mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-12-25 22:08:16 -05:00
2abc77996e
It is required for cross-compilation. * gnu/packages/debug.scm (c-reduce)[inputs]: Add 'bash-minimal'. (scanmem)[inputs]: Likewise. Signed-off-by: Maxim Cournoyer <maxim.cournoyer@gmail.com> Change-Id: I6cae82e90a994384aa3ddd737dd885444a0f5cad
1031 lines
43 KiB
Scheme
1031 lines
43 KiB
Scheme
;;; GNU Guix --- Functional package management for GNU
|
||
;;; Copyright © 2014, 2015, 2016, 2017, 2019-2022 Eric Bavier <bavier@posteo.net>
|
||
;;; Copyright © 2016, 2017, 2018, 2020, 2021 Efraim Flashner <efraim@flashner.co.il>
|
||
;;; Copyright © 2018, 2020 Tobias Geerinckx-Rice <me@tobias.gr>
|
||
;;; Copyright © 2018, 2019 Rutger Helling <rhelling@mykolab.com>
|
||
;;; Copyright © 2019 Pkill -9 <pkill9@runbox.com>
|
||
;;; Copyright © 2020 Vincent Legoll <vincent.legoll@gmail.com>
|
||
;;; Copyright © 2020, 2021 Morgan Smith <Morgan.J.Smith@outlook.com>
|
||
;;; Copyright © 2020 Maxim Cournoyer <maxim.cournoyer@gmail.com>
|
||
;;; Copyright © 2021 Felix Gruber <felgru@posteo.net>
|
||
;;; Copyright © 2021 Foo Chuan Wei <chuanwei.foo@hotmail.com>
|
||
;;; Copyright © 2022 Michael Rohleder <mike@rohleder.de>
|
||
;;; Copyright © 2022 Matthew James Kraai <kraai@ftbfs.org>
|
||
;;; Copyright © 2023 Andy Tai <atai@atai.org>
|
||
;;; Copyright © 2023 Ricardo Wurmus <rekado@elephly.net>
|
||
;;; Copyright © 2024 Raven Hallsby <karl@hallsby.com>
|
||
;;;
|
||
;;; This file is part of GNU Guix.
|
||
;;;
|
||
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
||
;;; under the terms of the GNU General Public License as published by
|
||
;;; the Free Software Foundation; either version 3 of the License, or (at
|
||
;;; your option) any later version.
|
||
;;;
|
||
;;; GNU Guix is distributed in the hope that it will be useful, but
|
||
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
;;; GNU General Public License for more details.
|
||
;;;
|
||
;;; You should have received a copy of the GNU General Public License
|
||
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
||
|
||
(define-module (gnu packages debug)
|
||
#:use-module (guix packages)
|
||
#:use-module ((guix licenses) #:prefix license:)
|
||
#:use-module (guix download)
|
||
#:use-module (guix git-download)
|
||
#:use-module (guix utils)
|
||
#:use-module (guix build-system gnu)
|
||
#:use-module (guix build-system cmake)
|
||
#:use-module (guix build-system go)
|
||
#:use-module (guix gexp)
|
||
#:use-module (gnu packages)
|
||
#:use-module (gnu packages attr)
|
||
#:use-module (gnu packages autotools)
|
||
#:use-module (gnu packages base)
|
||
#:use-module (gnu packages bash)
|
||
#:use-module (gnu packages bison)
|
||
#:use-module (gnu packages c)
|
||
#:use-module (gnu packages cpp)
|
||
#:use-module (gnu packages check)
|
||
#:use-module (gnu packages code)
|
||
#:use-module (gnu packages compression)
|
||
#:use-module (gnu packages flex)
|
||
#:use-module (gnu packages gcc)
|
||
#:use-module (gnu packages gdb)
|
||
#:use-module (gnu packages glib)
|
||
#:use-module (gnu packages gtk)
|
||
#:use-module (gnu packages golang)
|
||
#:use-module (gnu packages image)
|
||
#:use-module (gnu packages lesstif)
|
||
#:use-module (gnu packages libusb)
|
||
#:use-module (gnu packages linux)
|
||
#:use-module (gnu packages llvm)
|
||
#:use-module (gnu packages multiprecision)
|
||
#:use-module (gnu packages ncurses)
|
||
#:use-module (gnu packages ninja)
|
||
#:use-module (gnu packages perl)
|
||
#:use-module (gnu packages pkg-config)
|
||
#:use-module (gnu packages pretty-print)
|
||
#:use-module (gnu packages python)
|
||
#:use-module (gnu packages python-check)
|
||
#:use-module (gnu packages python-xyz)
|
||
#:use-module (gnu packages qt)
|
||
#:use-module (gnu packages readline)
|
||
#:use-module (gnu packages serialization)
|
||
#:use-module (gnu packages texinfo)
|
||
#:use-module (gnu packages virtualization)
|
||
#:use-module (gnu packages xdisorg)
|
||
#:use-module (gnu packages xorg)
|
||
#:use-module (ice-9 match)
|
||
#:use-module (srfi srfi-1))
|
||
|
||
(define-public delta
|
||
(package
|
||
(name "delta")
|
||
(version "2006.08.03")
|
||
(source
|
||
(origin
|
||
(method url-fetch)
|
||
(uri (list
|
||
(string-append "mirror://debian/pool/main/d/delta/"
|
||
"delta_" version ".orig.tar.gz")))
|
||
(sha256
|
||
(base32
|
||
"184wh35pf2ddx97319s6sgkzpz48xxkbwzcjpycv009bm53lh61q"))))
|
||
(build-system gnu-build-system)
|
||
(inputs ;Installed programs are perl scripts
|
||
(list perl))
|
||
(arguments
|
||
`(#:phases
|
||
(modify-phases %standard-phases
|
||
(replace 'install
|
||
(lambda* (#:key outputs #:allow-other-keys)
|
||
;; Makefile contains no install target
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(bin (string-append out "/bin"))
|
||
(doc (string-append out "/share/doc/delta-" ,version)))
|
||
(begin
|
||
(for-each (lambda (h)
|
||
(install-file h doc))
|
||
`("License.txt" ,@(find-files "www" ".*\\.html")))
|
||
(for-each (lambda (b)
|
||
(install-file b bin))
|
||
`("delta" "multidelta" "topformflat"))))
|
||
#t))
|
||
(delete 'configure)))) ; no configure script
|
||
(home-page
|
||
"https://web.archive.org/web/20200701152100/http://delta.tigris.org/")
|
||
(synopsis "Heuristical file minimizer")
|
||
(description
|
||
"Delta assists you in minimizing \"interesting\" files subject to a test
|
||
of their interestingness. A common such situation is when attempting to
|
||
isolate a small failure-inducing substring of a large input that causes your
|
||
program to exhibit a bug.")
