Commit Graph

3577 Commits

Author SHA1 Message Date
Damien Neil 7b8279e634 [golang-protobuf] Add Dockerfile and build.sh. (#2942) 2019-10-11 11:40:23 -07:00
Abhishek Arya 54cc1468a3
Add Jordan Bayles to jsoncpp autoccs 2019-10-11 09:09:18 -07:00
Abhishek Arya 40973c57ca
Add dictionary for jsoncpp. 2019-10-11 09:05:09 -07:00
daviesrob af319543ed Add htslib project files (#2843)
* Add htslib project files

Only build the library and hts_open_fuzzer.o.  The binaries are
not needed and fail to build anyway due to missing libfuzzer
symbols.

* Use $LIB_FUZZING_ENGINE
2019-10-11 08:10:35 -07:00
Abhishek Arya 45574e0197
Skip jsoncpp_fuzzer bad build check to let startup crash file. (#2941) 2019-10-11 07:24:06 -07:00
Harish Mahendrakar 4b6cf85eb3 [libavc, libhevc, libmpeg2] use ossfuzz.sh from upstream project (#2940)
Steps to build fuzz target are now maintained in upstream project
2019-10-10 22:01:16 -07:00
Abhishek Arya 131eded8cc
Integrate jsoncpp fuzz target. (#2939)
* Integrate jsoncpp fuzz target.

* Fixes. Disable AFL due to startup crash.
2019-10-10 18:54:03 -07:00
Alex Gaynor 51f8df10c1 [imagemagick] build for i386 (#2907)
* [imagemagick] build for i386

* Try install libc6 for i386
2019-10-09 21:53:31 -07:00
Damien Neil 99329ca1e4 [golang-protobuf] Add project. (#2936) 2019-10-09 17:00:01 -07:00
Sylvestre Ledru 0fd891f032 nss: add myself to the cc list (#2933) 2019-10-09 12:55:48 -07:00
Evgeny Vereshchagin 44f6945036 [systemd] Add Anita Zhang (#2935) 2019-10-09 12:47:26 -07:00
Tim King af03cbe9d4 [leptonica] Disabling PNM format for leptonica fuzzer. (#2934) 2019-10-09 10:38:51 -07:00
Sylvestre Ledru 99d7bc4020 spidermonkey: add myself to the cc list (#2932) 2019-10-09 09:55:58 -07:00
Sylvestre Ledru 190e3569d8 Firefox: Add myself to the list of cc (#2931) 2019-10-09 09:55:28 -07:00
Damien Miller 641de9e1ac Enable recently-added privkey_fuzz target (#2930) 2019-10-08 20:13:27 -07:00
Brandon Weeks 116a67cf5d [go-attestation] Add project (#2921) 2019-10-08 16:22:31 -07:00
Amol Grover 70c5678c62 Fix hyperlink markdown (#2926) 2019-10-08 10:48:41 -07:00
Hasnain Lakhani bb35486cac Add some more CCs for proxygen (#2925)
Ideally we could add our mailing list but this will do for now.
2019-10-08 08:57:34 -07:00
Martin Storsjö edac00ab9e ffmpeg: Build fdk-aac with -fno-sanitize=signed-integer-overflow (#2923)
The upstream fdk-aac project at Fraunhofer currently doesn't
prioritize signed integer overflow issues.
2019-10-08 07:40:52 -07:00
Tyson Smith ad88ae9700 [harfbuzz] Add Vendor CC (#2920) 2019-10-07 11:54:27 -07:00
Harsh Joshi d6c044f827 Fix: Apply extension fixes to Contributing File (#2918) 2019-10-05 22:14:52 -07:00
Mark Wodrich dfd92338d0 [usrsctp] Add @markwo to project (#2917) 2019-10-04 14:31:33 -07:00
jonathanmetzman 378472cf0b
Add scripts to bisect clang commits that introduced regressions (#2849)
Add script to bisect bad clang rolls.
2019-10-03 15:35:31 -07:00
Yevgeny Pats 79132050e2 [golang] set explictly GO111MODULES=off (#2914)
This will prevent breaking go-fuzz when it will support go modules
https://github.com/dvyukov/go-fuzz/issues/195

and addressing this issue:
https://github.com/google/oss-fuzz/issues/2878
2019-10-03 13:15:08 -07:00
Catena cyber 27d875fbd1 Adds i386 architecture to ecc-diff project (#2904) 2019-10-03 07:50:52 -07:00
Harish Mahendrakar fe3673cf1d [libavc, libhevc, libmpeg2] Add seed corpus (#2912)
Add seed corpus for libavc, libhevc and libmpeg2 fuzz targets
2019-10-02 13:27:38 -07:00
Randy 74794f0ae3 [libspng] move build.sh upstream (#2911) 2019-10-02 10:03:16 -07:00
Even Rouault 4be53a633e [GDAL] Move build.sh to GDAL upstream (#2909)
build.sh has been moved to
https://github.com/OSGeo/gdal/blob/master/gdal/fuzzers/build.sh
as suggested in
https://github.com/google/oss-fuzz/pull/2908#pullrequestreview-294723365
2019-09-30 20:58:33 -07:00
Abhishek Arya ce9273a627
Add more android contacts to vendor_ccs. (#2910) 2019-09-30 09:24:21 -07:00
Even Rouault a7e58f3e7c [GDAL] Fix build due to poppler git API change (#2908)
We use a hack to pretend this is Poppler 0.82, as currently
poppler git still advertizes 0.81
2019-09-29 19:00:43 -07:00
Bhargava Shastry 230304ccc2 ovs: Fix build failure due to python3 upgrade (#2900) 2019-09-29 08:51:30 -07:00
Catena cyber afd8743634 Fixes gnupg patch with conflict (#2906)
* Fixes gnupg patch with conflict

