mirror of
https://github.com/darlinghq/darling-JavaScriptCore.git
synced 2024-11-26 21:50:53 +00:00
119 lines
5.7 KiB
C++
119 lines
5.7 KiB
C++
/*
|
|
* Copyright (C) 2019 Apple Inc. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY
|
|
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
|
|
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
|
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
|
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "config.h"
|
|
#include "FileBasedFuzzerAgent.h"
|
|
|
|
#include "CodeBlock.h"
|
|
#include "FuzzerPredictions.h"
|
|
#include "JSCellInlines.h"
|
|
#include <wtf/AnsiColors.h>
|
|
|
|
namespace JSC {
|
|
|
|
FileBasedFuzzerAgent::FileBasedFuzzerAgent(VM& vm)
|
|
: FileBasedFuzzerAgentBase(vm)
|
|
{
|
|
}
|
|
|
|
SpeculatedType FileBasedFuzzerAgent::getPredictionInternal(CodeBlock* codeBlock, PredictionTarget& target, SpeculatedType original)
|
|
{
|
|
FuzzerPredictions& fuzzerPredictions = ensureGlobalFuzzerPredictions();
|
|
Optional<SpeculatedType> generated = fuzzerPredictions.predictionFor(target.lookupKey);
|
|
|
|
SourceProvider* provider = codeBlock->source().provider();
|
|
auto sourceUpToDivot = provider->source().substring(target.divot - target.startOffset, target.startOffset);
|
|
auto sourceAfterDivot = provider->source().substring(target.divot, target.endOffset);
|
|
|
|
switch (target.opcodeId) {
|
|
// FIXME: these can not be targeted at all due to the bugs below
|
|
case op_to_this: // broken https://bugs.webkit.org/show_bug.cgi?id=203555
|
|
case op_get_argument: // broken https://bugs.webkit.org/show_bug.cgi?id=203554
|
|
return original;
|
|
|
|
// FIXME: the output of codeBlock->expressionRangeForBytecodeIndex() allows for some of
|
|
// these opcodes to have predictions, but not all instances can be reliably targeted.
|
|
case op_bitand: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203604
|
|
case op_bitor: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203604
|
|
case op_bitxor: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203604
|
|
case op_bitnot: // partially broken
|
|
case op_get_from_scope: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203603
|
|
case op_get_from_arguments: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203608
|
|
case op_get_by_val: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203665
|
|
case op_rshift: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203664
|
|
case op_lshift: // partially broken https://bugs.webkit.org/show_bug.cgi?id=203664
|
|
case op_to_number: // partially broken
|
|
case op_get_by_id: // sometimes occurs implicitly for things related to Symbol.iterator
|
|
if (!generated)
|
|
return original;
|
|
break;
|
|
|
|
case op_call: // op_call appears implicitly in for-of loops, generators, spread/rest elements, destructuring assignment
|
|
if (!generated) {
|
|
if (sourceAfterDivot.containsIgnoringASCIICase("of "))
|
|
return original;
|
|
if (sourceAfterDivot.containsIgnoringASCIICase("..."))
|
|
return original;
|
|
if (sourceAfterDivot.containsIgnoringASCIICase("yield"))
|
|
return original;
|
|
if (sourceAfterDivot.startsWith('[') && sourceAfterDivot.endsWith("]"))
|
|
return original;
|
|
if (sourceUpToDivot.containsIgnoringASCIICase("yield"))
|
|
return original;
|
|
if (sourceUpToDivot == "...")
|
|
return original;
|
|
if (!target.startOffset && !target.endOffset)
|
|
return original;
|
|
}
|
|
break;
|
|
|
|
case op_get_by_val_with_this:
|
|
case op_get_direct_pname:
|
|
case op_construct:
|
|
case op_construct_varargs:
|
|
case op_call_varargs:
|
|
case op_call_eval:
|
|
case op_tail_call:
|
|
case op_tail_call_varargs:
|
|
case op_get_by_id_with_this:
|
|
break;
|
|
|
|
default:
|
|
RELEASE_ASSERT_NOT_REACHED_WITH_MESSAGE("Unhandled opcode %s", opcodeNames[target.opcodeId]);
|
|
}
|
|
if (!generated) {
|
|
if (Options::dumpFuzzerAgentPredictions())
|
|
dataLogLn(MAGENTA(BOLD(target.bytecodeIndex)), " ", BOLD(YELLOW(target.opcodeId)), " missing prediction for: ", RED(BOLD(target.lookupKey)), " ", GREEN(target.sourceFilename), ":", CYAN(target.line), ":", CYAN(target.column), " divot: ", target.divot, " -", target.startOffset, " +", target.endOffset, " name: '", YELLOW(codeBlock->inferredName()), "' source: '", BLUE(sourceUpToDivot), BLUE(BOLD(sourceAfterDivot)), "'");
|
|
|
|
RELEASE_ASSERT_WITH_MESSAGE(!Options::requirePredictionForFileBasedFuzzerAgent(), "Missing expected prediction in FuzzerAgent");
|
|
return original;
|
|
}
|
|
if (Options::dumpFuzzerAgentPredictions())
|
|
dataLogLn(YELLOW(target.opcodeId), " ", CYAN(target.lookupKey), " original: ", CYAN(BOLD(SpeculationDump(original))), " generated: ", MAGENTA(BOLD(SpeculationDump(*generated))));
|
|
return *generated;
|
|
}
|
|
|
|
} // namespace JSC
|