Commit Graph

2901 Commits

Author SHA1 Message Date
Oliver Chang 2e11666263
Fix typo in bind9 project.yaml 2020-08-13 10:37:02 +10:00
Max Moroz 5f1504cb10
[bind9] Add more contacts to auto_ccs (#4310). 2020-08-12 16:42:07 -07:00
Ravi Jotwani 8a74af8f52
[libyaml] Add more fuzz targets (#4043)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added more fuzzers, updated build script to generate corpus and options for each

* place yaml.dict in SRC first, rather than in OUT directly

* changed fuzzers from c++ to c, updated build script

* started using booleans instead of ints, updated naming conventions

* replaced all instances of  with

* removed memsets, stopped using first two bytes of input, and removed file I/O

* fixed style, changed function return types to bool instead of int

* added libyaml_parser_fuzzer back, implemented string handling to not exceed buffer size in libyaml_emitter_fuzzer, and made style fixes

* changed boolean functions to return error, not success

* fixed inverted check

* changed variable names, fixed crash in libyaml_emitter_fuzzer

* fixed addition/subtraction style

* make a dynamically growing heap buffer

* place yaml_write_handler in distinct header file, style fixes

* fix style and memory safety issues in reformatter fuzzers, remove unused vars

* consistent assignment of done variables
2020-08-12 15:44:24 -07:00
Ravi Jotwani 089c9e039b
[e2fsprogs] Delete ext2fs_read_write_dir_block_fuzzer.cc (#4302)
Deleting this fuzzer as it has proved problematic (see internal bug #160587918). Reasons for deletion:
- This fuzzer is not written well. We pass an uninitialized output buffer to `ext2fs_read_dir_block()`, have redundant function calls (see [here](https://github.com/tytso/e2fsprogs/blob/master/lib/ext2fs/dirblock.c#L62) and [here](d36af019b0/projects/e2fsprogs/fuzz/ext2fs_read_write_dir_block_fuzzer.cc (L66))), and pass empty `blk64_t` structs to the fuzz targets.
- Removing this fuzzer has negligible impact on total coverage. Running [this](https://github.com/googleinterns/oss-fuzz-utils/blob/master/coverage.sh) coverage utility after removing the fuzzer locally outputs the following results (fuzzing each build for 10 minutes).
```original: 244/13082 regions - 1.86515823269% coverage
modified: 239/13070 regions - 1.8286151492% coverage```

@tytso @alsophian Please feel free to chime in.
2020-08-12 15:43:50 -07:00
Ondřej Surý 70abe8f33c
[bind9] Adjust the Dockerfile and build.sh for main branch (#4309) 2020-08-12 14:16:48 -07:00
Joe Drago 014e070f99
[libavif] Cut down on post-decode combinations to avoid timeouts (#4308)
Co-authored-by: Joe Drago <jdrago@netflix.com>
2020-08-12 13:43:18 -07:00
b92paul 6ffa47eb77
[CRAS] Fix build error and build new fuzzer (#4306)
* [CRAS] Fix build error and build new fuzzer

- Fix build error by installing 1.8.x gtest and using `make install` to
  install gtest pc file for pkg-config
- Build and add new fuzzer `cras_hfp_slc`

BUG=oss-fuzz:24744

* fix the copyright

* fix the copyright

* Update Dockerfile

Co-authored-by: Max Moroz <mmoroz@chromium.org>
2020-08-12 13:42:51 -07:00
Max Moroz 9f088e8671
[bind9] Temporarily disable AFL fuzzing engine. (#4307) 2020-08-12 13:25:50 -07:00
Ondřej Surý 697d0d2835
[bind9] Add bind9 as new proposed oss-fuzz target (#4304)
* Add bind9 as new proposed oss-fuzz target

* Add basic Dockerfile and build.sh

* Change the auto_cc addresses to @isc.org

* fix the copyright

* fix the copyright

Co-authored-by: Max Moroz <mmoroz@chromium.org>
2020-08-12 12:21:42 -07:00
Ravi Jotwani 9348981822
[alembic] Initial integration (#4236)
* initial commit

* removed instances of cout in fuzzer, build failing

* Fix the Alembic build.

This commit gets Alembic building properly by linking it against
a locally compiled checkout of the most recent OpenEXR release.

* placed temp file in /tmp, modified build script

* added zlib1g-dev:i386 as a dependency in Dockerfile

* style fixes, removed msan

* combine dumpAttribute functions

* fix formatting

* update fuzzer_temp_file.h, style fixes for fuzzer

* populate target names

* disable ubsan for the time being

Co-authored-by: Michael Jezierny <mtjz@google.com>
2020-08-11 16:43:16 -07:00
Joe Drago 425b3689e2
[libavif] add bidirectional RGB conversion paths to the fuzzer (#4300)
Co-authored-by: Joe Drago <jdrago@netflix.com>
2020-08-11 16:27:41 -07:00
Guido Vranken d36af019b0
[cryptofuzz] Enable wolfSSL keygen (#4298) 2020-08-11 11:06:47 -07:00
Ravi Jotwani e0a94e1a09
[opusfile] Initial integration (#4249)
* [opusfile] Initial integration

* add license header

* cleaned up loop in build script

* fix typo in build script

* changed fuzzer from C++ to C

* run ldconfig before building fuzzer

* Force static linking when building the fuzzer.

This alternative linker syntax overrides the "lib{whatever}.so" default.
Fortunately, Ubuntu packages static libraries in libopus-dev and
libogg-dev.

Co-authored-by: Michael Jezierny <mtjz@google.com>
2020-08-11 09:49:44 +10:00
Guido Vranken eb35884a60
[cryptofuzz] Disable Nettle assembly in MSAN mode (#4295) 2020-08-10 16:22:40 -07:00
xuri 67a1a100f9
[excelize] Add project.yaml (#4283) 2020-08-10 13:34:19 -07:00
sleevi 80d214878c
[boringssl] Fix BoringSSL build break (#4294)
The upstream LPM-based fuzzer changed its layout, so update the build
files to reflect this. This may make sense as a separate .a file in
the future to avoid these breaks.

Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24776
2020-08-10 12:49:33 -07:00
Alex Hultman 70c5df7cfd
[uwebsockets] Don't install zlib from ubuntu.com (#4292) 2020-08-10 11:08:05 -07:00
Evgeny Vereshchagin ce6acd27b4
[util-linux] switch to the upstream build script (#4289)
Now that https://github.com/karelzak/util-linux/pull/1068 is merged
we no longer need to keep the fuzz target and build script here.
2020-08-10 08:46:12 -07:00
Alex Hultman 6f180bb8a3
[uwebsockets] Increase builds per day, file msan issues (#4290) 2020-08-10 07:57:17 -07:00
Joachim Metz 3fc4134b4e
Added libfsext and libfshfs to libyal project configuration (#4288) 2020-08-10 07:53:15 -07:00
ToSeven ea7fddf6c8
initial libyuv project.yaml (#4282)
Co-authored-by: toseven <Byone.heng@gmail.com>
2020-08-09 21:11:43 -07:00
Evgeny Vereshchagin 66acceccd5
[util-linux] more util-linux contributors (#4287) 2020-08-09 21:10:22 -07:00
Guido Vranken efeb20e2d5
[cryptofuzz] wolfCrypt: Add build options (#4286)
- Enable SHAKE
- Enable additional curves
- Disable tests and examples for shorter build times

[cryptofuzz] Add Nettle

[cryptofuzz] Nettle: Fix 32 bit build

[cryptofuzz] Add libgmp

[cryptofuzz] Don't build libgmp with MSAN

[cryptofuzz] Add mpdecimal

[cryptofuzz] Fix libgmp, mpdecimal builds
2020-08-08 17:52:31 -07:00
Janne Grunau 29837b97ac
[dav1d] fix the build (#4285)
* projects/dav1d: remove unnecessarily installed packages

* projects/dav1d: fix build by just copying the fuzzing binaries

Meson switched the name of the directory holding the objects for the
