]> git.ipfire.org Git - thirdparty/systemd.git/blob - tools/oss-fuzz.sh
tree-wide: beautify remaining copyright statements
[thirdparty/systemd.git] / tools / oss-fuzz.sh
1 #!/bin/bash
2 # SPDX-License-Identifier: LGPL-2.1+
3 #
4 # Copyright © 2017 Jonathan Rudenberg
5
6 set -ex
7
8 export LC_CTYPE=C.UTF-8
9
10 export CC=${CC:-clang}
11 export CXX=${CXX:-clang++}
12 clang_version="$($CC --version | sed -nr 's/.*version ([^ ]+?) .*/\1/p' | sed -r 's/-$//')"
13
14 SANITIZER=${SANITIZER:-address -fsanitize-address-use-after-scope}
15 flags="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER -fsanitize-coverage=trace-pc-guard,trace-cmp"
16
17 clang_lib="/usr/lib64/clang/${clang_version}/lib/linux"
18 [ -d "$clang_lib" ] || clang_lib="/usr/lib/clang/${clang_version}/lib/linux"
19
20 export CFLAGS=${CFLAGS:-$flags}
21 export CXXFLAGS=${CXXFLAGS:-$flags}
22 export LDFLAGS=${LDFLAGS:--L${clang_lib}}
23
24 export WORK=${WORK:-$(pwd)}
25 export OUT=${OUT:-$(pwd)/out}
26 mkdir -p $OUT
27
28 build=$WORK/build
29 rm -rf $build
30 mkdir -p $build
31
32 fuzzflag="oss-fuzz=true"
33 if [ -z "$FUZZING_ENGINE" ]; then
34 fuzzflag="llvm-fuzz=true"
35 fi
36
37 meson $build -D$fuzzflag -Db_lundef=false
38 ninja -C $build fuzzers
39
40 for d in "$(dirname "$0")/../test/fuzz-corpus/"*; do
41 zip -jqr $OUT/fuzz-$(basename "$d")_seed_corpus.zip "$d"
42 done
43
44 # get fuzz-dns-packet corpus
45 df=$build/dns-fuzzing
46 git clone --depth 1 https://github.com/CZ-NIC/dns-fuzzing $df
47 zip -jqr $OUT/fuzz-dns-packet_seed_corpus.zip $df/packet
48
49 # install the private shared library without executable permissions
50 install -Dt $OUT/src/shared/ -m 0644 $build/src/shared/libsystemd-shared-*.so
51
52 find $build -maxdepth 1 -type f -executable -name "fuzz-*" -exec mv {} $OUT \;
53 cp src/fuzz/*.options $OUT