blob: 264033b0004bfcb4653ca1c0df41be8037d99da6 [file] [log] [blame]
# Copyright 2020 The Pigweed Authors
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may not
# use this file except in compliance with the License. You may obtain a copy of
# the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations under
# the License.
import("//build_overrides/pigweed.gni")
import("$dir_pw_build/target_types.gni")
import("$dir_pw_docgen/docs.gni")
import("$dir_pw_fuzzer/fuzzer.gni")
import("$dir_pw_fuzzer/oss_fuzz.gni")
config("default_config") {
include_dirs = [ "public" ]
}
# This is added automatically by the `pw_fuzzer` template.
config("fuzzing") {
common_flags = [ "-fsanitize=fuzzer" ]
cflags = common_flags
ldflags = common_flags
}
config("sanitize_address") {
cflags = [ "-fsanitize=address" ]
ldflags = cflags
}
config("sanitize_memory") {
cflags = [ "-fsanitize=memory" ]
ldflags = cflags
}
config("sanitize_undefined") {
cflags = [ "-fsanitize=undefined" ]
ldflags = cflags
}
config("sanitize_coverage") {
cflags = [
"-fprofile-instr-generate",
"-fcoverage-mapping",
]
ldflags = cflags
}
# OSS-Fuzz needs to be able to specify its own compilers and add flags.
config("oss_fuzz") {
# OSS-Fuzz doesn't always link with -fsanitize=fuzzer, sometimes it uses
#-fsanitize=fuzzer-no-link and provides the fuzzing engine explicitly to be
# passed to the linker.
ldflags = [ getenv("LIB_FUZZING_ENGINE") ]
}
config("oss_fuzz_extra") {
cflags_c = oss_fuzz_extra_cflags_c
cflags_cc = oss_fuzz_extra_cflags_cc
ldflags = oss_fuzz_extra_ldflags
}
pw_source_set("pw_fuzzer") {
public_configs = [ ":default_config" ]
public = [
"public/pw_fuzzer/asan_interface.h",
"public/pw_fuzzer/fuzzed_data_provider.h",
]
public_deps = [ "$dir_pw_log" ]
}
pw_source_set("run_as_unit_test") {
configs = [ ":default_config" ]
sources = [ "pw_fuzzer_disabled.cc" ]
deps = [
dir_pw_log,
dir_pw_unit_test,
]
}
# See https://llvm.org/docs/LibFuzzer.html#fuzzer-friendly-build-mode
config("fuzzing_build_mode_unsafe_for_production") {
defines = [ "FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION" ]
}
config("fuzzing_verbose_logging") {
defines = [ "FUZZING_VERBOSE_LOGGING" ]
}
pw_doc_group("docs") {
inputs = [ "doc_resources/pw_fuzzer_coverage_guided.png" ]
sources = [ "docs.rst" ]
}
# Sample fuzzer
pw_fuzzer("toy_fuzzer") {
sources = [ "examples/toy_fuzzer.cc" ]
deps = [ "$dir_pw_string" ]
}
pw_test_group("tests") {
tests = [ ":toy_fuzzer" ]
}