oss-fuzz/infra/base-images/base-builder
Catena cyber b771fe7914
rust coverage: broader definition for remaps (#6595)
As shown by opensk, rust files can be in a deeper directory
2021-10-19 15:50:08 -05:00
..
test_data
Dockerfile [language builders] Get rid of base-builder-new (#6361) 2021-09-01 13:36:17 -07:00
README.md
bazel_build_fuzz_tests [infra] Add support for rules_fuzzing's java_fuzz_test macro (#5960) 2021-06-28 06:33:38 -07:00
bisect_clang.py Replace terms that are uninclusive. (#5045) 2021-01-25 08:41:34 -08:00
bisect_clang_test.py [infra][tests][NFC] Change mocked function prefix from "mocked_" to "mock_" (#6198) 2021-08-12 11:25:57 -07:00
cargo rust coverage: broader definition for remaps (#6595) 2021-10-19 15:50:08 -05:00
compile Copy libc++ to /usr/local/lib instead of /usr/lib (#6493) 2021-09-20 17:00:35 +00:00
compile_afl workaround for #6037 (#6039) 2021-07-14 13:57:52 +01:00
compile_dataflow
compile_go_fuzzer go: compiles projects without go.mod from their directory (#5878) 2021-06-05 16:50:38 -07:00
compile_honggfuzz [AFL++][base-builder] Precompile afl++ (#5290) 2021-03-03 19:10:35 -08:00
compile_libfuzzer [base-builder] Use builtin libFuzzer instead of recompling. (#4682) 2021-02-24 11:36:03 -08:00
debug_afl remove map size for afl++ (#5433) 2021-03-18 14:49:58 +00:00
detect_repo.py [CIFuzz] Fix repo detection for repos downloaded through "go get". (#5481) 2021-03-23 11:01:02 -07:00
detect_repo_test.py [CIFuzz] Fix repo detection for repos downloaded through "go get". (#5481) 2021-03-23 11:01:02 -07:00
install_go.sh [language builders] Get rid of base-builder-new (#6361) 2021-09-01 13:36:17 -07:00
install_java.sh [language builders] Get rid of base-builder-new (#6361) 2021-09-01 13:36:17 -07:00
install_python.sh [language builders] Get rid of base-builder-new (#6361) 2021-09-01 13:36:17 -07:00
install_rust.sh [language builders] Get rid of base-builder-new (#6361) 2021-09-01 13:36:17 -07:00
install_swift.sh Swift ideal integration (#6312) 2021-09-02 14:56:01 -07:00
llvmsymbol.diff Swift ideal integration (#6312) 2021-09-02 14:56:01 -07:00
ossfuzz_coverage_runner.go
precompile_afl [AFL++][base-builder] Precompile afl++ (#5290) 2021-03-03 19:10:35 -08:00
precompile_honggfuzz [AFL++][base-builder] Precompile afl++ (#5290) 2021-03-03 19:10:35 -08:00
srcmap
write_labels.py [Ubuntu upgrade][infra] Fix issue with write_labels.py (#6290) 2021-08-24 17:57:01 +00:00

README.md

base-builder

Abstract base image for project builders.

Every project image supports multiple commands that can be invoked through docker after the image is built:

docker run --rm -ti gcr.io/oss-fuzz/$project <command> <arguments...>

Supported Commands

Command Description
compile (default) build all fuzz targets
/bin/bash drop into shell, execute compile script to start build.

Build Configuration

A single build image can build same set of fuzzers in many configurations. The configuration is picked through one or more environment variables.

Env Variable Description
$SANITIZER ("address") Specifies predefined sanitizer configuration to use. address or memory or undefined.
$SANITIZER_FLAGS Specify compiler sanitizer flags directly. Overrides $SANITIZER.
$COVERAGE_FLAGS Specify compiler flags to use for fuzzer feedback coverage.
$BUILD_UID User id to use while building fuzzers.

Examples

  • building sqlite3 fuzzer with UBSan (SANITIZER=undefined):
docker run --rm -ti -e SANITIZER=undefined gcr.io/oss-fuzz/sqlite3

Image Files Layout

Location Env Description
/out/ $OUT Directory to store build artifacts (fuzz targets, dictionaries, options files, seed corpus archives).
/src/ $SRC Directory to checkout source files
/work/ $WORK Directory for storing intermediate files
/usr/lib/libFuzzingEngine.a $LIB_FUZZING_ENGINE Location of prebuilt fuzzing engine library (e.g. libFuzzer) that needs to be linked with all fuzz targets.

While files layout is fixed within a container, the environment variables are provided to be able to write retargetable scripts.

Compiler Flags

You must use special compiler flags to build your project and fuzz targets. These flags are provided in following environment variables:

Env Variable Description
$CC The C compiler binary.
$CXX, $CCC The C++ compiler binary.
$CFLAGS C compiler flags.
$CXXFLAGS C++ compiler flags.

Most well-crafted build scripts will automatically use these variables. If not, pass them manually to the build tool.

Child Image Interface

Sources

Child image has to checkout all sources that it needs to compile fuzz targets into $SRC directory. When the image is executed, a directory could be mounted on top of these with local checkouts using docker run -v $HOME/my_project:/src/my_project ....

Other Required Files

Following files have to be added by child images:

File Location Description
$SRC/build.sh build script to build the project and its fuzz targets