|
||
;; See License.txt, which is a bsd-3 license, despite the project's
|
||
;; home-page pointing to a bsd-2 license.
|
||
(license license:bsd-3)))
|
||
|
||
(define-public c-reduce
|
||
(package
|
||
(name "c-reduce")
|
||
(version "2.10.0")
|
||
(source
|
||
(origin
|
||
(method url-fetch)
|
||
(uri (list
|
||
(string-append "http://embed.cs.utah.edu/creduce/"
|
||
"creduce-" version ".tar.gz")))
|
||
(sha256
|
||
(base32 "0qx0zq8jxzx2as2zf0740g7kvgq163ayn3041di4vwk77490y76v"))))
|
||
(build-system gnu-build-system)
|
||
(native-inputs (list flex))
|
||
(inputs
|
||
`(("astyle" ,astyle)
|
||
("bash" ,bash-minimal) ; for wrap-program
|
||
("llvm" ,llvm-9)
|
||
("clang" ,clang-9)
|
||
("indent" ,indent)
|
||
("perl" ,perl)
|
||
("exporter-lite" ,perl-exporter-lite)
|
||
("file-which" ,perl-file-which)
|
||
("getopt-tabular" ,perl-getopt-tabular)
|
||
("regex-common" ,perl-regexp-common)
|
||
("term-readkey" ,perl-term-readkey)))
|
||
(arguments
|
||
`(#:phases
|
||
(modify-phases %standard-phases
|
||
(replace 'check
|
||
(lambda _
|
||
(with-directory-excursion "tests"
|
||
;; Running all tests can take a looong time, and tests 4 and 5
|
||
;; require frama-c or kcc. So run just one for sanity.
|
||
(invoke "./run_tests" "1"))))
|
||
(add-after 'install 'set-load-paths
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
;; Tell creduce where to find the perl modules it needs.
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(prog (string-append out "/bin/creduce")))
|
||
(wrap-program
|
||
prog
|
||
`("PERL5LIB" ":" prefix
|
||
,(map (lambda (p)
|
||
(string-append (assoc-ref inputs p)
|
||
"/lib/perl5/site_perl/"
|
||
,(package-version perl)))
|
||
'("term-readkey" "exporter-lite"
|
||
"file-which" "getopt-tabular"
|
||
"regex-common")))))
|
||
#t)))))
|
||
(home-page "https://embed.cs.utah.edu/creduce")
|
||
(synopsis "Reducer for interesting code")
|
||
(description
|
||
"C-Reduce is a tool that takes a large C or C++ program that has a
|
||
property of interest (such as triggering a compiler bug) and automatically
|
||
produces a much smaller C/C++ program that has the same property. It is
|
||
intended for use by people who discover and report bugs in compilers and other
|
||
tools that process C/C++ code.")
|
||
(license license:ncsa)))
|
||
|
||
(define-public cppdap
|
||
(package
|
||
(name "cppdap")
|
||
(version "1.58.0-a")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri
|
||
(git-reference
|
||
(url "https://github.com/google/cppdap")
|
||
(commit (string-append "dap-" version))))
|
||
(modules '((guix build utils)))
|
||
(snippet
|
||
'(delete-file-recursively "third_party"))
|
||
(patches (search-patches
|
||
"cppdap-add-CPPDAP_USE_EXTERNAL_GTEST_PACKAGE.patch"))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"0fq2w35fw1lb5wya1nny45pk3a13b689k48calk1cmqmqpbcjn2b"))))
|
||
(build-system cmake-build-system)
|
||
(arguments
|
||
(list
|
||
#:configure-flags
|
||
#~(list
|
||
"-DCPPDAP_BUILD_TESTS=ON"
|
||
"-DCPPDAP_USE_EXTERNAL_GTEST_PACKAGE=ON"
|
||
;; Only one of the following three can be enabled at the same time
|
||
;; "-DCPPDAP_USE_EXTERNAL_RAPIDJSON_PACKAGE=ON"
|
||
;; "-DCPPDAP_USE_EXTERNAL_JSONCPP_PACKAGE=ON"
|
||
"-DCPPDAP_USE_EXTERNAL_NLOHMANN_JSON_PACKAGE=ON")))
|
||
(native-inputs
|
||
(list googletest))
|
||
;; see lib/cmake/cppdap/cppdapConfig.cmake
|
||
;; cmake file require propagate this.
