Kitxuuu commited on
Commit
023dd9d
·
verified ·
1 Parent(s): 324a082

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-javascript/Dockerfile +20 -0
  2. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-jvm/Dockerfile +68 -0
  3. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-ruby/Dockerfile +56 -0
  4. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-ruby/ruzzy-build +28 -0
  5. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-rust/Dockerfile +37 -0
  6. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/Dockerfile +213 -0
  7. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/README.md +83 -0
  8. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/bazel.bazelrc +20 -0
  9. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/bazel_build_fuzz_tests +90 -0
  10. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/bisect_clang.py +227 -0
  11. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/cargo +55 -0
  12. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile +420 -0
  13. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_afl +53 -0
  14. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_centipede +32 -0
  15. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_honggfuzz +33 -0
  16. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_javascript_fuzzer +37 -0
  17. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_libfuzzer +25 -0
  18. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_python_fuzzer +128 -0
  19. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/detect_repo.py +182 -0
  20. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/install_javascript.sh +27 -0
  21. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/install_python.sh +23 -0
  22. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/build_jcc.bash +25 -0
  23. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/go.mod +3 -0
  24. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/jcc.go +88 -0
  25. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/jcc2.go +401 -0
  26. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/jcc_test.go +186 -0
  27. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/.gitignore +2 -0
  28. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/cfile.c +18 -0
  29. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/cpp.cc +18 -0
  30. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/path/to/header.h +15 -0
  31. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/llvmsymbol.diff +50 -0
  32. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/ossfuzz_coverage_runner.go +69 -0
  33. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/LICENSE +13 -0
  34. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/README.md +3 -0
  35. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pyproject.toml +22 -0
  36. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/__init__.py +20 -0
  37. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/command_injection.py +106 -0
  38. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/yaml_deserialization.py +42 -0
  39. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/setup.py +21 -0
  40. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/tests/yaml_deserialization_general.py +47 -0
  41. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-clang/Dockerfile +79 -0
  42. local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-clang/checkout_build_install_llvm.sh +246 -0
  43. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/actions/build_fuzzers/action.yml +55 -0
  44. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/cifuzz-base/Dockerfile +44 -0
  45. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/cloudbuild.yaml +52 -0
  46. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/clusterfuzz_deployment_test.py +268 -0
  47. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/config_utils.py +283 -0
  48. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/external-actions/run_fuzzers/action.yml +97 -0
  49. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/filestore/__init__.py +54 -0
  50. local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/filestore/git/__init__.py +158 -0
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-javascript/Dockerfile ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ ARG IMG_TAG=latest
18
+ FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG}
19
+
20
+ RUN install_javascript.sh
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-jvm/Dockerfile ADDED
@@ -0,0 +1,68 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ ARG IMG_TAG=latest
18
+ FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG} AS base
19
+
20
+ ENV JAVA_HOME /usr/lib/jvm/java-17-openjdk-amd64
21
+ ENV JAVA_15_HOME /usr/lib/jvm/java-15-openjdk-amd64
22
+ ENV JVM_LD_LIBRARY_PATH $JAVA_HOME/lib/server
23
+ ENV PATH $PATH:$JAVA_HOME/bin
24
+ ENV JAZZER_API_PATH "/usr/local/lib/jazzer_api_deploy.jar"
25
+ ENV JAZZER_JUNIT_PATH "/usr/local/bin/jazzer_junit.jar"
26
+
27
+ RUN install_java.sh
28
+
29
+ RUN chmod 777 /usr/local/bin && chmod 777 /usr/local/lib
30
+
31
+ FROM base AS builder
32
+ RUN useradd -m jazzer_user
33
+
34
+ USER jazzer_user
35
+
36
+ WORKDIR $SRC
37
+
38
+ RUN git clone https://github.com/aixcc-finals/jazzer-aixcc jazzer && \
39
+ cd jazzer && \
40
+ git checkout 43791565a765b854b537d878c9cab757ff1f2140
41
+
42
+ WORKDIR $SRC/jazzer
43
+
44
+ RUN echo "build --java_runtime_version=local_jdk_17" >> .bazelrc \
45
+ && echo "build --cxxopt=-stdlib=libc++" >> .bazelrc \
46
+ && echo "build --linkopt=-lc++" >> .bazelrc
47
+
48
+ RUN bazel build \
49
+ //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar \
50
+ //deploy:jazzer-api \
51
+ //deploy:jazzer-junit \
52
+ //launcher:jazzer
53
+
54
+ RUN cp $(bazel cquery --output=files //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar) /usr/local/bin/jazzer_agent_deploy.jar && \
55
+ cp $(bazel cquery --output=files //launcher:jazzer) /usr/local/bin/jazzer_driver && \
56
+ cp $(bazel cquery --output=files //deploy:jazzer-api) $JAZZER_API_PATH && \
57
+ cp $(bazel cquery --output=files //deploy:jazzer-junit) $JAZZER_JUNIT_PATH
58
+
59
+ FROM base AS final
60
+
61
+ COPY --from=builder /usr/local/bin/jazzer_agent_deploy.jar /usr/local/bin/jazzer_agent_deploy.jar
62
+ COPY --from=builder /usr/local/bin/jazzer_driver /usr/local/bin/jazzer_driver
63
+ COPY --from=builder $JAZZER_API_PATH $JAZZER_API_PATH
64
+ COPY --from=builder $JAZZER_JUNIT_PATH $JAZZER_JUNIT_PATH
65
+
66
+ RUN chmod 755 /usr/local/bin && chmod 755 /usr/local/lib
67
+
68
+ WORKDIR $SRC
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-ruby/Dockerfile ADDED
@@ -0,0 +1,56 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2024 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ ARG IMG_TAG=latest
18
+ FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG}
19
+
20
+ RUN git clone https://github.com/trailofbits/ruzzy.git $SRC/ruzzy
21
+
22
+ RUN install_ruby.sh
23
+ ENV PATH="$PATH:/usr/local/rvm/rubies/ruby-3.3.1/bin"
24
+
25
+ RUN gem update --system 3.5.11
26
+
27
+ # Install ruzzy
28
+ WORKDIR $SRC/ruzzy
29
+
30
+ # The MAKE variable allows overwriting the make command at runtime. This forces the
31
+ # Ruby C extension to respect ENV variables when compiling, like CC, CFLAGS, etc.
32
+ ENV MAKE="make --environment-overrides V=1"
33
+
34
+ RUN CC="clang" \
35
+ CXX="clang++" \
36
+ LDSHARED="clang -shared" \
37
+ LDSHAREDXX="clang++ -shared" \
38
+ gem build
39
+
40
+ RUN MAKE="make --environment-overrides V=1" \
41
+ CC="clang" \
42
+ CXX="clang++" \
43
+ LDSHARED="clang -shared" \
44
+ LDSHAREDXX="clang++ -shared" \
45
+ CXXFLAGS="-fPIC" \
46
+ CFLAGS="-fPIC" \
47
+ RUZZY_DEBUG=1 gem install --install-dir /install/ruzzy --development --verbose ruzzy-*.gem
48
+
49
+
50
+ ENV LDSHARED="$CC -shared"
51
+ ENV LDSHAREDXX="$CXX -shared"
52
+
53
+ ENV GEM_HOME="$OUT/fuzz-gem"
54
+ ENV GEM_PATH="/install/ruzzy"
55
+
56
+ COPY ruzzy-build /usr/bin/ruzzy-build
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-ruby/ruzzy-build ADDED
@@ -0,0 +1,28 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/env bash -e
2
+ # Copyright 2024 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ fuzz_target=$(basename "$1")
19
+ echo "BASENAME: $fuzz_target ---"
20
+ harness_sh=${fuzz_target::-3}
21
+
22
+ cp $1 $OUT/$fuzz_target
23
+
24
+ echo """#!/usr/bin/env bash
25
+
26
+ ruzzy $fuzz_target
27
+ """ > $OUT/$harness_sh
28
+ chmod +x $OUT/$harness_sh
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder-rust/Dockerfile ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ ARG IMG_TAG=latest
18
+ FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG}
19
+
20
+ ENV CARGO_HOME=/rust
21
+ ENV RUSTUP_HOME=/rust/rustup
22
+ ENV PATH=$PATH:/rust/bin
23
+ # Set up custom environment variable for source code copy for coverage reports
24
+ ENV OSSFUZZ_RUSTPATH /rust
25
+
26
+ # Force rustup to ignore `rust-toolchain` and `rust-toolchain.toml` files by
27
+ # manually specifying what toolchain to use. Note that this environment variable
28
+ # is additionally used by `install_rust.sh` as the toolchain to install.
29
+ # cf https://rust-lang.github.io/rustup/overrides.html
30
+ ENV RUSTUP_TOOLCHAIN nightly-2024-07-12
31
+
32
+ # Configure the linker used by default for x86_64 linux to be `clang` instead of
33
+ # rustc's default of `cc` which is able to find custom-built libraries like
34
+ # `libc++` by default more easily.
35
+ ENV CARGO_TARGET_X86_64_UNKNOWN_LINUX_GNU_LINKER clang
36
+
37
+ RUN install_rust.sh
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/Dockerfile ADDED
@@ -0,0 +1,213 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ ARG IMG_TAG=latest
18
+ FROM ghcr.io/aixcc-finals/base-clang:${IMG_TAG}
19
+
20
+ COPY install_deps.sh /
21
+ RUN /install_deps.sh && rm /install_deps.sh
22
+
23
+ # Build and install latest Python 3.10.
24
+ ENV PYTHON_VERSION 3.10.14
25
+ RUN PYTHON_DEPS="\
26
+ zlib1g-dev \
27
+ libncurses5-dev \
28
+ libgdbm-dev \
29
+ libnss3-dev \
30
+ libssl-dev \
31
+ libsqlite3-dev \
32
+ libreadline-dev \
33
+ libffi-dev \
34
+ libbz2-dev \
35
+ liblzma-dev" && \
36
+ unset CFLAGS CXXFLAGS && \
37
+ apt-get install -y $PYTHON_DEPS && \
38
+ cd /tmp && \
39
+ curl -O https://www.python.org/ftp/python/$PYTHON_VERSION/Python-$PYTHON_VERSION.tar.xz && \
40
+ tar -xvf Python-$PYTHON_VERSION.tar.xz && \
41
+ cd Python-$PYTHON_VERSION && \
42
+ ./configure --enable-optimizations --enable-shared && \
43
+ make -j$(nproc) install && \
44
+ ldconfig && \
45
+ ln -s /usr/local/bin/python3 /usr/local/bin/python && \
46
+ cd .. && \
47
+ rm -r /tmp/Python-$PYTHON_VERSION.tar.xz /tmp/Python-$PYTHON_VERSION && \
48
+ rm -rf /usr/local/lib/python${PYTHON_VERSION%.*}/test && \
49
+ python3 -m ensurepip && \
50
+ python3 -m pip install --upgrade pip && \
51
+ apt-get remove -y $PYTHON_DEPS # https://github.com/google/oss-fuzz/issues/3888
52
+
53
+
54
+ ENV CCACHE_VERSION 4.10.2
55
+ RUN cd /tmp && curl -OL https://github.com/ccache/ccache/releases/download/v$CCACHE_VERSION/ccache-$CCACHE_VERSION.tar.xz && \
56
+ tar -xvf ccache-$CCACHE_VERSION.tar.xz && cd ccache-$CCACHE_VERSION && \
57
+ mkdir build && cd build && \
58
+ export LDFLAGS='-lpthread' && \
59
+ cmake -D CMAKE_BUILD_TYPE=Release .. && \
60
+ make -j && make install && \
61
+ rm -rf /tmp/ccache-$CCACHE_VERSION /tmp/ccache-$CCACHE_VERSION.tar.xz
62
+
63
+ # Install six for Bazel rules.
64
+ RUN unset CFLAGS CXXFLAGS && pip3 install -v --no-cache-dir \
65
+ six==1.15.0 && rm -rf /tmp/*
66
+
67
+ # Install Bazel through Bazelisk, which automatically fetches the latest Bazel version.
68
+ ENV BAZELISK_VERSION 1.9.0
69
+ RUN curl -L https://github.com/bazelbuild/bazelisk/releases/download/v$BAZELISK_VERSION/bazelisk-linux-amd64 -o /usr/local/bin/bazel && \
70
+ chmod +x /usr/local/bin/bazel
71
+
72
+ # Default build flags for various sanitizers.
73
+ ENV SANITIZER_FLAGS_address "-fsanitize=address -fsanitize-address-use-after-scope"
74
+ ENV SANITIZER_FLAGS_hwaddress "-fsanitize=hwaddress -fuse-ld=lld -Wno-unused-command-line-argument"
75
+
76
+ # Set of '-fsanitize' flags matches '-fno-sanitize-recover' + 'unsigned-integer-overflow'.
77
+ ENV SANITIZER_FLAGS_undefined "-fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr"
78
+
79
+ # Don't include "function" since it is unsupported on aarch64.
80
+ ENV SANITIZER_FLAGS_undefined_aarch64 "-fsanitize=array-bounds,bool,builtin,enum,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr"
81
+
82
+ ENV SANITIZER_FLAGS_memory "-fsanitize=memory -fsanitize-memory-track-origins"
83
+
84
+ ENV SANITIZER_FLAGS_thread "-fsanitize=thread"
85
+
86
+ ENV SANITIZER_FLAGS_introspector "-O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument"
87
+
88
+ # Do not use any sanitizers in the coverage build.
89
+ ENV SANITIZER_FLAGS_coverage ""
90
+
91
+ # We use unsigned-integer-overflow as an additional coverage signal and have to
92
+ # suppress error messages. See https://github.com/google/oss-fuzz/issues/910.
93
+ ENV UBSAN_OPTIONS="silence_unsigned_overflow=1"
94
+
95
+ # To suppress warnings from binaries running during compilation.
96
+ ENV DFSAN_OPTIONS='warn_unimplemented=0'
97
+
98
+ # Default build flags for coverage feedback.
99
+ ENV COVERAGE_FLAGS="-fsanitize=fuzzer-no-link"
100
+
101
+ # Use '-Wno-unused-command-line-argument' to suppress "warning: -ldl: 'linker' input unused"
102
+ # messages which are treated as errors by some projects.
103
+ ENV COVERAGE_FLAGS_coverage "-fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument"
104
+
105
+ # Default sanitizer, fuzzing engine and architecture to use.
106
+ ENV SANITIZER="address"
107
+ ENV FUZZING_ENGINE="libfuzzer"
108
+ ENV ARCHITECTURE="x86_64"
109
+
110
+ # DEPRECATED - NEW CODE SHOULD NOT USE THIS. OLD CODE SHOULD STOP. Please use
111
+ # LIB_FUZZING_ENGINE instead.
112
+ # Path to fuzzing engine library to support some old users of
113
+ # LIB_FUZZING_ENGINE.
114
+ ENV LIB_FUZZING_ENGINE_DEPRECATED="/usr/lib/libFuzzingEngine.a"
115
+
116
+ # Argument passed to compiler to link against fuzzing engine.
117
+ # Defaults to the path, but is "-fsanitize=fuzzer" in libFuzzer builds.
118
+ ENV LIB_FUZZING_ENGINE="/usr/lib/libFuzzingEngine.a"
119
+
120
+ # TODO: remove after tpm2 catchup.
121
+ ENV FUZZER_LDFLAGS ""
122
+
123
+ WORKDIR $SRC
124
+
125
+ RUN git clone https://github.com/AFLplusplus/AFLplusplus.git aflplusplus && \
126
+ cd aflplusplus && \
127
+ git checkout daaefcddc063b356018c29027494a00bcfc3e240 && \
128
+ wget --no-check-certificate -O oss.sh https://raw.githubusercontent.com/vanhauser-thc/binary_blobs/master/oss.sh && \
129
+ rm -rf .git && \
130
+ chmod 755 oss.sh
131
+
132
+ # Do precompiles before copying other scripts for better cache efficiency.
133
+ COPY precompile_afl /usr/local/bin/
134
+ RUN precompile_afl
135
+
136
+ RUN cd $SRC && \
137
+ curl -L -O https://github.com/google/honggfuzz/archive/oss-fuzz.tar.gz && \
138
+ mkdir honggfuzz && \
139
+ cd honggfuzz && \
140
+ tar -xz --strip-components=1 -f $SRC/oss-fuzz.tar.gz && \
141
+ rm -rf examples $SRC/oss-fuzz.tar.gz
142
+
143
+
144
+ COPY precompile_honggfuzz /usr/local/bin/
145
+ RUN precompile_honggfuzz
146
+
147
+ RUN cd $SRC && \
148
+ git clone https://github.com/google/fuzztest && \
149
+ cd fuzztest && \
150
+ git checkout a37d133f714395cabc20dd930969a889495c9f53 && \
151
+ rm -rf .git
152
+
153
+ ENV CENTIPEDE_BIN_DIR=$SRC/fuzztest/bazel-bin
154
+ COPY precompile_centipede /usr/local/bin/
155
+ RUN precompile_centipede
156
+
157
+ COPY sanitizers /usr/local/lib/sanitizers
158
+
159
+ COPY bazel_build_fuzz_tests \
160
+ cargo \
161
+ compile \
162
+ compile_afl \
163
+ compile_centipede \
164
+ compile_honggfuzz \
165
+ compile_fuzztests.sh \
166
+ compile_go_fuzzer \
167
+ compile_javascript_fuzzer \
168
+ compile_libfuzzer \
169
+ compile_native_go_fuzzer \
170
+ compile_python_fuzzer \
171
+ debug_afl \
172
+ # Go, JavaScript, Java, Python, Rust, and Swift installation scripts.
173
+ install_go.sh \
174
+ install_javascript.sh \
175
+ install_java.sh \
176
+ install_python.sh \
177
+ install_ruby.sh \
178
+ install_rust.sh \
179
+ install_swift.sh \
180
+ python_coverage_helper.py \
181
+ bash_parser.py \
182
+ srcmap \
183
+ write_labels.py \
184
+ /usr/local/bin/
185
+
186
+ # TODO: Build this as part of a multi-stage build.
187
+ ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang-jcc /usr/local/bin/
188
+ ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang++-jcc /usr/local/bin
189
+ ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang-jcc2 /usr/local/bin/
190
+ ADD https://commondatastorage.googleapis.com/clusterfuzz-builds/jcc/clang++-jcc2 /usr/local/bin
191
+ RUN chmod +x /usr/local/bin/clang-jcc /usr/local/bin/clang++-jcc /usr/local/bin/clang-jcc2 /usr/local/bin/clang++-jcc2
192
+
193
+ COPY llvmsymbol.diff $SRC
194
+ COPY detect_repo.py /opt/cifuzz/
195
+ COPY bazel.bazelrc /root/.bazelrc
196
+
197
+ # Set up ccache binary and cache directory.
198
+ # /ccache/bin will contain the compiler wrappers, and /ccache/cache will
199
+ # contain the actual cache, which can be saved.
200
+ # To use this, set PATH=/ccache/bin:$PATH.
201
+ RUN mkdir -p /ccache/bin && mkdir -p /ccache/cache && \
202
+ ln -s /usr/local/bin/ccache /ccache/bin/clang && \
203
+ ln -s /usr/local/bin/ccache /ccache/bin/clang++ && \
204
+ ln -s /usr/local/bin/ccache /ccache/bin/clang-jcc && \
205
+ ln -s /usr/local/bin/ccache /ccache/bin/clang++-jcc
206
+ ENV CCACHE_DIR /ccache/cache
207
+
208
+ # Don't check that the compiler is the same, so we can switch between jcc and
209
+ # clang under the hood and re-use the same build cache.
210
+ ENV CCACHE_COMPILERCHECK none
211
+ ENV CCACHE_COMPILERTYPE clang
212
+
213
+ CMD ["compile"]
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/README.md ADDED
@@ -0,0 +1,83 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # base-builder
2
+ > Abstract base image for project builders.
3
+
4
+ Every project image supports multiple commands that can be invoked through docker after the image is built:
5
+
6
+ <pre>
7
+ docker run --rm -ti gcr.io/oss-fuzz/<b><i>$project</i></b> <i>&lt;command&gt;</i> <i>&lt;arguments...&gt;</i>
8
+ </pre>
9
+
10
+ # Supported Commands
11
+
12
+ | Command | Description |
13
+ |---------|-------------|
14
+ | `compile` (default) | build all fuzz targets
15
+ | `/bin/bash` | drop into shell, execute `compile` script to start build.
16
+
17
+ # Build Configuration
18
+
19
+ A single build image can build same set of fuzzers in many configurations.
20
+ The configuration is picked through one or more environment variables.
21
+
22
+ | Env Variable | Description
23
+ | ------------- | --------
24
+ | `$SANITIZER ("address")` | Specifies predefined sanitizer configuration to use. `address` or `memory` or `undefined`.
25
+ | `$SANITIZER_FLAGS` | Specify compiler sanitizer flags directly. Overrides `$SANITIZER`.
26
+ | `$COVERAGE_FLAGS` | Specify compiler flags to use for fuzzer feedback coverage.
27
+ | `$BUILD_UID` | User id to use while building fuzzers.
28
+
29
+ ## Examples
30
+
31
+ - *building sqlite3 fuzzer with UBSan (`SANITIZER=undefined`):*
32
+
33
+
34
+ <pre>
35
+ docker run --rm -ti -e <i>SANITIZER</i>=<i>undefined</i> gcr.io/oss-fuzz/sqlite3
36
+ </pre>
37
+
38
+
39
+ # Image Files Layout
40
+
41
+ | Location|Env| Description |
42
+ |---------| -------- | ---------- |
43
+ | `/out/` | `$OUT` | Directory to store build artifacts (fuzz targets, dictionaries, options files, seed corpus archives). |
44
+ | `/src/` | `$SRC` | Directory to checkout source files |
45
+ | `/work/`| `$WORK` | Directory for storing intermediate files |
46
+ | `/usr/lib/libFuzzingEngine.a` | `$LIB_FUZZING_ENGINE` | Location of prebuilt fuzzing engine library (e.g. libFuzzer) that needs to be linked with all fuzz targets.
47
+
48
+ While files layout is fixed within a container, the environment variables are
49
+ provided to be able to write retargetable scripts.
50
+
51
+
52
+ ## Compiler Flags
53
+
54
+ You *must* use special compiler flags to build your project and fuzz targets.
55
+ These flags are provided in following environment variables:
56
+
57
+ | Env Variable | Description
58
+ | ------------- | --------
59
+ | `$CC` | The C compiler binary.
60
+ | `$CXX`, `$CCC` | The C++ compiler binary.
61
+ | `$CFLAGS` | C compiler flags.
62
+ | `$CXXFLAGS` | C++ compiler flags.
