Commit Graph

3120 Commits

Author SHA1 Message Date
Abhishek Arya 047eb4be4f
Update requirements.txt 2019-05-02 07:26:36 -07:00
jonathanmetzman acb1bae5b4
[unicorn][libpcap] Try using -lFuzzingEngine to fix MSAN issue (#2370) 2019-05-01 21:09:40 -04:00
jonathanmetzman bbd509dca4
Speculative fix for yajl migration: Reorder arguments (#2366)
Use $LIB_FUZZING_ENGINE before -x c which causes all subsequent files to be treated as C source,
including libFuzzingEngine.a during AFL builds.
2019-05-01 16:58:41 -04:00
jonathanmetzman f6be0078df
Try to migrate yajl-ruby and libxslt to LIB_FUZZING_ENGINE (#2365) 2019-05-01 16:11:29 -04:00
Kostya Serebryany d9389b0a2e [glossary] explain cross-pollination (#2364)
* [glossary] explain cross-pollination

* [glossary] explain cross-pollination
2019-05-01 12:50:38 -07:00
Sebastian Rasmussen 27240f86f5 [mupdf] Update to latest version of API provided by MuPDF. (#2362)
This reverts commit 7fa021dfbe
because the corresponding API was reverted in the upstream project.
2019-05-01 15:47:53 -04:00
Guido Vranken 60a23d3841 [gfwx] Add gfwx fuzzers (#2346)
* [gfwx] Add gfwx fuzzers

* [gfwx] Update maintainer fields to GFWX maintainer address
2019-05-01 10:42:18 -07:00
jonathanmetzman 5217d8efb4
[qpid-proton] Undo change to comment during migration (#2361) 2019-05-01 12:14:33 -04:00
jonathanmetzman 3049c50d48
Migrate projects using -lFuzzingEngine to $LIB_FUZZING_ENGINE (#2325)
Migrate from -lFuzzingEngine to $LIB_FUZZING_ENGINE where possible and not causing breakage
2019-05-01 11:09:55 -04:00
CY Chiang 22f5e3e0b8 [cras] Modify accounts to auto-cc (#2360)
Modify accounts for CRAS team member changes.
2019-05-01 07:31:13 -07:00
jonathanmetzman 7553ee876d
Migrate projects with trouble with exceptions to $LIB_FUZZING_ENGINE (#2359)
Migrate projects that broke libFuzzer with exceptions to $LIB_FUZZING_ENGINE.
Replace uses of -lFuzzingEngine with `$LIB_FUZZING_ENGINE`
2019-04-30 16:48:34 -04:00
jonathanmetzman 316c1df6a4
Roll clang to r359254 (#2358)
Roll clang to r359254 to uptake fixes for exception handling and MSAN.
2019-04-30 10:19:20 -04:00
jonathanmetzman a047d08b8e
Revert "[infra] Revert the recent clang roll to fix some builds (#2315) (#2316) (#2356)
* Revert "[infra] Revert the recent clang roll to fix some builds (#2315). (#2316)"

This reverts commit 8b34fd89d2.
2019-04-29 16:22:20 -04:00
Abhishek Arya c1c6ea69a0
Disable unrar project due to file creation spam (#2355) 2019-04-29 09:18:52 -07:00
Matt Morehouse e7b479a8cc [llvm] Switch to LIB_FUZZING_ENGINE. (#2352) 2019-04-29 10:35:29 -04:00
Guido Vranken 4caafd5aa1 [bignum-fuzzer] Fix OpenSSL build (#2354)
Temporary workaround for OpenSSL's build system problems.
2019-04-28 17:19:25 -07:00
htuch bf05a80651 envoy: remove UBSAN blacklist. (#2351)
This is no longer needed as we handle this Envoy-side. This should fix
the build that has been broken since
https://github.com/envoyproxy/envoy/pull/6610.

Signed-off-by: Harvey Tuch <htuch@google.com>
2019-04-26 09:58:44 -07:00
Catena cyber 1e88b4f948 Custom patch for libpcap to avoid infinite loop (#2344) 2019-04-24 09:16:10 -07:00
Arvid Norberg 50d08b7d7c [libtorrent] update libtorrent project to just pull the main repository and build fuzzers from there (as they recently landed in the release branch) (#2339) 2019-04-22 15:53:44 -07:00
jonathanmetzman 3df307ad59
use immutable default arguments (#2341) 2019-04-22 12:28:07 -07:00
jonathanmetzman c3d7aba005
Prevent misuse of check_build (#2340)
Don't allow using check_build with builds it doesn't actually support.
2019-04-22 09:50:11 -07:00
Stanislav Malyshev 30190987f4 Fix build - option got renamed to --without-libxml (#2338) 2019-04-20 22:26:16 -07:00
Guido Vranken 1ea634a278 Cryptofuzz fixes (#2337)
* [cryptofuzz] Use latest OpenSSL version

This is a workaround for an issue OpenSSL's build system is currently
having. I've appended || true to the build command so failure is not
signaled to the Docker process running the build script, and the build
is not aborted.

Multithreaded compiling has been removed temporarily to avoid a race
condition that causes the make procedure to abort before libcrypto.a
has been compiled.

