mirror of https://github.com/google/oss-fuzz.git
211 lines
8.5 KiB
Docker
211 lines
8.5 KiB
Docker
# Copyright 2021 Google LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
FROM gcr.io/oss-fuzz-base/base-clang
|
|
|
|
COPY install_deps.sh /
|
|
RUN /install_deps.sh && rm /install_deps.sh
|
|
|
|
# Build and install latest Python 3 (3.8.3).
|
|
ENV PYTHON_VERSION 3.8.3
|
|
RUN export PYTHON_DEPS="\
|
|
zlib1g-dev \
|
|
libncurses5-dev \
|
|
libgdbm-dev \
|
|
libnss3-dev \
|
|
libssl-dev \
|
|
libsqlite3-dev \
|
|
libreadline-dev \
|
|
libffi-dev \
|
|
libbz2-dev \
|
|
liblzma-dev" && \
|
|
unset CFLAGS CXXFLAGS && \
|
|
apt-get install -y $PYTHON_DEPS && \
|
|
cd /tmp && \
|
|
curl -O https://www.python.org/ftp/python/$PYTHON_VERSION/Python-$PYTHON_VERSION.tar.xz && \
|
|
tar -xvf Python-$PYTHON_VERSION.tar.xz && \
|
|
cd Python-$PYTHON_VERSION && \
|
|
./configure --enable-optimizations --enable-shared && \
|
|
make -j install && \
|
|
ldconfig && \
|
|
ln -s /usr/bin/python3 /usr/bin/python && \
|
|
cd .. && \
|
|
rm -r /tmp/Python-$PYTHON_VERSION.tar.xz /tmp/Python-$PYTHON_VERSION && \
|
|
rm -rf /usr/local/lib/python3.8/test && \
|
|
apt-get remove -y $PYTHON_DEPS # https://github.com/google/oss-fuzz/issues/3888
|
|
|
|
|
|
ENV CCACHE_VERSION 4.10.2
|
|
RUN cd /tmp && curl -OL https://github.com/ccache/ccache/releases/download/v$CCACHE_VERSION/ccache-$CCACHE_VERSION.tar.xz && \
|
|
tar -xvf ccache-$CCACHE_VERSION.tar.xz && cd ccache-$CCACHE_VERSION && \
|
|
mkdir build && cd build && \
|
|
export LDFLAGS='-lpthread' && \
|
|
cmake -D CMAKE_BUILD_TYPE=Release .. && \
|
|
make -j && make install && \
|
|
rm -rf /tmp/ccache-$CCACHE_VERSION /tmp/ccache-$CCACHE_VERSION.tar.xz
|
|
|
|
# Install six for Bazel rules.
|
|
RUN unset CFLAGS CXXFLAGS && pip3 install -v --no-cache-dir \
|
|
six==1.15.0 && rm -rf /tmp/*
|
|
|
|
# Install Bazel through Bazelisk, which automatically fetches the latest Bazel version.
|
|
ENV BAZELISK_VERSION 1.9.0
|
|
RUN curl -L https://github.com/bazelbuild/bazelisk/releases/download/v$BAZELISK_VERSION/bazelisk-linux-amd64 -o /usr/local/bin/bazel && \
|
|
chmod +x /usr/local/bin/bazel
|
|
|
|
# Default build flags for various sanitizers.
|
|
ENV SANITIZER_FLAGS_address "-fsanitize=address -fsanitize-address-use-after-scope"
|
|
ENV SANITIZER_FLAGS_hwaddress "-fsanitize=hwaddress -fuse-ld=lld -Wno-unused-command-line-argument"
|
|
|
|
# Set of '-fsanitize' flags matches '-fno-sanitize-recover' + 'unsigned-integer-overflow'.
|
|
ENV SANITIZER_FLAGS_undefined "-fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr"
|
|
|
|
# Don't include "function" since it is unsupported on aarch64.
|
|
ENV SANITIZER_FLAGS_undefined_aarch64 "-fsanitize=array-bounds,bool,builtin,enum,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr"
|
|
|
|
ENV SANITIZER_FLAGS_memory "-fsanitize=memory -fsanitize-memory-track-origins"
|
|
|
|
ENV SANITIZER_FLAGS_thread "-fsanitize=thread"
|
|
|
|
ENV SANITIZER_FLAGS_introspector "-O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument"
|
|
|
|
# Do not use any sanitizers in the coverage build.
|
|
ENV SANITIZER_FLAGS_coverage ""
|
|
|
|
# We use unsigned-integer-overflow as an additional coverage signal and have to
|
|
# suppress error messages. See https://github.com/google/oss-fuzz/issues/910.
|
|
ENV UBSAN_OPTIONS="silence_unsigned_overflow=1"
|
|
|
|
# To suppress warnings from binaries running during compilation.
|
|
ENV DFSAN_OPTIONS='warn_unimplemented=0'
|
|
|
|
# Default build flags for coverage feedback.
|
|
ENV COVERAGE_FLAGS="-fsanitize=fuzzer-no-link"
|
|
|
|
# Use '-Wno-unused-command-line-argument' to suppress "warning: -ldl: 'linker' input unused"
|
|
# messages which are treated as errors by some projects.
|
|
ENV COVERAGE_FLAGS_coverage "-fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument"