|
||
(propagated-inputs
|
||
(list
|
||
;; Only one of the following three can be enabled at the same time
|
||
;; rapidjson
|
||
;; jsoncpp
|
||
nlohmann-json))
|
||
(home-page "https://github.com/google/cppdap")
|
||
(synopsis "C++ library for the Debug Adapter Protocol")
|
||
(description
|
||
"cppdap is a C++11 library (\"SDK\") implementation of the Debug Adapter
|
||
Protocol, providing an API for implementing a DAP client or server. cppdap
|
||
provides C++ type-safe structures for the full DAP specification, and provides a
|
||
simple way to add custom protocol messages.")
|
||
(license license:expat)))
|
||
|
||
(define-public c-vise
|
||
(package
|
||
(name "c-vise")
|
||
(version "2.4.0")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/marxin/cvise")
|
||
(commit (string-append "v" version))))
|
||
(sha256
|
||
(base32 "1i2z5q2pcwh1gpdqc24x1a2q5vzwhblzzq021nzwf304di7m18vl"))
|
||
(file-name (git-file-name name version))))
|
||
(build-system cmake-build-system)
|
||
(native-inputs
|
||
(list flex python-pytest python-pytest-flake8))
|
||
(inputs
|
||
(list bash-minimal clang llvm unifdef
|
||
python python-pebble python-psutil python-chardet))
|
||
(arguments
|
||
`(#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'unpack 'fix-linkage
|
||
(lambda _
|
||
(substitute* "clang_delta/CMakeLists.txt"
|
||
(("\\$\\{LLVM_LINK_LLVM_DYLIB\\}") "True")
|
||
((" LLVM") " LLVMSupport"))))
|
||
(add-before 'build 'hardcode-paths
|
||
(lambda _
|
||
(substitute* "cvise.py"
|
||
(("/bin/bash") (which "bash"))
|
||
(("(.*)# Special case for clang-format" & >)
|
||
(string-append > "# Special case for unifdef\n"
|
||
> "programs['unifdef'] = '" (which "unifdef") "'\n"
|
||
&)))))
|
||
(add-after 'install 'wrap
|
||
(lambda* (#:key outputs #:allow-other-keys)
|
||
(let ((out (assoc-ref outputs "out"))
|
||
(python-path (getenv "GUIX_PYTHONPATH")))
|
||
(wrap-program (string-append out "/bin/cvise")
|
||
`("PYTHONPATH" ":" prefix (,python-path)))
|
||
#t))))))
|
||
(home-page "https://github.com/marxin/cvise")
|
||
(synopsis "Reducer for interesting code")
|
||
(description
|
||
"C-Vise is a Python port of the C-Reduce tool that is fully compatible
|
||
and uses the same efficient LLVM-based C/C++ @code{clang_delta} reduction
|
||
tool.")
|
||
(license license:ncsa)))
|
||
|
||
(define-public american-fuzzy-lop
|
||
(let ((machine (match (or (%current-target-system)
|
||
(%current-system))
|
||
("x86_64-linux" "x86_64")
|
||
("i686-linux" "i386")
|
||
("aarch64-linux" "aarch64")
|
||
("armhf-linux" "arm")
|
||
("mips64el-linux" "mips64el")
|
||
("powerpc-linux" "ppc")
|
||
;; Prevent errors when querying this package on unsupported
|
||
;; platforms, e.g. when running "guix package --search="
|
||
(_ "UNSUPPORTED"))))
|
||
(package
|
||
(name "american-fuzzy-lop")
|
||
(version "2.57b") ;It seems all releases have the 'b' suffix
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/google/AFL")
|
||
(commit (string-append "v" version))))
|
||
(sha256
|
||
(base32 "0ks0s8iizp7mpc9mlpv126rsny0dkljfsw68689g9jiisjz2z530"))
|
||
(file-name (git-file-name name version))))
|
||
(build-system gnu-build-system)
|
||
(inputs
|
||
(list qemu-for-american-fuzzy-lop))
|
||
(arguments
|
||
`(#:make-flags (list (string-append "PREFIX=" (assoc-ref %outputs "out"))
|
||
(string-append "DOC_PATH=$(PREFIX)/share/doc/"
|
||
,name "-" ,version)
|
||
"CC=gcc")
|
||
#:phases (modify-phases %standard-phases
|
||
(add-after 'unpack 'make-git-checkout-writable
|
||
(lambda _
|
||
(for-each make-file-writable (find-files "."))
|
||
#t))
|
||
(delete 'configure)
|
||
,@(if (string=? (%current-system) (or "x86_64-linux"
|
||
"i686-linux"))
|
||
'()
|
||
'((add-before 'build 'set-afl-flag
|
||
(lambda _ (setenv "AFL_NO_X86" "1") #t))
|
||
(add-after 'install 'remove-x86-programs
|
||
(lambda* (#:key outputs #:allow-other-keys)
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(bin (string-append out "/bin/")))
|
||
(delete-file (string-append bin "afl-gcc"))
|
||
(delete-file (string-append bin "afl-g++"))
|
||
(delete-file (string-append bin "afl-clang"))
|
||
(delete-file (string-append bin "afl-clang++")))
|
||
#t))))
|
||
(add-after
|
||
;; TODO: Build and install the afl-llvm tool.
|
||
'install 'install-qemu
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(let ((qemu (assoc-ref inputs "qemu"))
|
||
(out (assoc-ref outputs "out")))
|
||
(symlink (string-append qemu "/bin/qemu-" ,machine)
|
||
(string-append out "/bin/afl-qemu-trace"))
|
||
#t)))
|
||
(delete 'check)))) ; tests are run during 'install phase
|
||
(home-page "https://lcamtuf.coredump.cx/afl/")
|
||
(synopsis "Security-oriented fuzzer")
|
||
(description
|
||
"American fuzzy lop is a security-oriented fuzzer that employs a novel
|
||
type of compile-time instrumentation and genetic algorithms to automatically
|
||
discover clean, interesting test cases that trigger new internal states in the
|
||
targeted binary. This substantially improves the functional coverage for the
|
||
fuzzed code. The compact synthesized corpora produced by the tool are also
|
||
useful for seeding other, more labor- or resource-intensive testing regimes
|
||
down the road.")
