]> git.ipfire.org Git - thirdparty/systemd.git/blame - tools/oss-fuzz.sh
Merge pull request #21868 from lucab/ups/factory-locale-conf
[thirdparty/systemd.git] / tools / oss-fuzz.sh
CommitLineData
ff12a795 1#!/usr/bin/env bash
db9ecf05 2# SPDX-License-Identifier: LGPL-2.1-or-later
7db7d5b7
JR
3
4set -ex
5
6export LC_CTYPE=C.UTF-8
7
36cd9913
ZJS
8export CC=${CC:-clang}
9export CXX=${CXX:-clang++}
10clang_version="$($CC --version | sed -nr 's/.*version ([^ ]+?) .*/\1/p' | sed -r 's/-$//')"
11
31e57a35 12SANITIZER=${SANITIZER:-address -fsanitize-address-use-after-scope}
9c5c4677 13flags="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER"
31e57a35 14
36cd9913
ZJS
15clang_lib="/usr/lib64/clang/${clang_version}/lib/linux"
16[ -d "$clang_lib" ] || clang_lib="/usr/lib/clang/${clang_version}/lib/linux"
17
31e57a35
JR
18export CFLAGS=${CFLAGS:-$flags}
19export CXXFLAGS=${CXXFLAGS:-$flags}
36cd9913
ZJS
20export LDFLAGS=${LDFLAGS:--L${clang_lib}}
21
31e57a35
JR
22export WORK=${WORK:-$(pwd)}
23export OUT=${OUT:-$(pwd)/out}
f7e0d22d 24mkdir -p "$OUT"
31e57a35 25
f7e0d22d
FS
26build="$WORK/build"
27rm -rf "$build"
28mkdir -p "$build"
7d941c06 29
31e57a35 30if [ -z "$FUZZING_ENGINE" ]; then
cc5549ca 31 fuzzflag="llvm-fuzz=true"
1f034000
EV
32else
33 fuzzflag="oss-fuzz=true"
2fd1beb3
EV
34
35 apt-get update
36 apt-get install -y gperf m4 gettext python3-pip \
37 libcap-dev libmount-dev libkmod-dev \
4997d1b9
EV
38 pkg-config wget python3-jinja2
39 pip3 install -r .github/workflows/requirements.txt --require-hashes
40
41 # https://github.com/google/oss-fuzz/issues/6868
42 ORIG_PYTHONPATH=$(python3 -c 'import sys;print(":".join(sys.path[1:]))')
43 export PYTHONPATH="$ORIG_PYTHONPATH:/usr/lib/python3/dist-packages/"
2fd1beb3 44
1f034000
EV
45 if [[ "$SANITIZER" == undefined ]]; then
46 UBSAN_FLAGS="-fsanitize=pointer-overflow -fno-sanitize-recover=pointer-overflow"
47 CFLAGS="$CFLAGS $UBSAN_FLAGS"
48 CXXFLAGS="$CXXFLAGS $UBSAN_FLAGS"
49 fi
31e57a35
JR
50fi
51
f7e0d22d
FS
52if ! meson "$build" "-D$fuzzflag" -Db_lundef=false; then
53 cat "$build/meson-logs/meson-log.txt"
77591e97
EV
54 exit 1
55fi
56
f7e0d22d 57ninja -v -C "$build" fuzzers
7db7d5b7 58
93b575b2
ZJS
59# The seed corpus is a separate flat archive for each fuzzer,
60# with a fixed name ${fuzzer}_seed_corpus.zip.
61for d in "$(dirname "$0")/../test/fuzz/fuzz-"*; do
f7e0d22d 62 zip -jqr "$OUT/$(basename "$d")_seed_corpus.zip" "$d"
2bd37c5b
JR
63done
64
65# get fuzz-dns-packet corpus
f7e0d22d
FS
66df="$build/dns-fuzzing"
67git clone --depth 1 https://github.com/CZ-NIC/dns-fuzzing "$df"
68zip -jqr "$OUT/fuzz-dns-packet_seed_corpus.zip" "$df/packet"
7db7d5b7 69
f7e0d22d 70install -Dt "$OUT/src/shared/" "$build"/src/shared/libsystemd-shared-*.so
7db7d5b7 71
f7e0d22d 72wget -O "$OUT/fuzz-json.dict" https://raw.githubusercontent.com/rc0r/afl-fuzz/master/dictionaries/json.dict
6315d12b 73
f7e0d22d
FS
74find "$build" -maxdepth 1 -type f -executable -name "fuzz-*" -exec mv {} "$OUT" \;
75find src -type f -name "fuzz-*.dict" -exec cp {} "$OUT" \;
76cp src/fuzz/*.options "$OUT"