Commit Graph

4454 Commits

Author SHA1 Message Date
Nick Fitzgerald 82252c22ef
wasmtime: Only zip the seed corpus if it exists (#4065)
This will prevent build failures like
https://oss-fuzz-build-logs.storage.googleapis.com/log-5a0b58fe-4a35-46d5-b4d2-221905e7d208.txt
in the future.
2020-07-06 10:46:47 -07:00
asraa ba72f0b7fc
fixup coverage build (#4071)
Signed-off-by: Asra Ali <asraa@google.com>
2020-07-06 10:14:53 -07:00
rbehjati 88c5e76798
Update the build script for project oak to disable it temporarily (#4068) 2020-07-06 07:59:44 -07:00
Abhishek Arya a966c122ec
Fix sentencepience build failure 2020-07-06 07:53:15 -07:00
kabeer27 e49a126000
Feature addition: Individual schedulers for projects (#4066)
This PR, integrates the new feature that allows users to specify their own schedules via project.yaml.
Parameter 'schedule : value' will dictate how many times a day should the project be built, i.e if value = 2
Then project will be built twice a day starting at 6 and interval 24/2 = 12 so 6:00 and 18:00
if parameter is unavailable DEFAULT_SCHEDULE = '0 6 * * *' i.e 6:00 will be used.

The cloud functions creates individual scheduler jobs for each project, with the name project_name + '-scheduler', and subscribes it to the topic 'request_build' with payload message 'project_name' which will be used by the next cloud function to request build for this project.

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-07-06 17:52:24 +10:00
Robert Löhning 2264f7915f
[qt] Don't clone AFL (#4067)
Now that stable caught up with master, we
can use the clone from base-builder image.
2020-07-05 08:30:57 -07:00
Randy 3c7ab8e850
[libspng] extract zlib to separate directory (#4064)
CIFuzz is overwriting $SRC/libspng after executing the Dockerfile before running build.sh which means $SRC/libspng/zlib is lost:
https://github.com/randy408/libspng/runs/830380355#step:4:549
2020-07-02 19:00:39 -07:00
Evgeny Vereshchagin 7667c8fe08
[util-linux] move the fuzz target to the OSS-Fuzz repository (#4063) 2020-07-01 19:37:07 -07:00
Teju Nareddy f8c7f158f7
[ESPv2] Attempt to fix coverage build (#4062)
Currently, coverage builds fail on step 3 with:
```
Step #3: + rsync -avLkR --include '*.h' --include '*.cc' --include '*.hpp' --include '*.cpp' --include '*.c' --include '*/' --exclude '*' /tmp /workspace/out/coverage
Step #3: sending incremental file list
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_build.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_dns.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_rules.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_version.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/sha1.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/gcm_nohw.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/digests.c"
...
```

Just exclude these files. Doubt they matter to us.

Ref: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23621&q=esp-v2&can=2
Signed-off-by: Teju Nareddy <nareddyt@google.com>
2020-07-01 16:56:39 -07:00
Dmitry Vyukov fa5b4dbd9a
[syzkaller] update go get invocation and fix the build (#3754)
* syzkaller: update go get invocation

The way to checkout the repo has changed.
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21994

* [syzkalle] Fix paths passed to `compile_fuzzer` function.

Co-authored-by: Max Moroz <mmoroz@chromium.org>
2020-07-01 15:04:40 -07:00
werdnaH df0ea93918
Add SkSVGCanvas api Fuzzer (#4061)
* add svg api fuzzer

* fixed build.sh

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-07-01 14:59:11 -07:00
Randy 584b967a69
[libspng] Fetch zlib in Dockerfile (#4050)
* [libspng] Fetch zlib in Dockerfile

This step has been moved from the build script: c35e509f04

* Update Dockerfile

* Update Dockerfile

* dummy commit

* Update Dockerfile

* dummy commit

* dummy commit
2020-07-01 11:00:08 -07:00
kabeer27 09c7ea778b
Added deploy file and restructured cloud function directory (#4057)
* Adding deploy.sh and restructuring directory

* Integrating review changes

* Passed project id as an argument to each command

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-07-01 16:13:08 +10:00
asraa 468f932b7d
[envoy] lower CPU more (#4056)
* try

Signed-off-by: Asra Ali <asraa@google.com>

* fix build

Signed-off-by: Asra Ali <asraa@google.com>

* fix script

Signed-off-by: Asra Ali <asraa@google.com>

* use HOST_CPU*0.5

Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 15:45:08 -07:00
Luca Boccassi 0a7380a80a
[libzmq] use build script from upstream repository (#4054)
* libzmq: use build script from upstream repository

In order to avoid having to send PRs every time we change something, simply
maintain the build script in the upstream repository, and change build.sh
to a one-line call.