|
||
(license license:asl2.0))))
|
||
|
||
(define-public qemu-for-american-fuzzy-lop
|
||
;; afl only supports using a single afl-qemu-trace executable, so
|
||
;; we only build qemu for the native target.
|
||
(let ((machine (match (or (%current-target-system)
|
||
(%current-system))
|
||
("x86_64-linux" "x86_64")
|
||
("i686-linux" "i386")
|
||
("aarch64-linux" "aarch64")
|
||
("armhf-linux" "arm")
|
||
("mips64el-linux" "mips64el")
|
||
("powerpc-linux" "ppc")
|
||
;; Prevent errors when querying this package on unsupported
|
||
;; platforms, e.g. when running "guix package --search="
|
||
(_ "UNSUPPORTED"))))
|
||
(hidden-package
|
||
(package
|
||
(name "qemu")
|
||
(version "2.10.2")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "https://download.qemu.org/qemu-"
|
||
version ".tar.xz"))
|
||
(sha256
|
||
(base32
|
||
"17w21spvaxaidi2am5lpsln8yjpyp2zi3s3gc6nsxj5arlgamzgw"))
|
||
(patches
|
||
(search-patches "qemu-glibc-2.27.patch"
|
||
"qemu-glibc-2.30.patch"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(;; Running tests in parallel can occasionally lead to failures, like:
|
||
;; boot_sector_test: assertion failed (signature == SIGNATURE): (0x00000000 == 0x0000dead)
|
||
#:parallel-tests? #f
|
||
#:configure-flags
|
||
(list (string-append "--target-list=" ,machine "-linux-user"))
|
||
#:make-flags '("V=1")
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(replace 'configure
|
||
(lambda* (#:key inputs outputs (configure-flags '())
|
||
#:allow-other-keys)
|
||
;; The `configure' script doesn't understand some of the
|
||
;; GNU options. Thus, add a new phase that's compatible.
|
||
(let ((out (assoc-ref outputs "out")))
|
||
(setenv "SHELL" (which "bash"))
|
||
|
||
;; While we're at it, patch for tests.
|
||
(substitute* "tests/libqtest.c"
|
||
(("/bin/sh") (which "sh")))
|
||
|
||
;; The binaries need to be linked against -lrt.
|
||
(setenv "LDFLAGS" "-lrt")
|
||
(apply invoke
|
||
`("./configure"
|
||
,(string-append "--cc=" (which "gcc"))
|
||
;; Some architectures insist on using HOST_CC
|
||
,(string-append "--host-cc=" (which "gcc"))
|
||
"--disable-debug-info" ; save build space
|
||
"--enable-virtfs" ; just to be sure
|
||
,(string-append "--prefix=" out)
|
||
,(string-append "--sysconfdir=/etc")
|
||
,@configure-flags)))))
|
||
(add-after
|
||
'unpack 'apply-afl-patches
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(let* ((afl-src (assoc-ref inputs "afl-source"))
|
||
(patch-dir "qemu_mode/patches"))
|
||
(copy-recursively (string-append afl-src "/"
|
||
patch-dir)
|
||
patch-dir)
|
||
(install-file
|
||
(string-append patch-dir
|
||
"/afl-qemu-cpu-inl.h")
|
||
".")
|
||
(copy-file (string-append afl-src "/config.h")
|
||
"./afl-config.h")
|
||
(install-file (string-append afl-src "/types.h")
|
||
".")
|
||
(substitute* "afl-qemu-cpu-inl.h"
|
||
(("\\.\\./\\.\\./config.h") "afl-config.h"))
|
||
(substitute* (string-append patch-dir
|
||
"/cpu-exec.diff")
|
||
(("\\.\\./patches/") ""))
|
||
|
||
;; These were already applied to qemu-minimal-2.10.
|
||
(for-each (lambda (obsolete-patch)
|
||
(delete-file (string-append
|
||
patch-dir "/"
|
||
obsolete-patch)))
|
||
(list "configure.diff"
|
||
"memfd.diff"))
|
||
|
||
(for-each (lambda (patch-file)
|
||
(invoke "patch" "--force" "-p1"
|
||
"--input" patch-file))
|
||
(find-files patch-dir
|
||
"\\.diff$"))
|
||
#t)))
|
||
(add-before 'check 'disable-unusable-tests
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(substitute* "tests/Makefile.include"
|
||
;; Comment out the test-qga test, which needs /sys and
|
||
;; fails within the build environment.
|
||
(("check-unit-.* tests/test-qga" all)
|
||
(string-append "# " all)))
|
||
(substitute* "tests/Makefile.include"
|
||
;; Comment out the test-char test, which needs networking and
|
||
;; fails within the build environment.
|
||
(("check-unit-.* tests/test-char" all)
|
||
(string-append "# " all)))
|
||
#t)))))
|
||
(native-inputs
|
||
`(("python-2" ,python-2) ; QEMU 2 needs Python 2
|
||
("glib:bin" ,glib "bin")
|
||
("perl" ,perl)
|
||
("flex" ,flex)
|
||
("bison" ,bison)
|
||
("pkg-config" ,pkg-config)))
|
||
(inputs
|
||
`(("afl-source" ,(package-source american-fuzzy-lop))
|
||
("alsa-lib" ,alsa-lib)
|
||
("attr" ,attr)
|
||
("glib" ,glib)
|
||
("libaio" ,libaio)
|
||
("libattr" ,attr)
|
||
("libcap" ,libcap)
|
||
("libjpeg" ,libjpeg-turbo)
|
||
("libpng" ,libpng)
|
||
("ncurses" ,ncurses)
|
||
("pixman" ,pixman)
|
||
("util-linux" ,util-linux)
|
||
("zlib" ,zlib)))
|
||
(home-page "https://www.qemu.org")
|
||
(synopsis "Machine emulator and virtualizer (without GUI) for american fuzzy lop")
|
||
(description
|
||
"QEMU is a generic machine emulator and virtualizer. This package
|
||
of QEMU is used only by the american fuzzy lop package.
