wasm-mutate

Crates.iowasm-mutate
lib.rswasm-mutate
version
sourcesrc
created_at2022-01-05 14:58:43.706894
updated_at2024-12-02 22:48:38.016175
descriptionA WebAssembly test case mutator
homepage
repositoryhttps://github.com/bytecodealliance/wasm-tools/tree/main/crates/wasm-mutate
max_upload_size
id508421
Cargo.toml error:TOML parse error at line 18, column 1 | 18 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include`
size0
wasmtime-publish (github:bytecodealliance:wasmtime-publish)

documentation

README

wasm-mutate

A Bytecode Alliance project

wasm-mutate is a new tool for fuzzing Wasm compilers, runtimes, validators, and other Wasm-consuming programs.

Crates.io version Download docs.rs docs

Usage

Add wasm-mutate to your Cargo.toml:

$ cargo add wasm-mutate

You can also mutate a WebAssembly binary by using the cli tool:

wasm-tools mutate original.wasm --seed 0 -o out.wasm --preserve-semantics

Features

  • semantically equivalent transformations: wasm-mutate has the ability to only apply semantics-preserving changes to the input Wasm module. When it is used in this mode, the mutated Wasm computes identical results when given the same inputs as the original Wasm module.

  • determinism: wasm-mutate is deterministic, i.e., given the same input Wasm module and the same seed, it always produces the same mutated output Wasm module.

  • libfuzzer integration: wasm-mutate integrates well with mutation-based fuzzers like libFuzzer. It reuses the fuzzer's raw input strings. wasm-mutate works with the LLVMFuzzerCustomMutator hook and the libfuzzer_sys::fuzz_mutator! macro.

    Example

    #![no_main]
    
    use libfuzzer_sys::{fuzz_mutator, fuzz_target};
    use std::io::{BufRead, Read, Write};
    use wasmparser::WasmFeatures;
    
    fuzz_target!(|bytes: &[u8]| {
        // Initialize the Wasm for example
    });
    
    fuzz_mutator!(|data: &mut [u8], size: usize, max_size: usize, seed: u32| {
        // Generate a random Wasm module with `wasm-smith` as well as a RNG seed for
        let wasm = &data[..size];
        let features = WasmFeatures::default();
        let mut validator = wasmparser::Validator::new();
        validator.wasm_features(features);
        let validation_result = validator.validate_all(&wasm);
    
        // Mutate the data if its a valid Wasm file, otherwise, create a random one
        let wasm = if validation_result.is_ok() {
            wasm.to_vec()
        } else {
            let (w, _) = match wasm_tools_fuzz::generate_valid_module_from_seed(seed, |config, u| {
                config.exceptions_enabled = false;
                config.simd_enabled = false;
                config.reference_types_enabled = false;
                config.memory64_enabled = false;
                config.max_memories = 1;
                Ok(())
            }) {
                Ok(m) => m,
                Err(_) => {
                    return size;
                }
            };
            w
        };
    
        let mutated_wasm = wasm_mutate::WasmMutate::default()
            .seed(seed.into())
            .fuel(1000)
            .preserve_semantics(true)
            .run(&wasm);
    
        let mutated_wasm = match mutated_wasm {
            Ok(w) => w,
            Err(_) => wasm,
        };
    
        // The mutated Wasm should still be valid, since the input Wasm was valid.
        let newsize = mutated_wasm.len();
        data[..newsize].copy_from_slice(&mutated_wasm[..newsize]);
        newsize
    });
    
    
    
  • test case reduction (WIP): wasm-mutate can have the ability to restrict mutations to only those that shrink the size of the Wasm module. If it is used in this mode, wasm-mutate essentially becomes a Wasm test-case reducer. We are currently working to provide a prototype of this feature as a separate binary. The following pseudo-Rust provides the general picture of it as an standard hill-climbing algorithm.

      let wasmmutate = wasm_mutate::WasmMutate::default()
              .seed(seed)
              .fuel(1000)
              .preserve_semantics(true)
              .reduce(true);
    
      while MAX_ITERATIONS > 0 {
          let new_wasm = wasmmutate.run(&wasm);
          wasm = if check_equivalence(new_wasm, wasm) {
            wasm
          } else{
            panic!("No valid transformations")
          }
          MAX_ITERATIONS -= 1;
      }
    
      return wasm
    
    

License

This project is licensed under the Apache 2.0 license with the LLVM exception. See LICENSE for more details.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in this project by you, as defined in the Apache-2.0 license, shall be licensed as above, without any additional terms or conditions.

Special contribution

  • Javier Cabrera Arteaga (Phd. student at KTH)
Commit count: 2830

cargo fmt