fuzzer binaries to match the pattern used to copy all fuzzing binaries.
Copying the directory failed.
2020-08-08 07:34:43 -07:00
Max Moroz be9a96b09c
[fuzzing-puzzles] Disable the project for now. (#4279) 2020-08-07 15:07:34 -07:00
Max Moroz 941ada694b
[infra] Add support for custom sanitizer options in run_fuzzer. (#4274)
* [infra] Add support for custom sanitizer options in run_fuzzer.

* address review feedback

* fix presubmit warnings
2020-08-07 12:48:23 -07:00
Petteri Aimonen 0e6703bd67
[nanopb] Update seed corpus handling for separate test cases (#4277) 2020-08-07 12:10:20 -07:00
Ravi Jotwani 7ff3b68f7e
[openexr] Using different file utilities to write files to /tmp (#4218)
* using tidy_html5's fuzzer_temp_file utilities to create a file from fuzzing input in /tmp

* used FuzzerTemporaryFile class, updated copyright year

* catch all exceptions instead of a select few, fix styling in openexr_exrheader_fuzzer

* updating fuzzer_temp_file.h with the changes mentioned in https://github.com/google/oss-fuzz/pull/4236
2020-08-07 11:40:34 -07:00
Evgeny Vereshchagin cd5123192f
[util-linux] turn on MSan (#4265)
This PR should be merged once https://github.com/karelzak/util-linux/pull/1114 is merged
2020-08-07 08:26:55 -07:00
Petteri Aimonen d1dc2b5e07
[nanopb] Split fuzztest to separate test cases. (#4276)
This should improve fuzzing performance.
2020-08-07 08:13:40 -07:00
Alex Crichton 0dc597e53e
Add `handle_segv =1` to Wasmtime's options (#4266)
* Add `handle_segv =1` to Wasmtime's options

This is an attempt to handle #4264
2020-08-06 17:02:42 -07:00
Marten Seemann c1b8f3bd36
[quic-go] add Dockerfile and build script (#4267) 2020-08-06 16:16:17 -07:00
Tyson Smith d51f86a4e4
[firefox] Install dependencies in Dockerfile (#4271) 2020-08-06 15:39:27 -07:00
Tyson Smith 3d7dc183d1
[mp4parse-rust] Limit allocation size (#4273)
* [mp4parse-rust] Set max_allocation_size_mb

* [mp4parse-rust] Update CC list
2020-08-06 15:38:53 -07:00
jonathanmetzman 95ffdaa04e
Fix cifuzz-example (#4272) 2020-08-06 14:53:25 -07:00
jonathanmetzman ca00e9e937
Add project for testing CIFuzz changes (#4268) 2020-08-06 10:44:54 -07:00
seabeepea 9743eb4bf3
Catch all exceptions via (...) rather than by explicit type (#4260)
The purpose of the fuzzer is to very that an exception is thrown, not
to validate that the correct *type* of exception is thrown. That is
the responsibility of the project's traditional test suite. Therefore,
the exception type is inconsequential.

Signed-off-by: Cary Phillips <seabeepea@gmail.com>
2020-08-06 06:10:51 -07:00
Tyson Smith 2f4da4e8da
[vorbis] Use shallow clone (#4259)
* [vorbis] Use shallow clone

* [tremor] Use shallow clone
2020-08-05 15:45:14 -07:00
Marten Seemann 3707eb201b
[quic-go] add project quic-go (#4253) 2020-08-05 14:30:54 -07:00
Joachim Metz 14c68963e6
Added libftxf and libfusn to libyal project configuration (#4254) 2020-08-05 07:38:52 -07:00
Danny Halawi e15b72d833
[boringssl] Structure Aware ASN.1 Fuzzing in BoringSSL (#4179)
* using asn.1 structure aware fuzzer to fuzz boringssl

* incorporating feedback

* changing fuzzer output name

* updating build script

* formatted files

* pulling from google/fuzzing

* uncommenting build

* removing certs
2020-08-04 16:52:53 -07:00
danh-arm 466b6eb6fe
Update Mbed TLS contact address and website (#4247)
Update the primary contact addresss and website in the Mbed TLS
project file.

Also update the Mbed TLS cc address in the bignum-fuzzer project
file.

Signed-off-by: Dan Handley <dan.handley@arm.com>
2020-08-04 07:20:00 -07:00
Joachim Metz 95d739322a
[libyal] Added libfsntfs to libyal project configuration (#4248) 2020-08-03 10:50:00 -07:00
Joachim Metz 8e2a59f8dc
Corrected error in libyal project configuration (#4246) 2020-08-02 07:49:24 -07:00
werdnaH 5415fe155d
[Skia] Update SKP Fuzzer (#4245)
* Update SKP Fuzzer

* fixed cf_map

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-31 19:41:31 -07:00
Nick Wellnhofer dc0f92fe90
[libxml2] Two new targets, rework build.sh (#4243) 2020-07-31 14:21:37 -07:00
Kevin Lubick e253e5ff4c
[skia] Remove API skdescriptor fuzzer (#4244) 2020-07-31 14:08:32 -07:00
Tyson Smith 7cee45b164
[speex] Remove use of out-of-date branch (#4232)
* [speex] Remove use of out-of-date branch

* [speex] Use git clone '--depth 1'
2020-07-30 12:14:55 -07:00
bungeman 695760805c
[skia] Further limit number of concurrent links. (#4228)
Reducing the number of concurrent link steps to the number of cpus does
not appear to have made much difference to the success of the Skia
project build. Limit the number of concurrent links to one in an attempt
to avoid running out of memory. If issues persist it is likely the bot
running this simply does not have enough memory to run the linker step.

This change is speculative since these builds have been working on the
CI bots and only failing on the oss-fuzz build.

Bug: oss-fuzz:23438,oss-fuzz:24345
2020-07-30 07:55:25 -07:00
Evgeny Vereshchagin 79b4afb990
[util-linux] run tools/oss-fuzz.sh if it exists (#4227)
to make it easier to use CIFuzz to make sure https://github.com/karelzak/util-linux/pull/1068
is more or less in good shape.
2020-07-30 07:54:59 -07:00
Tom Ritter 61d1b47fe1
Add two more team members to rnp's cc list (#4230) 2020-07-30 07:54:29 -07:00
bungeman 1753fe12bf
[skia] Limit concurrent link steps. (#4217)
The number of link build steps in the Skia build is currently not
limited and may be leading to the current failures where the linker is
killed with a signal. This changes that to limit the number of
concurrent linker steps to the number of cpus available. If there
continue to be issues it may be necessary to implement a hard limit.

Bug: oss-fuzz:23438,oss-fuzz:24345
2020-07-29 17:25:37 -07:00
asraa 3bc37fc82f
[envoy] Simplify finding fuzz targets by using a bazel query. (#4215)
Signed-off-by: Asra Ali <asraa@google.com>
2020-07-29 14:41:17 -07:00
Ravi Jotwani b78b8222ba
[openexr] Additional fuzzers (#4173)
* added two fuzzers from patch files, stripped unnecessary code from exrenvmap_fuzzer, build currently failing

* exrheader build working

* checking coverage for exrheader_fuzzer

* removed writes to cout for exrheader_fuzzer

* exrheader_fuzzer and exrenvmap_fuzzer working

* added license to exrheader_fuzzer

* remove namespaceAlias.h

* changed function names in exrheader_fuzzer, wrote files to /tmp in exrenvmap_fuzzer, included style fixes
2020-07-29 11:33:53 -07:00
Tom Ritter 284dad011e
[rnp] Add afl engine (#4212)
* [rnp] Add afl engine

* Add fuzz_dump and fuzz_keyring to the exception list

These binaries - from https://github.com/rnpgp/rnp/tree/master/src/fuzzing -
are very tiny and just call into the library with a single API,
and are not staticly compiled - so they have very few UBSAN calls.
2020-07-29 09:56:23 -07:00
Ebrahim Byagowi 242b6ae656
[harfbuzz] minor (#4214) 2020-07-29 07:42:34 -07:00
seabeepea e1920a468d
move Header constructor inside try/catch (#4208)
Signed-off-by: Cary Phillips <seabeepea@gmail.com>
2020-07-28 19:17:13 -07:00
Eugene Kliuchnikov 3c234c8f1c
