author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20 values | license stringclasses 3 values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
258,388 | 01.03.2020 12:47:47 | 28,800 | 5475cee562344e93905e8a26183428dd08367f09 | Rename running-your-own-experiment.md to running_your_own_experiment.md
Do this for consistency.
* Don't set two pages as first.
* Fix spelling and don't duplicate order again | [
{
"change_type": "MODIFY",
"old_path": "docs/developing-fuzzbench/custom_analysis_and_reports.md",
"new_path": "docs/developing-fuzzbench/custom_analysis_and_reports.md",
"diff": "layout: default\ntitle: Custom analysis and reports\nparent: Developing FuzzBench\n-nav_order: 1\n+nav_order: 2\npermali... | Python | Apache License 2.0 | google/fuzzbench | Rename running-your-own-experiment.md to running_your_own_experiment.md (#28)
Do this for consistency.
* Don't set two pages as first.
* Fix spelling and don't duplicate order again |
258,388 | 02.03.2020 08:44:13 | 28,800 | cf1cd40294f8a31c14eb10bab4e6f6446bfeab92 | [docs] Add doc on how FuzzBench works. | [
{
"change_type": "ADD",
"old_path": "docs/images/FuzzBench-architecture.png",
"new_path": "docs/images/FuzzBench-architecture.png",
"diff": "Binary files /dev/null and b/docs/images/FuzzBench-architecture.png differ\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "docs/re... | Python | Apache License 2.0 | google/fuzzbench | [docs] Add doc on how FuzzBench works. (#32) |
258,388 | 02.03.2020 09:27:07 | 28,800 | 1bb0f18f22a978791ee52c812cf295c9f4c7a7a9 | [docs] Always call it 'sample' report for consistency | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -20,14 +20,14 @@ To participate, submit your fuzzer to run on the FuzzBench platform by following\nhttps://google.github.io/fuzzbench/getting-started/).\nAfter your integration is accepted, we will run a large-s... | Python | Apache License 2.0 | google/fuzzbench | [docs] Always call it 'sample' report for consistency (#34) |
258,388 | 02.03.2020 11:42:59 | 28,800 | 384b63e03479aa0568471a5af461fe6bb50bd675 | Add blogpost link | [
{
"change_type": "MODIFY",
"old_path": "docs/reference/useful_links.md",
"new_path": "docs/reference/useful_links.md",
"diff": "@@ -19,4 +19,8 @@ access them [here](https://www.fuzzbench.com/reports/index.html).\n## Blog posts\n-TODO: Add link to launch blog post.\n+Announcement blog post:\n+\n+[htt... | Python | Apache License 2.0 | google/fuzzbench | Add blogpost link (#37) |
258,390 | 03.03.2020 18:22:01 | -3,600 | 26c788c927d980c28e2e3e2cdc9af24b1260bb74 | Update honggfuzz to
It'll allow the systemd target to be fully-instrumented.
This honggfuzz version was tested locally/manually with systemd
and with lcms fuzzers from the fuzzbench project.
Closes | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -18,10 +18,10 @@ FROM $parent_image\n# honggfuzz requires libfd and libunwid.\nRUN apt-get update -y && apt-get install -y libbfd-dev libunwind-dev libblocks... | Python | Apache License 2.0 | google/fuzzbench | Update honggfuzz to 77ea4dc4b499799e20ba33ef5df0152ecd113925. (#49)
It'll allow the systemd target to be fully-instrumented.
This honggfuzz version was tested locally/manually with systemd
and with lcms fuzzers from the fuzzbench project.
Closes #47 |
258,388 | 04.03.2020 09:02:17 | 28,800 | 2b68547981d3f049fc6ec9c6ca84ebb7b4b122ca | Warn users if presubmit fails because it is on a new repo. | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/prerequisites.md",
"new_path": "docs/getting-started/prerequisites.md",
"diff": "@@ -24,6 +24,7 @@ Clone the FuzzBench repository to your machine by running the following command:\ngit clone https://github.com/google/fuzzbench\ncd fuzzbenc... | Python | Apache License 2.0 | google/fuzzbench | Warn users if presubmit fails because it is on a new repo. (#60) |
258,388 | 04.03.2020 09:02:43 | 28,800 | 4e33e4e05782d5f2f5e9e49c17b875c7436b2595 | Run presubmit seperately | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -3,6 +3,18 @@ name: CI\non: [pull_request]\njobs:\n+ presubmit:\n+ runs-on: ubuntu-latest\n+ steps:\n+ - uses: actions/checkout@v2\n+ - name: Setup Python environment\n+ uses: actio... | Python | Apache License 2.0 | google/fuzzbench | Run presubmit seperately (#58) |
258,388 | 04.03.2020 18:23:27 | 28,800 | de03b5887cfaf6507f10bca8f757b22a7d099cf6 | [new_process] Use get instead of get_nowait to avoid hogging CPU. | [
{
"change_type": "MODIFY",
"old_path": "common/new_process.py",
"new_path": "common/new_process.py",
"diff": "@@ -26,6 +26,7 @@ from typing import List, Tuple\nfrom common import logs\nLOG_LIMIT_FIELD = 10 * 1024 # 10 KB.\n+WAIT_SECONDS = 5\ndef _enqueue_file_lines(process: subprocess.Popen,\n@@ -71... | Python | Apache License 2.0 | google/fuzzbench | [new_process] Use get instead of get_nowait to avoid hogging CPU. (#65) |
258,388 | 05.03.2020 08:29:05 | 28,800 | b40f67b9fd315ba94fa0a2250ec2740e626f87d6 | [base-builder] Copy llvm tools as well
Copy llvm tools from the OSS-Fuzz clang installation.
This should evenutally be replaced by building clang in the image instead of copying from another image. | [
{
"change_type": "MODIFY",
"old_path": "docker/base-builder/Dockerfile",
"new_path": "docker/base-builder/Dockerfile",
"diff": "@@ -46,6 +46,7 @@ RUN apt-get update -y && apt-get install -y \\\n# Copy clang binaries and libs.\nCOPY --from=base-clang /usr/local/bin/clang* /usr/local/bin/\n+COPY --fro... | Python | Apache License 2.0 | google/fuzzbench | [base-builder] Copy llvm tools as well (#61)
Copy llvm tools from the OSS-Fuzz clang installation.