63
+
64
+ Most well-crafted build scripts will automatically use these variables. If not,
65
+ pass them manually to the build tool.
66
+
67
+
68
+ # Child Image Interface
69
+
70
+ ## Sources
71
+
72
+ Child image has to checkout all sources that it needs to compile fuzz targets into
73
+ `$SRC` directory. When the image is executed, a directory could be mounted on top
74
+ of these with local checkouts using
75
+ `docker run -v $HOME/my_project:/src/my_project ...`.
76
+
77
+ ## Other Required Files
78
+
79
+ Following files have to be added by child images:
80
+
81
+ | File Location | Description |
82
+ | ------------- | ----------- |
83
+ | `$SRC/build.sh` | build script to build the project and its fuzz targets |
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/bazel.bazelrc ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+
18
+ # Pass variables from environment.
19
+ build --action_env=FUZZ_INTROSPECTOR
20
+ build --action_env=FUZZINTRO_OUTDIR
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/bazel_build_fuzz_tests ADDED
@@ -0,0 +1,90 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ #
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # http://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+ #
17
+ ################################################################################
18
+
19
+ : "${BAZEL_FUZZ_TEST_TAG:=fuzz-test}"
20
+ : "${BAZEL_FUZZ_TEST_EXCLUDE_TAG:=no-oss-fuzz}"
21
+ : "${BAZEL_PACKAGE_SUFFIX:=_oss_fuzz}"
22
+ : "${BAZEL_TOOL:=bazel}"
23
+ : "${BAZEL_EXTRA_BUILD_FLAGS:=}"
24
+
25
+ if [ "$FUZZING_LANGUAGE" = "jvm" ]; then
26
+ BAZEL_LANGUAGE=java
27
+ else
28
+ BAZEL_LANGUAGE=cc
29
+ fi
30
+
31
+ if [[ -z "${BAZEL_FUZZ_TEST_QUERY:-}" ]]; then
32
+ BAZEL_FUZZ_TEST_QUERY="
33
+ let all_fuzz_tests = attr(tags, \"${BAZEL_FUZZ_TEST_TAG}\", \"//...\") in
34
+ let lang_fuzz_tests = attr(generator_function, \"^${BAZEL_LANGUAGE}_fuzz_test\$\", \$all_fuzz_tests) in
35
+ \$lang_fuzz_tests - attr(tags, \"${BAZEL_FUZZ_TEST_EXCLUDE_TAG}\", \$lang_fuzz_tests)
36
+ "
37
+ fi
38
+
39
+ echo "Using Bazel query to find fuzz targets: ${BAZEL_FUZZ_TEST_QUERY}"
40
+
41
+ declare -r OSS_FUZZ_TESTS=(
42
+ $(bazel query "${BAZEL_FUZZ_TEST_QUERY}" | sed "s/$/${BAZEL_PACKAGE_SUFFIX}/")
43
+ )
44
+
45
+ echo "Found ${#OSS_FUZZ_TESTS[@]} fuzz test packages:"
46
+ for oss_fuzz_test in "${OSS_FUZZ_TESTS[@]}"; do
47
+ echo " ${oss_fuzz_test}"
48
+ done
49
+
50
+ declare -r BAZEL_BUILD_FLAGS=(
51
+ "--@rules_fuzzing//fuzzing:cc_engine=@rules_fuzzing_oss_fuzz//:oss_fuzz_engine" \
52
+ "--@rules_fuzzing//fuzzing:java_engine=@rules_fuzzing_oss_fuzz//:oss_fuzz_java_engine" \
53
+ "--@rules_fuzzing//fuzzing:cc_engine_instrumentation=oss-fuzz" \
54
+ "--@rules_fuzzing//fuzzing:cc_engine_sanitizer=none" \
55
+ "--cxxopt=-stdlib=libc++" \
56
+ "--linkopt=-lc++" \
57
+ "--verbose_failures" \
58
+ "--spawn_strategy=standalone" \
59
+ "--action_env=CC=${CC}" "--action_env=CXX=${CXX}" \
60
+ ${BAZEL_EXTRA_BUILD_FLAGS[*]}
61
+ )
62
+
63
+ echo "Building the fuzz tests with the following Bazel options:"
64
+ echo " ${BAZEL_BUILD_FLAGS[@]}"
65
+
66
+ ${BAZEL_TOOL} build "${BAZEL_BUILD_FLAGS[@]}" "${OSS_FUZZ_TESTS[@]}"
67
+
68
+ echo "Extracting the fuzz test packages in the output directory."
69
+ for oss_fuzz_archive in $(find bazel-bin/ -name "*${BAZEL_PACKAGE_SUFFIX}.tar"); do
70
+ tar --no-same-owner -xvf "${oss_fuzz_archive}" -C "${OUT}"
71
+ done
72
+
73
+ if [ "$SANITIZER" = "coverage" ]; then
74
+ echo "Collecting the repository source files for coverage tracking."
75
+ declare -r COVERAGE_SOURCES="${OUT}/proc/self/cwd"
76
+ mkdir -p "${COVERAGE_SOURCES}"
77
+ declare -r RSYNC_FILTER_ARGS=(
78
+ "--include" "*.h"
79
+ "--include" "*.cc"
80
+ "--include" "*.hpp"
81
+ "--include" "*.cpp"
82
+ "--include" "*.c"
83
+ "--include" "*.inc"
84
+ "--include" "*/"
85
+ "--exclude" "*"
86
+ )
87
+ rsync -avLk "${RSYNC_FILTER_ARGS[@]}" \
88
+ "$(bazel info execution_root)/" \
89
+ "${COVERAGE_SOURCES}/"
90
+ fi
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/bisect_clang.py ADDED
@@ -0,0 +1,227 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/env python3
2
+ # Copyright 2019 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ """Use git bisect to find the Clang/LLVM commit causing a regression."""
18
+
19
+ import logging
20
+ import os
21
+ import re
22
+ import shutil
23
+ import subprocess
24
+ import sys
25
+
26
+
27
+ def execute(command, *args, expect_zero=True, **kwargs):
28
+ """Execute |command| and return the returncode, stdout and stderr."""
29
+ kwargs['stdout'] = subprocess.PIPE
30
+ kwargs['stderr'] = subprocess.PIPE
31
+ logging.debug('Running command: "%s"', str(command))
32
+ process = subprocess.Popen(command, *args, **kwargs)
33
+ stdout, stderr = process.communicate()
34
+ stdout = stdout.decode('utf-8')
35
+ stderr = stderr.decode('utf-8')
36
+ retcode = process.returncode
37
+ logging.info('Command: "%s" returned: %d.\nStdout: %s.\nStderr: %s',
38
+ str(command), retcode, stdout, stderr)
39
+ if expect_zero and retcode != 0:
40
+ raise subprocess.CalledProcessError(retcode, command)
41
+ return retcode, stdout, stderr
42
+
43
+
44
+ def search_bisect_output(output):
45
+ """Search |output| for a message indicating the culprit commit has been
46
+ found."""
47
+ # TODO(metzman): Is it necessary to look for "good"?
48
+ culprit_regex = re.compile('([a-z0-9]{40}) is the first (good|bad) commit')
49
+ match = re.match(culprit_regex, output)
50
+ return match.group(1) if match is not None else None
51
+
52
+
53
+ class GitRepo:
54
+ """Class for executing commmands on a git repo."""
55
+
56
+ def __init__(self, repo_dir):
57
+ self.repo_dir = repo_dir
58
+
59
+ def do_command(self, git_subcommand):
60
+ """Execute a |git_subcommand| (a list of strings)."""
61
+ command = ['git', '-C', self.repo_dir] + git_subcommand
62
+ return execute(command)
63
+
64
+ def test_commit(self, test_command):
65
+ """Build LLVM at the currently checkedout commit, then run |test_command|.
66
+ If returncode is 0 run 'git bisect good' otherwise return 'git bisect bad'.
67
+ Return None if bisect didn't finish yet. Return the culprit commit if it
68
+ does."""
69
+ build_clang(self.repo_dir)
70
+ retcode, _, _ = execute(test_command, shell=True, expect_zero=False)
71
+ if retcode == 0:
72
+ retcode, stdout, _ = self.do_bisect_command('good')
73
+ else:
74
+ retcode, stdout, _ = self.do_bisect_command('bad')
75
+ return search_bisect_output(stdout)
76
+
77
+ def bisect(self, good_commit, bad_commit, test_command):
78
+ """Do git bisect assuming |good_commit| is good, |bad_commit| is bad and
79
+ |test_command| is an oracle. Return the culprit commit."""
80
+ self.bisect_start(good_commit, bad_commit, test_command)
81
+ result = self.test_commit(test_command)
82
+ while result is None:
83
+ result = self.test_commit(test_command)
84
+ return result
85
+
86
+ def bisect_start(self, good_commit, bad_commit, test_command):
87
+ """Start doing git bisect."""
88
+ self.do_bisect_command('start')
89
+ # Do bad commit first since it is more likely to be recent.
90
+ self.test_start_commit(bad_commit, 'bad', test_command)
91
+ self.test_start_commit(good_commit, 'good', test_command)
92
+
93
+ def do_bisect_command(self, subcommand):
94
+ """Execute a git bisect |subcommand| (string) and return the result."""
95
+ return self.do_command(['bisect', subcommand])
96
+
97
+ def test_start_commit(self, commit, label, test_command):
98
+ """Use |test_command| to test the first good or bad |commit| (depending on
99
+ |label|)."""
100
+ assert label in ('good', 'bad'), label
101
+ self.do_command(['checkout', commit])
102
+ build_clang(self.repo_dir)
103
+ retcode, _, _ = execute(test_command, shell=True, expect_zero=False)
104
+ if label == 'good' and retcode != 0:
105
+ raise BisectError('Test command "%s" returns %d on first good commit %s' %
106
+ (test_command, retcode, commit))
107
+ if label == 'bad' and retcode == 0:
108
+ raise BisectError('Test command "%s" returns %d on first bad commit %s' %
109
+ (test_command, retcode, commit))
110
+
111
+ self.do_bisect_command(label)
112
+
113
+
114
+ class BisectError(Exception):
115
+ """Error that was encountered during bisection."""
116
+
117
+
118
+ def get_clang_build_env():
119
+ """Get an environment for building Clang."""
120
+ env = os.environ.copy()
121
+ for variable in ['CXXFLAGS', 'CFLAGS']:
122
+ if variable in env:
123
+ del env[variable]
124
+ return env
125
+
126
+
127
+ def install_clang_build_deps():
128
+ """Instal dependencies necessary to build clang."""
129
+ execute([
130
+ 'apt-get', 'install', '-y', 'build-essential', 'make', 'cmake',
131
+ 'ninja-build', 'git', 'subversion', 'g++-multilib'
132
+ ])
133
+
134
+
135
+ def clone_with_retries(repo, local_path, num_retries=10):
136
+ """Clone |repo| to |local_path| if it doesn't exist already. Try up to
137
+ |num_retries| times. Return False if unable to checkout."""
138
+ if os.path.isdir(local_path):
139
+ return
140
+ for _ in range(num_retries):
141
+ if os.path.isdir(local_path):
142
+ shutil.rmtree(local_path)
143
+ retcode, _, _ = execute(['git', 'clone', repo, local_path],
144
+ expect_zero=False)
145
+ if retcode == 0:
146
+ return
147
+ raise Exception('Could not checkout %s.' % repo)
148
+
149
+
150
+ def get_clang_target_arch():
151
+ """Get target architecture we want clang to target when we build it."""
152
+ _, arch, _ = execute(['uname', '-m'])
153
+ if 'x86_64' in arch:
154
+ return 'X86'
155
+ if 'aarch64' in arch:
156
+ return 'AArch64'
157
+ raise Exception('Unsupported target: %s.' % arch)
158
+
159
+
160
+ def prepare_build(llvm_project_path):
161
+ """Prepare to build clang."""
162
+ llvm_build_dir = os.path.join(os.getenv('WORK'), 'llvm-build')
163
+ if not os.path.exists(llvm_build_dir):
164
+ os.mkdir(llvm_build_dir)
165
+ execute([
166
+ 'cmake', '-G', 'Ninja', '-DLIBCXX_ENABLE_SHARED=OFF',
167
+ '-DLIBCXX_ENABLE_STATIC_ABI_LIBRARY=ON', '-DLIBCXXABI_ENABLE_SHARED=OFF',
168
+ '-DCMAKE_BUILD_TYPE=Release',
169
+ '-DLLVM_ENABLE_PROJECTS=libcxx;libcxxabi;compiler-rt;clang',
170
+ '-DLLVM_TARGETS_TO_BUILD=' + get_clang_target_arch(),
171
+ os.path.join(llvm_project_path, 'llvm')
172
+ ],
173
+ env=get_clang_build_env(),
174
+ cwd=llvm_build_dir)
175
+ return llvm_build_dir
176
+
177
+
178
+ def build_clang(llvm_project_path):
179
+ """Checkout, build and install Clang."""
180
+ # TODO(metzman): Merge Python checkout and build code with
181
+ # checkout_build_install_llvm.sh.
182
+ # TODO(metzman): Look into speeding this process using ccache.
183
+ # TODO(metzman): Make this program capable of handling MSAN and i386 Clang
184
+ # regressions.
185
+ llvm_build_dir = prepare_build(llvm_project_path)
186
+ execute(['ninja', '-C', llvm_build_dir, 'install'], env=get_clang_build_env())
187
+
188
+
189
+ def find_culprit_commit(test_command, good_commit, bad_commit):
190
+ """Returns the culprit LLVM commit that introduced a bug revealed by running
191
+ |test_command|. Uses git bisect and treats |good_commit| as the first latest
192
+ known good commit and |bad_commit| as the first known bad commit."""
193
+ llvm_project_path = os.path.join(os.getenv('SRC'), 'llvm-project')
194
+ clone_with_retries('https://github.com/llvm/llvm-project.git',
195
+ llvm_project_path)
196
+ git_repo = GitRepo(llvm_project_path)
197
+ result = git_repo.bisect(good_commit, bad_commit, test_command)
198
+ print('Culprit commit', result)
199
+ return result
200
+
201
+
202
+ def main():
203
+ # pylint: disable=line-too-long
204
+ """Finds the culprit LLVM commit that introduced a clang regression.
205
+ Can be tested using this command in a libsodium shell:
206
+ python3 bisect_clang.py "cd /src/libsodium; make clean; cd -; compile && /out/secret_key_auth_fuzzer -runs=100" \
207
+ f7e52fbdb5a7af8ea0808e98458b497125a5eca1 \
208
+ 8288453f6aac05080b751b680455349e09d49825
209
+ """
210
+ # pylint: enable=line-too-long
211
+ # TODO(metzman): Check CFLAGS for things like -fsanitize=fuzzer-no-link.
212
+ # TODO(metzman): Allow test_command to be optional and for just build.sh to be
213
+ # used instead.
214
+ test_command = sys.argv[1]
215
+ # TODO(metzman): Add in more automation so that the script can automatically
216
+ # determine the commits used in last Clang roll.
217
+ good_commit = sys.argv[2]
218
+ bad_commit = sys.argv[3]
219
+ # TODO(metzman): Make verbosity configurable.
220
+ logging.getLogger().setLevel(logging.DEBUG)
221
+ install_clang_build_deps()
222
+ find_culprit_commit(test_command, good_commit, bad_commit)
223
+ return 0
224
+
225
+
226
+ if __name__ == '__main__':
227
+ sys.exit(main())
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/cargo ADDED
@@ -0,0 +1,55 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2020 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ # This is a wrapper around calling cargo
17
+ # This just expands RUSTFLAGS in case of a coverage build
18
+ # We need this until https://github.com/rust-lang/cargo/issues/5450 is merged
19
+ # because cargo uses relative paths for the current crate
20
+ # and absolute paths for its dependencies
21
+ #
22
+ ################################################################################
23
+
24
+ if [ "$SANITIZER" = "coverage" ] && [ $1 = "build" ]
25
+ then
26
+ crate_src_abspath=`cargo metadata --no-deps --format-version 1 | jq -r '.workspace_root'`
27
+ export RUSTFLAGS="$RUSTFLAGS --remap-path-prefix src=$crate_src_abspath/src"
28
+ fi
29
+
30
+ if [ "$SANITIZER" = "coverage" ] && [ $1 = "fuzz" ] && [ $2 = "build" ]
31
+ then
32
+ # hack to turn cargo fuzz build into cargo build so as to get coverage
33
+ # cargo fuzz adds "--target" "x86_64-unknown-linux-gnu"
34
+ (
35
+ # go into fuzz directory if not already the case
36
+ cd fuzz || true
37
+ fuzz_src_abspath=`pwd`
38
+ # Default directory is fuzz_targets, but some projects like image-rs use fuzzers.
39
+ while read i; do
40
+ export RUSTFLAGS="$RUSTFLAGS --remap-path-prefix $i=$fuzz_src_abspath/$i"
41
+ # Bash while syntax so that we modify RUSTFLAGS in main shell instead of a subshell.
42
+ done <<< "$(find . -name "*.rs" | cut -d/ -f2 | uniq)"
43
+ # we do not want to trigger debug assertions and stops
44
+ export RUSTFLAGS="$RUSTFLAGS -C debug-assertions=no"
45
+ # do not optimize with --release, leading to Malformed instrumentation profile data
46
+ cargo build --bins
47
+ # copies the build output in the expected target directory
48
+ cd `cargo metadata --format-version 1 --no-deps | jq -r '.target_directory'`
49
+ mkdir -p x86_64-unknown-linux-gnu/release
50
+ cp -r debug/* x86_64-unknown-linux-gnu/release/
51
+ )
52
+ exit 0
53
+ fi
54
+
55
+ /rust/bin/cargo "$@"
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile ADDED
@@ -0,0 +1,420 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2016 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ echo "---------------------------------------------------------------"
19
+
20
+ sysctl -w vm.mmap_rnd_bits=28
21
+
22
+ OSS_FUZZ_ON_DEMAND="${OSS_FUZZ_ON_DEMAND:-0}"
23
+
24
+ # Used for Rust introspector builds
25
+ RUST_SANITIZER=$SANITIZER
26
+
27
+ if [ "$FUZZING_LANGUAGE" = "jvm" ]; then
28
+ if [ "$FUZZING_ENGINE" != "libfuzzer" ] && [ "$FUZZING_ENGINE" != "wycheproof" ]; then
29
+ echo "ERROR: JVM projects can be fuzzed with libFuzzer or tested with wycheproof engines only."
30
+ exit 1
31
+ fi
32
+ if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "coverage" ] && [ "$SANITIZER" != "undefined" ] && [ "$SANITIZER" != "none" ] && [ "$SANITIZER" != "introspector" ]; then
33
+ echo "ERROR: JVM projects can be fuzzed with AddressSanitizer or UndefinedBehaviorSanitizer or Introspector only."
34
+ exit 1
35
+ fi
36
+ if [ "$ARCHITECTURE" != "x86_64" ]; then
37
+ echo "ERROR: JVM projects can be fuzzed on x86_64 architecture only."
38
+ exit 1
39
+ fi
40
+ fi
41
+
42
+ if [ "$FUZZING_LANGUAGE" = "rust" ]; then
43
+ if [ "$SANITIZER" = "introspector" ]; then
44
+ # introspector sanitizer flag will cause cargo build to fail. Rremove it
45
+ # temporarily, RUST_SANITIZER will hold the original sanitizer.
46
+ export SANITIZER=address
47
+ fi
48
+ fi
49
+
50
+
51
+ if [ "$FUZZING_LANGUAGE" = "javascript" ]; then
52
+ if [ "$FUZZING_ENGINE" != "libfuzzer" ]; then
53
+ echo "ERROR: JavaScript projects can be fuzzed with libFuzzer engine only."
54
+ exit 1
55
+ fi
56
+ if [ "$SANITIZER" != "coverage" ] && [ "$SANITIZER" != "none" ]; then
57
+ echo "ERROR: JavaScript projects cannot be fuzzed with sanitizers."
58
+ exit 1
59
+ fi
60
+ if [ "$ARCHITECTURE" != "x86_64" ]; then
61
+ echo "ERROR: JavaScript projects can be fuzzed on x86_64 architecture only."
62
+ exit 1
63
+ fi
64
+ fi
65
+
66
+ if [ "$FUZZING_LANGUAGE" = "python" ]; then
67
+ if [ "$FUZZING_ENGINE" != "libfuzzer" ]; then
68
+ echo "ERROR: Python projects can be fuzzed with libFuzzer engine only."
69
+ exit 1
70
+ fi
71
+ if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "undefined" ] && [ "$SANITIZER" != "coverage" ] && [ "$SANITIZER" != "introspector" ]; then
72
+ echo "ERROR: Python projects can be fuzzed with AddressSanitizer or UndefinedBehaviorSanitizer or Coverage or Fuzz Introspector only."
73
+ exit 1
74
+ fi
75
+ if [ "$ARCHITECTURE" != "x86_64" ]; then
76
+ echo "ERROR: Python projects can be fuzzed on x86_64 architecture only."
77
+ exit 1
78
+ fi
79
+ fi
80
+
81
+ if [ -z "${SANITIZER_FLAGS-}" ]; then
82
+ FLAGS_VAR="SANITIZER_FLAGS_${SANITIZER}"
83
+ export SANITIZER_FLAGS=${!FLAGS_VAR-}
84
+ fi
85
+
86
+ if [[ $ARCHITECTURE == "i386" ]]; then
87
+ export CFLAGS="-m32 $CFLAGS"
88
+ cp -R /usr/i386/lib/* /usr/local/lib
89
+ cp -R /usr/i386/include/* /usr/local/include
90
+ fi
91
+
92
+ # Don't use a fuzzing engine with Jazzer which has libFuzzer built-in or with
93
+ # FuzzBench which will provide the fuzzing engine.
94
+ if [[ $FUZZING_ENGINE != "none" ]] && [[ $FUZZING_LANGUAGE != "jvm" ]] && [[ "${OSS_FUZZ_ON_DEMAND}" == "0" ]] ; then
95
+ # compile script might override environment, use . to call it.
96
+ . compile_${FUZZING_ENGINE}
97
+ fi
98
+
99
+ if [[ $SANITIZER_FLAGS = *sanitize=memory* ]]
100
+ then
101
+ # Take all libraries from lib/msan
102
+ # export CXXFLAGS_EXTRA="-L/usr/msan/lib $CXXFLAGS_EXTRA"
103
+ cp -R /usr/msan/lib/* /usr/local/lib/x86_64-unknown-linux-gnu/
104
+ cp -R /usr/msan/include/* /usr/local/include
105
+
106
+ echo 'Building without MSan instrumented libraries.'
107
+ fi
108
+
109
+ # Coverage flag overrides.
