#!/bin/bash -eu # Copyright 2018 Google Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ################################################################################ declare -r FUZZ_TARGET_QUERY=' let all_fuzz_tests = attr(tags, "fuzz_target", "...") in $all_fuzz_tests - attr(tags, "no_fuzz", $all_fuzz_tests) ' if [ -n "${OSS_FUZZ_CI-}" ] then # CI has fewer resources so restricting to a small number of fuzz targets. # Choosing the header_parser, and header_map_impl. declare -r OSS_FUZZ_TARGETS="$(bazel query "${FUZZ_TARGET_QUERY}" | grep ':header' | sed 's/$/_oss_fuzz/')" else declare -r OSS_FUZZ_TARGETS="$(bazel query "${FUZZ_TARGET_QUERY}" | sed 's/$/_oss_fuzz/')" fi declare -r EXTRA_BAZEL_FLAGS="$( if [ -n "$CC" ]; then echo "--action_env=CC=${CC}" fi if [ -n "$CXX" ]; then echo "--action_env=CXX=${CXX}" fi if [ "$SANITIZER" = "undefined" ] then # Bazel uses clang to link binary, which does not link clang_rt ubsan library for C++ automatically. # See issue: https://github.com/bazelbuild/bazel/issues/8777 echo "--linkopt=$(find $(llvm-config --libdir) -name libclang_rt.ubsan_standalone_cxx-x86_64.a | head -1)" echo "--linkopt=-fsanitize=undefined" elif [ "$SANITIZER" = "address" ] then echo "--copt=-D__SANITIZE_ADDRESS__" "--copt=-DADDRESS_SANITIZER=1" "--linkopt=-fsanitize=address" fi )" # The Envoy build configuration may clobber CFLAGS/CXXFLAGS, so we use separate # environment variables that are understood by rules_fuzzing. export FUZZING_CFLAGS="$CFLAGS" export FUZZING_CXXFLAGS="$CXXFLAGS" # Disable instrumentation in various external libraries. These # are fuzzed elsewhere. # The following disables both coverage-instrumentation and other sanitizer instrumentation. # We disable instrumentation in: # antlr4 # google_protobuf # absl # googltest # grpc # boringssl # re2 # upb # brotli # cel_cpp # yaml_cpp # wasm_cpp_host # libprotobuf-mutator # google_url (gurl) # lightstep_tracer # In addition to this, we disable instrumentation in all *.pb.cc (protobuf-generated files) # and everything in the bazel-out directory. declare -r DI="$( if [ "$SANITIZER" != "coverage" ] then # Envoy code. Disable coverage instrumentation echo " --per_file_copt=^.*source/extensions/access_loggers/.*\.cc\$@-fsanitize-coverage=0" echo " --per_file_copt=^.*source/common/protobuf/.*\.cc\$@-fsanitize-coverage=0" # Envoy test code. Disable coverage instrumentation echo " --per_file_copt=^.*test/.*\.cc\$@-fsanitize-coverage=0" # External dependencies. Disable all instrumentation. echo " --per_file_copt=^.*com_google_protobuf.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_google_absl.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_github_grpc_grpc.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*boringssl.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_googlesource_code_re2.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*upb.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*org_brotli.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_google_cel_cpp.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_github_jbeder_yaml_cpp.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*proxy_wasm_cpp_host/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_github_google_libprotobuf_mutator/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_googlesource_googleurl/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*com_lightstep_tracer_cpp/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" # External dependency which needs to be compiled with sanitizers. Disable # coverage instrumentation. echo " --per_file_copt=^.*antlr4_runtimes.*\.cpp\$@-fsanitize-coverage=0" echo " --per_file_copt=^.*googletest.*\.cc\$@-fsanitize-coverage=0" # All protobuf code and code in bazel-out echo " --per_file_copt=^.*\.pb\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" echo " --per_file_copt=^.*bazel-out/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all" fi )" # Asssuming we have ~32 cores and ~28.8 GiB RAM. By limiting the # number of CPUs (--local_cpu_resources) we limit the per-CPU mem-usage. # Benchmark about 3.6 GB per CPU (8 threads for 28.8 GB RAM) # TODO(asraa): Remove deprecation warnings when Envoy and deps moves to C++17 bazel build --verbose_failures --dynamic_mode=off ${DI} \ --spawn_strategy=standalone --genrule_strategy=standalone \ --local_cpu_resources=HOST_CPUS*0.256 \ --//source/extensions/wasm_runtime/v8:enabled=false \ --build_tag_filters=-no_asan --config=oss-fuzz \ ${EXTRA_BAZEL_FLAGS} \ ${OSS_FUZZ_TARGETS[*]} # Profiling with coverage requires that we resolve+copy all Bazel symlinks and # also remap everything under proc/self/cwd to correspond to Bazel build paths. if [ "$SANITIZER" = "coverage" ] then # The build invoker looks for sources in $SRC, but it turns out that we need # to not be buried under src/, paths are expected at out/proc/self/cwd by # the profiler. declare -r REMAP_PATH="${OUT}/proc/self/cwd" mkdir -p "${REMAP_PATH}" # Copy the cc and header files that will be covered. rsync -av "${SRC}"/envoy/source "${REMAP_PATH}" rsync -av "${SRC}"/envoy/test "${REMAP_PATH}" rsync -av "${SRC}"/envoy/envoy "${REMAP_PATH}" # Envoy currently uses a modified version of http_parser (see: # https://github.com/envoyproxy/envoy/issues/19749). declare -r BAZEL_EXTERNAL_REMAP_PATH="${REMAP_PATH}/external/envoy/bazel/external" mkdir -p "${BAZEL_EXTERNAL_REMAP_PATH}" rsync -av "${SRC}"/envoy/bazel/external/http_parser "${BAZEL_EXTERNAL_REMAP_PATH}" # Remove filesystem loop manually. rm -rf "${SRC}"/envoy/bazel-envoy/external/envoy # Clean up symlinks with a missing referrant. find "${SRC}"/envoy/bazel-envoy/external -follow -type l -ls -delete || echo "Symlink cleanup soft fail" rsync -avLk "${SRC}"/envoy/bazel-envoy/external "${REMAP_PATH}" # For .h, and some generated artifacts, we need bazel-out/. Need to heavily # filter out the build objects from bazel-out/. Also need to resolve symlinks, # since they don't make sense outside the build container. declare -r RSYNC_FILTER_ARGS=("--include" "*.h" "--include" "*.cc" "--include" \ "*.hpp" "--include" "*.cpp" "--include" "*.c" "--include" "*/" "--exclude" "*") rsync -avLk "${RSYNC_FILTER_ARGS[@]}" "${SRC}"/envoy/bazel-out "${REMAP_PATH}" rsync -avLkR "${RSYNC_FILTER_ARGS[@]}" "${HOME}" "${OUT}" rsync -avLkR "${RSYNC_FILTER_ARGS[@]}" /tmp "${OUT}" fi for oss_fuzz_archive in $(find bazel-bin/ -name '*_oss_fuzz.tar'); do tar -xvf "${oss_fuzz_archive}" -C "${OUT}" done # Cleanup bazel- symlinks to avoid oss-fuzz trying to copy out of the build # cache. rm -f bazel-*