feat(fuzz): add a new fuzzing target about aot compiler (#4121)
support llvm-jit running mode as another fuzzing target
This commit is contained in:
70
tests/fuzz/wasm-mutator-fuzz/wasm-mutator/CMakeLists.txt
Normal file
70
tests/fuzz/wasm-mutator-fuzz/wasm-mutator/CMakeLists.txt
Normal file
@ -0,0 +1,70 @@
|
||||
# Copyright (C) 2025 Intel Corporation. All rights reserved.
|
||||
# SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||
|
||||
if(CUSTOM_MUTATOR EQUAL 1)
|
||||
add_compile_definitions(CUSTOM_MUTATOR)
|
||||
endif()
|
||||
|
||||
# Set default build options with the ability to override from the command line
|
||||
if(NOT WAMR_BUILD_INTERP)
|
||||
set(WAMR_BUILD_INTERP 1)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_AOT)
|
||||
set(WAMR_BUILD_AOT 1)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_JIT)
|
||||
set(WAMR_BUILD_JIT 0)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_LIBC_BUILTIN)
|
||||
set(WAMR_BUILD_LIBC_BUILTIN 0)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_LIBC_WASI)
|
||||
set(WAMR_BUILD_LIBC_WASI 1)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_FAST_INTERP)
|
||||
set(WAMR_BUILD_FAST_INTERP 1)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_MULTI_MODULE)
|
||||
set(WAMR_BUILD_MULTI_MODULE 0)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_LIB_PTHREAD)
|
||||
set(WAMR_BUILD_LIB_PTHREAD 0)
|
||||
endif()
|
||||
|
||||
if(NOT WAMR_BUILD_MINI_LOADER)
|
||||
set(WAMR_BUILD_MINI_LOADER 0)
|
||||
endif()
|
||||
|
||||
set(WAMR_BUILD_SIMD 1)
|
||||
set(WAMR_BUILD_REF_TYPES 1)
|
||||
set(WAMR_BUILD_GC 1)
|
||||
|
||||
include(${REPO_ROOT_DIR}/build-scripts/runtime_lib.cmake)
|
||||
include(${REPO_ROOT_DIR}/core/shared/utils/uncommon/shared_uncommon.cmake)
|
||||
|
||||
add_library(vmlib ${WAMR_RUNTIME_LIB_SOURCE})
|
||||
target_include_directories(vmlib PUBLIC ${RUNTIME_LIB_HEADER_LIST})
|
||||
target_link_directories(vmlib PUBLIC ${RUNTIME_LIB_LINK_LIST})
|
||||
target_link_libraries(vmlib PUBLIC ${LLVM_AVAILABLE_LIBS})
|
||||
|
||||
add_executable(wasm_mutator_fuzz wasm_mutator_fuzz.cc)
|
||||
target_link_libraries(wasm_mutator_fuzz PRIVATE vmlib m)
|
||||
|
||||
if(NOT IN_OSS_FUZZ)
|
||||
message(STATUS "Enable ASan and UBSan in non-oss-fuzz environment")
|
||||
target_compile_options(vmlib PUBLIC
|
||||
-fprofile-instr-generate -fcoverage-mapping
|
||||
-fno-sanitize-recover=all
|
||||
-fsanitize=address,undefined
|
||||
-fsanitize=float-divide-by-zero,unsigned-integer-overflow,local-bounds,nullability
|
||||
-fno-sanitize=alignment
|
||||
)
|
||||
target_link_options(vmlib PUBLIC -fsanitize=address,undefined -fprofile-instr-generate)
|
||||
endif()
|
||||
287
tests/fuzz/wasm-mutator-fuzz/wasm-mutator/wasm_mutator_fuzz.cc
Normal file
287
tests/fuzz/wasm-mutator-fuzz/wasm-mutator/wasm_mutator_fuzz.cc
Normal file
@ -0,0 +1,287 @@
|
||||
// Copyright (C) 2019 Intel Corporation. All rights reserved.
