Oss-fuzz ideal integration (#1262)
* Fix watchpoint leak in ARM * Builds fuzz targets with sanitizer support * Builds fuzz targets with directory driver * Adds script to dowlonad public corpus * Adds CIfuzz To checks Pull Requests with fuzzing * Use static library for fuzz targets * Less verbose logs for fuzz driver directory
This commit is contained in:
parent
e2d1c5bf13
commit
216c348c35
23
.github/workflows/cifuzz.yml
vendored
Normal file
23
.github/workflows/cifuzz.yml
vendored
Normal file
@ -0,0 +1,23 @@
|
||||
name: CIFuzz
|
||||
on: [pull_request]
|
||||
jobs:
|
||||
Fuzzing:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Build Fuzzers
|
||||
uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
|
||||
with:
|
||||
oss-fuzz-project-name: 'unicorn'
|
||||
dry-run: false
|
||||
- name: Run Fuzzers
|
||||
uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
|
||||
with:
|
||||
oss-fuzz-project-name: 'unicorn'
|
||||
fuzz-seconds: 600
|
||||
dry-run: false
|
||||
- name: Upload Crash
|
||||
uses: actions/upload-artifact@v1
|
||||
if: failure()
|
||||
with:
|
||||
name: artifacts
|
||||
path: ./out/artifacts
|
33
.travis.yml
33
.travis.yml
@ -39,6 +39,39 @@ matrix:
|
||||
- PATH=$PATH:/usr/local/opt/binutils/bin
|
||||
script: make && make -C tests/unit test && make -C tests/regress test
|
||||
|
||||
- name: "Linux clang ASAN"
|
||||
os: linux
|
||||
compiler: clang
|
||||
env:
|
||||
- PATH=$PATH:/usr/local/opt/binutils/bin
|
||||
- ASAN_OPTIONS=detect_leaks=0
|
||||
- CXXFLAGS="-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize=fuzzer-no-link"
|
||||
- CFLAGS="-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize=fuzzer-no-link"
|
||||
- LDFLAGS="-fsanitize=address"
|
||||
script: make && make -C tests/fuzz && sh tests/fuzz/dlcorpus.sh
|
||||
|
||||
- name: "Linux clang MSAN"
|
||||
os: linux
|
||||
compiler: clang
|
||||
env:
|
||||
- PATH=$PATH:/usr/local/opt/binutils/bin
|
||||
- ASAN_OPTIONS=detect_leaks=0
|
||||
- CXXFLAGS="-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize=fuzzer-no-link"
|
||||
- CFLAGS="-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize=fuzzer-no-link"
|
||||
- LDFLAGS="-fsanitize=memory"
|
||||
script: make && make -C tests/fuzz && sh tests/fuzz/dlcorpus.sh
|
||||
|
||||
- name: "Linux clang USAN"
|
||||
os: linux
|
||||
compiler: clang
|
||||
env:
|
||||
- PATH=$PATH:/usr/local/opt/binutils/bin
|
||||
- ASAN_OPTIONS=detect_leaks=0
|
||||
- CXXFLAGS="-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=undefined -fsanitize=fuzzer-no-link"
|
||||
- CFLAGS="-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=undefined -fsanitize=fuzzer-no-link"
|
||||
- LDFLAGS="-fsanitize=undefined"
|
||||
script: make && make -C tests/fuzz && sh tests/fuzz/dlcorpus.sh
|
||||
|
||||
- name: "Linux 32bit"
|
||||
os: linux
|
||||
compiler: gcc
|
||||
|
@ -32,6 +32,7 @@ void arm_release(void* ctx)
|
||||
g_free(cpu->cpreg_values);
|
||||
g_free(cpu->cpreg_vmstate_indexes);
|
||||
g_free(cpu->cpreg_vmstate_values);
