<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Sat, Sep 26, 2015 at 10:18 AM, Daniel Sanders <span dir="ltr"><<a href="mailto:Daniel.Sanders@imgtec.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=Daniel.Sanders@imgtec.com&cc=&bcc=&su=&body=','_blank');return false;">Daniel.Sanders@imgtec.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div>
<div style="direction:ltr;font-family:Tahoma;color:#000000;font-size:10pt">Done in r248671.<br>
<br>
It's unusual to have options to the right of a '--' </div></div></blockquote><div><br></div><div><br></div><div>Makes sense, thanks! </div><div><br></div><div>--kcc </div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div style="direction:ltr;font-family:Tahoma;color:#000000;font-size:10pt">since this normally instructs the parser to treat anything that follows as a positional argument (even if it looks like an option). Therefore the documented recommendation is double dash for llvm-mc-fuzzer
options and --fuzzer-args followed by single dash options for the fuzzer options. The fuzzer option parser will ignore the double dash options (including --fuzzer-args) and therefore process the single dash options, while the --fuzzer-args causes the CommandLine
library to ignore the fuzzer options.<br>
<br>
For example:<br>
llvm-mc-fuzzer --triple=arm-linux-gnu --disassemble --fuzzer-args -max_len=16 -use_counters=0 -jobs=10 MC-ARM
<div style="font-family:Times New Roman;color:#000000;font-size:16px">
<hr>
<div style="direction:ltr"><font color="#000000" face="Tahoma" size="2"><b>From:</b> Kostya Serebryany [<a href="mailto:kcc@google.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=kcc@google.com&cc=&bcc=&su=&body=','_blank');return false;">kcc@google.com</a>]<br>
<b>Sent:</b> 25 September 2015 19:06<div><div class="h5"><br>
<b>To:</b> Daniel Sanders<br>
<b>Cc:</b> LLVM Commits<br>
<b>Subject:</b> Re: [llvm] r247786 - llvm-mc-fuzzer: A fuzzing tool for the MC layer.<br>
</div></div></font><br>
</div><div><div class="h5">
<div></div>
<div>
<div dir="ltr">And I've realized what to do with the flags
<div><br>
<div>Of course, I've solved this problem before: libFuzzer's flag parser ignores everything </div>
<div>that starts with --</div>
<div>LLVM flag parser can consume flags starting with -- and </div>
<div>ignores everything after "--" parameter. </div>
<div><br>
</div>
<div>So, </div>
<div>
<pre style="color:rgb(0,0,0)">Index: llvm-mc-fuzzer/llvm-mc-fuzzer.cpp
===================================================================
--- llvm-mc-fuzzer/llvm-mc-fuzzer.cpp (revision 248580)
+++ llvm-mc-fuzzer/llvm-mc-fuzzer.cpp (working copy)
@@ -133,7 +133,7 @@
if (Action == AC_Assemble)
errs() << "error: -assemble is not implemented\n";
else if (Action == AC_Disassemble)
- return fuzzer::FuzzerDriver(FuzzerArgv, DisassembleOneInput);
+ return fuzzer::FuzzerDriver(argc, argv, DisassembleOneInput);
llvm_unreachable("Unknown action");
return 1;</pre>
<br>
and then call the fuzzer like this (note, -jobs=10 now works): </div>
./bin/llvm-mc-fuzzer --triple=arm-linux-gnu --disassemble -- MC-ARM -max_len=16 -use_counters=0 -jobs=10</div>
<div><br>
</div>
<div><br>
</div>
<div>Does this sound ok? </div>
<div>Would you like to make the change (and update the comments/docs)?</div>
<div><br>
</div>
<div>--kcc </div>
</div>
<div class="gmail_extra"><br>
<div class="gmail_quote">On Fri, Sep 25, 2015 at 10:26 AM, Kostya Serebryany <span dir="ltr">
