mirror of https://github.com/google/oss-fuzz.git
76 lines
3.2 KiB
Bash
Executable File
76 lines
3.2 KiB
Bash
Executable File
#!/bin/bash -eu
|
|
# Copyright 2018 Google Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
# "Build the project" is a no-op. There is no "./configure.sh && make" dance.
|
|
# Wuffs' generated C files are "drop-in libraries" a la
|
|
# http://gpfault.net/posts/drop-in-libraries.txt.html
|
|
|
|
for f in fuzz/c/std/*_fuzzer.c*; do
|
|
# Extract the format name (such as "gzip", from the C or C++ file name,
|
|
# "fuzz/c/std/gzip_fuzzer.c") and make the "gzip_fuzzer" binary. First
|
|
# compile the (C or C++) Wuffs code...
|
|
extension="${f##*.}"
|
|
if [ "$extension" = "c" ]; then
|
|
echo "Building (C) $f"
|
|
b=$(basename $f _fuzzer.c)
|
|
$CC $CFLAGS -c $f -o $WORK/${b}_fuzzer.o
|
|
elif [ "$extension" = "cc" ]; then
|
|
if [[ $LIB_FUZZING_ENGINE == *"DataFlow"* ]]; then
|
|
# Linking (below) with "--engine dataflow" works with the C fuzzers but
|
|
# not the C++ ones. With C++, we get errors like `undefined reference to
|
|
# `dfs$_ZNSt3__112basic_stringIcNS_11char_traitsIcEENS_9allocatorIcEEED2Ev'`
|
|
#
|
|
# This is possibly "DFsan instrumented dependencies"
|
|
# https://github.com/google/oss-fuzz/issues/3388
|
|
echo "Skipping (C++) $f"
|
|
continue
|
|
fi
|
|
echo "Building (C++) $f"
|
|
b=$(basename $f _fuzzer.cc)
|
|
$CXX $CXXFLAGS -c $f -o $WORK/${b}_fuzzer.o
|
|
else
|
|
continue
|
|
fi
|
|
|
|
# ...then link the (C++) fuzzing library.
|
|
$CXX $CXXFLAGS $WORK/${b}_fuzzer.o -o $OUT/${b}_fuzzer $LIB_FUZZING_ENGINE
|
|
|
|
# Make the optional "gzip_fuzzer_seed_corpus.zip" archive. This means
|
|
# extracting the "foo/bar/*.gz" out of the matching "gzip: foo/bar/*.gz"
|
|
# lines in fuzz/c/std/seed_corpora.txt.
|
|
#
|
|
# The seed_corpora.txt lines can contain multiple entries, combining
|
|
# independent corpora. A naive "zip --junk-paths" of all those files can fail
|
|
# if there are duplicate file names, which can easily happen if the file name
|
|
# is a hash of its contents and the contents are a (trivial) minimal
|
|
# reproducer. We use a de-duplication step of copying all of those files into
|
|
# a single directory. Doing that in a single "cp" or "mv" call can fail with
|
|
# "will not overwrite just-created 'foo/etc' with 'bar/etc'", so we make
|
|
# multiple calls, each copying one file at a time. Later duplicates overwrite
|
|
# earlier duplicates. It's OK if the contents aren't identical. The result is
|
|
# still a valid uber-corpus of seed files.
|
|
seeds=$(sed -n -e "/^$b:/s/^$b: *//p" fuzz/c/std/seed_corpora.txt)
|
|
if [ -n "$seeds" ]; then
|
|
mkdir ${b}_fuzzer_seed_corpus
|
|
for s in $seeds; do
|
|
cp $s ${b}_fuzzer_seed_corpus
|
|
done
|
|
zip --junk-paths --recurse-paths $OUT/${b}_fuzzer_seed_corpus.zip ${b}_fuzzer_seed_corpus
|
|
rm -rf ${b}_fuzzer_seed_corpus
|
|
fi
|
|
done
|