[llvm] r268968 - [libFuzzer] add a test for libFuzzer+ubsan, extend the docs on using libFuzzer+ubsan
Kostya Serebryany via llvm-commits
llvm-commits at lists.llvm.org
Mon May 9 14:02:36 PDT 2016
Author: kcc
Date: Mon May 9 16:02:36 2016
New Revision: 268968
URL: http://llvm.org/viewvc/llvm-project?rev=268968&view=rev
Log:
[libFuzzer] add a test for libFuzzer+ubsan, extend the docs on using libFuzzer+ubsan
Added:
llvm/trunk/lib/Fuzzer/test/SignedIntOverflowTest.cpp
llvm/trunk/lib/Fuzzer/test/fuzzer-ubsan.test
llvm/trunk/lib/Fuzzer/test/ubsan/
llvm/trunk/lib/Fuzzer/test/ubsan/CMakeLists.txt
Modified:
llvm/trunk/docs/LibFuzzer.rst
llvm/trunk/lib/Fuzzer/test/CMakeLists.txt
Modified: llvm/trunk/docs/LibFuzzer.rst
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/docs/LibFuzzer.rst?rev=268968&r1=268967&r2=268968&view=diff
==============================================================================
--- llvm/trunk/docs/LibFuzzer.rst (original)
+++ llvm/trunk/docs/LibFuzzer.rst Mon May 9 16:02:36 2016
@@ -93,11 +93,14 @@ the libFuzzer code then gives an fuzzer
You should also enable one or more of the *sanitizers*, which help to expose
latent bugs by making incorrect behavior generate errors at runtime:
- - AddressSanitizer_ detects memory access errors.
- - MemorySanitizer_ detects uninitialized reads: code whose behavior relies on memory
- contents that have not been initialized to a specific value.
- - UndefinedBehaviorSanitizer_ detects the use of various features of C/C++ that are explicitly
- listed as resulting in undefined behavior.
+ - AddressSanitizer_ (ASAN) detects memory access errors. Use `-fsanitize=address`.
+ - UndefinedBehaviorSanitizer_ (UBSAN) detects the use of various features of C/C++ that are explicitly
+ listed as resulting in undefined behavior. Use `-fsanitize=undefined -fno-sanitize-recover=undefined`
+ or any individual UBSAN check, e.g. `-fsanitize=signed-integer-overflow -fno-sanitize-recover=undefined`.
+ You may combine ASAN and UBSAN in one build.
+ - MemorySanitizer_ (MSAN) detects uninitialized reads: code whose behavior relies on memory
+ contents that have not been initialized to a specific value. Use `-fsanitize=memory`.
+ MSAN can not be combined with other sanirizers and should be used as a seprate build.
Finally, link with ``libFuzzer.a``::
Modified: llvm/trunk/lib/Fuzzer/test/CMakeLists.txt
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Fuzzer/test/CMakeLists.txt?rev=268968&r1=268967&r2=268968&view=diff
==============================================================================
--- llvm/trunk/lib/Fuzzer/test/CMakeLists.txt (original)
+++ llvm/trunk/lib/Fuzzer/test/CMakeLists.txt Mon May 9 16:02:36 2016
@@ -57,6 +57,10 @@ set(TracePCTests
FullCoverageSetTest
)
+set(UbsanTests
+ SignedIntOverflowTest
+ )
+
set(TestBinaries)
foreach(Test ${Tests})
@@ -118,6 +122,12 @@ foreach(Test ${UninstrumentedTests})
set(TestBinaries ${TestBinaries} LLVMFuzzer-${Test}-Uninstrumented)
endforeach()
+add_subdirectory(ubsan)
+
+foreach(Test ${UbsanTests})
+ set(TestBinaries ${TestBinaries} LLVMFuzzer-${Test}-Ubsan)
+endforeach()
+
add_subdirectory(trace-bb)
foreach(Test ${TraceBBTests})
Added: llvm/trunk/lib/Fuzzer/test/SignedIntOverflowTest.cpp
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Fuzzer/test/SignedIntOverflowTest.cpp?rev=268968&view=auto
==============================================================================
--- llvm/trunk/lib/Fuzzer/test/SignedIntOverflowTest.cpp (added)
+++ llvm/trunk/lib/Fuzzer/test/SignedIntOverflowTest.cpp Mon May 9 16:02:36 2016
@@ -0,0 +1,28 @@
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+
+// Test for signed-integer-overflow.
+#include <assert.h>
+#include <cstdint>
+#include <cstdlib>
+#include <cstddef>
+#include <iostream>
+#include <climits>
+
+static volatile int Sink;
+static int Large = INT_MAX;
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
+ assert(Data);
+ if (Size > 0 && Data[0] == 'H') {
+ Sink = 1;
+ if (Size > 1 && Data[1] == 'i') {
+ Sink = 2;
+ if (Size > 2 && Data[2] == '!') {
+ Large++; // int overflow.
+ }
+ }
+ }
+ return 0;
+}
+
Added: llvm/trunk/lib/Fuzzer/test/fuzzer-ubsan.test
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Fuzzer/test/fuzzer-ubsan.test?rev=268968&view=auto
==============================================================================
--- llvm/trunk/lib/Fuzzer/test/fuzzer-ubsan.test (added)
+++ llvm/trunk/lib/Fuzzer/test/fuzzer-ubsan.test Mon May 9 16:02:36 2016
@@ -0,0 +1,4 @@
+RUN: not LLVMFuzzer-SignedIntOverflowTest-Ubsan 2>&1 | FileCheck %s
+CHECK: runtime error: signed integer overflow: 2147483647 + 1 cannot be represented in type 'int'
+CHECK: Test unit written to ./crash-
+
Added: llvm/trunk/lib/Fuzzer/test/ubsan/CMakeLists.txt
URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Fuzzer/test/ubsan/CMakeLists.txt?rev=268968&view=auto
==============================================================================
--- llvm/trunk/lib/Fuzzer/test/ubsan/CMakeLists.txt (added)
+++ llvm/trunk/lib/Fuzzer/test/ubsan/CMakeLists.txt Mon May 9 16:02:36 2016
@@ -0,0 +1,14 @@
+# These tests are instrumented with ubsan in non-recovery mode.
+
+set(CMAKE_CXX_FLAGS_RELEASE
+ "${LIBFUZZER_FLAGS_BASE} -O0 -fsanitize=undefined -fno-sanitize-recover=all")
+
+foreach(Test ${UbsanTests})
+ add_executable(LLVMFuzzer-${Test}-Ubsan
+ ../${Test}.cpp
+ )
+ target_link_libraries(LLVMFuzzer-${Test}-Ubsan
+ LLVMFuzzer
+ )
+endforeach()
+
More information about the llvm-commits
mailing list