| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| """Helper script for OSS-Fuzz users. Can do common tasks like building |
| projects/fuzzers, running them etc.""" |
|
|
| from __future__ import print_function |
| from multiprocessing.dummy import Pool as ThreadPool |
| import argparse |
| import datetime |
| import errno |
| import logging |
| import os |
| import re |
| import shlex |
| import shutil |
| import subprocess |
| import sys |
| import tempfile |
|
|
| import constants |
| import templates |
|
|
| OSS_FUZZ_DIR = os.path.dirname(os.path.dirname(os.path.realpath(__file__))) |
| BUILD_DIR = os.path.join(OSS_FUZZ_DIR, 'build') |
|
|
| BASE_IMAGE_TAG = ':v1.2.1' |
|
|
| BASE_RUNNER_IMAGE = f'ghcr.io/aixcc-finals/base-runner{BASE_IMAGE_TAG}' |
|
|
| BASE_IMAGES = { |
| 'generic': [ |
| f'ghcr.io/aixcc-finals/base-image{BASE_IMAGE_TAG}', |
| f'ghcr.io/aixcc-finals/base-clang{BASE_IMAGE_TAG}', |
| f'ghcr.io/aixcc-finals/base-builder{BASE_IMAGE_TAG}', |
| BASE_RUNNER_IMAGE, |
| f'ghcr.io/aixcc-finals/base-runner-debug{BASE_IMAGE_TAG}', |
| ], |
| 'go': [f'ghcr.io/aixcc-finals/base-builder-go{BASE_IMAGE_TAG}'], |
| 'javascript': [f'ghcr.io/aixcc-finals/base-builder-javascript{BASE_IMAGE_TAG}'], |
| 'jvm': [f'ghcr.io/aixcc-finals/base-builder-jvm{BASE_IMAGE_TAG}'], |
| 'python': [f'ghcr.io/aixcc-finals/base-builder-python{BASE_IMAGE_TAG}'], |
| 'rust': [f'ghcr.io/aixcc-finals/base-builder-rust{BASE_IMAGE_TAG}'], |
| 'ruby': [f'ghcr.io/aixcc-finals/base-builder-ruby{BASE_IMAGE_TAG}'], |
| 'swift': [f'ghcr.io/aixcc-finals/base-builder-swift{BASE_IMAGE_TAG}'], |
| } |
|
|
| VALID_PROJECT_NAME_REGEX = re.compile(r'^[a-zA-Z0-9_-]+$') |
| MAX_PROJECT_NAME_LENGTH = 26 |
|
|
| CORPUS_URL_FORMAT = ( |
| 'gs://{project_name}-corpus.clusterfuzz-external.appspot.com/libFuzzer/' |
| '{fuzz_target}/') |
| CORPUS_BACKUP_URL_FORMAT = ( |
| 'gs://{project_name}-backup.clusterfuzz-external.appspot.com/corpus/' |
| 'libFuzzer/{fuzz_target}/') |
|
|
| HTTPS_CORPUS_BACKUP_URL_FORMAT = ( |
| 'https://storage.googleapis.com/{project_name}-backup.clusterfuzz-external' |
| '.appspot.com/corpus/libFuzzer/{fuzz_target}/public.zip') |
|
|
| LANGUAGE_REGEX = re.compile(r'[^\s]+') |
| PROJECT_LANGUAGE_REGEX = re.compile(r'\s*language\s*:\s*([^\s]+)') |
|
|
| WORKDIR_REGEX = re.compile(r'\s*WORKDIR\s*([^\s]+)') |
|
|
| |
| SPECIAL_CHARS_REGEX = re.compile('[^a-zA-Z0-9_-]') |
|
|
| LANGUAGE_TO_BASE_BUILDER_IMAGE = { |
| 'c': 'base-builder', |
| 'c++': 'base-builder', |
| 'go': 'base-builder-go', |
| 'javascript': 'base-builder-javascript', |
| 'jvm': 'base-builder-jvm', |
| 'python': 'base-builder-python', |
| 'ruby': 'base-builder-ruby', |
| 'rust': 'base-builder-rust', |
| 'swift': 'base-builder-swift' |
| } |
| ARM_BUILDER_NAME = 'oss-fuzz-buildx-builder' |
|
|
| CLUSTERFUZZLITE_ENGINE = 'libfuzzer' |
| CLUSTERFUZZLITE_ARCHITECTURE = 'x86_64' |
| CLUSTERFUZZLITE_FILESTORE_DIR = 'filestore' |
| CLUSTERFUZZLITE_DOCKER_IMAGE = 'ghcr.io/aixcc-finals/cifuzz-run-fuzzers' |
|
|
| logger = logging.getLogger(__name__) |
|
|
| if sys.version_info[0] >= 3: |
| raw_input = input |
|
|
| |
|
|
|
|
| class Project: |
| """Class representing a project that is in OSS-Fuzz or an external project |
| (ClusterFuzzLite user).""" |
|
|
| def __init__( |
| self, |
| project_name_or_path, |
| is_external=False, |
| build_integration_path=constants.DEFAULT_EXTERNAL_BUILD_INTEGRATION_PATH): |
| self.is_external = is_external |
| if self.is_external: |
| self.path = os.path.abspath(project_name_or_path) |
| self.name = os.path.basename(self.path) |
| self.build_integration_path = os.path.join(self.path, |
| build_integration_path) |
| else: |
| self.name = project_name_or_path |
| self.path = os.path.join(OSS_FUZZ_DIR, 'projects', self.name) |
| self.build_integration_path = self.path |
|
|
| @property |
| def dockerfile_path(self): |
| """Returns path to the project Dockerfile.""" |
| return os.path.join(self.build_integration_path, 'Dockerfile') |
|
|
| @property |
| def language(self): |
| """Returns project language.""" |
| project_yaml_path = os.path.join(self.build_integration_path, |
| 'project.yaml') |
| if not os.path.exists(project_yaml_path): |
| logger.warning('No project.yaml. Assuming c++.') |
| return constants.DEFAULT_LANGUAGE |
|
|
| with open(project_yaml_path) as file_handle: |
| content = file_handle.read() |
| for line in content.splitlines(): |
| match = PROJECT_LANGUAGE_REGEX.match(line) |
| if match: |
| return match.group(1) |
|
|
| logger.warning('Language not specified in project.yaml. Assuming c++.') |
| return constants.DEFAULT_LANGUAGE |
|
|
| @property |
| def coverage_extra_args(self): |
| """Returns project coverage extra args.""" |
| project_yaml_path = os.path.join(self.build_integration_path, |
| 'project.yaml') |
| if not os.path.exists(project_yaml_path): |
| logger.warning('project.yaml not found: %s.', project_yaml_path) |
| return '' |
|
|
| with open(project_yaml_path) as file_handle: |
| content = file_handle.read() |
|
|
| coverage_flags = '' |
| read_coverage_extra_args = False |
| |
| |
| for line in content.splitlines(): |
| if read_coverage_extra_args: |
| |
| if len(line) > 0 and line[0] != ' ': |
| break |
| coverage_flags += line |
| if 'coverage_extra_args' in line: |
| read_coverage_extra_args = True |
| |
| if 'coverage_extra_args: >' not in line: |
| coverage_flags += line.replace('coverage_extra_args: ', '') |
| return coverage_flags |
|
|
| @property |
| def out(self): |
| """Returns the out dir for the project. Creates it if needed.""" |
| return _get_out_dir(self.name) |
|
|
| @property |
| def work(self): |
| """Returns the out dir for the project. Creates it if needed.""" |
| return _get_project_build_subdir(self.name, 'work') |
|
|
| @property |
| def corpus(self): |
| """Returns the out dir for the project. Creates it if needed.""" |
| return _get_project_build_subdir(self.name, 'corpus') |
|
|
|
|
| def main(): |
| """Gets subcommand from program arguments and does it. Returns 0 on success 1 |
| on error.""" |
| logging.basicConfig(level=logging.INFO) |
| parser = get_parser() |
| args = parse_args(parser) |
|
|
| |
| |
| if hasattr(args, 'testcase_path'): |
| args.testcase_path = _get_absolute_path(args.testcase_path) |
| |
| |
| os.chdir(OSS_FUZZ_DIR) |
| if not os.path.exists(BUILD_DIR): |
| os.mkdir(BUILD_DIR) |
|
|
| |
| |
| if hasattr(args, 'sanitizer') and not args.sanitizer: |
| if args.project.language == 'javascript': |
| args.sanitizer = 'none' |
| else: |
| args.sanitizer = constants.DEFAULT_SANITIZER |
|
|
| if args.command == 'generate': |
| result = generate(args) |
| elif args.command == 'build_image': |
| result = build_image(args) |
| elif args.command == 'build_fuzzers': |
| result = build_fuzzers(args) |
| elif args.command == 'fuzzbench_build_fuzzers': |
| result = fuzzbench_build_fuzzers(args) |
| elif args.command == 'fuzzbench_run_fuzzer': |
| result = fuzzbench_run_fuzzer(args) |
| elif args.command == 'fuzzbench_measure': |
