Commit Graph

18 Commits

Author SHA1 Message Date
jonathanmetzman 3049c50d48
Migrate projects using -lFuzzingEngine to $LIB_FUZZING_ENGINE (#2325)
Migrate from -lFuzzingEngine to $LIB_FUZZING_ENGINE where possible and not causing breakage
2019-05-01 11:09:55 -04:00
Nick Mathewson 6b95c945dd When building Tor, get an up-to-date list of the static libraries (#1585) 2018-07-01 07:17:50 -07:00
Max Moroz 0a5405683e [tor] Fix configure flags being used in build.sh. 2017-11-01 11:42:14 -07:00
Max Moroz a66795291a [tor] Disable FORTIFY_SOURCE in order to let sanitizer interceptors work (#940). 2017-11-01 10:23:38 -07:00
Max Moroz 0a2bd75093 [tor] Instrument dependencies and enable MSan. 2017-10-31 14:57:44 -07:00
Devin Jeanpierre 330386686d Use apt-get update && apt-get install, per best practices: (#561)
https://docs.docker.com/engine/userguide/eng-image/dockerfile_best-practices/

I ran into this because I was getting errors locally, like:

    E: Failed to fetch http://archive.ubuntu.com/ubuntu/pool/main/d/dpkg/libdpkg-perl_1.18.4ubuntu1.1_all.deb  404  Not Found [IP: 91.189.88.149 80]

It turns out you get these if you don't update, and the official best practices are to `run apt-get update && apt-get install`. In fact, running _any_ apt-get install command without the apt-get update && before it can result in unfortunate caching artifacts -- see "cache busting". (P.S. thanks to Peng on Freenode for helping me, I'm bad at Ubuntu.)

So:
    sed -re \
        's/RUN apt-get ((-y )?(install|build-dep))/RUN apt-get update \&\& apt-get \1/' -i \
        projects/**/Dockerfile

I also manually fixed the cases that already ran apt-get update in their Dockerfile:
    dlplibs/Dockerfile
    grpc/Dockerfile
    libreoffice/Dockerfile
2017-05-01 23:31:02 -07:00
Abhishek Arya 2d5e2ef84f Fix Tor build with non-existent seed corpus for some fuzzers (#469). (#481) 2017-03-26 19:26:59 -07:00
Oliver Chang 60835ac420 oss-fuzz/BASE_IMAGE -> oss-fuzz-base/BASE_IMAGE 2017-03-22 12:12:51 -07:00
Nick Mathewson 63b3d797e0 Tor build.sh: Disable memory sentinels when fuzzing (#464)
Tor has a few safety features that try to prevent bugs by using
memory more safely.  For example, by default, we terminate our IO
buffers with 0-valued bytes, so that accidental string operations
can't run off the end.  For another example, we do some of our
allocation in "memory areas" -- an obstack-style allocation in which
all objects are freed at once.

These features prevent a fairly large category of crash bugs, but
they also prevent asan from seeing our mistakes.  But when we're
fuzzing, we'd like to expose as many of our mistakes as possible.
With that in mind, we've added a --disable-memory-sentinels
configuration option to turn off a lot of these safety features when
we're fuzzing.  This feature turns it on for oss-fuzz.
2017-03-16 12:46:07 -07:00
Oliver Chang 7df64d4ac4 [infra] ossfuzz/IMAGE -> gcr.io/oss-fuzz/IMAGE 2017-03-15 18:46:31 -07:00
Nick Mathewson b0b823a0de Switch Tor git URLs to mainline Tor. (#352)
Now that we've merged the fuzzing support to mainline Tor [1], and
moved our fuzzing corpus repository into our main repository [2],
we no longer have to build the docker image off of my own branches.

[1] https://trac.torproject.org/projects/tor/ticket/20893
[2] https://gitweb.torproject.org/fuzzing-corpora.git
2017-02-06 07:46:02 -08:00
Abhishek Arya 0feca46241 Update project.yaml 2017-02-02 11:32:08 -08:00
Nick Mathewson d3baeabd5c Use my gmail address in Tor auto_ccs (#274)
(This on the theory that it will let me log in to the various
login-only services associated with oss-fuzz.)
2017-01-11 11:23:40 -08:00
Kostya Serebryany 0f376df509 add ubsan to tor 2017-01-11 10:59:27 -08:00
Mike Aizatsky 6f23387fa8 [tor] static linking of libraries
@nmathewson
2017-01-10 15:09:29 -08:00
Nick Mathewson 3d351a0883 Build tor fuzzing binaries with static libevent linkage (#267)
* Remove true && true &&...

Don't ask.

* Link libevent statically in tor build.sh
2017-01-10 12:32:01 -08:00
Nick Mathewson 11985a0665 Tor oss fuzzing configuration (#265)
* Initial attempts at getting Tor to build in oss-fuzz docker.

* add automake/autoconf

* More work

* more fixes for tor

* copyright notice, corpora.

* zip correctly.
2017-01-09 11:32:36 -08:00
Nima Fatemi cb2ecc10a9 Nominating Tor (#114) 2016-12-01 17:12:31 -08:00