|
||
|
||
When used as a machine emulator, QEMU can run OSes and programs made for one
|
||
machine (e.g. an ARM board) on a different machine---e.g., your own PC. By
|
||
using dynamic translation, it achieves very good performance.
|
||
|
||
When used as a virtualizer, QEMU achieves near native performances by
|
||
executing the guest code directly on the host CPU. QEMU supports
|
||
virtualization when executing under the Xen hypervisor or using
|
||
the KVM kernel module in Linux. When using KVM, QEMU can virtualize x86,
|
||
server and embedded PowerPC, and S390 guests.")
|
||
;; Many files are GPLv2+, but some are GPLv2-only---e.g., `memory.c'.
|
||
(license license:gpl2)
|
||
;; Several tests fail on MIPS.
|
||
(supported-systems (delete "mips64el-linux" %supported-systems))))))
|
||
|
||
(define-public aflplusplus
|
||
(package
|
||
(inherit american-fuzzy-lop)
|
||
(name "aflplusplus")
|
||
(version "4.09c")
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/AFLplusplus/AFLplusplus")
|
||
(commit (string-append "v" version))))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"12bplpd8cifla6m9l130fd22ggzkhd1w5s1aifw1idpy3njhj129"))))
|
||
(arguments
|
||
(substitute-keyword-arguments (package-arguments american-fuzzy-lop)
|
||
((#:make-flags _ ''())
|
||
#~(list (string-append "PREFIX=" #$output)
|
||
(string-append "DOC_PATH=" #$output "/share/doc/"
|
||
#$(package-name this-package) "-"
|
||
#$(package-version this-package))
|
||
(string-append "CC=" #$(cc-for-target))))
|
||
((#:phases phases '%standard-phases)
|
||
#~(modify-phases #$phases
|
||
;; For GCC plugins.
|
||
(add-after 'unpack 'patch-gcc-path
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(substitute* "src/afl-cc.c"
|
||
(("alt_cc = \"gcc\";")
|
||
(format #f "alt_cc = \"~a\";"
|
||
(search-input-file inputs "bin/gcc")))
|
||
(("alt_cxx = \"g\\+\\+\";")
|
||
(format #f "alt_cxx = \"~a\";"
|
||
(search-input-file inputs "bin/g++"))))))))))
|
||
;; According to the Dockerfile, GCC 12 is producing compile errors for some
|
||
;; targets, so explicitly use GCC 11 here.
|
||
(inputs (list gcc-11 gmp python qemu))
|
||
(native-inputs (list gcc-11))
|
||
(home-page "https://aflplus.plus/")
|
||
(description
|
||
"AFLplusplus is a security-oriented fuzzer that employs a novel type of
|
||
compile-time instrumentation and genetic algorithms to automatically discover
|
||
clean, interesting test cases that trigger new internal states in the targeted
|
||
binary. This substantially improves the functional coverage for the fuzzed
|
||
code. The compact synthesized corpora produced by the tool are also useful for
|
||
seeding other, more labor- or resource-intensive testing regimes down the road.
|
||
It is a fork of American Fuzzy Lop fuzzer and features:
|
||
@itemize
|
||
@item A more recent qemu version.
|
||
@item More algorithms like collision-free coverage, enhanced laf-intel &
|
||
redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, etc.
|
||
@end itemize")))
|
||
|
||
(define-public stress-make
|
||
(let ((commit "97815bed8060de33952475b3498767c91f59ffd9")
|
||
(revision "2")) ;No official source distribution
|
||
(package
|
||
(name "stress-make")
|
||
(version (git-version "1.0" revision commit))
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/lanl/stress-make")
|
||
(commit commit)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"0k55cy7x0hlc6rgpascl6ibhcfxaash3p9r9r8kwvbm3zag1rmac"))))
|
||
(build-system gnu-build-system)
|
||
(native-inputs
|
||
(list autoconf automake go))
|
||
(inputs
|
||
`(("make-source" ,(package-source gnu-make))))
|
||
(arguments
|
||
;; stress-make's configure script insists on having a tarball and does
|
||
;; not accept a directory name instead. To let the gnu-build-system's
|
||
;; patch-* phases work properly, we unpack the source first, then
|
||
;; repack before the configure phase.
|
||
(let ((make-dir (string-append "make-" (package-version gnu-make))))
|
||
`(#:configure-flags '("--with-make-tar=./make.tar.xz"
|
||
"make_cv_sys_gnu_glob=yes")
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'unpack 'unpack-make
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(invoke "tar" "xf" (assoc-ref inputs "make-source"))))
|
||
(add-after 'unpack-make 'set-default-shell
|
||
(lambda _
|
||
;; Taken mostly directly from (@ (gnu packages base) gnu-make)
|
||
(substitute* (string-append ,make-dir "/src/job.c")
|
||
(("default_shell = .*$")
|
||
(format #f "default_shell = \"~a\";\n"
|
||
(which "sh"))))))
|
||
(add-before 'configure 'repack-make
|
||
(lambda _
|
||
(invoke "tar" "cJf" "./make.tar.xz" ,make-dir)))
|
||
(add-before 'build 'setup-go
|
||
;; The Go cache is required starting in Go 1.12, and it needs
|
||
;; to be writable.