| result = fuzzbench_measure(args) |
| elif args.command == 'check_build': |
| result = check_build(args) |
| elif args.command == 'download_corpora': |
| result = download_corpora(args) |
| elif args.command == 'run_fuzzer': |
| result = run_fuzzer(args) |
| elif args.command == 'coverage': |
| result = coverage(args) |
| elif args.command == 'introspector': |
| result = introspector(args) |
| elif args.command == 'reproduce': |
| result = reproduce(args) |
| if args.propagate_exit_codes: |
| return result |
| elif args.command == 'shell': |
| result = shell(args) |
| elif args.command == 'pull_images': |
| result = pull_images() |
| elif args.command == 'run_clusterfuzzlite': |
| result = run_clusterfuzzlite(args) |
| else: |
| |
| parser.print_help() |
| result = False |
| return bool_to_retcode(result) |
|
|
|
|
| def bool_to_retcode(boolean): |
| """Returns 0 if |boolean| is Truthy, 0 is the standard return code for a |
| successful process execution. Returns 1 otherwise, indicating the process |
| failed.""" |
| return 0 if boolean else 1 |
|
|
|
|
| def parse_args(parser, args=None): |
| """Parses |args| using |parser| and returns parsed args. Also changes |
| |args.build_integration_path| to have correct default behavior.""" |
| |
| |
| parsed_args = parser.parse_args(args) |
| project = getattr(parsed_args, 'project', None) |
| if not project: |
| return parsed_args |
|
|
| |
| |
| is_external = getattr(parsed_args, 'external', False) |
| parsed_args.project = Project(parsed_args.project, is_external) |
| return parsed_args |
|
|
|
|
| def _add_external_project_args(parser): |
| parser.add_argument( |
| '--external', |
| help='Is project external?', |
| default=False, |
| action='store_true', |
| ) |
|
|
|
|
| def get_parser(): |
| """Returns an argparse parser.""" |
| parser = argparse.ArgumentParser('helper.py', description='oss-fuzz helpers') |
| subparsers = parser.add_subparsers(dest='command') |
|
|
| generate_parser = subparsers.add_parser( |
| 'generate', help='Generate files for new project.') |
| generate_parser.add_argument('project') |
| generate_parser.add_argument('--language', |
| default=constants.DEFAULT_LANGUAGE, |
| choices=LANGUAGE_TO_BASE_BUILDER_IMAGE.keys(), |
| help='Project language.') |
| _add_external_project_args(generate_parser) |
|
|
| build_image_parser = subparsers.add_parser('build_image', |
| help='Build an image.') |
| build_image_parser.add_argument('project') |
| build_image_parser.add_argument('--pull', |
| action='store_true', |
| help='Pull latest base image.') |
| _add_architecture_args(build_image_parser) |
| build_image_parser.add_argument('--cache', |
| action='store_true', |
| default=False, |
| help='Use docker cache when building image.') |
| build_image_parser.add_argument('--no-pull', |
| action='store_true', |
| help='Do not pull latest base image.') |
| build_image_parser.add_argument('--docker_image_tag', |
| dest='docker_image_tag', |
| default='latest', |
| help='docker image build tag' |
| 'default: latest') |
| _add_external_project_args(build_image_parser) |
|
|
| build_fuzzers_parser = subparsers.add_parser( |
| 'build_fuzzers', help='Build fuzzers for a project.') |
| _add_architecture_args(build_fuzzers_parser) |
| _add_engine_args(build_fuzzers_parser) |
| _add_sanitizer_args(build_fuzzers_parser) |
| _add_environment_args(build_fuzzers_parser) |
| _add_external_project_args(build_fuzzers_parser) |
| build_fuzzers_parser.add_argument('project') |
| build_fuzzers_parser.add_argument('source_path', |
| help='path of local source', |
| nargs='?') |
| build_fuzzers_parser.add_argument('--mount_path', |
| dest='mount_path', |
| help='path to mount local source in ' |
| '(defaults to WORKDIR)') |
| build_fuzzers_parser.add_argument('--clean', |
| dest='clean', |
| action='store_true', |
| help='clean existing artifacts.') |
| build_fuzzers_parser.add_argument('--no-clean', |
| dest='clean', |
| action='store_false', |
| help='do not clean existing artifacts ' |
| '(default).') |
| build_fuzzers_parser.add_argument('--docker_image_tag', |
| dest='docker_image_tag', |
| default='latest', |
| help='docker image build tag' |
| 'default: latest') |
| build_fuzzers_parser.set_defaults(clean=False) |
|
|
| fuzzbench_build_fuzzers_parser = subparsers.add_parser( |
| 'fuzzbench_build_fuzzers') |
| _add_architecture_args(fuzzbench_build_fuzzers_parser) |
| fuzzbench_build_fuzzers_parser.add_argument('--engine') |
| _add_sanitizer_args(fuzzbench_build_fuzzers_parser) |
| _add_environment_args(fuzzbench_build_fuzzers_parser) |
| _add_external_project_args(fuzzbench_build_fuzzers_parser) |
| fuzzbench_build_fuzzers_parser.add_argument('project') |
| check_build_parser = subparsers.add_parser( |
| 'check_build', help='Checks that fuzzers execute without errors.') |
| _add_architecture_args(check_build_parser) |
| _add_engine_args(check_build_parser, choices=constants.ENGINES) |
| _add_sanitizer_args(check_build_parser, choices=constants.SANITIZERS) |
| _add_environment_args(check_build_parser) |
| check_build_parser.add_argument('project', |
| help='name of the project or path (external)') |
| check_build_parser.add_argument('fuzzer_name', |
| help='name of the fuzzer', |
| nargs='?') |
| _add_external_project_args(check_build_parser) |
|
|
| run_fuzzer_parser = subparsers.add_parser( |
| 'run_fuzzer', help='Run a fuzzer in the emulated fuzzing environment.') |
| _add_architecture_args(run_fuzzer_parser) |
| _add_engine_args(run_fuzzer_parser) |
| _add_sanitizer_args(run_fuzzer_parser) |
| _add_environment_args(run_fuzzer_parser) |
| _add_external_project_args(run_fuzzer_parser) |
| run_fuzzer_parser.add_argument( |
| '--corpus-dir', help='directory to store corpus for the fuzz target') |
| run_fuzzer_parser.add_argument('project', |
| help='name of the project or path (external)') |
| run_fuzzer_parser.add_argument('fuzzer_name', help='name of the fuzzer') |
| run_fuzzer_parser.add_argument('fuzzer_args', |
| help='arguments to pass to the fuzzer', |
| nargs='*') |
|
|
| fuzzbench_run_fuzzer_parser = subparsers.add_parser('fuzzbench_run_fuzzer') |
| _add_architecture_args(fuzzbench_run_fuzzer_parser) |
| fuzzbench_run_fuzzer_parser.add_argument('--engine') |
| _add_sanitizer_args(fuzzbench_run_fuzzer_parser) |
| _add_environment_args(fuzzbench_run_fuzzer_parser) |
| _add_external_project_args(fuzzbench_run_fuzzer_parser) |
| fuzzbench_run_fuzzer_parser.add_argument( |
| '--corpus-dir', help='directory to store corpus for the fuzz target') |
| fuzzbench_run_fuzzer_parser.add_argument( |
| 'project', help='name of the project or path (external)') |
| fuzzbench_run_fuzzer_parser.add_argument('fuzzer_name', |
| help='name of the fuzzer') |
| fuzzbench_run_fuzzer_parser.add_argument( |
| 'fuzzer_args', help='arguments to pass to the fuzzer', nargs='*') |
|
|
| fuzzbench_measure_parser = subparsers.add_parser('fuzzbench_measure') |
| fuzzbench_measure_parser.add_argument( |
| 'project', help='name of the project or path (external)') |
