Commit Graph

2901 Commits

Author SHA1 Message Date
Evan Miller 9ad8a64cc1
Add MDB Tools project (#4403) 2020-09-03 16:50:08 -07:00
Anshuman Goel d0063ade0f
Adding Microsoft email to view libyuv bugs (#4409)
Adding Microsoft email as vendor_ccs to view libyuv bugs
2020-09-03 16:41:31 -07:00
Henning Becker baf2672672
[orbit] Fix build bugs for Orbit (#4408)
I added the wrong header in the last commit. This will be fixed by this
commit.

Furthermore it seems to run as a different user in ClusterFuzz. So this
is fixed as well.
2020-09-03 10:01:42 -07:00
Marten Seemann 1070d8fd12
[quic-go] add fuzzing for the handshake (#4404) 2020-09-02 22:20:37 -07:00
Oliver Chang a8263735f5
Add a blackbox field to project.yaml (#4405)
This is needed for CF to determine whether or not to allocate the
project on a higher end bot to run the blackbox fuzzer.

Previously this was keyed on the "none" entry under fuzzing_engines,
which wasn't very descriptive. This change also lets us do both blackbox
and greybox fuzzing in the same project, which will be done for quickjs.
2020-09-03 11:08:09 +10:00
steadmon 00c22c0df0
[git] Add auto_ccs to project.yaml (#4406) 2020-09-02 16:39:19 -07:00
Nickolay Olshevsky e02f4c2e63
[rnp] add more fuzzers and update build script. (#4391)
* [rnp] remove verbose flag during botan unpacking.

* [rnp] use as much make jobs, as available.

* [rnp] stick to the $SRC folder during the build.

* [rnp] automatically detect fuzzers and ignore possible chrpath error.
2020-09-02 10:26:26 -07:00
Max Dymond a6af9885b0
[libsndfile] Add libsndfile support (#4388) 2020-09-01 13:55:43 -07:00
asraa a63651b648
[envoy] fix envoy build (#4336)
* fix envoy build

Signed-off-by: Asra Ali <asraa@google.com>

* fix ubsan

Signed-off-by: Asra Ali <asraa@google.com>

* revert

Signed-off-by: Asra Ali <asraa@google.com>

* fix coverage

Signed-off-by: Asra Ali <asraa@google.com>

* actually fix coverage

Signed-off-by: Asra Ali <asraa@google.com>
2020-09-01 10:09:16 -07:00
Yunshu Ouyang cede674e25
[Nginx] Fixed fuzzer startup crash (#4399) 2020-09-01 08:30:18 -07:00
fouzhe d8c63be4be
FIX: build failure of eigen (#4390) 2020-08-30 21:17:59 -07:00
Yunshu Ouyang 740536e25e
[Nginx] Initial integration, new fuzzer added (#4144)
* [postgresql] Added auto_css to project.yaml

* [postgresql] Added new fuzzer

* [postgresql] Cleaned up files, changed project.yaml

* Dockerfile - changed to official repo

* Renamed fix.diff

* [postgresql] Fixed parser_fuzzer, added new json_parser_fuzzer

* [nginx] updated project.yaml

* [nginx] added first fuzzer

* [nginx] added build file for fuzzers

* Added license header

* Removed dictionary

* Removed dictionary

* Moved fuzzers to fuzzer directory

* fixed new lines

* Updated years, removed maintainer field in Dockerfile

* Removed line spaces

* Updated year

* Changed existing fuzzer

* Changed Makefile

* delete newlines

* remove patch

* update year

* add socket wrapper functions

* modified fuzzer initialization

* add new grpc module fuzzer

* Removed grpc fuzzer

* Fixed http request fuzzer

* Add nginx patch

* Add Makefile for fuzzers

* Fix fuzzer

* Added client side fuzzing

* fixed fuzzer

* Removed memory and undefined sanitizers

* Added dictionary

* Changed fuzzer from c to c++

* Use protobuf for input to fuzzer

* Improved style

* Added configuration file needed by fuzzer

* Added licence header

* Added makefile for fuzzers

* Fixed dictionary

* Modified make_fuzzers

* moved dictionary

* Undo last commit
2020-08-30 10:21:28 -07:00
Henning Becker 16b04c4a99
Add build configuration for the orbit project (#4393)
That's a first shot of a build configuration. Works on my machine so
far.
2020-08-28 15:47:56 -07:00
Yunshu Ouyang 5353a65136
[Postgresql] Added initialization parts to fuzzers (#4357) 2020-08-28 15:25:55 -07:00
Nikita Popov fd4659b60e
[php] Add execute fuzzer (#4387) 2020-08-28 09:10:07 -07:00
Henning Becker 6475527202
[orbit] Initial integration (#4386)
Adding basic `project.yaml` file to request project acceptance.
2020-08-27 09:21:05 -07:00
Alessio Bazzica deb3ad0800
fix pffft (#4385) 2020-08-27 08:45:01 -07:00
Tim King 2be3383e81
Adding an alternative account for Dan Bloomberg for Leptonica. (#4384) 2020-08-26 20:59:26 -07:00
Guido Vranken 2a50933ed4
[cryptofuzz] Add wolfCrypt build options (#4382)
* [cryptofuzz] wolfCrypt: Build with mp_jacobi

* [cryptofuzz] wolfCrypt: Support Ed25519, Ed448
2020-08-26 20:59:10 -07:00
metamerism c5772fa300
[openexr] fix memleak in readSingle with wide images (#4380)
Signed-off-by: Peter Hillman <peter@pedro.kiwi>
2020-08-26 14:23:41 -07:00
jonathanmetzman a6abdaa5ac
[graphicsfuzz-spirv] Disable project. (#4373)
It's broken now because ClusterFuzz's blackbox fuzzer model can't
support it.
2020-08-25 18:22:11 -07:00
Marten Seemann 164cc93088
[quic-go] add fuzz targets for tokens, generate seed corpora (#4365)
* [quic-go] add a fuzz target for tokens

* [quic-go] generate seed corpora in build script
2020-08-25 17:10:09 -07:00
Douglas Bagnall 2d83cb1bb3
samba: add Volker Lendecke to CC list (#4368) 2020-08-25 16:42:30 -07:00
Tyson Smith df40d511b1
[spidermonkey] Fix issue 19014 (#4369) 2020-08-25 16:39:51 -07:00
Joachim Metz 56bfc603d9
Added libluksde, libvsgpt, libvsmbr, libewf and libsmraw to libyal project configuration (#4358) 2020-08-24 08:40:48 -07:00
Paul Kehrer 50235c64dd
add jbigkit to IM (#4354) 2020-08-23 23:14:03 -07:00
metamerism be6237a516
[openexr] fix memleak in scanlinefuzzer with wide images (#4356) 2020-08-23 23:13:33 -07:00
Tyson Smith 676e433557
[firefox] Disable UBSan and honggfuzz for now (#4346) 2020-08-20 20:02:29 -07:00
Tyson Smith f0c4879cc4
[firefox] Call 'mach bootstrap' in Dockerfile and build.sh (#4345) 2020-08-20 18:43:30 -07:00
Ravi Jotwani aa807fcd8a
[pycryptodome] Additional Fuzzer (#4339)
* initial commit

