blob: 9a116be114243a7e1d4f14537de643438d8cc5d6 [file] [log] [blame]
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -05001#!/bin/bash
2# SPDX-License-Identifier: LGPL-2.1+
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -05003
4set -ex
5
6export LC_CTYPE=C.UTF-8
7
Zbigniew Jędrzejewski-Szmek36cd9912018-03-12 15:59:10 +01008export CC=${CC:-clang}
9export CXX=${CXX:-clang++}
10clang_version="$($CC --version | sed -nr 's/.*version ([^ ]+?) .*/\1/p' | sed -r 's/-$//')"
11
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050012SANITIZER=${SANITIZER:-address -fsanitize-address-use-after-scope}
13flags="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER -fsanitize-coverage=trace-pc-guard,trace-cmp"
14
Zbigniew Jędrzejewski-Szmek36cd9912018-03-12 15:59:10 +010015clang_lib="/usr/lib64/clang/${clang_version}/lib/linux"
16[ -d "$clang_lib" ] || clang_lib="/usr/lib/clang/${clang_version}/lib/linux"
17
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050018export CFLAGS=${CFLAGS:-$flags}
19export CXXFLAGS=${CXXFLAGS:-$flags}
Zbigniew Jędrzejewski-Szmek36cd9912018-03-12 15:59:10 +010020export LDFLAGS=${LDFLAGS:--L${clang_lib}}
21
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050022export WORK=${WORK:-$(pwd)}
23export OUT=${OUT:-$(pwd)/out}
24mkdir -p $OUT
25
Jonathan Rudenberg7d941c02018-01-16 08:36:56 -050026build=$WORK/build
27rm -rf $build
28mkdir -p $build
29
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050030fuzzflag="oss-fuzz=true"
31if [ -z "$FUZZING_ENGINE" ]; then
32 fuzzflag="llvm-fuzz=true"
33fi
34
35meson $build -D$fuzzflag -Db_lundef=false
Jonathan Rudenberg7d941c02018-01-16 08:36:56 -050036ninja -C $build fuzzers
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -050037
Zbigniew Jędrzejewski-Szmek93b575b2018-07-07 17:43:40 +020038# The seed corpus is a separate flat archive for each fuzzer,
39# with a fixed name ${fuzzer}_seed_corpus.zip.
40for d in "$(dirname "$0")/../test/fuzz/fuzz-"*; do
41 zip -jqr $OUT/$(basename "$d")_seed_corpus.zip "$d"
Jonathan Rudenberg2bd37c52018-01-19 19:44:56 -050042done
43
44# get fuzz-dns-packet corpus
Jonathan Rudenberg7d941c02018-01-16 08:36:56 -050045df=$build/dns-fuzzing
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -050046git clone --depth 1 https://github.com/CZ-NIC/dns-fuzzing $df
47zip -jqr $OUT/fuzz-dns-packet_seed_corpus.zip $df/packet
48
Evgeny Vereshchagin7cd98cc2018-08-16 02:06:35 +000049install -Dt $OUT/src/shared/ $build/src/shared/libsystemd-shared-*.so
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -050050
Evgeny Vereshchagin6315d122018-08-01 10:25:26 +000051wget -O $OUT/fuzz-json_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/skjson_seed_corpus.zip
52wget -O $OUT/fuzz-json.dict https://raw.githubusercontent.com/rc0r/afl-fuzz/master/dictionaries/json.dict
53
Jonathan Rudenberg7d941c02018-01-16 08:36:56 -050054find $build -maxdepth 1 -type f -executable -name "fuzz-*" -exec mv {} $OUT \;
Evgeny Vereshchagin3ff074b2018-11-06 19:51:45 +010055find src -type f -name "fuzz-*.dict" -exec cp {} $OUT \;
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050056cp src/fuzz/*.options $OUT