110
+ COVERAGE_FLAGS_VAR="COVERAGE_FLAGS_${SANITIZER}"
111
+ if [[ -n ${!COVERAGE_FLAGS_VAR+x} ]]
112
+ then
113
+ export COVERAGE_FLAGS="${!COVERAGE_FLAGS_VAR}"
114
+ fi
115
+
116
+ # Only need the default coverage instrumentation for libFuzzer or honggfuzz.
117
+ # Other engines bring their own.
118
+ if [ $FUZZING_ENGINE = "none" ] || [ $FUZZING_ENGINE = "afl" ] || [ $FUZZING_ENGINE = "centipede" ] || [ "${OSS_FUZZ_ON_DEMAND}" != "0" ]; then
119
+ export COVERAGE_FLAGS=
120
+ fi
121
+
122
+ # Rust does not support sanitizers and coverage flags via CFLAGS/CXXFLAGS, so
123
+ # use RUSTFLAGS.
124
+ # FIXME: Support code coverage once support is in.
125
+ # See https://github.com/rust-lang/rust/issues/34701.
126
+ if [ "$RUST_SANITIZER" == "introspector" ]; then
127
+ export RUSTFLAGS="-Cdebuginfo=2 -Cforce-frame-pointers"
128
+ elif [ "$SANITIZER" != "undefined" ] && [ "$SANITIZER" != "coverage" ] && [ "$SANITIZER" != "none" ] && [ "$ARCHITECTURE" != 'i386' ]; then
129
+ export RUSTFLAGS="--cfg fuzzing -Zsanitizer=${SANITIZER} -Cdebuginfo=1 -Cforce-frame-pointers"
130
+ else
131
+ export RUSTFLAGS="--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers"
132
+ fi
133
+ if [ "$SANITIZER" = "coverage" ]
134
+ then
135
+ # link to C++ from comment in f5098035eb1a14aa966c8651d88ea3d64323823d
136
+ export RUSTFLAGS="$RUSTFLAGS -Cinstrument-coverage -C link-arg=-lc++"
137
+ fi
138
+
139
+ # Add Rust libfuzzer flags.
140
+ # See https://github.com/rust-fuzz/libfuzzer/blob/master/build.rs#L12.
141
+ export CUSTOM_LIBFUZZER_PATH="$LIB_FUZZING_ENGINE_DEPRECATED"
142
+ export CUSTOM_LIBFUZZER_STD_CXX=c++
143
+
144
+ export CFLAGS="$CFLAGS $SANITIZER_FLAGS $COVERAGE_FLAGS"
145
+ export CXXFLAGS="$CFLAGS $CXXFLAGS_EXTRA"
146
+
147
+ if [ "$SANITIZER" = "undefined" ]; then
148
+ # Disable "function" sanitizer for C code for now, because many projects,
149
+ # possibly via legacy C code are affected.
150
+ # The projects should be fixed and this workaround be removed in the future.
151
+ # TODO(#11778):
152
+ # https://github.com/google/oss-fuzz/issues/11778
153
+ export CFLAGS="$CFLAGS -fno-sanitize=function"
154
+ fi
155
+
156
+ if [ "$FUZZING_LANGUAGE" = "go" ]; then
157
+ # required by Go 1.20
158
+ export CXX="${CXX} -lresolv"
159
+ fi
160
+
161
+ if [ "$FUZZING_LANGUAGE" = "python" ]; then
162
+ sanitizer_with_fuzzer_lib_dir=`python3 -c "import atheris; import os; print(atheris.path())"`
163
+ sanitizer_with_fuzzer_output_lib=$OUT/sanitizer_with_fuzzer.so
164
+ if [ "$SANITIZER" = "address" ]; then
165
+ cp $sanitizer_with_fuzzer_lib_dir/asan_with_fuzzer.so $sanitizer_with_fuzzer_output_lib
166
+ elif [ "$SANITIZER" = "undefined" ]; then
167
+ cp $sanitizer_with_fuzzer_lib_dir/ubsan_with_fuzzer.so $sanitizer_with_fuzzer_output_lib
168
+ fi
169
+
170
+ # Disable leak checking as it is unsupported.
171
+ export CFLAGS="$CFLAGS -fno-sanitize=function,leak,vptr,"
172
+ export CXXFLAGS="$CXXFLAGS -fno-sanitize=function,leak,vptr"
173
+ fi
174
+
175
+ # Copy latest llvm-symbolizer in $OUT for stack symbolization.
176
+ cp $(which llvm-symbolizer) $OUT/
177
+
178
+ # Copy Jazzer to $OUT if needed.
179
+ if [ "$FUZZING_LANGUAGE" = "jvm" ]; then
180
+ cp $(which jazzer_agent_deploy.jar) $(which jazzer_driver) $(which jazzer_junit.jar) $OUT/
181
+ jazzer_driver_with_sanitizer=$OUT/jazzer_driver_with_sanitizer
182
+ if [ "$SANITIZER" = "address" ]; then
183
+ cat > $jazzer_driver_with_sanitizer << 'EOF'
184
+ #!/bin/bash
185
+ this_dir=$(dirname "$0")
186
+ "$this_dir/jazzer_driver" --asan "$@"
187
+ EOF
188
+ elif [ "$SANITIZER" = "undefined" ]; then
189
+ cat > $jazzer_driver_with_sanitizer << 'EOF'
190
+ #!/bin/bash
191
+ this_dir=$(dirname "$0")
192
+ "$this_dir/jazzer_driver" --ubsan "$@"
193
+ EOF
194
+ elif [ "$SANITIZER" = "coverage" ] || [ "$SANITIZER" = "introspector" ]; then
195
+ # Coverage & introspector builds require no instrumentation.
196
+ cp $(which jazzer_driver) $jazzer_driver_with_sanitizer
197
+ fi
198
+ chmod +x $jazzer_driver_with_sanitizer
199
+
200
+ # Disable leak checking since the JVM triggers too many false positives.
201
+ export CFLAGS="$CFLAGS -fno-sanitize=leak"
202
+ export CXXFLAGS="$CXXFLAGS -fno-sanitize=leak"
203
+ fi
204
+
205
+ if [ "$SANITIZER" = "introspector" ] || [ "$RUST_SANITIZER" = "introspector" ]; then
206
+ export AR=llvm-ar
207
+ export NM=llvm-nm
208
+ export RANLIB=llvm-ranlib
209
+
210
+ export CFLAGS="$CFLAGS -g"
211
+ export CXXFLAGS="$CXXFLAGS -g"
212
+ export FI_BRANCH_PROFILE=1
213
+ export FUZZ_INTROSPECTOR=1
214
+ export FUZZ_INTROSPECTOR_AUTO_FUZZ=1
215
+
216
+ # Move ar and ranlib
217
+ mv /usr/bin/ar /usr/bin/old-ar
218
+ mv /usr/bin/nm /usr/bin/old-nm
219
+ mv /usr/bin/ranlib /usr/bin/old-ranlib
220
+
221
+ ln -sf /usr/local/bin/llvm-ar /usr/bin/ar
222
+ ln -sf /usr/local/bin/llvm-nm /usr/bin/nm
223
+ ln -sf /usr/local/bin/llvm-ranlib /usr/bin/ranlib
224
+
225
+ apt-get install -y libjpeg-dev zlib1g-dev libyaml-dev
226
+ python3 -m pip install --upgrade pip setuptools
227
+ python3 -m pip install cxxfilt pyyaml beautifulsoup4 lxml soupsieve rust-demangler
228
+ python3 -m pip install --prefer-binary matplotlib
229
+
230
+ # Install Fuzz-Introspector
231
+ pushd /fuzz-introspector/src
232
+ python3 -m pip install -e .
233
+ popd
234
+
235
+ if [ "$FUZZING_LANGUAGE" = "python" ]; then
236
+ python3 /fuzz-introspector/src/main.py light --language=python
237
+ cp -rf $SRC/inspector/ /tmp/inspector-saved
238
+ elif [ "$FUZZING_LANGUAGE" = "jvm" ]; then
239
+ python3 /fuzz-introspector/src/main.py light --language=jvm
240
+ cp -rf $SRC/inspector/ /tmp/inspector-saved
241
+ elif [ "$FUZZING_LANGUAGE" = "rust" ]; then
242
+ python3 /fuzz-introspector/src/main.py light --language=rust
243
+ cp -rf $SRC/inspector/ /tmp/inspector-saved
244
+ else
245
+ python3 /fuzz-introspector/src/main.py light
246
+
247
+ # Make a copy of the light. This is needed because we run two versions of
248
+ # introspector: one based on pure statis analysis and one based on
249
+ # regular LTO.
250
+ cp -rf $SRC/inspector/ /tmp/inspector-saved
251
+
252
+
253
+ # Move coverage report.
254
+ if [ -d "$OUT/textcov_reports" ]
255
+ then
256
+ find $OUT/textcov_reports/ -name "*.covreport" -exec cp {} $SRC/inspector/ \;
257
+ find $OUT/textcov_reports/ -name "*.json" -exec cp {} $SRC/inspector/ \;
258
+ fi
259
+
260
+ # Make fuzz-introspector HTML report using light approach.
261
+ REPORT_ARGS="--name=$PROJECT_NAME"
262
+
263
+ # Only pass coverage_url when COVERAGE_URL is set (in cloud builds)
264
+ if [[ ! -z "${COVERAGE_URL+x}" ]]; then
265
+ REPORT_ARGS="$REPORT_ARGS --coverage-url=${COVERAGE_URL}"
266
+ fi
267
+
268
+ # Run pure static analysis fuzz introspector
269
+ fuzz-introspector full --target-dir=$SRC \
270
+ --language=${FUZZING_LANGUAGE} \
271
+ --out-dir=$SRC/inspector \
272
+ ${REPORT_ARGS}
273
+ fi
274
+
275
+ rsync -avu --delete "$SRC/inspector/" "$OUT/inspector"
276
+ fi
277
+
278
+ echo "---------------------------------------------------------------"
279
+ echo "CC=$CC"
280
+ echo "CXX=$CXX"
281
+ echo "CFLAGS=$CFLAGS"
282
+ echo "CXXFLAGS=$CXXFLAGS"
283
+ echo "RUSTFLAGS=$RUSTFLAGS"
284
+ echo "---------------------------------------------------------------"
285
+
286
+ if [ "${OSS_FUZZ_ON_DEMAND}" != "0" ]; then
287
+ fuzzbench_build
288
+ cp $(which llvm-symbolizer) $OUT/
289
+ exit 0
290
+ fi
291
+
292
+
293
+ if [[ ! -z "${CAPTURE_REPLAY_SCRIPT-}" ]]; then
294
+ # Capture a replaying build script which can be used for replaying the build
295
+ # after a vanilla build. This script is meant to be used in a cached
296
+ # container.
297
+ python3 -m pip install bashlex
298
+ python3 /usr/local/bin/bash_parser.py $SRC/build.sh
299
+ fi
300
+
301
+ # Prepare the build command to run the project's build script.
302
+ if [[ ! -z "${REPLAY_ENABLED-}" ]]; then
303
+ # If this is a replay, then use replay_build.sh. This is expected to be
304
+ # running in a cached container where a build has already happened prior.
305
+ BUILD_CMD="bash -eux $SRC/replay_build.sh"
306
+ else
307
+ BUILD_CMD="bash -eux $SRC/build.sh"
308
+ fi
309
+
310
+ # Set +u temporarily to continue even if GOPATH and OSSFUZZ_RUSTPATH are undefined.
311
+ set +u
312
+ # We need to preserve source code files for generating a code coverage report.
313
+ # We need exact files that were compiled, so copy both $SRC and $WORK dirs.
314
+ COPY_SOURCES_CMD="cp -rL --parents $SRC $WORK /usr/include /usr/local/include $GOPATH $OSSFUZZ_RUSTPATH /rustc $OUT"
315
+ set -u
316
+
317
+ if [ "$FUZZING_LANGUAGE" = "rust" ]; then
318
+ # Copy rust std lib to its path with a hash.
319
+ export rustch=`rustc --version --verbose | grep commit-hash | cut -d' ' -f2`
320
+ mkdir -p /rustc/$rustch/
321
+ export rustdef=`rustup toolchain list | grep default | cut -d' ' -f1`
322
+ cp -r /rust/rustup/toolchains/$rustdef/lib/rustlib/src/rust/library/ /rustc/$rustch/
323
+ fi
324
+
325
+ if [ "${BUILD_UID-0}" -ne "0" ]; then
326
+ adduser -u $BUILD_UID --disabled-password --gecos '' builder
327
+ chown -R builder $SRC $OUT $WORK
328
+ su -c "$BUILD_CMD" builder
329
+ if [ "$SANITIZER" = "coverage" ]; then
330
+ # Some directories have broken symlinks (e.g. honggfuzz), ignore the errors.
331
+ su -c "$COPY_SOURCES_CMD" builder 2>/dev/null || true
332
+ fi
333
+ else
334
+ $BUILD_CMD
335
+ if [ "$SANITIZER" = "coverage" ]; then
336
+ # Some directories have broken symlinks (e.g. honggfuzz), ignore the errors.
337
+ $COPY_SOURCES_CMD 2>/dev/null || true
338
+ fi
339
+ fi
340
+
341
+ if [ "$SANITIZER" = "introspector" ] || [ "$RUST_SANITIZER" = "introspector" ]; then
342
+ unset CXXFLAGS
343
+ unset CFLAGS
344
+ export G_ANALYTICS_TAG="G-8WTFM1Y62J"
345
+
346
+ # If we get to here, it means the e.g. LTO had no problems and succeeded.
347
+ # TO this end, we wlil restore the original light analysis and used the
348
+ # LTO processing itself.
349
+ rm -rf $SRC/inspector
350
+ cp -rf /tmp/inspector-saved $SRC/inspector
351
+
352
+ cd /fuzz-introspector/src
353
+ python3 -m pip install -e .
354
+ cd /src/
355
+
356
+ if [ "$FUZZING_LANGUAGE" = "rust" ]; then
357
+ # Restore the sanitizer flag for rust
358
+ export SANITIZER="introspector"
359
+ fi
360
+
361
+ mkdir -p $SRC/inspector
362
+ find $SRC/ -name "fuzzerLogFile-*.data" -exec cp {} $SRC/inspector/ \;
363
+ find $SRC/ -name "fuzzerLogFile-*.data.yaml" -exec cp {} $SRC/inspector/ \;
364
+ find $SRC/ -name "fuzzerLogFile-*.data.debug_*" -exec cp {} $SRC/inspector/ \;
365
+ find $SRC/ -name "allFunctionsWithMain-*.yaml" -exec cp {} $SRC/inspector/ \;
366
+
367
+ # Move coverage report.
368
+ if [ -d "$OUT/textcov_reports" ]
369
+ then
370
+ find $OUT/textcov_reports/ -name "*.covreport" -exec cp {} $SRC/inspector/ \;
371
+ find $OUT/textcov_reports/ -name "*.json" -exec cp {} $SRC/inspector/ \;
372
+ fi
373
+
374
+ cd $SRC/inspector
375
+
376
+ # Make fuzz-introspector HTML report.
377
+ REPORT_ARGS="--name=$PROJECT_NAME"
378
+ # Only pass coverage_url when COVERAGE_URL is set (in cloud builds)
379
+ if [[ ! -z "${COVERAGE_URL+x}" ]]; then
380
+ REPORT_ARGS="$REPORT_ARGS --coverage-url=${COVERAGE_URL}"
381
+ fi
382
+
383
+ # Do different things depending on languages
384
+ if [ "$FUZZING_LANGUAGE" = "python" ]; then
385
+ echo "GOING python route"
386
+ set -x
387
+ REPORT_ARGS="$REPORT_ARGS --target-dir=$SRC/inspector"
388
+ REPORT_ARGS="$REPORT_ARGS --language=python"
389
+ fuzz-introspector report $REPORT_ARGS
390
+ rsync -avu --delete "$SRC/inspector/" "$OUT/inspector"
391
+ elif [ "$FUZZING_LANGUAGE" = "jvm" ]; then
392
+ echo "GOING jvm route"
393
+ set -x
394
+ find $OUT/ -name "jacoco.xml" -exec cp {} $SRC/inspector/ \;
395
+ REPORT_ARGS="$REPORT_ARGS --target-dir=$SRC --out-dir=$SRC/inspector"
396
+ REPORT_ARGS="$REPORT_ARGS --language=jvm"
397
+ fuzz-introspector full $REPORT_ARGS
398
+ rsync -avu --delete "$SRC/inspector/" "$OUT/inspector"
399
+ elif [ "$FUZZING_LANGUAGE" = "rust" ]; then
400
+ echo "GOING rust route"
401
+ REPORT_ARGS="$REPORT_ARGS --target-dir=$SRC --out-dir=$SRC/inspector"
402
+ REPORT_ARGS="$REPORT_ARGS --language=rust"
403
+ fuzz-introspector full $REPORT_ARGS
404
+ rsync -avu --delete "$SRC/inspector/" "$OUT/inspector"
405
+ else
406
+ # C/C++
407
+ mkdir -p $SRC/inspector
408
+ # Correlate fuzzer binaries to fuzz-introspector's raw data
409
+ fuzz-introspector correlate --binaries-dir=$OUT/
410
+
411
+ # Generate fuzz-introspector HTML report, this generates
412
+ # the file exe_to_fuzz_introspector_logs.yaml
413
+ REPORT_ARGS="$REPORT_ARGS --target-dir=$SRC/inspector"
414
+ # Use the just-generated correlation file
415
+ REPORT_ARGS="$REPORT_ARGS --correlation-file=exe_to_fuzz_introspector_logs.yaml"
416
+ fuzz-introspector report $REPORT_ARGS
417
+
418
+ rsync -avu --delete "$SRC/inspector/" "$OUT/inspector"
419
+ fi
420
+ fi
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_afl ADDED
@@ -0,0 +1,53 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2016 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ # If LLVM once again does weird changes then enable this:
19
+ #export AFL_LLVM_INSTRUMENT=LLVM-NATIVE
20
+
21
+ # AFL++ setup
22
+ echo "Copying precompiled AFL++"
23
+
24
+ # Copy AFL++ tools necessary for fuzzing.
25
+ pushd $SRC/aflplusplus > /dev/null
26
+
27
+ cp -f libAFLDriver.a $LIB_FUZZING_ENGINE
28
+
29
+ # Some important projects include libraries, copy those even when they don't
30
+ # start with "afl-". Use "sort -u" to avoid a warning about duplicates.
31
+ ls afl-* *.txt *.a *.o *.so | sort -u | xargs cp -t $OUT
32
+ export CC="$SRC/aflplusplus/afl-clang-fast"
33
+ export CXX="$SRC/aflplusplus/afl-clang-fast++"
34
+
35
+ # Set sane AFL++ environment defaults:
36
+ # Be quiet, otherwise this can break some builds.
37
+ export AFL_QUIET=1
38
+ # No leak errors during builds.
39
+ export ASAN_OPTIONS="detect_leaks=0:symbolize=0:detect_odr_violation=0:abort_on_error=1"
40
+ # Do not abort on any problems (because this is during build where it is ok)
41
+ export AFL_IGNORE_PROBLEMS=1
42
+ # No complain on unknown AFL environment variables
43
+ export AFL_IGNORE_UNKNOWN_ENVS=1
44
+
45
+ # Provide a way to document the AFL++ options used in this build:
46
+ echo
47
+ echo AFL++ target compilation setup:
48
+ env | egrep '^AFL_' | tee "$OUT/afl_options.txt"
49
+ echo
50
+
51
+ popd > /dev/null
52
+
53
+ echo " done."
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_centipede ADDED
@@ -0,0 +1,32 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ echo "Skipping compilation; using precompiled centipede"
19
+
20
+ if [[ "$SANITIZER" == 'none' ]]; then
21
+ cp "$CENTIPEDE_BIN_DIR/centipede" "$OUT"
22
+ fi
23
+
24
+ cp "$CENTIPEDE_BIN_DIR/libcentipede_runner.pic.a" "$LIB_FUZZING_ENGINE"
25
+
26
+ export CENTIPEDE_FLAGS=`cat "$SRC/fuzztest/centipede/clang-flags.txt" | tr '\n' ' '`
27
+ export LIBRARIES_FLAGS="-Wno-unused-command-line-argument -Wl,-ldl -Wl,-lrt -Wl,-lpthread -Wl,$SRC/fuzztest/centipede/weak.o"
28
+
29
+ export CFLAGS="$CFLAGS $CENTIPEDE_FLAGS $LIBRARIES_FLAGS"
30
+ export CXXFLAGS="$CXXFLAGS $CENTIPEDE_FLAGS $LIBRARIES_FLAGS"
31
+
32
+ echo 'done.'
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_honggfuzz ADDED
@@ -0,0 +1,33 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2016 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ echo "Skipping compilation; using precompiled honggfuzz"
19
+
20
+ cp $SRC/honggfuzz/honggfuzz.a $LIB_FUZZING_ENGINE
21
+ cp $SRC/honggfuzz/honggfuzz $OUT/
22
+
23
+ # Set flags necessary for netdriver compilation.
24
+ export LIB_HFND="-Wl,-u,LIBHFNETDRIVER_module_netdriver -Wl,--start-group $SRC/honggfuzz/libhfnetdriver/libhfnetdriver.a $SRC/honggfuzz/libhfcommon/libhfcommon.a -Wl,--end-group"
25
+
26
+ export HFND_CXXFLAGS='-DHFND_FUZZING_ENTRY_FUNCTION_CXX(x,y)=extern const char* LIBHFNETDRIVER_module_netdriver;const char** LIBHFNETDRIVER_tmp1 = &LIBHFNETDRIVER_module_netdriver;extern "C" int HonggfuzzNetDriver_main(x,y);int HonggfuzzNetDriver_main(x,y)'
27
+ export HFND_CFLAGS='-DHFND_FUZZING_ENTRY_FUNCTION(x,y)=extern const char* LIBHFNETDRIVER_module_netdriver;const char** LIBHFNETDRIVER_tmp1 = &LIBHFNETDRIVER_module_netdriver;int HonggfuzzNetDriver_main(x,y);int HonggfuzzNetDriver_main(x,y)'
28
+
29
+ # Custom coverage flags, roughly in sync with:
30
+ # https://github.com/google/honggfuzz/blob/oss-fuzz/hfuzz_cc/hfuzz-cc.c
31
+ export COVERAGE_FLAGS="-fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp"
32
+
33
+ echo " done."
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_javascript_fuzzer ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2023 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ project=$1
19
+ # Path the fuzz target source file relative to the project's root.
20
+ fuzz_target=$2
21
+ # Arguments to pass to Jazzer.js
22
+ jazzerjs_args=${@:3}
23
+
24
+ # Copy source code into the $OUT directory and install Jazzer.js into the project.