* update build script, build failing

* add necessary environment variable definitions

* build working

* programmatically get system bits

* add md5 fuzzer

* fix style

* add fuzzers for two more hash functions

* testing dynamic includes

* build working

* clean up build script

* add aes fuzzer

* patch block_common to avoid build issues

* remove comments

* update patchfile location

* move patchfile again

* apply patch from subdirectory

* remove another comment

* change state type, use same data for encryption and decryption
2020-08-20 18:42:35 -07:00
Victor M. Alvarez 038a3e272e
yara: enable "macho" module. (#4344) 2020-08-20 15:26:14 -07:00
Tyson Smith b77c1c6980
[mp4parse-rust] Add to vendor_ccs list (#4343) 2020-08-20 14:44:13 -07:00
Josh Matthews 250fa90859
[servo] Update for repo reorganization. (#4340) 2020-08-20 06:52:30 -07:00
Kalvin 77a94ceb8b
projects/ghostscript: add contributor (#4333)
This change adds me (Kalvin) to the list of contributors allowed
to view Ghostscript issues on OSS-Fuzz.
2020-08-19 09:56:51 -07:00
Marten Seemann c059c5322b
[quic-go] add a fuzz target for QUIC transport parameters (#4330) 2020-08-18 00:11:50 -07:00
Marten Seemann ea7fa1041c
[quic-go] add qpack (#4331) 2020-08-18 00:11:35 -07:00
Ravi Jotwani b979d7ef34
[pycryptodome] Initial integration (#4317)
* initial commit

* update build script, build failing

* add necessary environment variable definitions

* build working

* programmatically get system bits

* add md5 fuzzer

* fix style

* add fuzzers for two more hash functions

* testing dynamic includes

* build working

* clean up build script

* style fixes
2020-08-17 11:35:47 -07:00
Nick Wellnhofer f686d96257
[libxml2] Add another target, minor fixes (#4329)
- Add new XPath fuzz target
- Set V=1 globally
- Clean seed corpus to make sure it will be rebuilt
2020-08-17 07:46:18 -07:00
DavidKorczynski 0acecb4451
[nodejs] Simplify build process as most work is now upstreamed. (#4327)
* Build of nodejs has now been upstreamed and this commit simplifies the build for nodejs to the new updates.

* We only support libfuzzer for now.

* Simplified the build script.
2020-08-17 07:41:25 -07:00
Joachim Metz 56525dc76c
Added libfwps, libagdb, libcreg, libmdmp, libnk2 and libvslvm to libyal project configuration (#4328) 2020-08-16 22:49:48 -07:00
asraa 9a817f24b3
[envoy] add zach (#4323)
Signed-off-by: Asra Ali <asraa@google.com>
2020-08-14 14:23:56 -07:00
Tom Ritter 3d5478c653
[rnp] Generate input corpus (#4322) 2020-08-14 10:53:56 -07:00
Alex Gaynor 929dc5e247
[libyaml] use an email with a google account (#4321) 2020-08-14 09:40:40 -07:00
Alex Gaynor 9981af4965
Added additional libyaml maintainers (#4319) 2020-08-14 08:55:15 -07:00
Yuquan Wang ae2d4de73a
[usrsctp] Add fuzzer for usrsctp (#4318)
* merge a new fuzzer o

* merge a new fuzzer of usrsctp
2020-08-13 16:52:50 -07:00
werdnaH 5125d29c64
Move zip and json to data folder (#4293)
Do this so that CIFuzz will work.

Co-authored-by: Zepeng Hu <zepenghu@google.com>
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2020-08-13 15:31:01 -07:00
Michael Jezierny af41a3d31a
[sleuthkit] Initial integration for Sleuthkit (#4178)
* Get Sleuthkit building in the OSS-Fuzz builder.

* added fuzzers, included primary contact email, and updated build script

* included license headers

* fixed variable name typo in build script

* remove memory initialization in sleuthkit_mem_img.h

* style fixes, remove instances of goto

Co-authored-by: Ravi Jotwani <rjotwani@google.com>
2020-08-13 12:51:52 -07:00
Ondřej Surý 80a651a794
[bind9] Adjust the emails, so everybody on the team has access (#4313)
change the primary contact to the BIND 9 developers group alias,
instead of security-officer
2020-08-13 09:16:12 -07:00
Ondřej Surý 6f0a24f0d5
[bind9] Re-enable AFL fuzzing engine. (#4310) 2020-08-13 07:21:38 -07:00
Evgeny Vereshchagin eb5b769c75
[systemd,util-linux] build more often (#4312)
Hopefully this should prevent OSS-Fuzz from reporting bugs that
have alread been fixed. Though I'm not sure how stable it's going to be
given that https://github.com/google/oss-fuzz/issues/4083 is still
open. Let's see.
2020-08-13 07:18:16 -07:00
Oliver Chang 2e11666263
Fix typo in bind9 project.yaml 2020-08-13 10:37:02 +10:00
Max Moroz 5f1504cb10
[bind9] Add more contacts to auto_ccs (#4310). 2020-08-12 16:42:07 -07:00
Ravi Jotwani 8a74af8f52
[libyaml] Add more fuzz targets (#4043)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added more fuzzers, updated build script to generate corpus and options for each

* place yaml.dict in SRC first, rather than in OUT directly

* changed fuzzers from c++ to c, updated build script

* started using booleans instead of ints, updated naming conventions

* replaced all instances of  with

* removed memsets, stopped using first two bytes of input, and removed file I/O

* fixed style, changed function return types to bool instead of int

* added libyaml_parser_fuzzer back, implemented string handling to not exceed buffer size in libyaml_emitter_fuzzer, and made style fixes

