109467b48Spatrick //===--- llvm-opt-fuzzer.cpp - Fuzzer for instruction selection ----------===//
209467b48Spatrick //
309467b48Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
409467b48Spatrick // See https://llvm.org/LICENSE.txt for license information.
509467b48Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
609467b48Spatrick //
709467b48Spatrick //===----------------------------------------------------------------------===//
809467b48Spatrick //
909467b48Spatrick // Tool to fuzz optimization passes using libFuzzer.
1009467b48Spatrick //
1109467b48Spatrick //===----------------------------------------------------------------------===//
1209467b48Spatrick
1373471bf0Spatrick #include "llvm/Analysis/AliasAnalysis.h"
1409467b48Spatrick #include "llvm/Bitcode/BitcodeReader.h"
1509467b48Spatrick #include "llvm/Bitcode/BitcodeWriter.h"
16097a140dSpatrick #include "llvm/CodeGen/CommandFlags.h"
1709467b48Spatrick #include "llvm/FuzzMutate/FuzzerCLI.h"
1809467b48Spatrick #include "llvm/FuzzMutate/IRMutator.h"
1909467b48Spatrick #include "llvm/IR/Verifier.h"
2009467b48Spatrick #include "llvm/InitializePasses.h"
21*d415bd75Srobert #include "llvm/MC/TargetRegistry.h"
2209467b48Spatrick #include "llvm/Passes/PassBuilder.h"
2373471bf0Spatrick #include "llvm/Support/CommandLine.h"
2409467b48Spatrick #include "llvm/Support/SourceMgr.h"
2509467b48Spatrick #include "llvm/Support/TargetSelect.h"
26097a140dSpatrick #include "llvm/Target/TargetMachine.h"
2709467b48Spatrick
2809467b48Spatrick using namespace llvm;
2909467b48Spatrick
30097a140dSpatrick static codegen::RegisterCodeGenFlags CGF;
31097a140dSpatrick
3209467b48Spatrick static cl::opt<std::string>
3309467b48Spatrick TargetTripleStr("mtriple", cl::desc("Override target triple for module"));
3409467b48Spatrick
3509467b48Spatrick // Passes to run for this fuzzer instance. Expects new pass manager syntax.
3609467b48Spatrick static cl::opt<std::string> PassPipeline(
3709467b48Spatrick "passes",
3809467b48Spatrick cl::desc("A textual description of the pass pipeline for testing"));
3909467b48Spatrick
4009467b48Spatrick static std::unique_ptr<IRMutator> Mutator;
4109467b48Spatrick static std::unique_ptr<TargetMachine> TM;
4209467b48Spatrick
createOptMutator()4309467b48Spatrick std::unique_ptr<IRMutator> createOptMutator() {
4409467b48Spatrick std::vector<TypeGetter> Types{
4509467b48Spatrick Type::getInt1Ty, Type::getInt8Ty, Type::getInt16Ty, Type::getInt32Ty,
4609467b48Spatrick Type::getInt64Ty, Type::getFloatTy, Type::getDoubleTy};
4709467b48Spatrick
4809467b48Spatrick std::vector<std::unique_ptr<IRMutationStrategy>> Strategies;
4909467b48Spatrick Strategies.push_back(
5009467b48Spatrick std::make_unique<InjectorIRStrategy>(
5109467b48Spatrick InjectorIRStrategy::getDefaultOps()));
5209467b48Spatrick Strategies.push_back(
5309467b48Spatrick std::make_unique<InstDeleterIRStrategy>());
5473471bf0Spatrick Strategies.push_back(std::make_unique<InstModificationIRStrategy>());
5509467b48Spatrick
5609467b48Spatrick return std::make_unique<IRMutator>(std::move(Types), std::move(Strategies));
5709467b48Spatrick }
5809467b48Spatrick
LLVMFuzzerCustomMutator(uint8_t * Data,size_t Size,size_t MaxSize,unsigned int Seed)5909467b48Spatrick extern "C" LLVM_ATTRIBUTE_USED size_t LLVMFuzzerCustomMutator(
6009467b48Spatrick uint8_t *Data, size_t Size, size_t MaxSize, unsigned int Seed) {
6109467b48Spatrick
6209467b48Spatrick assert(Mutator &&
6309467b48Spatrick "IR mutator should have been created during fuzzer initialization");
6409467b48Spatrick
6509467b48Spatrick LLVMContext Context;
6609467b48Spatrick auto M = parseAndVerify(Data, Size, Context);
6709467b48Spatrick if (!M) {
6809467b48Spatrick errs() << "error: mutator input module is broken!\n";
6909467b48Spatrick return 0;
7009467b48Spatrick }
7109467b48Spatrick
7209467b48Spatrick Mutator->mutateModule(*M, Seed, Size, MaxSize);
7309467b48Spatrick
7409467b48Spatrick if (verifyModule(*M, &errs())) {
7509467b48Spatrick errs() << "mutation result doesn't pass verification\n";
7609467b48Spatrick #ifndef NDEBUG
7709467b48Spatrick M->dump();
7809467b48Spatrick #endif
7909467b48Spatrick // Avoid adding incorrect test cases to the corpus.
