José Julián Espina
055e8fe3ce
|
12 months ago | |
---|---|---|
.. | ||
fuzz_targets | 1 year ago | |
.gitignore | 2 years ago | |
Cargo.lock | 12 months ago | |
Cargo.toml | 1 year ago | |
README.md | 2 years ago |
README.md
boa_engine-fuzz
This directory contains fuzzers which can be used to automatically identify faults present in Boa. All the fuzzers in this directory are grammar-aware (based on Arbitrary) and coverage-guided. See common.rs for implementation specifics.
You can run any fuzzer you wish with the following command (replacing your-fuzzer
with a fuzzer availble in
fuzz_targets, e.g. parser-idempotency
):
cargo fuzz run -s none your-fuzzer
Note that you may wish to use a different sanitizer option (-s
) according to what kind of issue you're looking for.
Refer to the cargo-fuzz book for details on how to select a
sanitizer and other flags.
Parser Fuzzer
The parser fuzzer, located in parser-idempotency.rs, identifies
correctness issues in both the parser and the AST-to-source conversion process (e.g., via to_interned_string
) by
searching for inputs which are not idempotent over parsing and conversion back to source. It does this by doing the
following:
- Generate an arbitrary AST
- Convert that AST to source code with
to_interned_string
; we'll call this the "original source" - Parse the original source into an AST; we'll call this the "first AST"
- Arbitrary ASTs aren't guaranteed to be parseable; to avoid errors caused by this, we discard errors here.
- Convert the first AST to source code with
to_interned_string
; we'll call this the "first source" - Parse the first source into an AST; we'll call this the "second AST"
- Since the original source was parseable, the first source must be parseable; emit any errors parsing produces.
- Compare the first AST and the second AST. If they are not equal, emit an error.
- An error here indicates that either the parser or the AST-to-source conversion lost information or added incorrect information, as the inputs parsed between the two should be the same.
In this way, this fuzzer can identify correctness issues present in the parser.
Bytecompiler Fuzzer
The bytecompiler fuzzer, located in bytecompiler-implied.rs, identifies cases which cause an assertion failure in the bytecompiler. These crashes can cause denial of service issues and may block the discovery of crash cases in the VM fuzzer.
VM Fuzzer
The VM fuzzer, located in vm-implied.rs, identifies crash cases in the VM. It does so by generating an arbitrary AST, converting it to source code (to remove invalid inputs), then executing that source code. Because we are not comparing against any invariants other than "does it crash", this fuzzer will only discover faults which cause the VM to terminate unexpectedly, e.g. as a result of a panic. It will not discover logic errors present in the VM.
To ensure that the VM does not attempt to execute an infinite loop, Boa is restricted to a finite number of instructions before the VM is terminated. If a program takes more than a second or so to execute, it likely indicates an issue in the VM (as we expect the fuzzer to execute only a certain amount of instructions, which should take significantly less time).