* changed boolean functions to return error, not success

* fixed inverted check

* changed variable names, fixed crash in libyaml_emitter_fuzzer

* fixed addition/subtraction style

* make a dynamically growing heap buffer

* place yaml_write_handler in distinct header file, style fixes

* fix style and memory safety issues in reformatter fuzzers, remove unused vars

* consistent assignment of done variables
2020-08-12 15:44:24 -07:00
Ravi Jotwani 089c9e039b
[e2fsprogs] Delete ext2fs_read_write_dir_block_fuzzer.cc (#4302)
Deleting this fuzzer as it has proved problematic (see internal bug #160587918). Reasons for deletion:
- This fuzzer is not written well. We pass an uninitialized output buffer to `ext2fs_read_dir_block()`, have redundant function calls (see [here](https://github.com/tytso/e2fsprogs/blob/master/lib/ext2fs/dirblock.c#L62) and [here](d36af019b0/projects/e2fsprogs/fuzz/ext2fs_read_write_dir_block_fuzzer.cc (L66))), and pass empty `blk64_t` structs to the fuzz targets.
- Removing this fuzzer has negligible impact on total coverage. Running [this](https://github.com/googleinterns/oss-fuzz-utils/blob/master/coverage.sh) coverage utility after removing the fuzzer locally outputs the following results (fuzzing each build for 10 minutes).
```original: 244/13082 regions - 1.86515823269% coverage
modified: 239/13070 regions - 1.8286151492% coverage```

@tytso @alsophian Please feel free to chime in.
2020-08-12 15:43:50 -07:00
Ondřej Surý 70abe8f33c
[bind9] Adjust the Dockerfile and build.sh for main branch (#4309) 2020-08-12 14:16:48 -07:00
Joe Drago 014e070f99
[libavif] Cut down on post-decode combinations to avoid timeouts (#4308)
Co-authored-by: Joe Drago <jdrago@netflix.com>
2020-08-12 13:43:18 -07:00
b92paul 6ffa47eb77
[CRAS] Fix build error and build new fuzzer (#4306)
* [CRAS] Fix build error and build new fuzzer

- Fix build error by installing 1.8.x gtest and using `make install` to
  install gtest pc file for pkg-config
- Build and add new fuzzer `cras_hfp_slc`

BUG=oss-fuzz:24744

* fix the copyright

* fix the copyright

* Update Dockerfile

Co-authored-by: Max Moroz <mmoroz@chromium.org>
2020-08-12 13:42:51 -07:00
Max Moroz 9f088e8671
[bind9] Temporarily disable AFL fuzzing engine. (#4307) 2020-08-12 13:25:50 -07:00
Ondřej Surý 697d0d2835
[bind9] Add bind9 as new proposed oss-fuzz target (#4304)
* Add bind9 as new proposed oss-fuzz target

* Add basic Dockerfile and build.sh

* Change the auto_cc addresses to @isc.org

* fix the copyright

* fix the copyright

Co-authored-by: Max Moroz <mmoroz@chromium.org>
2020-08-12 12:21:42 -07:00
Ravi Jotwani 9348981822
[alembic] Initial integration (#4236)
* initial commit

* removed instances of cout in fuzzer, build failing

* Fix the Alembic build.

This commit gets Alembic building properly by linking it against
a locally compiled checkout of the most recent OpenEXR release.

* placed temp file in /tmp, modified build script

* added zlib1g-dev:i386 as a dependency in Dockerfile

* style fixes, removed msan

* combine dumpAttribute functions

* fix formatting

* update fuzzer_temp_file.h, style fixes for fuzzer

* populate target names

* disable ubsan for the time being

Co-authored-by: Michael Jezierny <mtjz@google.com>
2020-08-11 16:43:16 -07:00
Joe Drago 425b3689e2
[libavif] add bidirectional RGB conversion paths to the fuzzer (#4300)
Co-authored-by: Joe Drago <jdrago@netflix.com>
2020-08-11 16:27:41 -07:00
Guido Vranken d36af019b0
[cryptofuzz] Enable wolfSSL keygen (#4298) 2020-08-11 11:06:47 -07:00
Ravi Jotwani e0a94e1a09
[opusfile] Initial integration (#4249)
* [opusfile] Initial integration

* add license header

* cleaned up loop in build script

* fix typo in build script

* changed fuzzer from C++ to C

* run ldconfig before building fuzzer

* Force static linking when building the fuzzer.

This alternative linker syntax overrides the "lib{whatever}.so" default.
Fortunately, Ubuntu packages static libraries in libopus-dev and
libogg-dev.

Co-authored-by: Michael Jezierny <mtjz@google.com>
2020-08-11 09:49:44 +10:00
Guido Vranken eb35884a60
[cryptofuzz] Disable Nettle assembly in MSAN mode (#4295) 2020-08-10 16:22:40 -07:00
xuri 67a1a100f9
[excelize] Add project.yaml (#4283) 2020-08-10 13:34:19 -07:00
sleevi 80d214878c
[boringssl] Fix BoringSSL build break (#4294)
The upstream LPM-based fuzzer changed its layout, so update the build
files to reflect this. This may make sense as a separate .a file in
the future to avoid these breaks.

Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24776
2020-08-10 12:49:33 -07:00
Alex Hultman 70c5df7cfd
[uwebsockets] Don't install zlib from ubuntu.com (#4292) 2020-08-10 11:08:05 -07:00
Evgeny Vereshchagin ce6acd27b4
[util-linux] switch to the upstream build script (#4289)
Now that https://github.com/karelzak/util-linux/pull/1068 is merged
we no longer need to keep the fuzz target and build script here.
2020-08-10 08:46:12 -07:00
Alex Hultman 6f180bb8a3
[uwebsockets] Increase builds per day, file msan issues (#4290) 2020-08-10 07:57:17 -07:00
Joachim Metz 3fc4134b4e
Added libfsext and libfshfs to libyal project configuration (#4288) 2020-08-10 07:53:15 -07:00
ToSeven ea7fddf6c8
initial libyuv project.yaml (#4282)
Co-authored-by: toseven <Byone.heng@gmail.com>
2020-08-09 21:11:43 -07:00
Evgeny Vereshchagin 66acceccd5
[util-linux] more util-linux contributors (#4287) 2020-08-09 21:10:22 -07:00
Guido Vranken efeb20e2d5
[cryptofuzz] wolfCrypt: Add build options (#4286)
- Enable SHAKE
- Enable additional curves
- Disable tests and examples for shorter build times

[cryptofuzz] Add Nettle

[cryptofuzz] Nettle: Fix 32 bit build

[cryptofuzz] Add libgmp

[cryptofuzz] Don't build libgmp with MSAN

[cryptofuzz] Add mpdecimal

[cryptofuzz] Fix libgmp, mpdecimal builds
2020-08-08 17:52:31 -07:00
Janne Grunau 29837b97ac
[dav1d] fix the build (#4285)