* Adds npth library to gnupg fuzz target build

* Adds npth lib for regular gnupg build
2019-09-29 06:27:24 -07:00
Felix Weinrank 3d6006c12a [usrsctp] Fix e-mail typo (#2905) 2019-09-29 06:26:58 -07:00
Nikita Popov 6c14075986 [php] Enable i386 architecture (#2899) 2019-09-29 06:25:34 -07:00
Max Moroz 099b86d384
Revert "[infra] Use fuzz target basename in the coverage script. (#2896)" (#2903)
This reverts commit 5a1d15bd9a.
2019-09-28 14:57:46 -07:00
Max Moroz 5a1d15bd9a
[infra] Use fuzz target basename in the coverage script. (#2896) 2019-09-27 13:04:49 -07:00
tsdgeos 0c1d8d9749 karchive: use newer bzip2 (#2898) 2019-09-27 12:39:32 -07:00
Catena cyber 0c09c35920 use git for all gnupg dependencies (#2894) 2019-09-27 08:06:01 -07:00
Felix Weinrank ad07d59f4b [usrsctp] improve fuzzing mechanisms (#2893)
* add usrsctp project

* Extend usrsctp project

* Fix github repo branch

* improve build.sh script

* usrsctp: improve fuzzing utilities
2019-09-26 22:00:17 -07:00
Google AutoFuzz Team 2f517a2833 [c-blosc] Add c-blosc (#2891)
* add c-blosc

* disabled UBSAN and edited the files
2019-09-26 10:21:20 -07:00
tsdgeos 58df29fd3f Use 5.15 branch of Qt for now (#2888)
A direct clone now gives you dev which is future Qt 6, none of the
code using Qt expects Qt6 yet

Using 5.15 now (instead 5.12 before) means we have to disable
sanitize=vptr in parts of qt in kimageformats since those
parts now compile with no-rtti

While at it make the compilation script a bit better:
 * Don't need to disable compressing rcc files, only needed to pass
the CFLAGS to the QMAKE_CFLAGS
 * Also fix the "make qmake faster" sed command
2019-09-26 09:17:32 -07:00
Sebastian Rasmussen 198345dc17 [ghostscript] Limit ghostscript memory usage to 1Gbyte. (#2890) 2019-09-26 08:35:13 -07:00
Tyson Smith c511c7b118 [libtheora] Build OGG with --disable-crc (#2885) 2019-09-24 17:55:54 -07:00
Abhishek Arya 97060c44de
Fix typo 2019-09-24 16:25:00 -07:00
jonathanmetzman f57aa39c4d
Add instructions on dynamic linking (#2881) 2019-09-24 16:19:45 -07:00
Nikita Popov 09aa9ac556 [php] Enable fuzzer for parser (#2883) 2019-09-24 07:08:09 -07:00
asraa 2b13d85d0c use updated version of cmake (#2882)
Signed-off-by: Asra Ali <asraa@google.com>
2019-09-23 13:19:02 -07:00
jonathanmetzman d488ec15e7
[proxygen] Set rpath properly (#2880) 2019-09-23 10:43:47 -07:00
Guido Vranken 8f82af5a61 [cryptofuzz] Add @slontis (#2879) 2019-09-23 08:40:04 -07:00
Hasnain Lakhani 54c35a54ef [proxygen] Re-enable AFL; change build script to put libunwind in the generated directory and make the fuzzer find it (#2872)
I'm re-enabling AFL since the issue with gmock's main being present was fixed in e8616a31f4

This libunwind changes solve the issues we were seeing with the fuzzers not running in the clusterfuzz bot environment. What this PR does, roughly:

* Copy the .so from the build image into `/out/lib`
* Patch the binaries so they have an rpath which specifies looking in `/out/lib` for libraries in addition to the normal search path

This will work *assuming* `/out/lib` is copied over in the bot environment and is available. I'm relying on code reviewers to let me know if this is true or not. If not, it should be an easy path update.

Test plan:

Verifying the AFL build was easy:

    python infra/helper.py build_fuzzers --sanitizer address --engine afl proxygen
    python infra/helper.py check_build --engine afl proxygen
    python infra/helper.py run_fuzzer --engine afl proxygen ProxygenHTTP1xFuzzer

I verified the libunwind changes by using the shell command (thanks for the tip, didn't know that was there!).

I first built the binary using this build script.

I then used `python infra/helper.py shell --sanitizer address proxygen`

In the shell, I:

* Ran `/out/ProxygenHTTP1xFuzzer` and verified it worked
* Ran `ldd` on it and showed it pointed to `/out/lib` for `libunwind.so.8`
* Uninstalled libunwind
* Verified it still worked
* Used `patchelf --print-rpath ProxygenHTTP1xFuzzer` to verify that the rpath was set as I expected (inside `/out/lib`)
* Removed the patch using `patchelf --remove-rpath to_patch`
* Verified that the fuzzer no longer runs (crashes on startup, complaining about missing `libunwind.so.8`)
* I verified that the binary still finds the system one if rpath isn't set, by reinstalling it, using `patchelf --print-rpath` again, verifying that it prints the path to the system `libunwind` when I run `ldd`, and that the fuzzer runs fine. This implies it can find other system libraries fine too (and I saw that in the `ldd` output)

I don't think I can do any further testing, so we will just have to hope that this works in the bot environment.
2019-09-21 20:08:51 -07:00