25
+ if [ ! -d $OUT/$project ]; then
26
+ cp -r $SRC/$project $OUT/$project
27
+ fi
28
+
29
+ fuzzer_basename=$(basename -s .js $fuzz_target)
30
+
31
+ # Create an execution wrapper that executes Jazzer.js with the correct arguments.
32
+ echo "#!/bin/bash
33
+ # LLVMFuzzerTestOneInput so that the wrapper script is recognized as a fuzz target for 'check_build'.
34
+ project_dir=\$(dirname \"\$0\")/$project
35
+ \$project_dir/node_modules/@jazzer.js/core/dist/cli.js \$project_dir/$fuzz_target $jazzerjs_args \$JAZZERJS_EXTRA_ARGS -- \$@" > $OUT/$fuzzer_basename
36
+
37
+ chmod +x $OUT/$fuzzer_basename
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_libfuzzer ADDED
@@ -0,0 +1,25 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2016 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ echo -n "Compiling libFuzzer to $LIB_FUZZING_ENGINE... "
19
+ export LIB_FUZZING_ENGINE="-fsanitize=fuzzer"
20
+ if [ "$FUZZING_LANGUAGE" = "go" ]; then
21
+ export LIB_FUZZING_ENGINE="$LIB_FUZZING_ENGINE $GOPATH/gosigfuzz/gosigfuzz.o"
22
+ fi
23
+
24
+ cp /usr/local/lib/clang/*/lib/$ARCHITECTURE-unknown-linux-gnu/libclang_rt.fuzzer.a $LIB_FUZZING_ENGINE_DEPRECATED
25
+ echo " done."
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/compile_python_fuzzer ADDED
@@ -0,0 +1,128 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ # In order to enable PySecSan for a given module, set the environment
19
+ # variable ENABLE_PYSECSAN="YES"
20
+
21
+ fuzzer_path=$1
22
+ shift 1
23
+
24
+ fuzzer_basename=$(basename -s .py $fuzzer_path)
25
+ fuzzer_package=${fuzzer_basename}.pkg
26
+
27
+ PYFUZZ_WORKPATH=$SRC/pyfuzzworkdir/
28
+ FUZZ_WORKPATH=$PYFUZZ_WORKPATH/$fuzzer_basename
29
+
30
+ if [[ $SANITIZER = *introspector* ]]; then
31
+ # Extract the source package the fuzzer targets. This must happen before
32
+ # we enter the virtual environment in the following lines because we need
33
+ # to use the same python environment that installed the fuzzer dependencies.
34
+ python3 /fuzz-introspector/frontends/python/prepare_fuzz_imports.py $fuzzer_path isossfuzz
35
+
36
+ # We must ensure python3.9, this is because we use certain
37
+ # AST logic from there.
38
+ # The below should probably be refined
39
+ apt-get install -y python3.9
40
+ apt-get update
41
+ apt-get install -y python3-pip
42
+ python3.9 -m pip install virtualenv
43
+ python3.9 -m virtualenv .venv
44
+ . .venv/bin/activate
45
+ pip3 install pyyaml
46
+ export PYTHONPATH="/fuzz-introspector/frontends/python/PyCG"
47
+
48
+ ARGS="--fuzzer $fuzzer_path"
49
+ if [ -n "${PYFUZZPACKAGE-}" ]; then
50
+ ARGS="$ARGS --package=${PYFUZZPACKAGE}"
51
+ fi
52
+ python /fuzz-introspector/frontends/python/main.py $ARGS
53
+ ls -la ./
54
+ exit 0
55
+ fi
56
+
57
+ # In coverage mode prepend coverage logic to the fuzzer source
58
+ if [[ $SANITIZER = *coverage* ]]; then
59
+ cat <<EOF > coverage_wrapper.py
60
+ ###### Coverage stub
61
+ import atexit
62
+ import coverage
63
+ cov = coverage.coverage(data_file='.coverage', cover_pylib=True)
64
+ cov.start()
65
+ # Register an exist handler that will print coverage
66
+ def exit_handler():
67
+ cov.stop()
68
+ cov.save()
69
+ atexit.register(exit_handler)
70
+ ####### End of coverage stub
71
+ EOF
72
+
73
+ # Prepend stub and create tmp file
74
+ cat coverage_wrapper.py $fuzzer_path > tmp_fuzzer_coverage.py
75
+
76
+ # Overwrite existing fuzzer with new fuzzer that has stub
77
+ mv tmp_fuzzer_coverage.py $fuzzer_path
78
+ fi
79
+
80
+ # If PYSECSAN is enabled, ensure that we can build with it.
81
+ if [[ ${ENABLE_PYSECSAN:-"0"} != "0" ]];
82
+ then
83
+ # Make sure pysecsan is installed
84
+ if [[ ! -d "/pysecsan" ]];
85
+ then
86
+ pushd /usr/local/lib/sanitizers/pysecsan
87
+ python3 -m pip install .
88
+ popd
89
+ fi
90
+
91
+ cat <<EOF > pysecsan_wrapper.py
92
+ import pysecsan; pysecsan.add_hooks();
93
+ EOF
94
+
95
+ # Prepend stub and create tmp file
96
+ cat pysecsan_wrapper.py $fuzzer_path > tmp_fuzzer_pysecsan.py
97
+
98
+ # Overwrite existing fuzzer with new fuzzer that has stub
99
+ mv tmp_fuzzer_pysecsan.py $fuzzer_path
100
+ fi
101
+
102
+ rm -rf $PYFUZZ_WORKPATH
103
+ mkdir $PYFUZZ_WORKPATH $FUZZ_WORKPATH
104
+
105
+ pyinstaller --distpath $OUT --workpath=$FUZZ_WORKPATH --onefile --name $fuzzer_package "$@" $fuzzer_path
106
+
107
+ # Disable executable bit from package as OSS-Fuzz uses executable bits to
108
+ # identify fuzz targets. We re-enable the executable bit in wrapper script
109
+ # below.
110
+ chmod -x $OUT/$fuzzer_package
111
+
112
+ # In coverage mode save source files of dependencies in pyinstalled binary
113
+ if [[ $SANITIZER = *coverage* ]]; then
114
+ rm -rf /medio/
115
+ python3 /usr/local/bin/python_coverage_helper.py $FUZZ_WORKPATH "/medio"
116
+ zip -r $fuzzer_package.deps.zip /medio
117
+ mv $fuzzer_package.deps.zip $OUT/
118
+ fi
119
+
120
+ # Create execution wrapper.
121
+ echo "#!/bin/sh
122
+ # LLVMFuzzerTestOneInput for fuzzer detection.
123
+ this_dir=\$(dirname \"\$0\")
124
+ chmod +x \$this_dir/$fuzzer_package
125
+ LD_PRELOAD=\$this_dir/sanitizer_with_fuzzer.so \
126
+ ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_leaks=0 \
127
+ \$this_dir/$fuzzer_package \$@" > $OUT/$fuzzer_basename
128
+ chmod +x $OUT/$fuzzer_basename
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/detect_repo.py ADDED
@@ -0,0 +1,182 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2019 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module to get the the name of a git repo containing a specific commit
15
+ inside of an OSS-Fuzz project.
16
+
17
+ Example Usage:
18
+
19
+ python detect_repo.py --src_dir /src --example_commit
20
+ b534f03eecd8a109db2b085ab24d419b6486de97
21
+
22
+ Prints the location of the git remote repo as well as the repo's name
23
+ seperated by a space.
24
+
25
+ https://github.com/VirusTotal/yara.git yara
26
+
27
+ """
28
+ import argparse
29
+ import logging
30
+ import os
31
+ import subprocess
32
+
33
+ GO_PATH = '/root/go/src/'
34
+
35
+
36
+ def main():
37
+ """Function to get a git repo's url and name referenced by OSS-Fuzz
38
+ Dockerfile.
39
+
40
+ Raises:
41
+ ValueError when a commit or a ref is not provided.
42
+ """
43
+ parser = argparse.ArgumentParser(
44
+ description=
45
+ 'Finds a specific git repo in an oss-fuzz project\'s docker file.')
46
+ parser.add_argument('--repo_name', help='The name of the git repo.')
47
+ parser.add_argument('--src_dir', help='The location of the possible repo.')
48
+ parser.add_argument('--example_commit',
49
+ help='A commit SHA referencing the project\'s main repo.')
50
+
51
+ args = parser.parse_args()
52
+ if not args.repo_name and not args.example_commit:
53
+ raise ValueError(
54
+ 'Requires an example commit or a repo name to find repo location.')
55
+ if args.src_dir:
56
+ src_dir = args.src_dir
57
+ else:
58
+ src_dir = os.environ.get('SRC', '/src')
59
+
60
+ for single_dir in get_dirs_to_search(src_dir, args.repo_name):
61
+ full_path = os.path.join(src_dir, single_dir)
62
+ if not os.path.isdir(full_path):
63
+ continue
64
+ if args.example_commit and check_for_commit(full_path, args.example_commit):
65
+ print('Detected repo:', get_repo(full_path), full_path)
66
+ return
67
+ if args.repo_name and check_for_repo_name(full_path, args.repo_name):
68
+ print('Detected repo:', get_repo(full_path), full_path)
69
+ return
70
+ logging.error('No git repos with specific commit: %s found in %s',
71
+ args.example_commit, src_dir)
72
+
73
+
74
+ def get_dirs_to_search(src_dir, repo_name):
75
+ """Gets a list of directories to search for the main git repo.
76
+
77
+ Args:
78
+ src_dir: The location set for the projects SRC.
79
+ repo_name: The name of the repo you are searching for.
80
+
81
+ Returns:
82
+ A list of directorys to search.
83
+ """
84
+ dirs_to_search = os.listdir(src_dir)
85
+ if os.path.exists(GO_PATH) and repo_name:
86
+ for root, dirs, _ in os.walk(GO_PATH):
87
+ for test_dir in dirs:
88
+ if repo_name in test_dir:
89
+ dirs_to_search.append(os.path.join(root, test_dir))
90
+ return dirs_to_search
91
+
92
+
93
+ def get_repo(repo_path):
94
+ """Gets a git repo link from a specific directory in a docker image.
95
+
96
+ Args:
97
+ repo_path: The directory on the image where the git repo exists.
98
+
99
+ Returns:
100
+ The repo location or None.
101
+ """
102
+ output, return_code = execute(['git', 'config', '--get', 'remote.origin.url'],
103
+ location=repo_path,
104
+ check_result=True)
105
+ if return_code == 0 and output:
106
+ return output.rstrip()
107
+ return None
108
+
109
+
110
+ def check_for_repo_name(repo_path, expected_repo_name):
111
+ """Returns True if the repo at |repo_path| repo_name matches
112
+ |expected_repo_name|.
113
+
114
+ Args:
115
+ repo_path: The directory of a git repo.
116
+ expected_repo_name: The name of the target git repo.
117
+ """
118
+ if not os.path.exists(os.path.join(repo_path, '.git')):
119
+ return False
120
+
121
+ repo_url, _ = execute(['git', 'config', '--get', 'remote.origin.url'],
122
+ location=repo_path)
123
+ # Handle two common cases:
124
+ # https://github.com/google/syzkaller/
125
+ # https://github.com/google/syzkaller.git
126
+ repo_url = repo_url.replace('.git', '').rstrip().rstrip('/')
127
+ actual_repo_name = repo_url.split('/')[-1]
128
+ return actual_repo_name == expected_repo_name
129
+
130
+
131
+ def check_for_commit(repo_path, commit):
132
+ """Checks a directory for a specific commit.
133
+
134
+ Args:
135
+ repo_path: The name of the directory to test for the commit.
136
+ commit: The commit SHA to check for.
137
+
138
+ Returns:
139
+ True if directory contains that commit.
140
+ """
141
+
142
+ # Check if valid git repo.
143
+ if not os.path.exists(os.path.join(repo_path, '.git')):
144
+ return False
145
+
146
+ # Check if history fetch is needed.
147
+ if os.path.exists(os.path.join(repo_path, '.git', 'shallow')):
148
+ execute(['git', 'fetch', '--unshallow'], location=repo_path)
149
+
150
+ # Check if commit is in history.
151
+ _, return_code = execute(['git', 'cat-file', '-e', commit],
152
+ location=repo_path)
153
+ return return_code == 0
154
+
155
+
156
+ def execute(command, location, check_result=False):
157
+ """Runs a shell command in the specified directory location.
158
+
159
+ Args:
160
+ command: The command as a list to be run.
161
+ location: The directory the command is run in.
162
+ check_result: Should an exception be thrown on failed command.
163
+
164
+ Returns:
165
+ The stdout of the command, the error code.
166
+
167
+ Raises:
168
+ RuntimeError: running a command resulted in an error.
169
+ """
170
+ process = subprocess.Popen(command, stdout=subprocess.PIPE, cwd=location)
171
+ output, err = process.communicate()
172
+ if check_result and (process.returncode or err):
173
+ raise RuntimeError(
174
+ 'Error: %s\n running command: %s\n return code: %s\n out %s\n' %
175
+ (err, command, process.returncode, output))
176
+ if output is not None:
177
+ output = output.decode('ascii')
178
+ return output, process.returncode
179
+
180
+
181
+ if __name__ == '__main__':
182
+ main()
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/install_javascript.sh ADDED
@@ -0,0 +1,27 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ # see installation instructions: https://github.com/nodesource/distributions#available-architectures
18
+ apt-get update
19
+ apt-get install -y ca-certificates curl gnupg
20
+ mkdir -p /etc/apt/keyrings
21
+ curl -fsSL https://deb.nodesource.com/gpgkey/nodesource-repo.gpg.key | gpg --dearmor -o /etc/apt/keyrings/nodesource.gpg
22
+
23
+ NODE_MAJOR=20
24
+ echo "deb [signed-by=/etc/apt/keyrings/nodesource.gpg] https://deb.nodesource.com/node_$NODE_MAJOR.x nodistro main" | tee /etc/apt/sources.list.d/nodesource.list
25
+
26
+ apt-get update
27
+ apt-get install nodejs -y
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/install_python.sh ADDED
@@ -0,0 +1,23 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ echo "ATHERIS INSTALL"
19
+ unset CFLAGS CXXFLAGS
20
+ # PYI_STATIC_ZLIB=1 is needed for installing pyinstaller 5.0
21
+ export PYI_STATIC_ZLIB=1
22
+ LIBFUZZER_LIB=$( echo /usr/local/lib/clang/*/lib/x86_64-unknown-linux-gnu/libclang_rt.fuzzer_no_main.a ) pip3 install -v --no-cache-dir "atheris>=2.3.0" "pyinstaller==6.10.0" "setuptools==72.1.0" "coverage==6.3.2"
23
+ rm -rf /tmp/*
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/build_jcc.bash ADDED
@@ -0,0 +1,25 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ #
3
+ # Copyright 2023 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # http://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+ #
17
+ ################################################################################
18
+
19
+ go build jcc.go
20
+ go build jcc2.go
21
+ gsutil cp jcc gs://clusterfuzz-builds/jcc/clang++-jcc
22
+ gsutil cp jcc gs://clusterfuzz-builds/jcc/clang-jcc
23
+
24
+ gsutil cp jcc2 gs://clusterfuzz-builds/jcc/clang++-jcc2
25
+ gsutil cp jcc2 gs://clusterfuzz-builds/jcc/clang-jcc2
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/go.mod ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ module github.com/google/jcc
2
+
3
+ go 1.21
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/jcc.go ADDED
@@ -0,0 +1,88 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ package main
16
+
17
+ import (
18
+ "bytes"
19
+ "fmt"
20
+ "log"
21
+ "os"
22
+ "os/exec"
23
+ "path/filepath"
24
+ )
25
+
26
+ func ExecBuildCommand(bin string, args []string) (int, string, string) {
27
+ // Executes the original command.
28
+ cmd := exec.Command(bin, args...)
29
+ var outb, errb bytes.Buffer
30
+ cmd.Stdout = &outb
31
+ cmd.Stderr = &errb
32
+ cmd.Stdin = os.Stdin
33
+ cmd.Run()
34
+ return cmd.ProcessState.ExitCode(), outb.String(), errb.String()
35
+ }
36
+
37
+ func Compile(bin string, args []string) (int, string, string) {
38
+ // Run the actual command.
39
+ return ExecBuildCommand(bin, args)
40
+ }
41
+
42
+ func AppendStringToFile(filepath, new_content string) error {
43
+ // Appends |new_content| to the content of |filepath|.
44
+ file, err := os.OpenFile(filepath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
45
+ if err != nil {
46
+ return err
47
+ }
48
+ defer file.Close()
49
+
50
+ _, err = file.WriteString(new_content)
51
+ return err
52
+ }
53
+
54
+ func WriteStdErrOut(args []string, outstr string, errstr string) {
55
+ // Prints |outstr| to stdout, prints |errstr| to stderr, and saves |errstr| to err.log.
56
+ fmt.Print(outstr)
57
+ fmt.Fprint(os.Stderr, errstr)
58
+ // Record what compile args produced the error and the error itself in log file.
59
+ AppendStringToFile("/tmp/err.log", fmt.Sprintf("%s\n", args)+errstr)
60
+ }
61
+
62
+ func main() {
63
+ f, err := os.OpenFile("/tmp/jcc.log", os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
64
+
65
+ if err != nil {
66
+ log.Println(err)
67
+ }
68
+ defer f.Close()
69
+ if _, err := f.WriteString(fmt.Sprintf("%s\n", os.Args)); err != nil {
70
+ log.Println(err)
71
+ }
72
+
73
+ args := os.Args[1:]
74
+ basename := filepath.Base(os.Args[0])
75
+ isCPP := basename == "clang++-jcc"
76
+ newArgs := args
77
+
78
+ var bin string
79
+ if isCPP {
80
+ bin = "clang++"
81
+ } else {
82
+ bin = "clang"
83
+ }
84
+ fullCmdArgs := append([]string{bin}, newArgs...)
85
+ retcode, out, errstr := Compile(bin, newArgs)
86
+ WriteStdErrOut(fullCmdArgs, out, errstr)
87
+ os.Exit(retcode)
88
+ }
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/jcc2.go ADDED
@@ -0,0 +1,401 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2024 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ package main
16
+
17
+ import (
18
+ "bytes"
19
+ "encoding/json"
20
+ "errors"
21
+ "fmt"
22
+ "io/fs"
23
+ "io/ioutil"
24
+ "log"
25
+ "os"
26
+ "os/exec"
27
+ "path/filepath"
28
+ "regexp"
29
+ "strings"
30
+ )
31
+
32
+ var MaxMissingHeaderFiles = 10
33
+ var CppifyHeadersMagicString = "\n/* JCCCppifyHeadersMagicString */\n"
34
+
35
+ func CopyFile(src string, dst string) {
36
+ contents, err := ioutil.ReadFile(src)
37
+ if err != nil {
38
+ panic(err)
39
+ }
40
+ err = ioutil.WriteFile(dst, contents, 0644)
41
+ if err != nil {
42
+ panic(err)
43
+ }
44
+ }
45
+
46
+ func TryFixCCompilation(cmdline []string) ([]string, int, string, string) {
47
+ var newFile string = ""
48
+ for i, arg := range cmdline {
49
+ if !strings.HasSuffix(arg, ".c") {
50
+ continue
51
+ }
52
+ if _, err := os.Stat(arg); errors.Is(err, os.ErrNotExist) {
53
+ continue
54
+ }
55
+ newFile = strings.TrimSuffix(arg, ".c")
56
+ newFile += ".cpp"
57
+ CopyFile(arg, newFile)
58
+ CppifyHeaderIncludesFromFile(newFile)
59
+ cmdline[i] = newFile
60
+ break
61
+ }
62
+ if newFile == "" {
63
+ return []string{}, 1, "", ""
64
+ }
65
+ cppBin := "clang++"
66
+ newCmdline := []string{"-stdlib=libc++"}
67
+ newCmdline = append(cmdline, newCmdline...)
68
+ newFullArgs := append([]string{cppBin}, newCmdline...)
69
+
70
+ retcode, out, err := Compile(cppBin, newCmdline)
71
+ if retcode == 0 {
72
+ return newFullArgs, retcode, out, err
73
+ }
74
+ correctedCmdline, corrected, _ := CorrectMissingHeaders(cppBin, newCmdline)
75
+ if corrected {
76
+ return append([]string{cppBin}, correctedCmdline...), 0, "", ""
77
+ }
78
+ return newFullArgs, retcode, out, err
79
+ }
80
+
81
+ func ExtractMissingHeader(compilerOutput string) (string, bool) {
82
+ r := regexp.MustCompile(`fatal error: ['|<](?P<header>[a-zA-z0-9\/\.]+)['|>] file not found`)
83
+ matches := r.FindStringSubmatch(compilerOutput)
84
+ if len(matches) == 0 {
85
+ return "", false
86
+ }
87
+ return matches[1], true
88
+ }
89
+
90
+ func ReplaceMissingHeaderInFile(srcFilename, curHeader, replacementHeader string) error {
91
+ srcFile, err := os.Open(srcFilename)
92
+ if err != nil {
93
+ return err
94
+ }
95
+ srcBytes, err := ioutil.ReadAll(srcFile)
96
+ if err != nil {
97
+ return err
98
+ }
99
+ src := string(srcBytes)
100
+ newSrc := ReplaceMissingHeader(src, curHeader, replacementHeader)
101
+ b := []byte(newSrc)
102
+ err = ioutil.WriteFile(srcFilename, b, 0644)
103
+ if err != nil {
104
+ return err
105
+ }
106
+ return nil
107
+ }
108
+
109
+ func ReplaceMissingHeader(src, curHeader, replacementHeader string) string {
110
+ re := regexp.MustCompile(`#include ["|<]` + curHeader + `["|>]\n`)
111
+ replacement := "#include \"" + replacementHeader + "\"\n"
112
+ return re.ReplaceAllString(src, replacement)
113
+ }
114
+
115
+ func GetHeaderCorrectedFilename(compilerErr string) (string, string, bool) {
116
+ re := regexp.MustCompile(`(?P<buggy>[a-z\/\-\_0-9A-z\.]+):.* fatal error: .* file not found`)
117
+ matches := re.FindStringSubmatch(compilerErr)
118
+ if len(matches) < 2 {
119
+ return "", "", false
120
+ }
121
+ oldFilename := matches[1]
122
+ base := filepath.Base(oldFilename)
123
+ root := filepath.Dir(oldFilename)
124
+ newFilename := root + "/jcc-corrected-" + base
125
+ return oldFilename, newFilename, true
126
+ }
127
+
128
+ func GetHeaderCorrectedCmd(cmd []string, compilerErr string) ([]string, string, error) {
129
+ oldFilename, newFilename, success := GetHeaderCorrectedFilename(compilerErr)
130
+ if !success {
131
+ return cmd, "", errors.New("Couldn't find buggy file")
132
+ }
133
+ // Make new cmd.