This should evenutally be replaced by building clang in the image instead of copying from another image. |
258,388 | 05.03.2020 09:16:58 | 28,800 | 48974e05283ac652377f0fcd128ed1d972ff979d | [CI] Only build fuzzer images when necessary
Only build them when there has been a change that affects them. | [
{
"change_type": "RENAME",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "-name: CI\n-\n-on: [pull_request]\n+name: Build fuzzers\n+on:\n+ pull_request:\n+ paths:\n+ - 'docker/**' # Base images changes.\n+ - 'fuzzers/**' # Changes to fuzzers themselves.... | Python | Apache License 2.0 | google/fuzzbench | [CI] Only build fuzzer images when necessary (#68)
Only build them when there has been a change that affects them. |
258,388 | 05.03.2020 16:44:02 | 28,800 | 3d48d1122637fe5cc11a50fc581942f53be01cc5 | [aflplusplus] Use afl-clang-fast(++) as compiler
Use afl-clang-fast(++) as compiler instead of clang with
trace-pc-guard for faster and better instrumentation. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/aflplusplus/builder.Dockerfile",
"new_path": "fuzzers/aflplusplus/builder.Dockerfile",
"diff": "ARG parent_image=gcr.io/fuzzbench/base-builder\nFROM $parent_image\n+# Install wget to download afl_driver.cpp. Install libstdc++ to use llvm_mode.\n+RUN ap... | Python | Apache License 2.0 | google/fuzzbench | [aflplusplus] Use afl-clang-fast(++) as compiler (#69)
Use afl-clang-fast(++) as compiler instead of clang with
trace-pc-guard for faster and better instrumentation. |
258,388 | 09.03.2020 09:37:05 | 25,200 | 5dbb50e9bb8a6fb3584f25f26fb88bebea02d699 | [reports] Add label-by-experiment name to generate_report.py
This makes it easier to determine how a fuzzer has progressed over the course of multiple
experiments. | [
{
"change_type": "MODIFY",
"old_path": "experiment/generate_report.py",
"new_path": "experiment/generate_report.py",
"diff": "@@ -33,17 +33,17 @@ def get_arg_parser():\nparser.add_argument('experiment', nargs='+', help='Experiment name')\nparser.add_argument(\n'-n',\n- '--report_name',\n+ '--report-... | Python | Apache License 2.0 | google/fuzzbench | [reports] Add label-by-experiment name to generate_report.py (#62)
This makes it easier to determine how a fuzzer has progressed over the course of multiple
experiments. |
258,388 | 09.03.2020 14:01:38 | 25,200 | 2db4efc668f23a5dde4ae10de30998af19cf739e | [generate_report] Support fuzzer selection with -f option
[generate_report] Support fuzzer selection with -f option
Allow users of generate_report to specify the fuzzers they want
included in a report using `--fuzzers` (`-f` for short). | [
{
"change_type": "MODIFY",
"old_path": "experiment/generate_report.py",
"new_path": "experiment/generate_report.py",
"diff": "@@ -30,7 +30,7 @@ from common import logs\ndef get_arg_parser():\n\"\"\"Returns argument parser.\"\"\"\nparser = argparse.ArgumentParser(description='Report generator.')\n- p... | Python | Apache License 2.0 | google/fuzzbench | [generate_report] Support fuzzer selection with -f option (#80)
[generate_report] Support fuzzer selection with -f option
Allow users of generate_report to specify the fuzzers they want
included in a report using `--fuzzers` (`-f` for short). |
258,390 | 10.03.2020 15:15:52 | -3,600 | 9184199334f8a457dfbf67aa99c03c5dbaf73317 | Update honggfuzz to the newest version | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -18,14 +18,14 @@ FROM $parent_image\n# honggfuzz requires libfd and libunwid.\nRUN apt-get update -y && apt-get install -y libbfd-dev libunwind-dev libblocks... | Python | Apache License 2.0 | google/fuzzbench | Update honggfuzz to the newest version (#87) |
258,388 | 10.03.2020 10:07:37 | 25,200 | 2f1e4f6230b279920cac512f96c080721f685b5b | [run_experiment] Use all benchmarks if no benchmarks arg provided
Use all benchmarks if no benchmarks arg provided | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -103,15 +103,6 @@ def get_directories(parent_dir):\ndef validate_benchmarks(benchmarks: List[str]):\n\"\"\"Parses and validates list of benchmarks.\"\"\"\n- benchmark_direct... | Python | Apache License 2.0 | google/fuzzbench | [run_experiment] Use all benchmarks if no benchmarks arg provided (#88)
Use all benchmarks if no benchmarks arg provided |
258,388 | 10.03.2020 10:09:22 | 25,200 | 0893d76b8073f810d25101ae755a4012f692ae89 | [generate_report] Support benchmark selection with -b option | [
{
"change_type": "MODIFY",
"old_path": "analysis/data_utils.py",
"new_path": "analysis/data_utils.py",
"diff": "@@ -29,10 +29,16 @@ def drop_uninteresting_columns(experiment_df):\ndef filter_fuzzers(experiment_df, included_fuzzers):\n- \"\"\"Returns table with only rows where fuzzer in in |included_... | Python | Apache License 2.0 | google/fuzzbench | [generate_report] Support benchmark selection with -b option (#89) |
258,406 | 11.03.2020 22:58:17 | -32,400 | 94de19293d44bfe97482b619e619d62d090b176a | Update Eclipser to use commit
Resolves Eclipser's mishandling of initial seed corpus.
Makes Eclipser to use edge coverage instead of node coverage.
Cleanup and configuration update. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/eclipser/runner.Dockerfile",
"new_path": "fuzzers/eclipser/runner.Dockerfile",
"diff": "@@ -37,5 +37,5 @@ RUN wget -q https://packages.microsoft.com/config/ubuntu/16.04/packages-microsof\n# Build Eclipser.\nRUN git clone https://github.com/SoftSec-KAIS... | Python | Apache License 2.0 | google/fuzzbench | Update Eclipser to use commit b072f045 (#92)
- Resolves Eclipser's mishandling of initial seed corpus.
- Makes Eclipser to use edge coverage instead of node coverage.