<<a href="mailto:kcc@google.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=kcc@google.com&cc=&bcc=&su=&body=','_blank');return false;">kcc@google.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div dir="ltr"><br>
<div class="gmail_extra"><br>
<div class="gmail_quote"><span>On Sat, Sep 19, 2015 at 4:50 AM, Daniel Sanders
<span dir="ltr"><<a href="mailto:Daniel.Sanders@imgtec.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=Daniel.Sanders@imgtec.com&cc=&bcc=&su=&body=','_blank');return false;">Daniel.Sanders@imgtec.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
<div>
<div style="direction:ltr;font-family:Tahoma;color:rgb(0,0,0);font-size:10pt">
You've got the command right but llvm-mc doesn't accept raw binary input. You need something like:<br>
0x62 0xef 0xbf 0xbd 0x58 0xef 0xbf 0xbd<br>
<br>
</div>
</div>
</blockquote>
</span>
<div>Got it. </div>
<div>When libFuzzer finds a crash it prints the reproducer as comma-separated hex values (so that one can copy-paste to C code)<br>
0x62,0xf1,0x16,0x8,0xc2,0x21,0x22</div>
<div>So, to feed it back to llvm-mc I only need s/,/ /g</div>
<div> </div>
<div>Filed <a href="https://llvm.org/bugs/show_bug.cgi?id=24941" target="_blank">
https://llvm.org/bugs/show_bug.cgi?id=24941</a> for -triple x86_64-linux-gnu </div>
<div>
<div>
<div><br>
</div>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
<div>
<div style="direction:ltr;font-family:Tahoma;color:rgb(0,0,0);font-size:10pt">
I'm currently using the attached totxt.py script to convert the corpus to test files. The pretty printing assumes that instructions are 4 bytes and might discard the last 1-3 bytes if the input size isn't a multiple of 4. It's used like so:<br>
python totxt.py corpus/* > output.txt<br>
<br>
For the sake of completeness, I've also attached my test->corpus script (tobin.py). It's used like this:
<br>
python tobin.py tests/*.txt | split --bytes=4 - corpus/init-<br>
tobin.py concatenates the input files like 'cat' does so something needs to chop it up into the initial corpus files. For a fixed-length ISA, the 'split' command does the job. I don't have a solution for variable length yet.<br>
<br>
I've been thinking it might be sensible to add raw binary support to llvm-mc so that we don't need these scripts and can use llvm-mc's pretty printing but I haven't had chance to look at that yet.<br>
<br>
I have had one case that wasn't reproducible in llvm-mc. llvm-mc-fuzzer will sometimes try to disassemble a 0-byte buffer and this triggered a buffer overflow in the microMIPS disassembler. llvm-mc won't call the disassembler without any data so I ended up
reproducing it with a 1-byte input instead.<br>
<div style="font-family:'Times New Roman';color:rgb(0,0,0);font-size:16px">
<hr>
<div style="direction:ltr"><font color="#000000" face="Tahoma" size="2"><b>From:</b> Kostya Serebryany [<a href="mailto:kcc@google.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=kcc@google.com&cc=&bcc=&su=&body=','_blank');return false;">kcc@google.com</a>]<br>
<b>Sent:</b> 19 September 2015 01:44
<div>
<div><br>
<b>To:</b> Daniel Sanders<br>
<b>Cc:</b> LLVM Commits<br>
<b>Subject:</b> Re: [llvm] r247786 - llvm-mc-fuzzer: A fuzzing tool for the MC layer.<br>
</div>
</div>
</font><br>
</div>
<div>
<div>
<div></div>
<div>
<div dir="ltr">
<div>Daniel, </div>
<div><br>
</div>
one question related to /llvm-mc-fuzzer.