134
+ newCmd := make([]string, len(cmd))
135
+ for i, part := range cmd {
136
+ newCmd[i] = part
137
+ }
138
+ found := false
139
+ for i, filename := range newCmd {
140
+ if filename == oldFilename {
141
+ newCmd[i] = newFilename
142
+ found = true
143
+ break
144
+ }
145
+ }
146
+ CopyFile(oldFilename, newFilename)
147
+ if found {
148
+ return newCmd, newFilename, nil
149
+ }
150
+ return cmd, "", errors.New("Couldn't find file")
151
+ }
152
+
153
+ func CorrectMissingHeaders(bin string, cmd []string) ([]string, bool, error) {
154
+
155
+ _, _, stderr := Compile(bin, cmd)
156
+ cmd, correctedFilename, err := GetHeaderCorrectedCmd(cmd, stderr)
157
+ if err != nil {
158
+ return cmd, false, err
159
+ }
160
+ for i := 0; i < MaxMissingHeaderFiles; i++ {
161
+ fixed, hasBrokenHeaders := TryCompileAndFixHeadersOnce(bin, cmd, correctedFilename)
162
+ if fixed {
163
+ return cmd, true, nil
164
+ }
165
+ if !hasBrokenHeaders {
166
+ return cmd, false, nil
167
+ }
168
+ }
169
+ return cmd, false, nil
170
+ }
171
+
172
+ func ExecBuildCommand(bin string, args []string) (int, string, string) {
173
+ // Executes the original command.
174
+ cmd := exec.Command(bin, args...)
175
+ var outb, errb bytes.Buffer
176
+ cmd.Stdout = &outb
177
+ cmd.Stderr = &errb
178
+ cmd.Stdin = os.Stdin
179
+ cmd.Run()
180
+ return cmd.ProcessState.ExitCode(), outb.String(), errb.String()
181
+ }
182
+
183
+ func Compile(bin string, args []string) (int, string, string) {
184
+ // Run the actual command.
185
+ return ExecBuildCommand(bin, args)
186
+ }
187
+
188
+ func TryCompileAndFixHeadersOnce(bin string, cmd []string, filename string) (fixed, hasBrokenHeaders bool) {
189
+ retcode, _, err := Compile(bin, cmd)
190
+ if retcode == 0 {
191
+ fixed = true
192
+ hasBrokenHeaders = false
193
+ return
194
+ }
195
+ missingHeader, isMissing := ExtractMissingHeader(err)
196
+ if !isMissing {
197
+ fixed = false
198
+ hasBrokenHeaders = false
199
+ return
200
+ }
201
+
202
+ newHeaderPath, found := FindMissingHeader(missingHeader)
203
+ if !found {
204
+ fixed = false
205
+ hasBrokenHeaders = true
206
+ return false, true
207
+ }
208
+ ReplaceMissingHeaderInFile(filename, missingHeader, newHeaderPath)
209
+ return false, true
210
+ }
211
+
212
+ func FindMissingHeader(missingHeader string) (string, bool) {
213
+ envVar := "JCC_MISSING_HEADER_SEARCH_PATH"
214
+ var searchPath string
215
+ searchPath, exists := os.LookupEnv(envVar)
216
+ if !exists {
217
+ searchPath = "/src"
218
+ }
219
+ searchPath, _ = filepath.Abs(searchPath)
220
+ var headerLocation string
221
+ missingHeader = "/" + missingHeader
222
+ find := func(path string, d fs.DirEntry, err error) error {
223
+ if err != nil {
224
+ return err
225
+ }
226
+ if d.IsDir() {
227
+ return nil
228
+ }
229
+ if strings.HasSuffix(path, missingHeader) {
230
+ headerLocation = path
231
+ return nil
232
+ }
233
+ return nil
234
+ }
235
+ filepath.WalkDir(searchPath, find)
236
+ if headerLocation == "" {
237
+ return "", false
238
+ }
239
+ return headerLocation, true
240
+ }
241
+
242
+ func CppifyHeaderIncludesFromFile(srcFile string) error {
243
+ contentsBytes, err := ioutil.ReadFile(srcFile)
244
+ if err != nil {
245
+ return err
246
+ }
247
+ contents := string(contentsBytes[:])
248
+ contents, err = CppifyHeaderIncludes(contents)
249
+ if err != nil {
250
+ return err
251
+ }
252
+ b := []byte(contents)
253
+ err = ioutil.WriteFile(srcFile, b, 0644)
254
+ return err
255
+ }
256
+
257
+ func CppifyHeaderIncludes(contents string) (string, error) {
258
+ shouldCppify, exists := os.LookupEnv("JCC_CPPIFY_PROJECT_HEADERS")
259
+ if !exists || strings.Compare(shouldCppify, "0") == 0 {
260
+ return contents, nil
261
+ }
262
+ if strings.Contains(contents, CppifyHeadersMagicString) {
263
+ return contents, nil
264
+ }
265
+ re := regexp.MustCompile(`\#include \"(?P<header>.+)\"\n`)
266
+ matches := re.FindAllStringSubmatch(contents, -1)
267
+ if len(matches) == 0 {
268
+ return "", nil // !!!
269
+ }
270
+ for i, match := range matches {
271
+ if i == 0 {
272
+ // So we don't cppify twice.
273
+ contents += CppifyHeadersMagicString
274
+ }
275
+ oldStr := match[0]
276
+ replacement := "extern \"C\" {\n#include \"" + match[1] + "\"\n}\n"
277
+ contents = strings.Replace(contents, oldStr, replacement, 1)
278
+ if strings.Compare(contents, "") == 0 {
279
+ panic("Failed to replace")
280
+ }
281
+ }
282
+ return contents, nil
283
+ }
284
+
285
+ func AppendStringToFile(filepath, new_content string) error {
286
+ // Appends |new_content| to the content of |filepath|.
287
+ file, err := os.OpenFile(filepath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)
288
+ if err != nil {
289
+ return err
290
+ }
291
+ defer file.Close()
292
+
293
+ _, err = file.WriteString(new_content)
294
+ return err
295
+ }
296
+
297
+ func WriteStdErrOut(args []string, outstr string, errstr string) {
298
+ // Prints |outstr| to stdout, prints |errstr| to stderr, and saves |errstr| to err.log.
299
+ fmt.Print(outstr)
300
+ fmt.Fprint(os.Stderr, errstr)
301
+ // Record what compile args produced the error and the error itself in log file.
302
+ AppendStringToFile("/workspace/err.log", fmt.Sprintf("%s\n", args)+errstr)
303
+ }
304
+
305
+ func main() {
306
+ f, err := os.OpenFile("/tmp/jcc.log", os.O_CREATE|os.O_WRONLY, 0644)
307
+ if err != nil {
308
+ log.Println(err)
309
+ }
310
+ defer f.Close()
311
+ if _, err := f.WriteString(fmt.Sprintf("%s\n", os.Args)); err != nil {
312
+ log.Println(err)
313
+ }
314
+
315
+ args := os.Args[1:]
316
+ if args[0] == "unfreeze" {
317
+ fmt.Println("unfreeze")
318
+ unfreeze()
319
+ }
320
+ basename := filepath.Base(os.Args[0])
321
+ isCPP := basename == "clang++-jcc"
322
+ newArgs := append(args, "-w")
323
+
324
+ var bin string
325
+ if isCPP {
326
+ bin = "clang++"
327
+ newArgs = append(args, "-stdlib=libc++")
328
+ } else {
329
+ bin = "clang"
330
+ }
331
+ fullCmdArgs := append([]string{bin}, newArgs...)
332
+ if IsCompilingTarget(fullCmdArgs) {
333
+ WriteTargetArgsAndCommitImage(fullCmdArgs)
334
+ os.Exit(0)
335
+ }
336
+ retcode, out, errstr := Compile(bin, newArgs)
337
+ WriteStdErrOut(fullCmdArgs, out, errstr)
338
+ os.Exit(retcode)
339
+ }
340
+
341
+ type BuildCommand struct {
342
+ CWD string `json:"CWD"`
343
+ CMD []string `json:"CMD"`
344
+ }
345
+
346
+ func WriteTargetArgsAndCommitImage(cmdline []string) {
347
+ log.Println("WRITE COMMAND")
348
+ f, _ := os.OpenFile("/out/statefile.json", os.O_CREATE|os.O_WRONLY, 0644)
349
+ wd, _ := os.Getwd()
350
+ buildcmd := BuildCommand{
351
+ CWD: wd,
352
+ CMD: cmdline,
353
+ }
354
+ jsonData, _ := json.Marshal(buildcmd)
355
+ f.Write(jsonData)
356
+ f.Close()
357
+ hostname, _ := os.Hostname()
358
+ dockerArgs := []string{"commit", hostname, "frozen"}
359
+ cmd := exec.Command("docker", dockerArgs...)
360
+ var outb, errb bytes.Buffer
361
+ cmd.Stdout = &outb
362
+ cmd.Stderr = &errb
363
+ cmd.Stdin = os.Stdin
364
+ cmd.Run()
365
+ fmt.Println(outb.String(), errb.String())
366
+ fmt.Println("COMMIT IMAGE")
367
+ }
368
+
369
+ func IsCompilingTarget(cmdline []string) bool {
370
+ for _, arg := range cmdline {
371
+ // This can fail if people do crazy things they aren't supposed
372
+ // to such as using some other means to link in libFuzzer.
373
+ if arg == "-fsanitize=fuzzer" {
374
+ return true
375
+ }
376
+ if arg == "-lFuzzingEngine" {
377
+ return true
378
+ }
379
+ }
380
+ return false
381
+ }
382
+
383
+ func parseCommand(command string) (string, []string) {
384
+ args := strings.Fields(command)
385
+ commandBin := args[0]
386
+ commandArgs := args[1:]
387
+ return commandBin, commandArgs
388
+ }
389
+
390
+ func unfreeze() {
391
+ content, err := ioutil.ReadFile("/out/statefile.json")
392
+ if err != nil {
393
+ log.Fatal(err)
394
+ }
395
+ var command BuildCommand
396
+ json.Unmarshal(content, &command)
397
+ bin, args := parseCommand(strings.Join(command.CMD, " "))
398
+ os.Chdir(command.CWD)
399
+ ExecBuildCommand(bin, args)
400
+ os.Exit(0)
401
+ }
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/jcc_test.go ADDED
@@ -0,0 +1,186 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ package main
2
+
3
+ import (
4
+ "fmt"
5
+ "os"
6
+ "strings"
7
+ "testing"
8
+ )
9
+
10
+ func TestExtractMissingHeader(t *testing.T) {
11
+ missingHeaderMessage := `path/to/file.cpp:8:10: fatal error: 'missingheader.h' file not found
12
+
13
+ #include "missingheader.h"
14
+
15
+ ^~~~~~~~~~~~
16
+
17
+ 1 error generated.
18
+ `
19
+
20
+ res, _ := ExtractMissingHeader(missingHeaderMessage)
21
+ expected := "missingheader.h"
22
+ if strings.Compare(res, expected) != 0 {
23
+ t.Errorf("Got: %s. Expected: %s.", res, expected)
24
+ }
25
+ }
26
+
27
+ func TestGetHeaderCorrectedFilename(t *testing.T) {
28
+ missingHeaderMessage := `path/to/file.cpp:8:10: fatal error: 'missingheader.h' file not found
29
+
30
+ #include "missingheader.h"
31
+
32
+ ^~~~~~~~~~~~
33
+
34
+ 1 error generated.
35
+ `
36
+ _, correctedFilename, _ := GetHeaderCorrectedFilename(missingHeaderMessage)
37
+ expected := "path/to/jcc-corrected-file.cpp"
38
+ if strings.Compare(correctedFilename, expected) != 0 {
39
+ t.Errorf("Got: %s. Expected: %s.", correctedFilename, expected)
40
+ }
41
+ }
42
+
43
+ func TestFindMissingHeader(t *testing.T) {
44
+ pwd, _ := os.Getwd()
45
+ t.Setenv("JCC_MISSING_HEADER_SEARCH_PATH", pwd)
46
+
47
+ location, _ := FindMissingHeader("header.h")
48
+ expected := pwd + "/testdata/path/to/header.h"
49
+ if strings.Compare(location, expected) != 0 {
50
+ t.Errorf("Got: %s. Expected: %s.", location, expected)
51
+ }
52
+ }
53
+
54
+ func TestCorrectMissingHeaders(t *testing.T) {
55
+ pwd, _ := os.Getwd()
56
+ t.Setenv("JCC_MISSING_HEADER_SEARCH_PATH", pwd)
57
+ cfile := pwd + "/testdata/cfile.c"
58
+ cmd := [4]string{"-fsanitize=address", cfile, "-o", "/tmp/blah"}
59
+ res, err := CorrectMissingHeaders("clang", cmd[:])
60
+ if !res {
61
+ fmt.Println(err)
62
+ t.Errorf("Expected successful compilation")
63
+ }
64
+ }
65
+
66
+ func TestGetHeaderCorrectedCmd(t *testing.T) {
67
+ compilerErr := `testdata/cpp.cc:8:10: fatal error: 'missingheader.h' file not found
68
+
69
+ #include "missingheader.h"
70
+
71
+ ^~~~~~~~~~~~
72
+
73
+ 1 error generated.
74
+ `
75
+
76
+ cmd := [3]string{"-fsanitize=address", "file.cpp", "path/to/cpp.cc"}
77
+ expectedFixedCmd := [3]string{"-fanitize=address", "file.cpp", "path/to/jcc-corrected-cpp.cc"}
78
+ fixedCmd, _, _ := GetHeaderCorrectedCmd(cmd[:], compilerErr)
79
+ if strings.Compare(fixedCmd[1], expectedFixedCmd[1]) != 0 {
80
+ t.Errorf("Expected %s, got: %s", expectedFixedCmd, fixedCmd)
81
+ }
82
+ }
83
+
84
+ func TestCppifyHeaderIncludes(t *testing.T) {
85
+ t.Setenv("JCC_CPPIFY_PROJECT_HEADERS", "1")
86
+ src := `// Copyright blah
87
+ #include <stddef.h>
88
+
89
+ #include "fuzz.h"
90
+ #include "x/y.h"
91
+ extern "C" LLVMFuzzerTestOneInput(uint8_t* data, size_t sz) {
92
+ return 0;
93
+ }`
94
+ newFile, _ := CppifyHeaderIncludes(src)
95
+ expected := `// Copyright blah
96
+ #include <stddef.h>
97
+
98
+ extern "C" {
99
+ #include "fuzz.h"
100
+ }
101
+ extern "C" {
102
+ #include "x/y.h"
103
+ }
104
+ extern "C" LLVMFuzzerTestOneInput(uint8_t* data, size_t sz) {
105
+ return 0;
106
+ }
107
+ /* JCCCppifyHeadersMagicString */
108
+ `
109
+ if strings.Compare(newFile, expected) != 0 {
110
+ t.Errorf("Expected: %s, got: %s", expected, newFile)
111
+ }
112
+ }
113
+
114
+ func TestCppifyHeaderIncludesShouldnt(t *testing.T) {
115
+ src := `// Copyright blah
116
+ #include <stddef.h>
117
+
118
+ #include "fuzz.h"
119
+ #include "x/y.h"
120
+ extern "C" LLVMFuzzerTestOneInput(uint8_t* data, size_t sz) {
121
+ return 0;
122
+ }`
123
+ newFile, _ := CppifyHeaderIncludes(src)
124
+ if strings.Compare(newFile, src) != 0 {
125
+ t.Errorf("Expected: %s. Got: %s", src, newFile)
126
+ }
127
+ }
128
+
129
+ func TestCppifyHeaderIncludesAlready(t *testing.T) {
130
+ src := `// Copyright blah
131
+ #include <stddef.h>
132
+
133
+ #include "fuzz.h"
134
+ #include "x/y.h"
135
+ extern "C" LLVMFuzzerTestOneInput(uint8_t* data, size_t sz) {
136
+ return 0;
137
+ }
138
+ /* JCCCppifyHeadersMagicString */
139
+ `
140
+ newFile, _ := CppifyHeaderIncludes(src)
141
+ if strings.Compare(newFile, src) != 0 {
142
+ t.Errorf("Expected %s, got: %s", src, newFile)
143
+ }
144
+ }
145
+
146
+ func TestExtractMissingHeaderNonHeaderFailure(t *testing.T) {
147
+ missingHeaderMessage := `clang: error: no such file or directory: 'x'
148
+ clang: error: no input files`
149
+
150
+ header, res := ExtractMissingHeader(missingHeaderMessage)
151
+ if res {
152
+ t.Errorf("Expected no match, got: %s", header)
153
+ }
154
+ }
155
+
156
+ func TestReplaceMissingHeader(t *testing.T) {
157
+ cfile := `// Copyright 2035 Robots
158
+ #include <stddef.h>
159
+
160
+ #include <cstdint>
161
+
162
+ // Some libraries like OpenSSL will use brackets for their own headers.
163
+ #include <missingheader.h>
164
+
165
+ int LLVMFuzzerTestOneInput(uint8_t* data, size_t size) {
166
+ return 0;
167
+ }
168
+ `
169
+
170
+ res := ReplaceMissingHeader(cfile, "missingheader.h", "path/to/includes/missingheader.h")
171
+ expected := `// Copyright 2035 Robots
172
+ #include <stddef.h>
173
+
174
+ #include <cstdint>
175
+
176
+ // Some libraries like OpenSSL will use brackets for their own headers.
177
+ #include "path/to/includes/missingheader.h"
178
+
179
+ int LLVMFuzzerTestOneInput(uint8_t* data, size_t size) {
180
+ return 0;
181
+ }
182
+ `
183
+ if strings.Compare(res, expected) != 0 {
184
+ t.Errorf("Got: %s. Expected: %s.", res, expected)
185
+ }
186
+ }
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/.gitignore ADDED
@@ -0,0 +1,2 @@
 
 
 
1
+ jcc-corrected-cfile.c
2
+ jcc-corrected-cfile.cpp
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/cfile.c ADDED
@@ -0,0 +1,18 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ #include "header.h"
16
+ int main() {
17
+ return 0;
18
+ }
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/cpp.cc ADDED
@@ -0,0 +1,18 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ #include "header.h"
16
+ int main() {
17
+ return 0;
18
+ }
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/jcc/testdata/path/to/header.h ADDED
@@ -0,0 +1,15 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ int xhg(void);
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/llvmsymbol.diff ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ diff --git a/llvm/lib/DebugInfo/Symbolize/CMakeLists.txt b/llvm/lib/DebugInfo/Symbolize/CMakeLists.txt
2
+ index acfb3bd0e..a499ee2e0 100644
3
+ --- a/llvm/lib/DebugInfo/Symbolize/CMakeLists.txt
4
+ +++ b/llvm/lib/DebugInfo/Symbolize/CMakeLists.txt
5
+ @@ -12,4 +12,11 @@ add_llvm_component_library(LLVMSymbolize
6
+ Object
7
+ Support
8
+ Demangle
9
+ - )
10
+ +
11
+ + LINK_LIBS
12
+ + /usr/lib/swift_static/linux/libswiftCore.a
13
+ + /usr/lib/swift_static/linux/libicui18nswift.a
14
+ + /usr/lib/swift_static/linux/libicuucswift.a
15
+ + /usr/lib/swift_static/linux/libicudataswift.a
16
+ + /usr/lib/x86_64-linux-gnu/libstdc++.so.6
17
+ +)
18
+ diff --git a/llvm/lib/DebugInfo/Symbolize/Symbolize.cpp b/llvm/lib/DebugInfo/Symbolize/Symbolize.cpp
19
+ index fb4875f79..0030769ee 100644
20
+ --- a/llvm/lib/DebugInfo/Symbolize/Symbolize.cpp
21
+ +++ b/llvm/lib/DebugInfo/Symbolize/Symbolize.cpp
22
+ @@ -36,6 +36,13 @@
23
+ #include <cassert>
24
+ #include <cstring>
25
+
26
+ +
27
+ +extern "C" char *swift_demangle(const char *mangledName,
28
+ + size_t mangledNameLength,
29
+ + char *outputBuffer,
30
+ + size_t *outputBufferSize,
31
+ + uint32_t flags);
32
+ +
33
+ namespace llvm {
34
+ namespace symbolize {
35
+
36
+ @@ -678,6 +685,14 @@ LLVMSymbolizer::DemangleName(const std::string &Name,
37
+ free(DemangledName);
38
+ return Result;
39
+ }
40
+ + if (!Name.empty() && Name.front() == '$') {
41
+ + char *DemangledName = swift_demangle(Name.c_str(), Name.length(), 0, 0, 0);
42
+ + if (DemangledName) {
43
+ + std::string Result = DemangledName;
44
+ + free(DemangledName);
45
+ + return Result;
46
+ + }
47
+ + }
48
+
49
+ if (DbiModuleDescriptor && DbiModuleDescriptor->isWin32Module())
50
+ return std::string(demanglePE32ExternCFunc(Name));
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/ossfuzz_coverage_runner.go ADDED
@@ -0,0 +1,69 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2020 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ package mypackagebeingfuzzed
16
+
17
+ import (
18
+ "io/ioutil"
19
+ "os"
20
+ "runtime/pprof"
21
+ "testing"
22
+ )
23
+
24
+ func TestFuzzCorpus(t *testing.T) {
25
+ dir := os.Getenv("FUZZ_CORPUS_DIR")
26
+ if dir == "" {
27
+ t.Logf("No fuzzing corpus directory set")
28
+ return
29
+ }
30
+ infos, err := ioutil.ReadDir(dir)
31
+ if err != nil {
32
+ t.Logf("Not fuzzing corpus directory %s", err)
33
+ return
34
+ }
35
+ filename := ""
36
+ defer func() {
37
+ if r := recover(); r != nil {
38
+ t.Error("Fuzz panicked in "+filename, r)
39
+ }
40
+ }()
41
+ profname := os.Getenv("FUZZ_PROFILE_NAME")
42
+ if profname != "" {
43
+ f, err := os.Create(profname + ".cpu.prof")
44
+ if err != nil {
45
+ t.Logf("error creating profile file %s\n", err)
46
+ } else {
47
+ _ = pprof.StartCPUProfile(f)
48
+ }
49
+ }
50
+ for i := range infos {
51
+ filename = dir + infos[i].Name()
52
+ data, err := ioutil.ReadFile(filename)
53
+ if err != nil {
54
+ t.Error("Failed to read corpus file", err)
55
+ }
56
+ FuzzFunction(data)
57
+ }
58
+ if profname != "" {
59
+ pprof.StopCPUProfile()
60
+ f, err := os.Create(profname + ".heap.prof")
61
+ if err != nil {
62
+ t.Logf("error creating heap profile file %s\n", err)
63
+ }
64
+ if err = pprof.WriteHeapProfile(f); err != nil {
65
+ t.Logf("error writing heap profile file %s\n", err)
66
+ }
67
+ f.Close()
68
+ }
69
+ }
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/LICENSE ADDED
@@ -0,0 +1,13 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/README.md ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ # pysecsan
2
+
3
+ Security sanitizers for vulnerability detection during runtime.