|
|
|
|
# Default sanitizer, fuzzing engine and architecture to use.
|
|
ENV SANITIZER="address"
|
|
ENV FUZZING_ENGINE="libfuzzer"
|
|
ENV ARCHITECTURE="x86_64"
|
|
|
|
# DEPRECATED - NEW CODE SHOULD NOT USE THIS. OLD CODE SHOULD STOP. Please use
|
|
# LIB_FUZZING_ENGINE instead.
|
|
# Path to fuzzing engine library to support some old users of
|
|
# LIB_FUZZING_ENGINE.
|
|
ENV LIB_FUZZING_ENGINE_DEPRECATED="/usr/lib/libFuzzingEngine.a"
|
|
|
|
# Argument passed to compiler to link against fuzzing engine.
|
|
# Defaults to the path, but is "-fsanitize=fuzzer" in libFuzzer builds.
|
|
ENV LIB_FUZZING_ENGINE="/usr/lib/libFuzzingEngine.a"
|
|
|
|
# TODO: remove after tpm2 catchup.
|
|
ENV FUZZER_LDFLAGS ""
|
|
|
|
WORKDIR $SRC
|
|
|
|
RUN git clone https://github.com/AFLplusplus/AFLplusplus.git aflplusplus && \
|
|
cd aflplusplus && \
|
|
git checkout daaefcddc063b356018c29027494a00bcfc3e240 && \
|
|
wget --no-check-certificate -O oss.sh https://raw.githubusercontent.com/vanhauser-thc/binary_blobs/master/oss.sh && \
|
|
rm -rf .git && \
|
|
chmod 755 oss.sh
|
|
|
|
# Do precompiles before copying other scripts for better cache efficiency.
|
|
COPY precompile_afl /usr/local/bin/
|
|
RUN precompile_afl
|
|
|
|
RUN cd $SRC && \
|
|
curl -L -O https://github.com/google/honggfuzz/archive/oss-fuzz.tar.gz && \
|
|
mkdir honggfuzz && \
|
|
cd honggfuzz && \
|
|
tar -xz --strip-components=1 -f $SRC/oss-fuzz.tar.gz && \
|
|
rm -rf examples $SRC/oss-fuzz.tar.gz
|
|
|
|
|
|
COPY precompile_honggfuzz /usr/local/bin/
|
|
RUN precompile_honggfuzz
|
|
|
|
RUN cd $SRC && \
|
|
git clone https://github.com/google/fuzztest && \
|
|
cd fuzztest && \
|
|
git checkout a37d133f714395cabc20dd930969a889495c9f53 && \
|
|
rm -rf .git
|
|
|
|
ENV CENTIPEDE_BIN_DIR=$SRC/fuzztest/bazel-bin
|
|
COPY precompile_centipede /usr/local/bin/
|
|
RUN precompile_centipede
|
|
|
|
COPY sanitizers /usr/local/lib/sanitizers
|
|
|
|
COPY bazel_build_fuzz_tests \
|
|
cargo \
|
|
compile \
|
|
compile_afl \
|
|
compile_centipede \
|
|
compile_honggfuzz \
|
|
compile_fuzztests.sh \
|
|
compile_go_fuzzer \
|
|
compile_javascript_fuzzer \
|
|
compile_libfuzzer \
|
|
compile_native_go_fuzzer \
|
|
compile_python_fuzzer \
|
|
debug_afl \
|
|
# Go, JavaScript, Java, Python, Rust, and Swift installation scripts.
|
|
install_go.sh \
|
|
install_javascript.sh \
|
|
install_java.sh \
|
|
install_python.sh \
|
|
install_ruby.sh \
|
|
install_rust.sh \
|
|
install_swift.sh \
|
|
python_coverage_helper.py \
|
|
bash_parser.py \
|
|
srcmap \
|
|
write_labels.py \
|
|
/usr/local/bin/
|
|
|
|
# TODO: Build this as part of a multi-stage build.
|
|
ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang-jcc /usr/local/bin/
|
|
ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang++-jcc /usr/local/bin
|
|
ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang-jcc2 /usr/local/bin/
|
|
ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang++-jcc2 /usr/local/bin
|
|
RUN chmod +x /usr/local/bin/clang-jcc /usr/local/bin/clang++-jcc /usr/local/bin/clang-jcc2 /usr/local/bin/clang++-jcc2
|
|
|
|
COPY llvmsymbol.diff $SRC
|
|
COPY detect_repo.py /opt/cifuzz/
|
|
COPY bazel.bazelrc /root/.bazelrc
|
|
|
|
# Set up ccache binary and cache directory.
|
|
# /ccache/bin will contain the compiler wrappers, and /ccache/cache will
|
|
# contain the actual cache, which can be saved.
|
|
# To use this, set PATH=/ccache/bin:$PATH.
|
|
RUN mkdir -p /ccache/bin && mkdir -p /ccache/cache && \
|
|
ln -s /usr/local/bin/ccache /ccache/bin/clang && \
|
|
ln -s /usr/local/bin/ccache /ccache/bin/clang++ && \
|
|
ln -s /usr/local/bin/ccache /ccache/bin/clang-jcc && \
|
|
ln -s /usr/local/bin/ccache /ccache/bin/clang++-jcc
|
|
ENV CCACHE_DIR /ccache/cache
|
|
|
|
# Don't check that the compiler is the same, so we can switch between jcc and
|
|
# clang under the hood and re-use the same build cache.
|
|
ENV CCACHE_COMPILERCHECK none
|
|
ENV CCACHE_COMPILERTYPE clang
|
|
|
|
CMD ["compile"]
|