// Copyright 2016 the V8 project authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "test/fuzzer/wasm-fuzzer-common.h" #include #include "include/v8.h" #include "src/execution/isolate.h" #include "src/objects/objects-inl.h" #include "src/utils/ostreams.h" #include "src/wasm/wasm-engine.h" #include "src/wasm/wasm-feature-flags.h" #include "src/wasm/wasm-module-builder.h" #include "src/wasm/wasm-module.h" #include "src/wasm/wasm-objects-inl.h" #include "src/zone/accounting-allocator.h" #include "src/zone/zone.h" #include "test/common/wasm/flag-utils.h" #include "test/common/wasm/wasm-module-runner.h" #include "test/fuzzer/fuzzer-support.h" namespace v8 { namespace internal { namespace wasm { namespace fuzzer { void InterpretAndExecuteModule(i::Isolate* isolate, Handle module_object) { // We do not instantiate the module if there is a start function, because a // start function can contain an infinite loop which we cannot handle. if (module_object->module()->start_function_index >= 0) return; HandleScope handle_scope(isolate); // Avoid leaking handles. Handle instance; // Try to instantiate, return if it fails. { ErrorThrower thrower(isolate, "WebAssembly Instantiation"); if (!isolate->wasm_engine() ->SyncInstantiate(isolate, &thrower, module_object, {}, {}) // no imports & memory .ToHandle(&instance)) { isolate->clear_pending_exception(); thrower.Reset(); // Ignore errors. return; } } // Get the "main" exported function. Do nothing if it does not exist. Handle main_function; if (!testing::GetExportedFunction(isolate, instance, "main") .ToHandle(&main_function)) { return; } OwnedVector arguments = testing::MakeDefaultInterpreterArguments(isolate, main_function->sig()); // Now interpret. testing::WasmInterpretationResult interpreter_result = testing::InterpretWasmModule(isolate, instance, main_function->function_index(), arguments.begin()); if (interpreter_result.failed()) return; // The WebAssembly spec allows the sign bit of NaN to be non-deterministic. // This sign bit can make the difference between an infinite loop and // terminating code. With possible non-determinism we cannot guarantee that // the generated code will not go into an infinite loop and cause a timeout in // Clusterfuzz. Therefore we do not execute the generated code if the result // may be non-deterministic. if (interpreter_result.possible_nondeterminism()) return; // Try to instantiate and execute the module_object. { ErrorThrower thrower(isolate, "Second Instantiation"); // We instantiated before, so the second instantiation must also succeed: CHECK(isolate->wasm_engine() ->SyncInstantiate(isolate, &thrower, module_object, {}, {}) // no imports & memory .ToHandle(&instance)); } OwnedVector> compiled_args = testing::MakeDefaultArguments(isolate, main_function->sig()); bool exception = false; int32_t result_compiled = testing::CallWasmFunctionForTesting( isolate, instance, "main", static_cast(compiled_args.size()), compiled_args.begin(), &exception); if (interpreter_result.trapped() != exception) { const char* exception_text[] = {"no exception", "exception"}; FATAL("interpreter: %s; compiled: %s", exception_text[interpreter_result.trapped()], exception_text[exception]); } if (interpreter_result.finished()) { CHECK_EQ(interpreter_result.result(), result_compiled); } } namespace { struct PrintSig { const size_t num; const std::function getter; }; PrintSig PrintParameters(const FunctionSig* sig) { return {sig->parameter_count(), [=](size_t i) { return sig->GetParam(i); }}; } PrintSig PrintReturns(const FunctionSig* sig) { return {sig->return_count(), [=](size_t i) { return sig->GetReturn(i); }}; } const char* ValueTypeToConstantName(ValueType type) { switch (type.kind()) { case ValueType::kI32: return "kWasmI32"; case ValueType::kI64: return "kWasmI64"; case ValueType::kF32: return "kWasmF32"; case ValueType::kF64: return "kWasmF64"; case ValueType::kS128: return "kWasmS128"; case ValueType::kOptRef: switch (type.heap_representation()) { case