| Commit message (Collapse) | Author | Age |
|
|
|
|
|
|
| |
* Skip coverage build in CI for non C/C++ projects.
Fixes https://github.com/google/oss-fuzz/issues/4074
* Test wasmtime.
|
|
|
|
|
| |
This will prevent build failures like
https://oss-fuzz-build-logs.storage.googleapis.com/log-5a0b58fe-4a35-46d5-b4d2-221905e7d208.txt
in the future.
|
|
|
| |
Signed-off-by: Asra Ali <asraa@google.com>
|
| |
|
| |
|
|
|
|
| |
Now that stable caught up with master, we
can use the clone from base-builder image.
|
|
|
|
| |
CIFuzz is overwriting $SRC/libspng after executing the Dockerfile before running build.sh which means $SRC/libspng/zlib is lost:
https://github.com/randy408/libspng/runs/830380355#step:4:549
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Currently, coverage builds fail on step 3 with:
```
Step #3: + rsync -avLkR --include '*.h' --include '*.cc' --include '*.hpp' --include '*.cpp' --include '*.c' --include '*/' --exclude '*' /tmp /workspace/out/coverage
Step #3: sending incremental file list
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_build.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_dns.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_rules.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/ares/include/ares_version.h"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/sha1.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/gcm_nohw.c"
Step #3: symlink has no referent: "/tmp/tmp.BOH6TAB62E/include/digests.c"
...
```
Just exclude these files. Doubt they matter to us.
Ref: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23621&q=esp-v2&can=2
Signed-off-by: Teju Nareddy <nareddyt@google.com>
|
|
|
|
|
|
|
|
|
|
| |
* syzkaller: update go get invocation
The way to checkout the repo has changed.
Fixes: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21994
* [syzkalle] Fix paths passed to `compile_fuzzer` function.
Co-authored-by: Max Moroz <mmoroz@chromium.org>
|
|
|
|
|
|
|
| |
* add svg api fuzzer
* fixed build.sh
Co-authored-by: Zepeng Hu <zepenghu@google.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* [libspng] Fetch zlib in Dockerfile
This step has been moved from the build script: https://github.com/randy408/libspng/commit/c35e509f04e46c2393a147f69e98a197f7615843
* Update Dockerfile
* Update Dockerfile
* dummy commit
* Update Dockerfile
* dummy commit
* dummy commit
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* try
Signed-off-by: Asra Ali <asraa@google.com>
* fix build
Signed-off-by: Asra Ali <asraa@google.com>
* fix script
Signed-off-by: Asra Ali <asraa@google.com>
* use HOST_CPU*0.5
Signed-off-by: Asra Ali <asraa@google.com>
|
|
|
|
|
|
|
|
|
| |
* libzmq: use build script from upstream repository
In order to avoid having to send PRs every time we change something, simply
maintain the build script in the upstream repository, and change build.sh
to a one-line call.
* libzmq: clone corpora and dictionary repository
|
| |
|
| |
|
|
|
| |
Signed-off-by: Asra Ali <asraa@google.com>
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
* fixing Dockerfile for libpng-proto
* Fixing Dockerfile so the LPM for giflib works
* Fixing Dockerfile so the LPM for xerces-c works
* taking out unneeded installations
Co-authored-by: Danny Halawi <dhalawi@google.com>
|
|
|
|
|
|
|
| |
* add sentencepiece project
* change the architectures
* change indentations
|
| |
|
|
|
| |
Co-authored-by: binaryFate <binaryfate@users.noreply.github.com>
|
| |
|
|
|
| |
Co-authored-by: pierwill <pierwill@users.noreply.github.com>
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
* [util-linux] cover mnt_table_parse_stream
Waiting for https://github.com/karelzak/util-linux/pull/1068
* temporarily point OSS-Fuzz to evverx/util-linux
* make sure it can be built with sanitizer=coverage
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* added draco integration files
* wrote build file and Dockerfile for Draco
* split security-research-pocs fuzzer into four
* added project build to build.sh
* added more fuzzers
* fixed sanitizer flags
* removed commented code, combined fuzzers, fized build script
* changed to singular filenames, converted usage of random int to enum, changed buffer name, and fixed build script
* placed test files in memory instead of on disk, added asserts
|
|
|
|
|
| |
* Draco: add more emails
* Fix name mistake
|
| |
|
|
|
|
|
|
|
|
|
| |
* [libxml2] Two new fuzz targets
Enable HTML and XML Schema fuzzers.
