Commit Graph

4442 Commits

Author SHA1 Message Date
kabeer27 09c7ea778b
Added deploy file and restructured cloud function directory (#4057)
* Adding deploy.sh and restructuring directory

* Integrating review changes

* Passed project id as an argument to each command

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-07-01 16:13:08 +10:00
asraa 468f932b7d
[envoy] lower CPU more (#4056)
* try

Signed-off-by: Asra Ali <asraa@google.com>

* fix build

Signed-off-by: Asra Ali <asraa@google.com>

* fix script

Signed-off-by: Asra Ali <asraa@google.com>

* use HOST_CPU*0.5

Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 15:45:08 -07:00
Luca Boccassi 0a7380a80a
[libzmq] use build script from upstream repository (#4054)
* libzmq: use build script from upstream repository

In order to avoid having to send PRs every time we change something, simply
maintain the build script in the upstream repository, and change build.sh
to a one-line call.

* libzmq: clone corpora and dictionary repository
2020-06-30 13:22:33 -07:00
Max Moroz 05063afd88
Revert "Don't create empty corpus archive as it wont unpack. (#3903)" (#4048)
This reverts commit cb156403e9.
2020-06-30 13:03:44 -07:00
rbehjati c1404e9b62
[oak] Temporarily disable fuzzing for project Oak (#4053) 2020-06-30 11:38:36 -07:00
Nikita Popov 26af5e0e25
[php] Enable unserializehash fuzzer (#4049) 2020-06-30 09:54:25 -07:00
asraa d4b88fc4e1
[envoy] envoy build resource adjustment (#4052)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 09:52:22 -07:00
Abhishek Arya a31e58fb5c
Fix build due to missing liblzma-dev 2020-06-29 21:52:08 -07:00
Danny Halawi 8b6899cfb9
Fixing Dockerfile for fuzzers that use LPM (#4044)
* fixing Dockerfile for libpng-proto

* Fixing Dockerfile so the LPM for giflib works

* Fixing Dockerfile so the LPM for xerces-c works

* taking out unneeded installations

Co-authored-by: Danny Halawi <dhalawi@google.com>
2020-06-29 21:48:37 -07:00
Google AutoFuzz Team 1f9ec264a8
Add sentencepiece (#4035)
* add sentencepiece project

* change the architectures

* change indentations
2020-06-29 12:45:50 -07:00
Robert Löhning 7da55877b6
[qt] Move build.sh to own repository (#4042) 2020-06-29 12:43:17 -07:00
kabeer27 d15dc2a88f
Renaming infra/build/functions files (#4031)
Renamed main.py to sync.py
and test_sync.py to sync_test.py

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-06-29 11:10:47 +10:00
binaryFate eaae983c73
Monero: fix coverage, don't enable asan, add new fuzz test (#4040)
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-06-27 15:42:29 -07:00
Abhishek Arya c2df30abb5
Update project.yaml 2020-06-26 20:31:54 -07:00
pierwill cd9ee7ca4c
Add influxdb project for review (#4028)
Co-authored-by: pierwill <pierwill@users.noreply.github.com>
2020-06-26 11:36:10 -07:00
Abhishek Arya ff4f38e772
Fix memory leak in libevent parse_query_fuzzer 2020-06-25 19:39:14 -07:00
Nathan Moinvaziri e32b716754
Added fuzzer for c-blosc2 (#3989) 2020-06-25 16:56:26 -07:00
Evgeny Vereshchagin 25cff8db8e
[util-linux] cover mnt_table_parse_stream (#4032)
* [util-linux] cover mnt_table_parse_stream

Waiting for https://github.com/karelzak/util-linux/pull/1068

* temporarily point OSS-Fuzz to evverx/util-linux

* make sure it can be built with sanitizer=coverage
2020-06-25 15:35:44 -07:00
Ravi Jotwani f8c9eec4cf
E2fsprogs integration (#4006)
* added draco integration files

* wrote build file and Dockerfile for Draco

* split security-research-pocs fuzzer into four

* added project build to build.sh

* added more fuzzers

* fixed sanitizer flags

* removed commented code, combined fuzzers, fized build script

* changed to singular filenames, converted usage of random int to enum, changed buffer name, and fixed build script

* placed test files in memory instead of on disk, added asserts
2020-06-25 11:42:17 -07:00
kabeer27 181812050d
Cloud function for syncing OSS-Fuzz projects (#3538). (#4023)
Integrating the first cloud function i implemented which syncs the project list from github and uploads the list to cloud datastore, which will be used by another cloud function to request builds.