| fuzzbench_measure_parser.add_argument('engine_name', |
| help='name of the fuzzer') |
| fuzzbench_measure_parser.add_argument('fuzz_target_name', |
| help='name of the fuzzer') |
|
|
| coverage_parser = subparsers.add_parser( |
| 'coverage', help='Generate code coverage report for the project.') |
| coverage_parser.add_argument('--no-corpus-download', |
| action='store_true', |
| help='do not download corpus backup from ' |
| 'OSS-Fuzz; use corpus located in ' |
| 'build/corpus/<project>/<fuzz_target>/') |
| coverage_parser.add_argument('--no-serve', |
| action='store_true', |
| help='do not serve a local HTTP server.') |
| coverage_parser.add_argument('--port', |
| default='8008', |
| help='specify port for' |
| ' a local HTTP server rendering coverage report') |
| coverage_parser.add_argument('--fuzz-target', |
| help='specify name of a fuzz ' |
| 'target to be run for generating coverage ' |
| 'report') |
| coverage_parser.add_argument('--corpus-dir', |
| help='specify location of corpus' |
| ' to be used (requires --fuzz-target argument)') |
| coverage_parser.add_argument('--public', |
| action='store_true', |
| help='if set, will download public ' |
| 'corpus using wget') |
| coverage_parser.add_argument('project', |
| help='name of the project or path (external)') |
| coverage_parser.add_argument('extra_args', |
| help='additional arguments to ' |
| 'pass to llvm-cov utility.', |
| nargs='*') |
| _add_external_project_args(coverage_parser) |
| _add_architecture_args(coverage_parser) |
|
|
| introspector_parser = subparsers.add_parser( |
| 'introspector', |
| help='Run a complete end-to-end run of ' |
| 'fuzz introspector. This involves (1) ' |
| 'building the fuzzers with ASAN; (2) ' |
| 'running all fuzzers; (3) building ' |
| 'fuzzers with coverge; (4) extracting ' |
| 'coverage; (5) building fuzzers using ' |
| 'introspector') |
| introspector_parser.add_argument('project', help='name of the project') |
| introspector_parser.add_argument('--seconds', |
| help='number of seconds to run fuzzers', |
| default=10) |
| introspector_parser.add_argument('source_path', |
| help='path of local source', |
| nargs='?') |
| introspector_parser.add_argument( |
| '--public-corpora', |
| help='if specified, will use public corpora for code coverage', |
| default=False, |
| action='store_true') |
| introspector_parser.add_argument( |
| '--private-corpora', |
| help='if specified, will use private corpora', |
| default=False, |
| action='store_true') |
|
|
| download_corpora_parser = subparsers.add_parser( |
| 'download_corpora', help='Download all corpora for a project.') |
| download_corpora_parser.add_argument('--fuzz-target', |
| nargs='+', |
| help='specify name of a fuzz target') |
| download_corpora_parser.add_argument('--public', |
| action='store_true', |
| help='if set, will download public ' |
| 'corpus using wget') |
| download_corpora_parser.add_argument( |
| 'project', help='name of the project or path (external)') |
|
|
| reproduce_parser = subparsers.add_parser('reproduce', |
| help='Reproduce a crash.') |
| reproduce_parser.add_argument('--valgrind', |
| action='store_true', |
| help='run with valgrind') |
| reproduce_parser.add_argument('--propagate_exit_codes', |
| action='store_true', |
| default=False, |
| help='return underlying exit codes instead of True/False.') |
| reproduce_parser.add_argument('--not_privileged', |
| dest='privileged', |
| action='store_false', |
| default=True, |
| help='reproduce without running docker in privileged mode.') |
| reproduce_parser.add_argument('--err_result', |
| help='exit code override for missing harness / fuzz targets ' |
| '(default err_result = 1).', |
| type=int) |
| reproduce_parser.add_argument('--timeout', |
| help='timeout for reproduce subprocess ' |
| '(default: None).', |
| default=None, |
| type=int) |
| reproduce_parser.add_argument('project', |
| help='name of the project or path (external)') |
| reproduce_parser.add_argument('fuzzer_name', help='name of the fuzzer') |
| reproduce_parser.add_argument('testcase_path', help='path of local testcase') |
| reproduce_parser.add_argument('fuzzer_args', |
| help='arguments to pass to the fuzzer', |
| nargs='*') |
| _add_environment_args(reproduce_parser) |
| _add_external_project_args(reproduce_parser) |
| _add_architecture_args(reproduce_parser) |
|
|
| shell_parser = subparsers.add_parser( |
| 'shell', help='Run /bin/bash within the builder container.') |
| shell_parser.add_argument('project', |
| help='name of the project or path (external)') |
| shell_parser.add_argument('source_path', |
| help='path of local source', |
| nargs='?') |
| shell_parser.add_argument('--docker_image_tag', |
| dest='docker_image_tag', |
| default='latest', |
| help='docker image build tag' |
| 'default: latest') |
| _add_architecture_args(shell_parser) |
| _add_engine_args(shell_parser) |
| _add_sanitizer_args(shell_parser) |
| _add_environment_args(shell_parser) |
| _add_external_project_args(shell_parser) |
|
|
| run_clusterfuzzlite_parser = subparsers.add_parser( |
| 'run_clusterfuzzlite', help='Run ClusterFuzzLite on a project.') |
| _add_sanitizer_args(run_clusterfuzzlite_parser) |
| _add_environment_args(run_clusterfuzzlite_parser) |
| run_clusterfuzzlite_parser.add_argument('project') |
| run_clusterfuzzlite_parser.add_argument('--clean', |
| dest='clean', |
| action='store_true', |
| help='clean existing artifacts.') |
| run_clusterfuzzlite_parser.add_argument( |
| '--no-clean', |
| dest='clean', |
| action='store_false', |
| help='do not clean existing artifacts ' |
| '(default).') |
| run_clusterfuzzlite_parser.add_argument('--branch', |
| default='master', |
| required=True) |
| _add_external_project_args(run_clusterfuzzlite_parser) |
| run_clusterfuzzlite_parser.set_defaults(clean=False) |
|
|
| subparsers.add_parser('pull_images', help='Pull base images.') |
| return parser |
|
|
|
|
| def is_base_image(image_name): |
| """Checks if the image name is a base image.""" |
| return os.path.exists(os.path.join('infra', 'base-images', image_name)) |
|
|
|
|
| def check_project_exists(project): |
| """Checks if a project exists.""" |
| if os.path.exists(project.path): |
| return True |
|
|
| if project.is_external: |
| descriptive_project_name = project.path |
| else: |
| descriptive_project_name = project.name |
|
|
| logger.error('"%s" does not exist.', descriptive_project_name) |
| return False |
|
|
|
|
| def _check_fuzzer_exists(project, fuzzer_name, architecture='x86_64'): |
| """Checks if a fuzzer exists.""" |
| platform = 'linux/arm64' if architecture == 'aarch64' else 'linux/amd64' |
| command = ['docker', 'run', '--rm', '--platform', platform] |
| command.extend(['-v', '%s:/out' % project.out]) |
| command.append(BASE_RUNNER_IMAGE) |
|
|
| command.extend(['/bin/bash', '-c', 'test -f /out/%s' % fuzzer_name]) |
|
|
| try: |
| subprocess.check_call(command) |
| except subprocess.CalledProcessError: |
| logger.error('%s does not seem to exist. Please run build_fuzzers first.', |
