forked from rlane/ubpf
-
Notifications
You must be signed in to change notification settings - Fork 127
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add libfuzzer based test with (#443)
* Add option to link with libfuzzer Signed-off-by: Alan Jowett <alan.jowett@microsoft.com> * Build libfuzzer with coverage Signed-off-by: Alan Jowett <alanjo@microsoft.com> * Add code to run as JIT, but disable for now Signed-off-by: Alan Jowett <alanjo@microsoft.com> * Fix build break Signed-off-by: Alan Jowett <alan.jowett@microsoft.com> * Authorize push of updated corpus Signed-off-by: Alan Jowett <alan.jowett@microsoft.com> * Propogate GH token to permit push Signed-off-by: Alan Jowett <alan.jowett@microsoft.com> * Revert GH token secret changes Signed-off-by: Alan Jowett <alan.jowett@microsoft.com> * PR feedback Signed-off-by: Alan Jowett <alan.jowett@microsoft.com> --------- Signed-off-by: Alan Jowett <alan.jowett@microsoft.com> Signed-off-by: Alan Jowett <alanjo@microsoft.com> Co-authored-by: Alan Jowett <alan.jowett@microsoft.com>
- Loading branch information
1 parent
664410c
commit 0a50b44
Showing
10 changed files
with
463 additions
and
19 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,163 @@ | ||
# Copyright (c) uBPF contributors | ||
# SPDX-License-Identifier: MIT | ||
|
||
name: Fuzzing | ||
|
||
permissions: | ||
contents: read | ||
|
||
on: | ||
workflow_call: | ||
inputs: | ||
arch: | ||
description: 'Architecture' | ||
required: true | ||
type: string | ||
|
||
platform: | ||
required: true | ||
type: string | ||
|
||
jobs: | ||
build: | ||
runs-on: ${{ inputs.platform }} | ||
|
||
steps: | ||
- uses: actions/checkout@v4 | ||
with: | ||
submodules: 'recursive' | ||
|
||
- name: Initialize CodeQL | ||
if: inputs.build_codeql == true | ||
uses: github/codeql-action/init@d39d31e687223d841ef683f52467bd88e9b21c14 | ||
with: | ||
languages: 'cpp' | ||
|
||
- name: Generate the cache key | ||
id: cache_key | ||
run: echo "VALUE=platform-${{ inputs.platform }}_arch=${{ inputs.arch }}_type=fuzzing" >> $GITHUB_OUTPUT | ||
|
||
- name: Update the cache (ccache) | ||
uses: actions/cache@v4.0.2 | ||
with: | ||
path: ccache | ||
key: ${{ steps.cache_key.outputs.VALUE }}_ccache | ||
|
||
- name: Create the build folders | ||
run: | | ||
mkdir -p \ | ||
ccache | ||
- name: Install system dependencies (Linux) | ||
if: inputs.platform == 'ubuntu-latest' | ||
run: | | ||
sudo apt-get update | ||
sudo apt-get install -y \ | ||
ccache \ | ||
ninja-build \ | ||
cmake \ | ||
lcov \ | ||
libboost-dev \ | ||
libboost-program-options-dev \ | ||
libboost-filesystem-dev \ | ||
libelf-dev | ||
if [[ "${{ inputs.scan_build }}" == "true" ]] ; then | ||
sudo apt-get install -y \ | ||
clang-tools | ||
fi | ||
if [[ "${{ inputs.arch }}" == "arm64" ]] ; then | ||
sudo apt install -y \ | ||
g++-aarch64-linux-gnu \ | ||
gcc-aarch64-linux-gnu \ | ||
qemu-user | ||
fi | ||
- name: Build/install libbpf From Source | ||
