Kitxuuu commited on
Commit
5716623
·
verified ·
1 Parent(s): f184881

Add files using upload-large-folder tool

Browse files
Files changed (20) hide show
  1. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-python/Dockerfile +20 -0
  2. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/README.md +83 -0
  3. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/bisect_clang_test.py +294 -0
  4. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/compile_fuzztests.sh +126 -0
  5. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/compile_go_fuzzer +69 -0
  6. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/debug_afl +40 -0
  7. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_go.sh +43 -0
  8. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_java.sh +31 -0
  9. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_rust.sh +22 -0
  10. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_swift.sh +67 -0
  11. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/precompile_afl +35 -0
  12. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/precompile_centipede +49 -0
  13. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/Dockerfile +139 -0
  14. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/coverage +549 -0
  15. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/coverage_helper +17 -0
  16. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/install_java.sh +46 -0
  17. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/jacoco_report_converter.py +174 -0
  18. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/nyc_report_converter.py +80 -0
  19. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/targets_list +10 -0
  20. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/test_all_test.py +38 -0
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-python/Dockerfile ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ ARG IMG_TAG=latest
18
+ FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG}
19
+
20
+ RUN install_python.sh
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/README.md ADDED
@@ -0,0 +1,83 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # base-builder
2
+ > Abstract base image for project builders.
3
+
4
+ Every project image supports multiple commands that can be invoked through docker after the image is built:
5
+
6
+ <pre>
7
+ docker run --rm -ti gcr.io/oss-fuzz/<b><i>$project</i></b> <i>&lt;command&gt;</i> <i>&lt;arguments...&gt;</i>
8
+ </pre>
9
+
10
+ # Supported Commands
11
+
12
+ | Command | Description |
13
+ |---------|-------------|
14
+ | `compile` (default) | build all fuzz targets
15
+ | `/bin/bash` | drop into shell, execute `compile` script to start build.
16
+
17
+ # Build Configuration
18
+
19
+ A single build image can build same set of fuzzers in many configurations.
20
+ The configuration is picked through one or more environment variables.
21
+
22
+ | Env Variable | Description
23
+ | ------------- | --------
24
+ | `$SANITIZER ("address")` | Specifies predefined sanitizer configuration to use. `address` or `memory` or `undefined`.
25
+ | `$SANITIZER_FLAGS` | Specify compiler sanitizer flags directly. Overrides `$SANITIZER`.
26
+ | `$COVERAGE_FLAGS` | Specify compiler flags to use for fuzzer feedback coverage.
27
+ | `$BUILD_UID` | User id to use while building fuzzers.
28
+
29
+ ## Examples
30
+
31
+ - *building sqlite3 fuzzer with UBSan (`SANITIZER=undefined`):*
32
+
33
+
34
+ <pre>
35
+ docker run --rm -ti -e <i>SANITIZER</i>=<i>undefined</i> gcr.io/oss-fuzz/sqlite3
36
+ </pre>
37
+
38
+
39
+ # Image Files Layout
40
+
41
+ | Location|Env| Description |
42
+ |---------| -------- | ---------- |
43
+ | `/out/` | `$OUT` | Directory to store build artifacts (fuzz targets, dictionaries, options files, seed corpus archives). |
44
+ | `/src/` | `$SRC` | Directory to checkout source files |
45
+ | `/work/`| `$WORK` | Directory for storing intermediate files |
46
+ | `/usr/lib/libFuzzingEngine.a` | `$LIB_FUZZING_ENGINE` | Location of prebuilt fuzzing engine library (e.g. libFuzzer) that needs to be linked with all fuzz targets.
47
+
48
+ While files layout is fixed within a container, the environment variables are
49
+ provided to be able to write retargetable scripts.
50
+
51
+
52
+ ## Compiler Flags
53
+
54
+ You *must* use special compiler flags to build your project and fuzz targets.
55
+ These flags are provided in following environment variables:
56
+
57
+ | Env Variable | Description
58
+ | ------------- | --------
59
+ | `$CC` | The C compiler binary.
60
+ | `$CXX`, `$CCC` | The C++ compiler binary.
61
+ | `$CFLAGS` | C compiler flags.
62
+ | `$CXXFLAGS` | C++ compiler flags.
63
+
64
+ Most well-crafted build scripts will automatically use these variables. If not,
65
+ pass them manually to the build tool.
66
+
67
+
68
+ # Child Image Interface
69
+
70
+ ## Sources
71
+
72
+ Child image has to checkout all sources that it needs to compile fuzz targets into
73
+ `$SRC` directory. When the image is executed, a directory could be mounted on top
74
+ of these with local checkouts using
75
+ `docker run -v $HOME/my_project:/src/my_project ...`.
76
+
77
+ ## Other Required Files
78
+
79
+ Following files have to be added by child images:
80
+
81
+ | File Location | Description |
82
+ | ------------- | ----------- |
83
+ | `$SRC/build.sh` | build script to build the project and its fuzz targets |
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/bisect_clang_test.py ADDED
@@ -0,0 +1,294 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2019 Google Inc.
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+ """Tests for bisect_clang.py"""
17
+ import os
18
+ from unittest import mock
19
+ import unittest
20
+
21
+ import bisect_clang
22
+
23
+ FILE_DIRECTORY = os.path.dirname(__file__)
24
+ LLVM_REPO_PATH = '/llvm-project'
25
+
26
+
27
+ def get_git_command(*args):
28
+ """Returns a git command for the LLVM repo with |args| as arguments."""
29
+ return ['git', '-C', LLVM_REPO_PATH] + list(args)
30
+
31
+
32
+ def patch_environ(testcase_obj):
33
+ """Patch environment."""
34
+ env = {}
35
+ patcher = mock.patch.dict(os.environ, env)
36
+ testcase_obj.addCleanup(patcher.stop)
37
+ patcher.start()
38
+
39
+
40
+ class BisectClangTestMixin: # pylint: disable=too-few-public-methods
41
+ """Useful mixin for bisect_clang unittests."""
42
+
43
+ def setUp(self): # pylint: disable=invalid-name
44
+ """Initialization method for unittests."""
45
+ patch_environ(self)
46
+ os.environ['SRC'] = '/src'
47
+ os.environ['WORK'] = '/work'
48
+
49
+
50
+ class GetClangBuildEnvTest(BisectClangTestMixin, unittest.TestCase):
51
+ """Tests for get_clang_build_env."""
52
+
53
+ def test_cflags(self):
54
+ """Test that CFLAGS are not used compiling clang."""
55
+ os.environ['CFLAGS'] = 'blah'
56
+ self.assertNotIn('CFLAGS', bisect_clang.get_clang_build_env())
57
+
58
+ def test_cxxflags(self):
59
+ """Test that CXXFLAGS are not used compiling clang."""
60
+ os.environ['CXXFLAGS'] = 'blah'
61
+ self.assertNotIn('CXXFLAGS', bisect_clang.get_clang_build_env())
62
+
63
+ def test_other_variables(self):
64
+ """Test that other env vars are used when compiling clang."""
65
+ key = 'other'
66
+ value = 'blah'
67
+ os.environ[key] = value
68
+ self.assertEqual(value, bisect_clang.get_clang_build_env()[key])
69
+
70
+
71
+ def read_test_data(filename):
72
+ """Returns data from |filename| in the test_data directory."""
73
+ with open(os.path.join(FILE_DIRECTORY, 'test_data', filename)) as file_handle:
74
+ return file_handle.read()
75
+
76
+
77
+ class SearchBisectOutputTest(BisectClangTestMixin, unittest.TestCase):
78
+ """Tests for search_bisect_output."""
79
+
80
+ def test_search_bisect_output(self):
81
+ """Test that search_bisect_output finds the responsible commit when one
82
+ exists."""
83
+ test_data = read_test_data('culprit-commit.txt')
84
+ self.assertEqual('ac9ee01fcbfac745aaedca0393a8e1c8a33acd8d',
85
+ bisect_clang.search_bisect_output(test_data))
86
+
87
+ def test_search_bisect_output_none(self):
88
+ """Test that search_bisect_output doesnt find a non-existent culprit
89
+ commit."""
90
+ self.assertIsNone(bisect_clang.search_bisect_output('hello'))
91
+
92
+
93
+ def create_mock_popen(
94
+ output=bytes('', 'utf-8'), err=bytes('', 'utf-8'), returncode=0):
95
+ """Creates a mock subprocess.Popen."""
96
+
97
+ class MockPopen:
98
+ """Mock subprocess.Popen."""
99
+ commands = []
100
+ testcases_written = []
101
+
102
+ def __init__(self, command, *args, **kwargs): # pylint: disable=unused-argument
103
+ """Inits the MockPopen."""
104
+ stdout = kwargs.pop('stdout', None)
105
+ self.command = command
106
+ self.commands.append(command)
107
+ self.stdout = None
108
+ self.stderr = None
109
+ self.returncode = returncode
110
+ if hasattr(stdout, 'write'):
111
+ self.stdout = stdout
112
+
113
+ def communicate(self, input_data=None): # pylint: disable=unused-argument
114
+ """Mock subprocess.Popen.communicate."""
115
+ if self.stdout:
116
+ self.stdout.write(output)
117
+
118
+ if self.stderr:
119
+ self.stderr.write(err)
120
+
121
+ return output, err
122
+
123
+ def poll(self, input_data=None): # pylint: disable=unused-argument
124
+ """Mock subprocess.Popen.poll."""
125
+ return self.returncode
126
+
127
+ return MockPopen
128
+
129
+
130
+ def mock_prepare_build_impl(llvm_project_path): # pylint: disable=unused-argument
131
+ """Mocked prepare_build function."""
132
+ return '/work/llvm-build'
133
+
134
+
135
+ class BuildClangTest(BisectClangTestMixin, unittest.TestCase):
136
+ """Tests for build_clang."""
137
+
138
+ def test_build_clang_test(self):
139
+ """Tests that build_clang works as intended."""
140
+ with mock.patch('subprocess.Popen', create_mock_popen()) as mock_popen:
141
+ with mock.patch('bisect_clang.prepare_build', mock_prepare_build_impl):
142
+ llvm_src_dir = '/src/llvm-project'
143
+ bisect_clang.build_clang(llvm_src_dir)
144
+ self.assertEqual([['ninja', '-C', '/work/llvm-build', 'install']],
145
+ mock_popen.commands)
146
+
147
+
148
+ class GitRepoTest(BisectClangTestMixin, unittest.TestCase):
149
+ """Tests for GitRepo."""
150
+
151
+ # TODO(metzman): Mock filesystem. Until then, use a real directory.
152
+
153
+ def setUp(self):
154
+ super().setUp()
155
+ self.git = bisect_clang.GitRepo(LLVM_REPO_PATH)
156
+ self.good_commit = 'good_commit'
157
+ self.bad_commit = 'bad_commit'
158
+ self.test_command = 'testcommand'
159
+
160
+ def test_do_command(self):
161
+ """Test do_command creates a new process as intended."""
162
+ # TODO(metzman): Test directory changing behavior.