| fuzzer_name) |
| return False |
|
|
| return True |
|
|
|
|
| def _normalized_name(name): |
| """Return normalized name with special chars like slash, colon, etc normalized |
| to hyphen(-). This is important as otherwise these chars break local and cloud |
| storage paths.""" |
| return SPECIAL_CHARS_REGEX.sub('-', name).strip('-') |
|
|
|
|
| def _get_absolute_path(path): |
| """Returns absolute path with user expansion.""" |
| return os.path.abspath(os.path.expanduser(path)) |
|
|
|
|
| def _get_command_string(command): |
| """Returns a shell escaped command string.""" |
| return ' '.join(shlex.quote(part) for part in command) |
|
|
|
|
| def _get_project_build_subdir(project, subdir_name): |
| """Creates the |subdir_name| subdirectory of the |project| subdirectory in |
| |BUILD_DIR| and returns its path.""" |
| directory = os.path.join(BUILD_DIR, subdir_name, project) |
| os.makedirs(directory, exist_ok=True) |
|
|
| return directory |
|
|
|
|
| def _get_out_dir(project=''): |
| """Creates and returns path to /out directory for the given project (if |
| specified).""" |
| return _get_project_build_subdir(project, 'out') |
|
|
|
|
| def _add_architecture_args(parser, choices=None): |
| """Adds common architecture args.""" |
| if choices is None: |
| choices = constants.ARCHITECTURES |
| parser.add_argument('--architecture', |
| default=constants.DEFAULT_ARCHITECTURE, |
| choices=choices) |
|
|
|
|
| def _add_engine_args(parser, choices=None): |
| """Adds common engine args.""" |
| if choices is None: |
| choices = constants.ENGINES |
| parser.add_argument('--engine', |
| default=constants.DEFAULT_ENGINE, |
| choices=choices) |
|
|
|
|
| def _add_sanitizer_args(parser, choices=None): |
| """Adds common sanitizer args.""" |
| if choices is None: |
| choices = constants.SANITIZERS |
| parser.add_argument('--sanitizer', |
| default=None, |
| choices=choices, |
| help='the default is "address"') |
|
|
|
|
| def _add_environment_args(parser): |
| """Adds common environment args.""" |
| parser.add_argument('-e', |
| action='append', |
| help="set environment variable e.g. VAR=value") |
|
|
|
|
| def build_image_impl(project, cache=True, pull=False, |
| architecture='x86_64', |
| docker_image_tag='latest'): |
| """Builds image.""" |
| image_name = project.name |
|
|
| if is_base_image(image_name): |
| image_project = 'aixcc-finals' |
| docker_build_dir = os.path.join(OSS_FUZZ_DIR, 'infra', 'base-images', |
| image_name) |
| dockerfile_path = os.path.join(docker_build_dir, 'Dockerfile') |
| image_name = 'ghcr.io/%s/%s%s' % (image_project, image_name, BASE_IMAGE_TAG) |
| else: |
| if not check_project_exists(project): |
| return False |
| dockerfile_path = project.dockerfile_path |
| docker_build_dir = project.path |
| image_project = 'aixcc-afc' |
| image_name = '%s/%s:%s' % (image_project, image_name, docker_image_tag) |
|
|
| if pull and not pull_images(project.language): |
| return False |
|
|
| build_args = [] |
| if architecture == 'aarch64': |
| build_args += [ |
| 'buildx', |
| 'build', |
| '--platform', |
| 'linux/arm64', |
| '--progress', |
| 'plain', |
| '--load', |
| ] |
| if not cache: |
| build_args.append('--no-cache') |
|
|
| build_args += ['-t', image_name, '--file', dockerfile_path] |
| build_args.append(docker_build_dir) |
|
|
| if architecture == 'aarch64': |
| command = ['docker'] + build_args |
| subprocess.check_call(command) |
| return True |
| return docker_build(build_args) |
|
|
|
|
| def _env_to_docker_args(env_list): |
| """Turns envirnoment variable list into docker arguments.""" |
| return sum([['-e', v] for v in env_list], []) |
|
|
|
|
| def workdir_from_lines(lines, default='/src'): |
| """Gets the WORKDIR from the given lines.""" |
| for line in reversed(lines): |
| match = re.match(WORKDIR_REGEX, line) |
| if match: |
| workdir = match.group(1) |
| workdir = workdir.replace('$SRC', '/src') |
|
|
| if not os.path.isabs(workdir): |
| workdir = os.path.join('/src', workdir) |
|
|
| return os.path.normpath(workdir) |
|
|
| return default |
|
|
|
|
| def _workdir_from_dockerfile(project): |
| """Parses WORKDIR from the Dockerfile for the given project.""" |
| with open(project.dockerfile_path) as file_handle: |
| lines = file_handle.readlines() |
|
|
| return workdir_from_lines(lines, default=os.path.join('/src', project.name)) |
|
|
|
|
| def prepare_aarch64_emulation(): |
| """Run some necessary commands to use buildx to build AArch64 targets using |
| QEMU emulation on an x86_64 host.""" |
| subprocess.check_call( |
| ['docker', 'buildx', 'create', '--name', ARM_BUILDER_NAME]) |
| subprocess.check_call(['docker', 'buildx', 'use', ARM_BUILDER_NAME]) |
|
|
|
|
| def docker_run(run_args, print_output=True, architecture='x86_64', propagate_exit_codes=False, privileged=True, timeout=None): |
| """Calls `docker run`.""" |
| platform = 'linux/arm64' if architecture == 'aarch64' else 'linux/amd64' |
|
|
| if privileged: |
| command = [ |
| 'docker', 'run', '--privileged', '--shm-size=2g', '--platform', platform |
| ] |
| else: |
| command = [ |
| 'docker', 'run', '--shm-size=2g', '--platform', platform |
| ] |
|
|
| if os.getenv('OSS_FUZZ_SAVE_CONTAINERS_NAME'): |
| command.append('--name') |
| command.append(os.getenv('OSS_FUZZ_SAVE_CONTAINERS_NAME')) |
| else: |
| command.append('--rm') |
|
|
| |
| if sys.stdin.isatty(): |
| command.append('-i') |
|
|
| command.extend(run_args) |
|
|
| logger.info('Running: %s.', _get_command_string(command)) |
| stdout = None |
| if not print_output: |
| stdout = open(os.devnull, 'w') |
|
|
| exit_code = 0 |
|
|
| try: |
| subprocess.check_call(command, stdout=stdout, stderr=subprocess.STDOUT, |
| timeout=timeout) |
| except subprocess.CalledProcessError as e: |
| print(f'subprocess command returned a non-zero exit status: {e.returncode}') |
| exit_code = e.returncode |
| except subprocess.TimeoutExpired: |
| print(f'subprocess command timed out: {timeout=}') |
| exit_code = 124 |
|
|
| return exit_code if propagate_exit_codes else exit_code == 0 |
|
|
|
|
| def docker_build(build_args): |
| """Calls `docker build`.""" |
| command = ['docker', 'build'] |
| command.extend(build_args) |
| logger.info('Running: %s.', _get_command_string(command)) |
|
|
| try: |
| subprocess.check_call(command) |
| except subprocess.CalledProcessError: |
| logger.error('Docker build failed.') |
| return False |
|
|
| return True |
|
|
|
|
| def docker_pull(image): |
| """Call `docker pull`.""" |
| command = ['docker', 'pull', image] |
| logger.info('Running: %s', _get_command_string(command)) |
|
|
| try: |
| subprocess.check_call(command) |
| except subprocess.CalledProcessError: |
| logger.error('Docker pull failed.') |
| return False |
|
|
| return True |
|
|
|
|
| def build_image(args): |
| """Builds docker image.""" |
| if args.pull and args.no_pull: |
| logger.error('Incompatible arguments --pull and --no-pull.') |
| return False |
|
|
| if args.pull: |
| pull = True |
| elif args.no_pull: |