<div>When running as </div>
<div> ./bin/llvm-mc-fuzzer -triple x86_64-linux-gnu -disassemble -fuzzer-args CORPUS -max_len=8 </div>
<div>I quickly run into this: </div>
<div>
<div>==24687==ERROR: AddressSanitizer: SEGV on unknown address 0xf4360000606f (pc 0x7f5ef64a3cc9 bp 0x7ffc1682a750 sp 0x7ffc1682a5c8 T0)</div>
<div> #0 0x7f5ef64a3cc8 in gsignal /build/buildd/eglibc-2.19/signal/../nptl/sysdeps/unix/sysv/linux/raise.c:56</div>
<div> #1 0x7f5ef64a70d7 in abort /build/buildd/eglibc-2.19/stdlib/abort.c:89</div>
<div> #2 0xdd1bd8 in llvm::llvm_unreachable_internal(char const*, char const*, unsigned int) lib/Support/ErrorHandling.cpp:117:3</div>
<div> #3 0xb12448 in translateImmediate lib/Target/X86/Disassembler/X86Disassembler.cpp:379:16</div>
<div> #4 0xb12448 in translateOperand(llvm::MCInst&, llvm::X86Disassembler::OperandSpecifier const&, llvm::X86Disassembler::InternalInstruction&, llvm::MCDisassembler const*) lib/Target/X86/Disassembler/X86Disassembler.cpp:922</div>
<div> #5 0xb0d09b in translateInstruction lib/Target/X86/Disassembler/X86Disassembler.cpp:981:11</div>
<div> #6 0xb0d09b in llvm::X86Disassembler::X86GenericDisassembler::getInstruction(llvm::MCInst&, unsigned long&, llvm::ArrayRef<unsigned char>, unsigned long, llvm::raw_ostream&, llvm::raw_ostream&) const lib/Target/X86/Disassembler/X86Disassembler.cpp:160</div>
<div> #7 0xd3055b in LLVMDisasmInstruction lib/MC/MCDisassembler/Disassembler.cpp:253:7</div>
<div> #8 0x5162a6 in DisassembleOneInput(unsigned char const*, unsigned long) tools/llvm-mc-fuzzer/llvm-mc-fuzzer.cpp:71:16</div>
</div>
<div><br>
</div>
<div>But if I try to feed the crashy input into llvm-mc, nothing interesting happens: </div>
<div><br>
</div>
<div>
<div>% ./bin/llvm-mc -triple x86_64-linux-gnu -disassemble < crash-e3c8c95134622581ba71de8274406456dafef3b3</div>
<div>.text</div>
<div><stdin>:1:1: error: invalid input token</div>
<div>b�,X� </div>
</div>
<div><br>
</div>
<div>So, how do I invoke llvm-mc to make it behave close to what llvm-mc-fuzzer is doing? </div>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
</div>
<div class="gmail_extra"><br>
<div class="gmail_quote">On Thu, Sep 17, 2015 at 5:32 PM, Kostya Serebryany <span dir="ltr">
<<a href="mailto:kcc@google.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=kcc@google.com&cc=&bcc=&su=&body=','_blank');return false;">kcc@google.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
<div dir="ltr"><br>
<div class="gmail_extra"><br>
<div class="gmail_quote"><span>On Thu, Sep 17, 2015 at 2:38 AM, Daniel Sanders <span dir="ltr">
<<a href="mailto:Daniel.Sanders@imgtec.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=Daniel.Sanders@imgtec.com&cc=&bcc=&su=&body=','_blank');return false;">Daniel.Sanders@imgtec.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
<div lang="EN-GB">
<div><span>
<p class="MsoNormal">> I forgot to ask you to document the fuzzer at <a href="http://llvm.org/docs/LibFuzzer.html#fuzzing-components-of-llvm" target="_blank">http://llvm.org/docs/LibFuzzer.html#fuzzing-components-of-llvm</a><u></u><u></u></p>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif"><u></u> <u></u></span></p>
</span>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif">Will do<u></u><u></u></span></p>
<span>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif"><u></u> <u></u></span></p>
<p class="MsoNormal">> One problem: with the current structure of flags libFuzzer's -jobs=10 does not work... <u></u><u></u></p>
<p class="MsoNormal">> Thoughts? <u></u><u></u></p>
<p class="MsoNormal"><u></u> <u></u></p>
</span>
<p class="MsoNormal">Hmm. I see why that happens, each spawned thread is calling system() to spawn a subprocess and that system() call is given a command built from the fuzzer config. The resulting command lacks any of the non-fuzzer args and so the child llvm-mc-fuzzer