|
||||
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||
|
||||
#include "wasm_runtime_common.h"
|
||||
#include "wasm_export.h"
|
||||
#include "bh_read_file.h"
|
||||
#include <stdlib.h>
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
#include <string.h>
|
||||
#include <iostream>
|
||||
#include <vector>
|
||||
|
||||
using namespace std;
|
||||
|
||||
static bool
|
||||
is_supported_val_kind(wasm_valkind_t kind)
|
||||
{
|
||||
return kind == WASM_I32 || kind == WASM_I64 || kind == WASM_F32
|
||||
|| kind == WASM_F64 || kind == WASM_EXTERNREF
|
||||
|| kind == WASM_FUNCREF;
|
||||
}
|
||||
|
||||
static wasm_val_t
|
||||
pre_defined_val(wasm_valkind_t kind)
|
||||
{
|
||||
if (kind == WASM_I32) {
|
||||
return wasm_val_t{ .kind = WASM_I32, .of = { .i32 = 2025 } };
|
||||
}
|
||||
else if (kind == WASM_I64) {
|
||||
return wasm_val_t{ .kind = WASM_I64, .of = { .i64 = 168 } };
|
||||
}
|
||||
else if (kind == WASM_F32) {
|
||||
return wasm_val_t{ .kind = WASM_F32, .of = { .f32 = 3.14159f } };
|
||||
}
|
||||
else if (kind == WASM_F64) {
|
||||
return wasm_val_t{ .kind = WASM_F64, .of = { .f64 = 2.71828 } };
|
||||
}
|
||||
else if (kind == WASM_EXTERNREF) {
|
||||
return wasm_val_t{ .kind = WASM_EXTERNREF,
|
||||
.of = { .foreign = 0xabcddead } };
|
||||
}
|
||||
// because aft is_supported_val_kind() check, so we can safely return as
|
||||
// WASM_FUNCREF
|
||||
else {
|
||||
return wasm_val_t{ .kind = WASM_FUNCREF, .of = { .ref = nullptr } };
|
||||
}
|
||||
}
|
||||
void
|
||||
print_execution_args(const wasm_export_t &export_type,
|
||||
const std::vector<wasm_val_t> &args, unsigned param_count)
|
||||
{
|
||||
std::cout << "[EXECUTION] " << export_type.name << "(";
|
||||
for (unsigned p_i = 0; p_i < param_count; p_i++) {
|
||||
if (p_i != 0) {
|
||||
std::cout << ", ";
|
||||
}
|
||||
|
||||
switch (args[p_i].kind) {
|
||||
case WASM_I32:
|
||||
std::cout << "i32:" << args[p_i].of.i32;
|
||||
break;
|
||||
case WASM_I64:
|
||||
std::cout << "i64:" << args[p_i].of.i64;
|
||||
break;
|
||||
case WASM_F32:
|
||||
std::cout << "f32:" << args[p_i].of.f32;
|
||||
break;
|
||||
case WASM_F64:
|
||||
std::cout << "f64:" << args[p_i].of.f64;
|
||||
break;
|
||||
case WASM_EXTERNREF:
|
||||
std::cout << "externref:" << args[p_i].of.foreign;
|
||||
break;
|
||||
default:
|
||||
// because aft is_supported_val_kind() check, so we can safely
|
||||
// return as WASM_FUNCREF
|
||||
std::cout << "funcref:" << args[p_i].of.ref;
|
||||
break;
|
||||
}
|
||||
}
|
||||
std::cout << ")" << std::endl;
|
||||
}
|
||||
|
||||
static bool
|
||||
execute_export_functions(wasm_module_t module, wasm_module_inst_t inst)
|
||||
{
|
||||
int32_t export_count = wasm_runtime_get_export_count(module);
|
||||
|
||||
for (int e_i = 0; e_i < export_count; e_i++) {
|
||||
wasm_export_t export_type = { 0 };
|
||||
wasm_runtime_get_export_type(module, e_i, &export_type);
|
||||
|
||||
if (export_type.kind != WASM_IMPORT_EXPORT_KIND_FUNC) {
|
||||
continue;
|
||||
}
|
||||
|
||||