163
+ command = ['subcommand', '--option']
164
+ with mock.patch('subprocess.Popen', create_mock_popen()) as mock_popen:
165
+ self.git.do_command(command)
166
+ self.assertEqual([get_git_command('subcommand', '--option')],
167
+ mock_popen.commands)
168
+
169
+ def _test_test_start_commit_unexpected(self, label, commit, returncode):
170
+ """Tests test_start_commit works as intended when the test returns an
171
+ unexpected value."""
172
+
173
+ def mock_execute_impl(command, *args, **kwargs): # pylint: disable=unused-argument
174
+ if command == self.test_command:
175
+ return returncode, '', ''
176
+ return 0, '', ''
177
+
178
+ with mock.patch('bisect_clang.execute', mock_execute_impl):
179
+ with mock.patch('bisect_clang.prepare_build', mock_prepare_build_impl):
180
+ with self.assertRaises(bisect_clang.BisectError):
181
+ self.git.test_start_commit(commit, label, self.test_command)
182
+
183
+ def test_test_start_commit_bad_zero(self):
184
+ """Tests test_start_commit works as intended when the test on the first bad
185
+ commit returns 0."""
186
+ self._test_test_start_commit_unexpected('bad', self.bad_commit, 0)
187
+
188
+ def test_test_start_commit_good_nonzero(self):
189
+ """Tests test_start_commit works as intended when the test on the first good
190
+ commit returns nonzero."""
191
+ self._test_test_start_commit_unexpected('good', self.good_commit, 1)
192
+
193
+ def test_test_start_commit_good_zero(self):
194
+ """Tests test_start_commit works as intended when the test on the first good
195
+ commit returns 0."""
196
+ self._test_test_start_commit_expected('good', self.good_commit, 0) # pylint: disable=no-value-for-parameter
197
+
198
+ @mock.patch('bisect_clang.build_clang')
199
+ def _test_test_start_commit_expected(self, label, commit, returncode,
200
+ mock_build_clang):
201
+ """Tests test_start_commit works as intended when the test returns an
202
+ expected value."""
203
+ command_args = []
204
+
205
+ def mock_execute_impl(command, *args, **kwargs): # pylint: disable=unused-argument
206
+ command_args.append(command)
207
+ if command == self.test_command:
208
+ return returncode, '', ''
209
+ return 0, '', ''
210
+
211
+ with mock.patch('bisect_clang.execute', mock_execute_impl):
212
+ self.git.test_start_commit(commit, label, self.test_command)
213
+ self.assertEqual([
214
+ get_git_command('checkout', commit), self.test_command,
215
+ get_git_command('bisect', label)
216
+ ], command_args)
217
+ mock_build_clang.assert_called_once_with(LLVM_REPO_PATH)
218
+
219
+ def test_test_start_commit_bad_nonzero(self):
220
+ """Tests test_start_commit works as intended when the test on the first bad
221
+ commit returns nonzero."""
222
+ self._test_test_start_commit_expected('bad', self.bad_commit, 1) # pylint: disable=no-value-for-parameter
223
+
224
+ @mock.patch('bisect_clang.GitRepo.test_start_commit')
225
+ def test_bisect_start(self, mock_test_start_commit):
226
+ """Tests bisect_start works as intended."""
227
+ with mock.patch('subprocess.Popen', create_mock_popen()) as mock_popen:
228
+ self.git.bisect_start(self.good_commit, self.bad_commit,
229
+ self.test_command)
230
+ self.assertEqual(get_git_command('bisect', 'start'),
231
+ mock_popen.commands[0])
232
+ mock_test_start_commit.assert_has_calls([
233
+ mock.call('bad_commit', 'bad', 'testcommand'),
234
+ mock.call('good_commit', 'good', 'testcommand')
235
+ ])
236
+
237
+ def test_do_bisect_command(self):
238
+ """Test do_bisect_command executes a git bisect subcommand as intended."""
239
+ subcommand = 'subcommand'
240
+ with mock.patch('subprocess.Popen', create_mock_popen()) as mock_popen:
241
+ self.git.do_bisect_command(subcommand)
242
+ self.assertEqual([get_git_command('bisect', subcommand)],
243
+ mock_popen.commands)
244
+
245
+ @mock.patch('bisect_clang.build_clang')
246
+ def _test_test_commit(self, label, output, returncode, mock_build_clang):
247
+ """Test test_commit works as intended."""
248
+ command_args = []
249
+
250
+ def mock_execute_impl(command, *args, **kwargs): # pylint: disable=unused-argument
251
+ command_args.append(command)
252
+ if command == self.test_command:
253
+ return returncode, output, ''
254
+ return 0, output, ''
255
+
256
+ with mock.patch('bisect_clang.execute', mock_execute_impl):
257
+ result = self.git.test_commit(self.test_command)
258
+ self.assertEqual([self.test_command,
259
+ get_git_command('bisect', label)], command_args)
260
+ mock_build_clang.assert_called_once_with(LLVM_REPO_PATH)
261
+ return result
262
+
263
+ def test_test_commit_good(self):
264
+ """Test test_commit labels a good commit as good."""
265
+ self.assertIsNone(self._test_test_commit('good', '', 0)) # pylint: disable=no-value-for-parameter
266
+
267
+ def test_test_commit_bad(self):
268
+ """Test test_commit labels a bad commit as bad."""
269
+ self.assertIsNone(self._test_test_commit('bad', '', 1)) # pylint: disable=no-value-for-parameter
270
+
271
+ def test_test_commit_culprit(self):
272
+ """Test test_commit returns the culprit"""
273
+ test_data = read_test_data('culprit-commit.txt')
274
+ self.assertEqual('ac9ee01fcbfac745aaedca0393a8e1c8a33acd8d',
275
+ self._test_test_commit('good', test_data, 0)) # pylint: disable=no-value-for-parameter
276
+
277
+
278
+ class GetTargetArchToBuildTest(unittest.TestCase):
279
+ """Tests for get_target_arch_to_build."""
280
+
281
+ def test_unrecognized(self):
282
+ """Test that an unrecognized architecture raises an exception."""
283
+ with mock.patch('bisect_clang.execute') as mock_execute:
284
+ mock_execute.return_value = (None, 'mips', None)
285
+ with self.assertRaises(Exception):
286
+ bisect_clang.get_clang_target_arch()
287
+
288
+ def test_recognized(self):
289
+ """Test that a recognized architecture returns the expected value."""
290
+ arch_pairs = {'x86_64': 'X86', 'aarch64': 'AArch64'}
291
+ for uname_result, clang_target in arch_pairs.items():
292
+ with mock.patch('bisect_clang.execute') as mock_execute:
293
+ mock_execute.return_value = (None, uname_result, None)
294
+ self.assertEqual(clang_target, bisect_clang.get_clang_target_arch())
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/compile_fuzztests.sh ADDED
@@ -0,0 +1,126 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ set -x
19
+
20
+ # In order to identify fuzztest test case "bazel query" is used to search
21
+ # the project. A search of the entire project is done with a default "...",
22
+ # however, some projects may fail to, or have very long processing time, if
23
+ # searching the entire project. Additionally, it may include fuzzers in
24
+ # dependencies, which should not be build as part of a given project.
25
+ # Tensorflow is an example project that will fail when the entire project is
26
+ # queried. FUZZTEST_TARGET_FOLDER makes it posible to specify the folder
27
+ # where fuzztest fuzzers should be search for. FUZZTEST_TARGET_FOLDER is passed
28
+ # to "bazel query" below.
29
+ if [[ ${FUZZTEST_TARGET_FOLDER:-"unset"} == "unset" ]];
30
+ then
31
+ export TARGET_FOLDER="..."
32
+ else
33
+ TARGET_FOLDER=${FUZZTEST_TARGET_FOLDER}
34
+ fi
35
+
36
+ BUILD_ARGS="--config=oss-fuzz --subcommands"
37
+ if [[ ${FUZZTEST_EXTRA_ARGS:-"unset"} != "unset" ]];
38
+ then
39
+ BUILD_ARGS="$BUILD_ARGS ${FUZZTEST_EXTRA_ARGS}"
40
+ fi
41
+
42
+ # Trigger setup_configs rule of fuzztest as it generates the necessary
43
+ # configuration file based on OSS-Fuzz environment variables.
44
+ bazel run @com_google_fuzztest//bazel:setup_configs >> /etc/bazel.bazelrc
45
+
46
+ # Bazel target names of the fuzz binaries.
47
+ FUZZ_TEST_BINARIES=$(bazel query "kind(\"cc_test\", rdeps(${TARGET_FOLDER}, @com_google_fuzztest//fuzztest:fuzztest_gtest_main))")
48
+
49
+ # Bazel output paths of the fuzz binaries.
50
+ FUZZ_TEST_BINARIES_OUT_PATHS=$(bazel cquery "kind(\"cc_test\", rdeps(${TARGET_FOLDER}, @com_google_fuzztest//fuzztest:fuzztest_gtest_main))" --output=files)
51
+
52
+ # Build the project and fuzz binaries
53
+ # Expose `FUZZTEST_EXTRA_TARGETS` environment variable, in the event a project
54
+ # includes non-FuzzTest fuzzers then this can be used to compile these in the
55
+ # same `bazel build` command as when building the FuzzTest fuzzers.
56
+ # This is to avoid having to call `bazel build` twice.
57
+ bazel build $BUILD_ARGS -- ${FUZZ_TEST_BINARIES[*]} ${FUZZTEST_EXTRA_TARGETS:-}
58
+
59
+ # Iterate the fuzz binaries and list each fuzz entrypoint in the binary. For
60
+ # each entrypoint create a wrapper script that calls into the binaries the
61
+ # given entrypoint as argument.
62
+ # The scripts will be named:
63
+ # {binary_name}@{fuzztest_entrypoint}
64
+ for fuzz_main_file in $FUZZ_TEST_BINARIES_OUT_PATHS; do
65
+ FUZZ_TESTS=$($fuzz_main_file --list_fuzz_tests)
66
+ cp ${fuzz_main_file} $OUT/
67
+ fuzz_basename=$(basename $fuzz_main_file)
68
+ chmod -x $OUT/$fuzz_basename
69
+ for fuzz_entrypoint in $FUZZ_TESTS; do
70
+ TARGET_FUZZER="${fuzz_basename}@$fuzz_entrypoint"
71
+
72
+ # Write executer script
73
+ echo "#!/bin/sh
74
+ # LLVMFuzzerTestOneInput for fuzzer detection.
75
+ this_dir=\$(dirname \"\$0\")
76
+ chmod +x \$this_dir/$fuzz_basename
77
+ \$this_dir/$fuzz_basename --fuzz=$fuzz_entrypoint -- \$@" > $OUT/$TARGET_FUZZER
78
+ chmod +x $OUT/$TARGET_FUZZER
79
+ done
80
+ done
81
+
82
+ # Synchronise coverage directory to bazel output artifacts. This is a
83
+ # best-effort basis in that it will include source code in common
84
+ # bazel output folders.