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-06-25 13:41:04 +10:00
FrankGalligan d647392eda
Draco: add more emails (#4030)
* Draco: add more emails

* Fix name mistake
2020-06-24 14:59:50 -07:00
DavidKorczynski bee17f0144
[HAProxy] Added two new contacts for HAProxy fuzzing. (#4029) 2020-06-24 13:51:44 -07:00
Nick Wellnhofer e3c5b941da
[libxml2] Two new fuzz targets (#4022)
* [libxml2] Two new fuzz targets

Enable HTML and XML Schema fuzzers.

* [libxml2] Compile missing source files

* [libxml2] Don't forget to build seed corpora
2020-06-24 13:01:23 -07:00
Zhengdai Hu adc5fcd502
[zetasql] Initial onboarding of ZetaSQL (#4010)
* Add initial onboarding scripts of ZetaSQL for review

* Checkout fuzz target from simple_fuzzer branch

* Enable code coverage report

* Enable only ASAN and MSAN

* Fixed broken tzdata symlink

* Switch to master branch
2020-06-24 12:47:55 -07:00
DavidKorczynski 54d69b6f2d
Updated settings in project yaml so bugs are freely visible. (#4024) 2020-06-23 15:28:42 -07:00
Ravi Jotwani 04f3736d32
Draco fuzz coverage (#3980)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added Apache 2 license header

* changed project maintainer, cleaned up draco_decoder_fuzzer, and set working directory in Dockerfile

* added a couple of fuzzers

* two more targets

* merged from upstream

* build point cloud encoding fuzzer, renamed quantization fuzzers

* added more fuzzers

* moved fuzzers and build script to https://github.com/google/draco, made the build script here execute the new one

Co-authored-by: Ravi Jotwani <rjotwani@google.com>
2020-06-23 12:31:24 -07:00
Yuquan Wang 2fdb520e26
Yuquanw branch (#4019)
* Adding auto-cc to project usrsctp

* Improving fuzzing coverage

* Remove experimental dataflow sanitizer

Co-authored-by: Yuquan Wang <yuquanw@google.com>
2020-06-22 14:47:15 -07:00
Nathan Moinvaziri 351bf4c3c8
Updated c-blosc to use fuzzers in c-blosc repository. (#4018)
Use compat files for seed corpus with new decompress_fuzzer.
2020-06-22 11:32:53 -07:00
Shivam7-1 eedf02164e
Updated rust_lang.md (#4017) 2020-06-22 08:05:20 -07:00
Abhishek Arya e8ffee4077
Update project.yaml 2020-06-22 08:02:59 -07:00
DavidKorczynski 8656b3722c
[Haproxy] Simplify build script and update to latest code (#4000)
* Updated hpack to work with new build.

* Required minimium length.
2020-06-22 07:57:33 -07:00
alex da7bb14b96
QEMU: Add fuzz target build scripts (#3935)
* QEMU: Add fuzz target build scripts

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>

* QEMU: Disable AFL and MSan in project.yaml

We can't link against OSS-Fuzz' afl driver as it is not compiled with
-fPIC. Additionally, it appears that we trigger some false-positives
with MemorySanitizer, since we don't instrument all of the libraries.
Disable AFL and MemorySanitizer, for now.

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2020-06-21 16:38:41 -07:00
werdnaH 63868cba90
[skia] Remove Options Files with Only max_len Flag (#3987)
* [skia] add svg fuzzer

* [skia] removed options file

* [skia] removed options file

* [skia] removed all options files with only max_len

* delete options

* fixed cp statements

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-06-21 16:35:58 -07:00
Felicia Lim be9ec2bcd1
[opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives (#4007)
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives

Without this, a silk_memcpy call could resolve to __memcpy_chk,
which does not have an msan intercept, leading to false use-of-uninitialized-value errors.

