| // Copyright 2022 Code Intelligence GmbH |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package com.example; |
| |
| import com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow; |
| import com.code_intelligence.jazzer.api.HookType; |
| import com.code_intelligence.jazzer.api.MethodHook; |
| import java.lang.invoke.MethodHandle; |
| import java.lang.reflect.Field; |
| import java.util.regex.Pattern; |
| |
| // This fuzzer verifies that: |
| // 1. a class referenced in a static initializer of a hook is still instrumented with the hook; |
| // 2. hooks that are not shipped in the Jazzer agent JAR can still instrument Java standard library |
| // classes. |
| public class HookDependenciesFuzzer { |
| public static void fuzzerTestOneInput(byte[] data) { |
| try { |
| Pattern.matches("foobar", "foobar"); |
| } catch (Throwable t) { |
| if (t instanceof FuzzerSecurityIssueLow) { |
| throw t; |
| } else { |
| // Unexpected exception, exit without producing a finding to let the test fail due to the |
| // missing Java reproducer. |
| // FIXME(fabian): This is hacky and will result in false positives as soon as we implement |
| // Java reproducers for fuzz target exits. Replace this with a more reliable signal. |
| t.printStackTrace(); |
| System.exit(1); |
| } |
| } |
| } |
| } |