aboutsummaryrefslogtreecommitdiffhomepage
Commit message (Collapse)AuthorAge
* Skip coverage build in CI for non C/C++ projects. (#4075)Gravatar Abhishek Arya2020-07-06
| | | | | | | * Skip coverage build in CI for non C/C++ projects. Fixes https://github.com/google/oss-fuzz/issues/4074 * Test wasmtime.
* wasmtime: Only zip the seed corpus if it exists (#4065)Gravatar Nick Fitzgerald2020-07-06
| | | | | This will prevent build failures like https://oss-fuzz-build-logs.storage.googleapis.com/log-5a0b58fe-4a35-46d5-b4d2-221905e7d208.txt in the future.
* fixup coverage build (#4071)Gravatar asraa2020-07-06
| | | Signed-off-by: Asra Ali <asraa@google.com>
* Update the build script for project oak to disable it temporarily (#4068)Gravatar rbehjati2020-07-06
|
* Fix sentencepience build failureGravatar Abhishek Arya2020-07-06
|
* Feature addition: Individual schedulers for projects (#4066)Gravatar kabeer272020-07-06
| | | | | | | | | | This PR, integrates the new feature that allows users to specify their own schedules via project.yaml. Parameter 'schedule : value' will dictate how many times a day should the project be built, i.e if value = 2 Then project will be built twice a day starting at 6 and interval 24/2 = 12 so 6:00 and 18:00 if parameter is unavailable DEFAULT_SCHEDULE = '0 6 * * *' i.e 6:00 will be used. The cloud functions creates individual scheduler jobs for each project, with the name project_name + '-scheduler', and subscribes it to the topic 'request_build' with payload message 'project_name' which will be used by the next cloud function to request build for this project. Co-authored-by: Kabeer Seth <kabeerseth@google.com>
* [qt] Don't clone AFL (#4067)Gravatar Robert Löhning2020-07-05
| | | | Now that stable caught up with master, we can use the clone from base-builder image.
* [libspng] extract zlib to separate directory (#4064)Gravatar Randy2020-07-02
| | | | CIFuzz is overwriting $SRC/libspng after executing the Dockerfile before running build.sh which means $SRC/libspng/zlib is lost: https://github.com/randy408/libspng/runs/830380355#step:4:549
* [util-linux] move the fuzz target to the OSS-Fuzz repository (#4063)Gravatar Evgeny Vereshchagin2020-07-01
|
* [ESPv2] Attempt to fix coverage build (#4062)Gravatar Teju Nareddy2020-07-01
| | | | | | | | | | | | | | | | | | | | | Currently, coverage builds fail on step 3 with: ``` Step #3: + rsync -avLkR --include '*.h' --include '*.cc' --include '*.hpp' --include '*.cpp' --include '*.c' --include '*/' --exclude '*' /tmp /workspace/out/coverage Step #3: sending incremental file list Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_build.h" Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_dns.h" Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares.h" Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_rules.h" Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_version.h" Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/sha1.c" Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/gcm_nohw.c" Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/digests.c" ... ``` Just exclude these files. Doubt they matter to us. Ref: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23621&q=esp-v2&can=2 Signed-off-by: Teju Nareddy <nareddyt@google.com>
* [syzkaller] update go get invocation and fix the build (#3754)Gravatar Dmitry Vyukov2020-07-01
| | | | | | | | | | * syzkaller: update go get invocation The way to checkout the repo has changed. Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21994 * [syzkalle] Fix paths passed to `compile_fuzzer` function. Co-authored-by: Max Moroz <mmoroz@chromium.org>
* Add SkSVGCanvas api Fuzzer (#4061)Gravatar werdnaH2020-07-01
| | | | | | | * add svg api fuzzer * fixed build.sh Co-authored-by: Zepeng Hu <zepenghu@google.com>
* [libspng] Fetch zlib in Dockerfile (#4050)Gravatar Randy2020-07-01
| | | | | | | | | | | | | | | | | * [libspng] Fetch zlib in Dockerfile This step has been moved from the build script: https://github.com/randy408/libspng/commit/c35e509f04e46c2393a147f69e98a197f7615843 * Update Dockerfile * Update Dockerfile * dummy commit * Update Dockerfile * dummy commit * dummy commit
* Added deploy file and restructured cloud function directory (#4057)Gravatar kabeer272020-07-01
| | | | | | | | | * Adding deploy.sh and restructuring directory * Integrating review changes * Passed project id as an argument to each command Co-authored-by: Kabeer Seth <kabeerseth@google.com>
* [envoy] lower CPU more (#4056)Gravatar asraa2020-06-30
| | | | | | | | | | | | | | | | | * try Signed-off-by: Asra Ali <asraa@google.com> * fix build Signed-off-by: Asra Ali <asraa@google.com> * fix script Signed-off-by: Asra Ali <asraa@google.com> * use HOST_CPU*0.5 Signed-off-by: Asra Ali <asraa@google.com>
* [libzmq] use build script from upstream repository (#4054)Gravatar Luca Boccassi2020-06-30
| | | | | | | | | * libzmq: use build script from upstream repository In order to avoid having to send PRs every time we change something, simply maintain the build script in the upstream repository, and change build.sh to a one-line call. * libzmq: clone corpora and dictionary repository
* Revert "Don't create empty corpus archive as it wont unpack. (#3903)" (#4048)Gravatar Max Moroz2020-06-30
| | | This reverts commit cb156403e98accb71792678928d489c5070648bb.
