mirror of https://github.com/status-im/op-geth.git
130 lines
4.9 KiB
Bash
130 lines
4.9 KiB
Bash
#/bin/bash -eu
|
|
# Copyright 2020 Google Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
# This file is for integration with Google OSS-Fuzz.
|
|
# The following ENV variables are available when executing on OSS-fuzz:
|
|
#
|
|
# /out/ $OUT Directory to store build artifacts (fuzz targets, dictionaries, options files, seed corpus archives).
|
|
# /src/ $SRC Directory to checkout source files.
|
|
# /work/ $WORK Directory to store intermediate files.
|
|
#
|
|
# $CC, $CXX, $CCC The C and C++ compiler binaries.
|
|
# $CFLAGS, $CXXFLAGS C and C++ compiler flags.
|
|
# $LIB_FUZZING_ENGINE C++ compiler argument to link fuzz target against the prebuilt engine library (e.g. libFuzzer).
|
|
|
|
# This sets the -coverpgk for the coverage report when the corpus is executed through go test
|
|
coverpkg="github.com/ethereum/go-ethereum/..."
|
|
|
|
function coverbuild {
|
|
path=$1
|
|
function=$2
|
|
fuzzer=$3
|
|
tags=""
|
|
|
|
if [[ $# -eq 4 ]]; then
|
|
tags="-tags $4"
|
|
fi
|
|
cd $path
|
|
fuzzed_package=`pwd | rev | cut -d'/' -f 1 | rev`
|
|
cp $GOPATH/ossfuzz_coverage_runner.go ./"${function,,}"_test.go
|
|
sed -i -e 's/FuzzFunction/'$function'/' ./"${function,,}"_test.go
|
|
sed -i -e 's/mypackagebeingfuzzed/'$fuzzed_package'/' ./"${function,,}"_test.go
|
|
sed -i -e 's/TestFuzzCorpus/Test'$function'Corpus/' ./"${function,,}"_test.go
|
|
|
|
cat << DOG > $OUT/$fuzzer
|
|
#/bin/sh
|
|
|
|
cd $OUT/$path
|
|
go test -run Test${function}Corpus -v $tags -coverprofile \$1 -coverpkg $coverpkg
|
|
|
|
DOG
|
|
|
|
chmod +x $OUT/$fuzzer
|
|
#echo "Built script $OUT/$fuzzer"
|
|
#cat $OUT/$fuzzer
|
|
cd -
|
|
}
|
|
|
|
function compile_fuzzer {
|
|
# Inputs:
|
|
# $1: The package to fuzz, within go-ethereum
|
|
# $2: The name of the fuzzing function
|
|
# $3: The name to give to the final fuzzing-binary
|
|
|
|
path=$GOPATH/src/github.com/ethereum/go-ethereum/$1
|
|
func=$2
|
|
fuzzer=$3
|
|
|
|
echo "Building $fuzzer"
|
|
|
|
# Do a coverage-build or a regular build
|
|
if [[ $SANITIZER = *coverage* ]]; then
|
|
coverbuild $path $func $fuzzer $coverpkg
|
|
else
|
|
(cd $path && \
|
|
go-fuzz -func $func -o $WORK/$fuzzer.a . && \
|
|
$CXX $CXXFLAGS $LIB_FUZZING_ENGINE $WORK/$fuzzer.a -o $OUT/$fuzzer)
|
|
fi
|
|
|
|
## Check if there exists a seed corpus file
|
|
corpusfile="${path}/testdata/${fuzzer}_seed_corpus.zip"
|
|
if [ -f $corpusfile ]
|
|
then
|
|
cp $corpusfile $OUT/
|
|
echo "Found seed corpus: $corpusfile"
|
|
fi
|
|
}
|
|
|
|
compile_fuzzer tests/fuzzers/bitutil Fuzz fuzzBitutilCompress
|
|
compile_fuzzer tests/fuzzers/bn256 FuzzAdd fuzzBn256Add
|
|
compile_fuzzer tests/fuzzers/bn256 FuzzMul fuzzBn256Mul
|
|
compile_fuzzer tests/fuzzers/bn256 FuzzPair fuzzBn256Pair
|
|
compile_fuzzer tests/fuzzers/runtime Fuzz fuzzVmRuntime
|
|
compile_fuzzer tests/fuzzers/keystore Fuzz fuzzKeystore
|
|
compile_fuzzer tests/fuzzers/txfetcher Fuzz fuzzTxfetcher
|
|
compile_fuzzer tests/fuzzers/rlp Fuzz fuzzRlp
|
|
compile_fuzzer tests/fuzzers/trie Fuzz fuzzTrie
|
|
compile_fuzzer tests/fuzzers/stacktrie Fuzz fuzzStackTrie
|
|
compile_fuzzer tests/fuzzers/difficulty Fuzz fuzzDifficulty
|
|
compile_fuzzer tests/fuzzers/abi Fuzz fuzzAbi
|
|
compile_fuzzer tests/fuzzers/les Fuzz fuzzLes
|
|
compile_fuzzer tests/fuzzers/secp256k1 Fuzz fuzzSecp256k1
|
|
compile_fuzzer tests/fuzzers/vflux FuzzClientPool fuzzClientPool
|
|
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzG1Add fuzz_g1_add
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzG1Mul fuzz_g1_mul
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzG1MultiExp fuzz_g1_multiexp
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzG2Add fuzz_g2_add
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzG2Mul fuzz_g2_mul
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzG2MultiExp fuzz_g2_multiexp
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzPairing fuzz_pairing
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzMapG1 fuzz_map_g1
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzMapG2 fuzz_map_g2
|
|
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzCrossG1Add fuzz_cross_g1_add
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzCrossG1MultiExp fuzz_cross_g1_multiexp
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzCrossG2Add fuzz_cross_g2_add
|
|
compile_fuzzer tests/fuzzers/bls12381 FuzzCrossPairing fuzz_cross_pairing
|
|
|
|
compile_fuzzer tests/fuzzers/snap FuzzARange fuzz_account_range
|
|
compile_fuzzer tests/fuzzers/snap FuzzSRange fuzz_storage_range
|
|
compile_fuzzer tests/fuzzers/snap FuzzByteCodes fuzz_byte_codes
|
|
compile_fuzzer tests/fuzzers/snap FuzzTrieNodes fuzz_trie_nodes
|
|
|
|
#TODO: move this to tests/fuzzers, if possible
|
|
compile_fuzzer crypto/blake2b Fuzz fuzzBlake2b
|