| #!/usr/bin/env bash |
| |
| # Script for generating fuzztest.bazelrc. |
| |
| set -euf -o pipefail |
| |
| cat <<EOF |
| ### DO NOT EDIT. Generated file. |
| # |
| # To regenerate, run the following from your project's workspace: |
| # |
| # bazel run @com_google_fuzztest//bazel:setup_configs > fuzztest.bazelrc |
| # |
| # And don't forget to add the following to your project's .bazelrc: |
| # |
| # try-import %workspace%/fuzztest.bazelrc |
| |
| EOF |
| |
| cat <<EOF |
| ### Common options. |
| # |
| # Do not use directly. |
| |
| # Standard define for \"ifdef-ing\" any fuzz test specific code. |
| build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION |
| |
| # In fuzz tests, we want to catch assertion violations even in optimized builds. |
| build:fuzztest-common --copt=-UNDEBUG |
| |
| # Enable libc++ assertions. |
| # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode |
| build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1 |
| |
| EOF |
| |
| cat <<EOF |
| ### ASan (Address Sanitizer) build configuration. |
| # |
| # Use with: --config=asan |
| |
| build:asan --linkopt=-fsanitize=address |
| build:asan --copt=-fsanitize=address |
| |
| # We rely on the following flag instead of the compiler provided |
| # __has_feature(address_sanitizer) to know that we have an ASAN build even in |
| # the uninstrumented runtime. |
| build:asan --copt=-DADDRESS_SANITIZER |
| |
| EOF |
| |
| cat <<EOF |
| ### FuzzTest build configuration. |
| # |
| # Use with: --config=fuzztest |
| # |
| # Note that this configuration includes the ASan configuration. |
| |
| build:fuzztest --config=asan |
| build:fuzztest --config=fuzztest-common |
| |
| # Link statically. |
| build:fuzztest --dynamic_mode=off |
| |
| EOF |
| |
| REPO_NAME="${1}" |
| # When used in the fuzztest repo itself. |
| if [[ ${REPO_NAME} == "@" ]]; then |
| COMMON_FILTER="//common:" |
| FUZZTEST_FILTER="//fuzztest:,//fuzztest/internal:,//fuzztest/internal/domains:" |
| CENTIPEDE_FILTER="//centipede:,-//centipede/.*fuzz_target" |
| else # When used in a client repo. |
| COMMON_FILTER="common/.*" |
| FUZZTEST_FILTER="fuzztest/.*" |
| CENTIPEDE_FILTER="centipede/.*,-centipede/.*fuzz_target" |
| fi |
| |
| cat <<EOF |
| # We apply coverage tracking instrumentation to everything but Centipede and the |
| # FuzzTest framework itself (including GoogleTest and GoogleMock). |
| build:fuzztest --copt=-fsanitize-coverage=inline-8bit-counters,trace-cmp,pc-table |
| build:fuzztest --per_file_copt=${COMMON_FILTER},${FUZZTEST_FILTER},${CENTIPEDE_FILTER},googletest/.*,googlemock/.*@-fsanitize-coverage=0 |
| |
| EOF |
| |
| cat <<EOF |
| ### Experimental FuzzTest build configuration. |
| # |
| # Use with: --config=fuzztest-experimental |
| # |
| # Use this instead of --config=fuzztest when building test binaries to run with |
| # Centipede. Eventually, this will be consolidated with --config=fuzztest. |
| # Note that this configuration doesn't include the ASan configuration. If you |
| # want to use both, you can use --config=fuzztest-experimental --config=asan. |
| |
| build:fuzztest-experimental --config=fuzztest-common |
| build:fuzztest-experimental --@com_google_fuzztest//fuzztest:centipede_integration |
| |
| # Generate line tables for debugging. |
| build:fuzztest-experimental --copt=-gline-tables-only |
| build:fuzztest-experimental --strip=never |
| |
| # Prevent memcmp & co from being inlined. |
| build:fuzztest-experimental --copt=-fno-builtin |
| |
| # Disable heap checking. |
| build:fuzztest-experimental --copt=-DHEAPCHECK_DISABLE |
| |
| # Link statically. |
| build:fuzztest-experimental --dynamic_mode=off |
| |
| # We apply coverage tracking instrumentation to everything but Centipede and the |
| # FuzzTest framework itself (including GoogleTest and GoogleMock). |
| # TODO(b/374840534): Add -fsanitize-coverage=control-flow once we start building |
| # with clang 16+. |