wasm_function_inst_t func =
|
||||
wasm_runtime_lookup_function(inst, export_type.name);
|
||||
if (!func) {
|
||||
std::cout << "Failed to lookup function: " << export_type.name
|
||||
<< std::endl;
|
||||
continue;
|
||||
}
|
||||
|
||||
wasm_func_type_t func_type = export_type.u.func_type;
|
||||
uint32_t param_count = wasm_func_type_get_param_count(func_type);
|
||||
|
||||
/* build arguments */
|
||||
std::vector<wasm_val_t> args;
|
||||
for (unsigned p_i = 0; p_i < param_count; p_i++) {
|
||||
wasm_valkind_t param_type =
|
||||
wasm_func_type_get_param_valkind(func_type, p_i);
|
||||
|
||||
if (!is_supported_val_kind(param_type)) {
|
||||
std::cout
|
||||
<< "Bypass execution because of unsupported value kind: "
|
||||
<< param_type << std::endl;
|
||||
return true;
|
||||
}
|
||||
|
||||
wasm_val_t arg = pre_defined_val(param_type);
|
||||
args.push_back(arg);
|
||||
}
|
||||
|
||||
/* build results storage */
|
||||
uint32_t result_count = wasm_func_type_get_result_count(func_type);
|
||||
std::vector<wasm_val_t> results = std::vector<wasm_val_t>(result_count);
|
||||
|
||||
print_execution_args(export_type, args, param_count);
|
||||
|
||||
/* execute the function */
|
||||
wasm_exec_env_t exec_env = wasm_runtime_get_exec_env_singleton(inst);
|
||||
if (!exec_env) {
|
||||
std::cout << "Failed to get exec env" << std::endl;
|
||||
return false;
|
||||
}
|
||||
|
||||
bool ret =
|
||||
wasm_runtime_call_wasm_a(exec_env, func, result_count,
|
||||
results.data(), param_count, args.data());
|
||||
if (!ret) {
|
||||
const char *exception = wasm_runtime_get_exception(inst);
|
||||
if (!exception) {
|
||||
std::cout << "[EXECUTION] " << export_type.name
|
||||
<< "() failed. No exception info." << std::endl;
|
||||
}
|
||||
else {
|
||||
std::cout << "[EXECUTION] " << export_type.name << "() failed. "
|
||||
<< exception << std::endl;
|
||||
}
|
||||
}
|
||||
|
||||
wasm_runtime_clear_exception(inst);
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
extern "C" int
|
||||
LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
||||
{
|
||||
/* libfuzzer don't allow us to modify the given Data, so we copy the data
|
||||
* here */
|
||||
std::vector<uint8_t> myData(Data, Data + Size);
|
||||
|
||||
/* init runtime environment */
|
||||
wasm_runtime_init();
|
||||
|
||||
char error_buf[128] = { 0 };
|
||||
wasm_module_t module =
|
||||
wasm_runtime_load((uint8_t *)myData.data(), Size, error_buf, 120);
|
||||
if (!module) {
|
||||
std::cout << "[LOADING] " << error_buf << std::endl;
|
||||
wasm_runtime_destroy();
|
||||
/* return SUCCESS because the failure has been handled */
|
||||
return 0;
|
||||
}
|
||||
|
||||
wasm_module_inst_t inst = wasm_runtime_instantiate(
|
||||
module, 8 * 1024 * 1024, 16 * 1024 * 1024, error_buf, 120);
|
||||
if (!inst) {
|
||||
std::cout << "[INSTANTIATE] " << error_buf << std::endl;
|
||||
wasm_runtime_unload(module);
|
||||
wasm_runtime_destroy();
|
||||
/* return SUCCESS because the failure has been handled */
|
||||
return 0;
|
||||
}