- Cleanup and configuration update. |
258,376 | 12.03.2020 04:19:50 | -39,600 | a65fe98fc63adc0b24c599c582234179c32e0eae | [AFLSmart] Add AFLSmart structure-aware greybox fuzzer
Add AFLSmart structure-aware greybox fuzzer | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -16,6 +16,7 @@ jobs:\n- afl\n- aflfast\n- aflplusplus\n+ - aflsmart\n- eclipser\n- entropic\n- fairfuzz\n"
},
{
"change_type": "ADD",
"old_path": null,
"ne... | Python | Apache License 2.0 | google/fuzzbench | [AFLSmart] Add AFLSmart structure-aware greybox fuzzer (#84)
Add AFLSmart structure-aware greybox fuzzer |
258,388 | 11.03.2020 12:21:50 | 25,200 | 81f0e681de1afeff24abb592b9d8a45182ada4e0 | [aflsmart] Format | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/aflsmart/fuzzer.py",
"new_path": "fuzzers/aflsmart/fuzzer.py",
"diff": "@@ -27,13 +27,15 @@ def build():\nafl_fuzzer.build()\n# Copy Peach binaries to OUT\n- shutil.copytree('/afl/peach-3.0.202-source/output/linux_x86_64_debug/bin', os.environ['OUT'] +... | Python | Apache License 2.0 | google/fuzzbench | [aflsmart] Format (#96) |
258,388 | 11.03.2020 15:09:31 | 25,200 | cfe54c171652e2c8dc5f84b535666cf9cb9d0b13 | [docs] Fix links in setting_up_a_google_cloud_project.md | [
{
"change_type": "MODIFY",
"old_path": "docs/running-your-own-experiment/setting_up_a_google_cloud_project.md",
"new_path": "docs/running-your-own-experiment/setting_up_a_google_cloud_project.md",
"diff": "@@ -38,7 +38,7 @@ export PROJECT_NAME=<your-project-name>\nFor the rest of this page, replace ... | Python | Apache License 2.0 | google/fuzzbench | [docs] Fix links in setting_up_a_google_cloud_project.md (#100) |
258,388 | 11.03.2020 15:41:22 | 25,200 | 3b0452d6c59eceeb3f26393edfc9bcf0cc937c65 | [aflplusplus] Use COMPAT_CFLAGS and fix comments and formatting. | [
{
"change_type": "MODIFY",
"old_path": "docker/base-builder/Dockerfile",
"new_path": "docker/base-builder/Dockerfile",
"diff": "@@ -52,4 +52,4 @@ COPY --from=base-clang /usr/local/lib/libc++*.a /usr/local/lib/\nCOPY --from=base-clang /usr/local/include/ /usr/local/include\n# Use libc++ thoughout the... | Python | Apache License 2.0 | google/fuzzbench | [aflplusplus] Use COMPAT_CFLAGS and fix comments and formatting. (#99) |
258,388 | 11.03.2020 16:36:54 | 25,200 | 309c69bbfaf671b5198467d5d20dd880c23b9b1b | [run_experiment] Use all fuzzers if fuzzers+fuzzer_configs not provided | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -169,10 +169,6 @@ def start_experiment(experiment_name: str, config_filename: str,\nwith open(experiment_config_filename, 'w') as experiment_config_file:\nyaml.dump(config, ... | Python | Apache License 2.0 | google/fuzzbench | [run_experiment] Use all fuzzers if fuzzers+fuzzer_configs not provided (#101) |
258,388 | 11.03.2020 18:50:25 | 25,200 | a96560010456c066e5f9e18de53dbb9334d005ed | Move restore_directory into utils so other modules can use it. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/aflplusplus/fuzzer.py",
"new_path": "fuzzers/aflplusplus/fuzzer.py",
"diff": "import os\nimport shutil\n-import contextlib\n-import tempfile\nfrom fuzzers.afl import fuzzer as afl_fuzzer\nfrom fuzzers import utils\n@@ -72,7 +70,7 @@ def build():\nsrc =... | Python | Apache License 2.0 | google/fuzzbench | Move restore_directory into utils so other modules can use it. (#98) |
258,388 | 15.03.2020 16:10:03 | 25,200 | eb2496473ea0fa0d0ad15d519b94129898128c81 | Make presubmit work for new repos and fix lint/format/type checking in CI | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/presubmit.yml",
"new_path": ".github/workflows/presubmit.yml",
"diff": "@@ -7,6 +7,9 @@ jobs:\nruns-on: ubuntu-latest\nsteps:\n- uses: actions/checkout@v2\n+ - run: | # Needed for presubmit to work.\n+ git fetch origin master --depth 1\n+ git... | Python | Apache License 2.0 | google/fuzzbench | Make presubmit work for new repos and fix lint/format/type checking in CI (#97) |
258,387 | 15.03.2020 22:45:39 | 14,400 | 5a6b36fb42cc87b8bb24c4631516856778cb6cf8 | [fastcgs] Add a new experimental fuzzer named fastcgs | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -20,6 +20,7 @@ jobs:\n- eclipser\n- entropic\n- fairfuzz\n+ - fastcgs\n- honggfuzz\n- libfuzzer\n- mopt\n"
},
{
"change_type": "ADD",
"old_path": null,
"ne... | Python | Apache License 2.0 | google/fuzzbench | [fastcgs] Add a new experimental fuzzer named fastcgs (#78) |
258,388 | 15.03.2020 21:41:00 | 25,200 | ac642951a9ad7a039d51f66f1ec96e151067860c | [presubmit] Remove unnecessary git diff invocation
Remove unnecessary git diff invocation that was accidentally
left out of previous commit. | [
{
"change_type": "MODIFY",
"old_path": "presubmit.py",
"new_path": "presubmit.py",
"diff": "@@ -260,19 +260,15 @@ def license_check(paths: List[Path]) -> bool:\ndef get_changed_files() -> List[Path]:\n\"\"\"Return a list of absolute paths of files changed in this git branch.\"\"\"\n- uncommitted_dif... | Python | Apache License 2.0 | google/fuzzbench | [presubmit] Remove unnecessary git diff invocation (#103)
Remove unnecessary git diff invocation that was accidentally
left out of previous commit. |
258,388 | 16.03.2020 14:46:29 | 25,200 | c431056e0d0b3df9e74f84c1ec935cc6c190ff15 | Move code out of try-except to prevent UnboundLocalError
Move code out of try-except to prevent UnboundLocalError | [
{
"change_type": "MODIFY",
"old_path": "analysis/plotting.py",
"new_path": "analysis/plotting.py",
"diff": "@@ -313,11 +313,10 @@ class Plotter:\ncritical_difference = Orange.evaluation.compute_CD(\naverage_ranks.values, num_of_benchmarks)\n- try:\n- Orange.evaluation.graph_ranks(average_ranks.value... | Python | Apache License 2.0 | google/fuzzbench | Move code out of try-except to prevent UnboundLocalError (#109)