* [cryptofuzz] Build against LIB_FUZZING_ENGINE_DEPRECATED to prevent crashes
2019-04-18 13:07:09 -07:00
Catena cyber 028c9c486a Fixes capstone build (#2335)
Uses a newly compiled file for next branch only
2019-04-18 08:16:58 -07:00
Nick Terrell fb7075b1ed [zstd] Move downloading seed corpora to build.sh (#2331)
I just added a new fuzzer, `zstd_frame_info`, and want to be able to add new
fuzzers without submitting a pull request to oss-fuzz. This change uses zstd's
Makefile to download the corpora. Now I can add a new fuzzer to zstd and it will
automatically get built and download the seed corpus in oss-fuzz.
2019-04-17 21:42:41 -07:00
Guido Vranken 7bdfb2b7d8 Cryptofuzz (differential crypto fuzzing) (#2273)
* Add cryptofuzz

* [cryptofuzz] Specify sanitizers

* [cryptofuzz] Actually disable assembly in second OpenSSL build

* [cryptofuzz] Add BoringSSL

* [cryptofuzz] Enable MemorySanitizer builds

* [cryptofuzz] Fix OpenSSL build

* [cryptofuzz] Add LibreSSL target

* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled

* [cryptofuzz] Adapt build script to latest cryptofuzz code

* [cryptofuzz] Force rebuild of OpenSSL

* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock

* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds

* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup

* [cryptofuzz] Add README.md
2019-04-17 20:33:50 -07:00
Alex Gaynor 7b8971290d [graphicsmagick] Added --time flag to clone (#2333)
This will give us more information if the clone fails (which it does sometimes, probably due to sourceforge infra issues)
2019-04-17 14:21:54 -07:00
Leandro A. F. Pereira c416a8007b [lwan] Use HTTP dictionary to speed up fuzzing (#2329) 2019-04-17 08:28:57 -07:00
tsdgeos 0221e8b030 [kimageformats] Split fuzzer into 9 fuzzers (#2327)
oss-fuzz devels say this is optimal
2019-04-16 15:40:48 -07:00
jonathanmetzman 53c09d30f6
Update patch to fix build and migrate to -fsanitize=fuzzer (#2324)
Update skia.diff to fix build breakage.
Also, use $LIB_FUZZING_ENGINE instead of -lFuzzingEngine to start using -fsanitize=fuzzer
2019-04-16 11:52:23 -07:00
tsdgeos d2f7690886 [karchive] New project: karchive (#2318) 2019-04-15 14:20:24 -07:00
Max Moroz 4fba752cc3 [libxslt] Update project.yaml: replace Chromium owner in auto_cc. 2019-04-15 11:08:34 -07:00
Nick Wellnhofer 8af165e494 [libxslt] Start with integration (#2320)
Integrate the first fuzz targets from libxslt.
2019-04-15 10:27:43 -07:00
Alex Gaynor 7c05d15480 [libical] Make sure to do an apt update before apt install (#2319) 2019-04-15 10:11:25 -07:00
jonathanmetzman ae9398deef
Change LIB_FUZZING_ENGINE to -fsanitize=fuzzer in libFuzzer builds (#2312) 2019-04-15 10:05:02 -07:00
Max Moroz 8b34fd89d2
[infra] Revert the recent clang roll to fix some builds (#2315). (#2316) 2019-04-12 09:14:09 -07:00
jonathanmetzman 97eca89ed9
Build clang so that it can compile targets with `-fsanitize=fuzzer` (#2311)
Build clang so that it can compile targets with -fsanitize=fuzzer
without adding any runtime dependencies.
2019-04-11 09:51:19 -07:00
Nick Terrell 3eaad4f3e2 [zstd] Add fuzzers and cc emails (#2309)
* [zstd] Add seed corpora for two new fuzzers

* [zstd] Add two more emails to cc list

It is helpful to add in the corporate email so we don't miss bugs.
2019-04-10 13:35:20 -07:00
tsdgeos 36005daba0 libical: Fix undefined sanitizer not building (#2308)
The cmake option for disabling shared libs was not the correct one
and the compilation was getting confused
2019-04-10 11:23:34 -07:00
Damien Miller 2b49be2eaa Updates for OpenSSH fuzzing (#2306)
* Enable experimental XMSS keys for fuzzing

* Enable auth options fuzzer
2019-04-10 13:31:45 +10:00
Leandro A. F. Pereira 935e25b1ff [lwan] Add fuzzing targets for Lwan (#2302) 2019-04-09 13:54:01 -07:00
Abhishek Arya c4fe1fef9e
Disable UBSan for libical (#2298) 2019-04-09 11:46:33 -07:00
tsdgeos e445a90d94 Add libical (#2298) 2019-04-09 11:23:05 -07:00
Paul Dreik 676071636c Libtorrent take2 (#2299)
* switch to another fuzzer repo aimed to be merged upstream

* update email addresses

checked with arvid, he approved adding his address

* [libtorrent] improve building

 - use ninja
 - don't build tests
 - respect CXXFLAGS when building boost
 - less verbose output when downloading

* create initial corpus zip files from git

this makes it much easier to add and remove
both fuzzers and corpus upstream and make
sure they work well.
2019-04-09 11:22:07 -07:00
Kostya Serebryany 08af8b64ad
[libpng-proto] remove stale comment 2019-04-09 11:01:58 -07:00
Kostya Serebryany 663d09feb2
[libpng-proto] add asan back 2019-04-09 10:57:09 -07:00
Abhishek Arya 2e3212d8f0
Revert "Remove mbed TLS fuzzer (#2278)" (#2304)
This reverts commit cce2ed4d23.
2019-04-09 09:07:55 -07:00
Max Moroz 946d0603ba
[infra] Enabling DataFlow build configuration (#1632). (#2292)
* [infra] Enabling DataFlow build configuration (#1632).

* Copy all data flow scripts from the libFuzzer repo.
2019-04-09 07:25:14 -07:00
Oliver Chang 5c5a10a16d
Update project.yaml 2019-04-09 10:47:13 +10:00
Matt Morehouse 6c3880cfd5 [llvm] Remove proto fuzzers. (#2301)
Proto fuzzers are slow and haven't found bugs in a long time.  Their
builds are also hard to maintain since they build in a different
configuration than any of the LLVM build bots.
2019-04-08 12:30:36 -07:00