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pyproject.toml ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [build-system]
2
+ requires = ["setuptools>=61.0"]
3
+ build-backend = "setuptools.build_meta"
4
+
5
+ [project]
6
+ name = "pysecsan"
7
+ version = "0.1.0"
8
+ authors = [
9
+ { name="David Korczynski", email="david@adalogics.com" },
10
+ ]
11
+ description = "Sanitizers to detect security vulnerabilities at runtime."
12
+ readme = "README.md"
13
+ requires-python = ">=3.7"
14
+ classifiers = [
15
+ "Programming Language :: Python :: 3",
16
+ "License :: OSI Approved :: Apache Software License",
17
+ "Operating System :: OS Independent",
18
+ ]
19
+
20
+ [project.urls]
21
+ "Homepage" = "https://github.com/google/oss-fuzz/tree/master/infra/sanitizers/pysecsan"
22
+ "Bug Tracker" = "https://github.com/google/oss-fuzz/issues"
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/__init__.py ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Glue for pysecsan library."""
15
+
16
+ # Import sanlib and expose only needs functionality by way of __all__
17
+ from .sanlib import *
18
+
19
+ # pylint: disable=undefined-all-variable
20
+ __all__ = ['add_hooks']
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/command_injection.py ADDED
@@ -0,0 +1,106 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+ """Sanitizers for capturing code injections."""
17
+
18
+ from typing import Optional
19
+ from pysecsan import sanlib
20
+
21
+
22
+ def get_all_substr_prefixes(main_str, sub_str):
23
+ """Yields all strings prefixed with sub_str in main_str."""
24
+ idx = 0
25
+ while True:
26
+ idx = main_str.find(sub_str, idx)
27
+ if idx == -1:
28
+ return
29
+ yield main_str[0:idx]
30
+ # Increase idx the length of the substring from the current position
31
+ # where an occurence of the substring was found.
32
+ idx += len(sub_str)
33
+
34
+
35
+ # pylint: disable=unsubscriptable-object
36
+ def check_code_injection_match(elem, check_unquoted=False) -> Optional[str]:
37
+ """identify if elem is an injection match."""
38
+ # Check exact match
39
+ if elem == 'exec-sanitizer':
40
+ return 'Explicit command injection found.'
41
+
42
+ # Check potential for injecting into a string
43
+ if 'FROMFUZZ' in elem:
44
+ if check_unquoted:
45
+ # return true if any index is unquoted
46
+ for sub_str in get_all_substr_prefixes(elem, 'FROMFUZZ'):
47
+ if sub_str.count('\"') % 2 == 0:
48
+ return 'Fuzzer controlled content in data. Code injection potential.'
49
+
50
+ # Return None if all fuzzer taints were quoted
51
+ return None
52
+ return 'Fuzzer-controlled data in command string. Injection potential.'
53
+ return None
54
+
55
+
56
+ # pylint: disable=invalid-name
57
+ def hook_pre_exec_subprocess_Popen(cmd, **kwargs):
58
+ """Hook for subprocess.Popen."""
59
+
60
+ arg_shell = 'shell' in kwargs and kwargs['shell']
61
+
62
+ # Command injections depend on whether the first argument is a list of
63
+ # strings or a string. Handle this now.
64
+ # Example: tests/poe/ansible-runner-cve-2021-4041
65
+ if isinstance(cmd, str):
66
+ res = check_code_injection_match(cmd, check_unquoted=True)
67
+ if res is not None:
68
+ # if shell arg is true and string is tainted and unquoted that's a
69
+ # definite code injection.
70
+ if arg_shell is True:
71
+ sanlib.abort_with_issue('Code injection in Popen', 'Command injection')
72
+
73
+ # It's a maybe: will not report this to avoid false positives.
74
+ # TODO: add more precise detection here.
75
+
76
+ # Check for hg command injection
77
+ # Example: tests/poe/libvcs-cve-2022-21187
78
+ if cmd[0] == 'hg':
79
+ # Check if the arguments are controlled by the fuzzer, and this given
80
+ # arg is not preceded by --
81
+ found_dashes = False
82
+ for idx in range(1, len(cmd)):
83
+ if cmd[0] == '--':
84
+ found_dashes = True
85
+ if not found_dashes and check_code_injection_match(cmd[idx]):
86
+ sanlib.abort_with_issue(
87
+ 'command injection likely by way of mercurial. The following'
88
+ f'command {str(cmd)} is executed, and if you substitute {cmd[idx]} '
89
+ 'with \"--config=alias.init=!touch HELLO_PY\" then you will '
90
+ 'create HELLO_PY', 'Command injection')
91
+
92
+
93
+ def hook_pre_exec_os_system(cmd):
94
+ """Hook for os.system."""
95
+ res = check_code_injection_match(cmd)
96
+ if res is not None:
97
+ sanlib.abort_with_issue(f'code injection by way of os.system\n{res}',
98
+ 'Command injection')
99
+
100
+
101
+ def hook_pre_exec_eval(cmd, *args, **kwargs):
102
+ """Hook for eval. Experimental atm."""
103
+ res = check_code_injection_match(cmd, check_unquoted=True)
104
+ if res is not None:
105
+ sanlib.abort_with_issue(f'Potential code injection by way of eval\n{res}',
106
+ 'Command injection')
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/pysecsan/yaml_deserialization.py ADDED
@@ -0,0 +1,42 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+ """Catches vulnerable yaml desrializations that can potentially lead to
17
+ arbitrary code execution."""
18
+ from pysecsan import sanlib
19
+
20
+ try:
21
+ import yaml
22
+ # pylint: disable=broad-except
23
+ except Exception:
24
+ pass
25
+
26
+
27
+ def hook_pre_exec_pyyaml_load(stream, loader):
28
+ """Hook for pyyaml.load_yaml.
29
+
30
+ Exits if the loader is unsafe or vanilla loader and the stream passed
31
+ to the loader is controlled by the fuzz data
32
+ """
33
+ # Ensure loader is the unsafe loader or vanilla loader
34
+ if loader not in (yaml.loader.Loader, yaml.loader.UnsafeLoader):
35
+ return
36
+
37
+ # Check for exact taint in stream
38
+ if sanlib.is_exact_taint(stream):
39
+ msg = (
40
+ 'Yaml deserialization issue.\n'
41
+ 'Unsafe deserialization can be used to execute arbitrary commands.\n')
42
+ sanlib.abort_with_issue(msg, 'Yaml deserialisation')
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/setup.py ADDED
@@ -0,0 +1,21 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Config for installing python as package."""
15
+ from setuptools import setup, find_packages
16
+
17
+ setup(name='pysecsan',
18
+ version='0.1',
19
+ author='David Korczynski',
20
+ author_email='david@adalogics.com',
21
+ packages=find_packages(exclude='tests'))
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-builder/sanitizers/pysecsan/tests/yaml_deserialization_general.py ADDED
@@ -0,0 +1,47 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/python3
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ """Fuzzer for insecure yaml deserialization."""
16
+
17
+ import sys
18
+ import yaml
19
+ import atheris
20
+ import pysecsan
21
+
22
+
23
+ def serialize_with_tainted_data(param):
24
+ """Hit insecure yaml function."""
25
+ try:
26
+ yaml.load(param, yaml.Loader)
27
+ except yaml.YAMLError:
28
+ pass
29
+
30
+
31
+ def test_one_input(data):
32
+ """Fuzzer routine."""
33
+ fdp = atheris.FuzzedDataProvider(data)
34
+ serialize_with_tainted_data(fdp.ConsumeUnicodeNoSurrogates(32))
35
+
36
+
37
+ def main():
38
+ """Set up and start fuzzing."""
39
+ pysecsan.add_hooks()
40
+
41
+ atheris.instrument_all()
42
+ atheris.Setup(sys.argv, test_one_input, enable_python_coverage=True)
43
+ atheris.Fuzz()
44
+
45
+
46
+ if __name__ == '__main__':
47
+ main()
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-clang/Dockerfile ADDED
@@ -0,0 +1,79 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2016 Google Inc.
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ # Docker image with clang installed.
18
+
19
+ ARG IMG_TAG=latest
20
+ FROM ghcr.io/aixcc-finals/base-image:${IMG_TAG}
21
+
22
+ ARG arch=x86_64
23
+
24
+ ENV FUZZINTRO_OUTDIR=$SRC
25
+
26
+ # Install newer cmake.
27
+ # Many projects, as well as recent clang versions, need a newer cmake.
28
+ ENV CMAKE_VERSION 3.29.2
29
+ RUN apt-get update && apt-get install -y wget sudo && \
30
+ wget -q https://github.com/Kitware/CMake/releases/download/v$CMAKE_VERSION/cmake-$CMAKE_VERSION-Linux-$arch.sh && \
31
+ chmod +x cmake-$CMAKE_VERSION-Linux-$arch.sh && \
32
+ ./cmake-$CMAKE_VERSION-Linux-$arch.sh --skip-license --prefix="/usr/local" && \
33
+ rm cmake-$CMAKE_VERSION-Linux-$arch.sh && \
34
+ SUDO_FORCE_REMOVE=yes apt-get autoremove --purge -y wget sudo && \
35
+ rm -rf /usr/local/doc/cmake /usr/local/bin/cmake-gui
36
+
37
+ RUN apt-get update && apt-get install -y git && \
38
+ git clone https://github.com/ossf/fuzz-introspector.git fuzz-introspector && \
39
+ cd fuzz-introspector && \
40
+ git checkout f9bcb8824a18d60d57e2430c5b43f525d811cae8 && \
41
+ git submodule init && \
42
+ git submodule update && \
43
+ apt-get autoremove --purge -y git && \
44
+ rm -rf .git
45
+
46
+ COPY checkout_build_install_llvm.sh /root/
47
+ # Keep all steps in the same script to decrease the number of intermediate
48
+ # layes in docker file.
49
+ RUN /root/checkout_build_install_llvm.sh
50
+ RUN rm /root/checkout_build_install_llvm.sh
51
+
52
+ # Setup the environment.
53
+ ENV CC "clang"
54
+ ENV CXX "clang++"
55
+ ENV CCC "clang++"
56
+
57
+ # FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION is described at
58
+ # https://llvm.org/docs/LibFuzzer.html#fuzzer-friendly-build-mode
59
+
60
+ # The implicit-function-declaration and implicit-int errors are downgraded to a
61
+ # warning, to allow compiling legacy code.
62
+ # See https://releases.llvm.org/16.0.0/tools/clang/docs/ReleaseNotes.html#potentially-breaking-changes
63
+ # Same for deprecated-declarations, int-conversion,
64
+ # incompatible-function-pointer-types, enum-constexpr-conversion,
65
+ # vla-cxx-extension
66
+
67
+ ENV CFLAGS -O1 \
68
+ -fno-omit-frame-pointer \
69
+ -gline-tables-only \
70
+ -Wno-error=enum-constexpr-conversion \
71
+ -Wno-error=incompatible-function-pointer-types \
72
+ -Wno-error=int-conversion \
73
+ -Wno-error=deprecated-declarations \
74
+ -Wno-error=implicit-function-declaration \
75
+ -Wno-error=implicit-int \
76
+ -Wno-error=vla-cxx-extension \
77
+ -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
78
+ ENV CXXFLAGS_EXTRA "-stdlib=libc++"
79
+ ENV CXXFLAGS "$CFLAGS $CXXFLAGS_EXTRA"
local-test-tika-delta-02/fuzz-tooling/infra/base-images/base-clang/checkout_build_install_llvm.sh ADDED
@@ -0,0 +1,246 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2016 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ NPROC=$(nproc)
19
+
20
+ TARGET_TO_BUILD=
21
+ case $(uname -m) in
22
+ x86_64)
23
+ TARGET_TO_BUILD=X86
24
+ ARCHITECTURE_DEPS="g++-multilib"
25
+ # Use chromium's clang revision.
26
+ export CC=$WORK/llvm-stage1/bin/clang
27
+ export CXX=$WORK/llvm-stage1/bin/clang++
28
+ ;;
29
+ aarch64)
30
+ TARGET_TO_BUILD=AArch64
31
+ # g++ multilib is not needed on AArch64 because we don't care about i386.
32
+ # We need to install clang and lld using apt because the binary downloaded
33
+ # from Chrome's developer tools doesn't support AArch64.
34
+ # TODO(metzman): Make x86_64 use the distro's clang for consistency once
35
+ # we support AArch64 fully.
36
+ ARCHITECTURE_DEPS="clang lld g++"
37
+ export CC=clang
38
+ export CXX=clang++
39
+ ;;
40
+ *)
41
+ echo "Error: unsupported target $(uname -m)"
42
+ exit 1
43
+ ;;
44
+ esac
45
+
46
+ INTROSPECTOR_DEP_PACKAGES="texinfo bison flex"
47
+ # zlib1g-dev is needed for llvm-profdata to handle coverage data from rust compiler
48
+ LLVM_DEP_PACKAGES="build-essential make ninja-build git python3 python3-distutils binutils-dev zlib1g-dev $ARCHITECTURE_DEPS $INTROSPECTOR_DEP_PACKAGES"
49
+
50
+ apt-get update && apt-get install -y $LLVM_DEP_PACKAGES --no-install-recommends
51
+
52
+ # For manual bumping.
53
+ # On each bump a full trial run for everything (fuzzing engines, sanitizers,
54
+ # languages, projects, ...) is needed.
55
+ # Check CMAKE_VERSION infra/base-images/base-clang/Dockerfile was released
56
+ # recently enough to fully support this clang version.
57
+ OUR_LLVM_REVISION=llvmorg-18.1.8
58
+
59
+ mkdir $SRC/chromium_tools
60
+ cd $SRC/chromium_tools
61
+ git clone https://chromium.googlesource.com/chromium/src/tools/clang
62
+ cd clang
63
+ # Pin clang script due to https://github.com/google/oss-fuzz/issues/7617
64
+ git checkout 9eb79319239629c1b23cf7a59e5ebb2bab319a34
65
+
66
+ LLVM_SRC=$SRC/llvm-project
67
+ # Checkout
68
+ CHECKOUT_RETRIES=10
69
+ function clone_with_retries {
70
+ REPOSITORY=$1
71
+ LOCAL_PATH=$2
72
+ CHECKOUT_RETURN_CODE=1
73
+
74
+ # Disable exit on error since we might encounter some failures while retrying.
75
+ set +e
76
+ for i in $(seq 1 $CHECKOUT_RETRIES); do
77
+ rm -rf $LOCAL_PATH
78
+ git clone $REPOSITORY $LOCAL_PATH
79
+ CHECKOUT_RETURN_CODE=$?
80
+ if [ $CHECKOUT_RETURN_CODE -eq 0 ]; then
81
+ break
82
+ fi
83
+ done
84
+
85
+ # Re-enable exit on error. If checkout failed, script will exit.
86
+ set -e
87
+ return $CHECKOUT_RETURN_CODE
88
+ }
89
+ clone_with_retries https://github.com/llvm/llvm-project.git $LLVM_SRC
90
+
91
+ git -C $LLVM_SRC checkout $OUR_LLVM_REVISION
92
+ echo "Using LLVM revision: $OUR_LLVM_REVISION"
93
+
94
+ # For fuzz introspector.
95
+ echo "Applying introspector changes"
96
+ OLD_WORKING_DIR=$PWD
97
+ cd $LLVM_SRC
98
+ cp -rf /fuzz-introspector/frontends/llvm/include/llvm/Transforms/FuzzIntrospector/ ./llvm/include/llvm/Transforms/FuzzIntrospector
99
+ cp -rf /fuzz-introspector/frontends/llvm/lib/Transforms/FuzzIntrospector ./llvm/lib/Transforms/FuzzIntrospector
100
+
101
+ # LLVM currently does not support dynamically loading LTO passes. Thus, we
102
+ # hardcode it into Clang instead. Ref: https://reviews.llvm.org/D77704
103
+ /fuzz-introspector/frontends/llvm/patch-llvm.sh
104
+ cd $OLD_WORKING_DIR
105
+
106
+ mkdir -p $WORK/llvm-stage2 $WORK/llvm-stage1
107
+ python3 $SRC/chromium_tools/clang/scripts/update.py --output-dir $WORK/llvm-stage1
108
+
109
+ cd $WORK/llvm-stage2
110
+ cmake -G "Ninja" \
111
+ -DLIBCXX_ENABLE_SHARED=OFF \
112
+ -DLIBCXX_ENABLE_STATIC_ABI_LIBRARY=ON \
113
+ -DLIBCXXABI_ENABLE_SHARED=OFF \
114
+ -DCMAKE_BUILD_TYPE=Release \
115
+ -DLLVM_ENABLE_RUNTIMES="compiler-rt;libcxx;libcxxabi" \
116
+ -DLLVM_TARGETS_TO_BUILD="$TARGET_TO_BUILD" \
117
+ -DLLVM_ENABLE_PROJECTS="clang;lld" \
118
+ -DLLVM_BINUTILS_INCDIR="/usr/include/" \
119
+ -DLIBCXXABI_USE_LLVM_UNWINDER=OFF \
120
+ $LLVM_SRC/llvm
121
+
122
+ ninja -j $NPROC
123
+ ninja install
124
+ rm -rf $WORK/llvm-stage1 $WORK/llvm-stage2
125
+
126
+ # libFuzzer sources.
127
+ cp -r $LLVM_SRC/compiler-rt/lib/fuzzer $SRC/libfuzzer
128
+
129
+ # Use the clang we just built from now on.
130
+ export CC=clang
131
+ export CXX=clang++
132
+
133
+ function free_disk_space {
134
+ rm -rf $LLVM_SRC $SRC/chromium_tools
135
+ apt-get autoremove --purge -y $LLVM_DEP_PACKAGES
136
+ # Delete unneeded parts of LLVM to reduce image size.
137
+ # See https://github.com/google/oss-fuzz/issues/5170
138
+ LLVM_TOOLS_TMPDIR=/tmp/llvm-tools
139
+ mkdir $LLVM_TOOLS_TMPDIR
140
+ # Move binaries with llvm- prefix that we want into LLVM_TOOLS_TMPDIR.
141
+ mv \
142
+ /usr/local/bin/llvm-ar \
143
+ /usr/local/bin/llvm-as \
144
+ /usr/local/bin/llvm-config \
145
+ /usr/local/bin/llvm-cov \
146
+ /usr/local/bin/llvm-objcopy \
147
+ /usr/local/bin/llvm-nm \
148
+ /usr/local/bin/llvm-profdata \
149
+ /usr/local/bin/llvm-ranlib \
150
+ /usr/local/bin/llvm-symbolizer \
151
+ /usr/local/bin/llvm-undname \
152
+ $LLVM_TOOLS_TMPDIR
153
+
154
+ # Delete remaining llvm- binaries.
155
+ rm -rf /usr/local/bin/llvm-*
156
+
157
+ # Restore the llvm- binaries we want to keep.
158
+ mv $LLVM_TOOLS_TMPDIR/* /usr/local/bin/
159
+ rm -rf $LLVM_TOOLS_TMPDIR
160
+
161
+ # Remove binaries from LLVM build that we don't need.
162
+ rm -f \
163
+ /usr/local/bin/bugpoint \
164
+ /usr/local/bin/llc \
165
+ /usr/local/bin/lli \
166
+ /usr/local/bin/clang-check \
167
+ /usr/local/bin/clang-refactor \
168
+ /usr/local/bin/clang-offload-wrapper \
169
+ /usr/local/bin/clang-offload-bundler \
170
+ /usr/local/bin/clang-repl \
171
+ /usr/local/bin/clang-check \
172
+ /usr/local/bin/clang-refactor \
173
+ /usr/local/bin/c-index-test \
174
+ /usr/local/bin/clang-rename \
175
+ /usr/local/bin/clang-scan-deps \
176
+ /usr/local/bin/clang-extdef-mapping \
177
+ /usr/local/bin/diagtool \
178
+ /usr/local/bin/sanstats \
179
+ /usr/local/bin/dsymutil \
180
+ /usr/local/bin/verify-uselistorder \
181
+ /usr/local/bin/clang-format
182
+
183
+ # Remove unneeded clang libs, CMake files from LLVM build, lld libs, and the
184
+ # libraries.
185
+ # Note: we need fuzzer_no_main libraries for atheris. Don't delete.
186
+ rm -rf \
187
+ /usr/local/lib/libclang* \
188
+ /usr/local/lib/liblld* \
189
+ /usr/local/lib/cmake/
190
+ }
191
+
192
+ if [ "$TARGET_TO_BUILD" == "AArch64" ]
193
+ then
194
+ free_disk_space
195
+ # Exit now on AArch64. We don't need to rebuild libc++ because on AArch64 we
196
+ # do not support MSAN nor do we care about i386.
197
+ exit 0
198
+ fi
199
+
200
+ function cmake_libcxx {
201
+ extra_args="$@"
202
+ cmake -G "Ninja" \
203
+ -DLIBCXX_ENABLE_SHARED=OFF \
204
+ -DLIBCXX_ENABLE_STATIC_ABI_LIBRARY=ON \
205
+ -DLIBCXXABI_ENABLE_SHARED=OFF \
206
+ -DLIBCXXABI_USE_LLVM_UNWINDER=OFF \
207
+ -DCMAKE_BUILD_TYPE=Release \
208
+ -DLLVM_ENABLE_PIC=ON \
209
+ -DLLVM_TARGETS_TO_BUILD="$TARGET_TO_BUILD" \
210
+ -DLLVM_ENABLE_RUNTIMES="libcxx;libcxxabi" \
211
+ -DLLVM_BINUTILS_INCDIR="/usr/include/" \
212
+ $extra_args \
213
+ -S $LLVM_SRC/runtimes
214
+ }
215
+
216
+ # 32-bit libraries.
217
+ mkdir -p $WORK/i386
218
+ cd $WORK/i386
219
+ cmake_libcxx \
220
+ -DCMAKE_INSTALL_PREFIX=/usr/i386/ \
221
+ -DCMAKE_C_FLAGS="-m32" \
222
+ -DCMAKE_CXX_FLAGS="-m32"
223
+
224
+ ninja -j $NPROC cxx
225
+ ninja install-cxx
226
+ rm -rf $WORK/i386
227
+
228
+ # MemorySanitizer instrumented libraries.
