Skip to content

Commit

Permalink
joni: initial integration (#10680)
Browse files Browse the repository at this point in the history
Signed-off-by: David Korczynski <david@adalogics.com>
  • Loading branch information
DavidKorczynski authored Jul 13, 2023
1 parent ff9bb81 commit 7d2cdaf
Show file tree
Hide file tree
Showing 5 changed files with 176 additions and 0 deletions.
35 changes: 35 additions & 0 deletions projects/joni/AddrListFixFuzzer.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
///////////////////////////////////////////////////////////////////////////
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
import org.joni.Regex;
import org.joni.Syntax;
import org.joni.UnsetAddrList;
import org.joni.exception.SyntaxException;

// Generated with https://github.com/ossf/fuzz-introspector/tree/main/tools/auto-fuzz
// Minor modifications to beautify code and ensure exception is caught.
// jvm-autofuzz-heuristics-2
// Heuristic name: jvm-autofuzz-heuristics-2
// Target method: [org.joni.UnsetAddrList] public void fix(org.joni.Regex)
public class AddrListFixFuzzer {
public static void fuzzerTestOneInput(FuzzedDataProvider data) {
UnsetAddrList obj = new UnsetAddrList(data.consumeInt(0, 1000));
try {
obj.fix(new Regex(data.consumeRemainingAsString()));
} catch (SyntaxException e) {
}
}
}
24 changes: 24 additions & 0 deletions projects/joni/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
# Copyright 2023 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
##########################################################################
FROM gcr.io/oss-fuzz-base/base-builder-jvm
RUN curl -L https://archive.apache.org/dist/maven/maven-3/3.6.3/binaries/apache-maven-3.6.3-bin.zip \
-o maven.zip && \
unzip maven.zip -d $SRC/maven && \
rm maven.zip
ENV MVN $SRC/maven/apache-maven-3.6.3/bin/mvn
RUN git clone --depth 1 https://github.com/jruby/joni joni
COPY *.sh *.java $SRC/
WORKDIR $SRC/joni
37 changes: 37 additions & 0 deletions projects/joni/RegexMatcherFuzzer.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
///////////////////////////////////////////////////////////////////////////
import com.code_intelligence.jazzer.api.FuzzedDataProvider;
import org.joni.Matcher;
import org.joni.Regex;
import org.joni.Syntax;
import org.joni.exception.SyntaxException;

// Generated with https://github.com/ossf/fuzz-introspector/tree/main/tools/auto-fuzz
// Minor modifications to beautify code and ensure exception is caught.
// jvm-autofuzz-heuristics-2
// Heuristic name: jvm-autofuzz-heuristics-2
// Target method: [org.joni.Regex] public org.joni.Matcher matcher(byte[],int,int)
public class RegexMatcherFuzzer {
public static void fuzzerTestOneInput(FuzzedDataProvider data) {
try {
Integer int1 = data.consumeInt();
Integer int2 = data.consumeInt();
Regex obj = new Regex(data.consumeString(data.remainingBytes() / 2));
obj.matcher(data.consumeRemainingAsBytes(), int1, int2);
} catch (SyntaxException e) {
}
}
}
69 changes: 69 additions & 0 deletions projects/joni/build.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
#!/bin/bash -eu
# Copyright 2023 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
##########################################################################

$MVN clean package -Dmaven.javadoc.skip=true -DskipTests=true -Dpmd.skip=true \
-Dencoding=UTF-8 -Dmaven.antrun.skip=true -Dcheckstyle.skip=true \
-Denforcer.fail=false dependency:copy-dependencies

JARFILE_LIST=
for JARFILE in $(find ./target -name *.jar)
do
cp $JARFILE $OUT/
JARFILE_LIST="$JARFILE_LIST$(basename $JARFILE) "
done

curr_dir=$PWD
rm -rf $OUT/jar_temp
mkdir $OUT/jar_temp
cd $OUT/jar_temp
for JARFILE in $JARFILE_LIST
do
jar -xf $OUT/$JARFILE
done
cd $curr_dir

BUILD_CLASSPATH=$JAZZER_API_PATH:$OUT/jar_temp
RUNTIME_CLASSPATH=\$this_dir/jar_temp:\$this_dir

for fuzzer in $(find $SRC -name '*Fuzzer.java')
do
fuzzer_basename=$(basename -s .java $fuzzer)
javac -cp $BUILD_CLASSPATH $fuzzer
cp $SRC/$fuzzer_basename.class $OUT/

# Create an execution wrapper that executes Jazzer with the correct arguments.
echo "#!/bin/bash
# LLVMFuzzerTestOneInput for fuzzer detection.
this_dir=\$(dirname "\$0")
if [[ "\$@" =~ (^| )-runs=[0-9]+($| ) ]]
then
mem_settings='-Xmx1900m:-Xss900k'
else
mem_settings='-Xmx2048m:-Xss1024k'
fi
LD_LIBRARY_PATH="$JVM_LD_LIBRARY_PATH":\$this_dir \
\$this_dir/jazzer_driver \
--agent_path=\$this_dir/jazzer_agent_deploy.jar \
--cp=$RUNTIME_CLASSPATH \
--target_class=$fuzzer_basename \
--jvm_args="\$mem_settings" \
\$@" > $OUT/$fuzzer_basename

chmod u+x $OUT/$fuzzer_basename
done
11 changes: 11 additions & 0 deletions projects/joni/project.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
homepage: https://github.com/jruby/joni
main_repo: https://github.com/jruby/joni
language: jvm
fuzzing_engines:
- libfuzzer
sanitizers:
- address
vendor_ccs:
- david@adalogics.com
- adam@adalogics.com
- arthur.chan@adalogics.com

0 comments on commit 7d2cdaf

Please sign in to comment.