1
+ //! Bindings to [libFuzzer](http://llvm.org/docs/LibFuzzer.html): a runtime for
2
+ //! coverage-guided fuzzing.
3
+ //!
4
+ //! See [the `cargo-fuzz`
5
+ //! guide](https://rust-fuzz.github.io/book/cargo-fuzz.html) for a usage
6
+ //! tutorial.
7
+ //!
8
+ //! The main export of this crate is [the `fuzz_target!`
9
+ //! macro](./macro.fuzz_target.html), which allows you to define targets for
10
+ //! libFuzzer to exercise.
11
+
12
+ #![ deny( missing_docs, missing_debug_implementations) ]
13
+
1
14
pub use arbitrary;
2
15
3
16
extern "C" {
4
- #! [ allow ( improper_ctypes ) ] // we do not actually cross the FFI bound here
5
-
17
+ // We do not actually cross the FFI bound here.
18
+ # [ allow ( improper_ctypes ) ]
6
19
fn rust_fuzzer_test_input ( input : & [ u8 ] ) ;
7
20
}
8
21
22
+ #[ doc( hidden) ]
9
23
#[ export_name = "LLVMFuzzerTestOneInput" ]
10
24
pub fn test_input_wrap ( data : * const u8 , size : usize ) -> i32 {
11
25
let test_input = :: std:: panic:: catch_unwind ( || unsafe {
@@ -20,6 +34,7 @@ pub fn test_input_wrap(data: *const u8, size: usize) -> i32 {
20
34
0
21
35
}
22
36
37
+ #[ doc( hidden) ]
23
38
#[ export_name = "LLVMFuzzerInitialize" ]
24
39
pub fn initialize ( _argc : * const isize , _argv : * const * const * const u8 ) -> isize {
25
40
// Registers a panic hook that aborts the process before unwinding.
@@ -38,6 +53,66 @@ pub fn initialize(_argc: *const isize, _argv: *const *const *const u8) -> isize
38
53
0
39
54
}
40
55
56
+ /// Define a fuzz target.
57
+ ///
58
+ /// ## Example
59
+ ///
60
+ /// This example takes a `&[u8]` slice and attempts to parse it. The parsing
61
+ /// might fail and return an `Err`, but it shouldn't ever panic or segfault.
62
+ ///
63
+ /// ```no_run
64
+ /// #![no_main]
65
+ ///
66
+ /// use libfuzzer_sys::fuzz_target;
67
+ ///
68
+ /// // Note: `|input|` is short for `|input: &[u8]|`.
69
+ /// fuzz_target!(|input| {
70
+ /// let _result: Result<_, _> = my_crate::parse(input);
71
+ /// });
72
+ /// # mod my_crate { pub fn parse(_: &[u8]) -> Result<(), ()> { unimplemented!() } }
73
+ /// ```
74
+ ///
75
+ /// ## Arbitrary Input Types
76
+ ///
77
+ /// The input is a `&[u8]` slice by default, but you can take arbitrary input
78
+ /// types, as long as the type implements [the `arbitrary` crate's `Arbitrary`
79
+ /// trait](https://docs.rs/arbitrary/*/arbitrary/trait.Arbitrary.html) (which is
80
+ /// also re-exported as `libfuzzer_sys::arbitrary::Arbitrary` for convenience).
81
+ ///
82
+ /// For example, if you wanted to take an arbitrary RGB color, you could do the
83
+ /// following:
84
+ ///
85
+ /// ```no_run
86
+ /// #![no_main]
87
+ ///
88
+ /// use libfuzzer_sys::{arbitrary::{Arbitrary, Unstructured}, fuzz_target};
89
+ ///
90
+ /// #[derive(Debug)]
91
+ /// pub struct Rgb {
92
+ /// r: u8,
93
+ /// g: u8,
94
+ /// b: u8,
95
+ /// }
96
+ ///
97
+ /// impl Arbitrary for Rgb {
98
+ /// fn arbitrary<U>(raw: &mut U) -> Result<Self, U::Error>
99
+ /// where
100
+ /// U: Unstructured + ?Sized
101
+ /// {
102
+ /// let mut buf = [0; 3];
103
+ /// raw.fill_buffer(&mut buf)?;
104
+ /// let r = buf[0];
105
+ /// let g = buf[1];
106
+ /// let b = buf[2];
107
+ /// Ok(Rgb { r, g, b })
108
+ /// }
109
+ /// }
110
+ ///
111
+ /// // Write a fuzz target that works with RGB colors instead of raw bytes.
112
+ /// fuzz_target!(|color: Rgb| {
113
+ /// my_crate::convert_color(color);
114
+ /// });
115
+ /// # mod my_crate { fn convert_color(_: super::Rgb) {} }
41
116
#[ macro_export]
42
117
macro_rules! fuzz_target {
43
118
( |$bytes: ident| $body: block) => {
@@ -46,9 +121,11 @@ macro_rules! fuzz_target {
46
121
$body
47
122
}
48
123
} ;
124
+
49
125
( |$data: ident: & [ u8 ] | $body: block) => {
50
126
fuzz_target!( |$data| $body) ;
51
127
} ;
128
+
52
129
( |$data: ident: $dty: ty| $body: block) => {
53
130
#[ no_mangle]
54
131
pub extern "C" fn rust_fuzzer_test_input( bytes: & [ u8 ] ) {
0 commit comments