Add fuzzer for Brunsli decoder (#4205) 2020-07-28 16:06:51 -07:00
Stephen Frost 56a3b89eae
Add gmail.com account to PostgreSQL project (#4206)
This is to add my (Stephen Frost's) gmail.com account to the PostgreSQL
project to allow me to view the issues that are being opened by the fuzz
tool.
2020-07-28 16:04:42 -07:00
Matt Johnston 951403b075
[dropbear] Change Mercurial repo to hg.ucc.asn.au (#4204) 2020-07-28 16:02:47 -07:00
Everett Maus 6806b74519
Removing no-longer valid email and updating sanitizer definitions (#4207)
* Removing no-longer valid email and updating sanitizer definitions

* Updating CCs to a team rather than an individual
2020-07-28 16:00:35 -07:00
Kim Kulling c22ec3a33d
Enable assimp-fuzzing test (#4181) 2020-07-28 08:39:08 -07:00
werdnaH 69869e098e
Add DDL Fuzzer (#4202)
Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-27 17:24:21 -07:00
Tom Ritter 490a59781e
[rnp] Fuzzer fixes and improvements for rnp (#4189)
Undefined sanitizer should now work, and the honggfuzz engine as well.
Upstream changes supported enabling these, and when I did so I
renamed one of the variables.
2020-07-27 11:54:20 -07:00
binaryFate da87fd8944
Monero: fix corpus zip file creation anew; enable honggfuzz&afl (#4200)
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-07-27 08:42:35 -07:00
Joachim Metz 2c34387f35
Added libfplist, libfsapfs, libbde, libqcow, libvhdi and libvmdk to libyal project configuration (#4198) 2020-07-27 07:58:04 -07:00
Micah Snyder 7f9866ee90
[clamav] Add optional autogen.sh step; fix build (#4193)
ClamAV recently removed autotools generated materials (configure,
Makefile.in, etc) from the git repo. This commit adds tools and calls
necessary to generate those files if autogen.sh is present.
2020-07-26 18:40:34 -07:00
AdamKorcz 793ed70907
[Radon] Added project (#4183) 2020-07-24 14:36:25 -07:00
pierwill 6892a59b58
Remove todo comment from influxdb build (#4185) 2020-07-23 10:00:31 -07:00
Kevin Lubick 3684abcfde
[skia] Fix build (#4182) 2020-07-23 07:40:36 -07:00
Ravi Jotwani bdb0b339d0
[uriparser] Fix null dereference in uri_dissect_query_malloc_fuzzer (#4174)
* fixed null dereference in uri_dissect_query_malloc_fuzzer

* removed unused include

* initialized chars_required, freed query_list if check unsuccessful, and used buf.data() instead of &buf[0]
2020-07-22 14:24:05 -07:00
Max Moroz c4075a9101
[icu] Add ftang@google.com to the auto_ccs list (fixes #4176). (#4177) 2020-07-22 10:17:54 -07:00
Sevki f743ea9d3b
p9: add fuzzing for p9 (#4084)
Signed-off-by: sevki <s@sevki.org>
2020-07-21 06:53:05 -07:00
Catena cyber 41b1710710
Updates patch for mysql 8.21 (#4162)
* Updates patch for mysql 8.21

* Fixup 8.21

* Disabkes fuzz_docommand to keep going with other targets for now

* do not even compile fuzz_docommand

* Adding license

* FIXMEs

* no longer compiled

* nits
2020-07-21 06:52:28 -07:00
Joachim Metz 4e96fea71c
Added libfwnt, libfwsi, libolecf and libscca to libyal project configuration (#4171) 2020-07-20 23:03:52 -07:00
bungeman b4e48c0d3b
[skia] Stop using gold. (#4164)
The gold linker was forced when the system linker stopped linking the
Skia build. It seems that the gold linker is now running into issues, so
attempt to switch back.
2020-07-20 22:54:59 -07:00
Ravi Jotwani 36e6fa39fe
[uriparser] Add new fuzzers (#4134)
* added new fuzzer

* added new fuzzer

* removed commented code

* add license header for uri_parse_fuzzer

* get values from FuzzedDataProvider, awaiting fuzz targets for FileNames and Ipv4 in parse_fuzzer

* build working

* fixed size mismatch, used better consumption function for remaining input

* reduced maxSize for uri_dissect_query_malloc_fuzzer

* added missing fuzz targets, removed unnecessary import

* removed unused include, changed instances of std::string to string, removed ToVector, added checks, and removed usage of FuzzedDataProvider in uri_dissect_query_malloc_fuzzer

* fixed vector issue in uri_parse_fuzzer

* added explicit value checks, removed Yoda comparisons
2020-07-20 16:50:20 -07:00
Vincent Rabaud 283447224d
Add more targets for OpenCV. (#4167) 2020-07-20 16:02:15 -07:00
bungeman af2de34dc3
Remove SkSVGCanvas.cpp from api_svg_canvas. (#4163)
This leads to multiple definitions of everything defined in
SkSVGCanvas.cpp since it will be compiled into the api_svg_canvas target
directly as well as the Skia xml target.
2020-07-20 09:27:38 -07:00
Joachim Metz 6beceb3030
Merged libesedb, libevt, libevtx, libexe, liblnk, libmsiecf and libregf into single project (#4166)
* Merged libesedb, libevt, libevtx, libexe, liblnk, libmsiecf and libregf into single libyal project

* Changes after review
2020-07-20 08:50:17 -07:00
Tom Ritter 0a334b3286
Add rnp (#4155) 2020-07-19 13:01:12 -07:00
DavidKorczynski 0d5e8c72e4
Fixed the build script of janet. (#4156) 2020-07-19 12:53:25 -07:00
Chris Wolfe 077c2b5aed
[msgpack-c] fix build (#4157)
* msgpack-c is now header only, update to install boost as req as well
2020-07-19 12:53:00 -07:00
Tim King b4bf783905
Adding ballbach@google.com to the auto_ccs list for leptonica. (#4154) 2020-07-18 17:30:14 -07:00
Yunshu Ouyang 016072db68
[spdlog] Added new fuzzers, modifed existing ones (#4008)
* Homepage updated, added auto ccs to project.yaml

* Fixed project.yaml

* [spdlog] Added new fuzzers, modifed existing ones

* Revert "[spdlog] Added new fuzzers, modifed existing ones"

This reverts commit 1e7f14a81d.

* Modified existing fuzzer

* Added new fuzzer for backtrace

* Added new fuzzer for formatter

* Added new fuzzer for set_pattern

* Added new fuzzer for log_levels

* Moved fuzzers to upstream repo

* Moved fuzzers back to oss-fuzz

* fixed fuzzers

* Update years
2020-07-17 12:46:42 -07:00
Yunshu Ouyang b189f869ca
[Postgresql] Initial integration, new fuzzer added (#4058)
* [postgresql] Added auto_css to project.yaml

* [postgresql] Added new fuzzer

* [postgresql] Cleaned up files, changed project.yaml

* Dockerfile - changed to official repo

* Renamed fix.diff

* [postgresql] Fixed parser_fuzzer, added new json_parser_fuzzer

* Removed dictionary

* Removed dictionary

* Moved fuzzers to fuzzer directory

* fixed new lines

* Updated years, removed maintainer field in Dockerfile

* Removed line spaces

* Updated year

* Changed existing fuzzer

* Changed Makefile
2020-07-17 10:31:19 -07:00
bungeman fde2cbfdff
[skia] Pass SWIFTSHADER_EMIT_COVERAGE for coverage. (#4152)
The SwiftShader build seems to want SWIFTSHADER_EMIT_COVERAGE set or it
will do things that interfere with a coverage build. Use this to
simplify the SwuftShader build a bit and hopefully restore the coverage
build.
2020-07-17 10:30:06 -07:00
Greg Landrum 4fb930fa52
Add new RDKit dependency (freetype) (#4150)
* Add new RDKit dependency (freetype)

FIxes Issue #23703

* just remove the freetype requirement for now

otherwise we have to build that static and that's a mess

* Update Dockerfile
2020-07-17 08:25:16 -07:00
R. Elliott Childre d70f793353
Delete unnecessary files and fix format in some MD pages (#4115)
