|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
"""Module for running fuzzers.""" |
|
|
import enum |
|
|
import logging |
|
|
import os |
|
|
import sys |
|
|
import time |
|
|
|
|
|
import clusterfuzz_deployment |
|
|
import fuzz_target |
|
|
import generate_coverage_report |
|
|
import workspace_utils |
|
|
import sarif_utils |
|
|
|
|
|
|
|
|
sys.path.append(os.path.dirname(os.path.dirname(os.path.abspath(__file__)))) |
|
|
|
|
|
import utils |
|
|
|
|
|
|
|
|
class RunFuzzersResult(enum.Enum): |
|
|
"""Enum result from running fuzzers.""" |
|
|
ERROR = 0 |
|
|
BUG_FOUND = 1 |
|
|
NO_BUG_FOUND = 2 |
|
|
|
|
|
|
|
|
class BaseFuzzTargetRunner: |
|
|
"""Base class for fuzzer runners.""" |
|
|
|
|
|
def __init__(self, config): |
|
|
self.config = config |
|
|
self.workspace = workspace_utils.Workspace(config) |
|
|
self.clusterfuzz_deployment = ( |
|
|
clusterfuzz_deployment.get_clusterfuzz_deployment( |
|
|
self.config, self.workspace)) |
|
|
|
|
|
|
|
|
self.fuzz_target_paths = None |
|
|
|
|
|
def get_fuzz_targets(self): |
|
|
"""Returns fuzz targets in out directory.""" |
|
|
return utils.get_fuzz_targets(self.workspace.out) |
|
|
|
|
|
def initialize(self): |
|
|
"""Initialization method. Must be called before calling run_fuzz_targets. |
|
|
Returns True on success.""" |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
logging.info('Using %s sanitizer.', self.config.sanitizer) |
|
|
|
|
|
|
|
|
if not self.config.fuzz_seconds or self.config.fuzz_seconds < 1: |
|
|
logging.error( |
|
|
'Fuzz_seconds argument must be greater than 1, but was: %s.', |
|
|
self.config.fuzz_seconds) |
|
|
return False |
|
|
|
|
|
if not os.path.exists(self.workspace.out): |
|
|
logging.error('Out directory: %s does not exist.', self.workspace.out) |
|
|
return False |
|
|
|
|
|
if not os.path.exists(self.workspace.artifacts): |
|
|
os.makedirs(self.workspace.artifacts) |
|
|
elif (not os.path.isdir(self.workspace.artifacts) or |
|
|
os.listdir(self.workspace.artifacts)): |
|
|
logging.error('Artifacts path: %s exists and is not an empty directory.', |
|
|
self.workspace.artifacts) |
|
|
return False |
|
|
|
|
|
self.fuzz_target_paths = self.get_fuzz_targets() |
|
|
logging.info('Fuzz targets: %s', self.fuzz_target_paths) |
|
|
if not self.fuzz_target_paths: |
|
|
logging.error('No fuzz targets were found in out directory: %s.', |
|
|
self.workspace.out) |
|
|
return False |
|
|
|
|
|
return True |
|
|
|
|
|
def cleanup_after_fuzz_target_run(self, fuzz_target_obj): |
|
|
"""Cleans up after running |fuzz_target_obj|.""" |
|
|
raise NotImplementedError('Child class must implement method.') |
|
|
|
|
|
def run_fuzz_target(self, fuzz_target_obj): |
|
|
"""Fuzzes with |fuzz_target_obj| and returns the result.""" |
|
|
raise NotImplementedError('Child class must implement method.') |
|
|
|
|
|
@property |
|
|
def quit_on_bug_found(self): |
|
|
"""Property that is checked to determine if fuzzing should quit after first |
|
|
bug is found.""" |
|
|
raise NotImplementedError('Child class must implement method.') |
|
|
|
|
|
def create_fuzz_target_obj(self, target_path, run_seconds): |
|
|
"""Returns a fuzz target object.""" |
|
|
return fuzz_target.FuzzTarget(target_path, run_seconds, self.workspace, |
|
|
self.clusterfuzz_deployment, self.config) |
|
|
|
|
|
def run_fuzz_targets(self): |
|
|
