summaryrefslogtreecommitdiff
path: root/src/third_party/re2/dist/re2/fuzzing/re2_fuzzer.cc
diff options
context:
space:
mode:
Diffstat (limited to 'src/third_party/re2/dist/re2/fuzzing/re2_fuzzer.cc')
-rw-r--r--src/third_party/re2/dist/re2/fuzzing/re2_fuzzer.cc176
1 files changed, 176 insertions, 0 deletions
diff --git a/src/third_party/re2/dist/re2/fuzzing/re2_fuzzer.cc b/src/third_party/re2/dist/re2/fuzzing/re2_fuzzer.cc
new file mode 100644
index 00000000000..af1129f2369
--- /dev/null
+++ b/src/third_party/re2/dist/re2/fuzzing/re2_fuzzer.cc
@@ -0,0 +1,176 @@
+// Copyright 2016 The RE2 Authors. All Rights Reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+#include <fuzzer/FuzzedDataProvider.h>
+#include <stddef.h>
+#include <stdint.h>
+#include <memory>
+#include <queue>
+#include <string>
+#include <vector>
+
+#include "re2/prefilter.h"
+#include "re2/re2.h"
+#include "re2/regexp.h"
+
+using re2::StringPiece;
+
+// NOT static, NOT signed.
+uint8_t dummy = 0;
+
+void TestOneInput(StringPiece pattern, const RE2::Options& options,
+ StringPiece text) {
+ // Crudely limit the use of ., \p, \P, \d, \D, \s, \S, \w and \W.
+ // Otherwise, we will waste time on inputs that have long runs of various
+ // character classes. The fuzzer has shown itself to be easily capable of
+ // generating such patterns that fall within the other limits, but result
+ // in timeouts nonetheless. The marginal cost is high - even more so when
+ // counted repetition is involved - whereas the marginal benefit is zero.
+ // TODO(junyer): Handle [:isalnum:] et al. when they start to cause pain.
+ int char_class = 0;
+ int backslash_p = 0; // very expensive, so handle specially
+ for (size_t i = 0; i < pattern.size(); i++) {
+ if (pattern[i] == '.')
+ char_class++;
+ if (pattern[i] != '\\')
+ continue;
+ i++;
+ if (i >= pattern.size())
+ break;
+ if (pattern[i] == 'p' || pattern[i] == 'P' ||
+ pattern[i] == 'd' || pattern[i] == 'D' ||
+ pattern[i] == 's' || pattern[i] == 'S' ||
+ pattern[i] == 'w' || pattern[i] == 'W')
+ char_class++;
+ if (pattern[i] == 'p' || pattern[i] == 'P')
+ backslash_p++;
+ }
+ if (char_class > 9)
+ return;
+ if (backslash_p > 1)
+ return;
+
+ // The default is 1000. Even 100 turned out to be too generous
+ // for fuzzing, empirically speaking, so let's try 10 instead.
+ re2::Regexp::FUZZING_ONLY_set_maximum_repeat_count(10);
+
+ RE2 re(pattern, options);
+ if (!re.ok())
+ return;
+
+ // Don't waste time fuzzing programs with large substrings.
+ // They can cause bug reports due to fuzzer timeouts when they
+ // are repetitions (e.g. hundreds of NUL bytes) and matching is
+ // unanchored. And they aren't interesting for fuzzing purposes.
+ std::unique_ptr<re2::Prefilter> prefilter(re2::Prefilter::FromRE2(&re));
+ if (prefilter == nullptr)
+ return;
+ std::queue<re2::Prefilter*> nodes;
+ nodes.push(prefilter.get());
+ while (!nodes.empty()) {
+ re2::Prefilter* node = nodes.front();
+ nodes.pop();
+ if (node->op() == re2::Prefilter::ATOM) {
+ if (node->atom().size() > 9)
+ return;
+ } else if (node->op() == re2::Prefilter::AND ||
+ node->op() == re2::Prefilter::OR) {
+ for (re2::Prefilter* sub : *node->subs())
+ nodes.push(sub);
+ }
+ }
+
+ // Don't waste time fuzzing high-size programs.