|
||||
cpu_watchpoint_remove_all(CPU(cpu), BP_CPU);
|
||||
|
||||
release_common(ctx);
|
||||
}
|
||||
|
@ -6,7 +6,7 @@ ifeq ($(UNAME_S), Linux)
|
||||
LDFLAGS += -lrt
|
||||
endif
|
||||
|
||||
LDFLAGS += -lunicorn
|
||||
LDFLAGS += ../../libunicorn.a
|
||||
|
||||
|
||||
ALL_TESTS_SOURCES = $(wildcard fuzz*.c)
|
||||
@ -20,4 +20,4 @@ clean:
|
||||
rm -rf ${ALL_TESTS}
|
||||
|
||||
fuzz%: fuzz%.c
|
||||
$(CC) $(CFLAGS) $^ onefile.c $(LDFLAGS) -o $@
|
||||
$(CC) $(CFLAGS) $^ onedir.c $(LDFLAGS) -o $@
|
||||
|
11
tests/fuzz/dlcorpus.sh
Normal file
11
tests/fuzz/dlcorpus.sh
Normal file
@ -0,0 +1,11 @@
|
||||
#/bin/sh
|
||||
#change to script directory
|
||||
cd `dirname $0`
|
||||
ls fuzz_emu*.c | sed 's/.c//' | while read target
|
||||
do
|
||||
#download public corpus
|
||||
wget "https://storage.googleapis.com/unicorn-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/unicorn_$target/public.zip"
|
||||
unzip -q public.zip -d corpus_$target
|
||||
#run target on corpus
|
||||
./$target corpus_$target
|
||||
done
|
80
tests/fuzz/onedir.c
Normal file
80
tests/fuzz/onedir.c
Normal file
@ -0,0 +1,80 @@
|
||||
#include <stdint.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdio.h>
|
||||
#include <dirent.h>
|
||||
#include <unistd.h>
|
||||
|
||||
int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size);
|
||||
|
||||
int main(int argc, char** argv)
|
||||
{
|
||||
FILE * fp;
|
||||
uint8_t Data[0x1000];
|
||||
size_t Size;
|
||||
DIR *d;
|
||||
struct dirent *dir;
|
||||
int r = 0;
|
||||
int i;
|
||||
|
||||
if (argc != 2) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
d = opendir(argv[1]);
|
||||
if (d == NULL) {
|
||||
printf("Invalid directory\n");
|
||||
return 2;
|
||||
}
|
||||
if (chdir(argv[1]) != 0) {
|
||||
closedir(d);
|
||||
printf("Invalid directory\n");
|
||||
return 2;
|
||||
}
|
||||
|
||||
printf("Starting directory %s\n", argv[1]);
|
||||
while((dir = readdir(d)) != NULL) {
|
||||
//opens the file, get its size, and reads it into a buffer
|
||||
if (dir->d_type != DT_REG) {
|
||||
continue;
|
||||
}
|
||||
//printf("Running file %s\n", dir->d_name);
|
||||
fflush(stdout);
|
||||
fp = fopen(dir->d_name, "rb");
|
||||
if (fp == NULL) {
|
||||
r = 3;
|
||||
break;
|
||||
}
|
||||
if (fseek(fp, 0L, SEEK_END) != 0) {
|
||||
fclose(fp);
|
||||
r = 4;
|
||||
break;
|
||||
}
|
||||
Size = ftell(fp);
|
||||
if (Size == (size_t) -1) {
|
||||
fclose(fp);
|
||||
r = 5;
|
||||
break;
|
||||
} else if (Size > 0x1000) {
|
||||
fclose(fp);
|
||||
continue;
|
||||
}
|
||||
if (fseek(fp, 0L, SEEK_SET) != 0) {
|
||||
fclose(fp);
|
||||
r = 7;
|
||||
break;
|
||||
}
|
||||
if (fread(Data, Size, 1, fp) != 1) {
|
||||
fclose(fp);
|
||||
r = 8;
|
||||
break;
|
||||
}
|
||||
|
||||
//lauch fuzzer
|
||||
LLVMFuzzerTestOneInput(Data, Size);
|
||||
fclose(fp);
|
||||
}
|
||||
closedir(d);
|
||||
printf("Ok : whole directory finished %s\n", argv[1]);
|
||||
return r;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user