| pull = False |
| else: |
| y_or_n = raw_input('Pull latest base images (compiler/runtime)? (y/N): ') |
| pull = y_or_n.lower() == 'y' |
|
|
| if pull: |
| logger.info('Pulling latest base images...') |
| else: |
| logger.info('Using cached base images...') |
|
|
| |
| if build_image_impl(args.project, |
| cache=args.cache, |
| pull=pull, |
| architecture=args.architecture, |
| docker_image_tag=args.docker_image_tag): |
| return True |
|
|
| return False |
|
|
|
|
| def build_fuzzers_impl( |
| project, |
| clean, |
| engine, |
| sanitizer, |
| architecture, |
| env_to_add, |
| source_path, |
| mount_path=None, |
| child_dir='', |
| build_project_image=True, |
| docker_image_tag='latest'): |
| """Builds fuzzers.""" |
| if build_project_image and not build_image_impl(project, |
| architecture=architecture, |
| docker_image_tag=docker_image_tag): |
| return False |
|
|
| docker_image = f'aixcc-afc/{project.name}:{docker_image_tag}' |
|
|
| project_out = os.path.join(project.out, child_dir) |
| if clean: |
| logger.info('Cleaning existing build artifacts.') |
|
|
| |
| docker_run([ |
| '-v', f'{project_out}:/out', '-t', f'{docker_image}', |
| '/bin/bash', '-c', 'rm -rf /out/*' |
| ], |
| architecture=architecture) |
|
|
| docker_run([ |
| '-v', |
| '%s:/work' % project.work, '-t', |
| f'{docker_image}', '/bin/bash', '-c', 'rm -rf /work/*' |
| ], |
| architecture=architecture) |
|
|
| else: |
| logger.info('Keeping existing build artifacts as-is (if any).') |
| env = [ |
| 'FUZZING_ENGINE=' + engine, |
| 'SANITIZER=' + sanitizer, |
| 'ARCHITECTURE=' + architecture, |
| 'PROJECT_NAME=' + project.name, |
| 'HELPER=True', |
| ] |
|
|
| _add_oss_fuzz_ci_if_needed(env) |
|
|
| if project.language: |
| env.append('FUZZING_LANGUAGE=' + project.language) |
|
|
| if env_to_add: |
| env += env_to_add |
|
|
| command = _env_to_docker_args(env) |
| if source_path: |
| workdir = _workdir_from_dockerfile(project) |
| stateless_path = mount_path if mount_path else workdir |
|
|
| if stateless_path == '/src': |
| logger.error('Cannot mount local source targeting "/src".') |
| return False |
|
|
| command += [ |
| '-v', |
| '%s:%s:ro' % (_get_absolute_path(source_path), '/local-source-mount'), |
| ] |
|
|
| command += [ |
| '-v', f'{project_out}:/out', '-v', f'{project.work}:/work', |
| f'{docker_image}' |
| ] |
|
|
| if sys.stdin.isatty(): |
| command.insert(-1, '-t') |
|
|
| if source_path: |
| default_cmd = 'compile' |
| command += [ |
| '/bin/bash', |
| '-c', |
| f'pushd $SRC && rm -rf {stateless_path} && cp -r /local-source-mount {stateless_path} && popd && {default_cmd}' |
| ] |
|
|
| result = docker_run(command, architecture=architecture) |
| if not result: |
| logger.error('Building fuzzers failed.') |
| return False |
|
|
| return True |
|
|
|
|
| def run_clusterfuzzlite(args): |
| """Runs ClusterFuzzLite on a local repo.""" |
| if not os.path.exists(CLUSTERFUZZLITE_FILESTORE_DIR): |
| os.mkdir(CLUSTERFUZZLITE_FILESTORE_DIR) |
|
|
| try: |
| with tempfile.TemporaryDirectory() as workspace: |
|
|
| if args.external: |
| project_src_path = os.path.join(workspace, args.project.name) |
| shutil.copytree(args.project.path, project_src_path) |
|
|
| build_command = [ |
| '--tag', 'ghcr.io/aixcc-finals/cifuzz-run-fuzzers', '--file', |
| 'infra/run_fuzzers.Dockerfile', 'infra' |
| ] |
| if not docker_build(build_command): |
| return False |
| filestore_path = os.path.abspath(CLUSTERFUZZLITE_FILESTORE_DIR) |
| docker_run_command = [] |
| if args.external: |
| docker_run_command += [ |
| '-e', |
| f'PROJECT_SRC_PATH={project_src_path}', |
| ] |
| else: |
| docker_run_command += [ |
| '-e', |
| f'OSS_FUZZ_PROJECT_NAME={args.project.name}', |
| ] |
| docker_run_command += [ |
| '-v', |
| f'{filestore_path}:{filestore_path}', |
| '-v', |
| f'{workspace}:{workspace}', |
| '-e', |
| f'FILESTORE_ROOT_DIR={filestore_path}', |
| '-e', |
| f'WORKSPACE={workspace}', |
| '-e', |
| f'REPOSITORY={args.project.name}', |
| '-e', |
| 'CFL_PLATFORM=standalone', |
| '--entrypoint', |
| '', |
| '-v', |
| '/var/run/docker.sock:/var/run/docker.sock', |
| CLUSTERFUZZLITE_DOCKER_IMAGE, |
| 'python3', |
| '/opt/oss-fuzz/infra/cifuzz/cifuzz_combined_entrypoint.py', |
| ] |
| return docker_run(docker_run_command) |
|
|
| except PermissionError as error: |
| logger.error('PermissionError: %s.', error) |
| |
| |
| |
| |
| docker_run([ |
| '-v', f'{workspace}:{workspace}', '--entrypoint', '', |
| CLUSTERFUZZLITE_DOCKER_IMAGE, 'rm', '-rf', |
| os.path.join(workspace, '*') |
| ]) |
| return False |
|
|
|
|
| def build_fuzzers(args): |
| """Builds fuzzers.""" |
| if args.engine == 'centipede' and args.sanitizer != 'none': |
| |
| |
| |
| sanitized_binary_directories = ( |
| ('none', ''), |
| (args.sanitizer, f'__centipede_{args.sanitizer}'), |
| ) |
| else: |
| |
| sanitized_binary_directories = ((args.sanitizer, ''),) |
| return all( |
| build_fuzzers_impl(args.project, |
| args.clean, |
| args.engine, |
| sanitizer, |
| args.architecture, |
| args.e, |
| args.source_path, |
| mount_path=args.mount_path, |
| child_dir=child_dir, |
| docker_image_tag=args.docker_image_tag) |
| for sanitizer, child_dir in sanitized_binary_directories) |
|
|
|
|
| def fuzzbench_build_fuzzers(args): |
| """Builds fuzz targets with an arbitrary fuzzer from FuzzBench.""" |
| with tempfile.TemporaryDirectory() as tmp_dir: |
| tmp_dir = os.path.abspath(tmp_dir) |
| fuzzbench_path = os.path.join(tmp_dir, 'fuzzbench') |
| subprocess.run([ |
| 'git', 'clone', 'https://github.com/google/fuzzbench', '--depth', '1', |
| fuzzbench_path |
| ], |
| check=True) |
| env = [ |
| f'FUZZBENCH_PATH={fuzzbench_path}', 'OSS_FUZZ_ON_DEMAND=1', |
| f'PROJECT={args.project.name}' |
| ] |
| tag = f'aixcc-afc/{args.project.name}' |
| subprocess.run([ |
| 'docker', 'tag', 'ghcr.io/aixcc-finals/base-builder-fuzzbench', |
| f'ghcr.io/aixcc-finals/base-builder{BASE_IMAGE_TAG}' |
| ], |
| check=True) |
| build_image_impl(args.project) |
| assert docker_build([ |
| '--tag', tag, '--build-arg', f'parent_image={tag}', '--file', |
| os.path.join(fuzzbench_path, 'fuzzers', args.engine, |
| 'builder.Dockerfile'), |
| os.path.join(fuzzbench_path, 'fuzzers', args.engine) |
| ]) |
|
|
| return build_fuzzers_impl(args.project, |
| False, |
| args.engine, |
| args.sanitizer, |
| args.architecture, |
| env, |
| source_path=fuzzbench_path, |
| mount_path=fuzzbench_path, |
| build_project_image=False) |
|
|
|
|
| def _add_oss_fuzz_ci_if_needed(env): |
| """Adds value of |OSS_FUZZ_CI| environment variable to |env| if it is set.""" |
| oss_fuzz_ci = os.getenv('OSS_FUZZ_CI') |
| if oss_fuzz_ci: |
| env.append('OSS_FUZZ_CI=' + oss_fuzz_ci) |
|
|
|
|
| def check_build(args): |
| """Checks that fuzzers in the container execute without errors.""" |
| if not check_project_exists(args.project): |
| return False |
|
|
| if (args.fuzzer_name and not _check_fuzzer_exists( |
| args.project, args.fuzzer_name, args.architecture)): |
| return False |
|
|
| env = [ |
| 'FUZZING_ENGINE=' + args.engine, |
