| #!/bin/bash -eu |
| # Copyright 2019 Google Inc. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # |
| ################################################################################ |
| |
| # Ignore memory leaks from python scripts invoked in the build |
| export ASAN_OPTIONS="detect_leaks=0" |
| export MSAN_OPTIONS="halt_on_error=0:exitcode=0:report_umrs=0" |
| |
| # Remove -pthread from CFLAGS, this trips up ./configure |
| # which thinks pthreads are available without any CLI flags |
| CFLAGS=${CFLAGS//"-pthread"/} |
| |
| FLAGS=() |
| case $SANITIZER in |
| address) |
| FLAGS+=("--with-address-sanitizer") |
| ;; |
| memory) |
| FLAGS+=("--with-memory-sanitizer") |
| # installing ensurepip takes a while with MSAN instrumentation, so |
| # we disable it here |
| FLAGS+=("--without-ensurepip") |
| # -msan-keep-going is needed to allow MSAN's halt_on_error to function |
| FLAGS+=("CFLAGS=-mllvm -msan-keep-going=1") |
| ;; |
| undefined) |
| FLAGS+=("--with-undefined-behavior-sanitizer") |
| ;; |
| esac |
| |
| export CPYTHON_INSTALL_PATH=$SRC/cpython-install |
| rm -rf $CPYTHON_INSTALL_PATH |
| mkdir $CPYTHON_INSTALL_PATH |
| |
| cd $SRC/cpython |
| cp $SRC/python-library-fuzzers/python_coverage.h Python/ |
| |
| # Patch the interpreter to record code coverage |
| sed -i '1 s/^.*$/#include "python_coverage.h"/g' Python/ceval.c |
| sed -i 's/case TARGET\(.*\): {/\0\nfuzzer_record_code_coverage(f->f_code, f->f_lasti);/g' Python/ceval.c |
| |
| ./configure "${FLAGS[@]:-}" --prefix=$CPYTHON_INSTALL_PATH |
| make -j$(nproc) |
| make install |
| |
| cp -R $CPYTHON_INSTALL_PATH $OUT/ |
| |
| cd $SRC/python-library-fuzzers |
| make |
| |
| cp $SRC/python-library-fuzzers/fuzzer-html $OUT/ |
| cp $SRC/python-library-fuzzers/html.py $OUT/ |
| zip -j $OUT/fuzzer-html_seed_corpus.zip corp-html/* |
| |
| cp $SRC/python-library-fuzzers/fuzzer-email $OUT/ |
| cp $SRC/python-library-fuzzers/email.py $OUT/ |
| zip -j $OUT/fuzzer-email_seed_corpus.zip corp-email/* |
| |
| cp $SRC/python-library-fuzzers/fuzzer-httpclient $OUT/ |
| cp $SRC/python-library-fuzzers/httpclient.py $OUT/ |
| zip -j $OUT/fuzzer-httpclient_seed_corpus.zip corp-httpclient/* |
| |
| cp $SRC/python-library-fuzzers/fuzzer-json $OUT/ |
| cp $SRC/python-library-fuzzers/json.py $OUT/ |
| zip -j $OUT/fuzzer-json_seed_corpus.zip corp-json/* |
| |
| cp $SRC/python-library-fuzzers/fuzzer-difflib $OUT/ |
| cp $SRC/python-library-fuzzers/difflib.py $OUT/ |
| zip -j $OUT/fuzzer-difflib_seed_corpus.zip corp-difflib/* |
| |
| cp $SRC/python-library-fuzzers/fuzzer-csv $OUT/ |
| cp $SRC/python-library-fuzzers/csv.py $OUT/ |
| zip -j $OUT/fuzzer-csv_seed_corpus.zip corp-csv/* |
| |
| cp $SRC/python-library-fuzzers/fuzzer-decode $OUT/ |
| cp $SRC/python-library-fuzzers/decode.py $OUT/ |
| zip -j $OUT/fuzzer-decode_seed_corpus.zip corp-decode/* |
| cp $SRC/python-library-fuzzers/fuzzer-decode.dict $OUT/ |