mirror of
https://github.com/uutils/coreutils
synced 2025-01-05 17:59:00 +00:00
Merge branch 'main' into printf-rewrite
This commit is contained in:
commit
07aaf61aa1
4 changed files with 133 additions and 17 deletions
31
.github/workflows/fuzzing.yml
vendored
31
.github/workflows/fuzzing.yml
vendored
|
@ -37,16 +37,14 @@ jobs:
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
test-target:
|
test-target:
|
||||||
[
|
- { name: fuzz_test, should_pass: true }
|
||||||
fuzz_date,
|
# https://github.com/uutils/coreutils/issues/5311
|
||||||
fuzz_test,
|
- { name: fuzz_date, should_pass: false }
|
||||||
fuzz_expr,
|
- { name: fuzz_expr, should_pass: true }
|
||||||
fuzz_parse_glob,
|
- { name: fuzz_printf, should_pass: false }
|
||||||
fuzz_parse_size,
|
- { name: fuzz_parse_glob, should_pass: true }
|
||||||
fuzz_parse_time,
|
- { name: fuzz_parse_size, should_pass: true }
|
||||||
# adding more fuzz tests here.
|
- { name: fuzz_parse_time, should_pass: true }
|
||||||
# e.g. fuzz_test_a,
|
|
||||||
]
|
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- uses: dtolnay/rust-toolchain@nightly
|
- uses: dtolnay/rust-toolchain@nightly
|
||||||
|
@ -59,16 +57,17 @@ jobs:
|
||||||
- name: Restore Cached Corpus
|
- name: Restore Cached Corpus
|
||||||
uses: actions/cache/restore@v3
|
uses: actions/cache/restore@v3
|
||||||
with:
|
with:
|
||||||
key: corpus-cache-${{ matrix.test-target }}
|
key: corpus-cache-${{ matrix.test-target.name }}
|
||||||
path: |
|
path: |
|
||||||
fuzz/corpus/${{ matrix.test-target }}
|
fuzz/corpus/${{ matrix.test-target.name }}
|
||||||
- name: Run ${{ matrix.test-target }} for XX seconds
|
- name: Run ${{ matrix.test-target.name }} for XX seconds
|
||||||
shell: bash
|
shell: bash
|
||||||
|
continue-on-error: ${{ !matrix.test-target.name.should_pass }}
|
||||||
run: |
|
run: |
|
||||||
cargo +nightly fuzz run ${{ matrix.test-target }} -- -max_total_time=${{ env.RUN_FOR }} -detect_leaks=0
|
cargo +nightly fuzz run ${{ matrix.test-target.name }} -- -max_total_time=${{ env.RUN_FOR }} -detect_leaks=0
|
||||||
- name: Save Corpus Cache
|
- name: Save Corpus Cache
|
||||||
uses: actions/cache/save@v3
|
uses: actions/cache/save@v3
|
||||||
with:
|
with:
|
||||||
key: corpus-cache-${{ matrix.test-target }}
|
key: corpus-cache-${{ matrix.test-target.name }}
|
||||||
path: |
|
path: |
|
||||||
fuzz/corpus/${{ matrix.test-target }}
|
fuzz/corpus/${{ matrix.test-target.name }}
|
||||||
|
|
|
@ -330,7 +330,7 @@ walkdir = "2.4"
|
||||||
winapi-util = "0.1.6"
|
winapi-util = "0.1.6"
|
||||||
windows-sys = { version = "0.48.0", default-features = false }
|
windows-sys = { version = "0.48.0", default-features = false }
|
||||||
xattr = "1.0.1"
|
xattr = "1.0.1"
|
||||||
zip = { version = "0.6.6", default_features = false, features = ["deflate"] }
|
zip = { version = "0.6.6", default-features = false, features = ["deflate"] }
|
||||||
|
|
||||||
hex = "0.4.3"
|
hex = "0.4.3"
|
||||||
md-5 = "0.10.6"
|
md-5 = "0.10.6"
|
||||||
|
|
|
@ -16,6 +16,7 @@ uucore = { path = "../src/uucore/" }
|
||||||
uu_date = { path = "../src/uu/date/" }
|
uu_date = { path = "../src/uu/date/" }
|
||||||
uu_test = { path = "../src/uu/test/" }
|
uu_test = { path = "../src/uu/test/" }
|
||||||
uu_expr = { path = "../src/uu/expr/" }
|
uu_expr = { path = "../src/uu/expr/" }
|
||||||
|
uu_printf = { path = "../src/uu/printf/" }
|
||||||
|
|
||||||
|
|
||||||
# Prevent this from interfering with workspaces
|
# Prevent this from interfering with workspaces
|
||||||
|
@ -28,6 +29,12 @@ path = "fuzz_targets/fuzz_date.rs"
|
||||||
test = false
|
test = false
|
||||||
doc = false
|
doc = false
|
||||||
|
|
||||||
|
[[bin]]
|
||||||
|
name = "fuzz_printf"
|
||||||
|
path = "fuzz_targets/fuzz_printf.rs"
|
||||||
|
test = false
|
||||||
|
doc = false
|
||||||
|
|
||||||
[[bin]]
|
[[bin]]
|
||||||
name = "fuzz_expr"
|
name = "fuzz_expr"
|
||||||
path = "fuzz_targets/fuzz_expr.rs"
|
path = "fuzz_targets/fuzz_expr.rs"
|
||||||
|
|
110
fuzz/fuzz_targets/fuzz_printf.rs
Normal file
110
fuzz/fuzz_targets/fuzz_printf.rs
Normal file
|
@ -0,0 +1,110 @@
|
||||||
|
// This file is part of the uutils coreutils package.
