aboutsummaryrefslogtreecommitdiff
path: root/src/jmh/java/com/code_intelligence/jazzer/instrumentor/UnsafeCoverageMap.java
diff options
context:
space:
mode:
authorMark <mteffeteller@google.com>2023-06-21 23:30:18 +0000
committerAutomerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>2023-06-21 23:30:18 +0000
commit54819157eaa66e14f2c68b54609bd6bfa360b708 (patch)
tree68cf332a40b94b2d28b256b19b916f99220bb0c4 /src/jmh/java/com/code_intelligence/jazzer/instrumentor/UnsafeCoverageMap.java
parentba37c2e361c2ba91bacc47fcae5383c52e50f6be (diff)
parente73be1680dae58cb83d869104def1c59102d59b2 (diff)
downloadjazzer-api-54819157eaa66e14f2c68b54609bd6bfa360b708.tar.gz
Sync jazzer in AOSP with upstream repo (new SHA: 30decf81a147c66fa5a098072c38ab6924ba0aa6) am: 9350e0ab03 am: 99d9a79746 am: 34a8e5c8aa am: e73be1680d
Original change: https://android-review.googlesource.com/c/platform/external/jazzer-api/+/2627336 Change-Id: I1b97ed5cdcf2adda4d443148cc0d447974e51785 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
Diffstat (limited to 'src/jmh/java/com/code_intelligence/jazzer/instrumentor/UnsafeCoverageMap.java')
-rw-r--r--src/jmh/java/com/code_intelligence/jazzer/instrumentor/UnsafeCoverageMap.java59
1 files changed, 59 insertions, 0 deletions
diff --git a/src/jmh/java/com/code_intelligence/jazzer/instrumentor/UnsafeCoverageMap.java b/src/jmh/java/com/code_intelligence/jazzer/instrumentor/UnsafeCoverageMap.java
new file mode 100644
index 00000000..cf73928d
--- /dev/null
+++ b/src/jmh/java/com/code_intelligence/jazzer/instrumentor/UnsafeCoverageMap.java
@@ -0,0 +1,59 @@
+// Copyright 2022 Code Intelligence GmbH
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+package com.code_intelligence.jazzer.instrumentor;
+
+import java.lang.reflect.Field;
+import sun.misc.Unsafe;
+
+public final class UnsafeCoverageMap {
+ private static final Unsafe UNSAFE;
+
+ static {
+ Unsafe unsafe;
+ try {
+ Field f = Unsafe.class.getDeclaredField("theUnsafe");
+ f.setAccessible(true);
+ unsafe = (Unsafe) f.get(null);
+ } catch (IllegalAccessException | NoSuchFieldException e) {
+ e.printStackTrace();
+ System.exit(1);
+ // Not reached.
+ unsafe = null;
+ }
+ UNSAFE = unsafe;
+ }
+
+ // The current target, JsonSanitizer, uses less than 2048 coverage counters.
+ private static final long NUM_COUNTERS = 4096;
+ private static final long countersAddress = UNSAFE.allocateMemory(NUM_COUNTERS);
+
+ static {
+ UNSAFE.setMemory(countersAddress, NUM_COUNTERS, (byte) 0);
+ }
+
+ public static void enlargeIfNeeded(int nextId) {
+ // Statically sized counters buffer.
+ }
+
+ public static void recordCoverage(final int id) {
+ final long address = countersAddress + id;
+ final byte counter = UNSAFE.getByte(address);
+ if (counter == -1) {
+ UNSAFE.putByte(address, (byte) 1);
+ } else {
+ UNSAFE.putByte(address, (byte) (counter + 1));
+ }
+ }
+}