"""Runs fuzz targets. Returns True if a bug was found.""" |
|
|
fuzzers_left_to_run = len(self.fuzz_target_paths) |
|
|
|
|
|
|
|
|
fuzz_seconds = self.config.fuzz_seconds |
|
|
|
|
|
min_seconds_per_fuzzer = fuzz_seconds // fuzzers_left_to_run |
|
|
bug_found = False |
|
|
for target_path in self.fuzz_target_paths: |
|
|
|
|
|
|
|
|
|
|
|
run_seconds = max(fuzz_seconds // fuzzers_left_to_run, |
|
|
min_seconds_per_fuzzer) |
|
|
|
|
|
target = self.create_fuzz_target_obj(target_path, run_seconds) |
|
|
start_time = time.time() |
|
|
result = self.run_fuzz_target(target) |
|
|
self.cleanup_after_fuzz_target_run(target) |
|
|
|
|
|
|
|
|
|
|
|
fuzz_seconds -= time.time() - start_time |
|
|
|
|
|
fuzzers_left_to_run -= 1 |
|
|
if not result.testcase or not result.stacktrace: |
|
|
logging.info('Fuzzer %s finished running without reportable crashes.', |
|
|
target.target_name) |
|
|
continue |
|
|
|
|
|
bug_found = True |
|
|
if self.quit_on_bug_found: |
|
|
logging.info('Bug found. Stopping fuzzing.') |
|
|
break |
|
|
|
|
|
|
|
|
if not target_path: |
|
|
logging.error('Ran no fuzz targets.') |
|
|
elif self.config.output_sarif: |
|
|
|
|
|
write_fuzz_result_to_sarif(result, target_path, self.workspace) |
|
|
self.clusterfuzz_deployment.upload_crashes() |
|
|
return bug_found |
|
|
|
|
|
|
|
|
def write_fuzz_result_to_sarif(fuzz_result, target_path, workspace): |
|
|
"""Write results of fuzzing to SARIF.""" |
|
|
logging.info('Writing sarif results.') |
|
|
sarif_utils.write_stacktrace_to_sarif(fuzz_result.stacktrace, target_path, |
|
|
workspace) |
|
|
|
|
|
|
|
|
class PruneTargetRunner(BaseFuzzTargetRunner): |
|
|
"""Runner that prunes corpora.""" |
|
|
|
|
|
@property |
|
|
def quit_on_bug_found(self): |
|
|
return False |
|
|
|
|
|
def run_fuzz_target(self, fuzz_target_obj): |
|
|
"""Prunes with |fuzz_target_obj| and returns the result.""" |
|
|
result = fuzz_target_obj.prune() |
|
|
logging.debug('Corpus path contents: %s.', os.listdir(result.corpus_path)) |
|
|
self.clusterfuzz_deployment.upload_corpus(fuzz_target_obj.target_name, |
|
|
result.corpus_path, |
|
|
replace=True) |
|
|
return result |
|
|
|
|
|
def cleanup_after_fuzz_target_run(self, fuzz_target_obj): |
|
|
"""Cleans up after pruning with |fuzz_target_obj|.""" |
|
|
fuzz_target_obj.free_disk_if_needed() |
|
|
|
|
|
|
|
|
NON_FUZZ_TARGETS_FOR_COVERAGE = { |
|
|
'llvm-symbolizer', |
|
|
'jazzer_agent_deploy.jar', |
|
|
'jazzer_driver', |
|
|
'jazzer_driver_with_sanitizer', |
|
|
} |
|
|
|
|
|
|
|
|
def is_coverage_fuzz_target(file_path): |
|
|
"""Returns whether |file_path| is a fuzz target binary for the purposes of a |
|
|
coverage report. Inspired by infra/base-images/base-runner/coverage.""" |
|
|
if not os.path.isfile(file_path): |
|
|
return False |
|
|
if not utils.is_executable(file_path): |
|
|
return False |
|
|
filename = os.path.basename(file_path) |
|
|
return filename not in NON_FUZZ_TARGETS_FOR_COVERAGE |
|
|
|
|
|
|
|
|
def get_coverage_fuzz_targets(out): |
|
|
"""Returns a list of fuzz targets in |out| for coverage.""" |
|
|
|
|
|
|
|
|
|
|
|
fuzz_targets = [] |
|
|
for filename in os.listdir(out): |
|
|
file_path = os.path.join(out, filename) |
|
|
if is_coverage_fuzz_target(file_path): |
|
|
fuzz_targets.append(file_path) |
|
|
return fuzz_targets |
|
|
|
|
|
|
|
|
class CoverageTargetRunner(BaseFuzzTargetRunner): |
|
|
"""Runner that runs the 'coverage' command.""" |
