2017-08-22 07:25:50 +08:00
|
|
|
set(LIBFUZZER_SOURCES
|
2017-08-22 09:28:32 +08:00
|
|
|
FuzzerClangCounters.cpp
|
2017-08-22 07:25:50 +08:00
|
|
|
FuzzerCrossOver.cpp
|
|
|
|
FuzzerDriver.cpp
|
|
|
|
FuzzerExtFunctionsDlsym.cpp
|
|
|
|
FuzzerExtFunctionsDlsymWin.cpp
|
|
|
|
FuzzerExtFunctionsWeak.cpp
|
|
|
|
FuzzerExtraCounters.cpp
|
|
|
|
FuzzerIO.cpp
|
|
|
|
FuzzerIOPosix.cpp
|
|
|
|
FuzzerIOWindows.cpp
|
|
|
|
FuzzerLoop.cpp
|
|
|
|
FuzzerMerge.cpp
|
|
|
|
FuzzerMutate.cpp
|
|
|
|
FuzzerSHA1.cpp
|
|
|
|
FuzzerShmemPosix.cpp
|
|
|
|
FuzzerShmemWindows.cpp
|
|
|
|
FuzzerTracePC.cpp
|
|
|
|
FuzzerUtil.cpp
|
|
|
|
FuzzerUtilDarwin.cpp
|
[libFuzzer] Add support for Fuchsia OS.
Summary:
This patch adds the initial support for Fuchsia.
- LIBFUZZER_FUCHSIA is added as an OS type in FuzzerDefs.h
- Fuchsia is, by design, not POSIX compliant. However, it does use ELF and
supports common POSIX I/O functions. Thus, FuzzerExtFunctions.h and
FuzzerIO.h are implemented by extending the header guards in
FuzzerExtFunctionsWeak.cpp and FuzzerIOPosix.cpp to include
LIBFUZZER_FUCHSIA.
- The platform-specific portions of FuzzerUtil.h are implemented by
FuzzerUtilFuchsia.cpp, which makes use of exception ports, syscalls, and
the launchpad library.
- The experimental equivalence server is not currently supported, so
FuzzerShmem.h is implemented by stub methods in FuzzerShmemFuchsia.cpp.
Any future implementation will likely involve VMOs.
Tested with ASAN/SanCov on Fuchsia/x86-64 with the canonical toy fuzzer.
Patch By: aarongreen
Reviewers: kcc, morehouse, flowerhack, phosek
Reviewed By: kcc, phosek, Eugene.Zelenko
Subscribers: srhines, mgorny, Eugene.Zelenko
Differential Revision: https://reviews.llvm.org/D40974
llvm-svn: 320210
2017-12-09 06:54:44 +08:00
|
|
|
FuzzerUtilFuchsia.cpp
|
2017-08-22 07:25:50 +08:00
|
|
|
FuzzerUtilLinux.cpp
|
|
|
|
FuzzerUtilPosix.cpp
|
|
|
|
FuzzerUtilWindows.cpp
|
|
|
|
)
|
|
|
|
|
2017-08-23 02:34:28 +08:00
|
|
|
CHECK_CXX_SOURCE_COMPILES("
|
|
|
|
static thread_local int blah;
|
|
|
|
int main() {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
" HAS_THREAD_LOCAL)
|
|
|
|
|
2017-08-29 03:44:19 +08:00
|
|
|
set(LIBFUZZER_CFLAGS ${SANITIZER_COMMON_CFLAGS})
|
|
|
|
|
2017-10-14 05:57:43 +08:00
|
|
|
append_list_if(COMPILER_RT_HAS_OMIT_FRAME_POINTER_FLAG -fno-omit-frame-pointer LIBFUZZER_CFLAGS)
|
|
|
|
|
2017-08-22 07:25:50 +08:00
|
|
|
if (CMAKE_CXX_FLAGS MATCHES "fsanitize-coverage")
|
2017-08-29 03:44:19 +08:00
|
|
|
list(APPEND LIBFUZZER_CFLAGS -fno-sanitize-coverage=trace-pc-guard,edge,trace-cmp,indirect-calls,8bit-counters)
|
2017-08-22 07:25:50 +08:00
|
|
|
endif()
|
2017-08-29 03:44:19 +08:00
|
|
|
|
2017-08-23 02:34:28 +08:00
|
|
|
if(NOT HAS_THREAD_LOCAL)
|
2017-08-29 03:44:19 +08:00
|
|
|
list(APPEND LIBFUZZER_CFLAGS -Dthread_local=__thread)
|
2017-08-23 02:34:28 +08:00
|
|
|
endif()
|
2017-08-22 07:25:50 +08:00
|
|
|
|
|
|
|
if(APPLE)
|
|
|
|
set(FUZZER_SUPPORTED_OS osx)
|
|
|
|
endif()
|
|
|
|
|
|
|
|
add_compiler_rt_object_libraries(RTfuzzer
|
|
|
|
OS ${FUZZER_SUPPORTED_OS}
|
|
|
|
ARCHS ${FUZZER_SUPPORTED_ARCH}
|
|
|
|
SOURCES ${LIBFUZZER_SOURCES}
|
|
|
|
CFLAGS ${LIBFUZZER_CFLAGS})
|
|
|
|
|
|
|
|
add_compiler_rt_object_libraries(RTfuzzer_main
|
|
|
|
OS ${FUZZER_SUPPORTED_OS}
|
|
|
|
ARCHS ${FUZZER_SUPPORTED_ARCH}
|
|
|
|
SOURCES FuzzerMain.cpp
|
|
|
|
CFLAGS ${LIBFUZZER_CFLAGS})
|
|
|
|
|
|
|
|
add_compiler_rt_runtime(clang_rt.fuzzer
|
|
|
|
STATIC
|
|
|
|
OS ${FUZZER_SUPPORTED_OS}
|
|
|
|
ARCHS ${FUZZER_SUPPORTED_ARCH}
|
|
|
|
OBJECT_LIBS RTfuzzer RTfuzzer_main
|
|
|
|
CFLAGS ${LIBFUZZER_CFLAGS}
|
|
|
|
PARENT_TARGET fuzzer)
|
|
|
|
|
|
|
|
add_compiler_rt_runtime(clang_rt.fuzzer_no_main
|
|
|
|
STATIC
|
|
|
|
OS ${FUZZER_SUPPORTED_OS}
|
|
|
|
ARCHS ${FUZZER_SUPPORTED_ARCH}
|
|
|
|
OBJECT_LIBS RTfuzzer
|
|
|
|
CFLAGS ${LIBFUZZER_CFLAGS}
|
|
|
|
PARENT_TARGET fuzzer)
|
|
|
|
|
|
|
|
if(COMPILER_RT_INCLUDE_TESTS)
|
|
|
|
add_subdirectory(tests)
|
|
|
|
endif()
|