|
||||||
|
//
|
||||||
|
// For the full copyright and license information, please view the LICENSE
|
||||||
|
// file that was distributed with this source code.
|
||||||
|
// spell-checker:ignore parens
|
||||||
|
|
||||||
|
#![no_main]
|
||||||
|
use libfuzzer_sys::fuzz_target;
|
||||||
|
use uu_printf::uumain;
|
||||||
|
|
||||||
|
use rand::seq::SliceRandom;
|
||||||
|
use rand::Rng;
|
||||||
|
use std::ffi::OsString;
|
||||||
|
|
||||||
|
mod fuzz_common;
|
||||||
|
use crate::fuzz_common::CommandResult;
|
||||||
|
use crate::fuzz_common::{
|
||||||
|
compare_result, generate_and_run_uumain, generate_random_string, run_gnu_cmd,
|
||||||
|
};
|
||||||
|
|
||||||
|
static CMD_PATH: &str = "printf";
|
||||||
|
|
||||||
|
fn generate_escape_sequence(rng: &mut impl Rng) -> String {
|
||||||
|
let escape_sequences = [
|
||||||
|
"\\\"",
|
||||||
|
"\\\\",
|
||||||
|
"\\a",
|
||||||
|
"\\b",
|
||||||
|
"\\c",
|
||||||
|
"\\e",
|
||||||
|
"\\f",
|
||||||
|
"\\n",
|
||||||
|
"\\r",
|
||||||
|
"\\t",
|
||||||
|
"\\v",
|
||||||
|
"\\000",
|
||||||
|
"\\x00",
|
||||||
|
"\\u0000",
|
||||||
|
"\\U00000000",
|
||||||
|
"%%",
|
||||||
|
];
|
||||||
|
escape_sequences.choose(rng).unwrap().to_string()
|
||||||
|
}
|
||||||
|
|
||||||
|
fn generate_printf() -> String {
|
||||||
|
let mut rng = rand::thread_rng();
|
||||||
|
let format_specifiers = ["%s", "%d", "%f", "%x", "%o", "%c", "%b", "%q"];
|
||||||
|
let mut printf_str = String::new();
|
||||||
|
// Add a 20% chance of generating an invalid format specifier
|
||||||
|
if rng.gen_bool(0.2) {
|
||||||
|
printf_str.push_str("%z"); // Invalid format specifier
|
||||||
|
} else {
|
||||||
|
let specifier = *format_specifiers.choose(&mut rng).unwrap();
|
||||||
|
printf_str.push_str(specifier);
|
||||||
|
|
||||||
|
// Add a 20% chance of introducing complex format strings
|
||||||
|
if rng.gen_bool(0.2) {
|
||||||
|
printf_str.push_str(&format!(" %{}", rng.gen_range(1..=1000)));
|
||||||
|
} else {
|
||||||
|
// Add a random string or number after the specifier
|
||||||
|
if specifier == "%s" {
|
||||||
|
printf_str.push_str(&format!(
|
||||||
|
" {}",
|
||||||
|
generate_random_string(rng.gen_range(1..=10))
|
||||||
|
));
|
||||||
|
} else {
|
||||||
|
printf_str.push_str(&format!(" {}", rng.gen_range(1..=1000)));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add a 10% chance of including an escape sequence
|
||||||
|
if rng.gen_bool(0.1) {
|
||||||
|
printf_str.push_str(&generate_escape_sequence(&mut rng));
|
||||||
|
}
|
||||||
|
printf_str
|
||||||
|
}
|
||||||
|
|
||||||
|
fuzz_target!(|_data: &[u8]| {
|
||||||
|
let printf_input = generate_printf();
|
||||||
|
let mut args = vec![OsString::from("printf")];
|
||||||
|
args.extend(printf_input.split_whitespace().map(OsString::from));
|
||||||
|
let rust_result = generate_and_run_uumain(&args, uumain);
|
||||||
|
|
||||||
|
let gnu_result = match run_gnu_cmd(CMD_PATH, &args[1..], false) {
|
||||||
|
Ok(result) => result,
|
||||||
|
Err(error_result) => {
|
||||||
|
eprintln!("Failed to run GNU command:");
|
||||||
|
eprintln!("Stderr: {}", error_result.stderr);
|
||||||
|
eprintln!("Exit Code: {}", error_result.exit_code);
|
||||||
|
CommandResult {
|
||||||
|
stdout: String::new(),
|
||||||
|
stderr: error_result.stderr,
|
||||||
|
exit_code: error_result.exit_code,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
compare_result(
|
||||||
|
"printf",
|
||||||
|
&format!("{:?}", &args[1..]),
|
||||||
|
&rust_result.stdout,
|
||||||
|
&gnu_result.stdout,
|
||||||
|
&rust_result.stderr,
|
||||||
|
&gnu_result.stderr,
|
||||||
|
rust_result.exit_code,
|
||||||
|
gnu_result.exit_code,
|
||||||
|
false, // Set to true if you want to fail on stderr diff
|
||||||
|
);
|
||||||
|
});
|
Loading…
Reference in a new issue