#!/bin/bash -eu # Copyright 2019 Google Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ################################################################################ # PHP's zend_function union is incompatible with the object-size sanitizer export CFLAGS="$CFLAGS -fno-sanitize=object-size" export CXXFLAGS="$CXXFLAGS -fno-sanitize=object-size" # Disable JIT profitability checks. export CFLAGS="$CFLAGS -DPROFITABILITY_CHECKS=0" # Make sure the right assembly files are picked BUILD_FLAG="" if [ "$ARCHITECTURE" = "i386" ]; then BUILD_FLAG="--build=i686-pc-linux-gnu" fi # build project ./buildconf ./configure $BUILD_FLAG \ --disable-all \ --enable-debug-assertions \ --enable-option-checking=fatal \ --enable-fuzzer \ --enable-exif \ --enable-opcache \ --without-pcre-jit \ --disable-phpdbg \ --disable-cgi \ --with-pic make -j$(nproc) # Generate corpuses and dictionaries. sapi/cli/php sapi/fuzzer/generate_all.php # Copy dictionaries to expected locations. cp sapi/fuzzer/dict/unserialize $OUT/php-fuzz-unserialize.dict cp sapi/fuzzer/dict/parser $OUT/php-fuzz-parser.dict cp sapi/fuzzer/json.dict $OUT/php-fuzz-json.dict FUZZERS="php-fuzz-json php-fuzz-exif php-fuzz-unserialize php-fuzz-unserializehash php-fuzz-parser php-fuzz-execute" for fuzzerName in $FUZZERS; do cp sapi/fuzzer/$fuzzerName $OUT/ done # The JIT fuzzer is fundamentally incompatible with memory sanitizer, # as that would require the JIT to emit msan instrumentation itself. # In practice it is currently also incompatible with ubsan. if [ "$SANITIZER" != "memory" ] && [ "$SANITIZER" != "undefined" ]; then cp sapi/fuzzer/php-fuzz-function-jit $OUT/ cp sapi/fuzzer/php-fuzz-tracing-jit $OUT/ # Copy opcache.so extension, which does not support static linking. mkdir -p $OUT/modules cp modules/opcache.so $OUT/modules fi # copy corpora from source for fuzzerName in `ls sapi/fuzzer/corpus`; do zip -j $OUT/php-fuzz-${fuzzerName}_seed_corpus.zip sapi/fuzzer/corpus/${fuzzerName}/* done