mirror of https://github.com/google/oss-fuzz.git
66 lines
2.3 KiB
Bash
Executable File
66 lines
2.3 KiB
Bash
Executable File
#!/bin/bash -eu
|
|
# Copyright 2021 Google LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
# Move seed corpus and dictionary.
|
|
mv $SRC/{*.zip,*.dict} $OUT
|
|
|
|
# Build the json-sanitizer jar.
|
|
CURRENT_VERSION=$(mvn org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \
|
|
-Dexpression=project.version -q -DforceStdout)
|
|
mvn package
|
|
cp "target/json-sanitizer-$CURRENT_VERSION.jar" $OUT/json-sanitizer.jar
|
|
|
|
# The jar files containing the project (separated by spaces).
|
|
PROJECT_JARS=json-sanitizer.jar
|
|
|
|
# Get the fuzzer dependencies (gson).
|
|
mvn dependency:copy -Dartifact=com.google.code.gson:gson:2.8.6 -DoutputDirectory=$OUT/
|
|
|
|
# The jar files containing further dependencies of the fuzz targets (separated
|
|
# by spaces).
|
|
FUZZER_JARS=gson-2.8.6.jar
|
|
|
|
# Build fuzzers in $OUT.
|
|
ALL_JARS="$PROJECT_JARS $FUZZER_JARS"
|
|
BUILD_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "$OUT/%s:"):$JAZZER_API_PATH
|
|
|
|
# All jars and class files lie in the same directory as the fuzzer at runtime.
|
|
RUNTIME_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "\$this_dir/%s:"):.:\$this_dir
|
|
|
|
for fuzzer in $(find $SRC -name '*Fuzzer.java'); do
|
|
fuzzer_basename=$(basename -s .java $fuzzer)
|
|
javac -cp $BUILD_CLASSPATH $fuzzer
|
|
cp $SRC/$fuzzer_basename.class $OUT/
|
|
|
|
# Create execution wrapper.
|
|
echo "#!/bin/bash
|
|
# LLVMFuzzerTestOneInput for fuzzer detection.
|
|
this_dir=\$(dirname \"\$0\")
|
|
if [[ \"\$@\" =~ (^| )-runs=[0-9]+($| ) ]]; then
|
|
mem_settings='-Xmx1900m:-Xss900k'
|
|
else
|
|
mem_settings='-Xmx2048m:-Xss1024k'
|
|
fi
|
|
LD_LIBRARY_PATH=\"$JVM_LD_LIBRARY_PATH\":\$this_dir \
|
|
\$this_dir/jazzer_driver --agent_path=\$this_dir/jazzer_agent_deploy.jar \
|
|
--cp=$RUNTIME_CLASSPATH \
|
|
--target_class=$fuzzer_basename \
|
|
--jvm_args=\"\$mem_settings\" \
|
|
\$@" > $OUT/$fuzzer_basename
|
|
chmod +x $OUT/$fuzzer_basename
|
|
done
|