1
0
mirror of https://github.com/RPCS3/llvm-mirror.git synced 2024-11-23 03:02:36 +01:00

[fuzzer] Add support for token-based fuzzing (e.g. for C++). Allow string flags.

llvm-svn: 233745
This commit is contained in:
Kostya Serebryany 2015-03-31 20:13:20 +00:00
parent 8ab1b98407
commit c69c3a7d4e
10 changed files with 422 additions and 58 deletions

View File

@ -18,6 +18,10 @@
#include <thread> #include <thread>
#include <atomic> #include <atomic>
#include <mutex> #include <mutex>
#include <string>
#include <sstream>
#include <algorithm>
#include <iterator>
namespace fuzzer { namespace fuzzer {
@ -26,19 +30,26 @@ struct FlagDescription {
const char *Name; const char *Name;
const char *Description; const char *Description;
int Default; int Default;
int *Flag; int *IntFlag;
const char **StrFlag;
}; };
struct { struct {
#define FUZZER_FLAG(Type, Name, Default, Description) Type Name; #define FUZZER_FLAG_INT(Name, Default, Description) int Name;
#define FUZZER_FLAG_STRING(Name, Description) const char *Name;
#include "FuzzerFlags.def" #include "FuzzerFlags.def"
#undef FUZZER_FLAG #undef FUZZER_FLAG_INT
#undef FUZZER_FLAG_STRING
} Flags; } Flags;
static FlagDescription FlagDescriptions [] { static FlagDescription FlagDescriptions [] {
#define FUZZER_FLAG(Type, Name, Default, Description) {#Name, Description, Default, &Flags.Name}, #define FUZZER_FLAG_INT(Name, Default, Description) \
{ #Name, Description, Default, &Flags.Name, nullptr},
#define FUZZER_FLAG_STRING(Name, Description) \
{ #Name, Description, 0, nullptr, &Flags.Name },
#include "FuzzerFlags.def" #include "FuzzerFlags.def"
#undef FUZZER_FLAG #undef FUZZER_FLAG_INT
#undef FUZZER_FLAG_STRING
}; };
static const size_t kNumFlags = static const size_t kNumFlags =
@ -79,11 +90,18 @@ static bool ParseOneFlag(const char *Param) {
const char *Name = FlagDescriptions[F].Name; const char *Name = FlagDescriptions[F].Name;
const char *Str = FlagValue(Param, Name); const char *Str = FlagValue(Param, Name);
if (Str) { if (Str) {
int Val = std::stol(Str); if (FlagDescriptions[F].IntFlag) {
*FlagDescriptions[F].Flag = Val; int Val = std::stol(Str);
if (Flags.verbosity >= 2) *FlagDescriptions[F].IntFlag = Val;
std::cerr << "Flag: " << Name << " " << Val << "\n"; if (Flags.verbosity >= 2)
return true; std::cerr << "Flag: " << Name << " " << Val << "\n";
return true;
} else if (FlagDescriptions[F].StrFlag) {
*FlagDescriptions[F].StrFlag = Str;
if (Flags.verbosity >= 2)
std::cerr << "Flag: " << Name << " " << Str << "\n";
return true;
}
} }
} }
PrintHelp(); PrintHelp();
@ -92,8 +110,12 @@ static bool ParseOneFlag(const char *Param) {
