| // Copyright 2020 The Android Open Source Project |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package rust |
| |
| import ( |
| "path/filepath" |
| |
| "android/soong/android" |
| "android/soong/cc" |
| "android/soong/fuzz" |
| "android/soong/rust/config" |
| ) |
| |
| func init() { |
| android.RegisterModuleType("rust_fuzz", RustFuzzFactory) |
| android.RegisterModuleType("rust_fuzz_host", RustFuzzHostFactory) |
| } |
| |
| type fuzzDecorator struct { |
| *binaryDecorator |
| |
| fuzzPackagedModule fuzz.FuzzPackagedModule |
| sharedLibraries android.RuleBuilderInstalls |
| installedSharedDeps []string |
| } |
| |
| var _ compiler = (*fuzzDecorator)(nil) |
| |
| // rust_binary produces a binary that is runnable on a device. |
| func RustFuzzFactory() android.Module { |
| module, _ := NewRustFuzz(android.HostAndDeviceSupported) |
| return module.Init() |
| } |
| |
| func RustFuzzHostFactory() android.Module { |
| module, _ := NewRustFuzz(android.HostSupported) |
| return module.Init() |
| } |
| |
| func NewRustFuzz(hod android.HostOrDeviceSupported) (*Module, *fuzzDecorator) { |
| module, binary := NewRustBinary(hod) |
| fuzz := &fuzzDecorator{ |
| binaryDecorator: binary, |
| } |
| |
| // Change the defaults for the binaryDecorator's baseCompiler |
| fuzz.binaryDecorator.baseCompiler.dir = "fuzz" |
| fuzz.binaryDecorator.baseCompiler.dir64 = "fuzz" |
| fuzz.binaryDecorator.baseCompiler.location = InstallInData |
| module.sanitize.SetSanitizer(cc.Fuzzer, true) |
| |
| // The fuzzer runtime is not present for darwin or bionic host modules, so disable rust_fuzz modules for these. |
| android.AddLoadHook(module, func(ctx android.LoadHookContext) { |
| |
| extraProps := struct { |
| Target struct { |
| Darwin struct { |
| Enabled *bool |
| } |
| Linux_bionic struct { |
| Enabled *bool |
| } |
| } |
| }{} |
| extraProps.Target.Darwin.Enabled = cc.BoolPtr(false) |
| extraProps.Target.Linux_bionic.Enabled = cc.BoolPtr(false) |
| ctx.AppendProperties(&extraProps) |
| }) |
| |
| module.compiler = fuzz |
| return module, fuzz |
| } |
| |
| func (fuzzer *fuzzDecorator) compilerFlags(ctx ModuleContext, flags Flags) Flags { |
| flags = fuzzer.binaryDecorator.compilerFlags(ctx, flags) |
| |
| // `../lib` for installed fuzz targets (both host and device), and `./lib` for fuzz target packages. |
| flags.LinkFlags = append(flags.LinkFlags, `-Wl,-rpath,\$$ORIGIN/lib`) |
| |
| if ctx.InstallInVendor() { |
| flags.LinkFlags = append(flags.LinkFlags, `-Wl,-rpath,\$$ORIGIN/../../lib`) |
| } else { |
| flags.LinkFlags = append(flags.LinkFlags, `-Wl,-rpath,\$$ORIGIN/../lib`) |
| |
| } |
| return flags |
| } |
| |
| func (fuzzer *fuzzDecorator) compilerDeps(ctx DepsContext, deps Deps) Deps { |
| if libFuzzerRuntimeLibrary := config.LibFuzzerRuntimeLibrary(ctx.toolchain()); libFuzzerRuntimeLibrary != "" { |
| deps.StaticLibs = append(deps.StaticLibs, libFuzzerRuntimeLibrary) |
| } |
| deps.SharedLibs = append(deps.SharedLibs, "libc++") |
| deps.Rlibs = append(deps.Rlibs, "liblibfuzzer_sys") |
| |
| deps = fuzzer.binaryDecorator.compilerDeps(ctx, deps) |
| |
| return deps |
| } |
| |
| func (fuzzer *fuzzDecorator) compilerProps() []interface{} { |
| return append(fuzzer.binaryDecorator.compilerProps(), |
| &fuzzer.fuzzPackagedModule.FuzzProperties) |
| } |
| |
| func (fuzzer *fuzzDecorator) compile(ctx ModuleContext, flags Flags, deps PathDeps) buildOutput { |
| |
| out := fuzzer.binaryDecorator.compile(ctx, flags, deps) |
| |
| return out |
| } |
| |
| func (fuzzer *fuzzDecorator) stdLinkage(ctx *depsContext) RustLinkage { |
| return RlibLinkage |
| } |
| |
| func (fuzzer *fuzzDecorator) autoDep(ctx android.BottomUpMutatorContext) autoDep { |
| return rlibAutoDep |
| } |
| |
| func (fuzz *fuzzDecorator) install(ctx ModuleContext) { |
| fuzz.binaryDecorator.baseCompiler.dir = filepath.Join( |
| "fuzz", ctx.Target().Arch.ArchType.String(), ctx.ModuleName()) |
| fuzz.binaryDecorator.baseCompiler.dir64 = filepath.Join( |
| "fuzz", ctx.Target().Arch.ArchType.String(), ctx.ModuleName()) |
| fuzz.binaryDecorator.baseCompiler.install(ctx) |
| |
| fuzz.fuzzPackagedModule = cc.PackageFuzzModule(ctx, fuzz.fuzzPackagedModule, pctx) |
| |
| installBase := "fuzz" |
| |
| // Grab the list of required shared libraries. |
| fuzz.sharedLibraries, _ = cc.CollectAllSharedDependencies(ctx) |
| |
| for _, ruleBuilderInstall := range fuzz.sharedLibraries { |
| install := ruleBuilderInstall.To |
| |
| fuzz.installedSharedDeps = append(fuzz.installedSharedDeps, |
| cc.SharedLibraryInstallLocation( |
| install, ctx.Host(), installBase, ctx.Arch().ArchType.String())) |
| |
| // Also add the dependency on the shared library symbols dir. |
| if !ctx.Host() { |
| fuzz.installedSharedDeps = append(fuzz.installedSharedDeps, |
| cc.SharedLibrarySymbolsInstallLocation(install, installBase, ctx.Arch().ArchType.String())) |
| } |
| } |
| } |