* projects/dav1d: remove unnecessarily installed packages

* projects/dav1d: fix build by just copying the fuzzing binaries

Meson switched the name of the directory holding the objects for the
fuzzer binaries to match the pattern used to copy all fuzzing binaries.
Copying the directory failed.
2020-08-08 07:34:43 -07:00
Max Moroz be9a96b09c
[fuzzing-puzzles] Disable the project for now. (#4279) 2020-08-07 15:07:34 -07:00
Max Moroz 941ada694b
[infra] Add support for custom sanitizer options in run_fuzzer. (#4274)
* [infra] Add support for custom sanitizer options in run_fuzzer.

* address review feedback

* fix presubmit warnings
2020-08-07 12:48:23 -07:00
Petteri Aimonen 0e6703bd67
[nanopb] Update seed corpus handling for separate test cases (#4277) 2020-08-07 12:10:20 -07:00
Ravi Jotwani 7ff3b68f7e
[openexr] Using different file utilities to write files to /tmp (#4218)
* using tidy_html5's fuzzer_temp_file utilities to create a file from fuzzing input in /tmp

* used FuzzerTemporaryFile class, updated copyright year

* catch all exceptions instead of a select few, fix styling in openexr_exrheader_fuzzer

* updating fuzzer_temp_file.h with the changes mentioned in https://github.com/google/oss-fuzz/pull/4236
2020-08-07 11:40:34 -07:00
Evgeny Vereshchagin cd5123192f
[util-linux] turn on MSan (#4265)
This PR should be merged once https://github.com/karelzak/util-linux/pull/1114 is merged
2020-08-07 08:26:55 -07:00
Petteri Aimonen d1dc2b5e07
[nanopb] Split fuzztest to separate test cases. (#4276)
This should improve fuzzing performance.
2020-08-07 08:13:40 -07:00
Alex Crichton 0dc597e53e
Add `handle_segv =1` to Wasmtime's options (#4266)
* Add `handle_segv =1` to Wasmtime's options

This is an attempt to handle #4264
2020-08-06 17:02:42 -07:00
Marten Seemann c1b8f3bd36
[quic-go] add Dockerfile and build script (#4267) 2020-08-06 16:16:17 -07:00
Tyson Smith d51f86a4e4
[firefox] Install dependencies in Dockerfile (#4271) 2020-08-06 15:39:27 -07:00
Tyson Smith 3d7dc183d1
[mp4parse-rust] Limit allocation size (#4273)
* [mp4parse-rust] Set max_allocation_size_mb

* [mp4parse-rust] Update CC list
2020-08-06 15:38:53 -07:00
jonathanmetzman 95ffdaa04e
Fix cifuzz-example (#4272) 2020-08-06 14:53:25 -07:00
jonathanmetzman ca00e9e937
Add project for testing CIFuzz changes (#4268) 2020-08-06 10:44:54 -07:00
seabeepea 9743eb4bf3
Catch all exceptions via (...) rather than by explicit type (#4260)
The purpose of the fuzzer is to very that an exception is thrown, not
to validate that the correct *type* of exception is thrown. That is
the responsibility of the project's traditional test suite. Therefore,
the exception type is inconsequential.

Signed-off-by: Cary Phillips <seabeepea@gmail.com>
2020-08-06 06:10:51 -07:00
Tyson Smith 2f4da4e8da
[vorbis] Use shallow clone (#4259)
* [vorbis] Use shallow clone

* [tremor] Use shallow clone
2020-08-05 15:45:14 -07:00
Marten Seemann 3707eb201b
[quic-go] add project quic-go (#4253) 2020-08-05 14:30:54 -07:00
Joachim Metz 14c68963e6
Added libftxf and libfusn to libyal project configuration (#4254) 2020-08-05 07:38:52 -07:00
Danny Halawi e15b72d833
[boringssl] Structure Aware ASN.1 Fuzzing in BoringSSL (#4179)
* using asn.1 structure aware fuzzer to fuzz boringssl

* incorporating feedback

* changing fuzzer output name

* updating build script

* formatted files

* pulling from google/fuzzing

* uncommenting build

* removing certs
2020-08-04 16:52:53 -07:00
danh-arm 466b6eb6fe
Update Mbed TLS contact address and website (#4247)
Update the primary contact addresss and website in the Mbed TLS
project file.

Also update the Mbed TLS cc address in the bignum-fuzzer project
file.

Signed-off-by: Dan Handley <dan.handley@arm.com>
2020-08-04 07:20:00 -07:00
Joachim Metz 95d739322a
[libyal] Added libfsntfs to libyal project configuration (#4248) 2020-08-03 10:50:00 -07:00
Joachim Metz 8e2a59f8dc
Corrected error in libyal project configuration (#4246) 2020-08-02 07:49:24 -07:00
werdnaH 5415fe155d
[Skia] Update SKP Fuzzer (#4245)
* Update SKP Fuzzer

* fixed cf_map

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-31 19:41:31 -07:00
Nick Wellnhofer dc0f92fe90
[libxml2] Two new targets, rework build.sh (#4243) 2020-07-31 14:21:37 -07:00
Kevin Lubick e253e5ff4c
[skia] Remove API skdescriptor fuzzer (#4244) 2020-07-31 14:08:32 -07:00
Tyson Smith 7cee45b164
[speex] Remove use of out-of-date branch (#4232)
* [speex] Remove use of out-of-date branch

* [speex] Use git clone '--depth 1'
2020-07-30 12:14:55 -07:00
bungeman 695760805c
[skia] Further limit number of concurrent links. (#4228)
Reducing the number of concurrent link steps to the number of cpus does
not appear to have made much difference to the success of the Skia
project build. Limit the number of concurrent links to one in an attempt
to avoid running out of memory. If issues persist it is likely the bot
running this simply does not have enough memory to run the linker step.

This change is speculative since these builds have been working on the
CI bots and only failing on the oss-fuzz build.

Bug: oss-fuzz:23438,oss-fuzz:24345
2020-07-30 07:55:25 -07:00
Evgeny Vereshchagin 79b4afb990
[util-linux] run tools/oss-fuzz.sh if it exists (#4227)
to make it easier to use CIFuzz to make sure https://github.com/karelzak/util-linux/pull/1068
is more or less in good shape.
2020-07-30 07:54:59 -07:00
Tom Ritter 61d1b47fe1
Add two more team members to rnp's cc list (#4230) 2020-07-30 07:54:29 -07:00
bungeman 1753fe12bf
[skia] Limit concurrent link steps. (#4217)
The number of link build steps in the Skia build is currently not
limited and may be leading to the current failures where the linker is
killed with a signal. This changes that to limit the number of
concurrent linker steps to the number of cpus available. If there
continue to be issues it may be necessary to implement a hard limit.