* [opus] Consolidate cflags

* [opus] Fix typo
2020-06-21 16:34:41 -07:00
Shivam7-1 50bc1d647c
Updated reproducing.md (#4013) 2020-06-20 08:31:59 -07:00
Shivam7-1 48bd2b6377
Updated continuous_integration.md (#4014) 2020-06-20 08:31:51 -07:00
Robert Löhning 9fd351cb1a
[qt] Test qtsvg (#4012) 2020-06-19 07:53:57 -07:00
Shivam7-1 058247f3d3
Updated ideal_integration.md (#4011) 2020-06-19 07:47:00 -07:00
Shivam7-1 de5c5e69c3
Updated fuzzer_environment.md (#4009) 2020-06-18 08:21:49 -07:00
asraa 9d589a7e86
Add arthur and use less memory (#4001)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-18 08:20:41 -07:00
Tanuj Garg 98e73d06c2
added auto_cc to json project (#3999) 2020-06-17 13:19:35 -07:00
bungeman ca4277eb5a
[skia] Fix coverage build to use Ninja. (#4005)
The other builds were moved to Ninja, this one needs to be as well.

Bug: oss-fuzz:23438
2020-06-17 12:50:25 -07:00
jonathanmetzman cac6118315
[cifuzz] Temporary fix for sanitizer validation. (#3997)
Temporary fix for sanitizer validation.

Our sanitizer validation is hacky and isn't using pyyaml to actually
parse the project.yaml file. Temporarily work around #3996 by not
validating sanitizers if no sanitizers are specified in project.yaml.
2020-06-17 10:32:42 -07:00
Mihai Maruseac 8603f6a6cd
Enable more fuzzing for TensorFlow (#4004)
* Link against `libc++` with proper config in `.bazelrc`

* Add support for `undefined` build, link against proper `clang_rt` library

* Don't rsync in verbose mode.

* Support `undefined` and `memory` sanitizers

* Support more fuzzers than just `libfuzzer`.
2020-06-17 10:10:29 -07:00
Arshdeep Singh 094e3fdd68
Added auto-cc to lodepng project (#4002) 2020-06-17 07:15:22 -07:00
Yuquan Wang 7980fdb381
Adding auto-cc to project usrsctp (#3998)
Co-authored-by: Yuquan Wang <yuquanw@google.com>
2020-06-16 11:19:33 -07:00
Evgeny Vereshchagin cce70171d4
docs: guard curly braces with {% raw %} .. {% endraw %} (#3994)
Just a follow-up to https://github.com/google/oss-fuzz/pull/3984 that
should address https://github.com/google/oss-fuzz/pull/3984#discussion_r440951881.
According to https://jekyllrb.com/docs/liquid/tags/#code-snippet-highlighting,
another option would be to add `render_with_liquid: false` in your front matter to
disable Liquid entirely for a particular document.
2020-06-16 09:43:53 -07:00
Jonathan Foote bfa11be2f9
Explicitly define sanitizer support (#3995)
The oss-fuzz documentation states that listing supported sanitizers in a project's yaml [is optional](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#sanitizers). It appears that CIFuzz requires supported sanitizers to be included in this file ([ref](26e8d7c772/infra/cifuzz/cifuzz.py (L508-L529))). I believe this causes the CIFuzz Github Action to fail for projects that have not listed support for address sanitizer explicitly in their respective project YAML.

This PR explicitly defines support for asan and ubsan with a goal of fixing h2o's CIFuzz build
2020-06-16 09:18:02 -07:00
Evgeny Vereshchagin d9c7f893f3
[docs] switch to a matrix in the "sanitizer" example (#3984)
This was discussed in https://github.com/google/oss-fuzz/pull/3969#discussion_r439145136
2020-06-16 08:24:48 -07:00
Arshdeep Singh e4420e001d
Added Seed Corpus and Dictionary for lodepng Library (#3986)
* Added Corpus and Dictionary for lodepng Library

* Added Dict download link in DockerFile for lodepng
2020-06-16 07:43:08 -07:00