| 'SANITIZER=' + args.sanitizer, |
| 'ARCHITECTURE=' + args.architecture, |
| 'FUZZING_LANGUAGE=' + args.project.language, |
| 'HELPER=True', |
| ] |
| _add_oss_fuzz_ci_if_needed(env) |
| if args.e: |
| env += args.e |
|
|
| run_args = _env_to_docker_args(env) + [ |
| '-v', f'{args.project.out}:/out', '-t', BASE_RUNNER_IMAGE |
| ] |
|
|
| if args.fuzzer_name: |
| run_args += ['test_one.py', args.fuzzer_name] |
| else: |
| run_args.append('test_all.py') |
|
|
| result = docker_run(run_args, architecture=args.architecture) |
| if result: |
| logger.info('Check build passed.') |
| else: |
| logger.error('Check build failed.') |
|
|
| return result |
|
|
|
|
| def _get_fuzz_targets(project): |
| """Returns names of fuzz targest build in the project's /out directory.""" |
| fuzz_targets = [] |
| for name in os.listdir(project.out): |
| if name.startswith('afl-'): |
| continue |
| if name == 'centipede': |
| continue |
| if name.startswith('jazzer_'): |
| continue |
| if name == 'llvm-symbolizer': |
| continue |
|
|
| path = os.path.join(project.out, name) |
| |
| |
| if os.path.isfile(path) and (os.stat(path).st_mode & 0o111): |
| fuzz_targets.append(name) |
|
|
| return fuzz_targets |
|
|
|
|
| def _get_latest_corpus(project, fuzz_target, base_corpus_dir): |
| """Downloads the latest corpus for the given fuzz target.""" |
| corpus_dir = os.path.join(base_corpus_dir, fuzz_target) |
| os.makedirs(corpus_dir, exist_ok=True) |
|
|
| if not fuzz_target.startswith(project.name + '_'): |
| fuzz_target = '%s_%s' % (project.name, fuzz_target) |
|
|
| |
| fuzz_target = _normalized_name(fuzz_target) |
|
|
| corpus_backup_url = CORPUS_BACKUP_URL_FORMAT.format(project_name=project.name, |
| fuzz_target=fuzz_target) |
| command = ['gsutil', 'ls', corpus_backup_url] |
|
|
| |
| |
| corpus_listing = subprocess.Popen(command, stdout=subprocess.PIPE) |
| output, _ = corpus_listing.communicate() |
|
|
| |
| if corpus_listing.returncode: |
| logger.warning('Corpus for %s not found:\n', fuzz_target) |
| return |
|
|
| if output: |
| latest_backup_url = output.splitlines()[-1] |
| archive_path = corpus_dir + '.zip' |
| command = ['gsutil', '-q', 'cp', latest_backup_url, archive_path] |
| subprocess.check_call(command) |
|
|
| command = ['unzip', '-q', '-o', archive_path, '-d', corpus_dir] |
| subprocess.check_call(command) |
| os.remove(archive_path) |
| else: |
| |
| corpus_url = CORPUS_URL_FORMAT.format(project_name=project.name, |
| fuzz_target=fuzz_target) |
| command = ['gsutil', '-m', '-q', 'rsync', '-R', corpus_url, corpus_dir] |
| subprocess.check_call(command) |
|
|
|
|
| def _get_latest_public_corpus(args, fuzzer): |
| """Downloads the public corpus""" |
| target_corpus_dir = "build/corpus/%s" % args.project.name |
| if not os.path.isdir(target_corpus_dir): |
| os.makedirs(target_corpus_dir) |
|
|
| target_zip = os.path.join(target_corpus_dir, fuzzer + ".zip") |
|
|
| project_qualified_fuzz_target_name = fuzzer |
| qualified_name_prefix = args.project.name + '_' |
| if not fuzzer.startswith(qualified_name_prefix): |
| project_qualified_fuzz_target_name = qualified_name_prefix + fuzzer |
|
|
| download_url = HTTPS_CORPUS_BACKUP_URL_FORMAT.format( |
| project_name=args.project.name, |
| fuzz_target=project_qualified_fuzz_target_name) |
|
|
| cmd = ['wget', download_url, '-O', target_zip] |
| try: |
| with open(os.devnull, 'w') as stdout: |
| subprocess.check_call(cmd, stdout=stdout) |
| except OSError: |
| logger.error('Failed to download corpus') |
|
|
| target_fuzzer_dir = os.path.join(target_corpus_dir, fuzzer) |
| if not os.path.isdir(target_fuzzer_dir): |
| os.mkdir(target_fuzzer_dir) |
|
|
| target_corpus_dir = os.path.join(target_corpus_dir, fuzzer) |
| try: |
| with open(os.devnull, 'w') as stdout: |
| subprocess.check_call( |
| ['unzip', '-q', '-o', target_zip, '-d', target_fuzzer_dir], |
| stdout=stdout) |
| except OSError: |
| logger.error('Failed to unzip corpus') |
|
|
| |
| os.remove(target_zip) |
| return True |
|
|
|
|
| def download_corpora(args): |
| """Downloads most recent corpora from GCS for the given project.""" |
| if not check_project_exists(args.project): |
| return False |
|
|
| if args.public: |
| logger.info("Downloading public corpus") |
| try: |
| with open(os.devnull, 'w') as stdout: |
| subprocess.check_call(['wget', '--version'], stdout=stdout) |
| except OSError: |
| logger.error('wget not found') |
| return False |
| else: |
| try: |
| with open(os.devnull, 'w') as stdout: |
| subprocess.check_call(['gsutil', '--version'], stdout=stdout) |
| except OSError: |
| logger.error('gsutil not found. Please install it from ' |
| 'https://cloud.google.com/storage/docs/gsutil_install') |
| return False |
|
|
| if args.fuzz_target: |
| fuzz_targets = args.fuzz_target |
| else: |
| fuzz_targets = _get_fuzz_targets(args.project) |
|
|
| if not fuzz_targets: |
| logger.error( |
| 'Fuzz targets not found. Please build project first ' |
| '(python3 infra/helper.py build_fuzzers %s) so that download_corpora ' |
| 'can automatically identify targets.', args.project.name) |
| return False |
|
|
| corpus_dir = args.project.corpus |
|
|
| def _download_for_single_target(fuzz_target): |
| try: |
| if args.public: |
| _get_latest_public_corpus(args, fuzz_target) |
| else: |
| _get_latest_corpus(args.project, fuzz_target, corpus_dir) |
| return True |
| except Exception as error: |
| logger.error('Corpus download for %s failed: %s.', fuzz_target, |
| str(error)) |
| return False |
|
|
| logger.info('Downloading corpora for %s project to %s.', args.project.name, |
| corpus_dir) |
| thread_pool = ThreadPool() |
| return all(thread_pool.map(_download_for_single_target, fuzz_targets)) |
|
|
|
|
| def coverage(args): |
| """Generates code coverage using clang source based code coverage.""" |
| if args.corpus_dir and not args.fuzz_target: |
| logger.error( |
| '--corpus-dir requires specifying a particular fuzz target using ' |
| '--fuzz-target') |
| return False |
|
|
| if not check_project_exists(args.project): |
| return False |
|
|
| if args.project.language not in constants.LANGUAGES_WITH_COVERAGE_SUPPORT: |
| logger.error( |
| 'Project is written in %s, coverage for it is not supported yet.', |
| args.project.language) |
| return False |
|
|
| if (not args.no_corpus_download and not args.corpus_dir and |
| not args.project.is_external): |
| if not download_corpora(args): |
| return False |
|
|
| extra_cov_args = ( |
| f'{args.project.coverage_extra_args.strip()} {" ".join(args.extra_args)}') |
| env = [ |
| 'FUZZING_ENGINE=libfuzzer', |
| 'HELPER=True', |
| 'FUZZING_LANGUAGE=%s' % args.project.language, |
| 'PROJECT=%s' % args.project.name, |
| 'SANITIZER=coverage', |
| 'COVERAGE_EXTRA_ARGS=%s' % extra_cov_args, |
| 'ARCHITECTURE=' + args.architecture, |
| ] |
|
|
| if not args.no_serve: |
| env.append(f'HTTP_PORT={args.port}') |
|
|
| run_args = _env_to_docker_args(env) |
|
|
| if args.port: |
| run_args.extend([ |
| '-p', |
| '%s:%s' % (args.port, args.port), |
| ]) |
