Commit Graph

22 Commits

Author SHA1 Message Date
Felicia Lim bc4aed352b
Update auto_ccs (#6955) 2021-12-03 00:22:00 +00:00
Google AutoFuzz Team d0f46b554b
Add Google-written opus fuzzers (#6798)
Those fuzzers have been written and used internally with great results,
finding a couple of bugs, both in code and in design,
and have a code coverage of ~80% for the src/ folder,
and ~90% for both silk/ and celt/.

The fuzzers are put here and not upstream in libopus' repository,
because they are written in C++, and I'm not sure it's worth
the complexity of re-implementing FuzzedDataProvider
in C just for the sake of moving those files.

Co-authored-by: Julien Voisin <jvoisin@google.com>
2021-11-08 15:55:07 -05:00
MarcoFalke 208558493d
Remove no longer needed build workarounds (#6329)
* Revert xenial workaround in speex (no longer needed)

This reverts commit 84c9dd3600.

* Revert xenial opus workaround (no longer needed)

This reverts commit 7cc0561aad.

* Remove ffmpeg build workaround for nasm

* Remove build workaround for dav1d

* Remove libavif build workaround

* Remove p11-kit build workaround

* Remove postgis build workaround
2021-08-27 09:37:24 +01:00
MarcoFalke 02ff730a0c
opus: Try to fix build issue (#5860) 2021-05-31 19:44:12 +01:00
Abhishek Arya 95a7b67504
Add main_repo for some more projects. (#4819) 2020-12-10 08:15:05 -08:00
James Zern f0a3de78ff
opus: enable asserts (#4532) 2020-10-14 19:14:36 -07:00
Ravi Jotwani 80fa75131e
[opus] Add new fuzzer (#4118)
* added new opus fuzzer, build working

* added missing license header, cleaned up Dockerfile

* fixed build process

* changed build process depending on C or C++ fuzzer

* converted opus_multi_fuzzer from C++ to C, reverted build script to only accept C files
2020-07-14 16:49:49 -07:00
devtty1er d561c49ae5
Update Dockerfiles (#4070)
* Use LABEL in place of MAINTAINER

* Remove LABEL maintainer from Dockerfiles
2020-07-06 13:18:23 -07:00
Felicia Lim be9ec2bcd1
[opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives (#4007)
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives

Without this, a silk_memcpy call could resolve to __memcpy_chk,
which does not have an msan intercept, leading to false use-of-uninitialized-value errors.

* [opus] Consolidate cflags

* [opus] Fix typo
2020-06-21 16:34:41 -07:00
Felicia Lim cbeed2ba0b
[opus] Update upstream repository url (#3793) 2020-05-12 13:06:49 -07:00
Max Moroz 51dd9a02cb
Enable dataflow build config for 22 more projects (#1632). (#3519)
* Enable dataflow build config for 22 more projects (#1632).

* suppress warnings in libteken

* move suppressing DFSAN_OPTIONS to the builder image
2020-03-18 13:12:58 -07:00
Max Moroz 71f4914c45
[presubmit] Enforce language attribute in project.yaml to be always set. (#3477)
* [presubmit] Enforce language attribute in projectt.yaml to be always set.

* Update documentation, better presubmit check, new project template.

* add docstring to templates.py

* Add example values in the project.yaml template and remove python value for now

* Add "project: c++" to 256 projects

* format

* Add labels and selective_unpack sections to the presubmit check

* fix incorrect auto_ccs format in three projects

* fix nss emails after rebase
2020-03-10 11:08:01 -07:00
Tyson Smith a0eb412444 Update multiple vendor_ccs lists (#3091)
* Update and add more Mozilla employees
2019-12-10 17:51:56 +00:00
Christoph Diehl 7ed3f375b6 Add Mozilla fuzzing team to auto_cc of their used 3rd party libraries (#2703)
* Add Mozilla fuzzing team to auto_cc of their used 3rd party libraries

* Use new vendor_ccs field in projects.yml (#2703)

* Remove not yet approved projects

* Remove not yet approved projects
2019-08-28 09:16:53 -07:00
jonathanmetzman 3049c50d48
Migrate projects using -lFuzzingEngine to $LIB_FUZZING_ENGINE (#2325)
Migrate from -lFuzzingEngine to $LIB_FUZZING_ENGINE where possible and not causing breakage
2019-05-01 11:09:55 -04:00
Devin Jeanpierre 330386686d Use apt-get update && apt-get install, per best practices: (#561)
https://docs.docker.com/engine/userguide/eng-image/dockerfile_best-practices/

I ran into this because I was getting errors locally, like:

    E: Failed to fetch http://archive.ubuntu.com/ubuntu/pool/main/d/dpkg/libdpkg-perl_1.18.4ubuntu1.1_all.deb  404  Not Found [IP: 91.189.88.149 80]

It turns out you get these if you don't update, and the official best practices are to `run apt-get update && apt-get install`. In fact, running _any_ apt-get install command without the apt-get update && before it can result in unfortunate caching artifacts -- see "cache busting". (P.S. thanks to Peng on Freenode for helping me, I'm bad at Ubuntu.)

So:
    sed -re \
        's/RUN apt-get ((-y )?(install|build-dep))/RUN apt-get update \&\& apt-get \1/' -i \
        projects/**/Dockerfile

I also manually fixed the cases that already ran apt-get update in their Dockerfile:
    dlplibs/Dockerfile
    grpc/Dockerfile
    libreoffice/Dockerfile
2017-05-01 23:31:02 -07:00
Abhishek Arya 0e0ce94676 Remove experimental flag from tested msan projects (#473). (#517) 2017-04-05 09:58:03 -07:00
Abhishek Arya 26d50f18fc Enable msan experimental on some projects. (#514) 2017-04-04 17:13:59 -07:00
Oliver Chang 60835ac420 oss-fuzz/BASE_IMAGE -> oss-fuzz-base/BASE_IMAGE 2017-03-22 12:12:51 -07:00
Oliver Chang 7df64d4ac4 [infra] ossfuzz/IMAGE -> gcr.io/oss-fuzz/IMAGE 2017-03-15 18:46:31 -07:00
FeliciaLim d83a22c432 [opus] Add Dockerfile and build.sh for decoder (#385)
* [opus] Add Dockerfile and build.sh for decoder

* [opus] http->https and updated auto_ccs in project.yaml

* [opus] Fix copying .options and test corpus zip files
2017-02-14 18:14:17 -08:00
Jean-Marc Valin 41e364045b Adding Opus (#110) 2016-12-01 12:07:54 -08:00