is trying to parse arguments meant for the underlying fuzzer. Why does it spawn a subprocess from the worker thread instead of doing the work directly inside the worker thread? Am I right in thinking that it's to stop a crash in one job from killing everything?<u></u><u></u></p>
<p class="MsoNormal"><u></u> <u></u></p>
<p class="MsoNormal">I can think of four options:<u></u><u></u></p>
<p><u></u><span>1.<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">
</span></span><u></u>fork() the new process instead of using system(). After the fork, the child should remove the effects of –job by setting it to 0 and reopen its stdout/stderr to achieve the same effect. This removes the need to reconstruct and reparse the
command line since fork() will duplicate the result of the parse in the child process. Unfortunately, I don't think there's a direct Windows equivalent to this outside of Cygwin.<u></u><u></u></p>
<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif"><span>2.<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">
</span></span></span><u></u>Separate fuzzer option parsing from the driver call. I'm thinking something along the lines of this quick sketch:<br>
FlagDescription *Config = FuzzerDriver::ParseFlags(FuzzerArgv);<br>
return FuzzerDriver::FuzzerDriver(argv, Config, DisassembleOneInput);<br>
That would allow argv to differ from the options the fuzzer understands which are in FuzzerArgv.<span style="font-size:11pt;font-family:Calibri,sans-serif"><u></u><u></u></span></p>
<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif"><span>3.<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">
</span></span></span><u></u>Make it possible to extend the fuzzer option parsing. The CommandLine library can do this nicely but you probably don't want the additional dependency in libFuzzer. Llvm-mc-fuzzer could always change to libFuzzer's approach to command
line parsing.<span style="font-size:11pt;font-family:Calibri,sans-serif"><u></u><u></u></span></p>
<p><u></u><span>4.<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">
</span></span><u></u>Make it possible to modify the command before the system() call. The client of libFuzzer could install a callback that allows it to modify a std::vector containing the desired Argv.</p>
</div>
</div>
</blockquote>
<div><br>
</div>
</span>
<div>I frankly like none of these, will need to think about it more... </div>
<div>It's probably not urgent for this particular fuzzer -- llvm-mc has pretty small inputs and we can fuzz lots out of it in a single process. </div>
<div>But will need to figure out for future uses like this. </div>
<div>Maybe, </div>
<div> 5. Add a libFuzzer option -target_options=-option1,param,-option2 </div>
<div>and run llvm-mc-fuzzer like "./bin/llvm-mc-fuzzer -target_options=-triple,x86_64-linux-gnu,-disassemble</div>
<div><br>
</div>
<div>BTW, I've found one llvm_unreachable with -triple x86_64-linux-gnu already... will file a bug. <br>
</div>
<div><br>
</div>
<div><br>
</div>
<div><br>
</div>
<div>--kcc </div>
<div>
<div>
<div> </div>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
<div lang="EN-GB">
<div>
<p><u></u><u></u></p>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif"><u></u> <u></u></span></p>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif">If all OS's had fork() then I'd favour #1 but Windows rules that out. Out of the rest #2 is seems the most flexible but #3/#4 are simpler. What's your opinion?<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11pt;font-family:Calibri,sans-serif"><u></u> <u></u></span></p>
<div style="border-style:none none none solid;border-left-color:blue;border-left-width:1.5pt;padding:0cm 0cm 0cm 4pt">
<div>
<div style="border-style:solid none none;border-top-color:rgb(181,196,223);border-top-width:1pt;padding:3pt 0cm 0cm">
