AIXCC-Java-Challenge / local-test-commons-compress-delta-03 /fuzz-tooling /infra /base-images /base-runner /test_all.py
| #!/usr/bin/env python3 | |
| # Copyright 2020 Google LLC | |
| # | |
| # Licensed under the Apache License, Version 2.0 (the "License"); | |
| # you may not use this file except in compliance with the License. | |
| # You may obtain a copy of the License at | |
| # | |
| # http://www.apache.org/licenses/LICENSE-2.0 | |
| # | |
| # Unless required by applicable law or agreed to in writing, software | |
| # distributed under the License is distributed on an "AS IS" BASIS, | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
| # See the License for the specific language governing permissions and | |
| # limitations under the License. | |
| # | |
| ################################################################################ | |
| """Does bad_build_check on all fuzz targets in $OUT.""" | |
| import contextlib | |
| import multiprocessing | |
| import os | |
| import re | |
| import subprocess | |
| import stat | |
| import sys | |
| import tempfile | |
| BASE_TMP_FUZZER_DIR = '/tmp/not-out' | |
| EXECUTABLE = stat.S_IEXEC | stat.S_IXGRP | stat.S_IXOTH | |
| IGNORED_TARGETS = [ | |
| r'do_stuff_fuzzer', r'checksum_fuzzer', r'fuzz_dump', r'fuzz_keyring', | |
| r'xmltest', r'fuzz_compression_sas_rle', r'ares_*_fuzzer' | |
| ] | |
| IGNORED_TARGETS_RE = re.compile('^' + r'$|^'.join(IGNORED_TARGETS) + '$') | |
| def move_directory_contents(src_directory, dst_directory): | |
| """Moves contents of |src_directory| to |dst_directory|.""" | |
| # Use mv because mv preserves file permissions. If we don't preserve file | |
| # permissions that can mess up CheckFuzzerBuildTest in cifuzz_test.py and | |
| # other cases where one is calling test_all on files not in OSS-Fuzz's real | |
| # out directory. | |
| src_contents = [ | |
| os.path.join(src_directory, filename) | |
| for filename in os.listdir(src_directory) | |
| ] | |
| command = ['mv'] + src_contents + [dst_directory] | |
| subprocess.check_call(command) | |
| def is_elf(filepath): | |
| """Returns True if |filepath| is an ELF file.""" | |
| result = subprocess.run(['file', filepath], | |
| stdout=subprocess.PIPE, | |
| check=False) | |
| return b'ELF' in result.stdout | |
| def is_shell_script(filepath): | |
| """Returns True if |filepath| is a shell script.""" | |
| result = subprocess.run(['file', filepath], | |
| stdout=subprocess.PIPE, | |
| check=False) | |
| return b'shell script' in result.stdout | |
| def find_fuzz_targets(directory): | |
| """Returns paths to fuzz targets in |directory|.""" | |
| # TODO(https://github.com/google/oss-fuzz/issues/4585): Use libClusterFuzz for | |
| # this. | |
| fuzz_targets = [] | |
| for filename in os.listdir(directory): | |
| path = os.path.join(directory, filename) | |
| if filename == 'llvm-symbolizer': | |
| continue | |
| if filename.startswith('afl-'): | |
| continue | |
| if filename.startswith('jazzer_'): | |
| continue | |
| if not os.path.isfile(path): | |
| continue | |
| if not os.stat(path).st_mode & EXECUTABLE: | |
| continue | |
| # Fuzz targets can either be ELF binaries or shell scripts (e.g. wrapper | |
| # scripts for Python and JVM targets or rules_fuzzing builds with runfiles | |
| # trees). | |
| if not is_elf(path) and not is_shell_script(path): | |
| continue | |
| if os.getenv('FUZZING_ENGINE') not in {'none', 'wycheproof'}: | |
| with open(path, 'rb') as file_handle: | |
| binary_contents = file_handle.read() | |
| if b'LLVMFuzzerTestOneInput' not in binary_contents: | |
| continue | |
| fuzz_targets.append(path) | |
| return fuzz_targets | |
| def do_bad_build_check(fuzz_target): | |
| """Runs bad_build_check on |fuzz_target|. Returns a | |
| Subprocess.ProcessResult.""" | |
| print('INFO: performing bad build checks for', fuzz_target) | |
| if centipede_needs_auxiliaries(): | |
| print('INFO: Finding Centipede\'s auxiliary for target', fuzz_target) | |
| auxiliary_path = find_centipede_auxiliary(fuzz_target) | |