Bug: oss-fuzz:23438,oss-fuzz:24345
2020-07-29 17:25:37 -07:00
asraa 3bc37fc82f
[envoy] Simplify finding fuzz targets by using a bazel query. (#4215)
Signed-off-by: Asra Ali <asraa@google.com>
2020-07-29 14:41:17 -07:00
Ravi Jotwani b78b8222ba
[openexr] Additional fuzzers (#4173)
* added two fuzzers from patch files, stripped unnecessary code from exrenvmap_fuzzer, build currently failing

* exrheader build working

* checking coverage for exrheader_fuzzer

* removed writes to cout for exrheader_fuzzer

* exrheader_fuzzer and exrenvmap_fuzzer working

* added license to exrheader_fuzzer

* remove namespaceAlias.h

* changed function names in exrheader_fuzzer, wrote files to /tmp in exrenvmap_fuzzer, included style fixes
2020-07-29 11:33:53 -07:00
Tom Ritter 284dad011e
[rnp] Add afl engine (#4212)
* [rnp] Add afl engine

* Add fuzz_dump and fuzz_keyring to the exception list

These binaries - from https://github.com/rnpgp/rnp/tree/master/src/fuzzing -
are very tiny and just call into the library with a single API,
and are not staticly compiled - so they have very few UBSAN calls.
2020-07-29 09:56:23 -07:00
Ebrahim Byagowi 242b6ae656
[harfbuzz] minor (#4214) 2020-07-29 07:42:34 -07:00
seabeepea e1920a468d
move Header constructor inside try/catch (#4208)
Signed-off-by: Cary Phillips <seabeepea@gmail.com>
2020-07-28 19:17:13 -07:00
Eugene Kliuchnikov 3c234c8f1c
Add fuzzer for Brunsli decoder (#4205) 2020-07-28 16:06:51 -07:00
Stephen Frost 56a3b89eae
Add gmail.com account to PostgreSQL project (#4206)
This is to add my (Stephen Frost's) gmail.com account to the PostgreSQL
project to allow me to view the issues that are being opened by the fuzz
tool.
2020-07-28 16:04:42 -07:00
Matt Johnston 951403b075
[dropbear] Change Mercurial repo to hg.ucc.asn.au (#4204) 2020-07-28 16:02:47 -07:00
Everett Maus 6806b74519
Removing no-longer valid email and updating sanitizer definitions (#4207)
* Removing no-longer valid email and updating sanitizer definitions

* Updating CCs to a team rather than an individual
2020-07-28 16:00:35 -07:00
Kim Kulling c22ec3a33d
Enable assimp-fuzzing test (#4181) 2020-07-28 08:39:08 -07:00
werdnaH 69869e098e
Add DDL Fuzzer (#4202)
Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-27 17:24:21 -07:00
Tom Ritter 490a59781e
[rnp] Fuzzer fixes and improvements for rnp (#4189)
Undefined sanitizer should now work, and the honggfuzz engine as well.
Upstream changes supported enabling these, and when I did so I
renamed one of the variables.
2020-07-27 11:54:20 -07:00
binaryFate da87fd8944
Monero: fix corpus zip file creation anew; enable honggfuzz&afl (#4200)
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-07-27 08:42:35 -07:00
Joachim Metz 2c34387f35
Added libfplist, libfsapfs, libbde, libqcow, libvhdi and libvmdk to libyal project configuration (#4198) 2020-07-27 07:58:04 -07:00
Micah Snyder 7f9866ee90
[clamav] Add optional autogen.sh step; fix build (#4193)
ClamAV recently removed autotools generated materials (configure,
Makefile.in, etc) from the git repo. This commit adds tools and calls
necessary to generate those files if autogen.sh is present.
2020-07-26 18:40:34 -07:00
AdamKorcz 793ed70907
[Radon] Added project (#4183) 2020-07-24 14:36:25 -07:00
pierwill 6892a59b58
Remove todo comment from influxdb build (#4185) 2020-07-23 10:00:31 -07:00
Kevin Lubick 3684abcfde
[skia] Fix build (#4182) 2020-07-23 07:40:36 -07:00
Ravi Jotwani bdb0b339d0
[uriparser] Fix null dereference in uri_dissect_query_malloc_fuzzer (#4174)
* fixed null dereference in uri_dissect_query_malloc_fuzzer

* removed unused include

* initialized chars_required, freed query_list if check unsuccessful, and used buf.data() instead of &buf[0]
2020-07-22 14:24:05 -07:00
Max Moroz c4075a9101
[icu] Add ftang@google.com to the auto_ccs list (fixes #4176). (#4177) 2020-07-22 10:17:54 -07:00
Sevki f743ea9d3b
p9: add fuzzing for p9 (#4084)
Signed-off-by: sevki <s@sevki.org>
2020-07-21 06:53:05 -07:00
Catena cyber 41b1710710
Updates patch for mysql 8.21 (#4162)
* Updates patch for mysql 8.21

* Fixup 8.21

* Disabkes fuzz_docommand to keep going with other targets for now

* do not even compile fuzz_docommand

* Adding license

* FIXMEs

* no longer compiled

* nits
2020-07-21 06:52:28 -07:00
Joachim Metz 4e96fea71c
Added libfwnt, libfwsi, libolecf and libscca to libyal project configuration (#4171) 2020-07-20 23:03:52 -07:00
bungeman b4e48c0d3b
[skia] Stop using gold. (#4164)
The gold linker was forced when the system linker stopped linking the
Skia build. It seems that the gold linker is now running into issues, so
attempt to switch back.
2020-07-20 22:54:59 -07:00
Ravi Jotwani 36e6fa39fe
[uriparser] Add new fuzzers (#4134)
* added new fuzzer

* added new fuzzer

* removed commented code

* add license header for uri_parse_fuzzer

* get values from FuzzedDataProvider, awaiting fuzz targets for FileNames and Ipv4 in parse_fuzzer

* build working

* fixed size mismatch, used better consumption function for remaining input

* reduced maxSize for uri_dissect_query_malloc_fuzzer

* added missing fuzz targets, removed unnecessary import

* removed unused include, changed instances of std::string to string, removed ToVector, added checks, and removed usage of FuzzedDataProvider in uri_dissect_query_malloc_fuzzer

* fixed vector issue in uri_parse_fuzzer

* added explicit value checks, removed Yoda comparisons
2020-07-20 16:50:20 -07:00
Vincent Rabaud 283447224d
Add more targets for OpenCV. (#4167) 2020-07-20 16:02:15 -07:00
bungeman af2de34dc3
Remove SkSVGCanvas.cpp from api_svg_canvas. (#4163)
This leads to multiple definitions of everything defined in
SkSVGCanvas.cpp since it will be compiled into the api_svg_canvas target
directly as well as the Skia xml target.
2020-07-20 09:27:38 -07:00
Joachim Metz 6beceb3030
Merged libesedb, libevt, libevtx, libexe, liblnk, libmsiecf and libregf into single project (#4166)
