2 # SPDX-License-Identifier: LGPL-2.1+
6 export LC_CTYPE
=C.UTF-8
9 export CXX
=${CXX:-clang++}
10 clang_version
="$($CC --version | sed -nr 's/.*version ([^ ]+?) .*/\1/p' | sed -r 's/-$//')"
12 SANITIZER
=${SANITIZER:-address -fsanitize-address-use-after-scope}
13 flags
="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER -fsanitize-coverage=trace-pc-guard,trace-cmp"
15 clang_lib
="/usr/lib64/clang/${clang_version}/lib/linux"
16 [ -d "$clang_lib" ] || clang_lib
="/usr/lib/clang/${clang_version}/lib/linux"
18 export CFLAGS
=${CFLAGS:-$flags}
19 export CXXFLAGS
=${CXXFLAGS:-$flags}
20 export LDFLAGS
=${LDFLAGS:--L${clang_lib}}
22 export WORK
=${WORK:-$(pwd)}
23 export OUT
=${OUT:-$(pwd)/out}
30 fuzzflag
="oss-fuzz=true"
31 if [ -z "$FUZZING_ENGINE" ]; then
32 fuzzflag
="llvm-fuzz=true"
35 meson
$build -D$fuzzflag -Db_lundef=false
36 ninja
-C $build fuzzers
38 for d
in "$(dirname "$0")/../test/fuzz-corpus/"*; do
39 zip -jqr $OUT/fuzz-$
(basename "$d")_seed_corpus.
zip "$d"
42 # get fuzz-dns-packet corpus
44 git clone
--depth 1 https
://github.com
/CZ-NIC
/dns-fuzzing
$df
45 zip -jqr $OUT/fuzz-dns-packet_seed_corpus.
zip $df/packet
47 install -Dt $OUT/src
/shared
/ $build/src
/shared
/libsystemd-shared-
*.so
49 find $build -maxdepth 1 -type f
-executable -name "fuzz-*" -exec mv {} $OUT \
;
50 cp src
/fuzz
/*.options
$OUT