Move code out of try-except to prevent UnboundLocalError |
258,376 | 18.03.2020 05:34:52 | -39,600 | f8a26aa72b0240b8783220b7b4ee8cbfbdd03b2f | Update experiment summary text
Also, add README.md for AFLSmart | [
{
"change_type": "MODIFY",
"old_path": "analysis/report_templates/default.html",
"new_path": "analysis/report_templates/default.html",
"diff": "Aggregate critical difference diagram showing average ranks when\nranking fuzzers on each benchmark according to their median reached\ncoverages. Critical d... | Python | Apache License 2.0 | google/fuzzbench | Update experiment summary text (#121)
Also, add README.md for AFLSmart
Co-authored-by: Abhishek Arya <inferno@chromium.org> |
258,388 | 18.03.2020 08:38:50 | 25,200 | 8d9375d51f8cdd9d398c9b34e13e50b9a70f337e | [aflplusplus_mopt] add afl++ mopt variant
PR with some minor nits fixed | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -16,6 +16,7 @@ jobs:\n- afl\n- aflfast\n- aflplusplus\n+ - aflplusplus_mopt\n- aflsmart\n- eclipser\n- entropic\n"
},
{
"change_type": "MODIFY",
"old_path": "f... | Python | Apache License 2.0 | google/fuzzbench | [aflplusplus_mopt] add afl++ mopt variant (#122)
PR #111 with some minor nits fixed
Co-authored-by: van Hauser <vh@thc.org> |
258,388 | 19.03.2020 10:32:41 | 25,200 | 32ca56c8cb613ffe706b10ac59f110bd902764be | [QSYM] Remove fuzzer
As pointed out to us, qsym doesn't work on kernels used in linux
distros newer than Ubuntu 14.0.4 or Centos 7. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -25,7 +25,6 @@ jobs:\n- honggfuzz\n- libfuzzer\n- mopt\n- - qsym\nenv:\nFUZZER_NAME: ${{ matrix.fuzzer }}\n"
},
{
"change_type": "DELETE",
"old_path": "fuzzers... | Python | Apache License 2.0 | google/fuzzbench | [QSYM] Remove fuzzer (#130)
As pointed out to us, qsym doesn't work on kernels used in linux
distros newer than Ubuntu 14.0.4 or Centos 7. |
258,388 | 19.03.2020 11:42:20 | 25,200 | 93b0e1a3373bb54a023f6119581794d59a9265e9 | [make] Fix make-$FUZZER-all to build oss-fuzz benchmarks | [
{
"change_type": "ADD",
"old_path": null,
"new_path": ".github/workflows/build.py",
"diff": "+#!/usr/bin/env python3\n+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You ma... | Python | Apache License 2.0 | google/fuzzbench | [make] Fix make-$FUZZER-all to build oss-fuzz benchmarks (#116) |
258,388 | 19.03.2020 13:29:41 | 25,200 | be046fc290b1ecfe80aabe4eb6b887b60bb772e9 | [aflsmart] Fix issue building aflsmart in OSS-Fuzz
[aflsmart] Fix issues building aflsmart in OSS-Fuzz
OSS-Fuzz benchmarks don't use / as CWD. Be consistent about
using absolute paths for the repo and don't rely on CWD being /.
Also OSS-Fuzz defines CFLAGS, set it to none before using waf to avoid errors. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/aflsmart/builder.Dockerfile",
"new_path": "fuzzers/aflsmart/builder.Dockerfile",
"diff": "@@ -37,18 +37,19 @@ RUN add-apt-repository --keyserver hkps://keyserver.ubuntu.com:443 ppa:ubuntu-to\n# Download and compile AFLSmart\nRUN git clone https://githu... | Python | Apache License 2.0 | google/fuzzbench | [aflsmart] Fix issue building aflsmart in OSS-Fuzz (#117)
[aflsmart] Fix issues building aflsmart in OSS-Fuzz
OSS-Fuzz benchmarks don't use / as CWD. Be consistent about
using absolute paths for the repo and don't rely on CWD being /.
Also OSS-Fuzz defines CFLAGS, set it to none before using waf to avoid errors. |
258,390 | 19.03.2020 22:04:47 | -3,600 | e51bcf45955f77c87e0db7ae89f1669d07b7e886 | [honggfuzz] Update version | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + f316276ee58c2339ce8505d58eaf63baa967ed... | Python | Apache License 2.0 | google/fuzzbench | [honggfuzz] Update version (#129)
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,388 | 19.03.2020 15:01:40 | 25,200 | cabc8a532a2dd1ac860014c04bd6d4d834af6b55 | [CI] Miscellaneous improvements
Improve build script and cleanup workflow config file | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.py",
"new_path": ".github/workflows/build.py",
"diff": "@@ -67,18 +67,19 @@ def delete_docker_images():\ndef make_builds(benchmarks, fuzzer):\n\"\"\"Use make to build each target in |build_targets|.\"\"\"\nmake_targets = get_make_target... | Python | Apache License 2.0 | google/fuzzbench | [CI] Miscellaneous improvements (#134)
Improve build script and cleanup workflow config file |
258,388 | 19.03.2020 17:59:02 | 25,200 | 60b67bf72f96658bc54d51a00af888ad6d5df3e7 | [afl] Skip deterministic steps (ie: use -d). | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/afl/fuzzer.py",
"new_path": "fuzzers/afl/fuzzer.py",
"diff": "@@ -83,6 +83,9 @@ def run_afl_fuzz(input_corpus,\ninput_corpus,\n'-o',\noutput_corpus,\n+ # Use deterministic mode as it does best when we don't have\n+ # seeds which is often the case.\n+ '... | Python | Apache License 2.0 | google/fuzzbench | [afl] Skip deterministic steps (ie: use -d). (#132) |
258,388 | 19.03.2020 18:06:49 | 25,200 | 0982a9f5dfc1dd75be46bda6d0def61e2b21c76e | Dont use ASAN for benchmark builds
We aren't detecting crashes yet so it isn't useful.
Temporarily add libfuzzer w/asan as a fuzzer so we can figure out if ASAN helps libFuzzer performance. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/afl/fuzzer.py",
"new_path": "fuzzers/afl/fuzzer.py",
"diff": "@@ -24,10 +24,9 @@ from fuzzers import utils\ndef prepare_build_environment():\n\"\"\"Set environment variables used to build AFL-based fuzzers.\"\"\"\n- cflags = [\n- '-O2', '-fno-omit-fram... | Python | Apache License 2.0 | google/fuzzbench | Dont use ASAN for benchmark builds (#126)
We aren't detecting crashes yet so it isn't useful.
