Limit the possible fuzz engines.

Change-Id: I8f2fd84bc7175e4e74c4fb418fcc4f5549018ac3
This commit is contained in:
Vincent Rabaud 2024-06-06 11:57:39 +02:00
parent 4f200de591
commit 20e92f7d40

View File

@ -34,10 +34,15 @@
# And then run the fuzzer locally, for example: # And then run the fuzzer locally, for example:
# python3 infra/helper.py run_fuzzer libwebp \ # python3 infra/helper.py run_fuzzer libwebp \
# --sanitizer address \ # --sanitizer address \
# animencoder_fuzzer__AnimEncoder.AnimEncoderTest # animencoder_fuzzer@AnimEncoder.AnimEncoderTest
set -eu set -eu
# Avoid fuzz engines that do not compile.
if [[ "$FUZZING_ENGINE" != "libfuzzer" ]]; then
exit
fi
# limit allocation size to reduce spurious OOMs # limit allocation size to reduce spurious OOMs
WEBP_CFLAGS="$CFLAGS -DWEBP_MAX_IMAGE_SIZE=838860800" # 800MiB WEBP_CFLAGS="$CFLAGS -DWEBP_MAX_IMAGE_SIZE=838860800" # 800MiB
@ -48,36 +53,33 @@ cd build && make -j$(nproc) && cd ..
find $SRC/libwebp-test-data -type f -size -32k -iname "*.webp" \ find $SRC/libwebp-test-data -type f -size -32k -iname "*.webp" \
-exec zip -qju fuzz_seed_corpus.zip "{}" \; -exec zip -qju fuzz_seed_corpus.zip "{}" \;
# Restrict fuzztest tests to the only compatible fuzz engine: libfuzzer. # build fuzztests
if [[ "$FUZZING_ENGINE" == "libfuzzer" ]]; then # The following is taken from https://github.com/google/oss-fuzz/blob/31ac7244748ea7390015455fb034b1f4eda039d9/infra/base-images/base-builder/compile_fuzztests.sh#L59
# build fuzztests # Iterate the fuzz binaries and list each fuzz entrypoint in the binary. For
# The following is taken from https://github.com/google/oss-fuzz/blob/31ac7244748ea7390015455fb034b1f4eda039d9/infra/base-images/base-builder/compile_fuzztests.sh#L59 # each entrypoint create a wrapper script that calls into the binaries the
# Iterate the fuzz binaries and list each fuzz entrypoint in the binary. For # given entrypoint as argument.
# each entrypoint create a wrapper script that calls into the binaries the # The scripts will be named:
# given entrypoint as argument. # {binary_name}@{fuzztest_entrypoint}
# The scripts will be named: FUZZ_TEST_BINARIES_OUT_PATHS=$(find ./build/tests/fuzzer/ -executable -type f)
# {binary_name}@{fuzztest_entrypoint} echo "Fuzz binaries: $FUZZ_TEST_BINARIES_OUT_PATHS"
FUZZ_TEST_BINARIES_OUT_PATHS=$(find ./build/tests/fuzzer/ -executable -type f) for fuzz_main_file in $FUZZ_TEST_BINARIES_OUT_PATHS; do
echo "Fuzz binaries: $FUZZ_TEST_BINARIES_OUT_PATHS" FUZZ_TESTS=$($fuzz_main_file --list_fuzz_tests | cut -d ' ' -f 4)
for fuzz_main_file in $FUZZ_TEST_BINARIES_OUT_PATHS; do cp -f ${fuzz_main_file} $OUT/
FUZZ_TESTS=$($fuzz_main_file --list_fuzz_tests | cut -d ' ' -f 4) fuzz_basename=$(basename $fuzz_main_file)
cp -f ${fuzz_main_file} $OUT/ chmod -x $OUT/$fuzz_basename
fuzz_basename=$(basename $fuzz_main_file) for fuzz_entrypoint in $FUZZ_TESTS; do
chmod -x $OUT/$fuzz_basename TARGET_FUZZER="${fuzz_basename}@$fuzz_entrypoint"
for fuzz_entrypoint in $FUZZ_TESTS; do # Write executer script
TARGET_FUZZER="${fuzz_basename}@$fuzz_entrypoint" echo "#!/bin/sh
# Write executer script
echo "#!/bin/sh
# LLVMFuzzerTestOneInput for fuzzer detection. # LLVMFuzzerTestOneInput for fuzzer detection.
this_dir=\$(dirname \"\$0\") this_dir=\$(dirname \"\$0\")
export TEST_DATA_DIRS=\$this_dir/corpus export TEST_DATA_DIRS=\$this_dir/corpus
chmod +x \$this_dir/$fuzz_basename chmod +x \$this_dir/$fuzz_basename
\$this_dir/$fuzz_basename --fuzz=$fuzz_entrypoint -- \$@ \$this_dir/$fuzz_basename --fuzz=$fuzz_entrypoint -- \$@
chmod -x \$this_dir/$fuzz_basename" > $OUT/$TARGET_FUZZER chmod -x \$this_dir/$fuzz_basename" > $OUT/$TARGET_FUZZER
chmod +x $OUT/$TARGET_FUZZER chmod +x $OUT/$TARGET_FUZZER
done
# Copy data.
cp fuzz_seed_corpus.zip $OUT/${fuzz_basename}_seed_corpus.zip
cp tests/fuzzer/fuzz.dict $OUT/${fuzz_basename}.dict
done done
fi # Copy data.
cp fuzz_seed_corpus.zip $OUT/${fuzz_basename}_seed_corpus.zip
cp tests/fuzzer/fuzz.dict $OUT/${fuzz_basename}.dict
done