123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123 |
- #/bin/bash -eu
- # Copyright 2020 Google Inc.
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- #
- ################################################################################
- # This file is for integration with Google OSS-Fuzz.
- # The following ENV variables are available when executing on OSS-fuzz:
- #
- # /out/ $OUT Directory to store build artifacts (fuzz targets, dictionaries, options files, seed corpus archives).
- # /src/ $SRC Directory to checkout source files.
- # /work/ $WORK Directory to store intermediate files.
- #
- # $CC, $CXX, $CCC The C and C++ compiler binaries.
- # $CFLAGS, $CXXFLAGS C and C++ compiler flags.
- # $LIB_FUZZING_ENGINE C++ compiler argument to link fuzz target against the prebuilt engine library (e.g. libFuzzer).
- # This sets the -coverpgk for the coverage report when the corpus is executed through go test
- coverpkg="github.com/ethereum/go-ethereum/..."
- function coverbuild {
- path=$1
- function=$2
- fuzzer=$3
- tags=""
- if [[ $# -eq 4 ]]; then
- tags="-tags $4"
- fi
- cd $path
- fuzzed_package=`pwd | rev | cut -d'/' -f 1 | rev`
- cp $GOPATH/ossfuzz_coverage_runner.go ./"${function,,}"_test.go
- sed -i -e 's/FuzzFunction/'$function'/' ./"${function,,}"_test.go
- sed -i -e 's/mypackagebeingfuzzed/'$fuzzed_package'/' ./"${function,,}"_test.go
- sed -i -e 's/TestFuzzCorpus/Test'$function'Corpus/' ./"${function,,}"_test.go
- cat << DOG > $OUT/$fuzzer
- #/bin/sh
- cd $OUT/$path
- go test -run Test${function}Corpus -v $tags -coverprofile \$1 -coverpkg $coverpkg
- DOG
- chmod +x $OUT/$fuzzer
- #echo "Built script $OUT/$fuzzer"
- #cat $OUT/$fuzzer
- cd -
- }
- function compile_fuzzer {
- # Inputs:
- # $1: The package to fuzz, within go-ethereum
- # $2: The name of the fuzzing function
- # $3: The name to give to the final fuzzing-binary
- path=$GOPATH/src/github.com/ethereum/go-ethereum/$1
- func=$2
- fuzzer=$3
- echo "Building $fuzzer"
- # Do a coverage-build or a regular build
- if [[ $SANITIZER = *coverage* ]]; then
- coverbuild $path $func $fuzzer $coverpkg
- else
- (cd $path && \
- go-fuzz -func $func -o $WORK/$fuzzer.a . && \
- $CXX $CXXFLAGS $LIB_FUZZING_ENGINE $WORK/$fuzzer.a -o $OUT/$fuzzer)
- fi
- ## Check if there exists a seed corpus file
- corpusfile="${path}/testdata/${fuzzer}_seed_corpus.zip"
- if [ -f $corpusfile ]
- then
- cp $corpusfile $OUT/
- echo "Found seed corpus: $corpusfile"
- fi
- }
- compile_fuzzer tests/fuzzers/bitutil Fuzz fuzzBitutilCompress
- compile_fuzzer tests/fuzzers/bn256 FuzzAdd fuzzBn256Add
- compile_fuzzer tests/fuzzers/bn256 FuzzMul fuzzBn256Mul
- compile_fuzzer tests/fuzzers/bn256 FuzzPair fuzzBn256Pair
- compile_fuzzer tests/fuzzers/runtime Fuzz fuzzVmRuntime
- compile_fuzzer tests/fuzzers/keystore Fuzz fuzzKeystore
- compile_fuzzer tests/fuzzers/txfetcher Fuzz fuzzTxfetcher
- compile_fuzzer tests/fuzzers/rlp Fuzz fuzzRlp
- compile_fuzzer tests/fuzzers/trie Fuzz fuzzTrie
- compile_fuzzer tests/fuzzers/stacktrie Fuzz fuzzStackTrie
- compile_fuzzer tests/fuzzers/difficulty Fuzz fuzzDifficulty
- compile_fuzzer tests/fuzzers/abi Fuzz fuzzAbi
- compile_fuzzer tests/fuzzers/les Fuzz fuzzLes
- compile_fuzzer tests/fuzzers/vflux FuzzClientPool fuzzClientPool
- compile_fuzzer tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add
- compile_fuzzer tests/fuzzers/bls12381 FuzzG1Mul fuzz_g1_mul
- compile_fuzzer tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp
- compile_fuzzer tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add
- compile_fuzzer tests/fuzzers/bls12381 FuzzG2Mul fuzz_g2_mul
- compile_fuzzer tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp
- compile_fuzzer tests/fuzzers/bls12381 FuzzPairing fuzz_pairing
- compile_fuzzer tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1
- compile_fuzzer tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2
- compile_fuzzer tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add
- compile_fuzzer tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp
- compile_fuzzer tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add
- compile_fuzzer tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing
- #TODO: move this to tests/fuzzers, if possible
- compile_fuzzer crypto/blake2b Fuzz fuzzBlake2b
|