mirror of https://github.com/google/oss-fuzz.git
166 lines
7.3 KiB
Bash
Executable File
166 lines
7.3 KiB
Bash
Executable File
#!/bin/bash -eu
|
|
# Copyright 2018 Google Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
################################################################################
|
|
|
|
declare -r FUZZ_TARGET_QUERY='
|
|
let all_fuzz_tests = attr(tags, "fuzz_target", "...") in
|
|
$all_fuzz_tests - attr(tags, "no_fuzz", $all_fuzz_tests)
|
|
'
|
|
|
|
if [ -n "${OSS_FUZZ_CI-}" ]
|
|
then
|
|
# CI has fewer resources so restricting to a small number of fuzz targets.
|
|
# Choosing the header_parser, and header_map_impl.
|
|
declare -r OSS_FUZZ_TARGETS="$(bazel query "${FUZZ_TARGET_QUERY}" | grep ':header' | sed 's/$/_oss_fuzz/')"
|
|
else
|
|
declare -r OSS_FUZZ_TARGETS="$(bazel query "${FUZZ_TARGET_QUERY}" | sed 's/$/_oss_fuzz/')"
|
|
fi
|
|
|
|
declare -r EXTRA_BAZEL_FLAGS="$(
|
|
if [ -n "$CC" ]; then
|
|
echo "--action_env=CC=${CC}"
|
|
fi
|
|
if [ -n "$CXX" ]; then
|
|
echo "--action_env=CXX=${CXX}"
|
|
fi
|
|
if [ "$SANITIZER" = "undefined" ]
|
|
then
|
|
# Bazel uses clang to link binary, which does not link clang_rt ubsan library for C++ automatically.
|
|
# See issue: https://github.com/bazelbuild/bazel/issues/8777
|
|
echo "--linkopt=$(find $(llvm-config --libdir) -name libclang_rt.ubsan_standalone_cxx-x86_64.a | head -1)"
|
|
echo "--linkopt=-fsanitize=undefined"
|
|
elif [ "$SANITIZER" = "address" ]
|
|
then
|
|
echo "--copt=-D__SANITIZE_ADDRESS__" "--copt=-DADDRESS_SANITIZER=1" "--linkopt=-fsanitize=address"
|
|
fi
|
|
)"
|
|
|
|
# The Envoy build configuration may clobber CFLAGS/CXXFLAGS, so we use separate
|
|
# environment variables that are understood by rules_fuzzing.
|
|
export FUZZING_CFLAGS="$CFLAGS"
|
|
export FUZZING_CXXFLAGS="$CXXFLAGS"
|
|
|
|
# Disable instrumentation in various external libraries. These
|
|
# are fuzzed elsewhere.
|
|
# The following disables both coverage-instrumentation and other sanitizer instrumentation.
|
|
# We disable instrumentation in:
|
|
# antlr4
|
|
# google_protobuf
|
|
# absl
|
|
# googltest
|
|
# grpc
|
|
# boringssl
|
|
# re2
|
|
# upb
|
|
# brotli
|
|
# cel_cpp
|
|
# yaml_cpp
|
|
# wasm_cpp_host
|
|
# libprotobuf-mutator
|
|
# google_url (gurl)
|
|
# lightstep_tracer
|
|
# In addition to this, we disable instrumentation in all *.pb.cc (protobuf-generated files)
|
|
# and everything in the bazel-out directory.
|
|
declare -r DI="$(
|
|
if [ "$SANITIZER" != "coverage" ]
|
|
then
|
|
# Envoy code. Disable coverage instrumentation
|
|
echo " --per_file_copt=^.*source/extensions/access_loggers/.*\.cc\$@-fsanitize-coverage=0"
|
|
echo " --per_file_copt=^.*source/common/protobuf/.*\.cc\$@-fsanitize-coverage=0"
|
|
|
|
# Envoy test code. Disable coverage instrumentation
|
|
echo " --per_file_copt=^.*test/.*\.cc\$@-fsanitize-coverage=0"
|
|
|
|
# External dependencies. Disable all instrumentation.
|
|
echo " --per_file_copt=^.*com_google_protobuf.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_google_absl.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_github_grpc_grpc.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*boringssl.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_googlesource_code_re2.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*upb.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*org_brotli.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_google_cel_cpp.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_github_jbeder_yaml_cpp.*\.cpp\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*proxy_wasm_cpp_host/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_github_google_libprotobuf_mutator/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_googlesource_googleurl/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*com_lightstep_tracer_cpp/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