* style: Clean up the repo

* Bolster the `.gitignore`
* Follow `CONTRIBUTING.md` guidelines and wrap `README.md` to 80
  characters and seperate links for readability
* Remove pesky Unicode dash in `CONTRIBUTING.md`
* Remove `.DS_STORE` files
* Rename `#project.yaml#` to something logical and enable stntax
  highlighting

* Updates from reviewers

* Greatly reduce `.gitignore` to only macOS `.DS_Store` and Vim
  temporary files
* Apply markdown style to `docs/index.md`
* small comma grammatical change

* http -> https
2020-07-16 15:27:29 -07:00
Sebastian Pipping d92c122155
[expat] Fix AddressSanitizer link errors (fixes #4143) (#4148) 2020-07-16 15:24:27 -07:00
Zhengdai Hu 9ba22659ac
[zetasql] Correct fuzzer indexing (#4142)
* Correct fuzzer indexing

* Remove redundant -e option
2020-07-16 13:31:09 -07:00
asraa 32263d2b17
[envoy] fix coverage and c++ issues (#4147)
Signed-off-by: Asra Ali <asraa@google.com>
2020-07-16 12:08:43 -07:00
Andreas Schneider 08712ad6ef
[libssh] Give Anderson access (#4145) 2020-07-16 07:20:26 -07:00
Augie Fackler a14eee4c42
mercurial: ignore our sanitizer-built Python for coverage purposes (#4141)
* mercurial: ignore our sanitizer-built Python for coverage purposes

Should help (maybe fix) #4003.

* Fix unneeded \

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2020-07-15 09:53:25 -07:00
Randy 26dcd1ac18
[stb] run upstreamed build script (#4135) 2020-07-15 07:22:18 -07:00
Juanpe Bolívar 820d15ea83
[immer] Add Immer project (#4129)
* Delete files that clearly someone added by mistake

* [immer] Add initial integration
2020-07-14 18:37:37 -07:00
Joachim Metz 9d61148f4d
Added libevt integration (#4123) 2020-07-14 18:33:32 -07:00
Joachim Metz 373adefa82
Added libmsiecf integration (#4124) 2020-07-14 18:33:10 -07:00
Joachim Metz 5fa409477d
Added libevtx integration (#4125) 2020-07-14 18:32:42 -07:00
Joachim Metz 9376cc2165
Added libregf integration (#4126) 2020-07-14 18:32:14 -07:00
Joachim Metz 9c16aecf48
Added libesedb integration (#4127) 2020-07-14 18:31:49 -07:00
Joachim Metz a5db65be84
Added libexe integration (#4130) 2020-07-14 18:28:18 -07:00
Joachim Metz c6fe118308
Added liblnk integration (#4122) 2020-07-14 18:25:42 -07:00
Ravi Jotwani 80fa75131e
[opus] Add new fuzzer (#4118)
* added new opus fuzzer, build working

* added missing license header, cleaned up Dockerfile

* fixed build process

* changed build process depending on C or C++ fuzzer

* converted opus_multi_fuzzer from C++ to C, reverted build script to only accept C files
2020-07-14 16:49:49 -07:00
Ravi Jotwani 96c3d4f440
[openexr] Replace buf_to_file with IStream (#4094)
* Add a working skeleton for OpenEXR fuzzers.

* added openexr fuzzers, updated build script to include them

* cleaned up bash loop

* [openexr] Replace buf_to_file with StdISStream.

Version 2.5.0 of OpenEXR added a StdISStream class that turns
a std::string into an Imf::IStream, which can be used instead of
filenames when opening an OpenEXR image.  This commit adds code which
wraps the fuzzer input into a StdISStream, which enables us to remove
the hacky buf_to_file function.

* updated deepscanlines_fuzzer to use IStream instead of filenames

* replace "/work" with  in build.sh

* Reformat CMake settings, and also prevent building utils and examples.

* Reformat and change names in build.sh.

* Omit the version prefix when building OpenEXR and IlmBase libraries.

* updated final two fuzzers to use istream

* fixed additional conflict in project.yaml

* get header size from input

* increased header size

* Fix argument types in readFileSingle

Co-authored-by: Michael Jezierny <mtjz@google.com>
Co-authored-by: Abhishek Arya <inferno@chromium.org>
2020-07-14 14:01:37 -07:00
Abhishek Arya 4f5c06fbf7
Revert "[binutils] Add new fuzzer (#4128)" (#4133)
This reverts commit 6d59abf3ca.
2020-07-14 13:43:13 -07:00
Zhengdai Hu 22dfa6882e
Onboarding new ZetaSQL fuzzers (#4095)
* Enable UBSAN

* Added a structure aware fuzzer

* Revert "Enable UBSAN" and explicitly enable it in
project.yaml

This reverts commit de66864567.

* Amend UBSAN commit

* Disable MSan

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2020-07-14 12:56:51 -07:00
Abhishek Arya c2ad696b86
Add security@openexr.org as per Cary's request 2020-07-14 10:51:31 -07:00
Ravi Jotwani 6d59abf3ca
[binutils] Add new fuzzer (#4128)
* cleaned up Dockerfile, added new fuzzer, updated build script

* added license header to fuzz_demangle.c
2020-07-14 08:05:51 -07:00
Ebrahim Byagowi 49149c244f
[ots] Enable more fuzzers (#4089)
* [ots] Enable more fuzzers

* [ots] Expand wildcards like /usr/lib/DataFlow*.o

* [ots] Use forcefallback so zlib source gets compiled

* [ots] Don't enable dataflow for ots
2020-07-14 07:51:37 -07:00
Ravi Jotwani 398fd1cf83
[libexif] Add new fuzzer (#4045)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added new fuzzer, placed license header in existing fuzzer
2020-07-13 21:48:31 -07:00
pierwill 44686eaa58
Add initial influxdb integration (#4038)
- Updates project.yaml to specify libfuzzer as fuzzing engine
- Adds a basic Dockerfile
- Add a build.sh script for initial target

Co-authored-by: pierwill <pierwill@users.noreply.github.com>
2020-07-13 21:14:49 -07:00
Gabriel Rasskin 7b9a3a895c
[tensorflow] Add assert compilation flag (#4119) 2020-07-13 13:41:19 -07:00
neildhar 83451151b4
Pass a flag to enable fuzzing (#4114) 2020-07-11 09:59:06 -07:00
werdnaH c8a9c08c09
[Skia] Add SkRuntimeEffect Fuzzer (#4108)
* Add SkRuntimeEffect Fuzzer

* fixed typo

* fixed the zip name

* fixed zip name

* fixed zip name

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-10 19:26:35 -07:00
Ravi Jotwani 07fbdfb29b
[lcms] Add new fuzzer (#4109)
* added new cms_transform_fuzzer, getting code instrumentation error

* build working, renamed new fuzzer
2020-07-10 19:26:12 -07:00
Alex Crichton cd665e2a82
Add wasm-tools repository to wasmtime project (#4111)
* Add wasm-tools repository to wasmtime project

This commit expands the fuzzers run under the Wasmtime project to
include those in the https://github.com/bytecodealliance/wasm-tools
repository. This includes various parsing for utilities used by Wasmtime
itself but also generally useful for other Rust projects! The
maintainers of the wasm-tools repository are also all currently all on
the notification list for Wasmtime fuzz bugs as well.

* Load all corpuses from wasmtime-libfuzzer-corpus
2020-07-10 19:25:01 -07:00
Danny Halawi 58e519a8f2
[jsoncpp] Integrate json protocol buffer and libprotobuf-mutator to fuzz jsoncpp (#4047)
* fixing Dockerfile for libpng-proto

* adding json proto, LPM, and fuzz target for jsoncpp

* adding vanilla fuzzer back in

* fixing weird spacing in build script + taking out unneedef header file

* adding settings field and passing all of json_str

* adding license headers

* refactoring settings field

* fixing compile issue

* fixing MSan issue, changing license to 2020, and using iterator instead of pointers

* passing pointers more understandably to parse

* taking out unecessary assign