85
+ # For projects that store results in non-standard folders or want to
86
+ # manage what code to include in the coverage report more specifically,
87
+ # the FUZZTEST_DO_SYNC environment variable is made available. Projects
88
+ # can then implement a custom way of synchronising source code with the
89
+ # coverage build. Set FUZZTEST_DO_SYNC to something other than "yes" and
90
+ # no effort will be made to automatically synchronise the source code with
91
+ # the code coverage visualisation utility.
92
+ if [[ "$SANITIZER" = "coverage" && ${FUZZTEST_DO_SYNC:-"yes"} == "yes" ]]
93
+ then
94
+ # Synchronize bazel source files to coverage collection.
95
+ declare -r REMAP_PATH="${OUT}/proc/self/cwd"
96
+ mkdir -p "${REMAP_PATH}"
97
+
98
+ # Synchronize the folder bazel-BAZEL_OUT_PROJECT.
99
+ declare -r RSYNC_FILTER_ARGS=("--include" "*.h" "--include" "*.cc" "--include" \
100
+ "*.hpp" "--include" "*.cpp" "--include" "*.c" "--include" "*/" "--include" "*.inc" \
101
+ "--exclude" "*")
102
+
103
+ project_folders="$(find . -name 'bazel-*' -type l -printf '%P\n' | \
104
+ grep -v -x -F \
105
+ -e 'bazel-bin' \
106
+ -e 'bazel-testlogs')"
107
+ for link in $project_folders; do
108
+ if [[ -d "${PWD}"/$link/external ]]
109
+ then
110
+ rsync -avLk "${RSYNC_FILTER_ARGS[@]}" "${PWD}"/$link/external "${REMAP_PATH}"
111
+ fi
112
+ # k8-opt is a common path for storing bazel output artifacts, e.g. bazel-out/k8-opt.
113
+ # It's the output folder for default amd-64 builds, but projects may specify custom
114
+ # platform output directories, see: https://github.com/bazelbuild/bazel/issues/13818
115
+ # We support the default at the moment, and if a project needs custom synchronizing of
116
+ # output artifacts and code coverage we currently recommend using FUZZTEST_DO_SYNC.
117
+ if [[ -d "${PWD}"/$link/k8-opt ]]
118
+ then
119
+ rsync -avLk "${RSYNC_FILTER_ARGS[@]}" "${PWD}"/$link/k8-opt "${REMAP_PATH}"/$link
120
+ fi
121
+ done
122
+
123
+ # Delete symlinks and sync the current folder.
124
+ find . -type l -ls -delete
125
+ rsync -av ${PWD}/ "${REMAP_PATH}"
126
+ fi
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/compile_go_fuzzer ADDED
@@ -0,0 +1,69 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2020 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ path=$1
19
+ function=$2
20
+ fuzzer=$3
21
+ tags="-tags gofuzz"
22
+ if [[ $# -eq 4 ]]; then
23
+ tags="-tags $4"
24
+ fi
25
+
26
+ # makes directory change temporary
27
+ (
28
+ cd $GOPATH/src/$path || true
29
+ # in the case we are in the right directory, with go.mod but no go.sum
30
+ go mod tidy || true
31
+ # project was downloaded with go get if go list fails
32
+ go list $tags $path || { cd $GOPATH/pkg/mod/ && cd `echo $path | cut -d/ -f1-3 | awk '{print $1"@*"}'`; } || cd -
33
+ # project does not have go.mod if go list fails again
34
+ go list $tags $path || { go mod init $path && go mod tidy ;}
35
+
36
+ if [[ $SANITIZER = *coverage* ]]; then
37
+ fuzzed_package=`go list $tags -f '{{.Name}}' $path`
38
+ abspath=`go list $tags -f {{.Dir}} $path`
39
+ cd $abspath
40
+ cp $GOPATH/ossfuzz_coverage_runner.go ./"${function,,}"_test.go
41
+ sed -i -e 's/FuzzFunction/'$function'/' ./"${function,,}"_test.go
42
+ sed -i -e 's/mypackagebeingfuzzed/'$fuzzed_package'/' ./"${function,,}"_test.go
43
+ sed -i -e 's/TestFuzzCorpus/Test'$function'Corpus/' ./"${function,,}"_test.go
44
+
45
+ # The repo is the module path/name, which is already created above in case it doesn't exist,
46
+ # but not always the same as the module path. This is necessary to handle SIV properly.
47
+ fuzzed_repo=$(go list $tags -f {{.Module}} "$path")
48
+ abspath_repo=`go list -m $tags -f {{.Dir}} $fuzzed_repo || go list $tags -f {{.Dir}} $fuzzed_repo`
49
+ # give equivalence to absolute paths in another file, as go test -cover uses golangish pkg.Dir
50
+ echo "s=$fuzzed_repo"="$abspath_repo"= > $OUT/$fuzzer.gocovpath
51
+ # Additional packages for which to get coverage.
52
+ pkgaddcov=""
53
+ # to prevent bash from failing about unbound variable
54
+ GO_COV_ADD_PKG_SET=${GO_COV_ADD_PKG:-}
55
+ if [[ -n "${GO_COV_ADD_PKG_SET}" ]]; then
56
+ pkgaddcov=","$GO_COV_ADD_PKG
57
+ abspath_repo=`go list -m $tags -f {{.Dir}} $GO_COV_ADD_PKG || go list $tags -f {{.Dir}} $GO_COV_ADD_PKG`
58
+ echo "s=^$GO_COV_ADD_PKG"="$abspath_repo"= >> $OUT/$fuzzer.gocovpath
59
+ fi
60
+ go test -run Test${function}Corpus -v $tags -coverpkg $fuzzed_repo/...$pkgaddcov -c -o $OUT/$fuzzer $path
61
+ else
62
+ # Compile and instrument all Go files relevant to this fuzz target.
63
+ echo "Running go-fuzz $tags -func $function -o $fuzzer.a $path"
64
+ go-fuzz $tags -func $function -o $fuzzer.a $path
65
+
66
+ # Link Go code ($fuzzer.a) with fuzzing engine to produce fuzz target binary.
67
+ $CXX $CXXFLAGS $LIB_FUZZING_ENGINE $fuzzer.a -o $OUT/$fuzzer
68
+ fi
69
+ )
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/debug_afl ADDED
@@ -0,0 +1,40 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ # Source this file for afl++ debug sessions.
19
+ apt-get update
20
+ apt-get install -y strace gdb vim joe psmisc
21
+
22
+ pushd $SRC/aflplusplus > /dev/null
23
+ git checkout dev
24
+ git pull
25
+ test -n "$1" && { git checkout "$1" ; git pull ; }
26
+ CFLAGS_SAVE="$CFLAGS"
27
+ CXXFLAGS_SAVE="$CXXFLAGS"
28
+ unset CFLAGS
29
+ unset CXXFLAGS
30
+ make
31
+ export CFLAGS="$CFLAGS_SAVE"
32
+ export CXXFLAGS="$CXXFLAGS_SAVE"
33
+ popd > /dev/null
34
+
35
+ export ASAN_OPTIONS="detect_leaks=0:symbolize=0:detect_odr_violation=0:abort_on_error=1"
36
+ export AFL_LLVM_LAF_ALL=1
37
+ export AFL_LLVM_CMPLOG=1
38
+ touch "$OUT/afl_cmplog.txt"
39
+ export AFL_LLVM_DICT2FILE=$OUT/afl++.dict
40
+ ulimit -c unlimited
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_go.sh ADDED
@@ -0,0 +1,43 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ cd /tmp
19
+
20
+ wget https://go.dev/dl/go1.23.4.linux-amd64.tar.gz
21
+ mkdir temp-go
22
+ tar -C temp-go/ -xzf go1.23.4.linux-amd64.tar.gz
23
+
24
+ mkdir /root/.go/
25
+ mv temp-go/go/* /root/.go/
26
+ rm -rf temp-go
27
+
28
+ echo 'Set "GOPATH=/root/go"'
29
+ echo 'Set "PATH=$PATH:/root/.go/bin:$GOPATH/bin"'
30
+
31
+ go install github.com/mdempsky/go114-fuzz-build@latest
32
+ ln -s $GOPATH/bin/go114-fuzz-build $GOPATH/bin/go-fuzz
33
+
34
+ # Build signal handler
35
+ if [ -f "$GOPATH/gosigfuzz/gosigfuzz.c" ]; then
36
+ clang -c $GOPATH/gosigfuzz/gosigfuzz.c -o $GOPATH/gosigfuzz/gosigfuzz.o
37
+ fi
38
+
39
+ cd /tmp
40
+ git clone https://github.com/AdamKorcz/go-118-fuzz-build
41
+ cd go-118-fuzz-build
42
+ go build
43
+ mv go-118-fuzz-build $GOPATH/bin/
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_java.sh ADDED
@@ -0,0 +1,31 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ # Install OpenJDK 17 and trim its size by removing unused components. This enables using Jazzer's mutation framework.
19
+ cd /tmp
20
+ curl --silent -L -O https://download.java.net/java/GA/jdk17.0.2/dfd4a8d0985749f896bed50d7138ee7f/8/GPL/openjdk-17.0.2_linux-x64_bin.tar.gz && \
21
+ mkdir -p $JAVA_HOME
22
+ tar -xz --strip-components=1 -f openjdk-17.0.2_linux-x64_bin.tar.gz --directory $JAVA_HOME && \
23
+ rm -f openjdk-17.0.2_linux-x64_bin.tar.gz
24
+ rm -rf $JAVA_HOME/jmods $JAVA_HOME/lib/src.zip
25
+
26
+ # Install OpenJDK 15 and trim its size by removing unused components. Some projects only run with Java 15.
27
+ curl --silent -L -O https://download.java.net/java/GA/jdk15.0.2/0d1cfde4252546c6931946de8db48ee2/7/GPL/openjdk-15.0.2_linux-x64_bin.tar.gz && \
28
+ mkdir -p $JAVA_15_HOME
29
+ tar -xz --strip-components=1 -f openjdk-15.0.2_linux-x64_bin.tar.gz --directory $JAVA_15_HOME && \
30
+ rm -f openjdk-15.0.2_linux-x64_bin.tar.gz
31
+ rm -rf $JAVA_15_HOME/jmods $JAVA_15_HOME/lib/src.zip
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_rust.sh ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ curl https://sh.rustup.rs | sh -s -- -y --default-toolchain=$RUSTUP_TOOLCHAIN --profile=minimal
19
+ cargo install cargo-fuzz --locked && rm -rf /rust/registry
20
+ # Needed to recompile rust std library for MSAN
21
+ rustup component add rust-src
22
+ cp -r /usr/local/lib/x86_64-unknown-linux-gnu/* /usr/local/lib/
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/install_swift.sh ADDED
@@ -0,0 +1,67 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+
19
+ SWIFT_PACKAGES="wget \
20
+ binutils \
21
+ git \
22
+ gnupg2 \
23
+ libc6-dev \
24
+ libcurl4 \
25
+ libedit2 \
26
+ libgcc-9-dev \
27
+ libpython2.7 \
28
+ libsqlite3-0 \
29
+ libstdc++-9-dev \
30
+ libxml2 \
31
+ libz3-dev \
32
+ pkg-config \
33
+ tzdata \
34
+ zlib1g-dev"
35
+ SWIFT_SYMBOLIZER_PACKAGES="build-essential make cmake ninja-build git python3 g++-multilib binutils-dev zlib1g-dev"
36
+ apt-get update && apt install -y $SWIFT_PACKAGES && \
37
+ apt install -y $SWIFT_SYMBOLIZER_PACKAGES --no-install-recommends
38
+
39
+
40
+ wget -q https://download.swift.org/swift-5.10.1-release/ubuntu2004/swift-5.10.1-RELEASE/swift-5.10.1-RELEASE-ubuntu20.04.tar.gz
41
+ tar xzf swift-5.10.1-RELEASE-ubuntu20.04.tar.gz
42
+ cp -r swift-5.10.1-RELEASE-ubuntu20.04/usr/* /usr/
43
+ rm -rf swift-5.10.1-RELEASE-ubuntu20.04.tar.gz swift-5.10.1-RELEASE-ubuntu20.04/
44
+ # TODO: Move to a seperate work dir
45
+ git clone https://github.com/llvm/llvm-project.git
46
+ cd llvm-project
47
+ git checkout 63bf228450b8403e0c5e828d276be47ffbcd00d0 # TODO: Keep in sync with base-clang.
