mirror of https://github.com/google/oss-fuzz.git
91 lines
3.1 KiB
Bash
91 lines
3.1 KiB
Bash
|
#!/bin/bash -eu
|
||
|
# Copyright 2019 Google Inc.
|
||
|
#
|
||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
# you may not use this file except in compliance with the License.
|
||
|
# You may obtain a copy of the License at
|
||
|
#
|
||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||
|
#
|
||
|
# Unless required by applicable law or agreed to in writing, software
|
||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
# See the License for the specific language governing permissions and
|
||
|
# limitations under the License.
|
||
|
#
|
||
|
################################################################################
|
||
|
|
||
|
# Ignore memory leaks from python scripts invoked in the build
|
||
|
export ASAN_OPTIONS="detect_leaks=0"
|
||
|
export MSAN_OPTIONS="halt_on_error=0:exitcode=0:report_umrs=0"
|
||
|
|
||
|
# Remove -pthread from CFLAGS, this trips up ./configure
|
||
|
# which thinks pthreads are available without any CLI flags
|
||
|
CFLAGS=${CFLAGS//"-pthread"/}
|
||
|
|
||
|
FLAGS=()
|
||
|
case $SANITIZER in
|
||
|
address)
|
||
|
FLAGS+=("--with-address-sanitizer")
|
||
|
;;
|
||
|
memory)
|
||
|
FLAGS+=("--with-memory-sanitizer")
|
||
|
# installing ensurepip takes a while with MSAN instrumentation, so
|
||
|
# we disable it here
|
||
|
FLAGS+=("--without-ensurepip")
|
||
|
# -msan-keep-going is needed to allow MSAN's halt_on_error to function
|
||
|
FLAGS+=("CFLAGS=-mllvm -msan-keep-going=1")
|
||
|
;;
|
||
|
undefined)
|
||
|
FLAGS+=("--with-undefined-behavior-sanitizer")
|
||
|
;;
|
||
|
esac
|
||
|
|
||
|
export CPYTHON_INSTALL_PATH=$OUT/cpython-install
|
||
|
rm -rf $CPYTHON_INSTALL_PATH
|
||
|
mkdir $CPYTHON_INSTALL_PATH
|
||
|
|
||
|
cd $SRC/cpython
|
||
|
cp $SRC/python-library-fuzzers/python_coverage.h Python/
|
||
|
|
||
|
# Patch the interpreter to record code coverage
|
||
|
sed -i '1 s/^.*$/#include "python_coverage.h"/g' Python/ceval.c
|
||
|
sed -i 's/case TARGET\(.*\): {/\0\nfuzzer_record_code_coverage(f->f_code, f->f_lasti);/g' Python/ceval.c
|
||
|
|
||
|
./configure "${FLAGS[@]}" --prefix=$CPYTHON_INSTALL_PATH
|
||
|
make -j$(nproc)
|
||
|
make install
|
||
|
|
||
|
cd $SRC/python-library-fuzzers
|
||
|
rm $CPYTHON_INSTALL_PATH/lib/python3.9/lib-dynload/_tkinter*.so
|
||
|
make
|
||
|
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-html $OUT/
|
||
|
cp $SRC/python-library-fuzzers/html.py $OUT/
|
||
|
zip -j $OUT/fuzzer-html_seed_corpus.zip corp-html/*
|
||
|
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-email $OUT/
|
||
|
cp $SRC/python-library-fuzzers/email.py $OUT/
|
||
|
zip -j $OUT/fuzzer-email_seed_corpus.zip corp-email/*
|
||
|
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-httpclient $OUT/
|
||
|
cp $SRC/python-library-fuzzers/httpclient.py $OUT/
|
||
|
zip -j $OUT/fuzzer-httpclient_seed_corpus.zip corp-httpclient/*
|
||
|
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-json $OUT/
|
||
|
cp $SRC/python-library-fuzzers/json.py $OUT/
|
||
|
zip -j $OUT/fuzzer-json_seed_corpus.zip corp-json/*
|
||
|
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-difflib $OUT/
|
||
|
cp $SRC/python-library-fuzzers/difflib.py $OUT/
|
||
|
zip -j $OUT/fuzzer-difflib_seed_corpus.zip corp-difflib/*
|
||
|
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-csv $OUT/
|
||
|
cp $SRC/python-library-fuzzers/csv.py $OUT/
|
||
|
zip -j $OUT/fuzzer-csv_seed_corpus.zip corp-csv/*
|
||
|
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-decode $OUT/
|
||
|
cp $SRC/python-library-fuzzers/decode.py $OUT/
|
||
|
zip -j $OUT/fuzzer-decode_seed_corpus.zip corp-decode/*
|
||
|
cp $SRC/python-library-fuzzers/fuzzer-decode.dict $OUT/
|