diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2015-10-13 11:55:19 +0200 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2015-10-13 15:29:07 +0200 |
| commit | 29e95fbb262d0f19ee1f04a59bafda4bf8f97b63 (patch) | |
| tree | 1b6e37f78ef2c60bef518fd95b2c2fd2f8798fd6 /ipc | |
| parent | 9145be6961b3b50eb682416c71e7c1b02b64cf33 (diff) | |
process covereage in ipc package instead of fuzzer
Diffstat (limited to 'ipc')
| -rw-r--r-- | ipc/ipc.go | 80 | ||||
| -rw-r--r-- | ipc/ipc_test.go | 13 |
2 files changed, 83 insertions, 10 deletions
diff --git a/ipc/ipc.go b/ipc/ipc.go index 678e79636..7702bba66 100644 --- a/ipc/ipc.go +++ b/ipc/ipc.go @@ -4,6 +4,8 @@ package ipc import ( + "bytes" + "encoding/binary" "fmt" "io/ioutil" "os" @@ -76,19 +78,87 @@ func (env *Env) Close() error { } } -func (env *Env) Exec(p *prog.Prog) (output, strace []byte, failed, hanged bool, err0 error) { +// Exec starts executor binary to execute program p and returns information about the execution: +// output: process output +// strace: strace output if env is created with FlagStrace +// cov: per-call coverage, len(cov) == len(p.Calls) +// failed: true if executor has detected a kernel bug +// hanged: program hanged and was killed +// err0: failed to start process, or executor has detected a logical error +func (env *Env) Exec(p *prog.Prog) (output, strace []byte, cov [][]uint32, failed, hanged bool, err0 error) { if p != nil { + // Copy-in serialized program. progData := p.SerializeForExec() if len(progData) > len(env.In) { panic("program is too long") } copy(env.In, progData) } - // Zero out the first word (ncmd), so that we don't have garbage there - // if executor crashes before writing non-garbage there. - for i := 0; i < 4; i++ { - env.Out[i] = 0 + if env.flags&FlagCover != 0 { + // Zero out the first word (ncmd), so that we don't have garbage there + // if executor crashes before writing non-garbage there. + for i := 0; i < 4; i++ { + env.Out[i] = 0 + } + } + + output, strace, failed, hanged, err0 = env.execBin() + if err0 != nil { + return + } + + if env.flags&FlagCover == 0 || p == nil { + return + } + // Read out coverage information. + r := bytes.NewReader(env.Out) + var ncmd uint32 + if err := binary.Read(r, binary.LittleEndian, &ncmd); err != nil { + err0 = fmt.Errorf("failed to read output coverage: %v", err) + return + } + cov = make([][]uint32, len(p.Calls)) + for i := uint32(0); i < ncmd; i++ { + var callIndex, callNum, coverSize, pc uint32 + if err := binary.Read(r, binary.LittleEndian, &callIndex); err != nil { + err0 = fmt.Errorf("failed to read output coverage: %v", err) + return + } + if err := binary.Read(r, binary.LittleEndian, &callNum); err != nil { + err0 = fmt.Errorf("failed to read output coverage: %v", err) + return + } + if err := binary.Read(r, binary.LittleEndian, &coverSize); err != nil { + err0 = fmt.Errorf("failed to read output coverage: %v", err) + return + } + if int(callIndex) > len(cov) { + err0 = fmt.Errorf("failed to read output coverage: expect index %v, got %v", i, callIndex) + return + } + if cov[callIndex] != nil { + err0 = fmt.Errorf("failed to read output coverage: double coverage for call %v", callIndex) + return + } + c := p.Calls[callIndex] + if num := c.Meta.ID; uint32(num) != callNum { + err0 = fmt.Errorf("failed to read output coverage: call %v: expect syscall %v, got %v, executed %v", callIndex, num, callNum, ncmd) + return + } + cov1 := make([]uint32, coverSize) + for j := uint32(0); j < coverSize; j++ { + if err := binary.Read(r, binary.LittleEndian, &pc); err != nil { + err0 = fmt.Errorf("failed to read output coverage: expect index %v, got %v", i, callIndex) + return + } + cov1[j] = pc + } + cov[callIndex] = cov1 } + return +} + +func (env *Env) execBin() (output, strace []byte, failed, hanged bool, err0 error) { dir, err := ioutil.TempDir("./", "syzkaller-testdir") if err != nil { err0 = fmt.Errorf("failed to create temp dir: %v", err) diff --git a/ipc/ipc_test.go b/ipc/ipc_test.go index 87a57d232..b87bf4d2a 100644 --- a/ipc/ipc_test.go +++ b/ipc/ipc_test.go @@ -73,7 +73,7 @@ func TestEmptyProg(t *testing.T) { defer env.Close() p := new(prog.Prog) - output, strace, failed, hanged, err := env.Exec(p) + output, strace, cov, failed, hanged, err := env.Exec(p) if err != nil { t.Fatalf("failed to run executor: %v", err) } @@ -83,6 +83,9 @@ func TestEmptyProg(t *testing.T) { if len(strace) != 0 { t.Fatalf("strace output when not stracing") } + if cov != nil { + t.Fatalf("haven't asked for coverage, but got it") + } if failed || hanged { t.Fatalf("empty program failed") } @@ -99,7 +102,7 @@ func TestStrace(t *testing.T) { defer env.Close() p := new(prog.Prog) - _, strace, failed, hanged, err := env.Exec(p) + _, strace, _, failed, hanged, err := env.Exec(p) if err != nil { t.Fatalf("failed to run executor: %v", err) } @@ -126,7 +129,7 @@ func TestExecute(t *testing.T) { for i := 0; i < iters/len(flags); i++ { p := prog.Generate(rs, 10, nil) - _, _, _, _, err := env.Exec(p) + _, _, _, _, _, err := env.Exec(p) if err != nil { t.Fatalf("failed to run executor: %v", err) } @@ -160,7 +163,7 @@ func TestCompare(t *testing.T) { rs, iters := initTest(t) for i := 0; i < iters; i++ { p := prog.Generate(rs, 10, nil) - _, strace1, _, _, err := env1.Exec(p) + _, strace1, _, _, _, err := env1.Exec(p) if err != nil { t.Fatalf("failed to run executor: %v", err) } @@ -175,7 +178,7 @@ func TestCompare(t *testing.T) { } defer env2.Close() // yes, that's defer in a loop - _, strace2, _, _, err := env2.Exec(nil) + _, strace2, _, _, _, err := env2.Exec(nil) if err != nil { t.Fatalf("failed to run c binary: %v", err) } |