48
+ git apply ../llvmsymbol.diff --verbose
49
+ cmake -G "Ninja" \
50
+ -DLIBCXX_ENABLE_SHARED=OFF \
51
+ -DLIBCXX_ENABLE_STATIC_ABI_LIBRARY=ON \
52
+ -DLIBCXXABI_ENABLE_SHARED=OFF \
53
+ -DCMAKE_BUILD_TYPE=Release \
54
+ -DLLVM_TARGETS_TO_BUILD=X86 \
55
+ -DCMAKE_C_COMPILER=clang \
56
+ -DCMAKE_CXX_COMPILER=clang++ \
57
+ -DLLVM_BUILD_TESTS=OFF \
58
+ -DLLVM_INCLUDE_TESTS=OFF llvm
59
+ ninja -j$(nproc) llvm-symbolizer
60
+ cp bin/llvm-symbolizer /usr/local/bin/llvm-symbolizer-swift
61
+
62
+ cd $SRC
63
+ rm -rf llvm-project llvmsymbol.diff
64
+
65
+ # TODO: Cleanup packages
66
+ apt-get remove --purge -y wget zlib1g-dev
67
+ apt-get autoremove -y
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/precompile_afl ADDED
@@ -0,0 +1,35 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ echo "Precompiling AFLplusplus"
19
+
20
+ pushd $SRC/aflplusplus > /dev/null
21
+ make clean
22
+ # Unset CFLAGS and CXXFLAGS while building AFL since we don't want to slow it
23
+ # down with sanitizers.
24
+ SAVE_CXXFLAGS=$CXXFLAGS
25
+ SAVE_CFLAGS=$CFLAGS
26
+ unset CXXFLAGS
27
+ unset CFLAGS
28
+ export AFL_IGNORE_UNKNOWN_ENVS=1
29
+ make clean
30
+ AFL_NO_X86=1 PYTHON_INCLUDE=/ make
31
+ make -C utils/aflpp_driver
32
+
33
+ popd > /dev/null
34
+
35
+ echo "Done."
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder/precompile_centipede ADDED
@@ -0,0 +1,49 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ echo -n "Precompiling centipede"
19
+
20
+ # Build Centipede with bazel.
21
+ cd "$SRC/fuzztest/centipede/"
22
+ apt-get update && apt-get install libssl-dev -y
23
+ unset CXXFLAGS CFLAGS
24
+ # We need to use an older version of BAZEL because fuzztest relies on WORKSPACE
25
+ # Ref: https://github.com/google/oss-fuzz/pull/12838#issue-2733821058
26
+ export USE_BAZEL_VERSION=7.4.0
27
+ echo 'build --cxxopt=-stdlib=libc++ --linkopt=-lc++' >> /tmp/centipede.bazelrc
28
+ bazel --bazelrc=/tmp/centipede.bazelrc build -c opt :all
29
+ unset USE_BAZEL_VERSION
30
+
31
+ # Prepare the weak symbols:
32
+ # This is necessary because we compile the target binary and the intermediate
33
+ # auxiliary binaries with the same cflags. The auxiliary binaries do not need
34
+ # data-flow tracing flags, but will still throw errors when they cannot find
35
+ # the corresponding functions.
36
+ # The weak symbols provides fake implementations for intermediate binaries.
37
+ $CXX "$SRC/fuzztest/centipede/weak_sancov_stubs.cc" -c -o "$SRC/fuzztest/centipede/weak.o"
38
+
39
+ echo 'Removing extra stuff leftover to avoid bloating image.'
40
+
41
+ rm -rf /clang-*.tgz /clang
42
+
43
+ BAZEL_BIN_REAL_DIR=$(readlink -f $CENTIPEDE_BIN_DIR)
44
+ rm -rf $CENTIPEDE_BIN_DIR
45
+ mkdir -p $CENTIPEDE_BIN_DIR
46
+ mv $BAZEL_BIN_REAL_DIR/centipede/{centipede,libcentipede_runner.pic.a} $CENTIPEDE_BIN_DIR
47
+ rm -rf /root/.cache
48
+
49
+ echo 'Done.'
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/Dockerfile ADDED
@@ -0,0 +1,139 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2016 Google Inc.
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ # Build rust stuff in its own image. We only need the resulting binaries.
18
+ # Keeping the rust toolchain in the image wastes 1 GB.
19
+ ARG IMG_TAG=latest
20
+ FROM ghcr.io/aixcc-finals/base-image:${IMG_TAG} as temp-runner-binary-builder
21
+
22
+ RUN apt-get update && apt-get install -y cargo libyaml-dev
23
+ RUN cargo install rustfilt
24
+
25
+ # Using multi-stage build to copy some LLVM binaries needed in the runner image.
26
+ FROM ghcr.io/aixcc-finals/base-clang:${IMG_TAG} AS base-clang
27
+ FROM ghcr.io/aixcc-finals/base-builder-ruby:${IMG_TAG} AS base-ruby
28
+
29
+ # The base builder image compiles a specific Python version. Using a multi-stage build
30
+ # to copy that same Python interpreter into the runner image saves build time and keeps
31
+ # the Python versions in sync.
32
+ FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG} AS base-builder
33
+
34
+ # Real image that will be used later.
35
+ FROM ghcr.io/aixcc-finals/base-image:${IMG_TAG}
36
+
37
+ COPY --from=temp-runner-binary-builder /root/.cargo/bin/rustfilt /usr/local/bin
38
+
39
+ # Copy the binaries needed for code coverage and crash symbolization.
40
+ COPY --from=base-clang /usr/local/bin/llvm-cov \
41
+ /usr/local/bin/llvm-profdata \
42
+ /usr/local/bin/llvm-symbolizer \
43
+ /usr/local/bin/
44
+
45
+ # Copy the pre-compiled Python binaries and libraries
46
+ COPY --from=base-builder /usr/local/bin/python3.10 /usr/local/bin/python3.10
47
+ COPY --from=base-builder /usr/local/lib/libpython3.10.so.1.0 /usr/local/lib/libpython3.10.so.1.0
48
+ COPY --from=base-builder /usr/local/include/python3.10 /usr/local/include/python3.10
49
+ COPY --from=base-builder /usr/local/lib/python3.10 /usr/local/lib/python3.10
50
+ COPY --from=base-builder /usr/local/bin/pip3 /usr/local/bin/pip3
51
+
52
+ # Create symbolic links to ensure compatibility
53
+ RUN ldconfig && \
54
+ ln -s /usr/local/bin/python3.10 /usr/local/bin/python3 && \
55
+ ln -s /usr/local/bin/python3.10 /usr/local/bin/python
56
+
57
+ COPY install_deps.sh /
58
+ RUN /install_deps.sh && rm /install_deps.sh
59
+
60
+ ENV CODE_COVERAGE_SRC=/opt/code_coverage
61
+ # Pin coverage to the same as in the base builder:
62
+ # https://github.com/google/oss-fuzz/blob/master/infra/base-images/base-builder/install_python.sh#L22
63
+ RUN git clone https://chromium.googlesource.com/chromium/src/tools/code_coverage $CODE_COVERAGE_SRC && \
64
+ cd /opt/code_coverage && \
65
+ git checkout edba4873b5e8a390e977a64c522db2df18a8b27d && \
66
+ pip3 install wheel && \
67
+ # If version "Jinja2==2.10" is in requirements.txt, bump it to a patch version that
68
+ # supports upgrading its MarkupSafe dependency to a Python 3.10 compatible release:
69
+ sed -i 's/Jinja2==2.10/Jinja2==2.10.3/' requirements.txt && \
70
+ pip3 install -r requirements.txt && \
71
+ pip3 install MarkupSafe==2.0.1 && \
72
+ pip3 install coverage==6.3.2
73
+
74
+ # Default environment options for various sanitizers.
75
+ # Note that these match the settings used in ClusterFuzz and
76
+ # shouldn't be changed unless a corresponding change is made on
77
+ # ClusterFuzz side as well.
78
+ ENV ASAN_OPTIONS="alloc_dealloc_mismatch=0:allocator_may_return_null=1:allocator_release_to_os_interval_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_leaks=1:detect_stack_use_after_return=1:fast_unwind_on_fatal=0:handle_abort=1:handle_segv=1:handle_sigill=1:max_uar_stack_size_log=16:print_scariness=1:quarantine_size_mb=10:strict_memcmp=1:strip_path_prefix=/workspace/:symbolize=1:use_sigaltstack=1:dedup_token_length=3"
79
+ ENV MSAN_OPTIONS="print_stats=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3"
80
+ ENV UBSAN_OPTIONS="print_stacktrace=1:print_summary=1:silence_unsigned_overflow=1:strip_path_prefix=/workspace/:symbolize=1:dedup_token_length=3"
81
+ ENV FUZZER_ARGS="-rss_limit_mb=2560 -timeout=25"
82
+ ENV AFL_FUZZER_ARGS="-m none"
83
+
84
+ # Set up Golang environment variables (copied from /root/.bash_profile).
85
+ ENV GOPATH /root/go
86
+
87
+ # /root/.go/bin is for the standard Go binaries (i.e. go, gofmt, etc).
88
+ # $GOPATH/bin is for the binaries from the dependencies installed via "go get".
89
+ ENV PATH $PATH:$GOPATH/bin
90
+ COPY gocoverage $GOPATH/gocoverage
91
+
92
+ COPY install_go.sh /
93
+ RUN /install_go.sh && rm -rf /install_go.sh /root/.go
94
+
95
+ # Install OpenJDK 15 and trim its size by removing unused components.
96
+ ENV JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64
97
+ ENV JAVA_15_HOME=/usr/lib/jvm/java-15-openjdk-amd64
98
+ ENV JVM_LD_LIBRARY_PATH=$JAVA_HOME/lib/server
99
+ ENV PATH=$PATH:$JAVA_HOME/bin
100
+
101
+ COPY install_java.sh /
102
+ RUN /install_java.sh && rm /install_java.sh
103
+
104
+ # Install JaCoCo for JVM coverage.
