuzzerRunner {
|
||||
public:
|
||||
int Run();
|
||||
void setParams(int argc, char** argv, LibFuzzerMain main);
|
||||
|
||||
private:
|
||||
int mArgc;
|
||||
char** mArgv;
|
||||
LibFuzzerMain mFuzzerMain;
|
||||
};
|
||||
|
||||
extern LibFuzzerRunner* libFuzzerRunner;
|
||||
|
||||
} // namespace mozilla
|
|
@ -0,0 +1,19 @@
|
|||
# -*- Mode: python; c-basic-offset: 4; indent-tabs-mode: nil; tab-width: 40 -*-
|
||||
# vim: set filetype=python:
|
||||
# This Source Code Form is subject to the terms of the Mozilla Public
|
||||
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
Library('fuzzer-runner')
|
||||
|
||||
SOURCES += [
|
||||
'LibFuzzerRegistry.cpp',
|
||||
'LibFuzzerRunner.cpp',
|
||||
]
|
||||
|
||||
EXPORTS += [
|
||||
'LibFuzzerRegistry.h',
|
||||
'LibFuzzerRunner.h',
|
||||
]
|
||||
|
||||
FINAL_LIBRARY = "xul"
|
|
@ -0,0 +1,26 @@
|
|||
# -*- Mode: python; c-basic-offset: 4; indent-tabs-mode: nil; tab-width: 40 -*-
|
||||
# vim: set filetype=python:
|
||||
# This Source Code Form is subject to the terms of the Mozilla Public
|
||||
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
Library('fuzzer')
|
||||
|
||||
DIRS += [
|
||||
'harness',
|
||||
]
|
||||
|
||||
SOURCES += [
|
||||
'FuzzerCrossOver.cpp',
|
||||
'FuzzerCustomMain.cpp',
|
||||
'FuzzerDriver.cpp',
|
||||
'FuzzerExtFunctionsDlsym.cpp',
|
||||
'FuzzerExtFunctionsWeak.cpp',
|
||||
'FuzzerIO.cpp',
|
||||
'FuzzerLoop.cpp',
|
||||
'FuzzerMutate.cpp',
|
||||
'FuzzerSHA1.cpp',
|
||||
'FuzzerTracePC.cpp',
|
||||
'FuzzerTraceState.cpp',
|
||||
'FuzzerUtil.cpp',
|
||||
]
|
|
@ -0,0 +1,10 @@
|
|||
# -*- Mode: python; c-basic-offset: 4; indent-tabs-mode: nil; tab-width: 40 -*-
|
||||
# vim: set filetype=python:
|
||||
# This Source Code Form is subject to the terms of the Mozilla Public
|
||||
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
if CONFIG['LIBFUZZER']:
|
||||
DIRS += [
|
||||
'libfuzzer',
|
||||
]
|
|
@ -520,4 +520,16 @@ XRE_API(void,
|
|||
XRE_GlibInit, ())
|
||||
#endif
|
||||
|
||||
|
||||
#ifdef LIBFUZZER
|
||||
#include "LibFuzzerRegistry.h"
|
||||
|
||||
XRE_API(void,
|
||||
XRE_LibFuzzerSetMain, (int, char**, LibFuzzerMain))
|
||||
|
||||
XRE_API(void,
|
||||
XRE_LibFuzzerGetFuncs, (const char*, LibFuzzerInitFunc*,
|
||||
LibFuzzerTestingFunc*))
|
||||
#endif // LIBFUZZER
|
||||
|
||||
#endif // _nsXULAppAPI_h__
|
||||
|
|
Загрузка…
Ссылка в новой задаче