* Merged libesedb, libevt, libevtx, libexe, liblnk, libmsiecf and libregf into single libyal project

* Changes after review
2020-07-20 08:50:17 -07:00
Tom Ritter 0a334b3286
Add rnp (#4155) 2020-07-19 13:01:12 -07:00
DavidKorczynski 0d5e8c72e4
Fixed the build script of janet. (#4156) 2020-07-19 12:53:25 -07:00
Chris Wolfe 077c2b5aed
[msgpack-c] fix build (#4157)
* msgpack-c is now header only, update to install boost as req as well
2020-07-19 12:53:00 -07:00
Tim King b4bf783905
Adding ballbach@google.com to the auto_ccs list for leptonica. (#4154) 2020-07-18 17:30:14 -07:00
Yunshu Ouyang 016072db68
[spdlog] Added new fuzzers, modifed existing ones (#4008)
* Homepage updated, added auto ccs to project.yaml

* Fixed project.yaml

* [spdlog] Added new fuzzers, modifed existing ones

* Revert "[spdlog] Added new fuzzers, modifed existing ones"

This reverts commit 1e7f14a81d.

* Modified existing fuzzer

* Added new fuzzer for backtrace

* Added new fuzzer for formatter

* Added new fuzzer for set_pattern

* Added new fuzzer for log_levels

* Moved fuzzers to upstream repo

* Moved fuzzers back to oss-fuzz

* fixed fuzzers

* Update years
2020-07-17 12:46:42 -07:00
Yunshu Ouyang b189f869ca
[Postgresql] Initial integration, new fuzzer added (#4058)
* [postgresql] Added auto_css to project.yaml

* [postgresql] Added new fuzzer

* [postgresql] Cleaned up files, changed project.yaml

* Dockerfile - changed to official repo

* Renamed fix.diff

* [postgresql] Fixed parser_fuzzer, added new json_parser_fuzzer

* Removed dictionary

* Removed dictionary

* Moved fuzzers to fuzzer directory

* fixed new lines

* Updated years, removed maintainer field in Dockerfile

* Removed line spaces

* Updated year

* Changed existing fuzzer

* Changed Makefile
2020-07-17 10:31:19 -07:00
bungeman fde2cbfdff
[skia] Pass SWIFTSHADER_EMIT_COVERAGE for coverage. (#4152)
The SwiftShader build seems to want SWIFTSHADER_EMIT_COVERAGE set or it
will do things that interfere with a coverage build. Use this to
simplify the SwuftShader build a bit and hopefully restore the coverage
build.
2020-07-17 10:30:06 -07:00
Greg Landrum 4fb930fa52
Add new RDKit dependency (freetype) (#4150)
* Add new RDKit dependency (freetype)

FIxes Issue #23703

* just remove the freetype requirement for now

otherwise we have to build that static and that's a mess

* Update Dockerfile
2020-07-17 08:25:16 -07:00
R. Elliott Childre d70f793353
Delete unnecessary files and fix format in some MD pages (#4115)
* style: Clean up the repo

* Bolster the `.gitignore`
* Follow `CONTRIBUTING.md` guidelines and wrap `README.md` to 80
  characters and seperate links for readability
* Remove pesky Unicode dash in `CONTRIBUTING.md`
* Remove `.DS_STORE` files
* Rename `#project.yaml#` to something logical and enable stntax
  highlighting

* Updates from reviewers

* Greatly reduce `.gitignore` to only macOS `.DS_Store` and Vim
  temporary files
* Apply markdown style to `docs/index.md`
* small comma grammatical change

* http -> https
2020-07-16 15:27:29 -07:00
Sebastian Pipping d92c122155
[expat] Fix AddressSanitizer link errors (fixes #4143) (#4148) 2020-07-16 15:24:27 -07:00
Zhengdai Hu 9ba22659ac
[zetasql] Correct fuzzer indexing (#4142)
* Correct fuzzer indexing

* Remove redundant -e option
2020-07-16 13:31:09 -07:00
asraa 32263d2b17
[envoy] fix coverage and c++ issues (#4147)
Signed-off-by: Asra Ali <asraa@google.com>
2020-07-16 12:08:43 -07:00
Andreas Schneider 08712ad6ef
[libssh] Give Anderson access (#4145) 2020-07-16 07:20:26 -07:00
Augie Fackler a14eee4c42
mercurial: ignore our sanitizer-built Python for coverage purposes (#4141)
* mercurial: ignore our sanitizer-built Python for coverage purposes

Should help (maybe fix) #4003.

* Fix unneeded \

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2020-07-15 09:53:25 -07:00
Randy 26dcd1ac18
[stb] run upstreamed build script (#4135) 2020-07-15 07:22:18 -07:00
Juanpe Bolívar 820d15ea83
[immer] Add Immer project (#4129)
* Delete files that clearly someone added by mistake

* [immer] Add initial integration
2020-07-14 18:37:37 -07:00
Joachim Metz 9d61148f4d
Added libevt integration (#4123) 2020-07-14 18:33:32 -07:00
Joachim Metz 373adefa82
Added libmsiecf integration (#4124) 2020-07-14 18:33:10 -07:00
Joachim Metz 5fa409477d
Added libevtx integration (#4125) 2020-07-14 18:32:42 -07:00
Joachim Metz 9376cc2165
Added libregf integration (#4126) 2020-07-14 18:32:14 -07:00
Joachim Metz 9c16aecf48
Added libesedb integration (#4127) 2020-07-14 18:31:49 -07:00
Joachim Metz a5db65be84
Added libexe integration (#4130) 2020-07-14 18:28:18 -07:00
Joachim Metz c6fe118308
Added liblnk integration (#4122) 2020-07-14 18:25:42 -07:00
Ravi Jotwani 80fa75131e
[opus] Add new fuzzer (#4118)
* added new opus fuzzer, build working

* added missing license header, cleaned up Dockerfile

* fixed build process

* changed build process depending on C or C++ fuzzer

* converted opus_multi_fuzzer from C++ to C, reverted build script to only accept C files
2020-07-14 16:49:49 -07:00
Ravi Jotwani 96c3d4f440
[openexr] Replace buf_to_file with IStream (#4094)
* Add a working skeleton for OpenEXR fuzzers.

* added openexr fuzzers, updated build script to include them

* cleaned up bash loop

* [openexr] Replace buf_to_file with StdISStream.

Version 2.5.0 of OpenEXR added a StdISStream class that turns
a std::string into an Imf::IStream, which can be used instead of
filenames when opening an OpenEXR image.  This commit adds code which
wraps the fuzzer input into a StdISStream, which enables us to remove
the hacky buf_to_file function.

* updated deepscanlines_fuzzer to use IStream instead of filenames

* replace "/work" with  in build.sh

* Reformat CMake settings, and also prevent building utils and examples.

* Reformat and change names in build.sh.

