42 lines
1.1 KiB
Bash
Executable file
42 lines
1.1 KiB
Bash
Executable file
#!/usr/bin/env bash
|
|
|
|
if (($# < 2)); then
|
|
echo "usage: $0 <language> <halt|recover> [libFuzzer args...]" >&2
|
|
exit 1
|
|
fi
|
|
|
|
set -eu
|
|
|
|
export ASAN_OPTIONS=quarantine_size_mb=10:detect_leaks=1:symbolize=1
|
|
export UBSAN=print_stacktrace=1:halt_on_error=1:symbolize=1
|
|
|
|
# check if CI env var exists
|
|
if [[ -z ${CI:-} ]]; then
|
|
declare -A mode_config=(
|
|
[halt]='-timeout=1 -rss_limit_mb=2048'
|
|
[recover]='-timeout=10 -rss_limit_mb=2048'
|
|
)
|
|
else
|
|
declare -A mode_config=(
|
|
[halt]='-max_total_time=120 -timeout=1 -rss_limit_mb=2048'
|
|
[recover]='-time=120 -timeout=10 -rss_limit_mb=2048'
|
|
)
|
|
fi
|
|
|
|
lang="$1"
|
|
shift
|
|
mode="$1"
|
|
shift
|
|
# Treat remainder of arguments as libFuzzer arguments
|
|
|
|
# Fuzzing logs and testcases are always written to `pwd`, so `cd` there first
|
|
results="$PWD/test/fuzz/out/fuzz-results/${lang}"
|
|
mkdir -p "${results}"
|
|
cd "${results}"
|
|
|
|
# Create a corpus directory, so new discoveries are stored on disk. These will
|
|
# then be loaded on subsequent fuzzing runs
|
|
mkdir -p corpus
|
|
|
|
# shellcheck disable=SC2086
|
|
../../${lang}_fuzzer -dict="../../${lang}.dict" -artifact_prefix=${lang}_ -max_len=2048 ${mode_config[$mode]} corpus "$@"
|