Temporarily add libfuzzer w/asan as a fuzzer so we can figure out if ASAN helps libFuzzer performance. |
258,388 | 20.03.2020 12:03:14 | 25,200 | f30629e30be62a5099c9db24d3be1b5fef1e9819 | [make] Fix $BENCHMARK in OSS-Fuzz benchmarks
Fixes | [
{
"change_type": "MODIFY",
"old_path": "docker/build.mk",
"new_path": "docker/build.mk",
"diff": "@@ -226,7 +226,7 @@ run-$(1)-$(2): .$(1)-$(2)-oss-fuzz-runner\n-e FUZZ_OUTSIDE_EXPERIMENT=1 \\\n-e TRIAL_ID=1 \\\n-e FUZZER=$(1) \\\n- -e BENCHMARK=$($(2)-project-name) \\\n+ -e BENCHMARK=$(2) \\\n-e FU... | Python | Apache License 2.0 | google/fuzzbench | [make] Fix $BENCHMARK in OSS-Fuzz benchmarks (#139)
Fixes #137 |
258,387 | 23.03.2020 11:26:20 | 14,400 | 12717d8a86ed7010ad93daf690f08c75a84a4da0 | [fastcgs] Changed base fuzzer to original MOpt | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/fastcgs/builder.Dockerfile",
"new_path": "fuzzers/fastcgs/builder.Dockerfile",
"diff": "@@ -23,16 +23,12 @@ RUN apt-get update && \\\n# Build without Python support as we don't need it.\n# Set AFL_NO_X86 to skip flaky tests.\n-RUN rm -rf /afl\n-\n-RUN ... | Python | Apache License 2.0 | google/fuzzbench | [fastcgs] Changed base fuzzer to original MOpt (#141) |
258,390 | 23.03.2020 17:14:43 | -3,600 | 39cdad29e6e4903c11bc8a7a1012b443406df206 | Update honggfuzz
This version adds splicing
(https://github.com/google/honggfuzz/commit/150cbd741c7346571e5a9c47b7819d2e37500a64)
which rather significantly improves coverage in some tests (e.g. in
sqlite3) | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + 539ea048d6273864e396ad95b08911c69cd2ac... | Python | Apache License 2.0 | google/fuzzbench | Update honggfuzz (#140)
This version adds splicing
(https://github.com/google/honggfuzz/commit/150cbd741c7346571e5a9c47b7819d2e37500a64)
which rather significantly improves coverage in some tests (e.g. in
sqlite3) |
258,390 | 23.03.2020 21:23:18 | -3,600 | 25c597bef489abb30279e367ac52bb7a19ad3e89 | Update honggfuzz (previous update performs badly under KVM).
Previous update performs
not-so-well under GCE/KVM, because of extensive bus locking (use of
atomics).
Sorry for so quick pace of updates, but I've just tested it under KVM.
On my desktop PC it performed well enough. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + 8c0808190bd10ae63b26853ca8ef29e5e17736... | Python | Apache License 2.0 | google/fuzzbench | Update honggfuzz (previous update performs badly under KVM). (#143)
Previous update https://github.com/google/fuzzbench/pull/140 performs
not-so-well under GCE/KVM, because of extensive bus locking (use of
atomics).
Sorry for so quick pace of updates, but I've just tested it under KVM.
On my desktop PC it performed well enough. |
258,388 | 25.03.2020 09:18:36 | 25,200 | 179625c54e47d5b6e8807e91d1179150a36d50e2 | [analysis] Drop "id" column from experiment data
It is the same as trial_id so it just takes up space.
Fixes | [
{
"change_type": "MODIFY",
"old_path": "analysis/queries.py",
"new_path": "analysis/queries.py",
"diff": "@@ -26,4 +26,8 @@ def get_experiment_data(experiment_names):\nsqlalchemy.orm.joinedload('trial')).filter(\nmodels.Snapshot.trial.has(\nmodels.Trial.experiment.in_(experiment_names)))\n- return p... | Python | Apache License 2.0 | google/fuzzbench | [analysis] Drop "id" column from experiment data (#148)
It is the same as trial_id so it just takes up space.
Fixes #133 |
258,390 | 26.03.2020 17:02:49 | -3,600 | a87013c69d47ab040d0e54fff84408a8f8403e37 | [honggfuzz]: update version
Another bunch of improvements and speed-ups which were actually
made possible b/c fuzzbench provides very solid perf data :) | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + 5a40d002370fdb26aeb2156bd062bae697ce92... | Python | Apache License 2.0 | google/fuzzbench | [honggfuzz]: update version (#157)
Another bunch of improvements and speed-ups which were actually
made possible b/c fuzzbench provides very solid perf data :) |
258,387 | 26.03.2020 14:06:08 | 14,400 | e4624bcacbe369a295ea6733ede4e39cce66df10 | [fastcgs] Update commit | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/fastcgs/builder.Dockerfile",
"new_path": "fuzzers/fastcgs/builder.Dockerfile",
"diff": "@@ -25,10 +25,10 @@ RUN apt-get update && \\\nRUN rm -rf /afl && git clone https://github.com/alifahmed/aflmod /afl && \\\ncd /afl && \\\n- git checkout af232ce29db... | Python | Apache License 2.0 | google/fuzzbench | [fastcgs] Update commit (#154) |
258,388 | 26.03.2020 12:10:06 | 25,200 | dc57fc4d016d189f541f4c62d8f05f223b8465c2 | Add reference doc on benchmarks
Add reference doc on benchmarks providing info on each benchmark (such as size, edges, dictionary, seed corpus size) in table form. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "docs/reference/benchmarks.md",
"diff": "+---\n+layout: default\n+title: Benchmarks\n+nav_order: 4\n+permalink: /reference/benchmarks/\n+parent: Reference\n+---\n+\n+This page describes each benchmark that is part of fuzzbench.\n+\n+The table bel... | Python | Apache License 2.0 | google/fuzzbench | Add reference doc on benchmarks (#155)
Add reference doc on benchmarks providing info on each benchmark (such as size, edges, dictionary, seed corpus size) in table form. |
258,383 | 26.03.2020 19:29:01 | 25,200 | ff4fe76120ad17f79b22f1b118bb743bd001cd77 | rename file .c to .cc since we are using the CXX compiler in build.sh | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/lcms-2017-03-21/build.sh",
"new_path": "benchmarks/lcms-2017-03-21/build.sh",
"diff": "@@ -24,5 +24,5 @@ build_lib() {\nget_git_revision https://github.com/mm2/Little-CMS.git f9d75ccef0b54c9f4167d95088d4727985133c52 SRC\nbuild_lib\n-$CXX $CXXFLAGS $... | Python | Apache License 2.0 | google/fuzzbench | rename file .c to .cc since we are using the CXX compiler in build.sh (#170) |