* [oak] Temporarily disable fuzzing for project Oak (#4053)Gravatar rbehjati2020-06-30
|
* [php] Enable unserializehash fuzzer (#4049)Gravatar Nikita Popov2020-06-30
|
* [envoy] envoy build resource adjustment (#4052)Gravatar asraa2020-06-30
| | | Signed-off-by: Asra Ali <asraa@google.com>
* Fix build due to missing liblzma-devGravatar Abhishek Arya2020-06-29
|
* Fixing Dockerfile for fuzzers that use LPM (#4044)Gravatar Danny Halawi2020-06-29
| | | | | | | | | | | * fixing Dockerfile for libpng-proto * Fixing Dockerfile so the LPM for giflib works * Fixing Dockerfile so the LPM for xerces-c works * taking out unneeded installations Co-authored-by: Danny Halawi <dhalawi@google.com>
* Add sentencepiece (#4035)Gravatar Google AutoFuzz Team2020-06-29
| | | | | | | * add sentencepiece project * change the architectures * change indentations
* [qt] Move build.sh to own repository (#4042)Gravatar Robert Löhning2020-06-29
|
* Renaming infra/build/functions files (#4031)Gravatar kabeer272020-06-29
| | | | | | Renamed main.py to sync.py and test_sync.py to sync_test.py Co-authored-by: Kabeer Seth <kabeerseth@google.com>
* Monero: fix coverage, don't enable asan, add new fuzz test (#4040)Gravatar binaryFate2020-06-27
| | | Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
* Update project.yamlGravatar Abhishek Arya2020-06-26
|
* Add influxdb project for review (#4028)Gravatar pierwill2020-06-26
| | | Co-authored-by: pierwill <pierwill@users.noreply.github.com>
* Fix memory leak in libevent parse_query_fuzzerGravatar Abhishek Arya2020-06-25
|
* Added fuzzer for c-blosc2 (#3989)Gravatar Nathan Moinvaziri2020-06-25
|
* [util-linux] cover mnt_table_parse_stream (#4032)Gravatar Evgeny Vereshchagin2020-06-25
| | | | | | | | | * [util-linux] cover mnt_table_parse_stream Waiting for https://github.com/karelzak/util-linux/pull/1068 * temporarily point OSS-Fuzz to evverx/util-linux * make sure it can be built with sanitizer=coverage
* E2fsprogs integration (#4006)Gravatar Ravi Jotwani2020-06-25
| | | | | | | | | | | | | | | | | | | * added draco integration files * wrote build file and Dockerfile for Draco * split security-research-pocs fuzzer into four * added project build to build.sh * added more fuzzers * fixed sanitizer flags * removed commented code, combined fuzzers, fized build script * changed to singular filenames, converted usage of random int to enum, changed buffer name, and fixed build script * placed test files in memory instead of on disk, added asserts
* Cloud function for syncing OSS-Fuzz projects (#3538). (#4023)Gravatar kabeer272020-06-25
| | | | | Integrating the first cloud function i implemented which syncs the project list from github and uploads the list to cloud datastore, which will be used by another cloud function to request builds. Co-authored-by: Kabeer Seth <kabeerseth@google.com>
* Draco: add more emails (#4030)Gravatar FrankGalligan2020-06-24
| | | | | * Draco: add more emails * Fix name mistake
* [HAProxy] Added two new contacts for HAProxy fuzzing. (#4029)Gravatar DavidKorczynski2020-06-24
|
* [libxml2] Two new fuzz targets (#4022)Gravatar Nick Wellnhofer2020-06-24
| | | | | | | | | * [libxml2] Two new fuzz targets Enable HTML and XML Schema fuzzers. * [libxml2] Compile missing source files * [libxml2] Don't forget to build seed corpora
