mirror of https://github.com/google/oss-fuzz.git
85 lines
2.9 KiB
Bash
85 lines
2.9 KiB
Bash
#!/bin/bash
|
|
# Copyright 2022 Google LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
# Ignore memory leaks from python scripts invoked in the build
|
|
export ASAN_OPTIONS="detect_leaks=0"
|
|
export MSAN_OPTIONS="halt_on_error=0:exitcode=0:report_umrs=0"
|
|
|
|
# Remove -pthread from CFLAGS, this trips up ./configure
|
|
# which thinks pthreads are available without any CLI flags
|
|
CFLAGS=${CFLAGS//"-pthread"/}
|
|
|
|
# Ensure assert statements are enabled. It may help identify problems
|
|
# earlier if those fire.
|
|
CFLAGS="${CFLAGS} -UNDEBUG"
|
|
|
|
# We use some internal CPython API.
|
|
CFLAGS="${CFLAGS} -IInclude/internal/"
|
|
|
|
FLAGS=()
|
|
case $SANITIZER in
|
|
address)
|
|
FLAGS+=("--with-address-sanitizer")
|
|
;;
|
|
memory)
|
|
FLAGS+=("--with-memory-sanitizer")
|
|
# installing ensurepip takes a while with MSAN instrumentation, so
|
|
# we disable it here
|
|
FLAGS+=("--without-ensurepip")
|
|
# -msan-keep-going is needed to allow MSAN's halt_on_error to function
|
|
FLAGS+=("CFLAGS=-mllvm -msan-keep-going=1")
|
|
;;
|
|
undefined)
|
|
FLAGS+=("--with-undefined-behavior-sanitizer")
|
|
;;
|
|
esac
|
|
./configure "${FLAGS[@]:-}" --prefix $OUT
|
|
|
|
# We use altinstall to avoid having the Makefile create symlinks
|
|
make -j$(nproc) altinstall
|
|
|
|
FUZZ_DIR=Modules/_xxtestfuzz
|
|
for fuzz_test in $(cat $FUZZ_DIR/fuzz_tests.txt)
|
|
do
|
|
# Build (but don't link) the fuzzing stub with a C compiler
|
|
$CC $CFLAGS $($OUT/bin/python*-config --cflags) $FUZZ_DIR/fuzzer.c \
|
|
-D _Py_FUZZ_ONE -D _Py_FUZZ_$fuzz_test -c -Wno-unused-function \
|
|
-o $WORK/$fuzz_test.o
|
|
# Link with C++ compiler to appease libfuzzer
|
|
$CXX $CXXFLAGS -rdynamic $WORK/$fuzz_test.o -o $OUT/$fuzz_test \
|
|
$LIB_FUZZING_ENGINE $($OUT/bin/python*-config --ldflags --embed)
|
|
|
|
# Zip up and copy any seed corpus
|
|
if [ -d "${FUZZ_DIR}/${fuzz_test}_corpus" ]; then
|
|
zip -j "${OUT}/${fuzz_test}_seed_corpus.zip" ${FUZZ_DIR}/${fuzz_test}_corpus/*
|
|
fi
|
|
# Copy over the dictionary for this test
|
|
if [ -e "${FUZZ_DIR}/dictionaries/${fuzz_test}.dict" ]; then
|
|
cp "${FUZZ_DIR}/dictionaries/${fuzz_test}.dict" "$OUT/${fuzz_test}.dict"
|
|
fi
|
|
done
|
|
|
|
# A little bit hacky but we have to copy $OUT/include to
|
|
# $OUT/$OUT/include as the coverage build needs all source
|
|
# files used in execution and expects it to be there.
|
|
# See projects/tensorflow/build.sh for prior art
|
|
if [ "$SANITIZER" = "coverage" ]
|
|
then
|
|
mkdir -p $OUT/$OUT
|
|
cp -r $OUT/include $OUT/$OUT/
|
|
fi
|