// We don't use any library to minimize dependencies. // We don't use any library to minimize dependencies.
static void ParseFlags(int argc, char **argv) { static void ParseFlags(int argc, char **argv) {
for (size_t F = 0; F < kNumFlags; F++) for (size_t F = 0; F < kNumFlags; F++) {
*FlagDescriptions[F].Flag = FlagDescriptions[F].Default; if (FlagDescriptions[F].IntFlag)
*FlagDescriptions[F].IntFlag = FlagDescriptions[F].Default;
if (FlagDescriptions[F].StrFlag)
*FlagDescriptions[F].StrFlag = nullptr;
}
for (int A = 1; A < argc; A++) { for (int A = 1; A < argc; A++) {
if (ParseOneFlag(argv[A])) continue; if (ParseOneFlag(argv[A])) continue;
inputs.push_back(argv[A]); inputs.push_back(argv[A]);
@ -139,6 +161,26 @@ static int RunInMultipleProcesses(int argc, char **argv, int NumWorkers,
return HasErrors ? 1 : 0; return HasErrors ? 1 : 0;
} }
std::vector<std::string> ReadTokensFile(const char *TokensFilePath) {
if (!TokensFilePath) return {};
std::string TokensFileContents = FileToString(TokensFilePath);
std::istringstream ISS(TokensFileContents);
std::vector<std::string> Res = {std::istream_iterator<std::string>{ISS},
std::istream_iterator<std::string>{}};
Res.push_back(" ");
Res.push_back("\t");
Res.push_back("\n");
return Res;
}
int ApplyTokens(const Fuzzer &F, const char *InputFilePath) {
Unit U = FileToVector(InputFilePath);
auto T = F.SubstituteTokens(U);
T.push_back(0);
std::cout << T.data();
return 0;
}
int FuzzerDriver(int argc, char **argv, UserCallback Callback) { int FuzzerDriver(int argc, char **argv, UserCallback Callback) {
using namespace fuzzer; using namespace fuzzer;
@ -164,6 +206,7 @@ int FuzzerDriver(int argc, char **argv, UserCallback Callback) {
Options.UseDFSan = Flags.dfsan; Options.UseDFSan = Flags.dfsan;
Options.PreferSmallDuringInitialShuffle = Options.PreferSmallDuringInitialShuffle =
Flags.prefer_small_during_initial_shuffle; Flags.prefer_small_during_initial_shuffle;
Options.Tokens = ReadTokensFile(Flags.tokens);
if (Flags.runs >= 0) if (Flags.runs >= 0)
Options.MaxNumberOfRuns = Flags.runs; Options.MaxNumberOfRuns = Flags.runs;
if (!inputs.empty()) if (!inputs.empty())
@ -182,6 +225,16 @@ int FuzzerDriver(int argc, char **argv, UserCallback Callback) {
if (Flags.timeout > 0) if (Flags.timeout > 0)
SetTimer(Flags.timeout); SetTimer(Flags.timeout);
if (Flags.verbosity >= 2) {
std::cerr << "Tokens: {";
for (auto &T : Options.Tokens)
std::cerr << T << ",";
std::cerr << "}\n";
}
if (Flags.apply_tokens)
return ApplyTokens(F, Flags.apply_tokens);
for (auto &inp : inputs) for (auto &inp : inputs)
F.ReadDir(inp); F.ReadDir(inp);