+ // They can cause bug reports due to fuzzer timeouts.
+ int size = re.ProgramSize();
+ if (size > 9999)
+ return;
+ int rsize = re.ReverseProgramSize();
+ if (rsize > 9999)
+ return;
+
+ // Don't waste time fuzzing high-fanout programs.
+ // They can cause bug reports due to fuzzer timeouts.
+ std::vector<int> histogram;
+ int fanout = re.ProgramFanout(&histogram);
+ if (fanout > 9)
+ return;
+ int rfanout = re.ReverseProgramFanout(&histogram);
+ if (rfanout > 9)
+ return;
+
+ if (re.NumberOfCapturingGroups() == 0) {
+ // Avoid early return due to too many arguments.
+ StringPiece sp = text;
+ RE2::FullMatch(sp, re);
+ RE2::PartialMatch(sp, re);
+ RE2::Consume(&sp, re);
+ sp = text; // Reset.
+ RE2::FindAndConsume(&sp, re);
+ } else {
+ // Okay, we have at least one capturing group...
+ // Try conversion for variously typed arguments.
+ StringPiece sp = text;
+ short s;
+ RE2::FullMatch(sp, re, &s);
+ long l;
+ RE2::PartialMatch(sp, re, &l);
+ float f;
+ RE2::Consume(&sp, re, &f);
+ sp = text; // Reset.
+ double d;
+ RE2::FindAndConsume(&sp, re, &d);
+ }
+
+ std::string s = std::string(text);
+ RE2::Replace(&s, re, "");
+ s = std::string(text); // Reset.
+ RE2::GlobalReplace(&s, re, "");
+
+ std::string min, max;
+ re.PossibleMatchRange(&min, &max, /*maxlen=*/9);
+
+ // Exercise some other API functionality.
+ dummy += re.NamedCapturingGroups().size();
+ dummy += re.CapturingGroupNames().size();
+ dummy += RE2::QuoteMeta(pattern).size();
+}
+
+// Entry point for libFuzzer.
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
+ // An input larger than 4 KiB probably isn't interesting. (This limit
+ // allows for fdp.ConsumeRandomLengthString()'s backslash behaviour.)
+ if (size == 0 || size > 4096)
+ return 0;
+
+ FuzzedDataProvider fdp(data, size);
+
+ // The convention here is that fdp.ConsumeBool() returning false sets
+ // the default value whereas returning true sets the alternate value:
+ // most options default to false and so can be set directly; encoding
+ // defaults to UTF-8; case_sensitive defaults to true. We do NOT want
+ // to log errors. max_mem is 64 MiB because we can afford to use more
+ // RAM in exchange for (hopefully) faster fuzzing.
+ RE2::Options options;
+ options.set_encoding(fdp.ConsumeBool() ? RE2::Options::EncodingLatin1
+ : RE2::Options::EncodingUTF8);
+ options.set_posix_syntax(fdp.ConsumeBool());
+ options.set_longest_match(fdp.ConsumeBool());
+ options.set_log_errors(false);
+ options.set_max_mem(64 << 20);
+ options.set_literal(fdp.ConsumeBool());
+ options.set_never_nl(fdp.ConsumeBool());
+ options.set_dot_nl(fdp.ConsumeBool());
+ options.set_never_capture(fdp.ConsumeBool());
+ options.set_case_sensitive(!fdp.ConsumeBool());
+ options.set_perl_classes(fdp.ConsumeBool());
+ options.set_word_boundary(fdp.ConsumeBool());
+ options.set_one_line(fdp.ConsumeBool());
+
+ std::string pattern = fdp.ConsumeRandomLengthString(999);
+ std::string text = fdp.ConsumeRandomLengthString(999);
+
+ TestOneInput(pattern, options, text);
+ return 0;
+}