* Omit the version prefix when building OpenEXR and IlmBase libraries.

* updated final two fuzzers to use istream

* fixed additional conflict in project.yaml

* get header size from input

* increased header size

* Fix argument types in readFileSingle

Co-authored-by: Michael Jezierny <mtjz@google.com>
Co-authored-by: Abhishek Arya <inferno@chromium.org>
2020-07-14 14:01:37 -07:00
Abhishek Arya 4f5c06fbf7
Revert "[binutils] Add new fuzzer (#4128)" (#4133)
This reverts commit 6d59abf3ca.
2020-07-14 13:43:13 -07:00
Zhengdai Hu 22dfa6882e
Onboarding new ZetaSQL fuzzers (#4095)
* Enable UBSAN

* Added a structure aware fuzzer

* Revert "Enable UBSAN" and explicitly enable it in
project.yaml

This reverts commit de66864567.

* Amend UBSAN commit

* Disable MSan

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2020-07-14 12:56:51 -07:00
Abhishek Arya c2ad696b86
Add security@openexr.org as per Cary's request 2020-07-14 10:51:31 -07:00
Ravi Jotwani 6d59abf3ca
[binutils] Add new fuzzer (#4128)
* cleaned up Dockerfile, added new fuzzer, updated build script

* added license header to fuzz_demangle.c
2020-07-14 08:05:51 -07:00
Ebrahim Byagowi 49149c244f
[ots] Enable more fuzzers (#4089)
* [ots] Enable more fuzzers

* [ots] Expand wildcards like /usr/lib/DataFlow*.o

* [ots] Use forcefallback so zlib source gets compiled

* [ots] Don't enable dataflow for ots
2020-07-14 07:51:37 -07:00
Ravi Jotwani 398fd1cf83
[libexif] Add new fuzzer (#4045)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added new fuzzer, placed license header in existing fuzzer
2020-07-13 21:48:31 -07:00
pierwill 44686eaa58
Add initial influxdb integration (#4038)
- Updates project.yaml to specify libfuzzer as fuzzing engine
- Adds a basic Dockerfile
- Add a build.sh script for initial target

Co-authored-by: pierwill <pierwill@users.noreply.github.com>
2020-07-13 21:14:49 -07:00
Gabriel Rasskin 7b9a3a895c
[tensorflow] Add assert compilation flag (#4119) 2020-07-13 13:41:19 -07:00
neildhar 83451151b4
Pass a flag to enable fuzzing (#4114) 2020-07-11 09:59:06 -07:00
werdnaH c8a9c08c09
[Skia] Add SkRuntimeEffect Fuzzer (#4108)
* Add SkRuntimeEffect Fuzzer

* fixed typo

* fixed the zip name

* fixed zip name

* fixed zip name

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-10 19:26:35 -07:00
Ravi Jotwani 07fbdfb29b
[lcms] Add new fuzzer (#4109)
* added new cms_transform_fuzzer, getting code instrumentation error

* build working, renamed new fuzzer
2020-07-10 19:26:12 -07:00
Alex Crichton cd665e2a82
Add wasm-tools repository to wasmtime project (#4111)
* Add wasm-tools repository to wasmtime project

This commit expands the fuzzers run under the Wasmtime project to
include those in the https://github.com/bytecodealliance/wasm-tools
repository. This includes various parsing for utilities used by Wasmtime
itself but also generally useful for other Rust projects! The
maintainers of the wasm-tools repository are also all currently all on
the notification list for Wasmtime fuzz bugs as well.

* Load all corpuses from wasmtime-libfuzzer-corpus
2020-07-10 19:25:01 -07:00
Danny Halawi 58e519a8f2
[jsoncpp] Integrate json protocol buffer and libprotobuf-mutator to fuzz jsoncpp (#4047)
* fixing Dockerfile for libpng-proto

* adding json proto, LPM, and fuzz target for jsoncpp

* adding vanilla fuzzer back in

* fixing weird spacing in build script + taking out unneedef header file

* adding settings field and passing all of json_str

* adding license headers

* refactoring settings field

* fixing compile issue

* fixing MSan issue, changing license to 2020, and using iterator instead of pointers

* passing pointers more understandably to parse

* taking out unecessary assign

Co-authored-by: Danny Halawi <dhalawi@google.com>
2020-07-10 17:17:32 -07:00
Max Moroz 47484451d5
[infra] Build honggfuzz with -D_HF_LINUX_NO_BFD (#3886). (#4107)
* [infra] Build honggfuzz with -D_HF_LINUX_NO_BFD (#3886).

* dummy edit to trigger CI
2020-07-10 14:50:39 -07:00
jonvolfson 9c5d905646
Dockerfile and build.sh modifications to get successful build (#4025)
* Add spanner emulator project

* Adding auto_css for Sneha and myself

* Adding dockerfile and build.sh files

* Further fixes for OSS-Fuzz integration

* Update build.sh

* Cleaning up commented code in build.sh

* Fuzzing branch merged with main in the emulator repo, modified dockerfile to clone main now instead of the branch.

* Updating build.sh to copy the binaries to out

* Cleaning up build.sh by removing Envoy specific comments, removed dictionary code as no corpus exists yet

* Updating yaml to include the memory sanitizer

* Build.sh should now copy fuzzing binaries properly to , adding fuzzing_enginers parameter to yaml to bypass AFL timeout for now.

Co-authored-by: Jonathan Volfson <volfson@google.com>
Co-authored-by: Oliver Chang <oliverchang@users.noreply.github.com>
2020-07-08 14:41:15 -07:00
Ebrahim Byagowi 5735c8b723
[harfbuzz] Enable testing of experimental APIs also (#4090) 2020-07-08 11:57:35 -07:00
Michael Jezierny c8279e2c2d
[openexr] Initial integration of OpenEXR fuzzers. (#4060)
* Add a working skeleton for OpenEXR fuzzers.

* added openexr fuzzers, updated build script to include them

* cleaned up bash loop

* replace "/work" with  in build.sh

* Reformat CMake settings, and also prevent building utils and examples.

* Reformat and change names in build.sh.

* Omit the version prefix when building OpenEXR and IlmBase libraries.

* Correct the contact addresses for OpenEXR.

Co-authored-by: Ravi Jotwani <rjotwani@google.com>
2020-07-07 14:28:37 -07:00
Ebrahim Byagowi 2c664877af
[harfbuzz] Use meson port (#4076)
* [harfbuzz] Use meson port

* [harfbuzz] workaround single quotes in fuzzer_ldflags
2020-07-07 14:27:40 -07:00
Ravi Jotwani 930720f048
[flac] Additional fuzzer (#4073)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added new fuzzer, build failing