<p class="MsoNormal"><b><span style="font-size:10pt;font-family:Tahoma,sans-serif" lang="EN-US">From:</span></b><span style="font-size:10pt;font-family:Tahoma,sans-serif" lang="EN-US"> Kostya Serebryany [mailto:<a href="mailto:kcc@google.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=kcc@google.com&cc=&bcc=&su=&body=','_blank');return false;">kcc@google.com</a>]
<br>
<b>Sent:</b> 17 September 2015 05:38<br>
<b>To:</b> Daniel Sanders<br>
<b>Cc:</b> LLVM Commits<br>
<b>Subject:</b> Re: [llvm] r247786 - llvm-mc-fuzzer: A fuzzing tool for the MC layer.<u></u><u></u></span></p>
</div>
</div>
<div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
<div>
<p class="MsoNormal">One problem: with the current structure of flags libFuzzer's -jobs=10 does not work... <u></u><u></u></p>
<div>
<p class="MsoNormal">Thoughts? <u></u><u></u></p>
</div>
</div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
<div>
<p class="MsoNormal">On Wed, Sep 16, 2015 at 9:25 PM, Kostya Serebryany <<a href="mailto:kcc@google.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=kcc@google.com&cc=&bcc=&su=&body=','_blank');return false;">kcc@google.com</a>> wrote:<u></u><u></u></p>
<div>
<p class="MsoNormal">Cool! I'll add it to the bot when time permits. <u></u><u></u></p>
<div>
<p class="MsoNormal">I forgot to ask you to document the fuzzer<u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">at <a href="http://llvm.org/docs/LibFuzzer.html#fuzzing-components-of-llvm" target="_blank">http://llvm.org/docs/LibFuzzer.html#fuzzing-components-of-llvm</a><u></u><u></u></p>
</div>
<div>
<p class="MsoNormal">Feel free to do it w/o prior review. <u></u><u></u></p>
</div>
</div>
<div>
<div>
<div>
<p class="MsoNormal"><u></u> <u></u></p>
<div>
<p class="MsoNormal">On Wed, Sep 16, 2015 at 4:49 AM, Daniel Sanders via llvm-commits <<a href="mailto:llvm-commits@lists.llvm.org" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=llvm-commits@lists.llvm.org&cc=&bcc=&su=&body=','_blank');return false;">llvm-commits@lists.llvm.org</a>> wrote:<u></u><u></u></p>
<p class="MsoNormal">Author: dsanders<br>
Date: Wed Sep 16 06:49:49 2015<br>
New Revision: 247786<br>
<br>
URL: <a href="http://llvm.org/viewvc/llvm-project?rev=247786&view=rev" target="_blank">
http://llvm.org/viewvc/llvm-project?rev=247786&view=rev</a><br>
Log:<br>
llvm-mc-fuzzer: A fuzzing tool for the MC layer.<br>
<br>
Summary:<br>
Only the disassembler is supported in this patch but it has already found a few<br>
issues in the Mips disassembler (mostly invalid instructions being successfully<br>
disassembled).<br>
<br>
Reviewers: kcc<br>
<br>
Subscribers: russell.gallop, silvas, kcc, llvm-commits<br>
<br>
Differential Revision: <a href="http://reviews.llvm.org/D12723" target="_blank">http://reviews.llvm.org/D12723</a><br>
<br>
Added:<br>
llvm/trunk/tools/llvm-mc-fuzzer/<br>
llvm/trunk/tools/llvm-mc-fuzzer/CMakeLists.txt<br>
llvm/trunk/tools/llvm-mc-fuzzer/llvm-mc-fuzzer.cpp<br>
Modified:<br>
llvm/trunk/docs/LibFuzzer.rst<br>
<br>
Modified: llvm/trunk/docs/LibFuzzer.rst<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/llvm/trunk/docs/LibFuzzer.rst?rev=247786&r1=247785&r2=247786&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/llvm/trunk/docs/LibFuzzer.rst?rev=247786&r1=247785&r2=247786&view=diff</a><br>
==============================================================================<br>
--- llvm/trunk/docs/LibFuzzer.rst (original)<br>
+++ llvm/trunk/docs/LibFuzzer.rst Wed Sep 16 06:49:49 2015<br>
@@ -453,7 +453,14 @@ Trophies<br>
<br>
* llvm-as: <a href="https://llvm.org/bugs/show_bug.cgi?id=24639" target="_blank">
https://llvm.org/bugs/show_bug.cgi?id=24639</a><br>
<br>
-<br>
+ * Disassembler:<br>
+ * Mips: Discovered a number of untested instructions for the Mips target<br>
+ (see valid-mips*.s in <a href="http://reviews.llvm.org/rL247405" target="_blank">
http://reviews.llvm.org/rL247405</a>,<br>
+ <a href="http://reviews.llvm.org/rL247414" target="_blank">http://reviews.llvm.org/rL247414</a>,
<a href="http://reviews.llvm.org/rL247416" target="_blank">http://reviews.llvm.org/rL247416</a>,<br>