* [libxml2] Compile missing source files
* [libxml2] Don't forget to build seed corpora
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Add initial onboarding scripts of ZetaSQL for review
* Checkout fuzz target from simple_fuzzer branch
* Enable code coverage report
* Enable only ASAN and MSAN
* Fixed broken tzdata symlink
* Switch to master branch
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* added draco integration files
* wrote build file and Dockerfile for Draco
* added Apache 2 license header
* changed project maintainer, cleaned up draco_decoder_fuzzer, and set working directory in Dockerfile
* added a couple of fuzzers
* two more targets
* merged from upstream
* build point cloud encoding fuzzer, renamed quantization fuzzers
* added more fuzzers
* moved fuzzers and build script to https://github.com/google/draco, made the build script here execute the new one
Co-authored-by: Ravi Jotwani <rjotwani@google.com>
|
|
|
|
|
|
|
|
|
| |
* Adding auto-cc to project usrsctp
* Improving fuzzing coverage
* Remove experimental dataflow sanitizer
Co-authored-by: Yuquan Wang <yuquanw@google.com>
|
|
|
| |
Use compat files for seed corpus with new decompress_fuzzer.
|
| |
|
|
|
|
|
| |
* Updated hpack to work with new build.
* Required minimium length.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* QEMU: Add fuzz target build scripts
Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
* QEMU: Disable AFL and MSan in project.yaml
We can't link against OSS-Fuzz' afl driver as it is not compiled with
-fPIC. Additionally, it appears that we trigger some false-positives
with MemorySanitizer, since we don't instrument all of the libraries.
Disable AFL and MemorySanitizer, for now.
Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* [skia] add svg fuzzer
* [skia] removed options file
* [skia] removed options file
* [skia] removed all options files with only max_len
* delete options
* fixed cp statements
Co-authored-by: Zepeng Hu <zepenghu@google.com>
|
|
|
|
|
|
|
|
|
|
| |
* [opus] Build with -D_FORTIFY_SOURCE=0 to avoid msan false positives
Without this, a silk_memcpy call could resolve to __memcpy_chk,
which does not have an msan intercept, leading to false use-of-uninitialized-value errors.
* [opus] Consolidate cflags
* [opus] Fix typo
|
| |
|
|
|
| |
Signed-off-by: Asra Ali <asraa@google.com>
|
| |
|
|
|
|
|
| |
The other builds were moved to Ninja, this one needs to be as well.
Bug: oss-fuzz:23438
|
|
|
|
|
|
|
|
|
|
|
| |
* Link against `libc++` with proper config in `.bazelrc`
* Add support for `undefined` build, link against proper `clang_rt` library
* Don't rsync in verbose mode.
* Support `undefined` and `memory` sanitizers
* Support more fuzzers than just `libfuzzer`.
|
| |
|
|
|
| |
Co-authored-by: Yuquan Wang <yuquanw@google.com>
|
|
|
|
|
| |
The oss-fuzz documentation states that listing supported sanitizers in a project's yaml [is optional](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#sanitizers). It appears that CIFuzz requires supported sanitizers to be included in this file ([ref](https://github.com/google/oss-fuzz/blob/26e8d7c7728096edf55a1fb6d0ecbc4b2dae6afa/infra/cifuzz/cifuzz.py#L508-L529)). I believe this causes the CIFuzz Github Action to fail for projects that have not listed support for address sanitizer explicitly in their respective project YAML.
This PR explicitly defines support for asan and ubsan with a goal of fixing h2o's CIFuzz build
|
|
|
|
|
| |
* Added Corpus and Dictionary for lodepng Library
* Added Dict download link in DockerFile for lodepng
|