|
||
(lambda _ (setenv "GOCACHE" "/tmp/go-cache") #t))))))
|
||
(home-page "https://github.com/lanl/stress-make")
|
||
(synopsis "Expose race conditions in Makefiles")
|
||
(description
|
||
"Stress Make is a customized GNU Make that explicitly manages the order
|
||
in which concurrent jobs are run to provoke erroneous behavior into becoming
|
||
manifest. It can run jobs in the order in which they're launched, in backwards
|
||
order, or in random order. The thought is that if code builds correctly with
|
||
Stress Make, then it is likely that the @code{Makefile} contains no race
|
||
conditions.")
|
||
;; stress-make wrapper is under BSD-3-modifications-must-be-indicated,
|
||
;; and patched GNU Make is under its own license.
|
||
(license (list (license:non-copyleft "LICENSE.md")
|
||
license:gpl3+)))))
|
||
|
||
(define-public zzuf
|
||
(package
|
||
(name "zzuf")
|
||
(version "0.15")
|
||
(source
|
||
(origin
|
||
(method url-fetch)
|
||
(uri (string-append
|
||
"https://github.com/samhocevar/zzuf/releases/download/v"
|
||
version "/" name "-" version ".tar.gz"))
|
||
(file-name (string-append name "-" version ".tar.gz"))
|
||
(sha256
|
||
(base32
|
||
"1mpzjaksc2qg2hzqflf39pl06p53qam2dn3hkhkcv6p00d2n4kx3"))))
|
||
(build-system gnu-build-system)
|
||
(home-page "https://github.com/samhocevar/zzuf")
|
||
(synopsis "Transparent application input fuzzer")
|
||
(description "Zzuf is a transparent application input fuzzer. It works by
|
||
intercepting file operations and changing random bits in the program's
|
||
input. Zzuf's behaviour is deterministic, making it easy to reproduce bugs.")
|
||
(license license:wtfpl2)))
|
||
|
||
(define-public scanmem
|
||
(package
|
||
(name "scanmem")
|
||
(version "0.17")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/scanmem/scanmem")
|
||
(commit (string-append "v" version))))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"17p8sh0rj8yqz36ria5bp48c8523zzw3y9g8sbm2jwq7sc27i7s9"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:configure-flags '("--enable-gui")
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-before 'configure 'hardcode-python
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(substitute* "gui/GameConqueror.py"
|
||
(("/usr/bin/env python")
|
||
(search-input-file inputs "/bin/python")))))
|
||
(add-after 'install 'wrap-gameconqueror
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(let ((out (assoc-ref outputs "out"))
|
||
(gi-typelib-path (getenv "GI_TYPELIB_PATH"))
|
||
(python-path (getenv "GUIX_PYTHONPATH")))
|
||
(wrap-program (string-append out "/share/gameconqueror/GameConqueror.py")
|
||
`("GI_TYPELIB_PATH" ":" prefix (,gi-typelib-path))
|
||
`("GUIX_PYTHONPATH" ":" prefix (,python-path))))
|
||
#t)))))
|
||
(native-inputs
|
||
(list libtool
|
||
python-wrapper
|
||
gobject-introspection
|
||
gtk+
|
||
intltool
|
||
automake
|
||
autoconf))
|
||
(inputs
|
||
(list bash-minimal
|
||
readline))
|
||
(propagated-inputs
|
||
(list python-pygobject))
|
||
(home-page "https://github.com/scanmem/scanmem")
|
||
(synopsis "Memory scanner")
|
||
(description "Scanmem is a debugging utility designed to isolate the
|
||
address of an arbitrary variable in an executing process. Scanmem simply
|
||
needs to be told the pid of the process and the value of the variable at
|
||
several different times. After several scans of the process, scanmem isolates
|
||
the position of the variable and allows you to modify its value.")
|
||
;; The library is covered by LGPLv3 or later; the application is covered
|
||
;; by GPLv3 or later.
|
||
(license (list license:lgpl3+ license:gpl3+))))
|
||
|
||
(define-public remake
|
||
(package (inherit gnu-make)
|
||
(name "remake")
|
||
(version "4.3-1.6")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (let ((upstream-version
|
||
(match (string-split version #\-)
|
||
((ver sub) (string-append ver "%2Bdbg-" sub)))))
|
||
(string-append "mirror://sourceforge/bashdb/"
|
||
"remake/" upstream-version "/"
|
||
"remake-" upstream-version ".tar.gz")))
|
||
(file-name (string-append "remake-" version ".tar.gz"))
|
||
(sha256
|
||
(base32
|
||
"11vvch8bi0yhjfz7gn92b3xmmm0cgi3qfiyhbnnj89frkhbwd87n"))
|
||
(patches (search-patches "remake-impure-dirs.patch"))))
|
||
(inputs
|
||
(modify-inputs (package-inputs gnu-make)
|
||
(prepend readline)))
|
||
(home-page "https://bashdb.sourceforge.net/remake/")
|
||
(description "Remake is an enhanced version of GNU Make that adds improved
|
||
error reporting, better tracing, profiling, and a debugger.")
|
||
(license license:gpl3+)))
|
||
|
||
(define-public rr
|
||
(package
|
||
(name "rr")
|
||
(version "5.8.0")
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/mozilla/rr")
|
||
(commit version)))
|
||
(sha256
|
||
(base32
|
||
"16w6vvvgww4i2f0jk5zlrr6606fj8kps21fnw0pshyw88l141rqn"))
|
||
(file-name (git-file-name name version))))
|
||
(build-system cmake-build-system)
|
||
(arguments
|
||
`(#:configure-flags
|
||
;; The 'rr_exec_stub' is a static binary, which leads CMake to fail
|
||
;; with ‘file RPATH_CHANGE could not write new RPATH: ...’.
