[llvm] 544cb64 - [YAMLIO] Add a generic YAML fuzzer harness

Scott Linder via llvm-commits llvm-commits at lists.llvm.org
Wed Nov 18 15:15:56 PST 2020


Author: Scott Linder
Date: 2020-11-18T23:06:03Z
New Revision: 544cb649d7789a4199e8acea6e8a9da1409702b1

URL: https://github.com/llvm/llvm-project/commit/544cb649d7789a4199e8acea6e8a9da1409702b1
DIFF: https://github.com/llvm/llvm-project/commit/544cb649d7789a4199e8acea6e8a9da1409702b1.diff

LOG: [YAMLIO] Add a generic YAML fuzzer harness

This is essentially a clone of the existing fuzzer added in D50839, but
for the whole parser Streamer, and currently only testing for sanitizer
violations.

Differential Revision: https://reviews.llvm.org/D91573

Added: 
    llvm/tools/llvm-yaml-parser-fuzzer/CMakeLists.txt
    llvm/tools/llvm-yaml-parser-fuzzer/DummyYAMLParserFuzzer.cpp
    llvm/tools/llvm-yaml-parser-fuzzer/yaml-parser-fuzzer.cpp

Modified: 
    

Removed: 
    


################################################################################
diff  --git a/llvm/tools/llvm-yaml-parser-fuzzer/CMakeLists.txt b/llvm/tools/llvm-yaml-parser-fuzzer/CMakeLists.txt
new file mode 100644
index 000000000000..348a8fb2a97e
--- /dev/null
+++ b/llvm/tools/llvm-yaml-parser-fuzzer/CMakeLists.txt
@@ -0,0 +1,9 @@
+set(LLVM_LINK_COMPONENTS
+  Support
+  FuzzMutate
+)
+
+add_llvm_fuzzer(llvm-yaml-parser-fuzzer
+  yaml-parser-fuzzer.cpp
+  DUMMY_MAIN DummyYAMLParserFuzzer.cpp
+  )

diff  --git a/llvm/tools/llvm-yaml-parser-fuzzer/DummyYAMLParserFuzzer.cpp b/llvm/tools/llvm-yaml-parser-fuzzer/DummyYAMLParserFuzzer.cpp
new file mode 100644
index 000000000000..13f64d650288
--- /dev/null
+++ b/llvm/tools/llvm-yaml-parser-fuzzer/DummyYAMLParserFuzzer.cpp
@@ -0,0 +1,18 @@
+//===--- DummyYAMLParserFuzzer.cpp ----------------------------------------===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
+//
+//===----------------------------------------------------------------------===//
+//
+// Implementation of main so we can build and test without linking libFuzzer.
+//
+//===----------------------------------------------------------------------===//
+
+#include "llvm/FuzzMutate/FuzzerCLI.h"
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size);
+int main(int argc, char *argv[]) {
+  return llvm::runFuzzerOnInputs(argc, argv, LLVMFuzzerTestOneInput);
+}

diff  --git a/llvm/tools/llvm-yaml-parser-fuzzer/yaml-parser-fuzzer.cpp b/llvm/tools/llvm-yaml-parser-fuzzer/yaml-parser-fuzzer.cpp
new file mode 100644
index 000000000000..edce19f7b1b3
--- /dev/null
+++ b/llvm/tools/llvm-yaml-parser-fuzzer/yaml-parser-fuzzer.cpp
@@ -0,0 +1,32 @@
+//===-- yaml-parser-fuzzer.cpp - Fuzzer for YAML parser -------------------===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
+//
+//===----------------------------------------------------------------------===//
+
+#include "llvm/ADT/StringRef.h"
+#include "llvm/Support/YAMLParser.h"
+
+using namespace llvm;
+
+static bool isValidYaml(const uint8_t *Data, size_t Size) {
+  SourceMgr SM;
+  yaml::Stream Stream(StringRef(reinterpret_cast<const char *>(Data), Size),
+                      SM);
+  return Stream.validate();
+}
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
+  std::vector<uint8_t> Input(Data, Data + Size);
+
+  // Ensure we don't crash on byte strings where the only null character is
+  // one-past-the-end of the actual input to the parser.
+  Input.erase(std::remove(Input.begin(), Input.end(), 0), Input.end());
+  Input.push_back(0);
+  Input.shrink_to_fit();
+  isValidYaml(Input.data(), Input.size() - 1);
+
+  return 0;
+}


        


More information about the llvm-commits mailing list