105
+ RUN wget https://repo1.maven.org/maven2/org/jacoco/org.jacoco.cli/0.8.7/org.jacoco.cli-0.8.7-nodeps.jar -O /opt/jacoco-cli.jar && \
106
+ wget https://repo1.maven.org/maven2/org/jacoco/org.jacoco.agent/0.8.7/org.jacoco.agent-0.8.7-runtime.jar -O /opt/jacoco-agent.jar && \
107
+ echo "37df187b76888101ecd745282e9cd1ad4ea508d6 /opt/jacoco-agent.jar" | shasum --check && \
108
+ echo "c1814e7bba5fd8786224b09b43c84fd6156db690 /opt/jacoco-cli.jar" | shasum --check
109
+
110
+ COPY install_javascript.sh /
111
+ RUN /install_javascript.sh && rm /install_javascript.sh
112
+
113
+ # Copy built ruby and ruzzy from builder
114
+ COPY --from=base-ruby /usr/local/rvm /usr/local/rvm
115
+ COPY --from=base-ruby /install/ruzzy /install/ruzzy
116
+ COPY ruzzy /usr/bin/ruzzy
117
+ ENV PATH="$PATH:/usr/local/rvm/rubies/ruby-3.3.1/bin"
118
+ # RubyGems installation directory
119
+ ENV GEM_HOME="$OUT/fuzz-gem"
120
+ ENV GEM_PATH="/install/ruzzy"
121
+
122
+ # Do this last to make developing these files easier/faster due to caching.
123
+ COPY bad_build_check \
124
+ coverage \
125
+ coverage_helper \
126
+ download_corpus \
127
+ jacoco_report_converter.py \
128
+ nyc_report_converter.py \
129
+ rcfilt \
130
+ reproduce \
131
+ run_fuzzer \
132
+ parse_options.py \
133
+ generate_differential_cov_report.py \
134
+ profraw_update.py \
135
+ targets_list \
136
+ test_all.py \
137
+ test_one.py \
138
+ python_coverage_runner_help.py \
139
+ /usr/local/bin/
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/coverage ADDED
@@ -0,0 +1,549 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -u
2
+ # Copyright 2018 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ cd $OUT
18
+
19
+ if (( $# > 0 )); then
20
+ FUZZ_TARGETS="$@"
21
+ else
22
+ FUZZ_TARGETS="$(find . -maxdepth 1 -type f -executable -printf '%P\n' | \
23
+ grep -v -x -F \
24
+ -e 'llvm-symbolizer' \
25
+ -e 'jazzer_agent_deploy.jar' \
26
+ -e 'jazzer_driver' \
27
+ -e 'jazzer_driver_with_sanitizer' \
28
+ -e 'sanitizer_with_fuzzer.so')"
29
+ fi
30
+
31
+ COVERAGE_OUTPUT_DIR=${COVERAGE_OUTPUT_DIR:-$OUT}
32
+
33
+ DUMPS_DIR="$COVERAGE_OUTPUT_DIR/dumps"
34
+ FUZZERS_COVERAGE_DUMPS_DIR="$DUMPS_DIR/fuzzers_coverage"
35
+ MERGED_COVERAGE_DIR="$COVERAGE_OUTPUT_DIR/merged_coverage"
36
+ FUZZER_STATS_DIR="$COVERAGE_OUTPUT_DIR/fuzzer_stats"
37
+ TEXTCOV_REPORT_DIR="$COVERAGE_OUTPUT_DIR/textcov_reports"
38
+ LOGS_DIR="$COVERAGE_OUTPUT_DIR/logs"
39
+ REPORT_ROOT_DIR="$COVERAGE_OUTPUT_DIR/report"
40
+ REPORT_BY_TARGET_ROOT_DIR="$COVERAGE_OUTPUT_DIR/report_target"
41
+ PLATFORM=linux
42
+ REPORT_PLATFORM_DIR="$COVERAGE_OUTPUT_DIR/report/$PLATFORM"
43
+
44
+ for directory in $DUMPS_DIR $FUZZER_STATS_DIR $LOGS_DIR $REPORT_ROOT_DIR $TEXTCOV_REPORT_DIR\
45
+ $REPORT_PLATFORM_DIR $REPORT_BY_TARGET_ROOT_DIR $FUZZERS_COVERAGE_DUMPS_DIR $MERGED_COVERAGE_DIR; do
46
+ rm -rf $directory
47
+ mkdir -p $directory
48
+ done
49
+
50
+ PROFILE_FILE="$DUMPS_DIR/merged.profdata"
51
+ SUMMARY_FILE="$REPORT_PLATFORM_DIR/summary.json"
52
+ COVERAGE_TARGET_FILE="$FUZZER_STATS_DIR/coverage_targets.txt"
53
+
54
+ # Use path mapping, as $SRC directory from the builder is copied into $OUT/$SRC.
55
+ PATH_EQUIVALENCE_ARGS="-path-equivalence=/,$OUT"
56
+
57
+ # It's important to use $COVERAGE_EXTRA_ARGS as the last argument, because it
58
+ # can contain paths to source files / directories which are positional args.
59
+ LLVM_COV_COMMON_ARGS="$PATH_EQUIVALENCE_ARGS \
60
+ -ignore-filename-regex=.*src/libfuzzer/.* $COVERAGE_EXTRA_ARGS"
61
+
62
+ # Options to extract branch coverage.
63
+ BRANCH_COV_ARGS="--show-branches=count --show-expansions"
64
+
65
+ # Timeout for running a single fuzz target.
66
+ TIMEOUT=1h
67
+
68
+ # This will be used by llvm-cov command to generate the actual report.
69
+ objects=""
70
+
71
+ # Number of CPUs available, this is needed for running tests in parallel.
72
+ # Set the max number of parallel jobs to be the CPU count and a max of 10.
73
+ NPROC=$(nproc)
74
+ MAX_PARALLEL_COUNT=10
75
+
76
+ CORPUS_DIR=${CORPUS_DIR:-"/corpus"}
77
+
78
+ function run_fuzz_target {
79
+ local target=$1
80
+
81
+ # '%1m' will produce separate dump files for every object. For example, if a
82
+ # fuzz target loads a shared library, we will have dumps for both of them.
83
+ local profraw_file="$DUMPS_DIR/$target.%1m.profraw"
84
+ local profraw_file_mask="$DUMPS_DIR/$target.*.profraw"
85
+ local profdata_file="$DUMPS_DIR/$target.profdata"
86
+ local corpus_real="$CORPUS_DIR/${target}"
87
+
88
+ # -merge=1 requires an output directory, create a new, empty dir for that.
89
+ local corpus_dummy="$OUT/dummy_corpus_dir_for_${target}"
90
+ rm -rf $corpus_dummy && mkdir -p $corpus_dummy
91
+
92
+ # Use -merge=1 instead of -runs=0 because merge is crash resistant and would
93
+ # let to get coverage using all corpus files even if there are crash inputs.
94
+ # Merge should not introduce any significant overhead compared to -runs=0,
95
+ # because (A) corpuses are already minimized; (B) we do not use sancov, and so
96
+ # libFuzzer always finishes merge with an empty output dir.
97
+ # Use 100s timeout instead of 25s as code coverage builds can be very slow.
98
+ local args="-merge=1 -timeout=100 $corpus_dummy $corpus_real"
99
+
100
+ export LLVM_PROFILE_FILE=$profraw_file
101
+ timeout $TIMEOUT $OUT/$target $args &> $LOGS_DIR/$target.log
102
+ if (( $? != 0 )); then
103
+ echo "Error occured while running $target:"
104
+ cat $LOGS_DIR/$target.log
105
+ fi
106
+
107
+ rm -rf $corpus_dummy
108
+ if (( $(du -c $profraw_file_mask | tail -n 1 | cut -f 1) == 0 )); then
109
+ # Skip fuzz targets that failed to produce profile dumps.
110
+ return 0
111
+ fi
112
+
113
+ # If necessary translate to latest profraw version.
114
+ if [[ $target == *"@"* ]]; then
115
+ # Extract fuzztest binary name from fuzztest wrapper script.
116
+ target=(${target//@/ }[0])
117
+ fi
118
+ profraw_update.py $OUT/$target -i $profraw_file_mask
119
+ llvm-profdata merge -j=1 -sparse $profraw_file_mask -o $profdata_file
120
+
121
+ # Delete unnecessary and (potentially) large .profraw files.
122
+ rm $profraw_file_mask
123
+
124
+ shared_libraries=$(coverage_helper shared_libs -build-dir=$OUT -object=$target)
125
+
126
+ llvm-cov export -summary-only -instr-profile=$profdata_file -object=$target \
127
+ $shared_libraries $LLVM_COV_COMMON_ARGS > $FUZZER_STATS_DIR/$target.json
128
+
129
+ # For introspector.
130
+ llvm-cov show -instr-profile=$profdata_file -object=$target -line-coverage-gt=0 $shared_libraries $BRANCH_COV_ARGS $LLVM_COV_COMMON_ARGS > ${TEXTCOV_REPORT_DIR}/$target.covreport
131
+ }
132
+
133
+ function run_go_fuzz_target {
134
+ local target=$1
135
+
136
+ echo "Running go target $target"
137
+ export FUZZ_CORPUS_DIR="$CORPUS_DIR/${target}/"
138
+ export FUZZ_PROFILE_NAME="$DUMPS_DIR/$target.perf"
139
+
140
+ # setup for native go fuzzers
141
+ cd $OUT
142
+ mkdir -p "testdata/fuzz/${target}"
143
+ cp -r "${FUZZ_CORPUS_DIR}" "testdata/fuzz/"
144
+
145
+ # rewrite libFuzzer corpus to Std Go corpus if native fuzzing
146
+ grep "TestFuzzCorpus" $target > /dev/null 2>&1 && $SYSGOPATH/bin/convertcorpus $target "testdata/fuzz/${target}"
147
+ cd -
148
+
149
+ timeout $TIMEOUT $OUT/$target -test.coverprofile $DUMPS_DIR/$target.profdata &> $LOGS_DIR/$target.log
150
+ if (( $? != 0 )); then
151
+ echo "Error occured while running $target:"
152
+ cat $LOGS_DIR/$target.log
153
+ fi
154
+
155
+ # cleanup after native go fuzzers
156
+ rm -r "${OUT}/testdata/fuzz/${target}"
157
+
158
+ # The Go 1.18 fuzzers are renamed to "*_fuzz_.go" during "infra/helper.py build_fuzzers".
159
+ # They are are therefore refered to as "*_fuzz_.go" in the profdata files.
160
+ # Since the copies named "*_fuzz_.go" do not exist in the file tree during
161
+ # the coverage build, we change the references in the .profdata files
162
+ # to the original file names.