View File

@ -6,43 +6,48 @@
// License. See LICENSE.TXT for details. // License. See LICENSE.TXT for details.
// //
//===----------------------------------------------------------------------===// //===----------------------------------------------------------------------===//
// Flags. FUZZER_FLAG macro should be defined at the point of inclusion. // Flags. FUZZER_FLAG_INT/FUZZER_FLAG_STRING macros should be defined at the
// We are not using any flag parsing library for better portability and // point of inclusion. We are not using any flag parsing library for better
// independence. // portability and independence.
//===----------------------------------------------------------------------===// //===----------------------------------------------------------------------===//
FUZZER_FLAG(int, verbosity, 1, "Verbosity level.") FUZZER_FLAG_INT(verbosity, 1, "Verbosity level.")
FUZZER_FLAG(int, seed, 0, "Random seed. If 0, seed is generated.") FUZZER_FLAG_INT(seed, 0, "Random seed. If 0, seed is generated.")
FUZZER_FLAG(int, iterations, -1, FUZZER_FLAG_INT(iterations, -1,
"Number of iterations of the fuzzer internal loop" "Number of iterations of the fuzzer internal loop"
" (-1 for infinite iterations).") " (-1 for infinite iterations).")
FUZZER_FLAG(int, runs, -1, FUZZER_FLAG_INT(runs, -1,
"Number of individual test runs (-1 for infinite runs).") "Number of individual test runs (-1 for infinite runs).")
FUZZER_FLAG(int, max_len, 64, "Maximal length of the test input.") FUZZER_FLAG_INT(max_len, 64, "Maximal length of the test input.")
FUZZER_FLAG(int, cross_over, 1, "If 1, cross over inputs.") FUZZER_FLAG_INT(cross_over, 1, "If 1, cross over inputs.")
FUZZER_FLAG(int, mutate_depth, 5, FUZZER_FLAG_INT(mutate_depth, 5,
"Apply this number of consecutive mutations to each input.") "Apply this number of consecutive mutations to each input.")
FUZZER_FLAG( FUZZER_FLAG_INT(
int, prefer_small_during_initial_shuffle, -1, prefer_small_during_initial_shuffle, -1,
"If 1, always prefer smaller inputs during the initial corpus shuffle." "If 1, always prefer smaller inputs during the initial corpus shuffle."
" If 0, never do that. If -1, do it sometimes.") " If 0, never do that. If -1, do it sometimes.")
FUZZER_FLAG(int, exit_on_first, 0, FUZZER_FLAG_INT(exit_on_first, 0,
"If 1, exit after the first new interesting input is found.") "If 1, exit after the first new interesting input is found.")
FUZZER_FLAG(int, timeout, -1, "Timeout in seconds (if positive).") FUZZER_FLAG_INT(timeout, -1, "Timeout in seconds (if positive).")
FUZZER_FLAG(int, help, 0, "Print help.") FUZZER_FLAG_INT(help, 0, "Print help.")
FUZZER_FLAG( FUZZER_FLAG_INT(
int, save_minimized_corpus, 0, save_minimized_corpus, 0,
"If 1, the minimized corpus is saved into the first input directory") "If 1, the minimized corpus is saved into the first input directory")
FUZZER_FLAG(int, use_counters, 0, "Use coverage counters") FUZZER_FLAG_INT(use_counters, 0, "Use coverage counters")
FUZZER_FLAG(int, use_full_coverage_set, 0, FUZZER_FLAG_INT(use_full_coverage_set, 0,
"Experimental: Maximize the number of different full" "Experimental: Maximize the number of different full"
" coverage sets as opposed to maximizing the total coverage." " coverage sets as opposed to maximizing the total coverage."
" This is potentially MUCH slower, but may discover more paths.") " This is potentially MUCH slower, but may discover more paths.")
FUZZER_FLAG(int, use_coverage_pairs, 0, FUZZER_FLAG_INT(use_coverage_pairs, 0,
"Experimental: Maximize the number of different coverage pairs.") "Experimental: Maximize the number of different coverage pairs.")
FUZZER_FLAG(int, jobs, 0, "Number of jobs to run. If jobs >= 1 we spawn" FUZZER_FLAG_INT(jobs, 0, "Number of jobs to run. If jobs >= 1 we spawn"
" this number of jobs in separate worker processes" " this number of jobs in separate worker processes"
" with stdout/stderr redirected to fuzz-JOB.log.") " with stdout/stderr redirected to fuzz-JOB.log.")
FUZZER_FLAG(int, workers, 0, FUZZER_FLAG_INT(workers, 0,
"Number of simultaneous worker processes to run the jobs.") "Number of simultaneous worker processes to run the jobs.")
FUZZER_FLAG(int, dfsan, 1, "Use DFSan for taint-guided mutations. No-op unless " FUZZER_FLAG_INT(dfsan, 1, "Use DFSan for taint-guided mutations. No-op unless "
"the DFSan instrumentation was compiled in.") "the DFSan instrumentation was compiled in.")
FUZZER_FLAG_STRING(tokens, "Use the file with tokens (one token per line) to"
" fuzz a token based input language.")
FUZZER_FLAG_STRING(apply_tokens, "Read the given input file, substitute bytes "
" with tokens and write the result to stdout.")

View File

@ -33,6 +33,12 @@ Unit FileToVector(const std::string &Path) {
std::istreambuf_iterator<char>()); std::istreambuf_iterator<char>());
} }
std::string FileToString(const std::string &Path) {
std::ifstream T(Path);
return std::string((std::istreambuf_iterator<char>(T)),
std::istreambuf_iterator<char>());
}
void CopyFileToErr(const std::string &Path) { void CopyFileToErr(const std::string &Path) {
std::ifstream T(Path); std::ifstream T(Path);
std::copy(std::istreambuf_iterator<char>(T), std::istreambuf_iterator<char>(), std::copy(std::istreambuf_iterator<char>(T), std::istreambuf_iterator<char>(),