8009467b48Spatrick return 0;
8109467b48Spatrick }
8209467b48Spatrick
8309467b48Spatrick std::string Buf;
8409467b48Spatrick {
8509467b48Spatrick raw_string_ostream OS(Buf);
8609467b48Spatrick WriteBitcodeToFile(*M, OS);
8709467b48Spatrick }
8809467b48Spatrick if (Buf.size() > MaxSize)
8909467b48Spatrick return 0;
9009467b48Spatrick
9109467b48Spatrick // There are some invariants which are not checked by the verifier in favor
9209467b48Spatrick // of having them checked by the parser. They may be considered as bugs in the
9309467b48Spatrick // verifier and should be fixed there. However until all of those are covered
9409467b48Spatrick // we want to check for them explicitly. Otherwise we will add incorrect input
9509467b48Spatrick // to the corpus and this is going to confuse the fuzzer which will start
9609467b48Spatrick // exploration of the bitcode reader error handling code.
9709467b48Spatrick auto NewM = parseAndVerify(
9809467b48Spatrick reinterpret_cast<const uint8_t*>(Buf.data()), Buf.size(), Context);
9909467b48Spatrick if (!NewM) {
10009467b48Spatrick errs() << "mutator failed to re-read the module\n";
10109467b48Spatrick #ifndef NDEBUG
10209467b48Spatrick M->dump();
10309467b48Spatrick #endif
10409467b48Spatrick return 0;
10509467b48Spatrick }
10609467b48Spatrick
10709467b48Spatrick memcpy(Data, Buf.data(), Buf.size());
10809467b48Spatrick return Buf.size();
10909467b48Spatrick }
11009467b48Spatrick
LLVMFuzzerTestOneInput(const uint8_t * Data,size_t Size)11109467b48Spatrick extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
11209467b48Spatrick assert(TM && "Should have been created during fuzzer initialization");
11309467b48Spatrick
11409467b48Spatrick if (Size <= 1)
11509467b48Spatrick // We get bogus data given an empty corpus - ignore it.
11609467b48Spatrick return 0;
11709467b48Spatrick
11809467b48Spatrick // Parse module
11909467b48Spatrick //
12009467b48Spatrick
12109467b48Spatrick LLVMContext Context;
12209467b48Spatrick auto M = parseAndVerify(Data, Size, Context);
12309467b48Spatrick if (!M) {
12409467b48Spatrick errs() << "error: input module is broken!\n";
12509467b48Spatrick return 0;
12609467b48Spatrick }
12709467b48Spatrick
12809467b48Spatrick // Set up target dependant options
12909467b48Spatrick //
13009467b48Spatrick
13109467b48Spatrick M->setTargetTriple(TM->getTargetTriple().normalize());
13209467b48Spatrick M->setDataLayout(TM->createDataLayout());
133097a140dSpatrick codegen::setFunctionAttributes(TM->getTargetCPU(),
134097a140dSpatrick TM->getTargetFeatureString(), *M);
13509467b48Spatrick
13609467b48Spatrick // Create pass pipeline
13709467b48Spatrick //
13809467b48Spatrick
13909467b48Spatrick PassBuilder PB(TM.get());
14009467b48Spatrick
14109467b48Spatrick LoopAnalysisManager LAM;
14209467b48Spatrick FunctionAnalysisManager FAM;
14309467b48Spatrick CGSCCAnalysisManager CGAM;
14409467b48Spatrick ModulePassManager MPM;
14509467b48Spatrick ModuleAnalysisManager MAM;
14609467b48Spatrick
14709467b48Spatrick PB.registerModuleAnalyses(MAM);
14809467b48Spatrick PB.registerCGSCCAnalyses(CGAM);
14909467b48Spatrick PB.registerFunctionAnalyses(FAM);
15009467b48Spatrick PB.registerLoopAnalyses(LAM);
15109467b48Spatrick PB.crossRegisterProxies(LAM, FAM, CGAM, MAM);
15209467b48Spatrick
15373471bf0Spatrick auto Err = PB.parsePassPipeline(MPM, PassPipeline);
15409467b48Spatrick assert(!Err && "Should have been checked during fuzzer initialization");
15509467b48Spatrick // Only fail with assert above, otherwise ignore the parsing error.
15609467b48Spatrick consumeError(std::move(Err));
15709467b48Spatrick
15809467b48Spatrick // Run passes which we need to test
15909467b48Spatrick //
16009467b48Spatrick
16109467b48Spatrick MPM.run(*M, MAM);
16209467b48Spatrick
16309467b48Spatrick // Check that passes resulted in a correct code
16409467b48Spatrick if (verifyModule(*M, &errs())) {
16509467b48Spatrick errs() << "Transformation resulted in an invalid module\n";
16609467b48Spatrick abort();
16709467b48Spatrick }
16809467b48Spatrick
16909467b48Spatrick return 0;
17009467b48Spatrick }
17109467b48Spatrick
handleLLVMFatalError(void *,const char * Message,bool)172*d415bd75Srobert static void handleLLVMFatalError(void *, const char *Message, bool) {
17309467b48Spatrick // TODO: Would it be better to call into the fuzzer internals directly?