* [zetasql] Initial onboarding of ZetaSQL (#4010)Gravatar Zhengdai Hu2020-06-24
| | | | | | | | | | | | | * Add initial onboarding scripts of ZetaSQL for review * Checkout fuzz target from simple_fuzzer branch * Enable code coverage report * Enable only ASAN and MSAN * Fixed broken tzdata symlink * Switch to master branch
* Updated settings in project yaml so bugs are freely visible. (#4024)Gravatar DavidKorczynski2020-06-23
|
* Draco fuzz coverage (#3980)Gravatar Ravi Jotwani2020-06-23
| | | | | | | | | | | | | | | | | | | | | | | * added draco integration files * wrote build file and Dockerfile for Draco * added Apache 2 license header * changed project maintainer, cleaned up draco_decoder_fuzzer, and set working directory in Dockerfile * added a couple of fuzzers * two more targets * merged from upstream * build point cloud encoding fuzzer, renamed quantization fuzzers * added more fuzzers * moved fuzzers and build script to https://github.com/google/draco, made the build script here execute the new one Co-authored-by: Ravi Jotwani <rjotwani@google.com>
* Yuquanw branch (#4019)Gravatar Yuquan Wang2020-06-22
| | | | | | | | | * Adding auto-cc to project usrsctp * Improving fuzzing coverage * Remove experimental dataflow sanitizer Co-authored-by: Yuquan Wang <yuquanw@google.com>
* Updated c-blosc to use fuzzers in c-blosc repository. (#4018)Gravatar Nathan Moinvaziri2020-06-22
| | | Use compat files for seed corpus with new decompress_fuzzer.
* Updated rust_lang.md (#4017)Gravatar Shivam7-12020-06-22
|
* Update project.yamlGravatar Abhishek Arya2020-06-22
|
* [Haproxy] Simplify build script and update to latest code (#4000)Gravatar DavidKorczynski2020-06-22
| | | | | * Updated hpack to work with new build. * Required minimium length.
* QEMU: Add fuzz target build scripts (#3935)Gravatar alex2020-06-21
| | | | | | | | | | | | | | * QEMU: Add fuzz target build scripts Signed-off-by: Alexander Bulekov <alxndr@bu.edu> * QEMU: Disable AFL and MSan in project.yaml We can't link against OSS-Fuzz' afl driver as it is not compiled with -fPIC. Additionally, it appears that we trigger some false-positives with MemorySanitizer, since we don't instrument all of the libraries. Disable AFL and MemorySanitizer, for now. Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
* [skia] Remove Options Files with Only max_len Flag (#3987)Gravatar werdnaH2020-06-21
| | | | | | | | | | | | | | | * [skia] add svg fuzzer * [skia] removed options file * [skia] removed options file * [skia] removed all options files with only max_len * delete options * fixed cp statements Co-authored-by: Zepeng Hu <zepenghu@google.com>
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives (#4007)Gravatar Felicia Lim2020-06-21
| | | | | | | | | | * [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives Without this, a silk_memcpy call could resolve to __memcpy_chk, which does not have an msan intercept, leading to false use-of-uninitialized-value errors. * [opus] Consolidate cflags * [opus] Fix typo
* Updated reproducing.md (#4013)Gravatar Shivam7-12020-06-20
|
* Updated continuous_integration.md (#4014)Gravatar Shivam7-12020-06-20
|
* [qt] Test qtsvg (#4012)Gravatar Robert Löhning2020-06-19
|