mirror of https://github.com/thesofproject/sof.git
214 lines
6.7 KiB
Bash
Executable File
214 lines
6.7 KiB
Bash
Executable File
#!/bin/bash
|
|
set -e
|
|
|
|
print_help()
|
|
{
|
|
cat <<EOFHELP
|
|
|
|
Usage:
|
|
|
|
$0 -b -- -DEXTRA_CONF_FILE=stub_build_all_ipc4.conf -DEXTRA_CFLAGS="-O0 -g3" ...
|
|
$0 -t 500 -- -DEXTRA_CONF_FILE=stub_build_all_ipc3.conf ...
|
|
|
|
-i4 Appends: -- -DCONFIG_IPC_MAJOR_4=y + fuzz_IPC4_features.conf
|
|
-i3 See above
|
|
-s Which sanitizer to use, defaults to address
|
|
-p Delete build-fuzz/ first ("pristine")
|
|
-b Do not run/fuzz: stop after the build.
|
|
-t n Fuzz for n seconds.
|
|
-o ofile Redirect the fuzzer's extremely verbose stdout. The
|
|
relatively verbose stderr is not redirected by -o.
|
|
-j n Number of concurrent -jobs=n. Defaults to 1.
|
|
The value 0 uses the output of the 'nproc' command.
|
|
-a arch The architecture to build against (i386, x86_64)
|
|
|
|
Arguments after -- are passed as is to CMake (through west).
|
|
When passing conflicting -DVAR='VAL UE1' -DVAR='VAL UE2' to CMake,
|
|
the last 'VAL UE2' wins; previous values are silently ignored.
|
|
|
|
The number of jobs defaults to 1 for (at least) two reasons:
|
|
- Other workers do not stop immediately after one worker fails.
|
|
- When higher than 1, this script has to unfortunately disable the
|
|
(very verbose) stdout because libFuzzer mixes it with the (terse and
|
|
useful) stderr.
|
|
|
|
Fuzzing happens to require stubbing which provides a great solution to
|
|
compile-check many CONFIG_* at once. So you can stop after the build
|
|
with the -b option.
|
|
|
|
Simple wrapper around a libfuzzer test run, as much for
|
|
documentation as direct use. The idea here is really simple: build
|
|
for the Zephyr "native_sim" board (which is a just a x86
|
|
executable for the build host, not an emulated device) and run the
|
|
resulting zephyr.exe file. This specifies a "fuzz_corpus" directory
|
|
to save the seeds that produce useful coverage output for use in
|
|
repeated runs (these are not particularly large, we might consider
|
|
curating and committing such a seed directory to the tree).
|
|
|
|
The tool will run until it finds a failure condition. You will see
|
|
MANY errors on stdout from all the randomized input. Don't try to
|
|
capture this, either redirect to a file with '-o fuzz.out' or arrange
|
|
to keep only the last XXX lines after the tool exits.
|
|
|
|
The only prerequisite to install is a clang compiler on the host.
|
|
Versions 12+ have all been observed to work.
|
|
|
|
You will need the kconfigs specified below for correct operation,
|
|
but can add more at the end of this script's command line to
|
|
duplicate configurations as needed. Alternatively you can pass
|
|
extra config files in kconfig syntax via:
|
|
|
|
fuzz.sh -t 300 -- -DEXTRA_CONF_FILE='debug.conf;other.conf' -DEXTRA_CFLAGS='-Wone -Wtwo' ...
|
|
|
|
EOFHELP
|
|
}
|
|
|
|
|
|
# To test this test, make the following change locally:
|
|
: <<EOF_TEST_PATCH
|
|
--- a/src/ipc/ipc3/handler.c
|
|
+++ b/src/ipc/ipc3/handler.c
|
|
@@ -1609,6 +1609,8 @@ void ipc_boot_complete_msg(struct ipc_cmd_hdr *header, uint32_t data)
|
|
|
|
void ipc_cmd(struct ipc_cmd_hdr *_hdr)
|
|
{
|
|
+ __ASSERT(false, "test the IPC3 fuzzer test");
|
|
+
|
|
struct sof_ipc_cmd_hdr *hdr = ipc_from_hdr(_hdr);
|
|
EOF_TEST_PATCH
|
|
|
|
# When fuzzing IPC4, make the same change in src/ipc/ipc4/handler.c#ipc_cmd()
|
|
|
|
main()
|
|
{
|
|
setup
|
|
|
|
# Default values
|
|
local JOBS=1
|
|
local PRISTINE=false
|
|
local BUILD_ONLY=false
|
|
local FUZZER_STDOUT=/dev/stdout # bashism
|
|
local TEST_DURATION=3
|
|
local SANITIZER=address
|
|
local ARCH=i386
|
|
local IPC
|
|
local BOARD
|
|
|
|
# Parse "$@". getopts stops after '--'
|
|
while getopts "i:hj:ps:a:o:t:b" opt; do
|
|
case "$opt" in
|
|
i) IPC="$OPTARG";;
|
|
h) print_help; exit 0;;
|
|
j) if [ "$OPTARG" -eq 0 ]; then JOBS=$(nproc); else JOBS="$OPTARG"; fi;;
|
|
p) PRISTINE=true;;
|
|
s) SANITIZER="$OPTARG";;
|
|
o) FUZZER_STDOUT="$OPTARG";;
|
|
t) TEST_DURATION="$OPTARG";;
|
|
a) ARCH="$OPTARG";;
|
|
b) BUILD_ONLY=true;;
|
|
*) print_help; exit 1;;
