blob: 491246b32ba1970724c01169a37fb6c08ba5290e [file] [log] [blame]
Jörg Thalheimff12a792020-03-04 09:35:06 +00001#!/usr/bin/env bash
Yu Watanabedb9ecf02020-11-09 13:23:58 +09002# SPDX-License-Identifier: LGPL-2.1-or-later
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -05003
4set -ex
5
6export LC_CTYPE=C.UTF-8
7
Zbigniew Jędrzejewski-Szmek36cd9912018-03-12 15:59:10 +01008export CC=${CC:-clang}
9export CXX=${CXX:-clang++}
10clang_version="$($CC --version | sed -nr 's/.*version ([^ ]+?) .*/\1/p' | sed -r 's/-$//')"
11
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050012SANITIZER=${SANITIZER:-address -fsanitize-address-use-after-scope}
Evgeny Vereshchagin9c5c4672019-05-09 00:03:41 +020013flags="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER"
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050014
Zbigniew Jędrzejewski-Szmek36cd9912018-03-12 15:59:10 +010015clang_lib="/usr/lib64/clang/${clang_version}/lib/linux"
16[ -d "$clang_lib" ] || clang_lib="/usr/lib/clang/${clang_version}/lib/linux"
17
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050018export CFLAGS=${CFLAGS:-$flags}
19export CXXFLAGS=${CXXFLAGS:-$flags}
Zbigniew Jędrzejewski-Szmek36cd9912018-03-12 15:59:10 +010020export LDFLAGS=${LDFLAGS:--L${clang_lib}}
21
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050022export WORK=${WORK:-$(pwd)}
23export OUT=${OUT:-$(pwd)/out}
24mkdir -p $OUT
25
Jonathan Rudenberg7d941c02018-01-16 08:36:56 -050026build=$WORK/build
27rm -rf $build
28mkdir -p $build
29
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050030if [ -z "$FUZZING_ENGINE" ]; then
Zbigniew Jędrzejewski-Szmekcc5549c2019-04-04 14:10:42 +020031 fuzzflag="llvm-fuzz=true"
Evgeny Vereshchagin1f034002020-05-21 08:20:01 +020032else
33 fuzzflag="oss-fuzz=true"
34 if [[ "$SANITIZER" == undefined ]]; then
35 UBSAN_FLAGS="-fsanitize=pointer-overflow -fno-sanitize-recover=pointer-overflow"
36 CFLAGS="$CFLAGS $UBSAN_FLAGS"
37 CXXFLAGS="$CXXFLAGS $UBSAN_FLAGS"
38 fi
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050039fi
40
41meson $build -D$fuzzflag -Db_lundef=false
Evgeny Vereshchagin9c5c4672019-05-09 00:03:41 +020042ninja -v -C $build fuzzers
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -050043
Zbigniew Jędrzejewski-Szmek93b575b2018-07-07 17:43:40 +020044# The seed corpus is a separate flat archive for each fuzzer,
45# with a fixed name ${fuzzer}_seed_corpus.zip.
46for d in "$(dirname "$0")/../test/fuzz/fuzz-"*; do
Zbigniew Jędrzejewski-Szmekcc5549c2019-04-04 14:10:42 +020047 zip -jqr $OUT/$(basename "$d")_seed_corpus.zip "$d"
Jonathan Rudenberg2bd37c52018-01-19 19:44:56 -050048done
49
50# get fuzz-dns-packet corpus
Jonathan Rudenberg7d941c02018-01-16 08:36:56 -050051df=$build/dns-fuzzing
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -050052git clone --depth 1 https://github.com/CZ-NIC/dns-fuzzing $df
53zip -jqr $OUT/fuzz-dns-packet_seed_corpus.zip $df/packet
54
Evgeny Vereshchagin7cd98cc2018-08-16 02:06:35 +000055install -Dt $OUT/src/shared/ $build/src/shared/libsystemd-shared-*.so
Jonathan Rudenberg7db7d5b2018-01-13 19:51:07 -050056
Evgeny Vereshchagin6315d122018-08-01 10:25:26 +000057wget -O $OUT/fuzz-json.dict https://raw.githubusercontent.com/rc0r/afl-fuzz/master/dictionaries/json.dict
58
Jonathan Rudenberg7d941c02018-01-16 08:36:56 -050059find $build -maxdepth 1 -type f -executable -name "fuzz-*" -exec mv {} $OUT \;
Evgeny Vereshchagin3ff074b2018-11-06 19:51:45 +010060find src -type f -name "fuzz-*.dict" -exec cp {} $OUT \;
Jonathan Rudenberg31e57a32018-01-16 10:25:43 -050061cp src/fuzz/*.options $OUT