HeapType::kExtern: return "kWasmExternRef"; case HeapType::kFunc: return "kWasmFuncRef"; case HeapType::kExn: return "kWasmExnRef"; default: UNREACHABLE(); } default: UNREACHABLE(); } } std::ostream& operator<<(std::ostream& os, const PrintSig& print) { os << "["; for (size_t i = 0; i < print.num; ++i) { os << (i == 0 ? "" : ", ") << ValueTypeToConstantName(print.getter(i)); } return os << "]"; } struct PrintName { WasmName name; PrintName(ModuleWireBytes wire_bytes, WireBytesRef ref) : name(wire_bytes.GetNameOrNull(ref)) {} }; std::ostream& operator<<(std::ostream& os, const PrintName& name) { return os.write(name.name.begin(), name.name.size()); } } // namespace void GenerateTestCase(Isolate* isolate, ModuleWireBytes wire_bytes, bool compiles) { constexpr bool kVerifyFunctions = false; auto enabled_features = i::wasm::WasmFeatures::FromIsolate(isolate); ModuleResult module_res = DecodeWasmModule( enabled_features, wire_bytes.start(), wire_bytes.end(), kVerifyFunctions, ModuleOrigin::kWasmOrigin, isolate->counters(), isolate->metrics_recorder(), v8::metrics::Recorder::ContextId::Empty(), DecodingMethod::kSync, isolate->wasm_engine()->allocator()); CHECK(module_res.ok()); WasmModule* module = module_res.value().get(); CHECK_NOT_NULL(module); StdoutStream os; tzset(); time_t current_time = time(nullptr); struct tm current_localtime; #ifdef V8_OS_WIN localtime_s(¤t_localtime, ¤t_time); #else localtime_r(¤t_time, ¤t_localtime); #endif int year = 1900 + current_localtime.tm_year; os << "// Copyright " << year << " the V8 project authors. All rights reserved.\n" "// Use of this source code is governed by a BSD-style license that " "can be\n" "// found in the LICENSE file.\n" "\n" "// Flags: --wasm-staging\n" "\n" "load('test/mjsunit/wasm/wasm-module-builder.js');\n" "\n" "const builder = new WasmModuleBuilder();\n"; if (module->has_memory) { os << "builder.addMemory(" << module->initial_pages; if (module->has_maximum_pages) { os << ", " << module->maximum_pages; } else { os << ", undefined"; } os << ", " << (module->mem_export ? "true" : "false"); if (module->has_shared_memory) { os << ", true"; } os << ");\n"; } for (WasmGlobal& glob : module->globals) { os << "builder.addGlobal(" << ValueTypeToConstantName(glob.type) << ", " << glob.mutability << ");\n"; } // TODO(7748): Support array/struct types. #if DEBUG for (uint8_t kind : module->type_kinds) { DCHECK_EQ(kWasmFunctionTypeCode, kind); } #endif for (TypeDefinition type : module->types) { const FunctionSig* sig = type.function_sig; os << "builder.addType(makeSig(" << PrintParameters(sig) << ", " << PrintReturns(sig) << "));\n"; } Zone tmp_zone(isolate->allocator(), ZONE_NAME); // There currently cannot be more than one table. DCHECK_GE(1, module->tables.size()); for (const WasmTable& table : module->tables) { os << "builder.setTableBounds(" << table.initial_size << ", "; if (table.has_maximum_size) { os << table.maximum_size << ");\n"; } else { os << "undefined);\n"; } } for (const WasmElemSegment& elem_segment : module->elem_segments) { os << "builder.addElementSegment("; os << elem_segment.table_index << ", "; switch (elem_segment.offset.kind()) { case WasmInitExpr::kGlobalGet: os << elem_segment.offset.immediate().index << ", true"; break; case WasmInitExpr::kI32Const: os << elem_segment.offset.immediate().i32_const << ", false"; break; default: UNREACHABLE(); } os << ", " << PrintCollection(elem_segment.entries) << ");\n"; } for (const WasmFunction& func : module->functions) { Vector func_code = wire_bytes.GetFunctionBytes(&func); os << "// Generate function " << (func.func_index + 1) << " (out of " << module->functions.size() << ").