aboutsummaryrefslogtreecommitdiff
path: root/fuzz/fuzz_targets/does_not_decode_invalid_registers.rs
blob: 0f32f73fa1a9d1f607b7492a7f096b300d557636 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
//! instruction text should never include the word BUG - this is a symptom of selecting an invalid
//! RegSpec while disassembling.

#![no_main]
#[macro_use] extern crate libfuzzer_sys;
extern crate yaxpeax_x86;

fuzz_target!(|data: &[u8]| {
    let x86_64_decoder = yaxpeax_x86::long_mode::InstDecoder::default();
    let x86_32_decoder = yaxpeax_x86::protected_mode::InstDecoder::default();
    let x86_16_decoder = yaxpeax_x86::real_mode::InstDecoder::default();

    if let Ok(inst) = x86_64_decoder.decode_slice(data) {
        let mut res = String::new();
        inst.write_to(&mut res).expect("format does not panic");
        assert!(!res.contains("BUG"));
    };

    if let Ok(inst) = x86_32_decoder.decode_slice(data) {
        let mut res = String::new();
        inst.write_to(&mut res).expect("format does not panic");
        assert!(!res.contains("BUG"));
    };

    if let Ok(inst) = x86_16_decoder.decode_slice(data) {
        let mut res = String::new();
        inst.write_to(&mut res).expect("format does not panic");
        assert!(!res.contains("BUG"));
    };
});