|
|
| if args.corpus_dir: |
| if not os.path.exists(args.corpus_dir): |
| logger.error('The path provided in --corpus-dir argument does not ' |
| 'exist.') |
| return False |
| corpus_dir = os.path.realpath(args.corpus_dir) |
| run_args.extend(['-v', '%s:/corpus/%s' % (corpus_dir, args.fuzz_target)]) |
| else: |
| run_args.extend(['-v', '%s:/corpus' % args.project.corpus]) |
|
|
| run_args.extend([ |
| '-v', |
| '%s:/out' % args.project.out, |
| '-t', |
| BASE_RUNNER_IMAGE, |
| ]) |
|
|
| run_args.append('coverage') |
| if args.fuzz_target: |
| run_args.append(args.fuzz_target) |
|
|
| result = docker_run(run_args, architecture=args.architecture) |
| if result: |
| logger.info('Successfully generated clang code coverage report.') |
| else: |
| logger.error('Failed to generate clang code coverage report.') |
|
|
| return result |
|
|
|
|
| def _introspector_prepare_corpus(args): |
| """Helper function for introspector runs to generate corpora.""" |
| parser = get_parser() |
| |
| if args.private_corpora or args.public_corpora: |
| corpora_command = ['download_corpora'] |
| if args.public_corpora: |
| corpora_command.append('--public') |
| corpora_command.append(args.project.name) |
| if not download_corpora(parse_args(parser, corpora_command)): |
| logger.error('Failed to download corpora') |
| return False |
| else: |
| fuzzer_targets = _get_fuzz_targets(args.project) |
| for fuzzer_name in fuzzer_targets: |
| |
| fuzzer_corpus_dir = args.project.corpus + f'/{fuzzer_name}' |
| if not os.path.isdir(fuzzer_corpus_dir): |
| os.makedirs(fuzzer_corpus_dir) |
| run_fuzzer_command = [ |
| 'run_fuzzer', '--sanitizer', 'address', '--corpus-dir', |
| fuzzer_corpus_dir, args.project.name, fuzzer_name |
| ] |
|
|
| parsed_args = parse_args(parser, run_fuzzer_command) |
| parsed_args.fuzzer_args = [ |
| f'-max_total_time={args.seconds}', '-detect_leaks=0' |
| ] |
| |
| |
| |
| run_fuzzer(parsed_args) |
| return True |
|
|
|
|
| def introspector(args): |
| """Runs a complete end-to-end run of introspector.""" |
| parser = get_parser() |
|
|
| args_to_append = [] |
| if args.source_path: |
| args_to_append.append(_get_absolute_path(args.source_path)) |
|
|
| |
| build_fuzzers_command = [ |
| 'build_fuzzers', '--sanitizer=address', args.project.name |
| ] + args_to_append |
| if not build_fuzzers(parse_args(parser, build_fuzzers_command)): |
| logger.error('Failed to build project with ASAN') |
| return False |
|
|
| if not _introspector_prepare_corpus(args): |
| return False |
|
|
| |
| build_fuzzers_command = [ |
| 'build_fuzzers', '--sanitizer=coverage', args.project.name |
| ] + args_to_append |
| if not build_fuzzers(parse_args(parser, build_fuzzers_command)): |
| logger.error('Failed to build project with coverage instrumentation') |
| return False |
|
|
| |
| coverage_command = [ |
| 'coverage', '--no-corpus-download', '--port', '', args.project.name |
| ] |
| if not coverage(parse_args(parser, coverage_command)): |
| logger.error('Failed to extract coverage') |
| return False |
|
|
| |
| build_fuzzers_command = [ |
| 'build_fuzzers', '--sanitizer=introspector', args.project.name |
| ] + args_to_append |
| if not build_fuzzers(parse_args(parser, build_fuzzers_command)): |
| logger.error('Failed to build project with introspector') |
| return False |
|
|
| introspector_dst = os.path.join(args.project.out, |
| "introspector-report/inspector") |
| shutil.rmtree(introspector_dst, ignore_errors=True) |
| shutil.copytree(os.path.join(args.project.out, "inspector"), introspector_dst) |
|
|
| |
| dst_cov_report = os.path.join(introspector_dst, "covreport") |
| shutil.copytree(os.path.join(args.project.out, "report"), dst_cov_report) |
|
|
| |
| src_target_cov_report = os.path.join(args.project.out, "report_target") |
| for target_cov_dir in os.listdir(src_target_cov_report): |
| dst_target_cov_report = os.path.join(dst_cov_report, target_cov_dir) |
| shutil.copytree(os.path.join(src_target_cov_report, target_cov_dir), |
| dst_target_cov_report) |
|
|
| logger.info('Introspector run complete. Report in %s', introspector_dst) |
| logger.info( |
| 'To browse the report, run: `python3 -m http.server 8008 --directory %s`' |
| 'and navigate to localhost:8008/fuzz_report.html in your browser', |
| introspector_dst) |
| return True |
|
|
|
|
| def run_fuzzer(args): |
| """Runs a fuzzer in the container.""" |
| if not check_project_exists(args.project): |
| return False |
|
|
| if not _check_fuzzer_exists(args.project, args.fuzzer_name, |
| args.architecture): |
| return False |
|
|
| env = [ |
| 'FUZZING_ENGINE=' + args.engine, |
| 'SANITIZER=' + args.sanitizer, |
| 'RUN_FUZZER_MODE=interactive', |
| 'HELPER=True', |
| ] |
|
|
| if args.e: |
| env += args.e |
|
|
| run_args = _env_to_docker_args(env) |
|
|
| if args.corpus_dir: |
| if not os.path.exists(args.corpus_dir): |
| logger.error('The path provided in --corpus-dir argument does not exist') |
| return False |
| corpus_dir = os.path.realpath(args.corpus_dir) |
| run_args.extend([ |
| '-v', |
| '{corpus_dir}:/tmp/{fuzzer}_corpus'.format(corpus_dir=corpus_dir, |
| fuzzer=args.fuzzer_name) |
| ]) |
|
|
| run_args.extend([ |
| '-v', |
| '%s:/out' % args.project.out, |
| '-t', |
| BASE_RUNNER_IMAGE, |
| 'run_fuzzer', |
| args.fuzzer_name, |
| ] + args.fuzzer_args) |
|
|
| return docker_run(run_args, architecture=args.architecture) |
|
|
|
|
| def fuzzbench_run_fuzzer(args): |
| """Runs a fuzz target built by fuzzbench in the container.""" |
| if not check_project_exists(args.project): |
| return False |
|
|
| env = [ |
| 'FUZZING_ENGINE=' + args.engine, |
| 'SANITIZER=' + args.sanitizer, |
| 'RUN_FUZZER_MODE=interactive', |
| 'HELPER=True', |
| f'FUZZ_TARGET={args.fuzzer_name}', |
| f'BENCHMARK={args.project.name}', |
| 'TRIAL_ID=1', |
| 'EXPERIMENT_TYPE=bug', |
| ] |
|
|
| if args.e: |
| env += args.e |
|
|
| run_args = _env_to_docker_args(env) |
|
|
| if args.corpus_dir: |
| if not os.path.exists(args.corpus_dir): |
| logger.error('The path provided in --corpus-dir argument does not exist') |
| return False |
| corpus_dir = os.path.realpath(args.corpus_dir) |
| run_args.extend([ |
| '-v', |
| '{corpus_dir}:/tmp/{fuzzer}_corpus'.format(corpus_dir=corpus_dir, |
| fuzzer=args.fuzzer_name) |
| ]) |
|
|
| with tempfile.TemporaryDirectory() as tmp_dir: |
| tmp_dir = os.path.abspath(tmp_dir) |
| fuzzbench_path = os.path.join(tmp_dir, 'fuzzbench') |
| subprocess.run([ |
| 'git', 'clone', 'https://github.com/google/fuzzbench', '--depth', '1', |
| fuzzbench_path |
| ], |
| check=True) |
| run_args.extend([ |
| '-v', |
| f'{args.project.out}:/out', |
| '-v', |
| f'{fuzzbench_path}:{fuzzbench_path}', |
| '-e', |
| f'FUZZBENCH_PATH={fuzzbench_path}', |
| f'aixcc-afc/{args.project.name}', |
| 'fuzzbench_run_fuzzer', |
| args.fuzzer_name, |
| ] + args.fuzzer_args) |
|
|
| return docker_run(run_args, architecture=args.architecture) |
|
|
|
|
| def fuzzbench_measure(args): |
| """Measure results from fuzzing with fuzzbench.""" |
| if not check_project_exists(args.project): |