|
||||
|
||||
execute_export_functions(module, inst);
|
||||
|
||||
wasm_runtime_deinstantiate(inst);
|
||||
wasm_runtime_unload(module);
|
||||
wasm_runtime_destroy();
|
||||
return 0; /* Values other than 0 and -1 are reserved for future use. */
|
||||
}
|
||||
|
||||
/* Forward-declare the libFuzzer's mutator callback. */
|
||||
extern "C" size_t
|
||||
LLVMFuzzerMutate(uint8_t *Data, size_t Size, size_t MaxSize);
|
||||
|
||||
/* The custom mutator: */
|
||||
#ifdef CUSTOM_MUTATOR
|
||||
extern "C" size_t
|
||||
LLVMFuzzerCustomMutator(uint8_t *Data, size_t Size, size_t MaxSize,
|
||||
unsigned int Seed)
|
||||
{
|
||||
if ((NULL != Data) && (Size > 10)) {
|
||||
int mutate_ret = -1;
|
||||
/* delete */
|
||||
if (access("./cur.wasm", 0) == 0) {
|
||||
remove("./cur.wasm");
|
||||
}
|
||||
|
||||
/* 1.write data to cur.wasm */
|
||||
FILE *fwrite_fp = fopen("./cur.wasm", "wb");
|
||||
if (NULL == fwrite_fp) {
|
||||
printf("Faild to open cur.wasm file!\n");
|
||||
return 0;
|
||||
}
|
||||
fwrite(Data, sizeof(uint8_t), Size, fwrite_fp);
|
||||
fclose(fwrite_fp);
|
||||
fwrite_fp = NULL;
|
||||
|
||||
/* 2.wasm-tools mutate modify cur.wasm */
|
||||
char cmd_tmp[150] = { 0 };
|
||||
|
||||
/* clang-format off */
|
||||
const char *preserve_semantic = (Seed % 2) ? "--preserve-semantics" : "";
|
||||
sprintf(cmd_tmp, "wasm-tools mutate cur.wasm --seed %d -o modified.wasm %s > /dev/null 2>&1", Seed, preserve_semantic);
|
||||
/* clang-format on */
|
||||
mutate_ret = system(cmd_tmp);
|
||||
memset(cmd_tmp, 0, sizeof(cmd_tmp));
|
||||
|
||||
if (mutate_ret != 0) {
|
||||
/* If source file not valid, use libfuzzer's own modifier */
|
||||
return LLVMFuzzerMutate(Data, Size, MaxSize);
|
||||
}
|
||||
|
||||
/* 3.read modified file */
|
||||
int read_len = 0;
|
||||
int file_len = 0;
|
||||
int res = 0;
|
||||
uint8_t *buf = NULL;
|
||||
FILE *fread_fp = fopen("./modified.wasm", "rb");
|
||||
if (NULL == fread_fp) {
|
||||
printf("Faild to open modified.wasm file!\n");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
fseek(fread_fp, 0, SEEK_END); /* location to file end */
|
||||
file_len = ftell(fread_fp); /* get file size */
|
||||
buf = (uint8_t *)malloc(file_len);
|
||||
|
||||
if (NULL != buf) {
|
||||
fseek(fread_fp, 0, SEEK_SET); /* location to file start */
|
||||
read_len = fread(buf, 1, file_len, fread_fp);
|
||||
if ((read_len == file_len) && (read_len < MaxSize)) {
|
||||
/* 4.fill Data buffer */
|
||||
memcpy(Data, buf, read_len);
|
||||
res = read_len;
|
||||
}
|
||||
else {
|
||||
res = 0;
|
||||
}
|
||||
}
|
||||
else {
|
||||
res = 0;
|
||||
}
|
||||
|
||||
memset(buf, 0, file_len);
|
||||
free(buf);
|
||||
fclose(fread_fp);
|
||||
fread_fp = NULL;
|
||||
|
||||
return res;
|
||||
}
|
||||
else {
|
||||
if (access("./modified.wasm", 0) == 0) {
|
||||
remove("./modified.wasm");
|
||||
}
|
||||
memset(Data, 0, Size);
|
||||
Size = 0;
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
#endif // CUSTOM_MUTATOR
|
||||
Reference in New Issue
Block a user