Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .github/workflows/fuzzing.yml
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ jobs:
- { name: fuzz_expr, should_pass: true }
- { name: fuzz_printf, should_pass: false }
- { name: fuzz_echo, should_pass: false }
- { name: fuzz_seq, should_pass: false }
- { name: fuzz_parse_glob, should_pass: true }
- { name: fuzz_parse_size, should_pass: true }
- { name: fuzz_parse_time, should_pass: true }
Expand Down
8 changes: 7 additions & 1 deletion fuzz/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ uu_test = { path = "../src/uu/test/" }
uu_expr = { path = "../src/uu/expr/" }
uu_printf = { path = "../src/uu/printf/" }
uu_echo = { path = "../src/uu/echo/" }

uu_seq = { path = "../src/uu/seq/" }

# Prevent this from interfering with workspaces
[workspace]
Expand All @@ -42,6 +42,12 @@ path = "fuzz_targets/fuzz_echo.rs"
test = false
doc = false

[[bin]]
name = "fuzz_seq"
path = "fuzz_targets/fuzz_seq.rs"
test = false
doc = false

[[bin]]
name = "fuzz_expr"
path = "fuzz_targets/fuzz_expr.rs"
Expand Down
78 changes: 78 additions & 0 deletions fuzz/fuzz_targets/fuzz_seq.rs
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
// This file is part of the uutils coreutils package.
//
// For the full copyright and license information, please view the LICENSE
// file that was distributed with this source code.
// spell-checker:ignore parens

#![no_main]
use libfuzzer_sys::fuzz_target;
use uu_seq::uumain;

use rand::Rng;
use std::ffi::OsString;

mod fuzz_common;
use crate::fuzz_common::CommandResult;
use crate::fuzz_common::{
compare_result, generate_and_run_uumain, generate_random_string, run_gnu_cmd,
};
static CMD_PATH: &str = "seq";

fn generate_seq() -> String {
let mut rng = rand::thread_rng();

// Generate 1 to 3 numbers for seq arguments
let arg_count = rng.gen_range(1..=3);
let mut args = Vec::new();

for _ in 0..arg_count {
if rng.gen_ratio(1, 100) {
// 1% chance to add a random string
args.push(generate_random_string(rng.gen_range(1..=10)));
} else {
// 99% chance to add a numeric value
match rng.gen_range(0..=3) {
0 => args.push(rng.gen_range(-10000..=10000).to_string()), // Large or small integers
1 => args.push(rng.gen_range(-100.0..100.0).to_string()), // Floating-point numbers
2 => args.push(rng.gen_range(-100..0).to_string()), // Negative integers
_ => args.push(rng.gen_range(1..=100).to_string()), // Regular integers
}
}
}

args.join(" ")
}

fuzz_target!(|_data: &[u8]| {
let seq = generate_seq();
let mut args = vec![OsString::from("seq")];
args.extend(seq.split_whitespace().map(OsString::from));

let rust_result = generate_and_run_uumain(&args, uumain);

let gnu_result = match run_gnu_cmd(CMD_PATH, &args[1..], false) {
Ok(result) => result,
Err(error_result) => {
eprintln!("Failed to run GNU command:");
eprintln!("Stderr: {}", error_result.stderr);
eprintln!("Exit Code: {}", error_result.exit_code);
CommandResult {
stdout: String::new(),
stderr: error_result.stderr,
exit_code: error_result.exit_code,
}
}
};

compare_result(
"seq",
&format!("{:?}", &args[1..]),
&rust_result.stdout,
&gnu_result.stdout,
&rust_result.stderr,
&gnu_result.stderr,
rust_result.exit_code,
gnu_result.exit_code,
false, // Set to true if you want to fail on stderr diff
);
});