summaryrefslogtreecommitdiffstats
path: root/gnu/llvm/tools/llvm-as-fuzzer/llvm-as-fuzzer.cpp
diff options
context:
space:
mode:
authorpascal <pascal@openbsd.org>2016-09-03 22:46:54 +0000
committerpascal <pascal@openbsd.org>2016-09-03 22:46:54 +0000
commitb5500b9ca0102f1ccaf32f0e77e96d0739aded9b (patch)
treee1b7ebb5a0231f9e6d8d3f6f719582cebd64dc98 /gnu/llvm/tools/llvm-as-fuzzer/llvm-as-fuzzer.cpp
parentclarify purpose of src/gnu/ directory. (diff)
downloadwireguard-openbsd-b5500b9ca0102f1ccaf32f0e77e96d0739aded9b.tar.xz
wireguard-openbsd-b5500b9ca0102f1ccaf32f0e77e96d0739aded9b.zip
Use the space freed up by sparc and zaurus to import LLVM.
ok hackroom@
Diffstat (limited to 'gnu/llvm/tools/llvm-as-fuzzer/llvm-as-fuzzer.cpp')
-rw-r--r--gnu/llvm/tools/llvm-as-fuzzer/llvm-as-fuzzer.cpp76
1 files changed, 76 insertions, 0 deletions
diff --git a/gnu/llvm/tools/llvm-as-fuzzer/llvm-as-fuzzer.cpp b/gnu/llvm/tools/llvm-as-fuzzer/llvm-as-fuzzer.cpp
new file mode 100644
index 00000000000..b4024bcaa99
--- /dev/null
+++ b/gnu/llvm/tools/llvm-as-fuzzer/llvm-as-fuzzer.cpp
@@ -0,0 +1,76 @@
+//===--- fuzz-llvm-as.cpp - Fuzzer for llvm-as using lib/Fuzzer -----------===//
+//
+// The LLVM Compiler Infrastructure
+//
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+//
+// Build tool to fuzz the LLVM assembler (llvm-as) using
+// lib/Fuzzer. The main reason for using this tool is that it is much
+// faster than using afl-fuzz, since it is run in-process.
+//
+//===----------------------------------------------------------------------===//
+
+#include "llvm/ADT/StringRef.h"
+#include "llvm/AsmParser/Parser.h"
+#include "llvm/IR/LLVMContext.h"
+#include "llvm/IR/Module.h"
+#include "llvm/IR/Verifier.h"
+#include "llvm/Support/ErrorHandling.h"
+#include "llvm/Support/MemoryBuffer.h"
+#include "llvm/Support/raw_ostream.h"
+#include "llvm/Support/SourceMgr.h"
+
+#include <csetjmp>
+
+using namespace llvm;
+
+static jmp_buf JmpBuf;
+
+namespace {
+
+void MyFatalErrorHandler(void *user_data, const std::string& reason,
+ bool gen_crash_diag) {
+ // Don't bother printing reason, just return to the test function,
+ // since a fatal error represents a successful parse (i.e. it correctly
+ // terminated with an error message to the user).
+ longjmp(JmpBuf, 1);
+}
+
+static bool InstalledHandler = false;
+
+} // end of anonymous namespace
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
+
+ // Allocate space for locals before setjmp so that memory can be collected
+ // if parse exits prematurely (via longjmp).
+ StringRef Input((const char *)Data, Size);
+ // Note: We need to create a buffer to add a null terminator to the
+ // end of the input string. The parser assumes that the string
+ // parsed is always null terminated.
+ std::unique_ptr<MemoryBuffer> MemBuf = MemoryBuffer::getMemBufferCopy(Input);
+ SMDiagnostic Err;
+ LLVMContext &Context = getGlobalContext();
+ std::unique_ptr<Module> M;
+
+ if (setjmp(JmpBuf))
+ // If reached, we have returned with non-zero status, so exit.
+ return 0;
+
+ // TODO(kschimpf) Write a main to do this initialization.
+ if (!InstalledHandler) {
+ llvm::install_fatal_error_handler(::MyFatalErrorHandler, nullptr);
+ InstalledHandler = true;
+ }
+
+ M = parseAssembly(MemBuf->getMemBufferRef(), Err, Context);
+
+ if (!M.get())
+ return 0;
+
+ verifyModule(*M.get());
+ return 0;
+}