| print('INFO: Using auxiliary binary:', auxiliary_path) | |
| auxiliary = [auxiliary_path] | |
| else: | |
| auxiliary = [] | |
| command = ['bad_build_check', fuzz_target] + auxiliary | |
| with tempfile.TemporaryDirectory() as temp_centipede_workdir: | |
| # Do this so that centipede doesn't fill up the disk during bad build check | |
| env = os.environ.copy() | |
| env['CENTIPEDE_WORKDIR'] = temp_centipede_workdir | |
| return subprocess.run(command, | |
| stderr=subprocess.PIPE, | |
| stdout=subprocess.PIPE, | |
| env=env, | |
| check=False) | |
| def get_broken_fuzz_targets(bad_build_results, fuzz_targets): | |
| """Returns a list of broken fuzz targets and their process results in | |
| |fuzz_targets| where each item in |bad_build_results| is the result of | |
| bad_build_check on the corresponding element in |fuzz_targets|.""" | |
| broken = [] | |
| for result, fuzz_target in zip(bad_build_results, fuzz_targets): | |
| if result.returncode != 0: | |
| broken.append((fuzz_target, result)) | |
| return broken | |
| def has_ignored_targets(out_dir): | |
| """Returns True if |out_dir| has any fuzz targets we are supposed to ignore | |
| bad build checks of.""" | |
| out_files = set(os.listdir(out_dir)) | |
| for filename in out_files: | |
| if re.match(IGNORED_TARGETS_RE, filename): | |
| return True | |
| return False | |
| def use_different_out_dir(): | |
| """Context manager that moves OUT to subdirectory of BASE_TMP_FUZZER_DIR. This | |
| is useful for catching hardcoding. Note that this sets the environment | |
| variable OUT and therefore must be run before multiprocessing.Pool is created. | |
| Resets OUT at the end.""" | |
| # Use a fake OUT directory to catch path hardcoding that breaks on | |
| # ClusterFuzz. | |
| initial_out = os.getenv('OUT') | |
| os.makedirs(BASE_TMP_FUZZER_DIR, exist_ok=True) | |
| # Use a random subdirectory of BASE_TMP_FUZZER_DIR to allow running multiple | |
| # instances of test_all in parallel (useful for integration testing). | |
| with tempfile.TemporaryDirectory(dir=BASE_TMP_FUZZER_DIR) as out: | |
| # Set this so that run_fuzzer which is called by bad_build_check works | |
| # properly. | |
| os.environ['OUT'] = out | |
| # We move the contents of the directory because we can't move the | |
| # directory itself because it is a mount. | |
| move_directory_contents(initial_out, out) | |
| try: | |
| yield out | |
| finally: | |
| move_directory_contents(out, initial_out) | |
| os.environ['OUT'] = initial_out | |
| def test_all_outside_out(allowed_broken_targets_percentage): | |
| """Wrapper around test_all that changes OUT and returns the result.""" | |
| with use_different_out_dir() as out: | |
| return test_all(out, allowed_broken_targets_percentage) | |
| def centipede_needs_auxiliaries(): | |
| """Checks if auxiliaries are needed for Centipede.""" | |
| # Centipede always requires unsanitized binaries as the main fuzz targets, | |
| # and separate sanitized binaries as auxiliaries. | |
| # 1. Building sanitized binaries with helper.py (i.e., local or GitHub CI): | |
| # Unsanitized ones will be built automatically into the same docker container. | |
| # Script bad_build_check tests both | |
| # a) If main fuzz targets can run with the auxiliaries, and | |
| # b) If the auxiliaries are built with the correct sanitizers. | |
| # 2. In Trial build and production build: | |
| # Two kinds of binaries will be in separated buckets / docker containers. | |
| # Script bad_build_check tests either | |
| # a) If the unsanitized binaries can run without the sanitized ones, or | |
| # b) If the sanitized binaries are built with the correct sanitizers. | |
| return (os.getenv('FUZZING_ENGINE') == 'centipede' and | |
| os.getenv('SANITIZER') != 'none' and os.getenv('HELPER') == 'True') | |
| def find_centipede_auxiliary(main_fuzz_target_path): | |
| """Finds the sanitized binary path that corresponds to |main_fuzz_target| for | |
| bad_build_check.""" | |
