* remove fetching seeds from my corpus, fetch instead from src repo
* conditionally zip up fuzzer seed corpora for any fuzzer passed in
* Simplify build steps
We already know that the fuzzers are being iterated over due to the loop
and globbing. As such, we can use more of the fuzzer name and reduce
repetition. This should allow us to add fuzzers/corpora to the src repo
and no need to change anything about the build script or dockerfile
The Wuffs project handles multiple file formats, such as GIF and ZLIB
decoders. Prior to this commit, the format name and the file extension
were the same (case-insensitive) string: fuzz-testing the GIF format was
seeded with test files matching "*.gif", and "*.gif" was trivially
derived from the "gif_fuzzer.cc" file name.
For the GZIP file format, the conventional file extension is ".gz", not
".gzip". For the JPEG file format, both ".jpeg" and ".jpg" are widely
used. Building the seed corpus for future Wuffs codecs might require
mapping from the file format name to arbitrary file extensions.
Wuffs' fuzz/c/std/seed_corpora.txt file (added in
https://github.com/google/wuffs/commit/b6cc2d5e) provides that mapping.
This commit updates OSS-Fuzz's projects/wuffs/build.sh to use it.
* [infra] Enable bad build checks once again.
* Minor typo.
* [bad_example] Update build flags for reproducing bad instrumentation scenario.
* [bad_example] split bad/no instrumentation case into two different ones.
* Use new approach for partial instrumentation detection + do that only for libFuzzer.
* Rename bad_example_bad_instrumentation into bad_example_partial_instrumentation.
* Calculate number of broken targets and fail if 10+% are broken.
* Multiprocess madness.
* Always run all checks and store all errors + clean up the code and add comments
* Add special handling for the projects with very small fuzz targets.
* Remove unnecessary semicolon.
* Address review comments.
* Address more review comments, small refactoring.
curl-fuzzer would like to use a script to define the dependencies
downloaded as part of oss-fuzz image generation, so that only one
repository needs updating in order to get future fuzzing builds running.
* Initial infrastructure for net-snmp in the AutoFuzz project
* Add a fuzzer based on what Google sent us
Storing this here until we have a more complete design
for storing fuzzers in the net-snmp source tree.
* calloc PDU so we can use the standard pdu free, to avoid false leaks
* Only turn on debugging when $NETSNMP_DEBUGGING is set in the environment
The debugging is useful to help replicate the problem, but
not useful when simply running the fuzzer, so let the user
choose it by settng $NETSNMP_DEBUGGING in their environment
when running the replication.
* Add agentx_parse_fuzzer
* Build agentx_parse_fuzzer
* Add copyright notice, copy boilerplate from init
* Don't make a copy, just pass the data in directly.
(Also, don't use C++-style comment, the regression test
in the net-snmp codebase will be C.)