#!/bin/bash -eux # Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ################################################################################ fuzzer_path=$1 shift 1 fuzzer_basename=$(basename -s .py $fuzzer_path) fuzzer_package=${fuzzer_basename}.pkg PYFUZZ_WORKPATH=$SRC/pyfuzzworkdir/ FUZZ_WORKPATH=$PYFUZZ_WORKPATH/$fuzzer_basename # In coverage mode prepend coverage logic to the fuzzer source if [[ $SANITIZER = *coverage* ]]; then cat < coverage_wrapper.py ###### Coverage stub import atexit import coverage cov = coverage.coverage(data_file='.coverage', cover_pylib=True) cov.start() # Register an exist handler that will print coverage def exit_handler(): cov.stop() cov.save() atexit.register(exit_handler) ####### End of coverage stub EOF # Prepend stub and create tmp file cat coverage_wrapper.py $fuzzer_path > tmp_fuzzer_coverage.py # Overwrite existing fuzzer with new fuzzer that has stub mv tmp_fuzzer_coverage.py $fuzzer_path fi rm -rf $PYFUZZ_WORKPATH mkdir $PYFUZZ_WORKPATH $FUZZ_WORKPATH pyinstaller --distpath $OUT --workpath=$FUZZ_WORKPATH --onefile --name $fuzzer_package "$@" $fuzzer_path # Disable executable bit from package as OSS-Fuzz uses executable bits to # identify fuzz targets. We re-enable the executable bit in wrapper script # below. chmod -x $OUT/$fuzzer_package # In coverage mode save source files of dependencies in pyinstalled binary if [[ $SANITIZER = *coverage* ]]; then rm -rf /medio/ python3 /usr/local/bin/python_coverage_helper.py $FUZZ_WORKPATH "/medio" zip -r $fuzzer_package.deps.zip /medio mv $fuzzer_package.deps.zip $OUT/ fi # Create execution wrapper. echo "#!/bin/sh # LLVMFuzzerTestOneInput for fuzzer detection. this_dir=\$(dirname \"\$0\") chmod +x \$this_dir/$fuzzer_package LD_PRELOAD=\$this_dir/sanitizer_with_fuzzer.so \ ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_leaks=0 \ \$this_dir/$fuzzer_package \$@" > $OUT/$fuzzer_basename chmod +x $OUT/$fuzzer_basename