| target_dir, target_name = os.path.split(main_fuzz_target_path) | |
| sanitized_binary_dir = os.path.join(target_dir, | |
| f'__centipede_{os.getenv("SANITIZER")}') | |
| sanitized_binary_path = os.path.join(sanitized_binary_dir, target_name) | |
| if os.path.isfile(sanitized_binary_path): | |
| return sanitized_binary_path | |
| # Neither of the following two should ever happen, returns None to indicate | |
| # an error. | |
| if os.path.isdir(sanitized_binary_dir): | |
| print('ERROR: Unable to identify Centipede\'s sanitized target' | |
| f'{sanitized_binary_path} in {os.listdir(sanitized_binary_dir)}') | |
| else: | |
| print('ERROR: Unable to identify Centipede\'s sanitized target directory' | |
| f'{sanitized_binary_dir} in {os.listdir(target_dir)}') | |
| return None | |
| def test_all(out, allowed_broken_targets_percentage): # pylint: disable=too-many-return-statements | |
| """Do bad_build_check on all fuzz targets.""" | |
| # TODO(metzman): Refactor so that we can convert test_one to python. | |
| fuzz_targets = find_fuzz_targets(out) | |
| if not fuzz_targets: | |
| print('ERROR: No fuzz targets found.') | |
| return False | |
| if centipede_needs_auxiliaries(): | |
| for fuzz_target in fuzz_targets: | |
| if not find_centipede_auxiliary(fuzz_target): | |
| print(f'ERROR: Couldn\'t find auxiliary for {fuzz_target}.') | |
| return False | |
| pool = multiprocessing.Pool() | |
| bad_build_results = pool.map(do_bad_build_check, fuzz_targets) | |
| pool.close() | |
| pool.join() | |
| broken_targets = get_broken_fuzz_targets(bad_build_results, fuzz_targets) | |
| broken_targets_count = len(broken_targets) | |
| if not broken_targets_count: | |
| return True | |
| print('Retrying failed fuzz targets sequentially', broken_targets_count) | |
| pool = multiprocessing.Pool(1) | |
| retry_targets = [] | |
| for broken_target, result in broken_targets: | |
| retry_targets.append(broken_target) | |
| bad_build_results = pool.map(do_bad_build_check, retry_targets) | |
| pool.close() | |
| pool.join() | |
| broken_targets = get_broken_fuzz_targets(bad_build_results, broken_targets) | |
| broken_targets_count = len(broken_targets) | |
| if not broken_targets_count: | |
| return True | |
| print('Broken fuzz targets', broken_targets_count) | |
| total_targets_count = len(fuzz_targets) | |
| broken_targets_percentage = 100 * broken_targets_count / total_targets_count | |
| for broken_target, result in broken_targets: | |
| print(broken_target) | |
| # Use write because we can't print binary strings. | |
| sys.stdout.buffer.write(result.stdout + result.stderr + b'\n') | |
| if broken_targets_percentage > allowed_broken_targets_percentage: | |
| print('ERROR: {broken_targets_percentage}% of fuzz targets seem to be ' | |
| 'broken. See the list above for a detailed information.'.format( | |
| broken_targets_percentage=broken_targets_percentage)) | |
| if has_ignored_targets(out): | |
| print('Build check automatically passing because of ignored targets.') | |
| return True | |
| return False | |
| print('{total_targets_count} fuzzers total, {broken_targets_count} ' | |
| 'seem to be broken ({broken_targets_percentage}%).'.format( | |
| total_targets_count=total_targets_count, | |
| broken_targets_count=broken_targets_count, | |
| broken_targets_percentage=broken_targets_percentage)) | |
| return True | |
| def get_allowed_broken_targets_percentage(): | |
| """Returns the value of the environment value | |
| 'ALLOWED_BROKEN_TARGETS_PERCENTAGE' as an int or returns a reasonable | |
| default.""" | |
| return int(os.getenv('ALLOWED_BROKEN_TARGETS_PERCENTAGE') or '10') | |
| def main(): | |
| """Does bad_build_check on all fuzz targets in parallel. Returns 0 on success. | |
| Returns 1 on failure.""" | |
| allowed_broken_targets_percentage = get_allowed_broken_targets_percentage() | |
| if not test_all_outside_out(allowed_broken_targets_percentage): | |
| return 1 | |
| return 0 | |
| if __name__ == '__main__': | |
| sys.exit(main()) | |