| build:fuzztest-experimental --copt=-fsanitize-coverage=trace-pc-guard,pc-table,trace-loads,trace-cmp |
| build:fuzztest-experimental --per_file_copt=${COMMON_FILTER},${FUZZTEST_FILTER},${CENTIPEDE_FILTER},googletest/.*,googlemock/.*@-fsanitize-coverage=0 |
| |
| EOF |
| |
| # Do not use the extra configurations below, unless you know what you're doing. |
| |
| EXTRA_CONFIGS="${EXTRA_CONFIGS:-none}" |
| |
| # Find llvm-config. |
| LLVM_CONFIG=$(command -v llvm-config || |
| command -v llvm-config-15 || |
| command -v llvm-config-14 || |
| command -v llvm-config-13 || |
| command -v llvm-config-12 || |
| echo "") |
| |
| if [[ ${EXTRA_CONFIGS} != "none" && -z "${LLVM_CONFIG}" ]]; then |
| echo "ERROR: Couldn't generate config, because cannot find llvm-config." |
| echo "" |
| echo "Please install clang and llvm, e.g.:" |
| echo "" |
| echo " sudo apt install clang llvm" |
| exit 1 |
| fi |
| |
| find_libclang_rt() |
| { |
| libname=$1 |
| libdir=$(${LLVM_CONFIG} --libdir) |
| |
| # The path to a compiler runtime library for a particular clang version "N" |
| # may vary from between distros, including: |
| # $libdir/lib/clang/<N>/lib/linux/libclang_rt.$libname-x86_64.a |
| # $libdir/lib/clang/<N>/lib/x86_64-unknown-linux-gnu/libclang_rt.$libname.a |
| find $libdir -name "libclang_rt.${libname}*" | grep x86_64 | head -1 |
| } |
| |
| if [[ ${EXTRA_CONFIGS} == *"libfuzzer"* ]]; then |
| |
| cat <<EOF |
| ### libFuzzer compatibility mode. |
| # |
| # Use with: --config=libfuzzer |
| |
| build:libfuzzer --config=asan |
| build:libfuzzer --config=fuzztest-common |
| build:libfuzzer --copt=-DFUZZTEST_COMPATIBILITY_MODE |
| build:libfuzzer --copt=-fsanitize=fuzzer-no-link |
| build:libfuzzer --linkopt=$(find_libclang_rt fuzzer_no_main) |
| EOF |
| |
| fi # libFuzzer |
| |
| |
| # OSS-Fuzz |
| if [[ -n ${FUZZING_ENGINE:-} && -n ${SANITIZER:-} ]]; then |
| cat <<EOF |
| ### OSS-Fuzz compatibility mode. |
| # |
| # Use with: --config=oss-fuzz |
| build:oss-fuzz --copt=-DFUZZTEST_COMPATIBILITY_MODE |
| build:oss-fuzz --dynamic_mode=off |
| build:oss-fuzz --action_env=CC=${CC} |
| build:oss-fuzz --action_env=CXX=${CXX} |
| |
| EOF |
| |
| ossfuz_flag_to_bazel_config_flag() |
| { |
| bazel_flag=$1 |
| flag=$2 |
| |
| # When we have something along -fno-sanitize-recover=bool,array,...,.. we |
| # need to split them out and write each assignment without use of commas. Otherwise |
| # the per_file_copt option splits the comma string with spaces, which causes the |
| # build command to be erroneous. |
| if [[ $flag == *","* && $flag == *"="* ]]; then |
| # Split from first occurrence of equals. |
| flag_split_over_equals=(${flag//=/ }) |
| lhs=${flag_split_over_equals[0]} |
| comma_values=($(echo ${flag_split_over_equals[1]} | tr ',' " ")) |
| for val in "${comma_values[@]}"; do |
| echo "build:oss-fuzz $bazel_flag=${lhs}=${val}" |
| done |
| else |
| if [[ $flag != *"no-as-needed"* ]]; then |
| # Flags captured here include -fsanitize=fuzzer-no-link, -fsanitize=addresss. |
| echo "build:oss-fuzz $bazel_flag=$flag" |
| fi |
| fi |
| |
| } |
| for flag in $CFLAGS; do |
| echo "$(ossfuz_flag_to_bazel_config_flag "--conlyopt" $flag)" |
| echo "$(ossfuz_flag_to_bazel_config_flag "--linkopt" $flag)" |
| done |
| |
| for flag in $CXXFLAGS; do |
| echo "$(ossfuz_flag_to_bazel_config_flag "--cxxopt" $flag)" |
| echo "$(ossfuz_flag_to_bazel_config_flag "--linkopt" $flag)" |
| done |
| |
| if [ "$SANITIZER" = "undefined" ]; then |
| echo "build:oss-fuzz --linkopt=$(find_libclang_rt ubsan_standalone_cxx)" |
| fi |
| if [ "$FUZZING_ENGINE" = "libfuzzer" ]; then |
| echo "build:oss-fuzz --linkopt=$(find_libclang_rt fuzzer_no_main)" |
| fi |
| |
| # AFL version in oss-fuzz does not support LLVMFuzzerRunDriver. It must be updated first. |
| #if [ "$FUZZING_ENGINE" = "afl" ]; then |
| # echo "build:oss-fuzz --linkopt=${LIB_FUZZING_ENGINE}" |
| #fi |
| fi # OSS-Fuzz |