mirror of
https://github.com/webmproject/libwebp.git
synced 2025-04-05 16:36:49 +02:00
Limit the possible fuzz engines.
Change-Id: I8f2fd84bc7175e4e74c4fb418fcc4f5549018ac3
This commit is contained in:
parent
4f200de591
commit
20e92f7d40
@ -34,10 +34,15 @@
|
|||||||
# And then run the fuzzer locally, for example:
|
# And then run the fuzzer locally, for example:
|
||||||
# python3 infra/helper.py run_fuzzer libwebp \
|
# python3 infra/helper.py run_fuzzer libwebp \
|
||||||
# --sanitizer address \
|
# --sanitizer address \
|
||||||
# animencoder_fuzzer__AnimEncoder.AnimEncoderTest
|
# animencoder_fuzzer@AnimEncoder.AnimEncoderTest
|
||||||
|
|
||||||
set -eu
|
set -eu
|
||||||
|
|
||||||
|
# Avoid fuzz engines that do not compile.
|
||||||
|
if [[ "$FUZZING_ENGINE" != "libfuzzer" ]]; then
|
||||||
|
exit
|
||||||
|
fi
|
||||||
|
|
||||||
# limit allocation size to reduce spurious OOMs
|
# limit allocation size to reduce spurious OOMs
|
||||||
WEBP_CFLAGS="$CFLAGS -DWEBP_MAX_IMAGE_SIZE=838860800" # 800MiB
|
WEBP_CFLAGS="$CFLAGS -DWEBP_MAX_IMAGE_SIZE=838860800" # 800MiB
|
||||||
|
|
||||||
@ -48,18 +53,16 @@ cd build && make -j$(nproc) && cd ..
|
|||||||
find $SRC/libwebp-test-data -type f -size -32k -iname "*.webp" \
|
find $SRC/libwebp-test-data -type f -size -32k -iname "*.webp" \
|
||||||
-exec zip -qju fuzz_seed_corpus.zip "{}" \;
|
-exec zip -qju fuzz_seed_corpus.zip "{}" \;
|
||||||
|
|
||||||
# Restrict fuzztest tests to the only compatible fuzz engine: libfuzzer.
|
# build fuzztests
|
||||||
if [[ "$FUZZING_ENGINE" == "libfuzzer" ]]; then
|
# The following is taken from https://github.com/google/oss-fuzz/blob/31ac7244748ea7390015455fb034b1f4eda039d9/infra/base-images/base-builder/compile_fuzztests.sh#L59
|
||||||
# build fuzztests
|
# Iterate the fuzz binaries and list each fuzz entrypoint in the binary. For
|
||||||
# The following is taken from https://github.com/google/oss-fuzz/blob/31ac7244748ea7390015455fb034b1f4eda039d9/infra/base-images/base-builder/compile_fuzztests.sh#L59
|
# each entrypoint create a wrapper script that calls into the binaries the
|
||||||
# Iterate the fuzz binaries and list each fuzz entrypoint in the binary. For
|
# given entrypoint as argument.
|
||||||
# each entrypoint create a wrapper script that calls into the binaries the
|
# The scripts will be named:
|
||||||
# given entrypoint as argument.
|
# {binary_name}@{fuzztest_entrypoint}
|
||||||
# The scripts will be named:
|
FUZZ_TEST_BINARIES_OUT_PATHS=$(find ./build/tests/fuzzer/ -executable -type f)
|
||||||
# {binary_name}@{fuzztest_entrypoint}
|
echo "Fuzz binaries: $FUZZ_TEST_BINARIES_OUT_PATHS"
|
||||||
FUZZ_TEST_BINARIES_OUT_PATHS=$(find ./build/tests/fuzzer/ -executable -type f)
|
for fuzz_main_file in $FUZZ_TEST_BINARIES_OUT_PATHS; do
|
||||||
echo "Fuzz binaries: $FUZZ_TEST_BINARIES_OUT_PATHS"
|
|
||||||
for fuzz_main_file in $FUZZ_TEST_BINARIES_OUT_PATHS; do
|
|
||||||
FUZZ_TESTS=$($fuzz_main_file --list_fuzz_tests | cut -d ' ' -f 4)
|
FUZZ_TESTS=$($fuzz_main_file --list_fuzz_tests | cut -d ' ' -f 4)
|
||||||
cp -f ${fuzz_main_file} $OUT/
|
cp -f ${fuzz_main_file} $OUT/
|
||||||
fuzz_basename=$(basename $fuzz_main_file)
|
fuzz_basename=$(basename $fuzz_main_file)
|
||||||
@ -76,8 +79,7 @@ chmod +x \$this_dir/$fuzz_basename
|
|||||||
chmod -x \$this_dir/$fuzz_basename" > $OUT/$TARGET_FUZZER
|
chmod -x \$this_dir/$fuzz_basename" > $OUT/$TARGET_FUZZER
|
||||||
chmod +x $OUT/$TARGET_FUZZER
|
chmod +x $OUT/$TARGET_FUZZER
|
||||||
done
|
done
|
||||||
# Copy data.
|
# Copy data.
|
||||||
cp fuzz_seed_corpus.zip $OUT/${fuzz_basename}_seed_corpus.zip
|
cp fuzz_seed_corpus.zip $OUT/${fuzz_basename}_seed_corpus.zip
|
||||||
cp tests/fuzzer/fuzz.dict $OUT/${fuzz_basename}.dict
|
cp tests/fuzzer/fuzz.dict $OUT/${fuzz_basename}.dict
|
||||||
done
|
done
|
||||||
fi
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user