Loading Android.bp +1 −0 Original line number Diff line number Diff line Loading @@ -178,6 +178,7 @@ bootstrap_go_package { "cc/linker.go", "cc/binary.go", "cc/fuzz.go", "cc/library.go", "cc/object.go", "cc/test.go", Loading cc/cc_test.go +13 −0 Original line number Diff line number Diff line Loading @@ -2264,6 +2264,19 @@ func TestStaticDepsOrderWithStubs(t *testing.T) { } } // Simple smoke test for the cc_fuzz target that ensures the rule compiles // correctly. func TestFuzzTarget(t *testing.T) { ctx := testCc(t, ` cc_fuzz { name: "fuzz_smoke_test", srcs: ["foo.c"], }`) variant := "android_arm64_armv8-a_core" ctx.ModuleForTests("fuzz_smoke_test", variant).Rule("cc") } func assertString(t *testing.T, got, expected string) { t.Helper() if got != expected { Loading cc/config/toolchain.go +7 −0 Original line number Diff line number Diff line Loading @@ -181,6 +181,9 @@ func LibclangRuntimeLibrary(t Toolchain, library string) string { if arch == "" { return "" } if !t.Bionic() { return "libclang_rt." + library + "-" + arch } return "libclang_rt." + library + "-" + arch + "-android" } Loading Loading @@ -224,6 +227,10 @@ func ScudoMinimalRuntimeLibrary(t Toolchain) string { return LibclangRuntimeLibrary(t, "scudo_minimal") } func LibFuzzerRuntimeLibrary(t Toolchain) string { return LibclangRuntimeLibrary(t, "fuzzer") } func ToolPath(t Toolchain) string { if p := t.ToolPath(); p != "" { return p Loading cc/config/x86_linux_host.go +8 −0 Original line number Diff line number Diff line Loading @@ -233,6 +233,14 @@ func (t *toolchainLinuxX8664) YasmFlags() string { return "${config.LinuxX8664YasmFlags}" } func (toolchainLinuxX86) LibclangRuntimeLibraryArch() string { return "i686" } func (toolchainLinuxX8664) LibclangRuntimeLibraryArch() string { return "x86_64" } func (t *toolchainLinux) AvailableLibraries() []string { return linuxAvailableLibraries } Loading cc/fuzz.go 0 → 100644 +106 −0 Original line number Diff line number Diff line // Copyright 2016 Google Inc. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package cc import ( "android/soong/android" "android/soong/cc/config" ) func init() { android.RegisterModuleType("cc_fuzz", FuzzFactory) } // cc_fuzz creates a host/device fuzzer binary. Host binaries can be found at // $ANDROID_HOST_OUT/fuzz/, and device binaries can be found at /data/fuzz on // your device, or $ANDROID_PRODUCT_OUT/data/fuzz in your build tree. func FuzzFactory() android.Module { module := NewFuzz(android.HostAndDeviceSupported) return module.Init() } func NewFuzzInstaller() *baseInstaller { return NewBaseInstaller("fuzz", "fuzz", InstallInData) } type fuzzBinary struct { *binaryDecorator *baseCompiler } func (fuzz *fuzzBinary) linkerProps() []interface{} { props := fuzz.binaryDecorator.linkerProps() return props } func (fuzz *fuzzBinary) linkerInit(ctx BaseModuleContext) { // Add ../lib[64] to rpath so that out/host/linux-x86/fuzz/<fuzzer> can // find out/host/linux-x86/lib[64]/library.so runpaths := []string{"../lib"} for _, runpath := range runpaths { if ctx.toolchain().Is64Bit() { runpath += "64" } fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths = append( fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths, runpath) } // add "" to rpath so that fuzzer binaries can find libraries in their own fuzz directory fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths = append( fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths, "") fuzz.binaryDecorator.linkerInit(ctx) } func (fuzz *fuzzBinary) linkerDeps(ctx DepsContext, deps Deps) Deps { deps.StaticLibs = append(deps.StaticLibs, config.LibFuzzerRuntimeLibrary(ctx.toolchain())) deps = fuzz.binaryDecorator.linkerDeps(ctx, deps) return deps } func (fuzz *fuzzBinary) linkerFlags(ctx ModuleContext, flags Flags) Flags { flags = fuzz.binaryDecorator.linkerFlags(ctx, flags) return flags } func (fuzz *fuzzBinary) install(ctx ModuleContext, file android.Path) { fuzz.binaryDecorator.baseInstaller.dir = "fuzz" fuzz.binaryDecorator.baseInstaller.dir64 = "fuzz" fuzz.binaryDecorator.baseInstaller.install(ctx, file) } func NewFuzz(hod android.HostOrDeviceSupported) *Module { module, binary := NewBinary(hod) // TODO(mitchp): The toolchain does not currently export the x86 (32-bit) // variant of libFuzzer for host. There is no way to only disable the host // 32-bit variant, so we specify cc_fuzz targets as 64-bit only. This doesn't // hurt anyone, as cc_fuzz is mostly for experimental targets as of this // moment. module.multilib = "64" binary.baseInstaller = NewFuzzInstaller() module.sanitize.SetSanitizer(fuzzer, true) fuzz := &fuzzBinary{ binaryDecorator: binary, baseCompiler: NewBaseCompiler(), } module.compiler = fuzz module.linker = fuzz module.installer = fuzz return module } Loading
