mirror of https://github.com/google/oss-fuzz.git
[qt] Move build.sh to own repository (#4042)
This commit is contained in:
parent
d15dc2a88f
commit
7da55877b6
|
@ -23,5 +23,5 @@ RUN git submodule update --init --depth 1 qtbase
|
||||||
RUN git submodule update --init --depth 1 qtsvg
|
RUN git submodule update --init --depth 1 qtsvg
|
||||||
WORKDIR $SRC
|
WORKDIR $SRC
|
||||||
RUN git clone --depth 1 git://code.qt.io/qt/qtqa.git
|
RUN git clone --depth 1 git://code.qt.io/qt/qtqa.git
|
||||||
|
RUN cp qtqa/fuzzing/oss-fuzz/build.sh $SRC/
|
||||||
RUN git clone --depth 1 https://github.com/google/AFL.git
|
RUN git clone --depth 1 https://github.com/google/AFL.git
|
||||||
COPY build.sh $SRC/
|
|
||||||
|
|
|
@ -1,96 +0,0 @@
|
||||||
#!/bin/bash -eu
|
|
||||||
# Copyright 2019 Google Inc.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
#
|
|
||||||
################################################################################
|
|
||||||
|
|
||||||
# add the flags to Qt build, gratefully borrowed from karchive
|
|
||||||
cd $SRC/qt/qtbase/mkspecs
|
|
||||||
sed -i -e "s/QMAKE_CXXFLAGS += -stdlib=libc++/QMAKE_CXXFLAGS += -stdlib=libc++ $CXXFLAGS\nQMAKE_CFLAGS += $CFLAGS/g" linux-clang-libc++/qmake.conf
|
|
||||||
sed -i -e "s/QMAKE_LFLAGS += -stdlib=libc++/QMAKE_LFLAGS += -stdlib=libc++ -lpthread $CXXFLAGS/g" linux-clang-libc++/qmake.conf
|
|
||||||
|
|
||||||
# set optimization to O1
|
|
||||||
sed -i -e "s/QMAKE_CFLAGS_OPTIMIZE = -O2/QMAKE_CFLAGS_OPTIMIZE = -O1/g" common/gcc-base.conf
|
|
||||||
sed -i -e "s/QMAKE_CFLAGS_OPTIMIZE_FULL = -O3/QMAKE_CFLAGS_OPTIMIZE_FULL = -O1/g" common/gcc-base.conf
|
|
||||||
|
|
||||||
# remove -fno-rtti which conflicts with -fsanitize=vptr when building with sanitizer undefined
|
|
||||||
sed -i -e "s/QMAKE_CXXFLAGS_RTTI_OFF = -fno-rtti/QMAKE_CXXFLAGS_RTTI_OFF = /g" common/gcc-base.conf
|
|
||||||
|
|
||||||
# build project
|
|
||||||
cd $WORK
|
|
||||||
MAKEFLAGS=-j$(nproc) $SRC/qt/configure -qt-libmd4c -platform linux-clang-libc++ -static -opensource -confirm-license -no-opengl -nomake tests -nomake examples -prefix $PWD/qtbase -D QT_NO_DEPRECATED_WARNINGS
|
|
||||||
make -j$(nproc) > /dev/null
|
|
||||||
|
|
||||||
# prepare corpus files
|
|
||||||
zip -j $WORK/cbor $SRC/qtqa/fuzzing/testcases/cbor/*
|
|
||||||
zip -j $WORK/html $SRC/qtqa/fuzzing/testcases/html/*
|
|
||||||
zip -j $WORK/images $SRC/qtqa/fuzzing/testcases/svg/* $SRC/AFL/testcases/images/*/*
|
|
||||||
zip -j $WORK/markdown $SRC/qtqa/fuzzing/testcases/markdown/*
|
|
||||||
zip -j $WORK/ssl.pem.zip $SRC/qtqa/fuzzing/testcases/ssl.pem/*
|
|
||||||
zip -j $WORK/svg $SRC/qtqa/fuzzing/testcases/svg/*
|
|
||||||
zip -j $WORK/text $SRC/qtqa/fuzzing/testcases/text/* $SRC/AFL/testcases/others/text/*
|
|
||||||
zip -j $WORK/xml $SRC/qtqa/fuzzing/testcases/xml/* $SRC/AFL/testcases/others/xml/*