17409467b48Spatrick dbgs() << "LLVM ERROR: " << Message << "\n"
17509467b48Spatrick << "Aborting to trigger fuzzer exit handling.\n";
17609467b48Spatrick abort();
17709467b48Spatrick }
17809467b48Spatrick
LLVMFuzzerInitialize(int * argc,char *** argv)17909467b48Spatrick extern "C" LLVM_ATTRIBUTE_USED int LLVMFuzzerInitialize(
18009467b48Spatrick int *argc, char ***argv) {
18109467b48Spatrick EnableDebugBuffering = true;
18209467b48Spatrick
18309467b48Spatrick // Make sure we print the summary and the current unit when LLVM errors out.
18409467b48Spatrick install_fatal_error_handler(handleLLVMFatalError, nullptr);
18509467b48Spatrick
18609467b48Spatrick // Initialize llvm
18709467b48Spatrick //
18809467b48Spatrick
18909467b48Spatrick InitializeAllTargets();
19009467b48Spatrick InitializeAllTargetMCs();
19109467b48Spatrick
19209467b48Spatrick PassRegistry &Registry = *PassRegistry::getPassRegistry();
19309467b48Spatrick initializeCore(Registry);
19409467b48Spatrick initializeScalarOpts(Registry);
19509467b48Spatrick initializeVectorization(Registry);
19609467b48Spatrick initializeIPO(Registry);
19709467b48Spatrick initializeAnalysis(Registry);
19809467b48Spatrick initializeTransformUtils(Registry);
19909467b48Spatrick initializeInstCombine(Registry);
20009467b48Spatrick initializeTarget(Registry);
20109467b48Spatrick
20209467b48Spatrick // Parse input options
20309467b48Spatrick //
20409467b48Spatrick
20509467b48Spatrick handleExecNameEncodedOptimizerOpts(*argv[0]);
20609467b48Spatrick parseFuzzerCLOpts(*argc, *argv);
20709467b48Spatrick
20809467b48Spatrick // Create TargetMachine
20909467b48Spatrick //
21009467b48Spatrick
21109467b48Spatrick if (TargetTripleStr.empty()) {
21209467b48Spatrick errs() << *argv[0] << ": -mtriple must be specified\n";
21309467b48Spatrick exit(1);
21409467b48Spatrick }
21509467b48Spatrick Triple TargetTriple = Triple(Triple::normalize(TargetTripleStr));
21609467b48Spatrick
21709467b48Spatrick std::string Error;
21809467b48Spatrick const Target *TheTarget =
219097a140dSpatrick TargetRegistry::lookupTarget(codegen::getMArch(), TargetTriple, Error);
22009467b48Spatrick if (!TheTarget) {
22109467b48Spatrick errs() << *argv[0] << ": " << Error;
22209467b48Spatrick exit(1);
22309467b48Spatrick }
22409467b48Spatrick
22573471bf0Spatrick TargetOptions Options =
22673471bf0Spatrick codegen::InitTargetOptionsFromCodeGenFlags(TargetTriple);
22709467b48Spatrick TM.reset(TheTarget->createTargetMachine(
228097a140dSpatrick TargetTriple.getTriple(), codegen::getCPUStr(), codegen::getFeaturesStr(),
229097a140dSpatrick Options, codegen::getExplicitRelocModel(),
230097a140dSpatrick codegen::getExplicitCodeModel(), CodeGenOpt::Default));
23109467b48Spatrick assert(TM && "Could not allocate target machine!");
23209467b48Spatrick
23309467b48Spatrick // Check that pass pipeline is specified and correct
23409467b48Spatrick //
23509467b48Spatrick
23609467b48Spatrick if (PassPipeline.empty()) {
23709467b48Spatrick errs() << *argv[0] << ": at least one pass should be specified\n";
23809467b48Spatrick exit(1);
23909467b48Spatrick }
24009467b48Spatrick
24109467b48Spatrick PassBuilder PB(TM.get());
24209467b48Spatrick ModulePassManager MPM;
24373471bf0Spatrick if (auto Err = PB.parsePassPipeline(MPM, PassPipeline)) {
24409467b48Spatrick errs() << *argv[0] << ": " << toString(std::move(Err)) << "\n";
24509467b48Spatrick exit(1);
24609467b48Spatrick }
24709467b48Spatrick
24809467b48Spatrick // Create mutator
24909467b48Spatrick //
25009467b48Spatrick
25109467b48Spatrick Mutator = createOptMutator();
25209467b48Spatrick
25309467b48Spatrick return 0;
25409467b48Spatrick }
255