Co-authored-by: Danny Halawi <dhalawi@google.com>
2020-07-10 17:17:32 -07:00
Max Moroz 47484451d5
[infra] Build honggfuzz with -D_HF_LINUX_NO_BFD (#3886). (#4107)
* [infra] Build honggfuzz with -D_HF_LINUX_NO_BFD (#3886).

* dummy edit to trigger CI
2020-07-10 14:50:39 -07:00
jonvolfson 9c5d905646
Dockerfile and build.sh modifications to get successful build (#4025)
* Add spanner emulator project

* Adding auto_css for Sneha and myself

* Adding dockerfile and build.sh files

* Further fixes for OSS-Fuzz integration

* Update build.sh

* Cleaning up commented code in build.sh

* Fuzzing branch merged with main in the emulator repo, modified dockerfile to clone main now instead of the branch.

* Updating build.sh to copy the binaries to out

* Cleaning up build.sh by removing Envoy specific comments, removed dictionary code as no corpus exists yet

* Updating yaml to include the memory sanitizer

* Build.sh should now copy fuzzing binaries properly to , adding fuzzing_enginers parameter to yaml to bypass AFL timeout for now.

Co-authored-by: Jonathan Volfson <volfson@google.com>
Co-authored-by: Oliver Chang <oliverchang@users.noreply.github.com>
2020-07-08 14:41:15 -07:00
Ebrahim Byagowi 5735c8b723
[harfbuzz] Enable testing of experimental APIs also (#4090) 2020-07-08 11:57:35 -07:00
Michael Jezierny c8279e2c2d
[openexr] Initial integration of OpenEXR fuzzers. (#4060)
* Add a working skeleton for OpenEXR fuzzers.

* added openexr fuzzers, updated build script to include them

* cleaned up bash loop

* replace "/work" with  in build.sh

* Reformat CMake settings, and also prevent building utils and examples.

* Reformat and change names in build.sh.

* Omit the version prefix when building OpenEXR and IlmBase libraries.

* Correct the contact addresses for OpenEXR.

Co-authored-by: Ravi Jotwani <rjotwani@google.com>
2020-07-07 14:28:37 -07:00
Ebrahim Byagowi 2c664877af
[harfbuzz] Use meson port (#4076)
* [harfbuzz] Use meson port

* [harfbuzz] workaround single quotes in fuzzer_ldflags
2020-07-07 14:27:40 -07:00
Ravi Jotwani 930720f048
[flac] Additional fuzzer (#4073)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added new fuzzer, build failing

* fuzzer_exo build working
2020-07-07 13:24:02 -07:00
Randy 0c21b09b36
[miniz] add Dockerfile, build.sh (#4085)
* [miniz] add Dockerfile, build.sh

* [miniz] update Dockerfile
2020-07-07 08:31:39 -07:00
Guido Vranken 11a0f516cd
[cryptofuzz] Build script updates (#4072)
* [cryptofuzz] Build script updates

- Update mbed TLS repository location
- mbed TLS: Enable components disabled by default
- wolfCrypt: Build AES key wrap ciphers

* [cryptofuzz] Add Marina Polubelovam to CC list
2020-07-06 13:53:50 -07:00
Catena cyber ecc80ba613
[ndpi] excludes builds artifacts from ndpi project (#4077) 2020-07-06 13:35:00 -07:00
devtty1er d561c49ae5
Update Dockerfiles (#4070)
* Use LABEL in place of MAINTAINER

* Remove LABEL maintainer from Dockerfiles
2020-07-06 13:18:23 -07:00
Abhishek Arya b74211ecf9
Skip coverage build in CI for non C/C++ projects. (#4075)
* Skip coverage build in CI for non C/C++ projects.

Fixes https://github.com/google/oss-fuzz/issues/4074

* Test wasmtime.
2020-07-06 13:13:02 -07:00
Nick Fitzgerald 82252c22ef
wasmtime: Only zip the seed corpus if it exists (#4065)
This will prevent build failures like
https://oss-fuzz-build-logs.storage.googleapis.com/log-5a0b58fe-4a35-46d5-b4d2-221905e7d208.txt
in the future.
2020-07-06 10:46:47 -07:00
asraa ba72f0b7fc
fixup coverage build (#4071)
Signed-off-by: Asra Ali <asraa@google.com>
2020-07-06 10:14:53 -07:00
rbehjati 88c5e76798
Update the build script for project oak to disable it temporarily (#4068) 2020-07-06 07:59:44 -07:00
Abhishek Arya a966c122ec
Fix sentencepience build failure 2020-07-06 07:53:15 -07:00
Robert Löhning 2264f7915f
[qt] Don't clone AFL (#4067)
Now that stable caught up with master, we
can use the clone from base-builder image.
2020-07-05 08:30:57 -07:00
Randy 3c7ab8e850
[libspng] extract zlib to separate directory (#4064)
CIFuzz is overwriting $SRC/libspng after executing the Dockerfile before running build.sh which means $SRC/libspng/zlib is lost:
https://github.com/randy408/libspng/runs/830380355#step:4:549
2020-07-02 19:00:39 -07:00
Evgeny Vereshchagin 7667c8fe08
[util-linux] move the fuzz target to the OSS-Fuzz repository (#4063) 2020-07-01 19:37:07 -07:00
Teju Nareddy f8c7f158f7
[ESPv2] Attempt to fix coverage build (#4062)
Currently, coverage builds fail on step 3 with:
```
Step #3: + rsync -avLkR --include '*.h' --include '*.cc' --include '*.hpp' --include '*.cpp' --include '*.c' --include '*/' --exclude '*' /tmp /workspace/out/coverage
Step #3: sending incremental file list
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_build.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_dns.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_rules.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_version.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/sha1.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/gcm_nohw.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/digests.c"
...
```

Just exclude these files. Doubt they matter to us.

Ref: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23621&q=esp-v2&can=2
Signed-off-by: Teju Nareddy <nareddyt@google.com>
2020-07-01 16:56:39 -07:00
Dmitry Vyukov fa5b4dbd9a
[syzkaller] update go get invocation and fix the build (#3754)
* syzkaller: update go get invocation

The way to checkout the repo has changed.
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21994

* [syzkalle] Fix paths passed to `compile_fuzzer` function.

Co-authored-by: Max Moroz <mmoroz@chromium.org>
2020-07-01 15:04:40 -07:00
werdnaH df0ea93918
Add SkSVGCanvas api Fuzzer (#4061)
* add svg api fuzzer

* fixed build.sh

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-01 14:59:11 -07:00
Randy 584b967a69
[libspng] Fetch zlib in Dockerfile (#4050)
* [libspng] Fetch zlib in Dockerfile

This step has been moved from the build script: c35e509f04

* Update Dockerfile

* Update Dockerfile

* dummy commit

* Update Dockerfile

* dummy commit

* dummy commit
2020-07-01 11:00:08 -07:00
asraa 468f932b7d
[envoy] lower CPU more (#4056)
* try

Signed-off-by: Asra Ali <asraa@google.com>

* fix build

Signed-off-by: Asra Ali <asraa@google.com>

* fix script

Signed-off-by: Asra Ali <asraa@google.com>

* use HOST_CPU*0.5

Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 15:45:08 -07:00
Luca Boccassi 0a7380a80a
[libzmq] use build script from upstream repository (#4054)
* libzmq: use build script from upstream repository

In order to avoid having to send PRs every time we change something, simply
maintain the build script in the upstream repository, and change build.sh
to a one-line call.

* libzmq: clone corpora and dictionary repository
2020-06-30 13:22:33 -07:00
rbehjati c1404e9b62
[oak] Temporarily disable fuzzing for project Oak (#4053) 2020-06-30 11:38:36 -07:00
Nikita Popov 26af5e0e25
