summaryrefslogtreecommitdiff
path: root/src/tools/wasm-opt.cpp
diff options
context:
space:
mode:
authorAlon Zakai <azakai@google.com>2020-10-27 10:30:24 -0700
committerGitHub <noreply@github.com>2020-10-27 10:30:24 -0700
commit9a174f0ce9dc44b74db0e04728de62e6556176f9 (patch)
tree6f8a331eb2a23f795df6e12373bff22d28c1dfdd /src/tools/wasm-opt.cpp
parentca16f7cdc57549333474d7042128d2007bc35fad (diff)
downloadbinaryen-9a174f0ce9dc44b74db0e04728de62e6556176f9.tar.gz
binaryen-9a174f0ce9dc44b74db0e04728de62e6556176f9.tar.bz2
binaryen-9a174f0ce9dc44b74db0e04728de62e6556176f9.zip
Fuzzer: Add an option to fuzz with initial wasm contents (#3276)
Previously the fuzzer constructed a new random valid wasm file from scratch. The new --initial-fuzz=FILENAME option makes it start from an existing wasm file, and then add random contents on top of that. It also randomly modifies the existing contents, for example tweaking a Const, replacing some nodes with other things of the same type, etc. It also has a chance to replace a drop with a logging (as some of our tests just drop a result, and we match the optimized output's wasm instead of the result; by logging, the fuzzer can check things). The goal is to find bugs by using existing hand-written testcases as a basis. This PR uses the test suite's testcases as initial fuzz contents. This can find issues as they often check for corner cases - they are designed to be "interesting", which random data may be less likely to find. This has found several bugs already, see recent fuzz fixes. I mentioned the first few on Twitter but past 4 I stopped counting... https://twitter.com/kripken/status/1314323318036602880 This required various changes to the fuzzer's generation to account for the fact that there can be existing functions and so forth before it starts to run, so it needs to avoid collisions and so forth.
Diffstat (limited to 'src/tools/wasm-opt.cpp')
-rw-r--r--src/tools/wasm-opt.cpp22
1 files changed, 18 insertions, 4 deletions
diff --git a/src/tools/wasm-opt.cpp b/src/tools/wasm-opt.cpp
index ecf4f1c7c..56a26ccfb 100644
--- a/src/tools/wasm-opt.cpp
+++ b/src/tools/wasm-opt.cpp
@@ -81,6 +81,7 @@ int main(int argc, const char* argv[]) {
bool fuzzExecAfter = false;
std::string extraFuzzCommand;
bool translateToFuzz = false;
+ std::string initialFuzz;
bool fuzzPasses = false;
bool fuzzMemory = true;
bool fuzzOOB = true;
@@ -141,6 +142,13 @@ int main(int argc, const char* argv[]) {
"fuzzing",
Options::Arguments::Zero,
[&](Options* o, const std::string& arguments) { translateToFuzz = true; })
+ .add("--initial-fuzz",
+ "-if",
+ "Initial wasm content in translate-to-fuzz (-ttf) mode",
+ Options::Arguments::One,
+ [&initialFuzz](Options* o, const std::string& argument) {
+ initialFuzz = argument;
+ })
.add("--fuzz-passes",
"-fp",
"Pick a random set of passes to run, useful for fuzzing. this depends "
@@ -224,7 +232,13 @@ int main(int argc, const char* argv[]) {
Fatal() << message;
};
- if (!translateToFuzz) {
+ // In normal (non-translate-to-fuzz) mode we read the input file. In
+ // translate-to-fuzz mode the input file is the random data, and used later
+ // down in TranslateToFuzzReader, but there is also an optional initial fuzz
+ // file that if it exists we read it, then add more fuzz on top.
+ if (!translateToFuzz || initialFuzz.size()) {
+ std::string inputFile =
+ translateToFuzz ? initialFuzz : options.extra["infile"];
ModuleReader reader;
// Enable DWARF parsing if we were asked for debug info, and were not
// asked to remove it.
@@ -232,7 +246,7 @@ int main(int argc, const char* argv[]) {
!willRemoveDebugInfo(options.passes));
reader.setProfile(options.profile);
try {
- reader.read(options.extra["infile"], wasm, inputSourceMapFilename);
+ reader.read(inputFile, wasm, inputSourceMapFilename);
} catch (ParseException& p) {
p.dump(std::cerr);
std::cerr << '\n';
@@ -253,8 +267,8 @@ int main(int argc, const char* argv[]) {
exitOnInvalidWasm("error validating input");
}
}
- } else {
- // translate-to-fuzz
+ }
+ if (translateToFuzz) {
options.applyFeatures(wasm);
TranslateToFuzzReader reader(wasm, options.extra["infile"]);
if (fuzzPasses) {