Commit Graph

5585 Commits

Author SHA1 Message Date
jonathanmetzman c9b3d057b0
[CIFuzz] End fuzzing docker processes properly (#5473)
They only right way to do this properly seems to be using docker's container id file with docker stop.
Fixes #5423
2021-04-12 08:04:35 -07:00
Evgeny Vereshchagin 09dd5ff913
Revert "[systemd] roll back to meson-0.56.2 (#5199)" (#5601)
Now that https://github.com/mesonbuild/meson/issues/8345 is closed,
it should be safe to keep rolling forward.

This reverts commit ac290e7ed7.
2021-04-12 15:15:34 +01:00
Tom Payne fe8f6ccb0e
cilium: Update contact emails (#5600)
* cilium: Update contact emails

This adds three Cilium maintainers and updates one maintainer's email
address to match the Google Account email. Previously an alternative
email was used, which did not give access to the ClusterFuzz dashboard.

* cilium: Add main_repo
2021-04-12 12:59:24 +01:00
Fabian Meumertzheim 4f13045ec0
[java-example] Trigger new native finding (#5597)
Java native libraries should now be fuzzed correctly, but the current crash is still reported as flaky due to the multiple fixes required to make it work.

This commit should trigger a clean new finding.
2021-04-10 07:31:35 -07:00
Catena cyber 026fa7a364
Suricata more targets (#5596)
* Adds per-protocol targets to suricata

* fixup msan
2021-04-10 10:47:27 +01:00
Ilya Lipnitskiy 7b2fcf0f25
protobuf-c: fix build (#5595)
Fix fuzzer build after upstream changes.
2021-04-10 10:46:49 +01:00
DavidKorczynski 302c108d5c
linkerd2-proxy: initial integration (#5547)
* initial integration of linkerd2-proxy.

* updated linkerd2-proxy following upstream merge.

* whitespace to trigger CI.
2021-04-09 06:51:27 -07:00
Caolán McNamara 627cc5620f
update libreoffice build-dependency cache (#5588) 2021-04-09 06:49:13 -07:00
AdamKorcz cb329d4173
[wasm3] Initial integration (#5573) 2021-04-09 08:43:12 +10:00
Abhishek Arya 33ae18cc44
Enable generated dict in AFL++ (#5591)
This was accidently disabled.
2021-04-09 08:16:07 +10:00
Lovell Fuller 82558b71bf
libvips: remove no-longer-used giflib dependency (#5590) 2021-04-08 15:52:13 +01:00
Catena cyber 35cc962bf9
Adds ubsan for capnproto (#5589) 2021-04-07 16:22:15 +01:00
Guido Vranken d3a1cdda43
[relic] Activate AES encryption/decryption (#5587) 2021-04-07 16:21:39 +01:00
priyawadhwa 18a05fce3d
Store triage party image in oss-fuzz-base repo (#5584) 2021-04-07 11:11:52 +10:00
AdamKorcz fc82b3f38f
[golang] Refactor build (#5581) 2021-04-06 06:10:36 -07:00
Alan Modra b57dd54803
Don't build parts of gdb when testing binutils (#5583)
gdb sources have been reorganised.  Disable more directories when
building the binutils fuzzers.
2021-04-06 06:10:01 -07:00
Alan Modra 2dc131e5b0
Fix issue 32760: binutils: Fuzzing build failure (#5582)
Upstream changed over to using stdbool.h.  s/TRUE/true/
2021-04-06 00:15:28 +00:00
Caolán McNamara 0f02ca5a56
retry sequentially if multiprocessing do_bad_build_check detects fail… (#5578)
* retry sequentially if multiprocessing do_bad_build_check detects failures

https://github.com/google/oss-fuzz/issues/5441

The error seen in the build log is:

Whoops, the target binary crashed suddenly, before receiving any input
from the fuzzer!

suggesting that the fuzzer crashed before it got to do anything.
Debugging locally what I tend to see is that

a) in src/afl-forkserver.c afl_fsrv_start the read_s32_timed call
returns 0 and that triggers kill(fsrv->fsrv_pid, fsrv->kill_signal);
(SIGKILL)
b) read_s32_timed returns 0 because *stop_soon_p is non-zero at
restart_read:
c) *stop_soon_p becomes non-zero in handle_stop_sig of
src/afl-fuzz-init.c due to receiving SIGINT
d) that SIGINT is sent by the timeout script used in bad_build_check so
it is that "outer" timeout process which is sending SIGINT which then
triggers afl-forkserver's internal SIGKILL to kill the process

I get improved results if I retry the killed off fuzzers sequentially

* Remove unneeded semicolons to fix presubmit

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2021-04-05 12:50:15 -07:00
Riley Dulin 94e6554908
Add a maintainer to the Hermes OSS Fuzz project (#5579)
OSS Fuzz tends to mostly find bugs in the parser, which is mostly worked on by @avp and @Huxpro.
2021-04-05 12:43:16 -07:00
jonathanmetzman f7e3bffc6d
Delete unneeded files from cargo-fuzz install (100MB) (#5571) 2021-04-05 10:12:39 -07:00
DavidKorczynski f7e17c254d
quick-xml: initial integration (#5416)
* quick-xml: initial integration.

* Updated the quick-xml fuzz target.