163
+ #sed -i "s/_test.go_fuzz_.go/_test.go/g" $DUMPS_DIR/$target.profdata
164
+ # translate from golangish paths to current absolute paths
165
+ cat $OUT/$target.gocovpath | while read i; do sed -i $i $DUMPS_DIR/$target.profdata; done
166
+ # cf PATH_EQUIVALENCE_ARGS
167
+ sed -i 's=/='$OUT'/=' $DUMPS_DIR/$target.profdata
168
+ $SYSGOPATH/bin/gocovsum $DUMPS_DIR/$target.profdata > $FUZZER_STATS_DIR/$target.json
169
+ }
170
+
171
+ function run_python_fuzz_target {
172
+ local target=$1
173
+ local zipped_sources="$DUMPS_DIR/$target.deps.zip"
174
+ local corpus_real="$CORPUS_DIR/${target}"
175
+ # Write dummy stats file
176
+ echo "{}" > "$FUZZER_STATS_DIR/$target.json"
177
+
178
+ # Run fuzzer
179
+ $OUT/$target $corpus_real -atheris_runs=$(ls -la $corpus_real | wc -l) > $LOGS_DIR/$target.log 2>&1
180
+ if (( $? != 0 )); then
181
+ echo "Error happened getting coverage of $target"
182
+ echo "This is likely because Atheris did not exit gracefully"
183
+ cat $LOGS_DIR/$target.log
184
+ return 0
185
+ fi
186
+ mv .coverage $OUT/.coverage_$target
187
+ }
188
+
189
+ function run_java_fuzz_target {
190
+ local target=$1
191
+
192
+ local exec_file="$DUMPS_DIR/$target.exec"
193
+ local class_dump_dir="$DUMPS_DIR/${target}_classes/"
194
+ mkdir "$class_dump_dir"
195
+ local corpus_real="$CORPUS_DIR/${target}"
196
+
197
+ # -merge=1 requires an output directory, create a new, empty dir for that.
198
+ local corpus_dummy="$OUT/dummy_corpus_dir_for_${target}"
199
+ rm -rf $corpus_dummy && mkdir -p $corpus_dummy
200
+
201
+ # Use 100s timeout instead of 25s as code coverage builds can be very slow.
202
+ local jacoco_args="destfile=$exec_file,classdumpdir=$class_dump_dir,excludes=com.code_intelligence.jazzer.*\\:com.sun.tools.attach.VirtualMachine"
203
+ local args="-merge=1 -timeout=100 --nohooks \
204
+ --additional_jvm_args=-javaagent\\:/opt/jacoco-agent.jar=$jacoco_args \
205
+ $corpus_dummy $corpus_real"
206
+
207
+ timeout $TIMEOUT $OUT/$target $args &> $LOGS_DIR/$target.log
208
+ if (( $? != 0 )); then
209
+ echo "Error occured while running $target:"
210
+ cat $LOGS_DIR/$target.log
211
+ fi
212
+
213
+ if (( $(du -c $exec_file | tail -n 1 | cut -f 1) == 0 )); then
214
+ # Skip fuzz targets that failed to produce .exec files.
215
+ echo "$target failed to produce .exec file."
216
+ return 0
217
+ fi
218
+
219
+ # Generate XML report only as input to jacoco_report_converter.
220
+ # Source files are not needed for the summary.
221
+ local xml_report="$DUMPS_DIR/${target}.xml"
222
+ local summary_file="$FUZZER_STATS_DIR/$target.json"
223
+ java -jar /opt/jacoco-cli.jar report $exec_file \
224
+ --xml $xml_report \
225
+ --classfiles $class_dump_dir
226
+
227
+ # Write llvm-cov summary file.
228
+ jacoco_report_converter.py $xml_report $summary_file
229
+ }
230
+
231
+ function run_javascript_fuzz_target {
232
+ local target=$1
233
+ local corpus_real="$CORPUS_DIR/${target}"
234
+
235
+ # -merge=1 requires an output directory, create a new, empty dir for that.
236
+ local corpus_dummy="$OUT/dummy_corpus_dir_for_${target}"
237
+ rm -rf $corpus_dummy && mkdir -p $corpus_dummy
238
+
239
+ # IstanbulJS currently does not work when the tested program creates
240
+ # subprocesses. For this reason, we first minimize the corpus removing
241
+ # any crashing inputs so that we can report source-based code coverage
242
+ # with a single sweep over the minimized corpus
243
+ local merge_args="-merge=1 -timeout=100 $corpus_dummy $corpus_real"
244
+ timeout $TIMEOUT $OUT/$target $merge_args &> $LOGS_DIR/$target.log
245
+
246
+ # nyc saves the coverage reports in a directory with the default name "coverage"
247
+ local coverage_dir="$DUMPS_DIR/coverage_dir_for_${target}"
248
+ rm -rf $coverage_dir && mkdir -p $coverage_dir
249
+
250
+ local nyc_json_coverage_file="$coverage_dir/coverage-final.json"
251
+ local nyc_json_summary_file="$coverage_dir/coverage-summary.json"
252
+
253
+ local args="-runs=0 $corpus_dummy"
254
+ local jazzerjs_args="--coverage --coverageDirectory $coverage_dir --coverageReporters json --coverageReporters json-summary"
255
+
256
+ JAZZERJS_EXTRA_ARGS=$jazzerjs_args $OUT/$target $args &> $LOGS_DIR/$target.log
257
+
258
+ if (( $? != 0 )); then
259
+ echo "Error occured while running $target:"
260
+ cat $LOGS_DIR/$target.log
261
+ fi
262
+
263
+ if [ ! -s $nyc_json_coverage_file ]; then
264
+ # Skip fuzz targets that failed to produce coverage-final.json file.
265
+ echo "$target failed to produce coverage-final.json file."
266
+ return 0
267
+ fi
268
+
269
+ cp $nyc_json_coverage_file $FUZZERS_COVERAGE_DUMPS_DIR/$target.json
270
+
271
+ local summary_file="$FUZZER_STATS_DIR/$target.json"
272
+
273
+ nyc_report_converter.py $nyc_json_summary_file $summary_file
274
+ }
275
+
276
+ function generate_html {
277
+ local profdata=$1
278
+ local shared_libraries=$2
279
+ local objects=$3
280
+ local output_dir=$4
281
+
282
+ rm -rf "$output_dir"
283
+ mkdir -p "$output_dir/$PLATFORM"
284
+
285
+ local llvm_cov_args="-instr-profile=$profdata $objects $LLVM_COV_COMMON_ARGS"
286
+ llvm-cov show -format=html -output-dir=$output_dir -Xdemangler rcfilt $llvm_cov_args
287
+
288
+ # Export coverage summary in JSON format.
289
+ local summary_file=$output_dir/$PLATFORM/summary.json
290
+
291
+ llvm-cov export -summary-only $llvm_cov_args > $summary_file
292
+
293
+ coverage_helper -v post_process -src-root-dir=/ -summary-file=$summary_file \
294
+ -output-dir=$output_dir $PATH_EQUIVALENCE_ARGS
295
+ }
296
+
297
+ export SYSGOPATH=$GOPATH
298
+ export GOPATH=$OUT/$GOPATH
299
+ # Run each fuzz target, generate raw coverage dumps.
300
+ for fuzz_target in $FUZZ_TARGETS; do
301
+ # Test if fuzz target is a golang one.
302
+ if [[ $FUZZING_LANGUAGE == "go" ]]; then
303
+ # Continue if not a fuzz target.
304
+ if [[ $FUZZING_ENGINE != "none" ]]; then
305
+ grep "FUZZ_CORPUS_DIR" $fuzz_target > /dev/null 2>&1 || grep "testing\.T" $fuzz_target > /dev/null 2>&1 || continue
306
+ fi
307
+ # Log the target in the targets file.
308
+ echo ${fuzz_target} >> $COVERAGE_TARGET_FILE
309
+
310
+ # Run the coverage collection.
311
+ run_go_fuzz_target $fuzz_target &
312
+ elif [[ $FUZZING_LANGUAGE == "python" ]]; then
313
+ echo "Entering python fuzzing"
314
+ # Log the target in the targets file.
315
+ echo ${fuzz_target} >> $COVERAGE_TARGET_FILE
316
+
317
+ # Run the coverage collection.
318
+ run_python_fuzz_target $fuzz_target
319
+ elif [[ $FUZZING_LANGUAGE == "jvm" ]]; then
320
+ # Continue if not a fuzz target.
321
+ if [[ $FUZZING_ENGINE != "none" ]]; then
322
+ grep "LLVMFuzzerTestOneInput" $fuzz_target > /dev/null 2>&1 || continue
323
+ fi
324
+
325
+ echo "Running $fuzz_target"
326
+ # Log the target in the targets file.
327
+ echo ${fuzz_target} >> $COVERAGE_TARGET_FILE
328
+
329
+ # Run the coverage collection.
330
+ run_java_fuzz_target $fuzz_target &
331
+ elif [[ $FUZZING_LANGUAGE == "javascript" ]]; then
332
+ # Continue if not a fuzz target.
333
+ if [[ $FUZZING_ENGINE != "none" ]]; then
334
+ grep "LLVMFuzzerTestOneInput" $fuzz_target > /dev/null 2>&1 || continue
335
+ fi
336
+
337
+ echo "Running $fuzz_target"
338
+ # Log the target in the targets file.
339
+ echo ${fuzz_target} >> $COVERAGE_TARGET_FILE
340
+
341
+ # Run the coverage collection.
342
+ run_javascript_fuzz_target $fuzz_target &
343
+ else
344
+ # Continue if not a fuzz target.
345
+ if [[ $FUZZING_ENGINE != "none" ]]; then
346
+ grep "LLVMFuzzerTestOneInput" $fuzz_target > /dev/null 2>&1 || continue
347
+ fi
348
+
349
+ echo "Running $fuzz_target"
350
+ # Log the target in the targets file.
351
+ echo ${fuzz_target} >> $COVERAGE_TARGET_FILE
352
+
353
+ # Run the coverage collection.
354
+ run_fuzz_target $fuzz_target &
355
+
356
+ # Rewrite object if its a FUZZTEST target
357
+ if [[ $fuzz_target == *"@"* ]]; then
358
+ # Extract fuzztest binary name from fuzztest wrapper script.
359
+ fuzz_target=(${fuzz_target//@/ }[0])
360
+ fi
361
+ if [[ -z $objects ]]; then
362
+ # The first object needs to be passed without -object= flag.
363
+ objects="$fuzz_target"
364
+ else
365
+ objects="$objects -object=$fuzz_target"
366
+ fi
367
+ fi
368
+
369
+
370
+ # Limit the number of processes to be spawned.
371
+ n_child_proc=$(jobs -rp | wc -l)
372
+ while [[ "$n_child_proc" -eq "$NPROC" || "$n_child_proc" -gt "$MAX_PARALLEL_COUNT" ]]; do
373
+ sleep 4
374
+ n_child_proc=$(jobs -rp | wc -l)
375
+ done
376
+ done
377
+
378
+ # Wait for background processes to finish.