View File

@ -23,7 +23,8 @@ namespace fuzzer {
typedef std::vector<uint8_t> Unit; typedef std::vector<uint8_t> Unit;
using namespace std::chrono; using namespace std::chrono;
Unit ReadFile(const char *Path); std::string FileToString(const std::string &Path);
Unit FileToVector(const std::string &Path);
void ReadDirToVectorOfUnits(const char *Path, std::vector<Unit> *V); void ReadDirToVectorOfUnits(const char *Path, std::vector<Unit> *V);
void WriteToFile(const Unit &U, const std::string &Path); void WriteToFile(const Unit &U, const std::string &Path);
void CopyFileToErr(const std::string &Path); void CopyFileToErr(const std::string &Path);
@ -55,12 +56,9 @@ class Fuzzer {
int PreferSmallDuringInitialShuffle = -1; int PreferSmallDuringInitialShuffle = -1;
size_t MaxNumberOfRuns = ULONG_MAX; size_t MaxNumberOfRuns = ULONG_MAX;
std::string OutputCorpus; std::string OutputCorpus;
std::vector<std::string> Tokens;
}; };
Fuzzer(UserCallback Callback, FuzzingOptions Options) Fuzzer(UserCallback Callback, FuzzingOptions Options);
: Callback(Callback), Options(Options) {
SetDeathCallback();
InitializeDFSan();
}
void AddToCorpus(const Unit &U) { Corpus.push_back(U); } void AddToCorpus(const Unit &U) { Corpus.push_back(U); }
size_t Loop(size_t NumIterations); size_t Loop(size_t NumIterations);
void ShuffleAndMinimize(); void ShuffleAndMinimize();
@ -79,22 +77,28 @@ class Fuzzer {
size_t getTotalNumberOfRuns() { return TotalNumberOfRuns; } size_t getTotalNumberOfRuns() { return TotalNumberOfRuns; }
static void AlarmCallback(); static void StaticAlarmCallback();
Unit SubstituteTokens(const Unit &U) const;
private: private:
void AlarmCallback();
void ExecuteCallback(const Unit &U);
size_t MutateAndTestOne(Unit *U); size_t MutateAndTestOne(Unit *U);
size_t RunOne(const Unit &U); size_t RunOne(const Unit &U);
size_t RunOneMaximizeTotalCoverage(const Unit &U); size_t RunOneMaximizeTotalCoverage(const Unit &U);
size_t RunOneMaximizeFullCoverageSet(const Unit &U); size_t RunOneMaximizeFullCoverageSet(const Unit &U);
size_t RunOneMaximizeCoveragePairs(const Unit &U); size_t RunOneMaximizeCoveragePairs(const Unit &U);
void WriteToOutputCorpus(const Unit &U); void WriteToOutputCorpus(const Unit &U);
static void WriteToCrash(const Unit &U, const char *Prefix); void WriteToCrash(const Unit &U, const char *Prefix);
bool MutateWithDFSan(Unit *U); bool MutateWithDFSan(Unit *U);
void PrintStats(const char *Where, size_t Cov, const char *End = "\n"); void PrintStats(const char *Where, size_t Cov, const char *End = "\n");
void PrintUnitInASCIIOrTokens(const Unit &U, const char *PrintAfter = "");
void SetDeathCallback(); void SetDeathCallback();
static void DeathCallback(); static void StaticDeathCallback();
static Unit CurrentUnit; void DeathCallback();
Unit CurrentUnit;
size_t TotalNumberOfRuns = 0; size_t TotalNumberOfRuns = 0;
@ -113,7 +117,7 @@ class Fuzzer {
UserCallback Callback; UserCallback Callback;
FuzzingOptions Options; FuzzingOptions Options;
system_clock::time_point ProcessStartTime = system_clock::now(); system_clock::time_point ProcessStartTime = system_clock::now();
static system_clock::time_point UnitStartTime; system_clock::time_point UnitStartTime;
long TimeOfLongestUnitInSeconds = 0; long TimeOfLongestUnitInSeconds = 0;
}; };