229
+ mkdir -p $WORK/msan
230
+ cd $WORK/msan
231
+
232
+ # https://github.com/google/oss-fuzz/issues/1099
233
+ cat <<EOF > $WORK/msan/ignorelist.txt
234
+ fun:__gxx_personality_*
235
+ EOF
236
+
237
+ cmake_libcxx \
238
+ -DLLVM_USE_SANITIZER=Memory \
239
+ -DCMAKE_INSTALL_PREFIX=/usr/msan/ \
240
+ -DCMAKE_CXX_FLAGS="-fsanitize-ignorelist=$WORK/msan/ignorelist.txt"
241
+
242
+ ninja -j $NPROC cxx
243
+ ninja install-cxx
244
+ rm -rf $WORK/msan
245
+
246
+ free_disk_space
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/actions/build_fuzzers/action.yml ADDED
@@ -0,0 +1,55 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # action.yml
2
+ name: 'build-fuzzers'
3
+ description: "Builds an OSS-Fuzz project's fuzzers."
4
+ inputs:
5
+ oss-fuzz-project-name:
6
+ description: 'Name of the corresponding OSS-Fuzz project.'
7
+ required: true
8
+ language:
9
+ description: 'Programming language project is written in.'
10
+ required: false
11
+ default: 'c++'
12
+ dry-run:
13
+ description: 'If set, run the action without actually reporting a failure.'
14
+ default: false
15
+ allowed-broken-targets-percentage:
16
+ description: 'The percentage of broken targets allowed in bad_build_check.'
17
+ required: false
18
+ sanitizer:
19
+ description: 'The sanitizer to build the fuzzers with.'
20
+ default: 'address'
21
+ architecture:
22
+ description: 'The architecture used to build the fuzzers.'
23
+ default: 'x86_64'
24
+ project-src-path:
25
+ description: "The path to the project's source code checkout."
26
+ required: false
27
+ bad-build-check:
28
+ description: "Whether or not OSS-Fuzz's check for bad builds should be done."
29
+ required: false
30
+ default: true
31
+ keep-unaffected-fuzz-targets:
32
+ description: "Whether to keep unaffected fuzzers or delete them."
33
+ required: false
34
+ default: false
35
+ output-sarif:
36
+ description: "Whether to output fuzzing results to SARIF."
37
+ required: false
38
+ default: false
39
+ runs:
40
+ using: 'docker'
41
+ image: '../../../build_fuzzers.Dockerfile'
42
+ env:
43
+ OSS_FUZZ_PROJECT_NAME: ${{ inputs.oss-fuzz-project-name }}
44
+ LANGUAGE: ${{ inputs.language }}
45
+ DRY_RUN: ${{ inputs.dry-run}}
46
+ ALLOWED_BROKEN_TARGETS_PERCENTAGE: ${{ inputs.allowed-broken-targets-percentage}}
47
+ SANITIZER: ${{ inputs.sanitizer }}
48
+ ARCHITECTURE: ${{ inputs.architecture }}
49
+ PROJECT_SRC_PATH: ${{ inputs.project-src-path }}
50
+ LOW_DISK_SPACE: 'True'
51
+ BAD_BUILD_CHECK: ${{ inputs.bad-build-check }}
52
+ CIFUZZ_DEBUG: 'True'
53
+ CFL_PLATFORM: 'github'
54
+ KEEP_UNAFFECTED_FUZZ_TARGETS: ${{ inputs.keep-unaffected-fuzz-targets }}
55
+ OUTPUT_SARIF: ${{ inputs.output-sarif }}
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/cifuzz-base/Dockerfile ADDED
@@ -0,0 +1,44 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2020 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ FROM ghcr.io/aixcc-finals/base-runner
18
+
19
+ RUN apt-get update && \
20
+ apt-get install -y systemd && \
21
+ wget https://download.docker.com/linux/ubuntu/dists/focal/pool/stable/amd64/docker-ce-cli_20.10.8~3-0~ubuntu-focal_amd64.deb -O /tmp/docker-ce.deb && \
22
+ dpkg -i /tmp/docker-ce.deb && \
23
+ rm /tmp/docker-ce.deb
24
+
25
+ ENV PATH=/opt/gcloud/google-cloud-sdk/bin/:$PATH
26
+ ENV OSS_FUZZ_ROOT=/opt/oss-fuzz
27
+
28
+ # Do this step before copying to make rebuilding faster when developing.
29
+ COPY ./infra/cifuzz/requirements.txt /tmp/requirements.txt
30
+ RUN python3 -m pip install -r /tmp/requirements.txt && rm /tmp/requirements.txt
31
+
32
+ ADD . ${OSS_FUZZ_ROOT}
33
+ # Don't use the default npm location since jazzer.js can break us.
34
+ # This means javascript needed by cifuzz/clusterfuzzlite must be executed in
35
+ # OSS_FUZZ_ROOT.
36
+ RUN cd ${OSS_FUZZ_ROOT} && npm install ${OSS_FUZZ_ROOT}/infra/cifuzz
37
+
38
+
39
+ ENV PYTHONUNBUFFERED=1
40
+
41
+ # Python file to execute when the docker container starts up.
42
+ # We can't use the env var $OSS_FUZZ_ROOT here. Since it's a constant env var,
43
+ # just expand to '/opt/oss-fuzz'.
44
+ ENTRYPOINT ["python3", "/opt/oss-fuzz/infra/cifuzz/cifuzz_combined_entrypoint.py"]
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/cloudbuild.yaml ADDED
@@ -0,0 +1,52 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # TODO(metzman): Get rid of cifuzz-build-fuzzers and cifuzz-run-fuzzers.
2
+ steps:
3
+ - name: 'gcr.io/cloud-builders/docker'
4
+ args:
5
+ - build
6
+ - '-t'
7
+ - ghcr.io/aixcc-finals/cifuzz-base
8
+ - '-t'
9
+ - ghcr.io/aixcc-finals/cifuzz-base:v1
10
+ - '-f'
11
+ - infra/cifuzz/cifuzz-base/Dockerfile
12
+ - .
13
+ - name: 'gcr.io/cloud-builders/docker'
14
+ args:
15
+ - build
16
+ - '-t'
17
+ - ghcr.io/aixcc-finals/cifuzz-build-fuzzers
18
+ - '-t'
19
+ - ghcr.io/aixcc-finals/cifuzz-build-fuzzers:v1
20
+ - '-t'
21
+ - ghcr.io/aixcc-finals/clusterfuzzlite-build-fuzzers
22
+ - '-t'
23
+ - ghcr.io/aixcc-finals/clusterfuzzlite-build-fuzzers:v1
24
+ - '-f'
25
+ - infra/build_fuzzers.Dockerfile
26
+ - infra
27
+ - name: 'gcr.io/cloud-builders/docker'
28
+ args:
29
+ - build
30
+ - '-t'
31
+ - ghcr.io/aixcc-finals/cifuzz-run-fuzzers
32
+ - '-t'
33
+ - ghcr.io/aixcc-finals/cifuzz-run-fuzzers:v1
34
+ - '-t'
35
+ - ghcr.io/aixcc-finals/clusterfuzzlite-run-fuzzers
36
+ - '-t'
37
+ - ghcr.io/aixcc-finals/clusterfuzzlite-run-fuzzers:v1
38
+ - '-f'
39
+ - infra/run_fuzzers.Dockerfile
40
+ - infra
41
+ images:
42
+ - ghcr.io/aixcc-finals/cifuzz-base
43
+ - ghcr.io/aixcc-finals/cifuzz-base:v1
44
+ - ghcr.io/aixcc-finals/cifuzz-run-fuzzers
45
+ - ghcr.io/aixcc-finals/cifuzz-run-fuzzers:v1
46
+ - ghcr.io/aixcc-finals/cifuzz-build-fuzzers
47
+ - ghcr.io/aixcc-finals/cifuzz-build-fuzzers:v1
48
+ - ghcr.io/aixcc-finals/clusterfuzzlite-build-fuzzers
49
+ - ghcr.io/aixcc-finals/clusterfuzzlite-build-fuzzers:v1
50
+ - ghcr.io/aixcc-finals/clusterfuzzlite-run-fuzzers
51
+ - ghcr.io/aixcc-finals/clusterfuzzlite-run-fuzzers:v1
52
+ timeout: 1800s
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/clusterfuzz_deployment_test.py ADDED
@@ -0,0 +1,268 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Tests for clusterfuzz_deployment.py"""
15
+
16
+ import os
17
+ import unittest
18
+ from unittest import mock
19
+
20
+ import parameterized
21
+ from pyfakefs import fake_filesystem_unittest
22
+
23
+ import clusterfuzz_deployment
24
+ import config_utils
25
+ import test_helpers
26
+ import workspace_utils
27
+
28
+ # NOTE: This integration test relies on
29
+ # https://github.com/google/oss-fuzz/tree/master/projects/example project.
30
+ EXAMPLE_PROJECT = 'example'
31
+
32
+ # An example fuzzer that triggers an error.
33
+ EXAMPLE_FUZZER = 'example_crash_fuzzer'
34
+
35
+ WORKSPACE = '/workspace'
36
+ EXPECTED_LATEST_BUILD_PATH = os.path.join(WORKSPACE, 'cifuzz-prev-build')
37
+
38
+ # pylint: disable=unused-argument
39
+
40
+
41
+ def _create_config(**kwargs):
42
+ """Creates a config object and then sets every attribute that is a key in
43
+ |kwargs| to the corresponding value. Asserts that each key in |kwargs| is an
44
+ attribute of Config."""
45
+ defaults = {
46
+ 'cfl_platform': 'github',
47
+ 'oss_fuzz_project_name': EXAMPLE_PROJECT,
48
+ 'workspace': WORKSPACE,
49
+ }
50
+ for default_key, default_value in defaults.items():
51
+ if default_key not in kwargs:
52
+ kwargs[default_key] = default_value
53
+
54
+ return test_helpers.create_run_config(**kwargs)
55
+
56
+
57
+ def _create_deployment(**kwargs):
58
+ config = _create_config(**kwargs)
59
+ workspace = workspace_utils.Workspace(config)
60
+ return clusterfuzz_deployment.get_clusterfuzz_deployment(config, workspace)
61
+
62
+
63
+ class OSSFuzzTest(fake_filesystem_unittest.TestCase):
64
+ """Tests OSSFuzz."""
65
+
66
+ def setUp(self):
67
+ self.setUpPyfakefs()
68
+ self.deployment = _create_deployment()
69
+ self.corpus_dir = os.path.join(self.deployment.workspace.corpora,
70
+ EXAMPLE_FUZZER)
71
+
72
+ @mock.patch('http_utils.download_and_unpack_zip', return_value=True)
73
+ def test_download_corpus(self, mock_download_and_unpack_zip):
74
+ """Tests that we can download a corpus for a valid project."""
75
+ self.deployment.download_corpus(EXAMPLE_FUZZER, self.corpus_dir)
76
+ expected_url = ('https://storage.googleapis.com/example-backup.'
77
+ 'clusterfuzz-external.appspot.com/corpus/libFuzzer/'
78
+ 'example_crash_fuzzer/public.zip')
79
+ call_args, _ = mock_download_and_unpack_zip.call_args
80
+ self.assertEqual(call_args, (expected_url, self.corpus_dir))
81
+ self.assertTrue(os.path.exists(self.corpus_dir))
82
+
83
+ @mock.patch('http_utils.download_and_unpack_zip', return_value=False)
84
+ def test_download_corpus_fail(self, _):
85
+ """Tests that when downloading fails, an empty corpus directory is still
86
+ returned."""
87
+ self.deployment.download_corpus(EXAMPLE_FUZZER, self.corpus_dir)
88
+ self.assertEqual(os.listdir(self.corpus_dir), [])
89
+
90
+ def test_get_latest_build_name(self):
91
+ """Tests that the latest build name can be retrieved from GCS."""
92
+ latest_build_name = self.deployment.get_latest_build_name()
93
+ self.assertTrue(latest_build_name.endswith('.zip'))
94
+ self.assertTrue('address' in latest_build_name)
95
+
96
+ @parameterized.parameterized.expand([
97
+ ('upload_build', ('commit',),
98
+ 'Not uploading latest build because on OSS-Fuzz.'),
99
+ ('upload_corpus', ('target', 'corpus-dir'),
100
+ 'Not uploading corpus because on OSS-Fuzz.'),
101
+ ('upload_crashes', tuple(), 'Not uploading crashes because on OSS-Fuzz.'),
102
+ ])
103
+ def test_noop_methods(self, method, method_args, expected_message):
104
+ """Tests that certain methods are noops for OSS-Fuzz."""
105
+ with mock.patch('logging.info') as mock_info:
106
+ method = getattr(self.deployment, method)
107
+ self.assertIsNone(method(*method_args))
108
+ mock_info.assert_called_with(expected_message)
109
+
110
+ @mock.patch('http_utils.download_and_unpack_zip', return_value=True)
111
+ def test_download_latest_build(self, mock_download_and_unpack_zip):
112
+ """Tests that downloading the latest build works as intended under normal
113
+ circumstances."""
114
+ self.assertEqual(self.deployment.download_latest_build(),
115
+ EXPECTED_LATEST_BUILD_PATH)
116
+ expected_url = ('https://storage.googleapis.com/clusterfuzz-builds/example/'
117
+ 'example-address-202008030600.zip')
118
+ mock_download_and_unpack_zip.assert_called_with(expected_url,
119
+ EXPECTED_LATEST_BUILD_PATH)
120
+
121
+ @mock.patch('http_utils.download_and_unpack_zip', return_value=False)
122
+ def test_download_latest_build_fail(self, _):
123
+ """Tests that download_latest_build returns None when it fails to download a
124
+ build."""
125
+ self.assertIsNone(self.deployment.download_latest_build())
126
+
127
+
128
+ class ClusterFuzzLiteTest(fake_filesystem_unittest.TestCase):
129
+ """Tests for ClusterFuzzLite."""
130
+
131
+ def setUp(self):
132
+ self.setUpPyfakefs()
133
+ self.deployment = _create_deployment(mode='batch',
134
+ oss_fuzz_project_name='',
135
+ cloud_bucket='gs://bucket')
136
+ self.corpus_dir = os.path.join(self.deployment.workspace.corpora,
137
+ EXAMPLE_FUZZER)
138
+
139
+ @mock.patch('filestore.github_actions.GithubActionsFilestore.download_corpus',
140
+ return_value=True)
141
+ def test_download_corpus(self, mock_download_corpus):
142
+ """Tests that download_corpus works for a valid project."""
143
+ self.deployment.download_corpus(EXAMPLE_FUZZER, self.corpus_dir)
144
+ mock_download_corpus.assert_called_with('example_crash_fuzzer',
145
+ self.corpus_dir)
146
+ self.assertTrue(os.path.exists(self.corpus_dir))
147
+
148
+ @mock.patch('filestore.github_actions.GithubActionsFilestore.download_corpus',
149
+ side_effect=Exception)
150
+ def test_download_corpus_fail(self, _):
151
+ """Tests that when downloading fails, an empty corpus directory is still
152
+ returned."""
153
+ self.deployment.download_corpus(EXAMPLE_FUZZER, self.corpus_dir)
154
+ self.assertEqual(os.listdir(self.corpus_dir), [])
155
+
156
+ @mock.patch('filestore.github_actions.GithubActionsFilestore.download_build',
157
+ side_effect=[False, True])
158
+ @mock.patch('repo_manager.RepoManager.get_commit_list',
159
+ return_value=['commit1', 'commit2'])
160
+ @mock.patch('continuous_integration.GithubCiMixin.repo_dir',
161
+ return_value='/path/to/repo')
162
+ def test_download_latest_build(self, mock_repo_dir, mock_get_commit_list,
163
+ mock_download_build):
164
+ """Tests that downloading the latest build works as intended under normal
165
+ circumstances."""
166
+ self.assertEqual(self.deployment.download_latest_build(),
167
+ EXPECTED_LATEST_BUILD_PATH)
168
+ expected_artifact_name = 'address-commit2'
169
+ mock_download_build.assert_called_with(expected_artifact_name,
170
+ EXPECTED_LATEST_BUILD_PATH)
171
+
172
+ @mock.patch('filestore.github_actions.GithubActionsFilestore.download_build',
173
+ side_effect=Exception)
174
+ @mock.patch('repo_manager.RepoManager.get_commit_list',
175
+ return_value=['commit1', 'commit2'])
176
+ @mock.patch('continuous_integration.GithubCiMixin.repo_dir',
177
+ return_value='/path/to/repo')
178
+ def test_download_latest_build_fail(self, mock_repo_dir, mock_get_commit_list,
179
+ _):
180
+ """Tests that download_latest_build returns None when it fails to download a
181
+ build."""
182
+ self.assertIsNone(self.deployment.download_latest_build())
183
+
184
+ @mock.patch('filestore.github_actions.GithubActionsFilestore.upload_build')
185
+ def test_upload_build(self, mock_upload_build):
186
+ """Tests that upload_build works as intended."""
187
+ self.deployment.upload_build('commit')
188
+ mock_upload_build.assert_called_with('address-commit',
189
+ '/workspace/build-out')
190
+
191
+
192
+ class NoClusterFuzzDeploymentTest(fake_filesystem_unittest.TestCase):
193
+ """Tests for NoClusterFuzzDeployment."""
194
+
195
+ def setUp(self):
196
+ self.setUpPyfakefs()
197
+ config = test_helpers.create_run_config(workspace=WORKSPACE,
198
+ cfl_platform='other',
199
+ filestore='no_filestore',
200
+ no_clusterfuzz_deployment=True)
201
+ workspace = workspace_utils.Workspace(config)
202
+ self.deployment = clusterfuzz_deployment.get_clusterfuzz_deployment(
203
+ config, workspace)
204
+
205
+ self.corpus_dir = os.path.join(workspace.corpora, EXAMPLE_FUZZER)
206
+
207
+ @mock.patch('logging.info')
208
+ def test_download_corpus(self, mock_info):
209
+ """Tests that download corpus returns the path to the empty corpus
210
+ directory."""
211
+ self.deployment.download_corpus(EXAMPLE_FUZZER, self.corpus_dir)
212
+ mock_info.assert_called_with(
213
+ 'Not downloading corpus because no ClusterFuzz deployment.')
214
+ self.assertTrue(os.path.exists(self.corpus_dir))
215
+
216
+ @parameterized.parameterized.expand([
217
+ ('upload_build', ('commit',),
218
+ 'Not uploading latest build because no ClusterFuzz deployment.'),
219
+ ('upload_corpus', ('target', 'corpus-dir'),
220
+ 'Not uploading corpus because no ClusterFuzz deployment.'),
221
+ ('upload_crashes', tuple(),
222
+ 'Not uploading crashes because no ClusterFuzz deployment.'),
223
+ ('download_latest_build', tuple(),
224
+ 'Not downloading latest build because no ClusterFuzz deployment.')
225
+ ])
226
+ def test_noop_methods(self, method, method_args, expected_message):
227
+ """Tests that certain methods are noops for NoClusterFuzzDeployment."""
228
+ with mock.patch('logging.info') as mock_info:
229
+ method = getattr(self.deployment, method)
230
+ self.assertIsNone(method(*method_args))
231
+ mock_info.assert_called_with(expected_message)
232
+
233
+
234
+ class GetClusterFuzzDeploymentTest(unittest.TestCase):
235
+ """Tests for get_clusterfuzz_deployment."""
236
+
237
+ def setUp(self):
238
+ test_helpers.patch_environ(self)
239
+ os.environ['GITHUB_REPOSITORY'] = 'owner/myproject'
240
+
241
+ @parameterized.parameterized.expand([
242
+ (config_utils.BaseConfig.Platform.INTERNAL_GENERIC_CI,
243
+ clusterfuzz_deployment.OSSFuzz),
244
+ (config_utils.BaseConfig.Platform.INTERNAL_GITHUB,
245
+ clusterfuzz_deployment.OSSFuzz),
246
+ (config_utils.BaseConfig.Platform.EXTERNAL_GENERIC_CI,
247
+ clusterfuzz_deployment.ClusterFuzzLite),
248
+ (config_utils.BaseConfig.Platform.EXTERNAL_GITHUB,
249
+ clusterfuzz_deployment.ClusterFuzzLite),
250
+ ])
251
+ def test_get_clusterfuzz_deployment(self, platform, expected_deployment_cls):
252
+ """Tests that get_clusterfuzz_deployment returns the correct value."""
253
+ with mock.patch('config_utils.BaseConfig.platform',
254
+ return_value=platform,
255
+ new_callable=mock.PropertyMock):
256
+ with mock.patch('filestore_utils.get_filestore', return_value=None):
257
+ with mock.patch('platform_config.github._get_event_data',
258
+ return_value={}):
259
+ config = _create_config()
260
+ workspace = workspace_utils.Workspace(config)
261
+
262
+ self.assertIsInstance(
263
+ clusterfuzz_deployment.get_clusterfuzz_deployment(
264
+ config, workspace), expected_deployment_cls)
265
+
266
+
267
+ if __name__ == '__main__':
268
+ unittest.main()
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/config_utils.py ADDED
@@ -0,0 +1,283 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for getting the configuration CIFuzz needs to run."""
15
+
16
+ import enum
17
+ import importlib
18
+ import logging
19
+ import os
20
+ import sys
21
+
22
+ import environment
23
+
24
+ # pylint: disable=wrong-import-position,import-error
25
+ sys.path.append(os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
26
+
27
+ import platform_config
28
+ import constants
29
+
30
+ SANITIZERS = ['address', 'memory', 'undefined', 'coverage']
31
+
32
+ # TODO(metzman): Set these on config objects so there's one source of truth.
33
+ DEFAULT_ENGINE = 'libfuzzer'
34
+
35
+ # This module deals a lot with env variables. Many of these will be set by users
36
+ # and others beyond CIFuzz's control. Thus, you should be careful about using
37
+ # the environment.py helpers for getting env vars, since it can cause values
38
+ # that should be interpreted as strings to be returned as other types (bools or
39
+ # ints for example). The environment.py helpers should not be used for values
40
+ # that are supposed to be strings.
41
+
42
+
43
+ def _get_sanitizer():
44
+ return os.getenv('SANITIZER', constants.DEFAULT_SANITIZER).lower()
45
+
46
+
47
+ def _get_architecture():
48
+ return os.getenv('ARCHITECTURE', constants.DEFAULT_ARCHITECTURE).lower()
49
+
50
+
51
+ def _is_dry_run():
52
+ """Returns True if configured to do a dry run."""
53
+ return environment.get_bool('DRY_RUN', False)
54
+
55
+
56
+ def _get_language():
57
+ """Returns the project language."""