+ <a href="http://reviews.llvm.org/rL247417" target="_blank">http://reviews.llvm.org/rL247417</a>,
<a href="http://reviews.llvm.org/rL247420" target="_blank">http://reviews.llvm.org/rL247420</a>,<br>
+ and <a href="http://reviews.llvm.org/rL247422" target="_blank">http://reviews.llvm.org/rL247422</a>) as well some instructions that<br>
+ successfully disassembled on ISA's where they were not valid (see<br>
+ invalid-xfail.s files in the same commits).<br>
<br>
.. _pcre2: <a href="http://www.pcre.org/" target="_blank">http://www.pcre.org/</a><br>
<br>
<br>
Added: llvm/trunk/tools/llvm-mc-fuzzer/CMakeLists.txt<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/llvm/trunk/tools/llvm-mc-fuzzer/CMakeLists.txt?rev=247786&view=auto" target="_blank">
http://llvm.org/viewvc/llvm-project/llvm/trunk/tools/llvm-mc-fuzzer/CMakeLists.txt?rev=247786&view=auto</a><br>
==============================================================================<br>
--- llvm/trunk/tools/llvm-mc-fuzzer/CMakeLists.txt (added)<br>
+++ llvm/trunk/tools/llvm-mc-fuzzer/CMakeLists.txt Wed Sep 16 06:49:49 2015<br>
@@ -0,0 +1,18 @@<br>
+if( LLVM_USE_SANITIZE_COVERAGE )<br>
+ include_directories(BEFORE<br>
+ ${CMAKE_CURRENT_SOURCE_DIR}/../../lib/Fuzzer)<br>
+<br>
+ set(LLVM_LINK_COMPONENTS<br>
+ AllTargetsDescs<br>
+ AllTargetsDisassemblers<br>
+ AllTargetsInfos<br>
+ MC<br>
+ MCDisassembler<br>
+ Support<br>
+ )<br>
+ add_llvm_tool(llvm-mc-fuzzer<br>
+ llvm-mc-fuzzer.cpp)<br>
+ target_link_libraries(llvm-mc-fuzzer<br>
+ LLVMFuzzerNoMain<br>
+ )<br>
+endif()<br>
<br>
Added: llvm/trunk/tools/llvm-mc-fuzzer/llvm-mc-fuzzer.cpp<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/llvm/trunk/tools/llvm-mc-fuzzer/llvm-mc-fuzzer.cpp?rev=247786&view=auto" target="_blank">
http://llvm.org/viewvc/llvm-project/llvm/trunk/tools/llvm-mc-fuzzer/llvm-mc-fuzzer.cpp?rev=247786&view=auto</a><br>
==============================================================================<br>
--- llvm/trunk/tools/llvm-mc-fuzzer/llvm-mc-fuzzer.cpp (added)<br>
+++ llvm/trunk/tools/llvm-mc-fuzzer/llvm-mc-fuzzer.cpp Wed Sep 16 06:49:49 2015<br>
@@ -0,0 +1,129 @@<br>
+//===--- llvm-mc-fuzzer.cpp - Fuzzer for the MC layer ---------------------===//<br>
+//<br>
+// The LLVM Compiler Infrastructure<br>
+//<br>
+// This file is distributed under the University of Illinois Open Source<br>
+// License. See LICENSE.TXT for details.<br>
+//<br>
+//===----------------------------------------------------------------------===//<br>
+//<br>
+//===----------------------------------------------------------------------===//<br>
+<br>
+#include "llvm-c/Disassembler.h"<br>
+#include "llvm-c/Target.h"<br>
+#include "llvm/ADT/ArrayRef.h"<br>
+#include "llvm/MC/SubtargetFeature.h"<br>
+#include "llvm/Support/CommandLine.h"<br>
+#include "llvm/Support/raw_ostream.h"<br>
+#include "FuzzerInterface.h"<br>
+<br>
+using namespace llvm;<br>
+<br>
+const unsigned AssemblyTextBufSize = 80;<br>
+<br>
+enum ActionType {<br>
+ AC_Assemble,<br>
+ AC_Disassemble<br>
+};<br>
+<br>
+static cl::opt<ActionType><br>
+Action(cl::desc("Action to perform:"),<br>
+ cl::init(AC_Assemble),<br>
+ cl::values(clEnumValN(AC_Assemble, "assemble",<br>
+ "Assemble a .s file (default)"),<br>
+ clEnumValN(AC_Disassemble, "disassemble",<br>
+ "Disassemble strings of hex bytes"),<br>
+ clEnumValEnd));<br>
+<br>
+static cl::opt<std::string><br>
+ TripleName("triple", cl::desc("Target triple to assemble for, "<br>
+ "see -version for available targets"));<br>
+<br>
+static cl::opt<std::string><br>
+ MCPU("mcpu",<br>
+ cl::desc("Target a specific cpu type (-mcpu=help for details)"),<br>
+ cl::value_desc("cpu-name"), cl::init(""));<br>
+<br>
+static cl::list<std::string><br>
+ MAttrs("mattr", cl::CommaSeparated,<br>
+ cl::desc("Target specific attributes (-mattr=help for details)"),<br>
+ cl::value_desc("a1,+a2,-a3,..."));<br>
+// The feature string derived from -mattr's values.<br>
