diff --git a/projects/cfengine/project.yaml b/projects/cfengine/project.yaml index 4db793d6eac6..628473126900 100644 --- a/projects/cfengine/project.yaml +++ b/projects/cfengine/project.yaml @@ -4,6 +4,10 @@ language: c++ primary_contact: "vratislav.podzimek@northern.tech" auto_ccs: - "Adam@adalogics.com" +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer sanitizers: - address - undefined diff --git a/projects/cpython3/project.yaml b/projects/cpython3/project.yaml index 9d35b1649046..08de86bab0a8 100644 --- a/projects/cpython3/project.yaml +++ b/projects/cpython3/project.yaml @@ -5,6 +5,10 @@ main_repo: "https://github.com/python/cpython" auto_ccs: - "alex.gaynor@gmail.com" - "ammar@ammaraskar.com" +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer sanitizers: - address - memory diff --git a/projects/cras/project.yaml b/projects/cras/project.yaml index 62d3cf9b2e43..dc560420e324 100644 --- a/projects/cras/project.yaml +++ b/projects/cras/project.yaml @@ -19,5 +19,9 @@ sanitizers: - address - memory - undefined +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer builds_per_day: 4 main_repo: 'https://chromium.googlesource.com/chromiumos/third_party/adhd' diff --git a/projects/curl/project.yaml b/projects/curl/project.yaml index 71e6905a4f3c..52f49948d50e 100644 --- a/projects/curl/project.yaml +++ b/projects/curl/project.yaml @@ -8,6 +8,10 @@ sanitizers: - address - undefined - memory +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer architectures: - x86_64 - i386 diff --git a/projects/cyclonedds/project.yaml b/projects/cyclonedds/project.yaml index 704a0440a84d..8bb114a9af8b 100644 --- a/projects/cyclonedds/project.yaml +++ b/projects/cyclonedds/project.yaml @@ -3,6 +3,10 @@ language: c auto_ccs: - "federico.maggi@gmail.com" primary_contact: "eb@ilities.com" +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer sanitizers: - address - undefined diff --git a/projects/ecc-diff-fuzzer/project.yaml b/projects/ecc-diff-fuzzer/project.yaml index d88c040d2c73..bb7413709078 100644 --- a/projects/ecc-diff-fuzzer/project.yaml +++ b/projects/ecc-diff-fuzzer/project.yaml @@ -1,7 +1,11 @@ homepage: "https://github.com/catenacyber/elliptic-curve-differential-fuzzer" language: c++ primary_contact: "p.antoine@catenacyber.fr" - +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer +main_repo: https://github.com/catenacyber/elliptic-curve-differential-fuzzer architectures: - x86_64 - i386 diff --git a/projects/ffmpeg/project.yaml b/projects/ffmpeg/project.yaml index bb7747a0d52c..fe510402f4f1 100644 --- a/projects/ffmpeg/project.yaml +++ b/projects/ffmpeg/project.yaml @@ -12,5 +12,9 @@ auto_ccs: - "twsmith@mozilla.com" - "kempfjb@gmail.com" - "jordyzomer@google.com" +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer selective_unpack: true main_repo: 'https://git.ffmpeg.org/ffmpeg.git' diff --git a/projects/fluent-bit/project.yaml b/projects/fluent-bit/project.yaml index 968e23a0df1a..094ece0e950d 100755 --- a/projects/fluent-bit/project.yaml +++ b/projects/fluent-bit/project.yaml @@ -6,3 +6,7 @@ auto_ccs: - "wppttt@amazon.com" - "zh0512xx@gmail.com" main_repo: 'https://github.com/fluent/fluent-bit/' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/gdbm/build.sh b/projects/gdbm/build.sh index 3d00db473cf1..5e23fb5dd98c 100644 --- a/projects/gdbm/build.sh +++ b/projects/gdbm/build.sh @@ -23,7 +23,7 @@ make -j$(nproc) all # Build fuzzer cd fuzz $CC $CFLAGS -c -I.. -I../src -I../tools -ogdbm_fuzzer.o gdbm_fuzzer.c -$CXX $CFLAGS -ogdbm_fuzzer gdbm_fuzzer.o ../tools/libgdbmapp.a ../src/.libs/libgdbm.a $LIB_FUZZING_ENGINE +$CXX $CXXFLAGS -ogdbm_fuzzer gdbm_fuzzer.o ../tools/libgdbmapp.a ../src/.libs/libgdbm.a $LIB_FUZZING_ENGINE cp gdbm_fuzzer $OUT cp gdbm_fuzzer.rc $OUT diff --git a/projects/karchive/build.sh b/projects/karchive/build.sh index fd6eb891423f..8ca4ea1d6daf 100644 --- a/projects/karchive/build.sh +++ b/projects/karchive/build.sh @@ -60,8 +60,10 @@ make install -j$(nproc) cd $SRC cd qtbase # add the flags to Qt build too -sed -i -e "s/QMAKE_CXXFLAGS += -stdlib=libc++/QMAKE_CXXFLAGS += -stdlib=libc++ $CXXFLAGS\nQMAKE_CFLAGS += $CFLAGS/g" mkspecs/linux-clang-libc++/qmake.conf -sed -i -e "s/QMAKE_LFLAGS += -stdlib=libc++/QMAKE_LFLAGS += -stdlib=libc++ -lpthread $CXXFLAGS/g" mkspecs/linux-clang-libc++/qmake.conf +# Use ~ as sed delimiters instead of the usual "/" because C(XX)FLAGS may +# contain paths with slashes. +sed -i -e "s~QMAKE_CXXFLAGS += -stdlib=libc++~QMAKE_CXXFLAGS += -stdlib=libc++ $CXXFLAGS\nQMAKE_CFLAGS += $CFLAGS~g" mkspecs/linux-clang-libc++/qmake.conf +sed -i -e "s~QMAKE_LFLAGS += -stdlib=libc++~QMAKE_LFLAGS += -stdlib=libc++ -lpthread $CXXFLAGS~g" mkspecs/linux-clang-libc++/qmake.conf # make qmake compile faster sed -i -e "s/MAKE\")/MAKE\" -j$(nproc))/g" configure # add QT_NO_WARNING_OUTPUT to make the output a bit cleaner by not containing lots of QBuffer::seek: Invalid pos diff --git a/projects/karchive/project.yaml b/projects/karchive/project.yaml index 2318ce54070f..db73eb1cc1f9 100644 --- a/projects/karchive/project.yaml +++ b/projects/karchive/project.yaml @@ -6,4 +6,8 @@ sanitizers: # Disabled MSAN because of https://github.com/google/oss-fuzz/issues/6294 # - memory - undefined -main_repo: 'https://invent.kde.org/frameworks/karchive.git' \ No newline at end of file +main_repo: 'https://invent.kde.org/frameworks/karchive.git' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/kcodecs/build.sh b/projects/kcodecs/build.sh index a2e9a6f83e3a..ac4b136eb9d0 100644 --- a/projects/kcodecs/build.sh +++ b/projects/kcodecs/build.sh @@ -37,8 +37,10 @@ make install cd $SRC cd qtbase # add the flags to Qt build too -sed -i -e "s/QMAKE_CXXFLAGS += -stdlib=libc++/QMAKE_CXXFLAGS += -stdlib=libc++ $CXXFLAGS\nQMAKE_CFLAGS += $CFLAGS/g" mkspecs/linux-clang-libc++/qmake.conf -sed -i -e "s/QMAKE_LFLAGS += -stdlib=libc++/QMAKE_LFLAGS += -stdlib=libc++ -lpthread $CXXFLAGS/g" mkspecs/linux-clang-libc++/qmake.conf +# Use ~ as sed delimiters instead of the usual "/" because C(XX)FLAGS may +# contain paths with slashes. +sed -i -e "s~QMAKE_CXXFLAGS += -stdlib=libc++~QMAKE_CXXFLAGS += -stdlib=libc++ $CXXFLAGS\nQMAKE_CFLAGS += $CFLAGS~g" mkspecs/linux-clang-libc++/qmake.conf +sed -i -e "s~QMAKE_LFLAGS += -stdlib=libc++~QMAKE_LFLAGS += -stdlib=libc++ -lpthread $CXXFLAGS~g" mkspecs/linux-clang-libc++/qmake.conf # make qmake compile faster sed -i -e "s/MAKE\")/MAKE\" -j$(nproc))/g" configure ./configure --zlib=qt --glib=no --libpng=qt -opensource -confirm-license -static -no-opengl -no-icu -platform linux-clang-libc++ -v diff --git a/projects/kcodecs/project.yaml b/projects/kcodecs/project.yaml index b698f63205d4..5fbc728f2642 100644 --- a/projects/kcodecs/project.yaml +++ b/projects/kcodecs/project.yaml @@ -6,4 +6,8 @@ sanitizers: # Disabled MSAN because of https://github.com/google/oss-fuzz/issues/6294 # - memory - undefined -main_repo: 'https://invent.kde.org/frameworks/kcodecs.git' \ No newline at end of file +main_repo: 'https://invent.kde.org/frameworks/kcodecs.git' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/kimageformats/build.sh b/projects/kimageformats/build.sh index 62a6712aa567..943caf3335dd 100644 --- a/projects/kimageformats/build.sh +++ b/projects/kimageformats/build.sh @@ -23,7 +23,7 @@ CFLAGS="$CFLAGS -fno-sanitize=function,vptr" CXXFLAGS="$CXXFLAGS -fno-sanitize=function,vptr" autoreconf --install ./configure --disable-examples -make -j$(nproc) +make -j$(nproc) make install -j$(nproc) CFLAGS=$TMP_CFLAGS CXXFLAGS=$TMP_CXXFLAGS @@ -46,8 +46,10 @@ make install -j$(nproc) cd $SRC cd qtbase # add the flags to Qt build too -sed -i -e "s/QMAKE_CXXFLAGS += -stdlib=libc++/QMAKE_CXXFLAGS += -stdlib=libc++ $CXXFLAGS\nQMAKE_CFLAGS += $CFLAGS/g" mkspecs/linux-clang-libc++/qmake.conf -sed -i -e "s/QMAKE_LFLAGS += -stdlib=libc++/QMAKE_LFLAGS += -stdlib=libc++ -lpthread $CXXFLAGS/g" mkspecs/linux-clang-libc++/qmake.conf +# Use ~ as sed delimiters instead of the usual "/" because C(XX)FLAGS may +# contain paths with slashes. +sed -i -e "s~QMAKE_CXXFLAGS += -stdlib=libc++~QMAKE_CXXFLAGS += -stdlib=libc++ $CXXFLAGS\nQMAKE_CFLAGS += $CFLAGS~g" mkspecs/linux-clang-libc++/qmake.conf +sed -i -e "s~QMAKE_LFLAGS += -stdlib=libc++~QMAKE_LFLAGS += -stdlib=libc++ -lpthread $CXXFLAGS~g" mkspecs/linux-clang-libc++/qmake.conf # disable sanitize=vptr for harfbuzz since it compiles without rtti sed -i -e "s/TARGET = qtharfbuzz/TARGET = qtharfbuzz\nQMAKE_CXXFLAGS += -fno-sanitize=vptr/g" src/3rdparty/harfbuzz-ng/harfbuzz-ng.pro # make qmake compile faster diff --git a/projects/kimageformats/project.yaml b/projects/kimageformats/project.yaml index f9f80257ca08..9d3b82ca3983 100644 --- a/projects/kimageformats/project.yaml +++ b/projects/kimageformats/project.yaml @@ -9,3 +9,7 @@ sanitizers: main_repo: 'https://invent.kde.org/frameworks/kimageformats.git' auto_ccs: - dnovomesky@gmail.com +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/libpsl/project.yaml b/projects/libpsl/project.yaml index ea3a97919c95..f33f9e5f99d2 100644 --- a/projects/libpsl/project.yaml +++ b/projects/libpsl/project.yaml @@ -4,3 +4,7 @@ primary_contact: "rockdaboot@gmail.com" auto_ccs: - "tim.ruehsen@gmx.de" main_repo: 'https://github.com/rockdaboot/libpsl.git' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/libtorrent/project.yaml b/projects/libtorrent/project.yaml index 7fc3c834d86e..74c9766b4345 100644 --- a/projects/libtorrent/project.yaml +++ b/projects/libtorrent/project.yaml @@ -5,3 +5,7 @@ auto_ccs: - "oss-fuzz-libtorrent@pauldreik.se" - "arvid.norberg@gmail.com" main_repo: 'https://github.com/arvidn/libtorrent.git' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/libvnc/project.yaml b/projects/libvnc/project.yaml index 14182e5b44c0..cd5ff571dece 100644 --- a/projects/libvnc/project.yaml +++ b/projects/libvnc/project.yaml @@ -6,3 +6,7 @@ auto_ccs: - "info@christianbeier.net" - "christian.cb.beier@gmail.com" main_repo: 'https://github.com/LibVNC/libvncserver.git' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/lua/build.sh b/projects/lua/build.sh index 72f33c7f93c7..8b21ce1c5409 100755 --- a/projects/lua/build.sh +++ b/projects/lua/build.sh @@ -15,8 +15,10 @@ # ################################################################################ -sed "s/CFLAGS=/CFLAGS+=/g" -i $SRC/lua/makefile -sed "s/MYLDFLAGS=/MYLDFLAGS=${CFLAGS} /g" -i $SRC/lua/makefile +# Use ~ as sed delimiters instead of the usual "/" because C(XX)FLAGS may +# contain paths with slashes. +sed "s~CFLAGS=~CFLAGS+=~g" -i $SRC/lua/makefile +sed "s~MYLDFLAGS=~MYLDFLAGS=${CFLAGS} ~g" -i $SRC/lua/makefile sed "s|CC= gcc|CC= ${CC}|g" -i $SRC/lua/makefile cd $SRC/lua diff --git a/projects/lua/project.yaml b/projects/lua/project.yaml index 9a4b0dd3a5e4..5cdd14078ca0 100644 --- a/projects/lua/project.yaml +++ b/projects/lua/project.yaml @@ -5,3 +5,7 @@ auto_ccs: - "fuzz@lua.org" - "david@adalogics.com" main_repo: 'https://github.com/lua/lua' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/lxc/project.yaml b/projects/lxc/project.yaml index f19d3563af95..69820302eab1 100644 --- a/projects/lxc/project.yaml +++ b/projects/lxc/project.yaml @@ -10,3 +10,10 @@ auto_ccs: - stgraber@stgraber.org - evverx@gmail.com main_repo: "https://github.com/lxc/lxc" +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer + # - centipede + # Don't use centipede because it can't handle fuzz targets with "config" in + # the name. diff --git a/projects/net-snmp/project.yaml b/projects/net-snmp/project.yaml index 5a27e2e7cbd1..7921811e620e 100644 --- a/projects/net-snmp/project.yaml +++ b/projects/net-snmp/project.yaml @@ -8,3 +8,7 @@ auto_ccs: - "magfr@lysator.liu.se" - "david@adalogics.com" main_repo: 'git://git.code.sf.net/p/net-snmp/code' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/netcdf/project.yaml b/projects/netcdf/project.yaml index 794e5cbd2350..d81fcbe284f3 100644 --- a/projects/netcdf/project.yaml +++ b/projects/netcdf/project.yaml @@ -9,3 +9,7 @@ sanitizers: - address - undefined main_repo: 'https://github.com/Unidata/netcdf-c' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/opensc/project.yaml b/projects/opensc/project.yaml