| #!/bin/bash |
| # SPDX-License-Identifier: LGPL-2.1+ |
| |
| set -ex |
| |
| export LC_CTYPE=C.UTF-8 |
| |
| export CC=${CC:-clang} |
| export CXX=${CXX:-clang++} |
| clang_version="$($CC --version | sed -nr 's/.*version ([^ ]+?) .*/\1/p' | sed -r 's/-$//')" |
| |
| SANITIZER=${SANITIZER:-address -fsanitize-address-use-after-scope} |
| flags="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER" |
| |
| clang_lib="/usr/lib64/clang/${clang_version}/lib/linux" |
| [ -d "$clang_lib" ] || clang_lib="/usr/lib/clang/${clang_version}/lib/linux" |
| |
| export CFLAGS=${CFLAGS:-$flags} |
| export CXXFLAGS=${CXXFLAGS:-$flags} |
| export LDFLAGS=${LDFLAGS:--L${clang_lib}} |
| |
| export WORK=${WORK:-$(pwd)} |
| export OUT=${OUT:-$(pwd)/out} |
| mkdir -p $OUT |
| |
| build=$WORK/build |
| rm -rf $build |
| mkdir -p $build |
| |
| fuzzflag="oss-fuzz=true" |
| if [ -z "$FUZZING_ENGINE" ]; then |
| fuzzflag="llvm-fuzz=true" |
| fi |
| |
| meson $build -D$fuzzflag -Db_lundef=false |
| ninja -v -C $build fuzzers |
| |
| # The seed corpus is a separate flat archive for each fuzzer, |
| # with a fixed name ${fuzzer}_seed_corpus.zip. |
| for d in "$(dirname "$0")/../test/fuzz/fuzz-"*; do |
| zip -jqr $OUT/$(basename "$d")_seed_corpus.zip "$d" |
| done |
| |
| # get fuzz-dns-packet corpus |
| df=$build/dns-fuzzing |
| git clone --depth 1 https://github.com/CZ-NIC/dns-fuzzing $df |
| zip -jqr $OUT/fuzz-dns-packet_seed_corpus.zip $df/packet |
| |
| install -Dt $OUT/src/shared/ $build/src/shared/libsystemd-shared-*.so |
| |
| wget -O $OUT/fuzz-json_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/skjson_seed_corpus.zip |
| wget -O $OUT/fuzz-json.dict https://raw.githubusercontent.com/rc0r/afl-fuzz/master/dictionaries/json.dict |
| |
| find $build -maxdepth 1 -type f -executable -name "fuzz-*" -exec mv {} $OUT \; |
| find src -type f -name "fuzz-*.dict" -exec cp {} $OUT \; |
| cp src/fuzz/*.options $OUT |