Hash :
59328ed8
Author :
Date :
2018-07-19T13:29:46
Git HTTP | https://git.kmx.io/thodg/libgit2.git |
---|---|
Git SSH | git@git.kmx.io:thodg/libgit2.git |
Public access ? | public |
Description | |
Users |
|
Tags |
|
libgit2 is currently using libFuzzer to perform automated fuzz testing. libFuzzer only works with clang.
mkdir build && cd build
address
,
undefined
,
and leak
/address,leak
. CC=/usr/bin/clang-6.0 cmake -DBUILD_CLAR=OFF -DBUILD_FUZZERS=ON -DUSE_SANIZER=address -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=fuzzer" -DCMAKE_BUILD_TYPE=RelWithDebInfo ..
. Note that building the fuzzer targets
is incompatible with the tests and examples. cmake --build .
cd ..
ASAN_SYMBOLIZER_PATH=/usr/bin/llvm-symbolize-6.0 LSAN_OPTIONS=allocator_may_return_null=1 ASAN_OPTIONS=allocator_may_return_null=1 ./build/fuzz/fuzz_packfile_raw fuzz/corpora/fuzz_packfile_raw/
The LSAN_OPTIONS
and ASAN_OPTIONS
are there to allow malloc(3)
to return
NULL
. The LLVM_PROFILE_FILE
is there to override the path where libFuzzer
will write the coverage report.
In order to get coverage information, you also need to add the
-DUSE_COVERAGE=ON
flag to cmake
, and then run the fuzz target with
-runs=0
. That will produce a file called default.profraw
(this behavior can
be overridden by setting the LLVM_PROFILE_FILE="yourfile.profraw"
environment
variable).
llvm-profdata-6.0 merge -sparse default.profraw -o fuzz_packfile_raw.profdata
transforms the data from a sparse representation
into a format that can be used by the other tools. llvm-cov-6.0 report ./build/fuzz/fuzz_packfile_raw -instr-profile=fuzz_packfile_raw.profdata
shows a high-level per-file
coverage report. llvm-cov-6.0 show ./build/fuzz/fuzz_packfile_raw -instr-profile=fuzz_packfile_raw.profdata [source file]
shows a line-by-line
coverage analysis of all the codebase (or a single source file).
In order to ensure that there are no regresions, each fuzzer target can be run
in a standalone mode. This can be done by passing -DUSE_STANDALONE_FUZZERS=ON
to cmake
without setting -DCMAKE_EXE_LINKER_FLAGS
. This makes it compatible
with gcc. This does not use the fuzzing engine, but just invokes every file in
the chosen corpus.
In order to get full coverage, though, you might want to also enable one of the sanitizers. You might need a recent version of clang to get full support.