58
+ # Get language from environment. We took this approach because the convenience
59
+ # given to OSS-Fuzz users by not making them specify the language again (and
60
+ # getting it from the project.yaml) is outweighed by the complexity in
61
+ # implementing this. A lot of the complexity comes from our unittests not
62
+ # setting a proper projet at this point.
63
+ return os.getenv('LANGUAGE', constants.DEFAULT_LANGUAGE)
64
+
65
+
66
+ def _get_extra_environment_variables():
67
+ """Gets extra environment variables specified by the user with
68
+ CFL_EXTRA_$NAME=$VALUE."""
69
+ return [key for key in os.environ if key.startswith('CFL_EXTRA_')]
70
+
71
+
72
+ # pylint: disable=too-many-instance-attributes
73
+
74
+
75
+ class ConfigError(Exception):
76
+ """Error for invalid configuration."""
77
+
78
+
79
+ class BaseConfig:
80
+ """Object containing constant configuration for CIFuzz."""
81
+
82
+ class Platform(enum.Enum):
83
+ """Enum representing the different platforms CIFuzz runs on."""
84
+ EXTERNAL_GITHUB = 0 # Non-OSS-Fuzz on GitHub actions.
85
+ INTERNAL_GITHUB = 1 # OSS-Fuzz on GitHub actions.
86
+ INTERNAL_GENERIC_CI = 2 # OSS-Fuzz on any CI.
87
+ EXTERNAL_GENERIC_CI = 3 # Non-OSS-Fuzz on any CI.
88
+
89
+ @property
90
+ def is_github(self):
91
+ """Returns True if running on GitHub."""
92
+ return self.cfl_platform == 'github'
93
+
94
+ def __init__(self):
95
+ # Need to set these before calling self.platform.
96
+ self.oss_fuzz_project_name = os.getenv('OSS_FUZZ_PROJECT_NAME')
97
+ self.cfl_platform = os.getenv('CFL_PLATFORM')
98
+ logging.debug('Is github: %s.', self.is_github)
99
+
100
+ self.platform_conf = _get_platform_config(self.cfl_platform)
101
+ self.base_commit = self.platform_conf.base_commit
102
+ self.base_ref = self.platform_conf.base_ref
103
+ self.pr_ref = self.platform_conf.pr_ref
104
+ self.workspace = self.platform_conf.workspace
105
+ self.project_src_path = self.platform_conf.project_src_path
106
+ self.actor = self.platform_conf.actor
107
+ self.token = self.platform_conf.token
108
+ self.project_repo_owner = self.platform_conf.project_repo_owner
109
+ self.project_repo_name = self.platform_conf.project_repo_name
110
+ self.filestore = self.platform_conf.filestore
111
+
112
+ # This determines if builds are done using docker in docker
113
+ # rather than the normal method which is sibling containers.
114
+ self.docker_in_docker = self.platform_conf.docker_in_docker
115
+
116
+ self.dry_run = _is_dry_run() # Check if failures should not be reported.
117
+ self.sanitizer = _get_sanitizer()
118
+ self.architecture = _get_architecture()
119
+ self.language = _get_language()
120
+ self.low_disk_space = environment.get_bool('LOW_DISK_SPACE', False)
121
+
122
+ self.git_store_repo = os.environ.get('GIT_STORE_REPO')
123
+ self.git_store_branch = os.environ.get('GIT_STORE_BRANCH')
124
+ self.git_store_branch_coverage = os.environ.get('GIT_STORE_BRANCH_COVERAGE',
125
+ self.git_store_branch)
126
+ self.cloud_bucket = os.environ.get('CLOUD_BUCKET')
127
+ self.no_clusterfuzz_deployment = environment.get_bool(
128
+ 'NO_CLUSTERFUZZ_DEPLOYMENT', False)
129
+ self.build_integration_path = (
130
+ constants.DEFAULT_EXTERNAL_BUILD_INTEGRATION_PATH)
131
+
132
+ self.parallel_fuzzing = environment.get_bool('PARALLEL_FUZZING', False)
133
+ self.extra_environment_variables = _get_extra_environment_variables()
134
+ self.output_sarif = environment.get_bool('OUTPUT_SARIF', False)
135
+
136
+ # TODO(metzman): Fix tests to create valid configurations and get rid of
137
+ # CIFUZZ_TEST here and in presubmit.py.
138
+ if not os.getenv('CIFUZZ_TEST') and not self.validate():
139
+ raise ConfigError('Invalid Configuration.')
140
+
141
+ def validate(self):
142
+ """Returns False if the configuration is invalid."""
143
+ # Do validation here so that unittests don't need to make a fully-valid
144
+ # config.
145
+ # pylint: disable=too-many-return-statements
146
+ if not self.workspace:
147
+ logging.error('Must set WORKSPACE.')
148
+ return False
149
+
150
+ if self.sanitizer not in SANITIZERS:
151
+ logging.error('Invalid SANITIZER: %s. Must be one of: %s.',
152
+ self.sanitizer, SANITIZERS)
153
+ return False
154
+
155
+ if self.architecture not in constants.ARCHITECTURES:
156
+ logging.error('Invalid ARCHITECTURE: %s. Must be one of: %s.',
157
+ self.architecture, constants.ARCHITECTURES)
158
+ return False
159
+
160
+ if self.architecture == 'i386' and self.sanitizer != 'address':
161
+ logging.error(
162
+ 'ARCHITECTURE=i386 can be used with SANITIZER=address only.')
163
+ return False
164
+
165
+ if self.language not in constants.LANGUAGES:
166
+ logging.error('Invalid LANGUAGE: %s. Must be one of: %s.', self.language,
167
+ constants.LANGUAGES)
168
+ return False
169
+
170
+ if not self.project_repo_name:
171
+ logging.error('Must set REPOSITORY.')
172
+ return False
173
+
174
+ return True
175
+
176
+ @property
177
+ def is_internal(self):
178
+ """Returns True if this is an OSS-Fuzz project."""
179
+ return bool(self.oss_fuzz_project_name)
180
+
181
+ @property
182
+ def platform(self):
183
+ """Returns the platform CIFuzz is runnning on."""
184
+ if not self.is_internal:
185
+ if not self.is_github:
186
+ return self.Platform.EXTERNAL_GENERIC_CI
187
+ return self.Platform.EXTERNAL_GITHUB
188
+
189
+ if self.is_github:
190
+ return self.Platform.INTERNAL_GITHUB
191
+ return self.Platform.INTERNAL_GENERIC_CI
192
+
193
+ @property
194
+ def is_coverage(self):
195
+ """Returns True if this CIFuzz run (building fuzzers and running them) for
196
+ generating a coverage report."""
197
+ return self.sanitizer == 'coverage'
198
+
199
+
200
+ def _get_platform_config(cfl_platform):
201
+ """Returns the CI environment object for |cfl_platform|."""
202
+ module_name = f'platform_config.{cfl_platform}'
203
+ try:
204
+ cls = importlib.import_module(module_name).PlatformConfig
205
+ except ImportError:
206
+ cls = platform_config.BasePlatformConfig
207
+ return cls()
208
+
209
+
210
+ class RunFuzzersConfig(BaseConfig):
211
+ """Class containing constant configuration for running fuzzers in CIFuzz."""
212
+
213
+ MODES = ['batch', 'code-change', 'coverage', 'prune']
214
+
215
+ def __init__(self):
216
+ super().__init__()
217
+ # TODO(metzman): Pick a better default for pruning.
218
+ self.fuzz_seconds = int(os.environ.get('FUZZ_SECONDS', 600))
219
+ self.mode = os.environ.get('MODE', 'code-change').lower()
220
+ if self.is_coverage:
221
+ self.mode = 'coverage'
222
+
223
+ self.report_unreproducible_crashes = environment.get_bool(
224
+ 'REPORT_UNREPRODUCIBLE_CRASHES', False)
225
+
226
+ self.minimize_crashes = environment.get_bool('MINIMIZE_CRASHES', False)
227
+ if self.mode == 'batch':
228
+ logging.warning(
229
+ 'Minimizing crashes reduces fuzzing time in batch fuzzing.')
230
+ self.report_timeouts = environment.get_bool('REPORT_TIMEOUTS', False)
231
+ self.report_ooms = environment.get_bool('REPORT_OOMS', True)
232
+ self.upload_all_crashes = environment.get_bool('UPLOAD_ALL_CRASHES', False)
233
+
234
+ # TODO(metzman): Fix tests to create valid configurations and get rid of
235
+ # CIFUZZ_TEST here and in presubmit.py.
236
+ if not os.getenv('CIFUZZ_TEST') and not self._run_config_validate():
237
+ raise ConfigError('Invalid Run Configuration.')
238
+
239
+ def _run_config_validate(self):
240
+ """Do extra validation on RunFuzzersConfig.__init__(). Do not name this
241
+ validate or else it will be called when using the parent's __init__ and will
242
+ fail. Returns True if valid."""
243
+ if self.mode not in self.MODES:
244
+ logging.error('Invalid MODE: %s. Must be one of %s.', self.mode,
245
+ self.MODES)
246
+ return False
247
+
248
+ return True
249
+
250
+
251
+ class BuildFuzzersConfig(BaseConfig):
252
+ """Class containing constant configuration for building fuzzers in CIFuzz."""
253
+
254
+ def __init__(self):
255
+ """Get the configuration from CIFuzz from the environment. These variables
256
+ are set by GitHub or the user."""
257
+ super().__init__()
258
+ self.git_sha = self.platform_conf.git_sha
259
+ self.git_url = self.platform_conf.git_url
260
+
261
+ self.allowed_broken_targets_percentage = os.getenv(
262
+ 'ALLOWED_BROKEN_TARGETS_PERCENTAGE')
263
+ self.bad_build_check = environment.get_bool('BAD_BUILD_CHECK', True)
264
+
265
+ self.keep_unaffected_fuzz_targets = environment.get_bool(
266
+ 'KEEP_UNAFFECTED_FUZZ_TARGETS')
267
+
268
+ self.upload_build = environment.get_bool('UPLOAD_BUILD', False)
269
+ if not self.keep_unaffected_fuzz_targets:
270
+ has_base_for_diff = (self.base_ref or self.base_commit)
271
+ if not has_base_for_diff:
272
+ logging.info(
273
+ 'Keeping all fuzzers because there is nothing to diff against.')
274
+ self.keep_unaffected_fuzz_targets = True
275
+ elif self.upload_build:
276
+ logging.info('Keeping all fuzzers because we are uploading build.')
277
+ self.keep_unaffected_fuzz_targets = True
278
+ elif self.sanitizer == 'coverage':
279
+ logging.info('Keeping all fuzzers because we are doing coverage.')
280
+ self.keep_unaffected_fuzz_targets = True
281
+
282
+ if self.sanitizer == 'coverage':
283
+ self.bad_build_check = False
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/external-actions/run_fuzzers/action.yml ADDED
@@ -0,0 +1,97 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # action.yml
2
+ name: 'run-fuzzers'
3
+ description: 'Runs fuzz target binaries for a specified length of time.'
4
+ inputs:
5
+ language:
6
+ description: 'Programming language project is written in.'
7
+ required: false
8
+ default: 'c++'
9
+ fuzz-seconds:
10
+ description: 'The total time allotted for fuzzing in seconds.'
11
+ required: true
12
+ default: 600
13
+ dry-run:
14
+ description: 'If set, run the action without actually reporting a failure.'
15
+ default: false
16
+ sanitizer:
17
+ description: 'The sanitizer to run the fuzzers with.'
18
+ default: 'address'
19
+ mode:
20
+ description: |
21
+ The mode to run the fuzzers with ("code-change", "batch", "coverage", or "prune").
22
+ "code-change" is for fuzzing a pull request or commit.
23
+ "batch" is for non-interactive fuzzing of an entire project.
24
+ "coverage" is for coverage generation.
25
+ "prune" is for corpus pruning.
26
+ required: false
27
+ default: 'code-change'
28
+ github-token:
29
+ description: |
30
+ Token for GitHub API. WARNING: THIS SHOULD NOT BE USED IN PRODUCTION YET
31
+ You should use "secrets.GITHUB_TOKEN" in your workflow file, do not
32
+ hardcode the token.
33
+ TODO(https://github.com/google/oss-fuzz/pull/5841#discussion_r639393361):
34
+ Document locking this down.
35
+ required: true
36
+ storage-repo:
37
+ description: |
38
+ The git repo to use for storing certain artifacts from fuzzing.
39
+ required: false
40
+ storage-repo-branch:
41
+ description: |
42
+ The branch of the git repo to use for storing certain artifacts from
43
+ fuzzing.
44
+ default: main
45
+ required: false
46
+ storage-repo-branch-coverage:
47
+ description: |
48
+ The branch of the git repo to use for storing coverage reports.
49
+ default: gh-pages
50
+ required: false
51
+ report-unreproducible-crashes:
52
+ description: 'If True, then unreproducible crashes will be reported.'
53
+ required: false
54
+ default: false
55
+ minimize-crashes:
56
+ description: 'If True, reportable crashes will be minimized.'
57
+ required: false
58
+ default: False
59
+ parallel-fuzzing:
60
+ description: "Whether to use all available cores for fuzzing."
61
+ required: false
62
+ default: false
63
+ output-sarif:
64
+ description: "Whether to output fuzzing results to SARIF."
65
+ required: false
66
+ default: false
67
+ report-timeouts:
68
+ description: "Whether to report fails due to timeout."
69
+ required: false
70
+ default: true
71
+ report-ooms:
72
+ description: "Whether to report fails due to OOM."
73
+ required: false
74
+ default: true
75
+ runs:
76
+ using: 'docker'
77
+ image: '../../../run_fuzzers.Dockerfile'
78
+ env:
79
+ OSS_FUZZ_PROJECT_NAME: ${{ inputs.oss-fuzz-project-name }}
80
+ LANGUAGE: ${{ inputs.language }}
81
+ FUZZ_SECONDS: ${{ inputs.fuzz-seconds }}
82
+ DRY_RUN: ${{ inputs.dry-run}}
83
+ SANITIZER: ${{ inputs.sanitizer }}
84
+ MODE: ${{ inputs.mode }}
85
+ GITHUB_TOKEN: ${{ inputs.github-token }}
86
+ LOW_DISK_SPACE: 'True'
87
+ GIT_STORE_REPO: ${{ inputs.storage-repo }}
88
+ GIT_STORE_BRANCH: ${{ inputs.storage-repo-branch }}
89
+ GIT_STORE_BRANCH_COVERAGE: ${{ inputs.storage-repo-branch-coverage }}
90
+ REPORT_UNREPRODUCIBLE_CRASHES: ${{ inputs.report-unreproducible-crashes }}
91
+ MINIMIZE_CRASHES: ${{ inputs.minimize-crashes }}
92
+ CIFUZZ_DEBUG: 'True'
93
+ CFL_PLATFORM: 'github'
94
+ PARALLEL_FUZZING: ${{ inputs.parallel-fuzzing }}
95
+ OUTPUT_SARIF: ${{ inputs.output-sarif }}
96
+ REPORT_TIMEOUTS: ${{ inputs.report-timeouts }}
97
+ REPORT_OOMS: ${{ inputs.report-ooms}}
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/filestore/__init__.py ADDED
@@ -0,0 +1,54 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for a generic filestore."""
15
+
16
+
17
+ class FilestoreError(Exception):
18
+ """Error using the filestore."""
19
+
20
+
21
+ # pylint: disable=unused-argument,no-self-use
22
+ class BaseFilestore:
23
+ """Base class for a filestore."""
24
+
25
+ def __init__(self, config):
26
+ self.config = config
27
+
28
+ def upload_crashes(self, name, directory):
29
+ """Uploads the crashes at |directory| to |name|."""
30
+ raise NotImplementedError('Child class must implement method.')
31
+
32
+ def upload_corpus(self, name, directory, replace=False):
33
+ """Uploads the corpus at |directory| to |name|."""
34
+ raise NotImplementedError('Child class must implement method.')
35
+
36
+ def upload_build(self, name, directory):
37
+ """Uploads the build at |directory| to |name|."""
38
+ raise NotImplementedError('Child class must implement method.')
39
+
40
+ def upload_coverage(self, name, directory):
41
+ """Uploads the coverage report at |directory| to |name|."""
42
+ raise NotImplementedError('Child class must implement method.')
43
+
44
+ def download_corpus(self, name, dst_directory):
45
+ """Downloads the corpus located at |name| to |dst_directory|."""
46
+ raise NotImplementedError('Child class must implement method.')
47
+
48
+ def download_build(self, name, dst_directory):
49
+ """Downloads the build with |name| to |dst_directory|."""
50
+ raise NotImplementedError('Child class must implement method.')
51
+
52
+ def download_coverage(self, name, dst_directory):
53
+ """Downloads the latest project coverage report."""
54
+ raise NotImplementedError('Child class must implement method.')
local-test-tika-delta-02/fuzz-tooling/infra/cifuzz/filestore/git/__init__.py ADDED
@@ -0,0 +1,158 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for a git based filestore."""
15
+
16
+ import logging
17
+ import os
18
+ import shutil
19
+ import subprocess
20
+ import sys
21
+ import tempfile
22
+
23
+ import filestore
24
+
25
+ # pylint: disable=wrong-import-position
26
+ INFRA_DIR = os.path.dirname(
27
+ os.path.dirname(os.path.dirname(os.path.dirname(
28
+ os.path.abspath(__file__)))))
29
+ sys.path.append(INFRA_DIR)
30
+
31
+ import retry
32
+
33
+ _PUSH_RETRIES = 3
34
+ _PUSH_BACKOFF = 1
35
+ _GIT_EMAIL = 'cifuzz@clusterfuzz.com'
36
+ _GIT_NAME = 'CIFuzz'
37
+ _CORPUS_DIR = 'corpus'
38
+ _COVERAGE_DIR = 'coverage'
39
+
40
+
41
+ def git_runner(repo_path):
42
+ """Returns a gits runner for the repo_path."""
43
+
44
+ def func(*args):
45
+ return subprocess.check_call(('git', '-C', repo_path) + args)
46
+
47
+ return func
48
+
49
+
50
+ # pylint: disable=unused-argument,no-self-use
51
+ class GitFilestore(filestore.BaseFilestore):
52
+ """Generic git filestore. This still relies on another filestore provided by
53
+ the CI for larger artifacts or artifacts which make sense to be included as
54
+ the result of a workflow run."""
55
+
56
+ def __init__(self, config, ci_filestore):
57
+ super().__init__(config)
58
+ self.repo_path = tempfile.mkdtemp()
59
+ self._git = git_runner(self.repo_path)
60
+ self._clone(self.config.git_store_repo)
61
+
62
+ self._ci_filestore = ci_filestore
63
+
64
+ def __del__(self):
65
+ shutil.rmtree(self.repo_path)
66
+
67
+ def _clone(self, repo_url):
68
+ """Clones repo URL."""
69
+ self._git('clone', repo_url, '.')
70
+ self._git('config', '--local', 'user.email', _GIT_EMAIL)
71
+ self._git('config', '--local', 'user.name', _GIT_NAME)
72
+
73
+ def _reset_git(self, branch):
74
+ """Resets the git repo."""
75
+ self._git('fetch', 'origin')
76
+ try:
77
+ self._git('checkout', '-B', branch, 'origin/' + branch)
78
+ self._git('reset', '--hard', 'HEAD')
79
+ except subprocess.CalledProcessError:
80
+ self._git('checkout', '--orphan', branch)
81
+
82
+ self._git('clean', '-fxd')
83
+
84
+ # pylint: disable=too-many-arguments
85
+ @retry.wrap(_PUSH_RETRIES, _PUSH_BACKOFF)
86
+ def _upload_to_git(self,
87
+ message,
88
+ branch,
89
+ upload_path,
90
+ local_path,
91
+ replace=False):
92
+ """Uploads a directory to git. If `replace` is True, then existing contents
93
+ in the upload_path is deleted."""
94
+ self._reset_git(branch)
95
+
96
+ full_repo_path = os.path.join(self.repo_path, upload_path)
97
+ if replace and os.path.exists(full_repo_path):
98
+ shutil.rmtree(full_repo_path)
99
+
100
+ shutil.copytree(local_path, full_repo_path, dirs_exist_ok=True)
101
+ self._git('add', '.')
102
+ try:
103
+ self._git('commit', '-m', message)
104
+ except subprocess.CalledProcessError:
105
+ logging.debug('No changes, skipping git push.')
106
+ return
107
+
108
+ self._git('push', 'origin', branch)
109
+
110
+ def upload_crashes(self, name, directory):
111
+ """Uploads the crashes at |directory| to |name|."""
112
+ return self._ci_filestore.upload_crashes(name, directory)
113
+
114
+ def upload_corpus(self, name, directory, replace=False):
115
+ """Uploads the corpus at |directory| to |name|."""
116
+ self._upload_to_git('Corpus upload',
117
+ self.config.git_store_branch,
118
+ os.path.join(_CORPUS_DIR, name),
119
+ directory,
120
+ replace=replace)
121
+
122
+ def upload_build(self, name, directory):
123
+ """Uploads the build at |directory| to |name|."""
124
+ return self._ci_filestore.upload_build(name, directory)
125
+
126
+ def upload_coverage(self, name, directory):
127
+ """Uploads the coverage report at |directory| to |name|."""
128
+ self._upload_to_git('Coverage upload',
129
+ self.config.git_store_branch_coverage,
130
+ os.path.join(_COVERAGE_DIR, name),
131
+ directory,
132
+ replace=True)
133
+
134
+ def download_corpus(self, name, dst_directory):
135
+ """Downloads the corpus located at |name| to |dst_directory|."""
136
+ self._reset_git(self.config.git_store_branch)
137
+ path = os.path.join(self.repo_path, _CORPUS_DIR, name)
138
+ if not os.path.exists(path):
139
+ logging.debug('Corpus does not exist at %s.', path)
140
+ return False
141
+
142
+ shutil.copytree(path, dst_directory, dirs_exist_ok=True)
143
+ return True
144
+
145
+ def download_build(self, name, dst_directory):
146
+ """Downloads the build with |name| to |dst_directory|."""
147
+ return self._ci_filestore.download_build(name, dst_directory)
148
+
149
+ def download_coverage(self, name, dst_directory):
150
+ """Downloads the latest project coverage report."""
151
+ self._reset_git(self.config.git_store_branch_coverage)
152
+ path = os.path.join(self.repo_path, _COVERAGE_DIR, name)
153
+ if not os.path.exists(path):
154
+ logging.debug('Coverage does not exist at %s.', path)
155
+ return False
156
+
157
+ shutil.copytree(path, dst_directory, dirs_exist_ok=True)
158
+ return True