[php] Enable unserializehash fuzzer (#4049) 2020-06-30 09:54:25 -07:00
asraa d4b88fc4e1
[envoy] envoy build resource adjustment (#4052)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 09:52:22 -07:00
Abhishek Arya a31e58fb5c
Fix build due to missing liblzma-dev 2020-06-29 21:52:08 -07:00
Danny Halawi 8b6899cfb9
Fixing Dockerfile for fuzzers that use LPM (#4044)
* fixing Dockerfile for libpng-proto

* Fixing Dockerfile so the LPM for giflib works

* Fixing Dockerfile so the LPM for xerces-c works

* taking out unneeded installations

Co-authored-by: Danny Halawi <dhalawi@google.com>
2020-06-29 21:48:37 -07:00
Google AutoFuzz Team 1f9ec264a8
Add sentencepiece (#4035)
* add sentencepiece project

* change the architectures

* change indentations
2020-06-29 12:45:50 -07:00
Robert Löhning 7da55877b6
[qt] Move build.sh to own repository (#4042) 2020-06-29 12:43:17 -07:00
binaryFate eaae983c73
Monero: fix coverage, don't enable asan, add new fuzz test (#4040)
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-06-27 15:42:29 -07:00
Abhishek Arya c2df30abb5
Update project.yaml 2020-06-26 20:31:54 -07:00
pierwill cd9ee7ca4c
Add influxdb project for review (#4028)
Co-authored-by: pierwill <pierwill@users.noreply.github.com>
2020-06-26 11:36:10 -07:00
Abhishek Arya ff4f38e772
Fix memory leak in libevent parse_query_fuzzer 2020-06-25 19:39:14 -07:00
Nathan Moinvaziri e32b716754
Added fuzzer for c-blosc2 (#3989) 2020-06-25 16:56:26 -07:00
Evgeny Vereshchagin 25cff8db8e
[util-linux] cover mnt_table_parse_stream (#4032)
* [util-linux] cover mnt_table_parse_stream

Waiting for https://github.com/karelzak/util-linux/pull/1068

* temporarily point OSS-Fuzz to evverx/util-linux

* make sure it can be built with sanitizer=coverage
2020-06-25 15:35:44 -07:00
Ravi Jotwani f8c9eec4cf
E2fsprogs integration (#4006)
* added draco integration files

* wrote build file and Dockerfile for Draco

* split security-research-pocs fuzzer into four

* added project build to build.sh

* added more fuzzers

* fixed sanitizer flags

* removed commented code, combined fuzzers, fized build script

* changed to singular filenames, converted usage of random int to enum, changed buffer name, and fixed build script

* placed test files in memory instead of on disk, added asserts
2020-06-25 11:42:17 -07:00
FrankGalligan d647392eda
Draco: add more emails (#4030)
* Draco: add more emails

* Fix name mistake
2020-06-24 14:59:50 -07:00
DavidKorczynski bee17f0144
[HAProxy] Added two new contacts for HAProxy fuzzing. (#4029) 2020-06-24 13:51:44 -07:00
Nick Wellnhofer e3c5b941da
[libxml2] Two new fuzz targets (#4022)
* [libxml2] Two new fuzz targets

Enable HTML and XML Schema fuzzers.

* [libxml2] Compile missing source files

* [libxml2] Don't forget to build seed corpora
2020-06-24 13:01:23 -07:00
Zhengdai Hu adc5fcd502
[zetasql] Initial onboarding of ZetaSQL (#4010)
* Add initial onboarding scripts of ZetaSQL for review

* Checkout fuzz target from simple_fuzzer branch

* Enable code coverage report

* Enable only ASAN and MSAN

* Fixed broken tzdata symlink

* Switch to master branch
2020-06-24 12:47:55 -07:00
DavidKorczynski 54d69b6f2d
Updated settings in project yaml so bugs are freely visible. (#4024) 2020-06-23 15:28:42 -07:00
Ravi Jotwani 04f3736d32
Draco fuzz coverage (#3980)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added Apache 2 license header

* changed project maintainer, cleaned up draco_decoder_fuzzer, and set working directory in Dockerfile

* added a couple of fuzzers

* two more targets

* merged from upstream

* build point cloud encoding fuzzer, renamed quantization fuzzers

* added more fuzzers

* moved fuzzers and build script to https://github.com/google/draco, made the build script here execute the new one

Co-authored-by: Ravi Jotwani <rjotwani@google.com>
2020-06-23 12:31:24 -07:00
Yuquan Wang 2fdb520e26
Yuquanw branch (#4019)
* Adding auto-cc to project usrsctp

* Improving fuzzing coverage

* Remove experimental dataflow sanitizer

Co-authored-by: Yuquan Wang <yuquanw@google.com>
2020-06-22 14:47:15 -07:00
Nathan Moinvaziri 351bf4c3c8
Updated c-blosc to use fuzzers in c-blosc repository. (#4018)
Use compat files for seed corpus with new decompress_fuzzer.
2020-06-22 11:32:53 -07:00
Abhishek Arya e8ffee4077
Update project.yaml 2020-06-22 08:02:59 -07:00
DavidKorczynski 8656b3722c
[Haproxy] Simplify build script and update to latest code (#4000)
* Updated hpack to work with new build.

* Required minimium length.
2020-06-22 07:57:33 -07:00
alex da7bb14b96
QEMU: Add fuzz target build scripts (#3935)
* QEMU: Add fuzz target build scripts

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>

* QEMU: Disable AFL and MSan in project.yaml

We can't link against OSS-Fuzz' afl driver as it is not compiled with
-fPIC. Additionally, it appears that we trigger some false-positives
with MemorySanitizer, since we don't instrument all of the libraries.
Disable AFL and MemorySanitizer, for now.

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2020-06-21 16:38:41 -07:00
werdnaH 63868cba90
[skia] Remove Options Files with Only max_len Flag (#3987)
* [skia] add svg fuzzer

* [skia] removed options file

* [skia] removed options file

* [skia] removed all options files with only max_len

* delete options

* fixed cp statements

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-06-21 16:35:58 -07:00
Felicia Lim be9ec2bcd1
[opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives (#4007)
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives

Without this, a silk_memcpy call could resolve to __memcpy_chk,
which does not have an msan intercept, leading to false use-of-uninitialized-value errors.

* [opus] Consolidate cflags

* [opus] Fix typo
2020-06-21 16:34:41 -07:00
Robert Löhning 9fd351cb1a
[qt] Test qtsvg (#4012) 2020-06-19 07:53:57 -07:00
asraa 9d589a7e86
Add arthur and use less memory (#4001)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-18 08:20:41 -07:00
Tanuj Garg 98e73d06c2
added auto_cc to json project (#3999) 2020-06-17 13:19:35 -07:00
bungeman ca4277eb5a
[skia] Fix coverage build to use Ninja. (#4005)
The other builds were moved to Ninja, this one needs to be as well.

Bug: oss-fuzz:23438
2020-06-17 12:50:25 -07:00
Mihai Maruseac 8603f6a6cd
Enable more fuzzing for TensorFlow (#4004)
* Link against `libc++` with proper config in `.bazelrc`

* Add support for `undefined` build, link against proper `clang_rt` library

* Don't rsync in verbose mode.

* Support `undefined` and `memory` sanitizers

* Support more fuzzers than just `libfuzzer`.
2020-06-17 10:10:29 -07:00
Arshdeep Singh 094e3fdd68
Added auto-cc to lodepng project (#4002) 2020-06-17 07:15:22 -07:00
Yuquan Wang 7980fdb381
Adding auto-cc to project usrsctp (#3998)
Co-authored-by: Yuquan Wang <yuquanw@google.com>
2020-06-16 11:19:33 -07:00
Jonathan Foote bfa11be2f9
Explicitly define sanitizer support (#3995)