258,383 | 26.03.2020 19:29:58 | 25,200 | 87ec75dce13f5aade95cb1cf9c5c862dbc04bc74 | [docs] give the command to run the fuzzer manually to debug it | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/adding_a_new_fuzzer.md",
"new_path": "docs/getting-started/adding_a_new_fuzzer.md",
"diff": "@@ -247,6 +247,8 @@ make build-$FUZZER_NAME-all\n```shell\nmake debug-$FUZZER_NAME-$BENCHMARK_NAME\n+\n+ $ROOT_DIR/docker/benchmark-runner/startup... | Python | Apache License 2.0 | google/fuzzbench | [docs] give the command to run the fuzzer manually to debug it (#169) |
258,388 | 27.03.2020 13:22:39 | 25,200 | dbccb1052b654ab4268faffc1676d5628dce876a | [docs] Add reference/experiment_data.md
Add reference/experiment_data.md
Add reference/experiment_data.md a document on how to get the raw
data from experiments. | [
{
"change_type": "MODIFY",
"old_path": "docs/reference/benchmarks.md",
"new_path": "docs/reference/benchmarks.md",
"diff": "@@ -6,6 +6,8 @@ permalink: /reference/benchmarks/\nparent: Reference\n---\n+# Benchmarks\n+\nThis page describes each benchmark that is part of fuzzbench.\nThe table below was ... | Python | Apache License 2.0 | google/fuzzbench | [docs] Add reference/experiment_data.md (#175)
Add reference/experiment_data.md
Add reference/experiment_data.md a document on how to get the raw
data from experiments. |
258,390 | 30.03.2020 17:23:30 | -7,200 | 7cfcb4c874f68e5668edb3941b4aefd57d28876c | [honggfuzz]: update to a newer version
A bigger change is that honggfuzz switched by-default from pc-guards to
8bit inline maps offered by libfuzzer's -fsanitize=fuzzer-no-link | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + 274f2f149237e412fb39cea407f0b19555cb6a... | Python | Apache License 2.0 | google/fuzzbench | [honggfuzz]: update to a newer version (#185)
A bigger change is that honggfuzz switched by-default from pc-guards to
8bit inline maps offered by libfuzzer's -fsanitize=fuzzer-no-link |
258,388 | 31.03.2020 09:50:29 | 25,200 | b1cdf858b55b96a5c9a6185b48e167e8358f13b9 | [lafintel] Integrate fuzzer | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -24,6 +24,7 @@ jobs:\n- fairfuzz\n- fastcgs\n- honggfuzz\n+ - lafintel\n- libfuzzer\n- mopt\n"
},
{
"change_type": "MODIFY",
"old_path": "fuzzers/afl/fuzzer.py... | Python | Apache License 2.0 | google/fuzzbench | [lafintel] Integrate fuzzer (#150)
Co-authored-by: Laurent Simon |
258,390 | 31.03.2020 19:06:52 | -7,200 | 577569a110af613256441b77bb032d917044f1f0 | Update honggfuzz
In
I identified a problem which cause honggfuzz benchmarks to achieve lower
numbers of PC-guards in some tests (e.g. in jsoncpp_fuzzer). This was
arbitrary use of -fno-inline. The master branch now removed the problem,
and I'd like to test that on fuzzbench. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + 4ff004700c3da264a2e8a867af1d97ed1d93eb... | Python | Apache License 2.0 | google/fuzzbench | Update honggfuzz (#190)
In
https://github.com/google/honggfuzz/commit/0f3001e5b5407ae094781406361182ae151afdde
I identified a problem which cause honggfuzz benchmarks to achieve lower
numbers of PC-guards in some tests (e.g. in jsoncpp_fuzzer). This was
arbitrary use of -fno-inline. The master branch now removed the problem,
and I'd like to test that on fuzzbench. |
258,390 | 06.04.2020 18:30:28 | -7,200 | 7b1e79e3f0fb9fb41c821b37f48187e445df6334 | [honggfuzz] version update
New day, new code updates - they improve coverage in some benchmarks | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + 7c34b297d365d1f9fbfc230db7504c8aca3846... | Python | Apache License 2.0 | google/fuzzbench | [honggfuzz] version update (#204)
New day, new code updates - they improve coverage in some benchmarks |
258,388 | 06.04.2020 10:55:27 | 25,200 | 580b6797abcd7caf3c06cf2bd534c1c1bad31fcc | [base-builder] Remove installation of unneeded packages
The packages aren't needed remove them to optimize size/speed and make transition to one
builder image simpler. | [
{
"change_type": "MODIFY",
"old_path": "docker/base-builder/Dockerfile",
"new_path": "docker/base-builder/Dockerfile",
"diff": "@@ -22,24 +22,16 @@ RUN apt-get update -y && apt-get install -y \\\nautomake \\\ncmake \\\ngit \\\n- golang \\\nlibarchive-dev \\\n- libbfd-dev \\\nlibboost-dev \\\n- libbz... | Python | Apache License 2.0 | google/fuzzbench | [base-builder] Remove installation of unneeded packages (#199)
The packages aren't needed remove them to optimize size/speed and make transition to one
builder image simpler. |
258,388 | 06.04.2020 13:14:08 | 25,200 | eb137c22c2024b4a506c436246a0c14f2faa7e84 | [service] Initial code for running periodic experiments | [
{
"change_type": "MODIFY",
"old_path": "common/benchmark_utils.py",
"new_path": "common/benchmark_utils.py",
"diff": "@@ -77,11 +77,22 @@ def validate(benchmark):\nlogs.error('%s does not conform to %s pattern.', benchmark,\nVALID_BENCHMARK_REGEX.pattern)\nreturn False\n- benchmark_dir = os.path.joi... | Python | Apache License 2.0 | google/fuzzbench | [service] Initial code for running periodic experiments (#200) |
258,388 | 06.04.2020 17:42:44 | 25,200 | 7be41dc671858471e9342b18b79299425c69b657 | [wpantund] Remove benchmark
Remove benchmark as it can make network connections, causing timeouts.
Fixes | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.py",
"new_path": ".github/workflows/build.py",
"diff": "@@ -43,7 +43,6 @@ STANDARD_BENCHMARKS = [\n're2-2014-12-09',\n'vorbis-2017-12-11',\n'woff2-2016-05-06',\n- 'wpantund-2018-02-27',\n]\n"
},
{
"change_type": "DELETE",
"o... | Python | Apache License 2.0 | google/fuzzbench | [wpantund] Remove benchmark (#207)
Remove benchmark as it can make network connections, causing timeouts.