index 03360d84d678..c45b82f7e4c1 100644 --- a/projects/opensc/project.yaml +++ b/projects/opensc/project.yaml @@ -10,3 +10,7 @@ auto_ccs: - "jakuje@gmail.com" - "xhanulik@gmail.com" main_repo: 'https://github.com/OpenSC/OpenSC' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/opensips/project.yaml b/projects/opensips/project.yaml index a4e11848223b..51564cc5f7b8 100755 --- a/projects/opensips/project.yaml +++ b/projects/opensips/project.yaml @@ -8,3 +8,7 @@ auto_ccs: - "bogdan.andrei.iancu@gmail.com" - "rvlad.patrascu@gmail.com" - "razvan.crainea@gmail.com" +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/php/project.yaml b/projects/php/project.yaml index 817c31a439ae..a70046438a6e 100644 --- a/projects/php/project.yaml +++ b/projects/php/project.yaml @@ -5,6 +5,10 @@ auto_ccs: - "smalyshev@gmail.com" - "nikita.ppv@gmail.com" - "dmitrystogov@gmail.com" +fuzzing_engines: + - "afl" + - "honggfuzz" + - "libfuzzer" sanitizers: - address - undefined diff --git a/projects/pigweed/project.yaml b/projects/pigweed/project.yaml index eb598a40e4a9..6614645cc0dd 100644 --- a/projects/pigweed/project.yaml +++ b/projects/pigweed/project.yaml @@ -16,3 +16,7 @@ auto_ccs: sanitizers: - address main_repo: 'https://pigweed.googlesource.com/pigweed/pigweed' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/poppler/project.yaml b/projects/poppler/project.yaml index c12379633243..5a73b157c562 100644 --- a/projects/poppler/project.yaml +++ b/projects/poppler/project.yaml @@ -5,6 +5,10 @@ sanitizers: - address - memory - undefined +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer auto_ccs: - jonathan@titanous.com - adam.reichold@t-online.de diff --git a/projects/proftpd/project.yaml b/projects/proftpd/project.yaml index f3b5317f44bc..d850f87b9f14 100644 --- a/projects/proftpd/project.yaml +++ b/projects/proftpd/project.yaml @@ -7,3 +7,7 @@ auto_ccs: sanitizers: - address - undefined +fuzzing_engines: + - "afl" + - "honggfuzz" + - "libfuzzer" diff --git a/projects/skia/build.sh b/projects/skia/build.sh index 4b781730c5bd..aecbcf262e36 100644 --- a/projects/skia/build.sh +++ b/projects/skia/build.sh @@ -41,6 +41,8 @@ elif [ $SANITIZER == "coverage" ]; then CMAKE_SANITIZER="SWIFTSHADER_EMIT_COVERAGE" elif [ $SANITIZER == "thread" ]; then CMAKE_SANITIZER="SWIFTSHADER_UBSAN_DISABLED" +elif [ $SANITIZER == "none" ]; then + CMAKE_SANITIZER="SWIFTSHADER_UBSAN_DISABLED" else exit 1 fi diff --git a/projects/sound-open-firmware/project.yaml b/projects/sound-open-firmware/project.yaml index 5f8f889f0877..cf9e7769f9ff 100644 --- a/projects/sound-open-firmware/project.yaml +++ b/projects/sound-open-firmware/project.yaml @@ -8,4 +8,8 @@ auto_ccs: - "sathyanarayana.nujella@intel.corp-partner.google.com" - "adrian.bonislawski@intel.com" - "michal.wasko@intel.com" +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer main_repo: "https://github.com/thesofproject/sof" diff --git a/projects/spdk/build.sh b/projects/spdk/build.sh index ada493ab68e3..473780926bae 100755 --- a/projects/spdk/build.sh +++ b/projects/spdk/build.sh @@ -29,4 +29,4 @@ $CXX $CXXFLAGS -I/src/spdk -I/src/spdk/include \ $CXX $CXXFLAGS $LIB_FUZZING_ENGINE \ parse_json_fuzzer.o -o $OUT/parse_json_fuzzer \ /src/spdk/build/lib/libspdk_env_dpdk.a \ - /src/spdk/build/lib/libspdk_json.a + /src/spdk/build/lib/libspdk_json.a diff --git a/projects/spdk/project.yaml b/projects/spdk/project.yaml index 396218256efb..5cc480164c02 100644 --- a/projects/spdk/project.yaml +++ b/projects/spdk/project.yaml @@ -11,3 +11,7 @@ sanitizers: - address - undefined - memory +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/suricata/project.yaml b/projects/suricata/project.yaml index cd9e9e5c73d4..e1ad51cf194c 100644 --- a/projects/suricata/project.yaml +++ b/projects/suricata/project.yaml @@ -8,4 +8,8 @@ sanitizers: - address - memory - undefined +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer main_repo: 'https://github.com/OISF/suricata.git' diff --git a/projects/tpm2-tss/project.yaml b/projects/tpm2-tss/project.yaml index 7ac01a9679f3..3ecea0948049 100644 --- a/projects/tpm2-tss/project.yaml +++ b/projects/tpm2-tss/project.yaml @@ -4,9 +4,13 @@ primary_contact: "william.c.roberts@intel.com" auto_ccs: - "andreas.fuchs@sit.fraunhofer.de" - "tstruk@gmail.com" +fuzzing_engines: + - "afl" + - "honggfuzz" + - "libfuzzer" sanitizers: - address # Disabled MSAN because of https://github.com/google/oss-fuzz/issues/6294 # - memory - undefined -main_repo: 'https://github.com/tstruk/tpm2-tss.git' \ No newline at end of file +main_repo: 'https://github.com/tstruk/tpm2-tss.git' diff --git a/projects/utf8proc/project.yaml b/projects/utf8proc/project.yaml index c35bcea9a338..91794763de2b 100644 --- a/projects/utf8proc/project.yaml +++ b/projects/utf8proc/project.yaml @@ -6,6 +6,9 @@ auto_ccs: sanitizers: - address - memory - - undefined + - undefined main_repo: 'https://github.com/JuliaStrings/utf8proc' - +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/varnish/project.yaml b/projects/varnish/project.yaml index d25135569505..ecdc2ecbaf7b 100644 --- a/projects/varnish/project.yaml +++ b/projects/varnish/project.yaml @@ -6,3 +6,7 @@ auto_ccs: - "nils.goroll@uplex.de" - "martin@varnish-software.com" main_repo: 'https://github.com/varnishcache/varnish-cache' +fuzzing_engines: + - "afl" + - "honggfuzz" + - "libfuzzer" diff --git a/projects/vlc/project.yaml b/projects/vlc/project.yaml index 1006c84e7088..3aa97aa955c8 100644 --- a/projects/vlc/project.yaml +++ b/projects/vlc/project.yaml @@ -8,3 +8,7 @@ sanitizers: - address - undefined main_repo: 'https://github.com/videolan/vlc' +fuzzing_engines: + - afl + - honggfuzz + - libfuzzer diff --git a/projects/wget/project.yaml b/projects/wget/project.yaml index 367bda9b1fda..fb666459c973 100644 --- a/projects/wget/project.yaml +++ b/projects/wget/project.yaml @@ -5,4 +5,8 @@ auto_ccs: - "tim.ruehsen@gmx.de" - "darnir@gmail.com" - "gscrivan@redhat.com" +fuzzing_engines: + - "afl" + - "honggfuzz" + - "libfuzzer" main_repo: 'https://git.savannah.gnu.org/git/wget.git'