good morning!!!!

Skip to content
Snippets Groups Projects
Select Git revision
  • d3952898c33fe2647eed27dd86df3c7ae4c9ddcc
  • master default protected
  • v0.2.16-candidate
  • shivam/rpcAddBorTx
  • default-cli-config
  • shivam/minerRecommitFix
  • vcastellm/pos-296-bump-go-version-in-bor-and-heimdall
  • shivam/ethstats-backend-fix
  • v0.2.16-beta1-candidate
  • v0.2.15-beta3-candidate
  • shivam/newCli-IPC
  • v0.3.0-dev
  • checkpoint-whitelist-master
  • shivam/codecov
  • jdkanani/fix-typo-log
  • shivam/hardcoded-spans-v0.2.14
  • shivam/hardcoded-spans
  • shivam/fast-state-sync
  • shivam/fast-state-sync-master
  • gethv1.10.15-merge
  • fix-txpool-2
  • v0.2.14-tmp-span-hotfix
  • v0.2.15-beta2
  • v0.2.15-beta1
  • v0.3.0-beta3
  • v0.3.0-beta2
  • v0.3.0-beta1
  • v0.2.14
  • v0.2.13
  • v0.2.13-beta2
  • v0.2.13-beta1
  • v0.2.12
  • v0.2.12-beta3
  • v0.2.12-beta1
  • v0.2.12-beta2
  • v0.2.11
  • v0.2.10
  • v0.2.10-beta2
  • v0.2.9
  • v0.2.9-beta1
  • v0.2.8
41 results

oss-fuzz.sh

Blame
  • Forked from github / maticnetwork / bor
    1204 commits behind the upstream repository.
    user avatar
    Martin Holst Swende authored and GitHub committed
    * common,crypto: move fuzzers out of core
    
    * fuzzers: move vm fuzzer out from core
    
    * fuzzing: rework cover package logic
    
    * fuzzers: lint
    b9012a03
    History
    Code owners
    Assign users and groups as approvers for specific file changes. Learn more.
    oss-fuzz.sh 4.24 KiB
    #/bin/bash -eu
    # Copyright 2020 Google Inc.
    #
    # Licensed under the Apache License, Version 2.0 (the "License");
    # you may not use this file except in compliance with the License.
    # You may obtain a copy of the License at
    #
    #      http://www.apache.org/licenses/LICENSE-2.0
    #
    # Unless required by applicable law or agreed to in writing, software
    # distributed under the License is distributed on an "AS IS" BASIS,
    # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    # See the License for the specific language governing permissions and
    # limitations under the License.
    #
    ################################################################################
    
    # This file is for integration with Google OSS-Fuzz.
    # The following ENV variables are available when executing on OSS-fuzz:
    #
    # /out/         $OUT    Directory to store build artifacts (fuzz targets, dictionaries, options files, seed corpus archives).
    # /src/         $SRC    Directory to checkout source files.
    # /work/        $WORK   Directory to store intermediate files.
    #
    # $CC, $CXX, $CCC       The C and C++ compiler binaries.
    # $CFLAGS, $CXXFLAGS    C and C++ compiler flags.
    # $LIB_FUZZING_ENGINE   C++ compiler argument to link fuzz target against the prebuilt engine library (e.g. libFuzzer).
    
    # This sets the -coverpgk for the coverage report when the corpus is executed through go test
    coverpkg="github.com/ethereum/go-ethereum/..."
    
    function coverbuild {
      path=$1
      function=$2
      fuzzer=$3
      tags=""
    
      if [[ $#  -eq 4 ]]; then
        tags="-tags $4"
      fi
      cd $path
      fuzzed_package=`pwd | rev | cut -d'/' -f 1 | rev`
      cp $GOPATH/ossfuzz_coverage_runner.go ./"${function,,}"_test.go
      sed -i -e 's/FuzzFunction/'$function'/' ./"${function,,}"_test.go
      sed -i -e 's/mypackagebeingfuzzed/'$fuzzed_package'/' ./"${function,,}"_test.go
      sed -i -e 's/TestFuzzCorpus/Test'$function'Corpus/' ./"${function,,}"_test.go
    
    cat << DOG > $OUT/$fuzzer
    #/bin/sh
    
      cd $OUT/$path
      go test -run Test${function}Corpus -v $tags -coverprofile \$1 -coverpkg $coverpkg
    