|
|
# External dependency which needs to be compiled with sanitizers. Disable
|
|
# coverage instrumentation.
|
|
echo " --per_file_copt=^.*antlr4_runtimes.*\.cpp\$@-fsanitize-coverage=0"
|
|
echo " --per_file_copt=^.*googletest.*\.cc\$@-fsanitize-coverage=0"
|
|
|
|
# All protobuf code and code in bazel-out
|
|
echo " --per_file_copt=^.*\.pb\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
echo " --per_file_copt=^.*bazel-out/.*\.cc\$@-fsanitize-coverage=0,-fno-sanitize=all"
|
|
fi
|
|
)"
|
|
|
|
|
|
# Asssuming we have ~32 cores and ~28.8 GiB RAM. By limiting the
|
|
# number of CPUs (--local_cpu_resources) we limit the per-CPU mem-usage.
|
|
# Benchmark about 3.6 GB per CPU (8 threads for 28.8 GB RAM)
|
|
# TODO(asraa): Remove deprecation warnings when Envoy and deps moves to C++17
|
|
bazel build --verbose_failures --dynamic_mode=off ${DI} \
|
|
--spawn_strategy=standalone --genrule_strategy=standalone \
|
|
--local_cpu_resources=HOST_CPUS*0.256 \
|
|
--//source/extensions/wasm_runtime/v8:enabled=false \
|
|
--build_tag_filters=-no_asan --config=oss-fuzz \
|
|
${EXTRA_BAZEL_FLAGS} \
|
|
${OSS_FUZZ_TARGETS[*]}
|
|
|
|
# Profiling with coverage requires that we resolve+copy all Bazel symlinks and
|
|
# also remap everything under proc/self/cwd to correspond to Bazel build paths.
|
|
if [ "$SANITIZER" = "coverage" ]
|
|
then
|
|
# The build invoker looks for sources in $SRC, but it turns out that we need
|
|
# to not be buried under src/, paths are expected at out/proc/self/cwd by
|
|
# the profiler.
|
|
declare -r REMAP_PATH="${OUT}/proc/self/cwd"
|
|
mkdir -p "${REMAP_PATH}"
|
|
# Copy the cc and header files that will be covered.
|
|
rsync -av "${SRC}"/envoy/source "${REMAP_PATH}"
|
|
rsync -av "${SRC}"/envoy/test "${REMAP_PATH}"
|
|
rsync -av "${SRC}"/envoy/envoy "${REMAP_PATH}"
|
|
# Envoy currently uses a modified version of http_parser (see:
|
|
# https://github.com/envoyproxy/envoy/issues/19749).
|
|
declare -r BAZEL_EXTERNAL_REMAP_PATH="${REMAP_PATH}/external/envoy/bazel/external"
|
|
mkdir -p "${BAZEL_EXTERNAL_REMAP_PATH}"
|
|
rsync -av "${SRC}"/envoy/bazel/external/http_parser "${BAZEL_EXTERNAL_REMAP_PATH}"
|
|
# Remove filesystem loop manually.
|
|
rm -rf "${SRC}"/envoy/bazel-envoy/external/envoy
|
|
# Clean up symlinks with a missing referrant.
|
|
find "${SRC}"/envoy/bazel-envoy/external -follow -type l -ls -delete || echo "Symlink cleanup soft fail"
|
|
rsync -avLk "${SRC}"/envoy/bazel-envoy/external "${REMAP_PATH}"
|
|
# For .h, and some generated artifacts, we need bazel-out/. Need to heavily
|
|
# filter out the build objects from bazel-out/. Also need to resolve symlinks,
|
|
# since they don't make sense outside the build container.
|
|
declare -r RSYNC_FILTER_ARGS=("--include" "*.h" "--include" "*.cc" "--include" \
|
|
"*.hpp" "--include" "*.cpp" "--include" "*.c" "--include" "*/" "--exclude" "*")
|
|
rsync -avLk "${RSYNC_FILTER_ARGS[@]}" "${SRC}"/envoy/bazel-out "${REMAP_PATH}"
|
|
rsync -avLkR "${RSYNC_FILTER_ARGS[@]}" "${HOME}" "${OUT}"
|
|
rsync -avLkR "${RSYNC_FILTER_ARGS[@]}" /tmp "${OUT}"
|
|
fi
|
|
|
|
for oss_fuzz_archive in $(find bazel-bin/ -name '*_oss_fuzz.tar'); do
|
|
tar -xvf "${oss_fuzz_archive}" -C "${OUT}"
|
|
done
|
|
|
|
# Cleanup bazel- symlinks to avoid oss-fuzz trying to copy out of the build
|
|
# cache.
|
|
rm -f bazel-*
|