|
||
;; Clear CMAKE_INSTALL_RPATH to avoid that problem.
|
||
(list "-DCMAKE_INSTALL_RPATH="
|
||
;; Satisfy the ‘validate-runpath’ phase. This isn't a direct
|
||
;; consequence of clearing CMAKE_INSTALL_RPATH.
|
||
(string-append "-DCMAKE_EXE_LINKER_FLAGS=-Wl,-rpath="
|
||
(assoc-ref %build-inputs "capnproto")
|
||
"/lib,-rpath=" (assoc-ref %build-inputs "zlib")
|
||
"/lib")
|
||
,@(if (and (not (%current-target-system))
|
||
(member (%current-system)
|
||
'("x86_64-linux" "aarch64-linux")))
|
||
;; The toolchain doesn't support '-m32'.
|
||
'("-Ddisable32bit=ON")
|
||
'()))
|
||
|
||
;; XXX: Most tests fail with:
|
||
;;
|
||
;; rr needs /proc/sys/kernel/perf_event_paranoid <= 1, but it is 2.
|
||
;;
|
||
;; This setting cannot be changed from the build environment, so skip
|
||
;; the tests.
|
||
#:tests? #f
|
||
|
||
#:phases (modify-phases %standard-phases
|
||
(add-before 'check 'set-home
|
||
(lambda _
|
||
;; Some tests expect 'HOME' to be set.
|
||
(setenv "HOME" (getcwd))
|
||
#t)))))
|
||
(native-inputs
|
||
(list pkg-config ninja which))
|
||
(inputs
|
||
(list gdb capnproto python python-pexpect zlib))
|
||
|
||
;; List of supported systems according to 'src/preload/raw_syscall.S'.
|
||
(supported-systems '("x86_64-linux" "i686-linux" "aarch64-linux"))
|
||
|
||
(home-page "https://rr-project.org/")
|
||
(synopsis "Record and replay debugging framework")
|
||
(description
|
||
"rr is a lightweight tool for recording, replaying and debugging
|
||
execution of applications (trees of processes and threads). Debugging extends
|
||
GDB with very efficient reverse-execution, which in combination with standard
|
||
GDB/x86 features like hardware data watchpoints, makes debugging much more
|
||
fun.")
|
||
(license license:expat)))
|
||
|
||
(define-public libbacktrace
|
||
;; There are no releases nor tags.
|
||
(let ((revision "2")
|
||
(commit "cdb64b688dda93bbbacbc2b1ccf50ce9329d4748"))
|
||
(package
|
||
(name "libbacktrace")
|
||
(version (git-version "1.0" revision commit))
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/ianlancetaylor/libbacktrace")
|
||
(commit commit)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"0iwd41pgr2nxlmghqdfwfwxac27jbqxwxp07jihhq85a8s3igjgr"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:parallel-tests? #f ;spurious failures when testing in parallel
|
||
#:make-flags '("CFLAGS=-fPIC")))
|
||
(home-page "https://github.com/ianlancetaylor/libbacktrace")
|
||
(synopsis "C library for producing symbolic backtraces")
|
||
(description "The @code{libbacktrace} library can be linked into a C/C++
|
||
program to produce symbolic backtraces.")
|
||
(license license:bsd-3))))
|
||
|
||
(define-public libleak
|
||
(package
|
||
(name "libleak")
|
||
(version "0.3.6")
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/WuBingzheng/libleak")
|
||
(commit (string-append "v" version))))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"1p6x20mm0dym2qn10d6cvwmh71m93xwcd319g94zkv88hj5q17n6"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:tests? #f ;no test suite
|
||
#:parallel-build? #f ;jobserver unavailable
|
||
#:phases (modify-phases %standard-phases
|
||
(add-after 'unpack 'unbundle-libwuya
|
||
(lambda _
|
||
(substitute* "Makefile"
|
||
((".*make -C libwuya.*") ""))
|
||
#t))
|
||
(add-before 'build 'set-CC
|
||
(lambda _
|
||
(setenv "CC" "gcc")
|
||
#t))
|
||
(delete 'configure) ;no configure script
|
||
(replace 'install
|
||
(lambda* (#:key outputs #:allow-other-keys)
|
||
(let* ((out (assoc-ref outputs "out")))
|
||
(install-file "libleak.so" (string-append out "/lib"))
|
||
#t))))))
|
||
(inputs (list libbacktrace libwuya))
|
||
(home-page "https://github.com/WuBingzheng/libleak")
|
||
(synopsis "Memory leaks detection tool")
|
||
(description "The libleak tool detects memory leaks by hooking memory
|
||
functions such as @code{malloc}. It comes as a shared object to be pre-loaded
|
||
via @code{LD_PRELOAD} when launching the application. It prints the full call
|
||
stack at suspicious memory leak points. Modifying or recompiling the target
|
||
program is not required, and the detection can be enabled or disabled while
|
||
the target application is running. The overhead incurred by libleak is
|
||
smaller than that of other tools such as Valgrind, and it aims to be easier to
|
||
use than similar tools like @command{mtrace}.")