    DOG
    
      chmod +x $OUT/$fuzzer
      #echo "Built script $OUT/$fuzzer"
      #cat $OUT/$fuzzer
      cd -
    }
    
    function compile_fuzzer {
      # Inputs:
      # $1: The package to fuzz, within go-ethereum
      # $2: The name of the fuzzing function
      # $3: The name to give to the final fuzzing-binary
    
      path=$GOPATH/src/github.com/ethereum/go-ethereum/$1
      func=$2
      fuzzer=$3
    
      echo "Building $fuzzer"
    
      # Do a coverage-build or a regular build
      if [[ $SANITIZER = *coverage* ]]; then
        coverbuild $path $func $fuzzer $coverpkg
      else
        (cd $path && \
            go-fuzz -func $func -o $WORK/$fuzzer.a . && \
            $CXX $CXXFLAGS $LIB_FUZZING_ENGINE $WORK/$fuzzer.a -o $OUT/$fuzzer)
      fi
    
      ## Check if there exists a seed corpus file
      corpusfile="${path}/testdata/${fuzzer}_seed_corpus.zip"
      if [ -f $corpusfile ]
      then
        cp $corpusfile $OUT/
        echo "Found seed corpus: $corpusfile"
      fi
    }
    
    compile_fuzzer tests/fuzzers/bitutil  Fuzz      fuzzBitutilCompress
    compile_fuzzer tests/fuzzers/bn256    FuzzAdd   fuzzBn256Add
    compile_fuzzer tests/fuzzers/bn256    FuzzMul   fuzzBn256Mul
    compile_fuzzer tests/fuzzers/bn256    FuzzPair  fuzzBn256Pair
    compile_fuzzer tests/fuzzers/runtime  Fuzz      fuzzVmRuntime
    compile_fuzzer tests/fuzzers/keystore   Fuzz fuzzKeystore
    compile_fuzzer tests/fuzzers/txfetcher  Fuzz fuzzTxfetcher
    compile_fuzzer tests/fuzzers/rlp        Fuzz fuzzRlp
    compile_fuzzer tests/fuzzers/trie       Fuzz fuzzTrie
    compile_fuzzer tests/fuzzers/stacktrie  Fuzz fuzzStackTrie
    compile_fuzzer tests/fuzzers/difficulty Fuzz fuzzDifficulty
    
    compile_fuzzer tests/fuzzers/bls12381  FuzzG1Add fuzz_g1_add
    compile_fuzzer tests/fuzzers/bls12381  FuzzG1Mul fuzz_g1_mul
    compile_fuzzer tests/fuzzers/bls12381  FuzzG1MultiExp fuzz_g1_multiexp
    compile_fuzzer tests/fuzzers/bls12381  FuzzG2Add fuzz_g2_add
    compile_fuzzer tests/fuzzers/bls12381  FuzzG2Mul fuzz_g2_mul
    compile_fuzzer tests/fuzzers/bls12381  FuzzG2MultiExp fuzz_g2_multiexp
    compile_fuzzer tests/fuzzers/bls12381  FuzzPairing fuzz_pairing
    compile_fuzzer tests/fuzzers/bls12381  FuzzMapG1 fuzz_map_g1
    compile_fuzzer tests/fuzzers/bls12381  FuzzMapG2 fuzz_map_g2
    
    #TODO: move this to tests/fuzzers, if possible
    compile_fuzzer crypto/blake2b  Fuzz      fuzzBlake2b
    
    
    # This doesn't work very well @TODO
    #compile_fuzzertests/fuzzers/abi Fuzz fuzzAbi