if: inputs.platform == 'ubuntu-latest' | ||
run: ./.github/scripts/build-libbpf.sh | ||
shell: bash | ||
|
||
- name: Install system dependencies (macOS) | ||
if: inputs.platform == 'macos-11' | ||
run: | | ||
brew install \ | ||
cmake \ | ||
ninja \ | ||
ccache \ | ||
lcov \ | ||
boost | ||
- name: Configure uBPF | ||
run: | | ||
export CCACHE_DIR="$(pwd)/ccache" | ||
${command_prefix} cmake \ | ||
-G Ninja \ | ||
-S . \ | ||
-B build \ | ||
-DCMAKE_BUILD_TYPE=${{ inputs.build_type }} \ | ||
-DCMAKE_C_COMPILER=clang \ | ||
-DCMAKE_CXX_COMPILER=clang++ \ | ||
-DUBPF_ENABLE_LIBFUZZER=1 \ | ||
-DCMAKE_BUILD_TYPE=Debug | ||
${arch_flags} | ||
- name: Build uBPF | ||
run: | | ||
export CCACHE_DIR="$(pwd)/ccache" | ||
if [[ "${{ inputs.scan_build }}" == "true" ]] ; then | ||
command_prefix="scan-build -o scan_build_report" | ||
fi | ||
${command_prefix} cmake \ | ||
--build build | ||
- name: Upload fuzzer as artifacts | ||
uses: actions/upload-artifact@v2 | ||
with: | ||
name: fuzzer | ||
path: build/bin/ubpf_fuzzer | ||
|
||
- uses: actions/checkout@v4 | ||
with: | ||
submodules: 'recursive' | ||
ref: fuzz/corpus | ||
|
||
- name: Download fuzzer artifacts | ||
uses: actions/download-artifact@v2 | ||
with: | ||
name: fuzzer | ||
|
||
- name: Setup directory for fuzzing | ||
run: | | ||
ls -la | ||
mkdir -p new_corpus | ||
mkdir -p fuzz/corpus | ||
cp -r fuzz/corpus/* new_corpus | ||
mkdir -p artifacts | ||
chmod a+x ubpf_fuzzer | ||
- name: Run fuzzing | ||
run: | | ||
./ubpf_fuzzer new_corpus -artifact_prefix=artifacts/ -use_value_profile=1 -max_total_time=300 | ||
- name: Merge corpus into fuzz/corpus | ||
run: | | ||
./ubpf_fuzzer -merge=1 fuzz/corpus new_corpus | ||
git add fuzz/corpus | ||
git config --global user.email 'ubpf@users.noreply.github.com' | ||
git config --global user.name 'Github Action' | ||
git commit -sm "Update fuzzing corpus" | ||
git remote set-url origin https://x-access-token:${{ secrets.GITHUB_TOKEN }}@github.com/iovisor/ubpf.git | ||
git push | ||
- name: Upload artifacts | ||
if: always() | ||
uses: actions/upload-artifact@v2 | ||
with: | ||
name: fuzzing-artifacts | ||
path: artifacts/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
# Copyright (c) Microsoft Corporation | ||
# SPDX-License-Identifier: Apache-2.0 | ||
|
||
if (UBPF_SKIP_EXTERNAL) | ||
message(WARNING "Skipping configuration of tests that require external package support.") | ||
return() | ||
endif() | ||
|
||
set(CMAKE_CXX_STANDARD 20) | ||
|
||
add_executable( | ||
ubpf_fuzzer | ||
libfuzz_harness.cc | ||
) | ||
|
||
target_include_directories("ubpf_fuzzer" PRIVATE | ||
"${CMAKE_SOURCE_DIR}/vm" | ||
"${CMAKE_BINARY_DIR}/vm" | ||
"${CMAKE_SOURCE_DIR}/vm/inc" | ||
"${CMAKE_BINARY_DIR}/vm/inc" | ||
"${CMAKE_SOURCE_DIR}/ubpf_plugin" | ||
) | ||
|
||
target_link_libraries( | ||
ubpf_fuzzer | ||
ubpf | ||
ubpf_settings | ||
) | ||
|
Oops, something went wrong.