|
||
(license license:gpl2+)))
|
||
|
||
(define-public cgdb
|
||
(package
|
||
(name "cgdb")
|
||
(version "0.8.0")
|
||
(source
|
||
(origin
|
||
(method url-fetch)
|
||
(uri (string-append "https://cgdb.me/files/cgdb-" version ".tar.gz"))
|
||
(sha256
|
||
(base32 "1w8ib2vg3pg68d9hh97fw5042c73i9nqavdddc87n9bpscjbaf0d"))))
|
||
(build-system gnu-build-system)
|
||
(inputs
|
||
(list bash-minimal ncurses readline gdb))
|
||
(native-inputs
|
||
(list flex texinfo))
|
||
(arguments
|
||
`(#:configure-flags
|
||
(list
|
||
(string-append "ac_cv_rl_version=" ,(package-version readline))
|
||
"ac_cv_file__dev_ptmx=no"
|
||
"ac_cv_file__proc_self_status=no"
|
||
"ac_cv_func_setpgrp_void=no")
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'unpack 'fix-paths
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(let ((gdb (search-input-file inputs "bin/gdb"))
|
||
(sh (search-input-file inputs "bin/sh")))
|
||
(substitute* "lib/util/fork_util.cpp"
|
||
(("GDB = \"gdb\"") (string-append "GDB = \"" gdb "\"")))
|
||
(substitute* "cgdb/cgdb.cpp" (("/bin/sh") sh))))))))
|
||
(home-page "https://cgdb.github.io")
|
||
(synopsis "Console front-end to the GNU debugger")
|
||
(description
|
||
"@code{cgdb} is a lightweight curses (terminal-based) interface to the
|
||
GNU Debugger (GDB). In addition to the standard gdb console, cgdb provides
|
||
a split screen view that displays the source code as it executes. The
|
||
keyboard interface is modeled after vim, so vim users should feel at home
|
||
using cgdb.")
|
||
(license license:gpl2+)))
|
||
|
||
(define-public mspdebug
|
||
;; Last official release was 24 July 2017
|
||
(let ((commit "4c4d94e43bc4a18ecf82070ff81cd38dd5641e3b")
|
||
(revision "0"))
|
||
(package
|
||
(name "mspdebug")
|
||
(version (git-version "0.25" revision commit))
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/dlbeer/mspdebug")
|
||
(commit commit)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32 "1lgw1dsc1aglyja610ichadvgs5b0df3wlarinczb0ykf431gjln"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:tests? #f ; no test suite
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(delete 'configure)) ; no configure script
|
||
#:make-flags
|
||
(list (string-append "CC=" ,(cc-for-target))
|
||
"INSTALL=install"
|
||
(string-append "PREFIX=" %output))))
|
||
(inputs
|
||
(list libusb-compat readline))
|
||
(synopsis "Debugging tool for MSP430 MCUs")
|
||
(description "MspDebug supports FET430UIF, eZ430, RF2500 and Olimex
|
||
MSP430-JTAG-TINY programmers, as well as many other compatible
|
||
devices. It can be used as a proxy for gdb or as an independent
|
||
debugger with support for programming, disassembly and reverse
|
||
engineering.")
|
||
(home-page "https://github.com/dlbeer/mspdebug")
|
||
(license license:gpl2+))))
|
||
|
||
(define-public seer-gdb
|
||
(package
|
||
(name "seer-gdb")
|
||
(version "1.16")
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/epasveer/seer.git")
|
||
(commit (string-append "v" version))))
|
||
(file-name (string-append name "-" version "-checkout"))
|
||
(sha256
|
||
(base32
|
||
"0jdvyg2jab1pvf36pvkyrfsg2wyy8zp1qx0v2ksclgrnr1hja6k6"))))
|
||
(build-system cmake-build-system)
|
||
(arguments
|
||
`(#:tests? #f ; Those are strangely manual
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'unpack 'chdir
|
||
(lambda _
|
||
(chdir "src"))))))
|
||
(inputs
|
||
(list qtbase-5 qtcharts))
|
||
(synopsis "GUI frontend for GDB")
|
||
(description "This package provides a frontend to GDB, the GNU debugger.")
|
||
(home-page "https://github.com/epasveer/seer")
|
||
;; Note: Some icons in src/resources are creative commons 3.0 and/or 4.0.
|
||
(license license:gpl3+)))
|
||
|
||
(define-public ddd
|
||
(package
|
||
(name "ddd")
|
||
(version "3.4.0")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "mirror://gnu/ddd/ddd-" version ".tar.gz"))
|
||
(sha256
|
||
(base32
|
||
"03sqsfiri5p130cmmzh2wikg0gisql496rvdhr1qaidh1f5bqk2x"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
(list #:tests? #f ;tests require manual intervention
|
||
;; Avoid "friend declaration specifies default arguments and isn’t
|
||
;; a definition" errors.
|
||
#:configure-flags #~(list "CXXFLAGS=-fpermissive")))
|
||
(native-inputs
|
||
(list pkg-config))
|
||
(inputs
|
||
(list motif ncurses gdb))
|
||
(synopsis "Graphical front-end for GDB and other debuggers")
|
||
(description "GNU DDD, the Data Display Debugger, is a graphical front-end
|
||
for command-line debuggers. Many back-end debuggers are supported, notably
|
||
the GNU debugger, GDB. In addition to usual debugging features such as
|
||
viewing the source files, DDD has additional graphical, interactive features
|
||
to aid in debugging.")
|
||
(home-page "https://www.gnu.org/software/ddd/")
|
||
(license license:gpl3+)))
|
||
|
||
(define-public delve
|
||
(package
|
||
(name "delve")
|
||
(version "1.21.0")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/go-delve/delve")
|
||
(commit (string-append "v" version))))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"1gdynx4gp02lj47znnf638kkbmmsl24a9fis81a2fg3pdrg6jg3c"))))
|
||
(build-system go-build-system)
|
||
(arguments
|
||
(list #:import-path "github.com/go-delve/delve/cmd/dlv"
|
||
#:unpack-path "github.com/go-delve/delve"
|
||
#:install-source? #f
|
||
#:phases #~(modify-phases %standard-phases (delete 'check))))
|
||
(home-page "https://github.com/go-delve/delve")
|
||
(synopsis "Debugger for the Go programming language")
|
||
(description "Delve is a debugger for the Go programming language.")
|
||
(license license:expat)))
|