379
+ wait
380
+
381
+ if [[ $FUZZING_LANGUAGE == "go" ]]; then
382
+ echo $DUMPS_DIR
383
+ $SYSGOPATH/bin/gocovmerge $DUMPS_DIR/*.profdata > fuzz.cov
384
+ gotoolcover -html=fuzz.cov -o $REPORT_ROOT_DIR/index.html
385
+ $SYSGOPATH/bin/gocovsum fuzz.cov > $SUMMARY_FILE
386
+ cp $REPORT_ROOT_DIR/index.html $REPORT_PLATFORM_DIR/index.html
387
+ $SYSGOPATH/bin/pprof-merge $DUMPS_DIR/*.perf.cpu.prof
388
+ mv merged.data $REPORT_ROOT_DIR/cpu.prof
389
+ $SYSGOPATH/bin/pprof-merge $DUMPS_DIR/*.perf.heap.prof
390
+ mv merged.data $REPORT_ROOT_DIR/heap.prof
391
+ #TODO some proxy for go tool pprof -http=127.0.0.1:8001 $DUMPS_DIR/cpu.prof
392
+ echo "Finished generating code coverage report for Go fuzz targets."
393
+ elif [[ $FUZZING_LANGUAGE == "python" ]]; then
394
+ # Extract source files from all dependency zip folders
395
+ mkdir -p /pythoncovmergedfiles/medio
396
+ PYCOVDIR=/pycovdir/
397
+ mkdir $PYCOVDIR
398
+ for fuzzer in $FUZZ_TARGETS; do
399
+ fuzzer_deps=${fuzzer}.pkg.deps.zip
400
+ unzip $OUT/${fuzzer_deps}
401
+ rsync -r ./medio /pythoncovmergedfiles/medio
402
+ rm -rf ./medio
403
+
404
+ # Translate paths in unzipped folders to paths that we can use
405
+ mv $OUT/.coverage_$fuzzer .coverage
406
+ python3 /usr/local/bin/python_coverage_runner_help.py translate /pythoncovmergedfiles/medio
407
+ cp .new_coverage $PYCOVDIR/.coverage_$fuzzer
408
+ cp .new_coverage $OUT/coverage_d_$fuzzer
409
+ done
410
+
411
+ # Combine coverage
412
+ cd $PYCOVDIR
413
+ python3 /usr/local/bin/python_coverage_runner_help.py combine .coverage_*
414
+ python3 /usr/local/bin/python_coverage_runner_help.py html
415
+ # Produce all_cov file used by fuzz introspector.
416
+ python3 /usr/local/bin/python_coverage_runner_help.py json -o ${TEXTCOV_REPORT_DIR}/all_cov.json
417
+
418
+ # Generate .json with similar format to llvm-cov output.
419
+ python3 /usr/local/bin/python_coverage_runner_help.py \
420
+ convert-to-summary-json ${TEXTCOV_REPORT_DIR}/all_cov.json $SUMMARY_FILE
421
+
422
+ # Copy coverage date out
423
+ cp htmlcov/status.json ${TEXTCOV_REPORT_DIR}/html_status.json
424
+
425
+ mv htmlcov/* $REPORT_PLATFORM_DIR/
426
+ mv .coverage_* $REPORT_PLATFORM_DIR/
427
+ elif [[ $FUZZING_LANGUAGE == "jvm" ]]; then
428
+
429
+ # From this point on the script does not tolerate any errors.
430
+ set -e
431
+
432
+ # Merge .exec files from the individual targets.
433
+ jacoco_merged_exec=$DUMPS_DIR/jacoco.merged.exec
434
+ java -jar /opt/jacoco-cli.jar merge $DUMPS_DIR/*.exec \
435
+ --destfile $jacoco_merged_exec
436
+
437
+ # Prepare classes directory for jacoco process
438
+ classes_dir=$DUMPS_DIR/classes
439
+ mkdir $classes_dir
440
+
441
+ # Only copy class files found in $OUT/$SRC to ensure they are
442
+ # lively compiled from the project, avoiding inclusion of
443
+ # dependency classes. This also includes the fuzzer classes.
444
+ find "$OUT/$SRC" -type f -name "*.class" | while read -r class_file; do
445
+ # Skip module-info.class
446
+ if [[ "$(basename "$class_file")" == "module-info.class" ]]; then
447
+ continue
448
+ fi
449
+
450
+ # Use javap to extract the fully qualified name of the class and copy it to $classes_dir
451
+ fqn=$(javap -verbose "$class_file" 2>/dev/null | grep "this_class:" | grep -oP '(?<=// ).*')
452
+ if [ -n "$fqn" ]; then
453
+ mkdir -p $classes_dir/$(dirname $fqn)
454
+ cp $class_file $classes_dir/$fqn.class
455
+ fi
456
+ done
457
+
458
+ # Heuristically determine source directories based on Maven structure.
459
+ # Always include the $SRC root as it likely contains the fuzzer sources.
460
+ sourcefiles_args=(--sourcefiles $OUT/$SRC)
461
+ source_dirs=$(find $OUT/$SRC -type d -name 'java')
462
+ for source_dir in $source_dirs; do
463
+ sourcefiles_args+=(--sourcefiles "$source_dir")
464
+ done
465
+
466
+ # Generate HTML and XML reports.
467
+ xml_report=$REPORT_PLATFORM_DIR/index.xml
468
+ java -jar /opt/jacoco-cli.jar report $jacoco_merged_exec \
469
+ --html $REPORT_PLATFORM_DIR \
470
+ --xml $xml_report \
471
+ --classfiles $classes_dir \
472
+ "${sourcefiles_args[@]}"
473
+
474
+ # Also serve the raw exec file and XML report, which can be useful for
475
+ # automated analysis.
476
+ cp $jacoco_merged_exec $REPORT_PLATFORM_DIR/jacoco.exec
477
+ cp $xml_report $REPORT_PLATFORM_DIR/jacoco.xml
478
+ cp $xml_report $TEXTCOV_REPORT_DIR/jacoco.xml
479
+
480
+ # Write llvm-cov summary file.
481
+ jacoco_report_converter.py $xml_report $SUMMARY_FILE
482
+
483
+ set +e
484
+ elif [[ $FUZZING_LANGUAGE == "javascript" ]]; then
485
+
486
+ # From this point on the script does not tolerate any errors.
487
+ set -e
488
+
489
+ json_report=$MERGED_COVERAGE_DIR/coverage.json
490
+ nyc merge $FUZZERS_COVERAGE_DUMPS_DIR $json_report
491
+
492
+ nyc report -t $MERGED_COVERAGE_DIR --report-dir $REPORT_PLATFORM_DIR --reporter=html --reporter=json-summary
493
+
494
+ nyc_json_summary_file=$REPORT_PLATFORM_DIR/coverage-summary.json
495
+
496
+ # Write llvm-cov summary file.
497
+ nyc_report_converter.py $nyc_json_summary_file $SUMMARY_FILE
498
+
499
+ set +e
500
+ else
501
+
502
+ # From this point on the script does not tolerate any errors.
503
+ set -e
504
+
505
+ # Merge all dumps from the individual targets.
506
+ rm -f $PROFILE_FILE
507
+ llvm-profdata merge -sparse $DUMPS_DIR/*.profdata -o $PROFILE_FILE
508
+
509
+ # TODO(mmoroz): add script from Chromium for rendering directory view reports.
510
+ # The first path in $objects does not have -object= prefix (llvm-cov format).
511
+ shared_libraries=$(coverage_helper shared_libs -build-dir=$OUT -object=$objects)
512
+ objects="$objects $shared_libraries"
513
+
514
+ generate_html $PROFILE_FILE "$shared_libraries" "$objects" "$REPORT_ROOT_DIR"
515
+
516
+ # Per target reports.
517
+ for fuzz_target in $FUZZ_TARGETS; do
518
+ if [[ $fuzz_target == *"@"* ]]; then
519
+ profdata_path=$DUMPS_DIR/$fuzz_target.profdata
520
+ report_dir=$REPORT_BY_TARGET_ROOT_DIR/$fuzz_target
521
+ # Extract fuzztest binary name from fuzztest wrapper script.
522
+ fuzz_target=(${fuzz_target//@/ }[0])
523
+ else
524
+ profdata_path=$DUMPS_DIR/$fuzz_target.profdata
525
+ report_dir=$REPORT_BY_TARGET_ROOT_DIR/$fuzz_target
526
+ fi
527
+ if [[ ! -f "$profdata_path" ]]; then
528
+ echo "WARNING: $fuzz_target has no profdata generated."
529
+ continue
530
+ fi
531
+
532
+ generate_html $profdata_path "$shared_libraries" "$fuzz_target" "$report_dir"
533
+ done
534
+
535
+ set +e
536
+ fi
537
+
538
+ # Make sure report is readable.
539
+ chmod -R +r $REPORT_ROOT_DIR $REPORT_BY_TARGET_ROOT_DIR
540
+ find $REPORT_ROOT_DIR $REPORT_BY_TARGET_ROOT_DIR -type d -exec chmod +x {} +
541
+
542
+ # HTTP_PORT is optional.
543
+ set +u
544
+ if [[ -n $HTTP_PORT ]]; then
545
+ # Serve the report locally.
546
+ echo "Serving the report on http://127.0.0.1:$HTTP_PORT/linux/index.html"
547
+ cd $REPORT_ROOT_DIR
548
+ python3 -m http.server $HTTP_PORT
549
+ fi
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/coverage_helper ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -u
2
+ # Copyright 2018 Google Inc.
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ python3 $CODE_COVERAGE_SRC/coverage_utils.py $@
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/install_java.sh ADDED
@@ -0,0 +1,46 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eux
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ # Install java in a platform-aware way.
19
+
20
+ ARCHITECTURE=
21
+ case $(uname -m) in
22
+ x86_64)
23
+ ARCHITECTURE=x64
24
+ ;;
25
+ aarch64)
26
+ ARCHITECTURE=aarch64
27
+ ;;
28
+ *)
29
+ echo "Error: unsupported architecture: $(uname -m)"
30
+ exit 1
31
+ ;;
32
+ esac
33
+
34
+ wget -q https://download.java.net/java/GA/jdk17.0.2/dfd4a8d0985749f896bed50d7138ee7f/8/GPL/openjdk-17.0.2_linux-"$ARCHITECTURE"_bin.tar.gz -O /tmp/openjdk-17.0.2_linux-"$ARCHITECTURE"_bin.tar.gz
35
+ wget -q https://download.java.net/java/GA/jdk15.0.2/0d1cfde4252546c6931946de8db48ee2/7/GPL/openjdk-15.0.2_linux-"$ARCHITECTURE"_bin.tar.gz -O /tmp/openjdk-15.0.2_linux-"$ARCHITECTURE"_bin.tar.gz
36
+ cd /tmp
37
+ mkdir -p $JAVA_HOME
38
+ tar -xz --strip-components=1 -f openjdk-17.0.2_linux-"$ARCHITECTURE"_bin.tar.gz --directory $JAVA_HOME
39
+ rm -f openjdk-17.0.2_linux-"$ARCHITECTURE"_bin.tar.gz
40
+ rm -rf $JAVA_HOME/jmods $JAVA_HOME/lib/src.zip
41
+
42
+ # Install OpenJDK 15 and trim its size by removing unused components. Some projects only run with Java 15.
