From e899ffb2db3e51d01785a8143c18420d1a37369b Mon Sep 17 00:00:00 2001 From: "Patrice.S" Date: Tue, 13 Sep 2022 18:43:46 +0200 Subject: [PATCH] jimfs: initial integration (#8483) --- projects/jimfs/Dockerfile | 29 +++++++++++ projects/jimfs/FileSystemFuzzer.java | 76 ++++++++++++++++++++++++++++ projects/jimfs/build.sh | 49 ++++++++++++++++++ projects/jimfs/project.yaml | 15 ++++++ 4 files changed, 169 insertions(+) create mode 100644 projects/jimfs/Dockerfile create mode 100644 projects/jimfs/FileSystemFuzzer.java create mode 100755 projects/jimfs/build.sh create mode 100644 projects/jimfs/project.yaml diff --git a/projects/jimfs/Dockerfile b/projects/jimfs/Dockerfile new file mode 100644 index 000000000..ddba90fe8 --- /dev/null +++ b/projects/jimfs/Dockerfile @@ -0,0 +1,29 @@ +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +FROM gcr.io/oss-fuzz-base/base-builder-jvm + +RUN curl -L https://downloads.apache.org/maven/maven-3/3.6.3/binaries/apache-maven-3.6.3-bin.zip -o maven.zip && \ + unzip maven.zip -d $SRC/maven && \ + rm -rf maven.zip + +ENV MVN $SRC/maven/apache-maven-3.6.3/bin/mvn + +RUN git clone --depth 1 https://github.com/google/jimfs + +COPY build.sh $SRC/ +COPY *Fuzzer.java $SRC/ +WORKDIR $SRC/jimfs \ No newline at end of file diff --git a/projects/jimfs/FileSystemFuzzer.java b/projects/jimfs/FileSystemFuzzer.java new file mode 100644 index 000000000..4b5c74040 --- /dev/null +++ b/projects/jimfs/FileSystemFuzzer.java @@ -0,0 +1,76 @@ +// Copyright 2022 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. +// +//////////////////////////////////////////////////////////////////////////////// + +import com.code_intelligence.jazzer.api.FuzzedDataProvider; +import com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow; +import com.google.common.collect.ImmutableList; +import com.google.common.jimfs.Configuration; +import com.google.common.jimfs.Jimfs; + +import java.io.IOException; +import java.nio.charset.StandardCharsets; +import java.nio.file.FileSystem; +import java.nio.file.Files; +import java.nio.file.InvalidPathException; +import java.nio.file.Path; + +import static com.google.common.jimfs.PathNormalization.CASE_FOLD_UNICODE; +import static com.google.common.jimfs.PathNormalization.NFD; + +public class FileSystemFuzzer { + public static void fuzzerTestOneInput(FuzzedDataProvider data) { + Configuration.Builder configBuilder; + if (data.consumeBoolean()) { + configBuilder = Configuration.unix().toBuilder(); + } else { + configBuilder = Configuration.windows().toBuilder(); + } + + FileSystem fs; + try { + fs = Jimfs.newFileSystem(configBuilder + .setNameCanonicalNormalization(NFD, CASE_FOLD_UNICODE) + .setBlockSize(data.consumeInt(1, 1000)) + .setMaxSize(data.consumeLong(1, 100000)) + .setRoots(data.consumeString(50)) + .setWorkingDirectory("/" + data.consumeString(50)) + .setMaxCacheSize(data.consumeLong(1, 100000)) + .setPathEqualityUsesCanonicalForm(data.consumeBoolean()) + .build() + ); + } catch (java.lang.IllegalArgumentException e) { + return; + } + + Path foo; + try { + foo = fs.getPath(data.consumeString(50)); + } catch (InvalidPathException e) { + return; + } + + String content = data.consumeRemainingAsString(); + try { + Files.createDirectory(foo); + Path dummyFile = foo.resolve("dummy.txt"); + Files.write(dummyFile, ImmutableList.of(content), StandardCharsets.UTF_8); + String fileContent = Files.readString(dummyFile); + if (!fileContent.contains(content)) { + throw new FuzzerSecurityIssueLow("Content not entirely written to file"); + } + } catch (IOException ignored) {} + } +} diff --git a/projects/jimfs/build.sh b/projects/jimfs/build.sh new file mode 100755 index 000000000..ad5250325 --- /dev/null +++ b/projects/jimfs/build.sh @@ -0,0 +1,49 @@ +#!/bin/bash -eu +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +MAVEN_ARGS="-Djavac.src.version=15 -Djavac.target.version=15 -DskipTests" +$MVN package $MAVEN_ARGS org.apache.maven.plugins:maven-shade-plugin:3.2.4:shade +CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \ + -Dexpression=project.version -q -DforceStdout) +cp "jimfs/target/jimfs-$CURRENT_VERSION.jar" "$OUT/jimfs.jar" + +ALL_JARS="jimfs.jar" + +# The classpath at build-time includes the project jars in $OUT as well as the +# Jazzer API. +BUILD_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "$OUT/%s:"):$JAZZER_API_PATH + +# All .jar and .class files lie in the same directory as the fuzzer at runtime. +RUNTIME_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "\$this_dir/%s:"):\$this_dir + +for fuzzer in $(find $SRC -name '*Fuzzer.java'); do + fuzzer_basename=$(basename -s .java $fuzzer) + javac -cp $BUILD_CLASSPATH $fuzzer + cp $SRC/$fuzzer_basename.class $OUT/ + + # Create an execution wrapper that executes Jazzer with the correct arguments. + echo "#!/bin/sh +# LLVMFuzzerTestOneInput for fuzzer detection. +this_dir=\$(dirname \"\$0\") +LD_LIBRARY_PATH=\"$JVM_LD_LIBRARY_PATH\":\$this_dir \ +\$this_dir/jazzer_driver --agent_path=\$this_dir/jazzer_agent_deploy.jar \ +--cp=$RUNTIME_CLASSPATH \ +--target_class=$fuzzer_basename \ +--jvm_args=\"-Xmx2048m\" \ +\$@" > $OUT/$fuzzer_basename + chmod u+x $OUT/$fuzzer_basename +done \ No newline at end of file diff --git a/projects/jimfs/project.yaml b/projects/jimfs/project.yaml new file mode 100644 index 000000000..7f9e6ed32 --- /dev/null +++ b/projects/jimfs/project.yaml @@ -0,0 +1,15 @@ +homepage: "https://github.com/google/jimfs" +language: jvm +main_repo: "git@github.com:google/jimfs.git" +primary_contact: "cgdecker@google.com" +fuzzing_engines: + - libfuzzer +sanitizers: + - address +vendor_ccs: + - "wagner@code-intelligence.com" + - "yakdan@code-intelligence.com" + - "glendowne@code-intelligence.com" + - "patrice.salathe@code-intelligence.com" + - "hlin@code-intelligence.com" + - "jacek.trossen@code-intelligence.com" \ No newline at end of file