The oss-fuzz documentation states that listing supported sanitizers in a project's yaml [is optional](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#sanitizers). It appears that CIFuzz requires supported sanitizers to be included in this file ([ref](26e8d7c772/infra/cifuzz/cifuzz.py (L508-L529))). I believe this causes the CIFuzz Github Action to fail for projects that have not listed support for address sanitizer explicitly in their respective project YAML.

This PR explicitly defines support for asan and ubsan with a goal of fixing h2o's CIFuzz build
2020-06-16 09:18:02 -07:00
Arshdeep Singh e4420e001d
Added Seed Corpus and Dictionary for lodepng Library (#3986)
* Added Corpus and Dictionary for lodepng Library

* Added Dict download link in DockerFile for lodepng
2020-06-16 07:43:08 -07:00
DavidKorczynski 1d2ada9309
Disabled leak check in xpdf. (#3992) 2020-06-16 07:07:37 -07:00
Nikias Bassen 1ee643d324
libplist: Update for new release (#3993) 2020-06-16 07:07:03 -07:00
Augie Fackler 2c4dc1be41
mercurial: move fuzzing build to Python 3 (#3571)
This got a bit messy as a change, but it's basically all that topic. I
had to go squint at python3-libraries to figure out the modern
incantation for getting python3 to build under the fuzzer, but victory
is mine and this is probably substantially cleaner.
2020-06-15 15:38:10 -07:00
Jamie Pinheiro ed3ed5552b
Fix array bounds (#3990)
Co-authored-by: Jamie Pinheiro <pinheirojamie@google.com>
2020-06-15 12:47:40 -07:00
Mihai Maruseac 7a059f4355
Cleanup build script, fix tensorflow build (#3952)
* Need to manually install numpy now as it is used in the toolchain

* Handle review

* Remove bazel install since we install bazelisk

* Force symlink python3 -> python

* Refactor build script

* Remove `-stdlib=libc++` as that causes link errors

* Remove `identity_fuzz` as it results in a huge fuzzer. Will work on reducing size and then enable back

* Copy fuzzer to `$OUT`, not move

* Handle coverage support
2020-06-15 09:38:48 -07:00
kabeer27 c06528180b
[abseil-cpp] Initial Integration (#3958)
Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-06-15 13:20:25 +10:00
Ingo Berg 7c42471826
Update build.sh (#3985)
Disabled divide by zero sanitation for muparser (https://github.com/google/oss-fuzz/issues/3968#issuecomment-643373346)
2020-06-14 13:46:18 -07:00
tsdgeos 0afde6a4a9
anongit.kde.org is gone, use invent.kde.org (#3983) 2020-06-13 09:30:27 -07:00
DavidKorczynski bd4b131ced
[xdfp] one more fuzzer (#3981)
* Added new fuzzer to xpdf.

* Updated sanitizers.

* Limit sanitizer to address as this is the only one that allows us to fuzz the pdf core parser.

* Disable logging and go further into the API.
2020-06-13 08:13:26 -07:00
bungeman a392e2fd09
[skia] Build SwiftShader with Ninja. (#3979)
Ninja monitors the load and not just the number of processes, so can
hopefully build faster without overloading.
2020-06-12 14:43:58 -07:00
Abhishek Arya 7101ec4d4b
Add Github Actions CI. (#3971) 2020-06-12 14:39:16 -07:00
werdnaH ad4557e4ad
[skia] add svg fuzzer (#3976)
* [skia] add svg fuzzer

* [skia] removed options file

* [skia] removed options file

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-06-12 12:50:56 -07:00
Jamie Pinheiro a598a4fd34
Increase coverage of libraw fuzzing (#3962)
* Increase coverage

* Respond to PR feedback

* Move corpuses to cloud

Co-authored-by: Jamie Pinheiro <pinheirojamie@google.com>
2020-06-12 12:14:30 -07:00
bungeman b6c0816160
[skia] Build SwiftShader without UBSAN. (#3977)
By default a cmake based build puts user provided flags at the beginning
of a compiler invocation, giving them lowest priority. This makes it
quite difficult to add the required -fno-sanitize=vptr flag since it
will be placed before -fsanitize=undefined in a SWIFTSHADER_UBSAN build.
To make this work will require upstream changes to SwiftShader's build.

However, it is not necessary to build SwiftShader with the undefined
behavior sanitizer in order to fuzz Skia for issues. (This is only
required for the memory sanitizer which fortunately works.) As a result,
build SwiftShader without the sanitizer in the Skia undefined sanitizer
fuzzer build.
2020-06-12 09:35:33 -07:00
AdamKorcz 12ef3654b3
[jsonparser] Added maintainer to project.yaml (#3973) 2020-06-12 08:35:11 -07:00
Yunshu Ouyang e07487ddf7
[spdlog] Homepage updated, added auto ccs to project.yaml (#3975)
* Homepage updated, added auto ccs to project.yaml

* Fixed project.yaml
2020-06-12 08:33:08 -07:00
Tanuj Garg 9099c20d9e
Add dictionary to json project (#3954) 2020-06-12 16:31:03 +10:00
bungeman 7002484fd4
[skia] Build fix for upstream build changes. (#3967)
* [skia] Update diff for upstream change.

SkReadBuffer::getArrayCount() implementation changed, so update the
diff.

* [skia] Build fix for upstream build changes.

Skia is changing its build a little bit. 'skia_enable_fontmgr_custom'
has become 'skia_enable_fontmgr_custom_directory' (since that is what
it actually did) and skia_enable_fontmgr_custom_embedded has been added.

* [skia] Update SwiftShader to something not so old.

Skia builds it without submodules. Only build libGLESv2 and libEGL
instead of building everything, which isn't needed and takes a long
time. SwiftShader already has a checked-in build/ directory, so use a
different directory for building. Limit the number of make jobs to avoid
'Cannot allocate memory' errors. To build SwiftShader with a sanitizer,
the cmake define is now like SWIFTSHADER_XSAN.
2020-06-11 22:50:15 -07:00
DavidKorczynski 13c2289d14
Fixed fluent-bit build script for new plugin structure. (#3966) 2020-06-11 11:54:41 -07:00
jonvolfson e4f36d0f4f
Add spanner emulator project (#3965)
Co-authored-by: Jonathan Volfson <volfson@google.com>
2020-06-11 11:52:15 -07:00
Ravi Jotwani 94c0e60dfa
Draco integration (#3951) 2020-06-11 11:51:20 -07:00
binaryFate ad2958cffd
Add Monero project (#3941)
* Add Monero project

* fix boost downlaod url

Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-06-10 20:11:24 -07:00
Abhishek Arya fa06dcc8ae
Remove cmake install from projects. (#3961) 2020-06-10 14:46:23 -07:00
Google AutoFuzz Team af42169e03
[libevent] Initial Integration (#3960)
* add libevent project

* edit indentations and add primary contact

* Fix indents

* Fix indents

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2020-06-10 12:32:24 -07:00
Frederik Braun 39dbb1c807
Add FeaturePolicyParser target to firefox builds (#3959) 2020-06-10 12:16:30 -07:00
Bhargava Shastry f73e386f8e
solidity: Fix build failure due to missing liblzma used by LPM (#3956) 2020-06-10 07:21:49 -07:00
intrigus 32df3fef08
[rdkit] Re-enable memory and i386 architecture (#3955)
* [rdkit] Re-enable memory and i386 architecture

* Speculative fix
2020-06-10 07:10:10 -07:00
DavidKorczynski 778d61c291
[servo] merging of servo components into one project folder (#3950)
* Moved html5ever to servo project.

* Added rust-url to servo fuzzing project.

* Fix project link.
2020-06-09 11:38:07 -07:00
Nick Wellnhofer fa81803dd4
[libxml2] Use options files from upstream repo (#3947) 2020-06-09 07:41:15 -07:00
Robert Löhning 4f512ca757
Remove qtdeclarative (#3949)