View File

@ -16,21 +16,49 @@
namespace fuzzer { namespace fuzzer {
// static // Only one Fuzzer per process.
Unit Fuzzer::CurrentUnit; static Fuzzer *F;
system_clock::time_point Fuzzer::UnitStartTime;
Fuzzer::Fuzzer(UserCallback Callback, FuzzingOptions Options)
: Callback(Callback), Options(Options) {
SetDeathCallback();
InitializeDFSan();
assert(!F);
F = this;
}
void Fuzzer::SetDeathCallback() { void Fuzzer::SetDeathCallback() {
__sanitizer_set_death_callback(DeathCallback); __sanitizer_set_death_callback(StaticDeathCallback);
}
void Fuzzer::PrintUnitInASCIIOrTokens(const Unit &U, const char *PrintAfter) {
if (Options.Tokens.empty()) {
PrintASCII(U, PrintAfter);
} else {
auto T = SubstituteTokens(U);
T.push_back(0);
std::cerr << T.data();
std::cerr << PrintAfter;
}
}
void Fuzzer::StaticDeathCallback() {
assert(F);
F->DeathCallback();
} }
void Fuzzer::DeathCallback() { void Fuzzer::DeathCallback() {
std::cerr << "DEATH: " << std::endl; std::cerr << "DEATH: " << std::endl;
Print(CurrentUnit, "\n"); Print(CurrentUnit, "\n");
PrintASCII(CurrentUnit, "\n"); PrintUnitInASCIIOrTokens(CurrentUnit, "\n");
WriteToCrash(CurrentUnit, "crash-"); WriteToCrash(CurrentUnit, "crash-");
} }
void Fuzzer::StaticAlarmCallback() {
assert(F);
F->AlarmCallback();
}
void Fuzzer::AlarmCallback() { void Fuzzer::AlarmCallback() {
size_t Seconds = size_t Seconds =
duration_cast<seconds>(system_clock::now() - UnitStartTime).count(); duration_cast<seconds>(system_clock::now() - UnitStartTime).count();
@ -38,7 +66,7 @@ void Fuzzer::AlarmCallback() {
<< std::endl; << std::endl;
if (Seconds >= 3) { if (Seconds >= 3) {
Print(CurrentUnit, "\n"); Print(CurrentUnit, "\n");
PrintASCII(CurrentUnit, "\n"); PrintUnitInASCIIOrTokens(CurrentUnit, "\n");
WriteToCrash(CurrentUnit, "timeout-"); WriteToCrash(CurrentUnit, "timeout-");
} }
exit(1); exit(1);
@ -123,12 +151,35 @@ static uintptr_t HashOfArrayOfPCs(uintptr_t *PCs, uintptr_t NumPCs) {
return Res; return Res;
} }
Unit Fuzzer::SubstituteTokens(const Unit &U) const {
Unit Res;
for (auto Idx : U) {
if (Idx < Options.Tokens.size()) {
std::string Token = Options.Tokens[Idx];
Res.insert(Res.end(), Token.begin(), Token.end());
} else {
Res.push_back(' ');
}
}
// FIXME: Apply DFSan labels.
return Res;
}
void Fuzzer::ExecuteCallback(const Unit &U) {
if (Options.Tokens.empty()) {
Callback(U.data(), U.size());
} else {
auto T = SubstituteTokens(U);
Callback(T.data(), T.size());
}
}
// Experimental. Does not yet scale. // Experimental. Does not yet scale.
// Fuly reset the current coverage state, run a single unit, // Fuly reset the current coverage state, run a single unit,
// collect all coverage pairs and return non-zero if a new pair is observed. // collect all coverage pairs and return non-zero if a new pair is observed.
size_t Fuzzer::RunOneMaximizeCoveragePairs(const Unit &U) { size_t Fuzzer::RunOneMaximizeCoveragePairs(const Unit &U) {
__sanitizer_reset_coverage(); __sanitizer_reset_coverage();
Callback(U.data(), U.size()); ExecuteCallback(U);
uintptr_t *PCs; uintptr_t *PCs;
uintptr_t NumPCs = __sanitizer_get_coverage_guards(&PCs); uintptr_t NumPCs = __sanitizer_get_coverage_guards(&PCs);
bool HasNewPairs = false; bool HasNewPairs = false;
@ -153,7 +204,7 @@ size_t Fuzzer::RunOneMaximizeCoveragePairs(const Unit &U) {
// e.g. test/FullCoverageSetTest.cpp. FIXME: make it scale. // e.g. test/FullCoverageSetTest.cpp. FIXME: make it scale.
size_t Fuzzer::RunOneMaximizeFullCoverageSet(const Unit &U) { size_t Fuzzer::RunOneMaximizeFullCoverageSet(const Unit &U) {
__sanitizer_reset_coverage(); __sanitizer_reset_coverage();
Callback(U.data(), U.size()); ExecuteCallback(U);
uintptr_t *PCs; uintptr_t *PCs;
uintptr_t NumPCs =__sanitizer_get_coverage_guards(&PCs); uintptr_t NumPCs =__sanitizer_get_coverage_guards(&PCs);
if (FullCoverageSets.insert(HashOfArrayOfPCs(PCs, NumPCs)).second) if (FullCoverageSets.insert(HashOfArrayOfPCs(PCs, NumPCs)).second)
@ -168,7 +219,7 @@ size_t Fuzzer::RunOneMaximizeTotalCoverage(const Unit &U) {
__sanitizer_update_counter_bitset_and_clear_counters(0); __sanitizer_update_counter_bitset_and_clear_counters(0);
} }
size_t OldCoverage = __sanitizer_get_total_unique_coverage(); size_t OldCoverage = __sanitizer_get_total_unique_coverage();
Callback(U.data(), U.size()); ExecuteCallback(U);
size_t NewCoverage = __sanitizer_get_total_unique_coverage(); size_t NewCoverage = __sanitizer_get_total_unique_coverage();
size_t NumNewBits = 0; size_t NumNewBits = 0;
if (Options.UseCounters) if (Options.UseCounters)
@ -222,8 +273,7 @@ size_t Fuzzer::MutateAndTestOne(Unit *U) {
std::cerr << " L: " << U->size(); std::cerr << " L: " << U->size();
if (U->size() < 30) { if (U->size() < 30) {
std::cerr << " "; std::cerr << " ";
PrintASCII(*U); PrintUnitInASCIIOrTokens(*U, "\t");
std::cerr << "\t";
Print(*U); Print(*U);
} }
std::cerr << "\n"; std::cerr << "\n";

