5 export SANITIZER
=${SANITIZER:-address}
6 flags
="-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION"
7 coverage_flags
="-fsanitize=fuzzer-no-link"
9 sanitizer_flags
="-fsanitize=address -fsanitize-address-use-after-scope"
10 if [[ "$SANITIZER" == "undefined" ]]; then
11 sanitizer_flags
="-fsanitize=undefined"
12 elif [[ "$SANITIZER" == "memory" ]]; then
13 sanitizer_flags
="-fsanitize=memory -fsanitize-memory-track-origins"
16 export CC
=${CC:-clang}
17 export CFLAGS
=${CFLAGS:-$flags $sanitizer_flags $coverage_flags}
19 export CXX
=${CXX:-clang++}
20 export CXXFLAGS
=${CXXFLAGS:-$flags $sanitizer_flags $coverage_flags}
22 export OUT
=${OUT:-$(pwd)/out}
25 export LIB_FUZZING_ENGINE
=${LIB_FUZZING_ENGINE:--fsanitize=fuzzer}
27 # -fsanitize=... isn't compatible with -Wl,-no-undefined
28 # https://github.com/google/sanitizers/issues/380
29 sed -i 's/-Wl,-no-undefined *\\/\\/' src
/lxc
/Makefile.am
31 # AFL++ and hoggfuzz are both incompatible with lto=thin apparently
32 sed -i '/-flto=thin/d' configure.ac
34 # turn off the libutil dependency
35 sed -i 's/^AC_CHECK_LIB(util/#/' configure.ac
45 --disable-capabilities
49 $CC -c -o fuzz-lxc-config-read.o
$CFLAGS -Isrc -Isrc/lxc src
/tests
/fuzz-lxc-config-read.c
50 $CXX $CXXFLAGS $LIB_FUZZING_ENGINE fuzz-lxc-config-read.o src
/lxc
/.libs
/liblxc.a
-o $OUT/fuzz-lxc-config-read
52 perl
-lne 'if (/config_jump_table\[\]\s*=/../^}/) { /"([^"]+)"/ && print "$1=" }' src
/lxc
/confile.c
>doc
/examples
/all-keys.conf
53 [[ -s doc
/examples
/all-keys.conf
]]
54 zip -r $OUT/fuzz-lxc-config-read_seed_corpus.
zip doc
/examples