|
|
||||||
|
|
||||||
# build fuzzers
|
|
||||||
|
|
||||||
build_fuzzer() {
|
|
||||||
local nameScheme=$1
|
|
||||||
local module=$2
|
|
||||||
local proFilePath=$3
|
|
||||||
local format=${4-""}
|
|
||||||
local dictionary=${5-""}
|
|
||||||
local proFileName=${proFilePath##*/}
|
|
||||||
local exeName=${proFileName%%.*}
|
|
||||||
local proFileDir=${proFilePath%/*}
|
|
||||||
local targetName="$module"_${proFileDir//\//_}
|
|
||||||
mkdir build_fuzzer
|
|
||||||
cd build_fuzzer
|
|
||||||
$WORK/qtbase/bin/qmake $SRC/qt/$module/tests/libfuzzer/$proFilePath
|
|
||||||
make -j$(nproc)
|
|
||||||
|
|
||||||
# use old names of fuzzers, so open issues don't change state accidentally
|
|
||||||
local lowercaseExeName=$exeName
|
|
||||||
if [ "$exeName" == "setmarkdown" ]; then
|
|
||||||
exeName=setMarkdown
|
|
||||||
fi
|
|
||||||
if [ "$lowercaseExeName" != "$exeName" ]; then
|
|
||||||
mv $lowercaseExeName $exeName
|
|
||||||
fi
|
|
||||||
if [ "$nameScheme" == "old" ]; then
|
|
||||||
targetName="$exeName"
|
|
||||||
fi
|
|
||||||
|
|
||||||
mv $exeName $OUT/$targetName
|
|
||||||
if [ -n "$format" ]; then
|
|
||||||
cp $WORK/$format.zip $OUT/"$targetName"_seed_corpus.zip
|
|
||||||
fi
|
|
||||||
if [ -n "$dictionary" ]; then
|
|
||||||
cp $dictionary $OUT/$targetName.dict
|
|
||||||
fi
|
|
||||||
cd ..
|
|
||||||
rm -r build_fuzzer
|
|
||||||
}
|
|
||||||
|
|
||||||
build_fuzzer "new" "qtbase" "corelib/serialization/qcborstreamreader/next/next.pro" "cbor"
|
|
||||||
build_fuzzer "new" "qtbase" "corelib/serialization/qcborvalue/fromcbor/fromcbor.pro" "cbor"
|
|
||||||
build_fuzzer "new" "qtbase" "corelib/serialization/qtextstream/extractionoperator-float/extractionoperator-float.pro" "text"
|
|
||||||
build_fuzzer "old" "qtbase" "corelib/serialization/qxmlstream/qxmlstreamreader/readnext/readnext.pro" "xml" "$SRC/AFL/dictionaries/xml.dict"
|
|
||||||
build_fuzzer "new" "qtbase" "corelib/text/qregularexpression/optimize/optimize.pro" "" "$SRC/AFL/dictionaries/regexp.dict"
|
|
||||||
build_fuzzer "new" "qtbase" "gui/image/qimage/loadfromdata/loadfromdata.pro" "images"
|
|
||||||
build_fuzzer "new" "qtbase" "gui/painting/qcolorspace/fromiccprofile/fromiccprofile.pro"
|
|
||||||
build_fuzzer "new" "qtbase" "gui/text/qtextdocument/sethtml/sethtml.pro" "html" "$SRC/AFL/dictionaries/html_tags.dict"
|
|
||||||
build_fuzzer "old" "qtbase" "gui/text/qtextdocument/setmarkdown/setmarkdown.pro" "markdown"
|
|
||||||
build_fuzzer "new" "qtbase" "gui/text/qtextlayout/beginlayout/beginlayout.pro" "text"
|
|
||||||
build_fuzzer "new" "qtbase" "network/ssl/qsslcertificate/qsslcertificate/pem/pem.pro" "ssl.pem"
|
|
||||||
build_fuzzer "new" "qtsvg" "svg/qsvgrenderer/render/render.pro" "svg"
|
|
Loading…
Reference in New Issue