* libzmq: clone corpora and dictionary repository
2020-06-30 13:22:33 -07:00
Max Moroz 05063afd88
Revert "Don't create empty corpus archive as it wont unpack. (#3903)" (#4048)
This reverts commit cb156403e9.
2020-06-30 13:03:44 -07:00
rbehjati c1404e9b62
[oak] Temporarily disable fuzzing for project Oak (#4053) 2020-06-30 11:38:36 -07:00
Nikita Popov 26af5e0e25
[php] Enable unserializehash fuzzer (#4049) 2020-06-30 09:54:25 -07:00
asraa d4b88fc4e1
[envoy] envoy build resource adjustment (#4052)
Signed-off-by: Asra Ali <asraa@google.com>
2020-06-30 09:52:22 -07:00
Abhishek Arya a31e58fb5c
Fix build due to missing liblzma-dev 2020-06-29 21:52:08 -07:00
Danny Halawi 8b6899cfb9
Fixing Dockerfile for fuzzers that use LPM (#4044)
* fixing Dockerfile for libpng-proto

* Fixing Dockerfile so the LPM for giflib works

* Fixing Dockerfile so the LPM for xerces-c works

* taking out unneeded installations

Co-authored-by: Danny Halawi <dhalawi@google.com>
2020-06-29 21:48:37 -07:00
Google AutoFuzz Team 1f9ec264a8
Add sentencepiece (#4035)
* add sentencepiece project

* change the architectures

* change indentations
2020-06-29 12:45:50 -07:00
Robert Löhning 7da55877b6
[qt] Move build.sh to own repository (#4042) 2020-06-29 12:43:17 -07:00
kabeer27 d15dc2a88f
Renaming infra/build/functions files (#4031)
Renamed main.py to sync.py
and test_sync.py to sync_test.py

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-06-29 11:10:47 +10:00
binaryFate eaae983c73
Monero: fix coverage, don't enable asan, add new fuzz test (#4040)
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
2020-06-27 15:42:29 -07:00
Abhishek Arya c2df30abb5
Update project.yaml 2020-06-26 20:31:54 -07:00
pierwill cd9ee7ca4c
Add influxdb project for review (#4028)
Co-authored-by: pierwill <pierwill@users.noreply.github.com>
2020-06-26 11:36:10 -07:00
Abhishek Arya ff4f38e772
Fix memory leak in libevent parse_query_fuzzer 2020-06-25 19:39:14 -07:00
Nathan Moinvaziri e32b716754
Added fuzzer for c-blosc2 (#3989) 2020-06-25 16:56:26 -07:00
Evgeny Vereshchagin 25cff8db8e
[util-linux] cover mnt_table_parse_stream (#4032)
* [util-linux] cover mnt_table_parse_stream

Waiting for https://github.com/karelzak/util-linux/pull/1068

* temporarily point OSS-Fuzz to evverx/util-linux

* make sure it can be built with sanitizer=coverage
2020-06-25 15:35:44 -07:00
Ravi Jotwani f8c9eec4cf
E2fsprogs integration (#4006)
* added draco integration files

* wrote build file and Dockerfile for Draco

* split security-research-pocs fuzzer into four

* added project build to build.sh

* added more fuzzers

* fixed sanitizer flags

* removed commented code, combined fuzzers, fized build script

* changed to singular filenames, converted usage of random int to enum, changed buffer name, and fixed build script

* placed test files in memory instead of on disk, added asserts
2020-06-25 11:42:17 -07:00
kabeer27 181812050d
Cloud function for syncing OSS-Fuzz projects (#3538). (#4023)
Integrating the first cloud function i implemented which syncs the project list from github and uploads the list to cloud datastore, which will be used by another cloud function to request builds.