Fixes #171. |
258,390 | 07.04.2020 20:07:14 | -7,200 | 46e55418edccb3bf3be58bc40dca03c6246b12a9 | [honggfuzz]: update version
The previous version can panic() under rare circumstances. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + e0d47db4d0d775a3dc42120351a17c646b198b... | Python | Apache License 2.0 | google/fuzzbench | [honggfuzz]: update version (#209)
The previous version can panic() under rare circumstances. |
258,383 | 07.04.2020 11:23:59 | 25,200 | a53aa952b33d7be5120009c05a07de342a02d318 | use latest AFL code for lafintel | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/lafintel/builder.Dockerfile",
"new_path": "fuzzers/lafintel/builder.Dockerfile",
"diff": "@@ -28,6 +28,12 @@ RUN wget https://lcamtuf.coredump.cx/afl/releases/afl-2.26b.tgz -O /afl-2.26b.tg\ntar xvzf /afl-2.26b.tgz -C / && \\\nmv /afl-2.26b /afl && \\\... | Python | Apache License 2.0 | google/fuzzbench | use latest AFL code for lafintel (#208) |
258,387 | 13.04.2020 14:19:18 | 14,400 | 3ea428ed64e661ae173646e7d010128d7c080793 | [fastcgs] Testing variations | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -28,6 +28,8 @@ jobs:\n- entropic\n- fairfuzz\n- fastcgs\n+ - fastcgs_lm\n+ - fastcgs_br\n- honggfuzz\n- lafintel\n- libfuzzer\n"
},
{
"change_type": "MODIFY",
... | Python | Apache License 2.0 | google/fuzzbench | [fastcgs] Testing variations (#218) |
258,415 | 13.04.2020 13:09:18 | 25,200 | 3718a8c6d1aba2e5974380e3d28f20d640dc85e5 | Only use Docker's cache-from when on a CI service.
This speeds up local caching when developing new fuzzers. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.py",
"new_path": ".github/workflows/build.py",
"diff": "@@ -72,7 +72,7 @@ def make_builds(benchmarks, fuzzer):\n# Then build.\nprint('Building', build_target)\n- build_command = ['make', '-j', build_target]\n+ build_command = ['make', '... | Python | Apache License 2.0 | google/fuzzbench | Only use Docker's cache-from when on a CI service. (#216)
This speeds up local caching when developing new fuzzers. |
258,387 | 16.04.2020 11:13:13 | 14,400 | 7d547daf74c5f409f833e19cc7f25b7515f9dca7 | Changed map size | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/fastcgs_br/builder.Dockerfile",
"new_path": "fuzzers/fastcgs_br/builder.Dockerfile",
"diff": "@@ -25,7 +25,7 @@ RUN apt-get update && \\\nRUN rm -rf /afl && git clone https://github.com/alifahmed/aflmod /afl && \\\ncd /afl && \\\n- git checkout 439f646... | Python | Apache License 2.0 | google/fuzzbench | Changed map size (#232) |
258,387 | 21.04.2020 00:36:16 | 14,400 | 12eb7456c4a3b9e0133aa3ff26c9de79746d9435 | [fastcgs_br] Fix for failing bloaty_fuzz_target | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/fastcgs_br/builder.Dockerfile",
"new_path": "fuzzers/fastcgs_br/builder.Dockerfile",
"diff": "@@ -25,7 +25,7 @@ RUN apt-get update && \\\nRUN rm -rf /afl && git clone https://github.com/alifahmed/aflmod /afl && \\\ncd /afl && \\\n- git checkout 1124baa... | Python | Apache License 2.0 | google/fuzzbench | [fastcgs_br] Fix for failing bloaty_fuzz_target (#246) |
258,388 | 21.04.2020 10:23:29 | 25,200 | fa230b554c8ad2030806d423f4e9f0ee06acc12b | [irssi_server-fuzz] Remove benchmark
It behaves very nondeterministically, fails a lot when getting
coverage and is a bottleneck in measuring coverage. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build.py",
"new_path": ".github/workflows/build.py",
"diff": "@@ -20,7 +20,6 @@ import subprocess\nOSS_FUZZ_BENCHMARKS = [\n'bloaty_fuzz_target',\n'curl_curl_fuzzer_http',\n- 'irssi_server-fuzz',\n'jsoncpp_jsoncpp_fuzzer',\n'libpcap_fuzz_both... | Python | Apache License 2.0 | google/fuzzbench | [irssi_server-fuzz] Remove benchmark (#240)
It behaves very nondeterministically, fails a lot when getting
coverage and is a bottleneck in measuring coverage. |
258,388 | 21.04.2020 15:56:33 | 25,200 | 944c368ee176f42b023e8bac6d151e59bd725cea | Add short run tests to make and CI and add unittests for fuzzers
Add test-$fuzzer-$target make target to check fuzzer can
run for 20 seconds. Make this target in CI.
Also add some unittests for each fuzzer module. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -69,4 +69,4 @@ jobs:\n- name: Build Benchmarks\nrun: |\n- python .github/workflows/build.py $BENCHMARK_TYPE $FUZZER\n+ python .github/workflows/test_fuzzer_benchmarks.py $... | Python | Apache License 2.0 | google/fuzzbench | Add short run tests to make and CI and add unittests for fuzzers (#213)
Add test-$fuzzer-$target make target to check fuzzer can
run for 20 seconds. Make this target in CI.
Also add some unittests for each fuzzer module. |
258,388 | 21.04.2020 16:02:41 | 25,200 | 3820d32945d3a603105b6d5f7a3c7c7aa1c19852 | Replace giant rsync in measurer with a cp call for each snapshot.
cp call seems to be stable.
It is more performant and works in large scale experiments (unlike rsync). | [
{
"change_type": "MODIFY",
"old_path": "common/gsutil.py",
"new_path": "common/gsutil.py",
"diff": "@@ -62,6 +62,18 @@ def rm(*rm_arguments, recursive=True, force=False, **kwargs): # pylint: disable\nreturn gsutil_command(command, expect_zero=(not force), **kwargs)\n+def cat(path, must_exist=True, *... | Python | Apache License 2.0 | google/fuzzbench | Replace giant rsync in measurer with a cp call for each snapshot. (#243)
cp call seems to be stable.