Android.bp +1 −0 Original line number Diff line number Diff line Loading @@ -178,6 +178,7 @@ bootstrap_go_package { "cc/linker.go", "cc/binary.go", "cc/fuzz.go", "cc/library.go", "cc/object.go", "cc/test.go", Loading
cc/cc_test.go +13 −0 Original line number Diff line number Diff line Loading @@ -2264,6 +2264,19 @@ func TestStaticDepsOrderWithStubs(t *testing.T) { } } // Simple smoke test for the cc_fuzz target that ensures the rule compiles // correctly. func TestFuzzTarget(t *testing.T) { ctx := testCc(t, ` cc_fuzz { name: "fuzz_smoke_test", srcs: ["foo.c"], }`) variant := "android_arm64_armv8-a_core" ctx.ModuleForTests("fuzz_smoke_test", variant).Rule("cc") } func assertString(t *testing.T, got, expected string) { t.Helper() if got != expected { Loading
cc/config/toolchain.go +7 −0 Original line number Diff line number Diff line Loading @@ -181,6 +181,9 @@ func LibclangRuntimeLibrary(t Toolchain, library string) string { if arch == "" { return "" } if !t.Bionic() { return "libclang_rt." + library + "-" + arch } return "libclang_rt." + library + "-" + arch + "-android" } Loading Loading @@ -224,6 +227,10 @@ func ScudoMinimalRuntimeLibrary(t Toolchain) string { return LibclangRuntimeLibrary(t, "scudo_minimal") } func LibFuzzerRuntimeLibrary(t Toolchain) string { return LibclangRuntimeLibrary(t, "fuzzer") } func ToolPath(t Toolchain) string { if p := t.ToolPath(); p != "" { return p Loading
cc/config/x86_linux_host.go +8 −0 Original line number Diff line number Diff line Loading @@ -233,6 +233,14 @@ func (t *toolchainLinuxX8664) YasmFlags() string { return "${config.LinuxX8664YasmFlags}" } func (toolchainLinuxX86) LibclangRuntimeLibraryArch() string { return "i686" } func (toolchainLinuxX8664) LibclangRuntimeLibraryArch() string { return "x86_64" } func (t *toolchainLinux) AvailableLibraries() []string { return linuxAvailableLibraries } Loading
cc/fuzz.go 0 → 100644 +106 −0 Original line number Diff line number Diff line // Copyright 2016 Google Inc. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package cc import ( "android/soong/android" "android/soong/cc/config" ) func init() { android.RegisterModuleType("cc_fuzz", FuzzFactory) } // cc_fuzz creates a host/device fuzzer binary. Host binaries can be found at // $ANDROID_HOST_OUT/fuzz/, and device binaries can be found at /data/fuzz on // your device, or $ANDROID_PRODUCT_OUT/data/fuzz in your build tree. func FuzzFactory() android.Module { module := NewFuzz(android.HostAndDeviceSupported) return module.Init() } func NewFuzzInstaller() *baseInstaller { return NewBaseInstaller("fuzz", "fuzz", InstallInData) } type fuzzBinary struct { *binaryDecorator *baseCompiler } func (fuzz *fuzzBinary) linkerProps() []interface{} { props := fuzz.binaryDecorator.linkerProps() return props } func (fuzz *fuzzBinary) linkerInit(ctx BaseModuleContext) { // Add ../lib[64] to rpath so that out/host/linux-x86/fuzz/<fuzzer> can // find out/host/linux-x86/lib[64]/library.so runpaths := []string{"../lib"} for _, runpath := range runpaths { if ctx.toolchain().Is64Bit() { runpath += "64" } fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths = append( fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths, runpath) } // add "" to rpath so that fuzzer binaries can find libraries in their own fuzz directory fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths = append( fuzz.binaryDecorator.baseLinker.dynamicProperties.RunPaths, "") fuzz.binaryDecorator.linkerInit(ctx) } func (fuzz *fuzzBinary) linkerDeps(ctx DepsContext, deps Deps) Deps { deps.StaticLibs = append(deps.StaticLibs, config.LibFuzzerRuntimeLibrary(ctx.toolchain())) deps = fuzz.binaryDecorator.linkerDeps(ctx, deps) return deps } func (fuzz *fuzzBinary) linkerFlags(ctx ModuleContext, flags Flags) Flags { flags = fuzz.binaryDecorator.linkerFlags(ctx, flags) return flags } func (fuzz *fuzzBinary) install(ctx ModuleContext, file android.Path) { fuzz.binaryDecorator.baseInstaller.dir = "fuzz" fuzz.binaryDecorator.baseInstaller.dir64 = "fuzz" fuzz.binaryDecorator.baseInstaller.install(ctx, file) } func NewFuzz(hod android.HostOrDeviceSupported) *Module { module, binary := NewBinary(hod) // TODO(mitchp): The toolchain does not currently export the x86 (32-bit) // variant of libFuzzer for host. There is no way to only disable the host // 32-bit variant, so we specify cc_fuzz targets as 64-bit only. This doesn't // hurt anyone, as cc_fuzz is mostly for experimental targets as of this // moment. module.multilib = "64" binary.baseInstaller = NewFuzzInstaller() module.sanitize.SetSanitizer(fuzzer, true) fuzz := &fuzzBinary{ binaryDecorator: binary, baseCompiler: NewBaseCompiler(), } module.compiler = fuzz module.linker = fuzz module.installer = fuzz return module }