|
|
esac
|
|
done
|
|
|
|
# Pass all "$@" arguments remaining after '--' to cmake.
|
|
# This also drops _leading_ '--'.
|
|
shift $((OPTIND-1))
|
|
|
|
# https://docs.zephyrproject.org/latest/build/kconfig/setting.html#initial-conf
|
|
local conf_files_list='prj.conf;boards/native_sim_libfuzzer.conf'
|
|
|
|
conf_files_list+=';configs/fuzz_features.conf'
|
|
if [ -n "$IPC" ]; then
|
|
conf_files_list+=";configs/fuzz_IPC${IPC}_features.conf"
|
|
fi
|
|
|
|
case $SANITIZER in
|
|
address) conf_files_list+=";configs/fuzz_asan.conf";;
|
|
undefined) conf_files_list+=";configs/fuzz_ubsan.conf";;
|
|
coverage) conf_files_list+=";configs/fuzz_coverage.conf";;
|
|
*) echo "Unknown fuzzer type"; print_help; exit 1;;
|
|
esac
|
|
|
|
case $ARCH in
|
|
i386) BOARD="native_sim";;
|
|
x86_64) BOARD="native_sim/native/64";;
|
|
*) echo "Unknown arch type"; print_help; exit 1;;
|
|
esac
|
|
|
|
# Note there's never any reason to delete fuzz_corpus/.
|
|
# Don't trust `west build -p` because it is not 100% unreliable,
|
|
# especially not when doing unusual toolchain things.
|
|
if $PRISTINE; then rm -rf build-fuzz/; fi
|
|
|
|
# When passing conflicting -DVAR='VAL UE1' -DVAR='VAL UE2' to CMake,
|
|
# the last 'VAL UE2' wins. Previous ones are silently ignored.
|
|
local cmake_args=( -DCONF_FILE="$conf_files_list" )
|
|
if [ -n "$IPC" ]; then
|
|
cmake_args+=( "-DCONFIG_IPC_MAJOR_$IPC=y" )
|
|
fi
|
|
|
|
cmake_args+=( "$@" )
|
|
|
|
(set -x
|
|
west build -d build-fuzz -b $BOARD "$SOF_TOP"/app/ -- "${cmake_args[@]}"
|
|
)
|
|
|
|
if $BUILD_ONLY; then
|
|
exit 0
|
|
fi
|
|
|
|
mkdir -p ./fuzz_corpus
|
|
|
|
local jobs_opts=( )
|
|
# Do not use '-jobs=1' because it ignores FUZZER_STDOUT too
|
|
if [ "$JOBS" -gt 1 ]; then
|
|
# stdout and stderr get mixed and can't be separated anymore, so
|
|
# kiss stdout goodbye.
|
|
[ "$FUZZER_STDOUT" = /dev/stdout ] ||
|
|
>&2 printf 'WARN: redirection to %s EMPTY when jobs > 1\n' "$FUZZER_STDOUT"
|
|
jobs_opts+=( -jobs="$JOBS" -close_fd_mask=1 )
|
|
fi
|
|
|
|
date
|
|
# Help is at: -help=1
|
|
( set -x
|
|
>"$FUZZER_STDOUT" build-fuzz/zephyr/zephyr.exe -max_total_time="$TEST_DURATION" \
|
|
-verbosity=0 "${jobs_opts[@]}" ./fuzz_corpus ) || {
|
|
ret=$?
|
|
>&2 printf 'zephyr.exe returned: %d\n' $ret
|
|
date
|
|
die "FAIL. To debug, run: gdb -tui ./build-fuzz/zephyr/zephyr.exe -ex 'run > _ ./crash-...'"
|
|
}
|
|
|
|
date
|
|
}
|
|
|
|
|
|
setup()
|
|
{
|
|
SOF_TOP=$(cd "$(dirname "$0")/.." && pwd)
|
|
export SOF_TOP
|
|
|
|
export ZEPHYR_TOOLCHAIN_VARIANT=llvm
|
|
|
|
# Define ZEPHYR_BASE so this can be invoked even outside the west workspace.
|
|
local WS_TOP
|
|
WS_TOP=$(cd "$SOF_TOP"; west topdir)
|
|
# The manifest itself is not a west project
|
|
ZEP_DIR=$(2>/dev/null west list -f '{path}' zephyr || echo 'zephyr')
|
|
export ZEPHYR_BASE="$WS_TOP/$ZEP_DIR"
|
|
|
|
}
|
|
|
|
die()
|
|
{
|
|
>&2 printf '%s ERROR: ' "$0"
|
|
# We want die() to be usable exactly like printf
|
|
# shellcheck disable=SC2059
|
|
>&2 printf "$@"
|
|
>&2 printf '\n'
|
|
exit 1
|
|
}
|
|
|
|
main "$@"
|