Co-authored-by: Kabeer Seth <kabeerseth@google.com>
2020-06-25 13:41:04 +10:00
FrankGalligan d647392eda
Draco: add more emails (#4030)
* Draco: add more emails

* Fix name mistake
2020-06-24 14:59:50 -07:00
DavidKorczynski bee17f0144
[HAProxy] Added two new contacts for HAProxy fuzzing. (#4029) 2020-06-24 13:51:44 -07:00
Nick Wellnhofer e3c5b941da
[libxml2] Two new fuzz targets (#4022)
* [libxml2] Two new fuzz targets

Enable HTML and XML Schema fuzzers.

* [libxml2] Compile missing source files

* [libxml2] Don't forget to build seed corpora
2020-06-24 13:01:23 -07:00
Zhengdai Hu adc5fcd502
[zetasql] Initial onboarding of ZetaSQL (#4010)
* Add initial onboarding scripts of ZetaSQL for review

* Checkout fuzz target from simple_fuzzer branch

* Enable code coverage report

* Enable only ASAN and MSAN

* Fixed broken tzdata symlink

* Switch to master branch
2020-06-24 12:47:55 -07:00
DavidKorczynski 54d69b6f2d
Updated settings in project yaml so bugs are freely visible. (#4024) 2020-06-23 15:28:42 -07:00
Ravi Jotwani 04f3736d32
Draco fuzz coverage (#3980)
* added draco integration files

* wrote build file and Dockerfile for Draco

* added Apache 2 license header

* changed project maintainer, cleaned up draco_decoder_fuzzer, and set working directory in Dockerfile

* added a couple of fuzzers

* two more targets

* merged from upstream

* build point cloud encoding fuzzer, renamed quantization fuzzers

* added more fuzzers

* moved fuzzers and build script to https://github.com/google/draco, made the build script here execute the new one

Co-authored-by: Ravi Jotwani <rjotwani@google.com>
2020-06-23 12:31:24 -07:00
Yuquan Wang 2fdb520e26
Yuquanw branch (#4019)
* Adding auto-cc to project usrsctp

* Improving fuzzing coverage

* Remove experimental dataflow sanitizer

Co-authored-by: Yuquan Wang <yuquanw@google.com>
2020-06-22 14:47:15 -07:00
Nathan Moinvaziri 351bf4c3c8
Updated c-blosc to use fuzzers in c-blosc repository. (#4018)
Use compat files for seed corpus with new decompress_fuzzer.
2020-06-22 11:32:53 -07:00
Shivam7-1 eedf02164e
Updated rust_lang.md (#4017) 2020-06-22 08:05:20 -07:00
Abhishek Arya e8ffee4077
Update project.yaml 2020-06-22 08:02:59 -07:00
DavidKorczynski 8656b3722c
[Haproxy] Simplify build script and update to latest code (#4000)
* Updated hpack to work with new build.

* Required minimium length.
2020-06-22 07:57:33 -07:00
alex da7bb14b96
QEMU: Add fuzz target build scripts (#3935)
* QEMU: Add fuzz target build scripts

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>

* QEMU: Disable AFL and MSan in project.yaml

We can't link against OSS-Fuzz' afl driver as it is not compiled with
-fPIC. Additionally, it appears that we trigger some false-positives
with MemorySanitizer, since we don't instrument all of the libraries.
Disable AFL and MemorySanitizer, for now.

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2020-06-21 16:38:41 -07:00
werdnaH 63868cba90
[skia] Remove Options Files with Only max_len Flag (#3987)
* [skia] add svg fuzzer

* [skia] removed options file

* [skia] removed options file

* [skia] removed all options files with only max_len

* delete options

* fixed cp statements

Co-authored-by: Zepeng Hu <zepenghu@google.com>
2020-06-21 16:35:58 -07:00
Felicia Lim be9ec2bcd1
[opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives (#4007)
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives

Without this, a silk_memcpy call could resolve to __memcpy_chk,
which does not have an msan intercept, leading to false use-of-uninitialized-value errors.

* [opus] Consolidate cflags

* [opus] Fix typo
2020-06-21 16:34:41 -07:00
Shivam7-1 50bc1d647c
Updated reproducing.md (#4013) 2020-06-20 08:31:59 -07:00
Shivam7-1 48bd2b6377
Updated continuous_integration.md (#4014) 2020-06-20 08:31:51 -07:00
Robert Löhning 9fd351cb1a
[qt] Test qtsvg (#4012) 2020-06-19 07:53:57 -07:00
Shivam7-1 058247f3d3
Updated ideal_integration.md (#4011) 2020-06-19 07:47:00 -07:00