View File

@ -43,7 +43,7 @@ std::string Hash(const Unit &in) {
} }
static void AlarmHandler(int, siginfo_t *, void *) { static void AlarmHandler(int, siginfo_t *, void *) {
Fuzzer::AlarmCallback(); Fuzzer::StaticAlarmCallback();
} }
void SetTimer(int Seconds) { void SetTimer(int Seconds) {

View File

@ -0,0 +1,218 @@
#
##
`
~
!
@
$
%
^
&
*
(
)
_
-
_
=
+
{
}
[
]
|
\
,
.
/
?
>
<
;
:
'
"
++
--
<<
>>
+=
-=
*=
/=
>>=
<<=
&=
|=
^=
%=
!=
&&
||
==
>=
<=
->
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
alignas
alignof
and
and_eq
asm
auto
bitand
bitor
bool
break
case
catch
char
char16_t
char32_t
class
compl
concept
const
constexpr
const_cast
continue
decltype
default
delete
do
double
dynamic_cast
else
enum
explicit
export
extern
false
float
for
friend
goto
if
inline
int
long
mutable
namespace
new
noexcept
not
not_eq
nullptr
operator
or
or_eq
private
protected
public
register
reinterpret_cast
requires
return
short
signed
sizeof
static
static_assert
static_cast
struct
switch
template
this
thread_local
throw
true
try
typedef
typeid
typename
union
unsigned
using
virtual
void
volatile
wchar_t
while
xor
xor_eq
if
elif
else
endif
defined
ifdef
ifndef
define
undef
include
line
error
pragma
override
final

View File

@ -6,6 +6,7 @@ set(CMAKE_CXX_FLAGS_RELEASE "${LIBFUZZER_FLAGS_BASE} -O0 -fsanitize-coverage=4")
set(Tests set(Tests
CounterTest CounterTest
CxxTokensTest
FourIndependentBranchesTest FourIndependentBranchesTest
FullCoverageSetTest FullCoverageSetTest
InfiniteTest InfiniteTest

View File

@ -0,0 +1,24 @@
// Simple test for a fuzzer. The fuzzer must find a sequence of C++ tokens.
#include <cstdint>
#include <cstdlib>
#include <cstddef>
#include <cstring>
#include <iostream>
static void Found() {
std::cout << "Found the target, exiting\n";
exit(1);
}
extern "C" void TestOneInput(const uint8_t *Data, size_t Size) {
// looking for "thread_local unsigned A;"
if (Size < 24) return;
if (0 == memcmp(&Data[0], "thread_local", 12))
if (Data[12] == ' ')
if (0 == memcmp(&Data[13], "unsigned", 8))
if (Data[21] == ' ')
if (Data[22] == 'A')
if (Data[23] == ';')
Found();
}

View File

@ -23,3 +23,6 @@ CounterTest: BINGO
RUN: not ./LLVMFuzzer-DFSanSimpleCmpTest -seed=1 -timeout=15 2>&1 | FileCheck %s --check-prefix=DFSanSimpleCmpTest RUN: not ./LLVMFuzzer-DFSanSimpleCmpTest -seed=1 -timeout=15 2>&1 | FileCheck %s --check-prefix=DFSanSimpleCmpTest
DFSanSimpleCmpTest: Found the target: DFSanSimpleCmpTest: Found the target:
RUN: not ./LLVMFuzzer-CxxTokensTest -seed=1 -timeout=15 -tokens=%S/../cxx_fuzzer_tokens.txt 2>&1 | FileCheck %s --check-prefix=CxxTokensTest
CxxTokensTest: Found the target, exiting