* fuzzer_exo build working
2020-07-07 13:24:02 -07:00
Randy 0c21b09b36
[miniz] add Dockerfile, build.sh (#4085)
* [miniz] add Dockerfile, build.sh

* [miniz] update Dockerfile
2020-07-07 08:31:39 -07:00
Guido Vranken 11a0f516cd
[cryptofuzz] Build script updates (#4072)
* [cryptofuzz] Build script updates

- Update mbed TLS repository location
- mbed TLS: Enable components disabled by default
- wolfCrypt: Build AES key wrap ciphers

* [cryptofuzz] Add Marina Polubelovam to CC list
2020-07-06 13:53:50 -07:00
Catena cyber ecc80ba613
[ndpi] excludes builds artifacts from ndpi project (#4077) 2020-07-06 13:35:00 -07:00
devtty1er d561c49ae5
Update Dockerfiles (#4070)
* Use LABEL in place of MAINTAINER

* Remove LABEL maintainer from Dockerfiles
2020-07-06 13:18:23 -07:00
Abhishek Arya b74211ecf9
Skip coverage build in CI for non C/C++ projects. (#4075)
* Skip coverage build in CI for non C/C++ projects.

Fixes https://github.com/google/oss-fuzz/issues/4074

* Test wasmtime.
2020-07-06 13:13:02 -07:00
Nick Fitzgerald 82252c22ef
wasmtime: Only zip the seed corpus if it exists (#4065)
This will prevent build failures like
https://oss-fuzz-build-logs.storage.googleapis.com/log-5a0b58fe-4a35-46d5-b4d2-221905e7d208.txt
in the future.
2020-07-06 10:46:47 -07:00
asraa ba72f0b7fc
fixup coverage build (#4071)
Signed-off-by: Asra Ali <asraa@google.com>
2020-07-06 10:14:53 -07:00
rbehjati 88c5e76798
Update the build script for project oak to disable it temporarily (#4068) 2020-07-06 07:59:44 -07:00
Abhishek Arya a966c122ec
Fix sentencepience build failure 2020-07-06 07:53:15 -07:00
Robert Löhning 2264f7915f
[qt] Don't clone AFL (#4067)
Now that stable caught up with master, we
can use the clone from base-builder image.
2020-07-05 08:30:57 -07:00
Randy 3c7ab8e850
[libspng] extract zlib to separate directory (#4064)
CIFuzz is overwriting $SRC/libspng after executing the Dockerfile before running build.sh which means $SRC/libspng/zlib is lost:
https://github.com/randy408/libspng/runs/830380355#step:4:549
2020-07-02 19:00:39 -07:00
Evgeny Vereshchagin 7667c8fe08
[util-linux] move the fuzz target to the OSS-Fuzz repository (#4063) 2020-07-01 19:37:07 -07:00
Teju Nareddy f8c7f158f7
[ESPv2] Attempt to fix coverage build (#4062)
Currently, coverage builds fail on step 3 with:
```
Step #3: + rsync -avLkR --include '*.h' --include '*.cc' --include '*.hpp' --include '*.cpp' --include '*.c' --include '*/' --exclude '*' /tmp /workspace/out/coverage
Step #3: sending incremental file list
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_build.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_dns.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_rules.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_version.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/sha1.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/gcm_nohw.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/digests.c"
...
```

Just exclude these files. Doubt they matter to us.

Ref: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23621&q=esp-v2&can=2
Signed-off-by: Teju Nareddy <nareddyt@google.com>
2020-07-01 16:56:39 -07:00
Dmitry Vyukov fa5b4dbd9a
[syzkaller] update go get invocation and fix the build (#3754)
* syzkaller: update go get invocation

The way to checkout the repo has changed.
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21994

* [syzkalle] Fix paths passed to `compile_fuzzer` function.

Co-authored-by: Max Moroz <mmoroz@chromium.org>
2020-07-01 15:04:40 -07:00
werdnaH df0ea93918
Add SkSVGCanvas api Fuzzer (#4061)
* add svg api fuzzer

* fixed build.sh

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-01 14:59:11 -07:00
Randy 584b967a69
[libspng] Fetch zlib in Dockerfile (#4050)
* [libspng] Fetch zlib in Dockerfile

This step has been moved from the build script: c35e509f04

* Update Dockerfile

* Update Dockerfile

* dummy commit

* Update Dockerfile

* dummy commit

* dummy commit
2020-07-01 11:00:08 -07:00
asraa 468f932b7d
[envoy] lower CPU more (#4056)
* try

Signed-off-by: Asra Ali <asraa@google.com>

* fix build

Signed-off-by: Asra Ali <asraa@google.com>

* fix script

Signed-off-by: Asra Ali <asraa@google.com>

* use HOST_CPU*0.5

Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 15:45:08 -07:00
Luca Boccassi 0a7380a80a
[libzmq] use build script from upstream repository (#4054)
* libzmq: use build script from upstream repository

In order to avoid having to send PRs every time we change something, simply
maintain the build script in the upstream repository, and change build.sh
to a one-line call.

* libzmq: clone corpora and dictionary repository
2020-06-30 13:22:33 -07:00
rbehjati c1404e9b62
[oak] Temporarily disable fuzzing for project Oak (#4053) 2020-06-30 11:38:36 -07:00
Nikita Popov 26af5e0e25
[php] Enable unserializehash fuzzer (#4049) 2020-06-30 09:54:25 -07:00
asraa d4b88fc4e1
[envoy] envoy build resource adjustment (#4052)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 09:52:22 -07:00
Abhishek Arya a31e58fb5c
Fix build due to missing liblzma-dev 2020-06-29 21:52:08 -07:00
Danny Halawi 8b6899cfb9
Fixing Dockerfile for fuzzers that use LPM (#4044)
* fixing Dockerfile for libpng-proto

* Fixing Dockerfile so the LPM for giflib works

* Fixing Dockerfile so the LPM for xerces-c works

* taking out unneeded installations

Co-authored-by: Danny Halawi <dhalawi@google.com>
2020-06-29 21:48:37 -07:00
Google AutoFuzz Team 1f9ec264a8
Add sentencepiece (#4035)
* add sentencepiece project

* change the architectures

* change indentations
2020-06-29 12:45:50 -07:00
Robert Löhning 7da55877b6
[qt] Move build.sh to own repository (#4042) 2020-06-29 12:43:17 -07:00
binaryFate eaae983c73
Monero: fix coverage, don't enable asan, add new fuzz test (#4040)
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-06-27 15:42:29 -07:00