From bcc68cca4c77f4556ecfce45c0129868aeaf46b2 Mon Sep 17 00:00:00 2001 From: David Korczynski Date: Thu, 21 Dec 2023 04:19:45 -0800 Subject: [PATCH] Add ClusterFuzzLite integration Signed-off-by: David Korczynski --- .clusterfuzzlite/Dockerfile | 6 ++++++ .clusterfuzzlite/README.md | 3 +++ .clusterfuzzlite/build.sh | 5 +++++ .clusterfuzzlite/fast_obj_fuzzer.cpp | 27 +++++++++++++++++++++++++ .clusterfuzzlite/project.yaml | 1 + .github/workflows/cflite_pr.yml | 30 ++++++++++++++++++++++++++++ 6 files changed, 72 insertions(+) create mode 100644 .clusterfuzzlite/Dockerfile create mode 100644 .clusterfuzzlite/README.md create mode 100644 .clusterfuzzlite/build.sh create mode 100644 .clusterfuzzlite/fast_obj_fuzzer.cpp create mode 100644 .clusterfuzzlite/project.yaml create mode 100644 .github/workflows/cflite_pr.yml diff --git a/.clusterfuzzlite/Dockerfile b/.clusterfuzzlite/Dockerfile new file mode 100644 index 0000000..cb89ae7 --- /dev/null +++ b/.clusterfuzzlite/Dockerfile @@ -0,0 +1,6 @@ +FROM gcr.io/oss-fuzz-base/base-builder +RUN apt-get update && apt-get install -y make autoconf automake libtool + +COPY . $SRC/fast_obj +COPY .clusterfuzzlite/build.sh $SRC/build.sh +WORKDIR $SRC/fast_obj \ No newline at end of file diff --git a/.clusterfuzzlite/README.md b/.clusterfuzzlite/README.md new file mode 100644 index 0000000..6bb7ef1 --- /dev/null +++ b/.clusterfuzzlite/README.md @@ -0,0 +1,3 @@ +# ClusterFuzzLite set up + +This folder contains a fuzzing set for [ClusterFuzzLite](https://google.github.io/clusterfuzzlite). \ No newline at end of file diff --git a/.clusterfuzzlite/build.sh b/.clusterfuzzlite/build.sh new file mode 100644 index 0000000..a11ead3 --- /dev/null +++ b/.clusterfuzzlite/build.sh @@ -0,0 +1,5 @@ +#!/bin/bash -eu +$CXX $CFLAGS $LIB_FUZZING_ENGINE \ + $SRC/fast_obj/.clusterfuzzlite/fast_obj_fuzzer.cpp \ + -o $OUT/fast_obj_fuzzer \ + -I$SRC/fast_obj \ No newline at end of file diff --git a/.clusterfuzzlite/fast_obj_fuzzer.cpp b/.clusterfuzzlite/fast_obj_fuzzer.cpp new file mode 100644 index 0000000..a625db1 --- /dev/null +++ b/.clusterfuzzlite/fast_obj_fuzzer.cpp @@ -0,0 +1,27 @@ +#define FAST_OBJ_IMPLEMENTATION +#include "fast_obj.h" + +#include +#include +#include + +extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { + char filename[256]; + sprintf(filename, "/tmp/libfuzzer.%d", getpid()); + + FILE *fp = fopen(filename, "wb"); + if (!fp) + return 0; + fwrite(data, size, 1, fp); + fclose(fp); + + fastObjMesh *m = fast_obj_read(filename); + if (!m) { + unlink(filename); + return 0; + } + + fast_obj_destroy(m); + unlink(filename); + return 0; +} \ No newline at end of file diff --git a/.clusterfuzzlite/project.yaml b/.clusterfuzzlite/project.yaml new file mode 100644 index 0000000..7f563eb --- /dev/null +++ b/.clusterfuzzlite/project.yaml @@ -0,0 +1 @@ +language: c++ \ No newline at end of file diff --git a/.github/workflows/cflite_pr.yml b/.github/workflows/cflite_pr.yml new file mode 100644 index 0000000..d0bce9d --- /dev/null +++ b/.github/workflows/cflite_pr.yml @@ -0,0 +1,30 @@ +name: ClusterFuzzLite PR fuzzing +on: + workflow_dispatch: + pull_request: + branches: [ main ] +permissions: read-all +jobs: + PR: + runs-on: ubuntu-latest + strategy: + fail-fast: false + matrix: + sanitizer: [address] + steps: + - name: Build Fuzzers (${{ matrix.sanitizer }}) + id: build + uses: google/clusterfuzzlite/actions/build_fuzzers@v1 + with: + sanitizer: ${{ matrix.sanitizer }} + language: c++ + bad-build-check: false + - name: Run Fuzzers (${{ matrix.sanitizer }}) + id: run + uses: google/clusterfuzzlite/actions/run_fuzzers@v1 + with: + github-token: ${{ secrets.GITHUB_TOKEN }} + fuzz-seconds: 100 + mode: 'code-change' + report-unreproducible-crashes: false + sanitizer: ${{ matrix.sanitizer }} \ No newline at end of file