mirror of
https://github.com/meshtastic/firmware.git
synced 2025-02-01 10:19:59 +00:00
b0fe5ef8ba
* Initial commit of a fuzzer for Meshtastic. * Use a max of 5 for the phone queues * Only write files to the temp dir * Limitless queue + fuzzer = lots of ram :) * Use $PIO_ENV for path to program * spelling: s/is/to/ * Use loopCanSleep instead of a lock in Router * realHardware allows full use of a CPU core * Ignore checkov CKV_DOCKER_2 & CKV_DOCKER_3 * Add Atak seed * Fix lint issues in build.sh * Use exception to exit from portduino_main * Separate build & source files into $WORK & $SRC * Use an ephemeral port for the API server * Include CXXFLAGS in the link step * Read all shared libraries * Use a separate work directory for each sanitizer --------- Co-authored-by: Ben Meadors <benmmeadors@gmail.com>
72 lines
2.3 KiB
Bash
72 lines
2.3 KiB
Bash
#!/bin/bash -eu
|
|
|
|
# Build Meshtastic and a few needed dependencies using clang++
|
|
# and the OSS-Fuzz required build flags.
|
|
|
|
env
|
|
|
|
cd "$SRC"
|
|
NPROC=$(nproc || echo 1)
|
|
|
|
LDFLAGS=-lpthread cmake -S "$SRC/yaml-cpp" -B "$WORK/yaml-cpp/$SANITIZER" \
|
|
-DBUILD_SHARED_LIBS=OFF
|
|
cmake --build "$WORK/yaml-cpp/$SANITIZER" -j "$NPROC"
|
|
cmake --install "$WORK/yaml-cpp/$SANITIZER" --prefix /usr
|
|
|
|
cmake -S "$SRC/orcania" -B "$WORK/orcania/$SANITIZER" \
|
|
-DBUILD_STATIC=ON
|
|
cmake --build "$WORK/orcania/$SANITIZER" -j "$NPROC"
|
|
cmake --install "$WORK/orcania/$SANITIZER" --prefix /usr
|
|
|
|
cmake -S "$SRC/yder" -B "$WORK/yder/$SANITIZER" \
|
|
-DBUILD_STATIC=ON -DWITH_JOURNALD=OFF
|
|
cmake --build "$WORK/yder/$SANITIZER" -j "$NPROC"
|
|
cmake --install "$WORK/yder/$SANITIZER" --prefix /usr
|
|
|
|
cmake -S "$SRC/ulfius" -B "$WORK/ulfius/$SANITIZER" \
|
|
-DBUILD_STATIC=ON -DWITH_JANSSON=OFF -DWITH_CURL=OFF -DWITH_WEBSOCKET=OFF
|
|
cmake --build "$WORK/ulfius/$SANITIZER" -j "$NPROC"
|
|
cmake --install "$WORK/ulfius/$SANITIZER" --prefix /usr
|
|
|
|
cd "$SRC/firmware"
|
|
|
|
PLATFORMIO_EXTRA_SCRIPTS=$(echo -e "pre:.clusterfuzzlite/platformio-clusterfuzzlite-pre.py\npost:.clusterfuzzlite/platformio-clusterfuzzlite-post.py")
|
|
STATIC_LIBS=$(pkg-config --libs --static libulfius openssl libgpiod yaml-cpp bluez --silence-errors)
|
|
export PLATFORMIO_EXTRA_SCRIPTS
|
|
export STATIC_LIBS
|
|
export PLATFORMIO_WORKSPACE_DIR="$WORK/pio/$SANITIZER"
|
|
export TARGET_CC=$CC
|
|
export TARGET_CXX=$CXX
|
|
export TARGET_LD=$CXX
|
|
export TARGET_AR=llvm-ar
|
|
export TARGET_AS=llvm-as
|
|
export TARGET_OBJCOPY=llvm-objcopy
|
|
export TARGET_RANLIB=llvm-ranlib
|
|
|
|
mkdir -p "$OUT/lib"
|
|
|
|
cp .clusterfuzzlite/*_fuzzer.options "$OUT/"
|
|
|
|
for f in .clusterfuzzlite/*_fuzzer.cpp; do
|
|
fuzzer=$(basename "$f" .cpp)
|
|
cp -f "$f" src/fuzzer.cpp
|
|
pio run -vvv --environment "$PIO_ENV"
|
|
program="$PLATFORMIO_WORKSPACE_DIR/build/$PIO_ENV/program"
|
|
cp "$program" "$OUT/$fuzzer"
|
|
|
|
# Copy shared libraries used by the fuzzer.
|
|
read -d '' -ra shared_libs < <(ldd "$program" | sed -n 's/[^=]\+=> \([^ ]\+\).*/\1/p') || true
|
|
cp -f "${shared_libs[@]}" "$OUT/lib/"
|
|
|
|
# Build the initial fuzzer seed corpus.
|
|
corpus_name="${fuzzer}_seed_corpus"
|
|
corpus_generator="$PWD/.clusterfuzzlite/${corpus_name}.py"
|
|
if [[ -f $corpus_generator ]]; then
|
|
mkdir "$corpus_name"
|
|
pushd "$corpus_name"
|
|
python3 "$corpus_generator"
|
|
popd
|
|
zip -D "$OUT/${corpus_name}.zip" "$corpus_name"/*
|
|
fi
|
|
done
|