\n"; // Add function. os << "builder.addFunction(undefined, " << func.sig_index << " /* sig */)\n"; // Add locals. BodyLocalDecls decls(&tmp_zone); DecodeLocalDecls(enabled_features, &decls, func_code.begin(), func_code.end()); if (!decls.type_list.empty()) { os << " "; for (size_t pos = 0, count = 1, locals = decls.type_list.size(); pos < locals; pos += count, count = 1) { ValueType type = decls.type_list[pos]; while (pos + count < locals && decls.type_list[pos + count] == type) { ++count; } os << ".addLocals(" << ValueTypeToConstantName(type) << ", " << count << ")"; } os << "\n"; } // Add body. os << " .addBodyWithEnd([\n"; FunctionBody func_body(func.sig, func.code.offset(), func_code.begin(), func_code.end()); PrintRawWasmCode(isolate->allocator(), func_body, module, kOmitLocals); os << "]);\n"; } for (WasmExport& exp : module->export_table) { if (exp.kind != kExternalFunction) continue; os << "builder.addExport('" << PrintName(wire_bytes, exp.name) << "', " << exp.index << ");\n"; } if (compiles) { os << "const instance = builder.instantiate();\n" "print(instance.exports.main(1, 2, 3));\n"; } else { os << "assertThrows(function() { builder.instantiate(); }, " "WebAssembly.CompileError);\n"; } } void OneTimeEnableStagedWasmFeatures() { struct EnableStagedWasmFeatures { EnableStagedWasmFeatures() { #define ENABLE_STAGED_FEATURES(feat, desc, val) \ FLAG_experimental_wasm_##feat = true; FOREACH_WASM_STAGING_FEATURE_FLAG(ENABLE_STAGED_FEATURES) #undef ENABLE_STAGED_FEATURES } }; // The compiler will properly synchronize the constructor call. static EnableStagedWasmFeatures one_time_enable_staged_features; } void WasmExecutionFuzzer::FuzzWasmModule(Vector data, bool require_valid) { // We explicitly enable staged WebAssembly features here to increase fuzzer // coverage. For libfuzzer fuzzers it is not possible that the fuzzer enables // the flag by itself. OneTimeEnableStagedWasmFeatures(); // Strictly enforce the input size limit. Note that setting "max_len" on the // fuzzer target is not enough, since different fuzzers are used and not all // respect that limit. if (data.size() > max_input_size()) return; v8_fuzzer::FuzzerSupport* support = v8_fuzzer::FuzzerSupport::Get(); v8::Isolate* isolate = support->GetIsolate(); i::Isolate* i_isolate = reinterpret_cast(isolate); // Clear any pending exceptions from a prior run. i_isolate->clear_pending_exception(); v8::Isolate::Scope isolate_scope(isolate); v8::HandleScope handle_scope(isolate); v8::Context::Scope context_scope(support->GetContext()); v8::TryCatch try_catch(isolate); HandleScope scope(i_isolate); AccountingAllocator allocator; Zone zone(&allocator, ZONE_NAME); ZoneBuffer buffer(&zone); int32_t num_args = 0; std::unique_ptr interpreter_args; std::unique_ptr[]> compiler_args; // The first byte builds the bitmask to control which function will be // compiled with Turbofan and which one with Liftoff. uint8_t tier_mask = data.empty() ? 0 : data[0]; if (!data.empty()) data += 1; if (!GenerateModule(i_isolate, &zone, data, &buffer, &num_args, &interpreter_args, &compiler_args)) { return; } testing::SetupIsolateForWasmModule(i_isolate); ErrorThrower interpreter_thrower(i_isolate, "Interpreter"); ModuleWireBytes wire_bytes(buffer.begin(), buffer.end()); auto enabled_features = i::wasm::WasmFeatures::FromIsolate(i_isolate); MaybeHandle compiled_module; { // Explicitly enable Liftoff, disable tiering and set the tier_mask. This // way, we deterministically test a combination of Liftoff and Turbofan. FlagScope liftoff(&FLAG_liftoff, true); FlagScope no_tier_up(&FLAG_wasm_tier_up, false); FlagScope tier_mask_scope(&FLAG_wasm_tier_mask_for_testing, tier_mask); compiled_module = i_isolate->wasm_engine()->SyncCompile( i_isolate, enabled_features, &interpreter_thrower, wire_bytes); } bool compiles = !compiled_module.is_null(); if (FLAG_wasm_fuzzer_gen_test) { GenerateTestCase(i_isolate, wire_bytes, compiles); } bool validates = i_isolate->wasm_engine()->SyncValidate( i_isolate, enabled_features, wire_bytes); CHECK_EQ(compiles, validates); CHECK_IMPLIES(require_valid, validates); if (!compiles) return; InterpretAndExecuteModule(i_isolate, compiled_module.ToHandleChecked()); } } // namespace fuzzer } // namespace wasm } // namespace internal } // namespace v8