* quick-xml fix project email and license
2021-04-03 20:40:40 -07:00
AdamKorcz 33a0d47a9e
Refactor tidb build (#5577) 2021-04-03 12:14:32 -07:00
wiredfool ecbb6ddcc8
Move build.sh, dictionary creation in to Pillow (#5522) 2021-04-03 09:45:42 -07:00
Fabian Meumertzheim 787cf9a08f
[jackson-dataformat-xml] Initial integration (#5551) 2021-04-02 21:59:03 -07:00
Catena cyber c36d5e90e3
Adds project tinyobjloader (#5488)
* Adds project tinyobjloader

* Remove patch as it was merged upstream

* cmake shouldn't be needed.

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2021-04-03 03:08:07 +00:00
Sebastian Rasmussen a79a3fdb5f
[mupdf] Copy fuzzer glue code to dir outside of git repo (#5504)
This makes it easier to build the fuzzer using a locally checked
out git repo without having to manually copy the fuzzer glue code
into the locally checked out git repo first.
2021-04-02 20:03:51 -07:00
Stefan Bucur 008c7ec1f5
Switch the cel-cpp project to the new Bazel build script. This reduces the build.sh file to a single line. (#5549) 2021-04-02 20:01:49 -07:00
DRC 177eaca920
[libjpeg-turbo] Remove unneeded pkg in Dockerfile (#5574)
Installing the i386 libstdc++ SDK was part of a failed effort to fix the
i386 fuzz targets.  They have been fixed in a different way.
2021-04-02 14:21:37 -07:00
DRC da812b19f2
[libjpeg-turbo] Use new fuzzers in project repo (#5537)
- Eliminate unnecessary packages from Docker image (Autotools has not
  been required since libjpeg-turbo 1.5.x.)

- Obtain seed corpora from a new Git repository maintained by The
  libjpeg-turbo Project.  (This new repo contains the old corpora from
  https://lcamtuf.coredump.cx, with duplicates removed, and some new
  corpora curated from historical libjpeg-turbo bug reports.)

- Remove build.sh.  (The libjpeg-turbo Project is now maintaining its
  own build script in order to facilitate the future creation of new
  fuzz targets.)

- Remove fuzz target source code.  (The libjpeg-turbo Project is now
  maintaining its own fuzz targets with better code coverage.)

- Update the project home page in project.yaml.

- Change the project language to C in project.yaml.  (The new fuzz
  targets are written in pure C rather than C++, since libjpeg-turbo is
  a C-only project.)
2021-04-02 11:14:06 -07:00
AdamKorcz 513bb48b42
[janet] Fix janet (#5569) 2021-04-02 14:11:32 +00:00
van Hauser 4afd7f9c55
afl++: add CTX-2 coverage option (#5567) 2021-04-02 07:02:26 -07:00
priyawadhwa 2ef6b816b9
Add config and deploy script for triage party (#5557) 2021-04-02 07:01:09 -07:00
AdamKorcz 87d392dd89
Fix (#5564) 2021-04-02 06:48:48 -07:00
DavidKorczynski 2a3b5a425e
boost: fix build. (#5565)
* boost: fix build.

* Add header to fuzzer.
2021-04-02 06:47:07 -07:00
DavidKorczynski 0441dcbf2f
envoy: optimise fuzzers (#5556)
* envoy: cleanup instrumentation.

* Added descriptions to the instrumentation.
2021-04-02 06:45:47 -07:00
Catena cyber e61f594f6b
Disables afl for dart project (#5568) 2021-04-02 06:44:29 -07:00
DavidKorczynski bec0c2f219
assimp: fix build. (#5560) 2021-04-01 16:09:32 -07:00
Fabian Meumertzheim 947169dc86
[java-example] Speculative fix for JVM segfault crashes (#5554)
The JVM uses custom SIGSEGV handlers, which leads to fuzzer crashes on
ClusterFuzz when running with ASAN likely due to the
allow_user_segv_handler=1 default on the platform.
2021-04-01 09:04:22 -07:00
DavidKorczynski a9788fca27
[kamailio] Update project.yaml (#5553)
add maintainer email
2021-04-01 09:04:08 -07:00
DavidKorczynski 65da9c7885
pillow: trying to fix build. (#5552) 2021-04-01 06:05:16 -07:00
DavidKorczynski 02cee920bc
rustls: initial integration. (#5332) 2021-03-31 18:53:11 -07:00
DavidKorczynski 17bc895ffc
kamailio: initial integration (#5279) 2021-03-31 18:52:57 -07:00
DavidKorczynski f4ce2228c7
httparse: Initial integration (#5331) 2021-03-31 18:52:34 -07:00
AdamKorcz 5ed972de75
[lotus] Fix coverage build (#5544) 2021-03-31 18:48:35 -07:00
Stefan Bucur df561687f6
Update the Bazel project integration guide to capture the new simpler tool. (#5550)
* Update the Bazel project integration guide to capture the new simpler tool.

* Update bazel.md

Co-authored-by: Abhishek Arya <inferno@chromium.org>
2021-03-31 17:46:08 -07:00
Stefan Bucur 8c1a588bef
Implement the Bazel building recipe as a stand-alone script that can be invoked from build.sh. (#5548) 2021-03-31 19:45:00 +00:00
Catena cyber 0ce158f8f2
Adds project fast-dds (#5487) 2021-03-31 09:19:59 -07:00
AdamKorcz a87a6d546b
[grpc-gateway] Fix coverage build (#5545) 2021-03-31 08:55:43 -07:00
Catena cyber e244631b16
[capnproto] Initial integration (#5202) 2021-03-31 14:52:51 +00:00
Catena cyber 73ebaeee90
[thrift] Initial integration (#5264) 2021-03-31 07:32:13 -07:00