]> granicus.if.org Git - llvm/commitdiff
[libFuzzer] add a test for libFuzzer+ubsan, extend the docs on using libFuzzer+ubsan
authorKostya Serebryany <kcc@google.com>
Mon, 9 May 2016 21:02:36 +0000 (21:02 +0000)
committerKostya Serebryany <kcc@google.com>
Mon, 9 May 2016 21:02:36 +0000 (21:02 +0000)
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@268968 91177308-0d34-0410-b5e6-96231b3b80d8

docs/LibFuzzer.rst
lib/Fuzzer/test/CMakeLists.txt
lib/Fuzzer/test/SignedIntOverflowTest.cpp [new file with mode: 0644]
lib/Fuzzer/test/fuzzer-ubsan.test [new file with mode: 0644]
lib/Fuzzer/test/ubsan/CMakeLists.txt [new file with mode: 0644]

index 5a3c335182b3583286a8521065bd64826a9ea651..ae0850e2a822760dddfa886c3ee69e530ae1a55b 100644 (file)
@@ -93,11 +93,14 @@ the libFuzzer code then gives an fuzzer executable.
 You should also enable one or more of the *sanitizers*, which help to expose
 latent bugs by making incorrect behavior generate errors at runtime:
 
- - AddressSanitizer_ detects memory access errors.
- - MemorySanitizer_ detects uninitialized reads: code whose behavior relies on memory
-   contents that have not been initialized to a specific value.
- - UndefinedBehaviorSanitizer_ detects the use of various features of C/C++ that are explicitly
-   listed as resulting in undefined behavior.
+ - AddressSanitizer_ (ASAN) detects memory access errors. Use `-fsanitize=address`.
+ - UndefinedBehaviorSanitizer_ (UBSAN) detects the use of various features of C/C++ that are explicitly
+   listed as resulting in undefined behavior.  Use `-fsanitize=undefined -fno-sanitize-recover=undefined`
+   or any individual UBSAN check, e.g.  `-fsanitize=signed-integer-overflow -fno-sanitize-recover=undefined`.
+   You may combine ASAN and UBSAN in one build.
+ - MemorySanitizer_ (MSAN) detects uninitialized reads: code whose behavior relies on memory
+   contents that have not been initialized to a specific value. Use `-fsanitize=memory`.
+   MSAN can not be combined with other sanirizers and should be used as a seprate build.
 
 Finally, link with ``libFuzzer.a``::
 
index 81a996930f4aa32dd9ed3e325a1afb116ee26c9b..52ed2f5bbb30f6c2ca9da92e3686eac99c723898 100644 (file)
@@ -57,6 +57,10 @@ set(TracePCTests
   FullCoverageSetTest
   )
 
+set(UbsanTests
+  SignedIntOverflowTest
+  )
+
 set(TestBinaries)
 
 foreach(Test ${Tests})
@@ -118,6 +122,12 @@ foreach(Test ${UninstrumentedTests})
   set(TestBinaries ${TestBinaries} LLVMFuzzer-${Test}-Uninstrumented)
 endforeach()
 
+add_subdirectory(ubsan)
+
+foreach(Test ${UbsanTests})
+  set(TestBinaries ${TestBinaries} LLVMFuzzer-${Test}-Ubsan)
+endforeach()
+
 add_subdirectory(trace-bb)
 
 foreach(Test ${TraceBBTests})
diff --git a/lib/Fuzzer/test/SignedIntOverflowTest.cpp b/lib/Fuzzer/test/SignedIntOverflowTest.cpp
new file mode 100644 (file)
index 0000000..7df32ad
--- /dev/null
@@ -0,0 +1,28 @@
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+
+// Test for signed-integer-overflow.
+#include <assert.h>
+#include <cstdint>
+#include <cstdlib>
+#include <cstddef>
+#include <iostream>
+#include <climits>
+
+static volatile int Sink;
+static int Large = INT_MAX;
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
+  assert(Data);
+  if (Size > 0 && Data[0] == 'H') {
+    Sink = 1;
+    if (Size > 1 && Data[1] == 'i') {
+      Sink = 2;
+      if (Size > 2 && Data[2] == '!') {
+        Large++;  // int overflow.
+      }
+    }
+  }
+  return 0;
+}
+
diff --git a/lib/Fuzzer/test/fuzzer-ubsan.test b/lib/Fuzzer/test/fuzzer-ubsan.test
new file mode 100644 (file)
index 0000000..0e8ad6c
--- /dev/null
@@ -0,0 +1,4 @@
+RUN: not LLVMFuzzer-SignedIntOverflowTest-Ubsan 2>&1 | FileCheck %s
+CHECK: runtime error: signed integer overflow: 2147483647 + 1 cannot be represented in type 'int'
+CHECK: Test unit written to ./crash-
+
diff --git a/lib/Fuzzer/test/ubsan/CMakeLists.txt b/lib/Fuzzer/test/ubsan/CMakeLists.txt
new file mode 100644 (file)
index 0000000..5547704
--- /dev/null
@@ -0,0 +1,14 @@
+# These tests are instrumented with ubsan in non-recovery mode.
+
+set(CMAKE_CXX_FLAGS_RELEASE
+  "${LIBFUZZER_FLAGS_BASE} -O0 -fsanitize=undefined -fno-sanitize-recover=all")
+
+foreach(Test ${UbsanTests})
+  add_executable(LLVMFuzzer-${Test}-Ubsan
+    ../${Test}.cpp
+    )
+  target_link_libraries(LLVMFuzzer-${Test}-Ubsan
+    LLVMFuzzer
+    )
+endforeach()
+