+std::string FeaturesStr;<br>
+<br>
+static cl::list<std::string><br>
+ FuzzerArgv("fuzzer-args", cl::Positional,<br>
+ cl::desc("Options to pass to the fuzzer"), cl::ZeroOrMore,<br>
+ cl::PositionalEatsArgs);<br>
+<br>
+void DisassembleOneInput(const uint8_t *Data, size_t Size) {<br>
+ char AssemblyText[AssemblyTextBufSize];<br>
+<br>
+ std::vector<uint8_t> DataCopy(Data, Data + Size);<br>
+<br>
+ LLVMDisasmContextRef Ctx = LLVMCreateDisasmCPUFeatures(<br>
+ TripleName.c_str(), MCPU.c_str(), FeaturesStr.c_str(), nullptr, 0,<br>
+ nullptr, nullptr);<br>
+ assert(Ctx);<br>
+ uint8_t *p = DataCopy.data();<br>
+ unsigned Consumed;<br>
+ do {<br>
+ Consumed = LLVMDisasmInstruction(Ctx, p, Size, 0, AssemblyText,<br>
+ AssemblyTextBufSize);<br>
+ Size -= Consumed;<br>
+ p += Consumed;<br>
+ } while (Consumed != 0);<br>
+ LLVMDisasmDispose(Ctx);<br>
+}<br>
+<br>
+int main(int argc, char **argv) {<br>
+ // The command line is unusual compared to other fuzzers due to the need to<br>
+ // specify the target. Options like -triple, -mcpu, and -mattr work like<br>
+ // their counterparts in llvm-mc, while -fuzzer-args collects options for the<br>
+ // fuzzer itself.<br>
+ //<br>
+ // Examples:<br>
+ //<br>
+ // Fuzz the big-endian MIPS32R6 disassembler using 100,000 inputs of up to<br>
+ // 4-bytes each and use the contents of ./corpus as the test corpus:<br>
+ // llvm-mc-fuzzer -triple mips-linux-gnu -mcpu=mips32r6 -disassemble \<br>
+ // -fuzzer-args -max_len=4 -runs=100000 ./corpus<br>
+ //<br>
+ // Infinitely fuzz the little-endian MIPS64R2 disassembler with the MSA<br>
+ // feature enabled using up to 64-byte inputs:<br>
+ // llvm-mc-fuzzer -triple mipsel-linux-gnu -mcpu=mips64r2 -mattr=msa \<br>
+ // -disassemble -fuzzer-args ./corpus<br>
+ //<br>
+ // If your aim is to find instructions that are not tested, then it is<br>
+ // advisable to constrain the maximum input size to a single instruction<br>
+ // using -max_len as in the first example. This results in a test corpus of<br>
+ // individual instructions that test unique paths. Without this constraint,<br>
+ // there will be considerable redundancy in the corpus.<br>
+<br>
+ LLVMInitializeAllTargetInfos();<br>
+ LLVMInitializeAllTargetMCs();<br>
+ LLVMInitializeAllDisassemblers();<br>
+<br>
+ cl::ParseCommandLineOptions(argc, argv);<br>
+<br>
+ // Package up features to be passed to target/subtarget<br>
+ // We have to pass it via a global since the callback doesn't<br>
+ // permit any user data.<br>
+ if (MAttrs.size()) {<br>
+ SubtargetFeatures Features;<br>
+ for (unsigned i = 0; i != MAttrs.size(); ++i)<br>
+ Features.AddFeature(MAttrs[i]);<br>
+ FeaturesStr = Features.getString();<br>
+ }<br>
+<br>
+ // Insert the program name into the FuzzerArgv.<br>
+ FuzzerArgv.insert(FuzzerArgv.begin(), argv[0]);<br>
+<br>
+ if (Action == AC_Assemble)<br>
+ errs() << "error: -assemble is not implemented\n";<br>
+ else if (Action == AC_Disassemble)<br>
+ return fuzzer::FuzzerDriver(FuzzerArgv, DisassembleOneInput);<br>
+<br>
+ llvm_unreachable("Unknown action");<br>
+ return 1;<br>
+}<br>
<br>
<br>
_______________________________________________<br>
llvm-commits mailing list<br>
<a href="mailto:llvm-commits@lists.llvm.org" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=llvm-commits@lists.llvm.org&cc=&bcc=&su=&body=','_blank');return false;">llvm-commits@lists.llvm.org</a><br>
<a href="http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits" target="_blank">http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits</a><u></u><u></u></p>
</div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
</div>
</div>
</div>
<p class="MsoNormal"><u></u> <u></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
</div>
</div>
<br>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
</div>
</div>
<br>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</div></div></div>
</div>
</div>
</blockquote></div><br></div></div>