43
+ mkdir -p $JAVA_15_HOME
44
+ tar -xz --strip-components=1 -f openjdk-15.0.2_linux-"$ARCHITECTURE"_bin.tar.gz --directory $JAVA_15_HOME
45
+ rm -f openjdk-15.0.2_linux-"$ARCHITECTURE"_bin.tar.gz
46
+ rm -rf $JAVA_15_HOME/jmods $JAVA_15_HOME/lib/src.zip
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/jacoco_report_converter.py ADDED
@@ -0,0 +1,174 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/env python3
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ """Helper script for creating an llvm-cov style JSON summary from a JaCoCo XML
18
+ report."""
19
+ import json
20
+ import os
21
+ import sys
22
+ import xml.etree.ElementTree as ET
23
+
24
+
25
+ def convert(xml):
26
+ """Turns a JaCoCo XML report into an llvm-cov JSON summary."""
27
+ summary = {
28
+ 'type': 'oss-fuzz.java.coverage.json.export',
29
+ 'version': '1.0.0',
30
+ 'data': [{
31
+ 'totals': {},
32
+ 'files': [],
33
+ }],
34
+ }
35
+
36
+ report = ET.fromstring(xml)
37
+ totals = make_element_summary(report)
38
+ summary['data'][0]['totals'] = totals
39
+
40
+ # Since Java compilation does not track source file location, we match
41
+ # coverage info to source files via the full class name, e.g. we search for
42
+ # a path in /out/src ending in foo/bar/Baz.java for the class foo.bar.Baz.
43
+ # Under the assumptions that a given project only ever contains a single
44
+ # version of a class and that no class name appears as a suffix of another
45
+ # class name, we can assign coverage info to every source file matched in that
46
+ # way.
47
+ src_files = list_src_files()
48
+
49
+ for class_element in report.findall('./package/class'):
50
+ # Skip fuzzer classes
51
+ if is_fuzzer_class(class_element):
52
+ continue
53
+
54
+ # Skip non class elements
55
+ if 'sourcefilename' not in class_element.attrib:
56
+ continue
57
+
58
+ class_name = class_element.attrib['name']
59
+ package_name = os.path.dirname(class_name)
60
+ basename = class_element.attrib['sourcefilename']
61
+ # This path is 'foo/Bar.java' for the class element
62
+ # <class name="foo/Bar" sourcefilename="Bar.java">.
63
+ canonical_path = os.path.join(package_name, basename)
64
+
65
+ class_summary = make_element_summary(class_element)
66
+ for src_file in relative_to_src_path(src_files, canonical_path):
67
+ summary['data'][0]['files'].append({
68
+ 'filename': src_file,
69
+ 'summary': class_summary,
70
+ })
71
+
72
+ return json.dumps(summary)
73
+
74
+
75
+ def list_src_files():
76
+ """Returns a map from basename to full path for all files in $OUT/$SRC."""
77
+ filename_to_paths = {}
78
+ out_path = os.environ['OUT'] + '/'
79
+ src_path = os.environ['SRC']
80
+ src_in_out = out_path + src_path
81
+ for dirpath, _, filenames in os.walk(src_in_out):
82
+ for filename in filenames:
83
+ full_path = dirpath + '/' + filename
84
+ # Map /out//src/... to /src/...
85
+ file_path = full_path[len(out_path):]
86
+ filename_to_paths.setdefault(filename, []).append(file_path)
87
+ return filename_to_paths
88
+
89
+
90
+ def is_fuzzer_class(class_element):
91
+ """Check if the class is fuzzer class."""
92
+ method_elements = class_element.find('./method[@name=\"fuzzerTestOneInput\"]')
93
+ if method_elements:
94
+ return True
95
+
96
+ return False
97
+
98
+
99
+ def relative_to_src_path(src_files, canonical_path):
100
+ """Returns all paths in src_files ending in canonical_path."""
101
+ basename = os.path.basename(canonical_path)
102
+ if basename not in src_files:
103
+ return []
104
+ candidate_paths = src_files[basename]
105
+ return [
106
+ path for path in candidate_paths if path.endswith("/" + canonical_path)
107
+ ]
108
+
109
+
110
+ def make_element_summary(element):
111
+ """Returns a coverage summary for an element in the XML report."""
112
+ summary = {}
113
+
114
+ function_counter = element.find('./counter[@type=\'METHOD\']')
115
+ summary['functions'] = make_counter_summary(function_counter)
116
+
117
+ line_counter = element.find('./counter[@type=\'LINE\']')
118
+ summary['lines'] = make_counter_summary(line_counter)
119
+
120
+ # JaCoCo tracks branch coverage, which counts the covered control-flow edges
121
+ # between llvm-cov's regions instead of the covered regions themselves. For
122
+ # non-trivial code parts, the difference is usually negligible. However, if
123
+ # all methods of a class consist of a single region only (no branches),
124
+ # JaCoCo does not report any branch coverage even if there is instruction
125
+ # coverage. Since this would give incorrect results for CI Fuzz purposes, we
126
+ # increase the regions counter by 1 if there is any amount of instruction
127
+ # coverage.
128
+ instruction_counter = element.find('./counter[@type=\'INSTRUCTION\']')
129
+ has_some_coverage = instruction_counter is not None and int(
130
+ instruction_counter.attrib["covered"]) > 0
131
+ branch_covered_adjustment = 1 if has_some_coverage else 0
132
+ region_counter = element.find('./counter[@type=\'BRANCH\']')
133
+ summary['regions'] = make_counter_summary(
134
+ region_counter, covered_adjustment=branch_covered_adjustment)
135
+
136
+ return summary
137
+
138
+
139
+ def make_counter_summary(counter_element, covered_adjustment=0):
140
+ """Turns a JaCoCo <counter> element into an llvm-cov totals entry."""
141
+ summary = {}
142
+ covered = covered_adjustment
143
+ missed = 0
144
+ if counter_element is not None:
145
+ covered += int(counter_element.attrib['covered'])
146
+ missed += int(counter_element.attrib['missed'])
147
+ summary['covered'] = covered
148
+ summary['notcovered'] = missed
149
+ summary['count'] = summary['covered'] + summary['notcovered']
150
+ if summary['count'] != 0:
151
+ summary['percent'] = (100.0 * summary['covered']) / summary['count']
152
+ else:
153
+ summary['percent'] = 0
154
+ return summary
155
+
156
+
157
+ def main():
158
+ """Produces an llvm-cov style JSON summary from a JaCoCo XML report."""
159
+ if len(sys.argv) != 3:
160
+ sys.stderr.write('Usage: %s <path_to_jacoco_xml> <out_path_json>\n' %
161
+ sys.argv[0])
162
+ return 1
163
+
164
+ with open(sys.argv[1], 'r') as xml_file:
165
+ xml_report = xml_file.read()
166
+ json_summary = convert(xml_report)
167
+ with open(sys.argv[2], 'w') as json_file:
168
+ json_file.write(json_summary)
169
+
170
+ return 0
171
+
172
+
173
+ if __name__ == '__main__':
174
+ sys.exit(main())
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/nyc_report_converter.py ADDED
@@ -0,0 +1,80 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/env python3
2
+ # Copyright 2023 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ """Helper script for creating a llvm-cov style JSON summary from a nyc
18
+ JSON summary."""
19
+ import json
20
+ import sys
21
+
22
+
23
+ def convert(nyc_json_summary):
24
+ """Turns a nyc JSON report into a llvm-cov JSON summary."""
25
+ summary = {
26
+ 'type':
27
+ 'oss-fuzz.javascript.coverage.json.export',
28
+ 'version':
29
+ '1.0.0',
30
+ 'data': [{
31
+ 'totals':
32
+ file_summary(nyc_json_summary['total']),
33
+ 'files': [{
34
+ 'filename': src_file,
35
+ 'summary': file_summary(nyc_json_summary[src_file])
36
+ } for src_file in nyc_json_summary if src_file != 'total'],
37
+ }],
38
+ }
39
+
40
+ return json.dumps(summary)
41
+
42
+
43
+ def file_summary(nyc_file_summary):
44
+ """Returns a summary for a given file in the nyc JSON summary report."""
45
+ return {
46
+ 'functions': element_summary(nyc_file_summary['functions']),
47
+ 'lines': element_summary(nyc_file_summary['lines']),
48
+ 'regions': element_summary(nyc_file_summary['branches'])
49
+ }
50
+
51
+
52
+ def element_summary(element):
53
+ """Returns a summary of a coverage element in the nyc JSON summary
54
+ of the file"""
55
+ return {
56
+ 'count': element['total'],
57
+ 'covered': element['covered'],
58
+ 'notcovered': element['total'] - element['covered'] - element['skipped'],
59
+ 'percent': element['pct'] if element['pct'] != 'Unknown' else 0
60
+ }
61
+
62
+
63
+ def main():
64
+ """Produces a llvm-cov style JSON summary from a nyc JSON summary."""
65
+ if len(sys.argv) != 3:
66
+ sys.stderr.write('Usage: %s <path_to_nyc_json_summary> <out_path_json>\n' %
67
+ sys.argv[0])
68
+ return 1
69
+
70
+ with open(sys.argv[1], 'r') as nyc_json_summary_file:
71
+ nyc_json_summary = json.load(nyc_json_summary_file)
72
+ json_summary = convert(nyc_json_summary)
73
+ with open(sys.argv[2], 'w') as json_output_file:
74
+ json_output_file.write(json_summary)
75
+
76
+ return 0
77
+
78
+
79
+ if __name__ == '__main__':
80
+ sys.exit(main())
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/targets_list ADDED
@@ -0,0 +1,10 @@
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash
2
+
3
+ for binary in $(find $OUT/ -executable -type f); do
4
+ [[ "$binary" != *.so ]] || continue
5
+ [[ $(basename "$binary") != jazzer_driver* ]] || continue
6
+ file "$binary" | grep -e ELF -e "shell script" > /dev/null 2>&1 || continue
7
+ grep "LLVMFuzzerTestOneInput" "$binary" > /dev/null 2>&1 || continue
8
+
9
+ basename "$binary"
10
+ done
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-runner/test_all_test.py ADDED
@@ -0,0 +1,38 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2020 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+ """Tests test_all.py"""
17
+ import unittest
18
+ from unittest import mock
19
+
20
+ import test_all
21
+
22
+
23
+ class TestTestAll(unittest.TestCase):
24
+ """Tests for the test_all_function."""
25
+
26
+ @mock.patch('test_all.find_fuzz_targets', return_value=[])
27
+ @mock.patch('builtins.print')
28
+ def test_test_all_no_fuzz_targets(self, mock_print, _):
29
+ """Tests that test_all returns False when there are no fuzz targets."""
30
+ outdir = '/out'
31
+ allowed_broken_targets_percentage = 0
32
+ self.assertFalse(
33
+ test_all.test_all(outdir, allowed_broken_targets_percentage))
34
+ mock_print.assert_called_with('ERROR: No fuzz targets found.')
35
+
36
+
37
+ if __name__ == '__main__':
38
+ unittest.main()