mirror of https://github.com/google/oss-fuzz.git
94 lines
3.0 KiB
Bash
94 lines
3.0 KiB
Bash
#!/bin/bash
|
|
# Copyright 2021 Google LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
(
|
|
cd $SRC/
|
|
GITHUB_RELEASE="https://github.com/google/lldb-eval/releases/download/oss-fuzz-ubuntu-20.04"
|
|
|
|
if [ "$SANITIZER" = "address" ]
|
|
then
|
|
LLVM_ARCHIVE="llvm-12.0.1-x86_64-linux-release-address.tar.gz"
|
|
elif [ "$SANITIZER" = "memory" ]
|
|
then
|
|
LLVM_ARCHIVE="llvm-12.0.1-x86_64-linux-release-memory.tar.gz"
|
|
elif [ "$SANITIZER" = "undefined" ]
|
|
then
|
|
LLVM_ARCHIVE="llvm-12.0.1-x86_64-linux-release.tar.gz"
|
|
elif [ "$SANITIZER" = "coverage" ]
|
|
then
|
|
# For coverage we also need the original source code.
|
|
wget --quiet $GITHUB_RELEASE/llvm-12.0.1-source.tar.gz
|
|
tar -xzf llvm-12.0.1-source.tar.gz
|
|
wget --quiet $GITHUB_RELEASE/llvm-12.0.1-x86_64-linux-release-genfiles.tar.gz
|
|
tar -xzf llvm-12.0.1-x86_64-linux-release-genfiles.tar.gz
|
|
|
|
LLVM_ARCHIVE="llvm-12.0.1-x86_64-linux-release.tar.gz"
|
|
else
|
|
echo "Unknown sanitizer: $SANITIZER"
|
|
exit 1
|
|
fi
|
|
|
|
wget --quiet $GITHUB_RELEASE/$LLVM_ARCHIVE
|
|
mkdir -p llvm && tar -xzf $LLVM_ARCHIVE --strip-components 1 -C llvm
|
|
)
|
|
export LLVM_INSTALL_PATH=$SRC/llvm
|
|
|
|
if [ "$SANITIZER" = "undefined" ]
|
|
then
|
|
# Disable vptr because it's not allowed with '-fno-rtti'
|
|
CFLAGS="$CFLAGS -fno-sanitize=function,vptr"
|
|
CXXFLAGS="$CXXFLAGS -fno-sanitize=function,vptr"
|
|
fi
|
|
|
|
# Undefine NDEBUG to enable asserts.
|
|
export BAZEL_EXTRA_BUILD_FLAGS="--copt=-UNDEBUG"
|
|
|
|
# Run the build!
|
|
bazel_build_fuzz_tests
|
|
|
|
# OSS-Fuzz rule doesn't build data dependencies
|
|
bazel build //testdata:fuzzer_binary_gen
|
|
|
|
# OSS-Fuzz rule doesn't handle dynamic dependencies
|
|
# Copy liblldb.so
|
|
mkdir -p $OUT/lib
|
|
cp $SRC/llvm/lib/liblldb.so* $OUT/lib
|
|
|
|
# List of targets to fuzz.
|
|
TARGETS=(
|
|
lldb_eval_libfuzzer_test
|
|
lldb_vs_lldb_eval_libfuzzer_test
|
|
)
|
|
|
|
# Preparation of each target.
|
|
for target in ${TARGETS[@]}; do
|
|
# OSS-Fuzz rule doesn't package runfiles yet:
|
|
# https://github.com/bazelbuild/rules_fuzzing/issues/100
|
|
mkdir -p $OUT/$target.runfiles
|
|
# fuzzer_binary
|
|
mkdir -p $OUT/$target.runfiles/lldb_eval/testdata
|
|
cp $SRC/lldb-eval/bazel-bin/testdata/fuzzer_binary $OUT/$target.runfiles/lldb_eval/testdata/
|
|
cp $SRC/lldb-eval/testdata/fuzzer_binary.cc $OUT/$target.runfiles/lldb_eval/testdata/
|
|
# lldb-server
|
|
mkdir -p $OUT/$target.runfiles/llvm_project/bin
|
|
cp $SRC/llvm/bin/lldb-server $OUT/$target.runfiles/llvm_project/bin/lldb-server
|
|
# Patch RPATH of the fuzz target
|
|
patchelf --set-rpath '$ORIGIN/lib' $OUT/$target
|
|
done
|
|
|
|
cp $SRC/lldb_vs_lldb_eval_libfuzzer_test.options $OUT/
|