|
|
|
|
|
@property |
|
|
def quit_on_bug_found(self): |
|
|
raise NotImplementedError('Not implemented for CoverageTargetRunner.') |
|
|
|
|
|
def get_fuzz_targets(self): |
|
|
"""Returns fuzz targets in out directory.""" |
|
|
return get_coverage_fuzz_targets(self.workspace.out) |
|
|
|
|
|
def run_fuzz_targets(self): |
|
|
"""Generates a coverage report. Always returns False since it never finds |
|
|
any bugs.""" |
|
|
generate_coverage_report.generate_coverage_report( |
|
|
self.fuzz_target_paths, self.workspace, self.clusterfuzz_deployment, |
|
|
self.config) |
|
|
return False |
|
|
|
|
|
def run_fuzz_target(self, fuzz_target_obj): |
|
|
"""Fuzzes with |fuzz_target_obj| and returns the result.""" |
|
|
raise NotImplementedError('Not implemented for CoverageTargetRunner.') |
|
|
|
|
|
def cleanup_after_fuzz_target_run(self, fuzz_target_obj): |
|
|
"""Cleans up after running |fuzz_target_obj|.""" |
|
|
raise NotImplementedError('Not implemented for CoverageTargetRunner.') |
|
|
|
|
|
|
|
|
class CiFuzzTargetRunner(BaseFuzzTargetRunner): |
|
|
"""Runner for fuzz targets used in CI (patch-fuzzing) context.""" |
|
|
|
|
|
@property |
|
|
def quit_on_bug_found(self): |
|
|
return True |
|
|
|
|
|
def cleanup_after_fuzz_target_run(self, fuzz_target_obj): |
|
|
"""Cleans up after running |fuzz_target_obj|.""" |
|
|
fuzz_target_obj.free_disk_if_needed() |
|
|
|
|
|
def run_fuzz_target(self, fuzz_target_obj): |
|
|
return fuzz_target_obj.fuzz() |
|
|
|
|
|
|
|
|
class BatchFuzzTargetRunner(BaseFuzzTargetRunner): |
|
|
"""Runner for fuzz targets used in batch fuzzing context.""" |
|
|
|
|
|
@property |
|
|
def quit_on_bug_found(self): |
|
|
return False |
|
|
|
|
|
def run_fuzz_target(self, fuzz_target_obj): |
|
|
"""Fuzzes with |fuzz_target_obj| and returns the result.""" |
|
|
result = fuzz_target_obj.fuzz(batch=True) |
|
|
logging.debug('Corpus path contents: %s.', os.listdir(result.corpus_path)) |
|
|
self.clusterfuzz_deployment.upload_corpus(fuzz_target_obj.target_name, |
|
|
result.corpus_path) |
|
|
return result |
|
|
|
|
|
def cleanup_after_fuzz_target_run(self, fuzz_target_obj): |
|
|
"""Cleans up after running |fuzz_target_obj|.""" |
|
|
|
|
|
|
|
|
|
|
|
fuzz_target_obj.free_disk_if_needed(delete_fuzz_target=False) |
|
|
|
|
|
|
|
|
_MODE_RUNNER_MAPPING = { |
|
|
'batch': BatchFuzzTargetRunner, |
|
|
'coverage': CoverageTargetRunner, |
|
|
'prune': PruneTargetRunner, |
|
|
'code-change': CiFuzzTargetRunner, |
|
|
} |
|
|
|
|
|
|
|
|
def get_fuzz_target_runner(config): |
|
|
"""Returns a fuzz target runner object based on the mode of |
|
|
|config|.""" |
|
|
runner = _MODE_RUNNER_MAPPING[config.mode](config) |
|
|
logging.info('run fuzzers MODE is: %s. Runner: %s.', config.mode, runner) |
|
|
return runner |
|
|
|
|
|
|
|
|
def run_fuzzers(config): |
|
|
"""Runs fuzzers for a specific OSS-Fuzz project. |
|
|
|
|
|
Args: |
|
|
config: A RunFuzzTargetsConfig. |
|
|
|
|
|
Returns: |
|
|
A RunFuzzersResult enum value indicating what happened during fuzzing. |
|
|
""" |
|
|
fuzz_target_runner = get_fuzz_target_runner(config) |
|
|
if not fuzz_target_runner.initialize(): |
|
|
|
|
|
|
|
|
return RunFuzzersResult.ERROR |
|
|
|
|
|
if not fuzz_target_runner.run_fuzz_targets(): |
|
|
|
|
|
return RunFuzzersResult.NO_BUG_FOUND |
|
|
|
|
|
|
|
|
return RunFuzzersResult.BUG_FOUND |
|
|
|