92 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
			
		
		
	
	
			92 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
| #!/bin/bash -eu
 | |
| # Copyright 2019 Google Inc.
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #      http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| #
 | |
| ################################################################################
 | |
| 
 | |
| # Ignore memory leaks from python scripts invoked in the build
 | |
| export ASAN_OPTIONS="detect_leaks=0"
 | |
| export MSAN_OPTIONS="halt_on_error=0:exitcode=0:report_umrs=0"
 | |
| 
 | |
| # Remove -pthread from CFLAGS, this trips up ./configure
 | |
| # which thinks pthreads are available without any CLI flags
 | |
| CFLAGS=${CFLAGS//"-pthread"/}
 | |
| 
 | |
| FLAGS=()
 | |
| case $SANITIZER in
 | |
|   address)
 | |
|     FLAGS+=("--with-address-sanitizer")
 | |
|     ;;
 | |
|   memory)
 | |
|     FLAGS+=("--with-memory-sanitizer")
 | |
|     # installing ensurepip takes a while with MSAN instrumentation, so
 | |
|     # we disable it here
 | |
|     FLAGS+=("--without-ensurepip")
 | |
|     # -msan-keep-going is needed to allow MSAN's halt_on_error to function
 | |
|     FLAGS+=("CFLAGS=-mllvm -msan-keep-going=1")
 | |
|     ;;
 | |
|   undefined)
 | |
|     FLAGS+=("--with-undefined-behavior-sanitizer")
 | |
|     ;;
 | |
| esac
 | |
| 
 | |
| export CPYTHON_INSTALL_PATH=$SRC/cpython-install
 | |
| rm -rf $CPYTHON_INSTALL_PATH
 | |
| mkdir $CPYTHON_INSTALL_PATH
 | |
| 
 | |
| cd $SRC/cpython
 | |
| cp $SRC/python-library-fuzzers/python_coverage.h Python/
 | |
| 
 | |
| # Patch the interpreter to record code coverage
 | |
| sed -i '1 s/^.*$/#include "python_coverage.h"/g' Python/ceval.c
 | |
| sed -i 's/case TARGET\(.*\): {/\0\nfuzzer_record_code_coverage(f->f_code, f->f_lasti);/g' Python/ceval.c
 | |
| 
 | |
| ./configure "${FLAGS[@]:-}" --prefix=$CPYTHON_INSTALL_PATH
 | |
| make -j$(nproc)
 | |
| make install
 | |
| 
 | |
| cp -R $CPYTHON_INSTALL_PATH $OUT/
 | |
| 
 | |
| cd $SRC/python-library-fuzzers
 | |
| make
 | |
| 
 | |
| cp $SRC/python-library-fuzzers/fuzzer-html $OUT/
 | |
| cp $SRC/python-library-fuzzers/html.py $OUT/
 | |
| zip -j $OUT/fuzzer-html_seed_corpus.zip corp-html/*
 | |
| 
 | |
| cp $SRC/python-library-fuzzers/fuzzer-email $OUT/
 | |
| cp $SRC/python-library-fuzzers/email.py $OUT/
 | |
| zip -j $OUT/fuzzer-email_seed_corpus.zip corp-email/*
 | |
| 
 | |
| cp $SRC/python-library-fuzzers/fuzzer-httpclient $OUT/
 | |
| cp $SRC/python-library-fuzzers/httpclient.py $OUT/
 | |
| zip -j $OUT/fuzzer-httpclient_seed_corpus.zip corp-httpclient/*
 | |
| 
 | |
| cp $SRC/python-library-fuzzers/fuzzer-json $OUT/
 | |
| cp $SRC/python-library-fuzzers/json.py $OUT/
 | |
| zip -j $OUT/fuzzer-json_seed_corpus.zip corp-json/*
 | |
| 
 | |
| cp $SRC/python-library-fuzzers/fuzzer-difflib $OUT/
 | |
| cp $SRC/python-library-fuzzers/difflib.py $OUT/
 | |
| zip -j $OUT/fuzzer-difflib_seed_corpus.zip corp-difflib/*
 | |
| 
 | |
| cp $SRC/python-library-fuzzers/fuzzer-csv $OUT/
 | |
| cp $SRC/python-library-fuzzers/csv.py $OUT/
 | |
| zip -j $OUT/fuzzer-csv_seed_corpus.zip corp-csv/*
 | |
| 
 | |
| cp $SRC/python-library-fuzzers/fuzzer-decode $OUT/
 | |
| cp $SRC/python-library-fuzzers/decode.py $OUT/
 | |
| zip -j $OUT/fuzzer-decode_seed_corpus.zip corp-decode/*
 | |
| cp $SRC/python-library-fuzzers/fuzzer-decode.dict $OUT/
 |