| return False |
|
|
| with tempfile.TemporaryDirectory() as tmp_dir: |
| tmp_dir = os.path.abspath(tmp_dir) |
| fuzzbench_path = os.path.join(tmp_dir, 'fuzzbench') |
| subprocess.run([ |
| 'git', 'clone', 'https://github.com/google/fuzzbench', '--depth', '1', |
| fuzzbench_path |
| ], |
| check=True) |
| run_args = [ |
| '-v', f'{args.project.out}:/out', '-v', |
| f'{fuzzbench_path}:{fuzzbench_path}', '-e', |
| f'FUZZBENCH_PATH={fuzzbench_path}', '-e', 'EXPERIMENT_TYPE=bug', '-e', |
| f'FUZZ_TARGET={args.fuzz_target_name}', '-e', |
| f'FUZZER={args.engine_name}', '-e', f'BENCHMARK={args.project.name}', |
| f'aixcc-afc/{args.project.name}', 'fuzzbench_measure' |
| ] |
|
|
| return docker_run(run_args, 'x86_64') |
|
|
|
|
| def reproduce(args): |
| """Reproduces a specific test case from a specific project.""" |
| return reproduce_impl(args.project, args.fuzzer_name, args.valgrind, args.e, |
| args.fuzzer_args, args.testcase_path, args.architecture, |
| args.propagate_exit_codes, args.err_result, |
| privileged=args.privileged, timeout=args.timeout) |
|
|
|
|
| def reproduce_impl( |
| project, |
| fuzzer_name, |
| valgrind, |
| env_to_add, |
| fuzzer_args, |
| testcase_path, |
| architecture='x86_64', |
| propagate_exit_codes=False, |
| err_result=1, |
| run_function=docker_run, |
| privileged=True, |
| timeout=None): |
| """Reproduces a testcase in the container.""" |
|
|
| if not check_project_exists(project): |
| return err_result if propagate_exit_codes else False |
|
|
| if not _check_fuzzer_exists(project, fuzzer_name, architecture): |
| return err_result if propagate_exit_codes else False |
|
|
| debugger = '' |
| env = ['HELPER=True', 'ARCHITECTURE=' + architecture] |
| image_name = 'base-runner' |
|
|
| if valgrind: |
| debugger = 'valgrind --tool=memcheck --track-origins=yes --leak-check=full' |
|
|
| if debugger: |
| image_name = 'base-runner-debug' |
| env += ['DEBUGGER=' + debugger] |
|
|
| if env_to_add: |
| env += env_to_add |
|
|
| run_args = _env_to_docker_args(env) + [ |
| '-v', |
| '%s:/out' % project.out, |
| '-v', |
| '%s:/testcase' % _get_absolute_path(testcase_path), |
| '-t', |
| 'ghcr.io/aixcc-finals/%s%s' % (image_name, BASE_IMAGE_TAG), |
| 'reproduce', |
| fuzzer_name, |
| '-runs=100', |
| ] + fuzzer_args |
|
|
| return run_function(run_args, architecture=architecture, propagate_exit_codes=propagate_exit_codes, privileged=privileged, timeout=timeout) |
|
|
|
|
| def _validate_project_name(project_name): |
| """Validates |project_name| is a valid OSS-Fuzz project name.""" |
| if len(project_name) > MAX_PROJECT_NAME_LENGTH: |
| logger.error( |
| 'Project name needs to be less than or equal to %d characters.', |
| MAX_PROJECT_NAME_LENGTH) |
| return False |
|
|
| if not VALID_PROJECT_NAME_REGEX.match(project_name): |
| logger.info('Invalid project name: %s.', project_name) |
| return False |
|
|
| return True |
|
|
|
|
| def _validate_language(language): |
| if not LANGUAGE_REGEX.match(language): |
| logger.error('Invalid project language %s.', language) |
| return False |
|
|
| return True |
|
|
|
|
| def _create_build_integration_directory(directory): |
| """Returns True on successful creation of a build integration directory. |
| Suitable for OSS-Fuzz and external projects.""" |
| try: |
| os.makedirs(directory) |
| except OSError as error: |
| if error.errno != errno.EEXIST: |
| raise |
| logger.error('%s already exists.', directory) |
| return False |
| return True |
|
|
|
|
| def _template_project_file(filename, template, template_args, directory): |
| """Templates |template| using |template_args| and writes the result to |
| |directory|/|filename|. Sets the file to executable if |filename| is |
| build.sh.""" |
| file_path = os.path.join(directory, filename) |
| with open(file_path, 'w') as file_handle: |
| file_handle.write(template % template_args) |
|
|
| if filename == 'build.sh': |
| os.chmod(file_path, 0o755) |
|
|
|
|
| def generate(args): |
| """Generates empty project files.""" |
| return _generate_impl(args.project, args.language) |
|
|
|
|
| def _get_current_datetime(): |
| """Returns this year. Needed for mocking.""" |
| return datetime.datetime.now() |
|
|
|
|
| def _base_builder_from_language(language): |
| """Returns the base builder for the specified language.""" |
| return LANGUAGE_TO_BASE_BUILDER_IMAGE[language] |
|
|
|
|
| def _generate_impl(project, language): |
| """Implementation of generate(). Useful for testing.""" |
| if project.is_external: |
| |
| project_templates = templates.EXTERNAL_TEMPLATES |
| else: |
| |
| if not _validate_project_name(project.name): |
| return False |
| project_templates = templates.TEMPLATES |
|
|
| if not _validate_language(language): |
| return False |
|
|
| directory = project.build_integration_path |
| if not _create_build_integration_directory(directory): |
| return False |
|
|
| logger.info('Writing new files to: %s.', directory) |
|
|
| template_args = { |
| 'project_name': project.name, |
| 'base_builder': _base_builder_from_language(language), |
| 'language': language, |
| 'year': _get_current_datetime().year |
| } |
| for filename, template in project_templates.items(): |
| _template_project_file(filename, template, template_args, directory) |
| return True |
|
|
|
|
| def shell(args): |
| """Runs a shell within a docker image.""" |
| if not build_image_impl(args.project): |
| return False |
|
|
| env = [ |
| 'FUZZING_ENGINE=' + args.engine, |
| 'SANITIZER=' + args.sanitizer, |
| 'ARCHITECTURE=' + args.architecture, |
| 'HELPER=True', |
| ] |
|
|
| if args.project.name != 'base-runner-debug': |
| env.append('FUZZING_LANGUAGE=' + args.project.language) |
|
|
| if args.e: |
| env += args.e |
|
|
| if is_base_image(args.project.name): |
| image_project = 'aixcc-finals' |
| project_full = 'ghcr.io/%s/%s%s' % (image_project, args.project.name, BASE_IMAGE_TAG) |
| out_dir = _get_out_dir() |
| else: |
| image_project = 'aixcc-afc' |
| project_full = '%s/%s:%s' % (image_project, args.project.name, args.docker_image_tag) |
| out_dir = args.project.out |
|
|
| run_args = _env_to_docker_args(env) |
| if args.source_path: |
| workdir = _workdir_from_dockerfile(args.project) |
| run_args.extend([ |
| '-v', |
| '%s:%s' % (_get_absolute_path(args.source_path), workdir), |
| ]) |
|
|
|
|
| run_args.extend([ |
| '-v', |
| '%s:/out' % out_dir, '-v', |
| '%s:/work' % args.project.work, '-t', |
| '%s' % (project_full), '/bin/bash' |
| ]) |
|
|
| docker_run(run_args, architecture=args.architecture) |
| return True |
|
|
|
|
| def pull_images(language=None): |
| """Pulls base images used to build projects in language lang (or all if lang |
| is None).""" |
| for base_image_lang, base_images in BASE_IMAGES.items(): |
| if (language is None or base_image_lang == 'generic' or |
| base_image_lang == language): |
| for base_image in base_images: |
| if not docker_pull(base_image): |
| return False |
|
|
| return True |
|
|
|
|
| if __name__ == '__main__': |
| sys.exit(main()) |
|
|