It turned out that QQmlComponent::create() is not suitable for fuzzing.

This mostly reverts commit 0e401be9de.
2020-06-09 07:40:49 -07:00
DavidKorczynski 4c5bd1da12
[Nodejs] initial integration. (#3860)
* Nodejs initial integration.

* Added headers to fix Travis.

* A lot of simplifications to build script. LDFLAGS is the key here.

* More simplifications to build script.

* Fix Travis.

* Remove msan.

* Generalise and simplify build script.

* utilise all cores and a bit nicer structure in build.
2020-06-08 18:47:09 -07:00
Kevin Lubick fa9c352d67
[skia] Add Zepeng (#3945) 2020-06-08 11:10:49 -07:00
Abhishek Arya 1776bd3dec
Install latest cmake, make easy to install i386 packages (#3943)
Fixes #3124, #2751
2020-06-07 17:27:40 -07:00
Abhishek Arya ee5f37833a
Fix spidermonkey-ufi build, remove already existent libs 2020-06-06 21:26:16 -07:00
Michael Niedermayer 2c4e8ca837
[FFmpeg] projects/ffmpeg/build: disable demuxers only used for network protocols (#3942)
Network protocols are disabled during build so it makes no sense to
enable these

Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
2020-06-06 18:25:28 -07:00
Abhishek Arya ff19309fda
Fix libidn2 build 2020-06-06 06:51:27 -07:00
Abhishek Arya e471ec8900
Fix spidermonkey-ufi build 2020-06-06 06:42:36 -07:00
Josh Matthews 59c7295702
Add me to html5ever CCs. (#3940) 2020-06-05 17:14:14 -07:00
DavidKorczynski ae45c47eec
Updated the docker and build of xpdf to work with updated xpdf download page. Now xpdf download page has a latest link. (#3938) 2020-06-05 13:57:57 -07:00
asraa bc3e571894
add randy smith (#3937)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-05 09:54:22 -07:00
Nick Wellnhofer c4eefbf432
[libxml2] Initial integration (#3934)
* [libxml2] Initial integration

Fuzz targets are now maintained in the libxml2 repo.

* [libxml2] Install i386 versions of dependencies

* [libxml2] dpkg --add-architecture i386

* [libxml2] Link dependencies statically
2020-06-05 07:36:17 -07:00
Christian Holler (:decoder) c12687bad0
[spidermonkey-ufi] Copy additional dependency libraries (#3927) 2020-06-04 09:47:00 -07:00
AdamKorcz 5da3eafe82
Updated build script (#3933) 2020-06-04 05:30:25 -07:00
DavidKorczynski 7dc7956376
Added initial integration of serde-yaml. (#3810)
* Added initial integration of serde-yaml.

* Cleaned up the Dockerfile and build.sh to fit the new Rust improvements.
2020-06-03 20:30:26 -07:00
DavidKorczynski 7b841fb7ed
Added the html5ever project. (#3786)
* Added the html5ever project.

* Fixed typo.

* Updated the Dockerfile and build script to work with new Rust set up.

* Complete cleanup of Dockerfile.
2020-06-03 20:24:00 -07:00
Zhicheng Cai 2493a77a2d
[muparser] set open_mp not required (#3931) 2020-06-03 16:52:57 -07:00
Mihai Maruseac b918240b08
Fix TensorFlow build (#3930)
* Remove dga@google.com as he left Google

* Use python3 as python2 is deprecated

* Need to manually install numpy now as it is used in the toolchain

* Use bazelisk instead of the grep configure -> get Bazel version -> curl hack

* Remove C++11 constraint as TF now builds and uses C++14

* Handle review

* Remove source sed/replace as it is no longer needed
2020-06-03 15:42:49 -07:00
Robert Löhning 3d5ee75211
Revert "[qt] Add pdf to image corpus (#3926)" (#3929)
To handle PDFs, QImage requires qtwebengine
which doesn't build statically.

This reverts commit 934c770abb.
2020-06-03 11:04:11 -07:00
DavidKorczynski 15d4c5566c
[haproxy] Minor fix (#3928) 2020-06-03 10:18:11 -07:00
Robert Löhning 934c770abb
[qt] Add pdf to image corpus (#3926) 2020-06-03 07:24:44 -07:00
Nathan Moinvaziri 9d7927f443
Added contact to zlib-ng project auto_ccs. (#3924) 2020-06-02 21:27:47 -07:00
Jamie Pinheiro 726ce35e3a
Update Dockerfile (#3923) 2020-06-02 13:47:44 -07:00
Catena cyber 5875908be4
ecc-diff-fuzzer buils nettle without openssl (#3922) 2020-06-02 13:47:21 -07:00
Jamie Pinheiro bba24d396e
[LibRaw] Initial integration (#3918)
* Init integration

* Fix formatting

* Add size check

* Update maintainers

* PR Feedback

* Add newline

* Disable UBSan vptr

* Disable building examples

* Remove disabling UBSan vptr

Co-authored-by: Jamie Pinheiro <pinheirojamie@google.com>
2020-06-02 10:47:31 -07:00
Teju Nareddy bd66ce05ce
install rsync (#3920) 2020-06-01 21:30:14 -07:00
Ingo Berg 4e241e8140
Update project.yaml (#3917) 2020-06-01 10:57:20 -07:00
DavidKorczynski e3e1174635
[haproxy] Fix build failures. (#3884)
* Updated the haproxy fuzzers to build again.

* The frame decoder needs additional updates since we need to call init_h2 to initialise a memory pool. Disabling this for now as this is a larger change in the code base and will fix up in the coming week.

* Fixed hpack decode.

* Updated the yaml since we dont want memory sanitizer.
2020-06-01 07:18:46 -07:00
Zhicheng Cai 0f50310c1b
[muparser] initial integration (#3814) 2020-06-01 07:07:57 -07:00
Evgeny Vereshchagin 361687b78b
[systemd] add DaanDeMeyer's address (#3916) 2020-06-01 07:04:11 -07:00
Julien Pivotto b3e1fa6e3e
Prometheus: Don't use WORKDIR $SRC (#3908)
This makes build_fuzzers work with local checkouts.

Without this, it complains with 'Cannot use local checkout with "WORKDIR
/src".'

Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
2020-06-01 21:30:01 +10:00
Michael Niedermayer 22f384c4fb
[FFmpeg] install rsync as it is required for the seed corpus (#3912)
Fixes: Issue 22500 (build failure)
2020-05-31 13:03:58 -07:00
Arvid Norberg 416350d5b3
bump libtorrent to fuzz the 2.0 release branch (#3913) 2020-05-31 12:31:06 -07:00
Even Rouault 476cb1b550
[GDAL] Move clone of dependencies to upstream repository (#3911)
Cloning of build dependencies and patching is now done by
https://github.com/OSGeo/gdal/blob/master/gdal/fuzzers/build.sh
2020-05-31 12:30:29 -07:00
Evgeny Vereshchagin 4cb51d21b3
Revert "[systemd] remove my non-gmail address (#3606)" (#3910)
This reverts commit 65dcabc484.
2020-05-31 07:55:33 -07:00
Julius Volz 3b12b4f15c
Update Prometheus maintainer in Dockerfile (#3906)
...to myself (Prometheus co-creator).

Signed-off-by: Julius Volz <julius.volz@gmail.com>
2020-05-30 16:02:24 -07:00
Luca Boccassi c508a5cc8e
libzmq: enable honggfuzz (#3909) 2020-05-30 16:01:12 -07:00
Guido Vranken c563cf610e
[cryptofuzz] wolfCrypt: Build with support for AES-CFB, AES-OFB (#3904) 2020-05-29 14:25:46 -07:00
Julius Volz b6d52da9bd
Update email addresses for Prometheus (#3905)
Signed-off-by: Julius Volz <julius.volz@gmail.com>
2020-05-29 14:19:32 -07:00
Nikita Popov 2b794d083b
[php] Remove --enable-json (#3899)
JSON is now always compiled in, and cannot be explicitly enabled.
2020-05-29 09:21:58 -07:00
kabeer27 2d85b58226
Updating jsoncpp primary contact (#3900) 2020-05-29 08:44:39 -07:00
Robert Löhning 0e401be9de
[qt] Add qtdeclarative (#3901)
* [qt] Add qtdeclarative

* [qt] Ignore stdout from make

"The job exceeded the maximum log length, and has been terminated."
2020-05-29 08:06:12 -07:00
Google AutoFuzz Team 8284b6bbdd
[libgd] Add another fuzzer to libgd (#3892) 2020-05-29 20:01:23 +10:00