It is more performant and works in large scale experiments (unlike rsync). |
258,388 | 22.04.2020 20:09:26 | 25,200 | 9f6352d899c7e832775c8e1e01bff1186e8af9da | Don't install benchmark specific dependencies in base-builder
Install them in build.sh files since they are benchmark specific. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/freetype2-2017/build.sh",
"new_path": "benchmarks/freetype2-2017/build.sh",
"diff": ". $(dirname $0)/../common.sh\n+apt-get update && \\\n+ apt-get install -y \\\n+ make \\\n+ autoconf \\\n+ libtool \\\n+ libarchive-dev\n+\nbuild_lib() {\nrm -rf BUI... | Python | Apache License 2.0 | google/fuzzbench | Don't install benchmark specific dependencies in base-builder (#252)
Install them in build.sh files since they are benchmark specific. |
258,388 | 23.04.2020 18:13:39 | 25,200 | 93e8bdc5851e507f8f14f337a2ccb0497e813332 | Name OSS-Fuzz images by benchmark rather than by project
Name OSS-Fuzz images by benchmark rather than by project | [
{
"change_type": "MODIFY",
"old_path": "common/benchmark_utils.py",
"new_path": "common/benchmark_utils.py",
"diff": "@@ -29,13 +29,6 @@ def is_oss_fuzz(benchmark):\nreturn os.path.isfile(oss_fuzz.get_config_file(benchmark))\n-def get_docker_name(benchmark):\n- \"\"\"Returns the name used to represe... | Python | Apache License 2.0 | google/fuzzbench | Name OSS-Fuzz images by benchmark rather than by project (#254)
Name OSS-Fuzz images by benchmark rather than by project |
258,388 | 27.04.2020 11:23:00 | 25,200 | 980b0a62fb8674df64cbf702ab608f059822c358 | [generate_report] Add --end-time argument to limit reports to time periods
Add end_time argument so that one can specify a time limit on snapshots
they want in the report. For example, this allows one to get a report
from the first 6 hours of an experiment. | [
{
"change_type": "MODIFY",
"old_path": "analysis/data_utils.py",
"new_path": "analysis/data_utils.py",
"diff": "@@ -62,6 +62,12 @@ def label_fuzzers_by_experiment(experiment_df):\nreturn experiment_df\n+def filter_max_time(experiment_df, max_time):\n+ \"\"\"Returns table with snapshots that have tim... | Python | Apache License 2.0 | google/fuzzbench | [generate_report] Add --end-time argument to limit reports to time periods (#277)
Add end_time argument so that one can specify a time limit on snapshots
they want in the report. For example, this allows one to get a report
from the first 6 hours of an experiment. |
258,387 | 27.04.2020 19:14:14 | 14,400 | 1464eb567fdc0457aa656df3b0e0bdfbf97a2c79 | [fastcgs] Huge page versions | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "fuzzers/fastcgs_lm_huge/builder.Dockerfile",
"diff": "+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You may obtain ... | Python | Apache License 2.0 | google/fuzzbench | [fastcgs] Huge page versions (#258) |
258,376 | 29.04.2020 01:04:12 | -36,000 | b936e0c15736f1687819c73ea8ffe3306f6e0288 | Add input models to fuzz Freetype2 and Vorbis | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/aflsmart/README.md",
"new_path": "fuzzers/aflsmart/README.md",
"diff": "3. libpcap_fuzz_both\n+4. freetype2-2017\n+\n+5. vorbis-2017-12-11\n+\nSince the experiment summary diagram of the default FuzzBench report is automatically generated based on the ... | Python | Apache License 2.0 | google/fuzzbench | Add input models to fuzz Freetype2 and Vorbis (#280) |
258,388 | 28.04.2020 09:48:37 | 25,200 | 506a5395c6d48036c66a58aeb03cab25f31827fa | Add some small optimizations to the measurer
1. Optimize check on unchanged-cycles so we aren't getting it unnecessarily.
2. Keep a list of files we've already measured rather than keeping them in a directory
3. Log the amount of time it takes to measure each benchmark. | [
{
"change_type": "MODIFY",
"old_path": "common/gsutil.py",
"new_path": "common/gsutil.py",
"diff": "@@ -62,18 +62,6 @@ def rm(*rm_arguments, recursive=True, force=False, **kwargs): # pylint: disable\nreturn gsutil_command(command, expect_zero=(not force), **kwargs)\n-def cat(path, must_exist=True, *... | Python | Apache License 2.0 | google/fuzzbench | Add some small optimizations to the measurer (#270)
1. Optimize check on unchanged-cycles so we aren't getting it unnecessarily.
2. Keep a list of files we've already measured rather than keeping them in a directory
3. Log the amount of time it takes to measure each benchmark. |
258,388 | 29.04.2020 09:14:48 | 25,200 | 890fb3a746572a8d44edbe0067d1cc0a7ccceb1b | Be more explicit about presubmit errors
Explicitly say that there are errors so that errors are easier to spot when
viewing CI output.
Also update google-auth library to get rid of error when installing requirements.txt | [
{
"change_type": "MODIFY",
"old_path": "experiment/test_runner.py",
"new_path": "experiment/test_runner.py",
"diff": "@@ -57,7 +57,6 @@ BENCHMARK = 'benchmark-1'\nEXPERIMENT = 'experiment-name'\nTRIAL_NUM = 1\nFUZZER = 'fuzzer-name-a'\n-FULL_FUZZER_NAME = FUZZER\n@pytest.yield_fixture\n@@ -65,7 +64,... | Python | Apache License 2.0 | google/fuzzbench | Be more explicit about presubmit errors (#284)
Explicitly say that there are errors so that errors are easier to spot when
viewing CI output.
Also update google-auth library to get rid of error when installing requirements.txt |
258,387 | 01.05.2020 10:24:50 | 14,400 | 4eeeb72b84b994337181bd452172c64e98b7e805 | [fastcgs] Removed fastcgs_br temporary fuzzer | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -35,7 +35,6 @@ jobs:\n- fairfuzz\n- fastcgs\n- fastcgs_lm\n- - fastcgs_br\n- honggfuzz\n- lafintel\n- libfuzzer\n"
},
{
"change_type": "DELETE",
"old_path": "f... | Python | Apache License 2.0 | google/fuzzbench | [fastcgs] Removed fastcgs_br temporary fuzzer (#287) |
258,388 | 01.05.2020 16:11:01 | 25,200 | c791a0d43c5e946d153c5479d214f37c97d06b92 | Fix bug copying unchanged-cycles in measurer
Don't assume unchanged-cycles file exists. | [
{
"change_type": "MODIFY",
"old_path": "experiment/measurer.py",
"new_path": "experiment/measurer.py",
"diff": "@@ -391,7 +391,8 @@ class SnapshotMeasurer: # pylint: disable=too-many-instance-attributes\ndef copy_unchanged_cycles_file():\nresult = gsutil.cp(exp_path.gcs(self.unchanged_cycles_path),\... | Python | Apache License 2.0 | google/fuzzbench | Fix bug copying unchanged-cycles in measurer (#293)
Don't assume unchanged-cycles file exists. |
258,388 | 05.05.2020 08:24:40 | 25,200 | 76f90be5aee15297eb0b6e3ffa7b8b6828f3d50d | Remove fastcgs and fastcgs_lm_huge.
Remove temporary fuzzer fastcgs_lm_huge.
It was tested in
It also depends on which was reverted in
Also remove fastcgs | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -33,7 +33,6 @@ jobs:\n- eclipser\n- entropic\n- fairfuzz\n- - fastcgs\n- fastcgs_lm\n- honggfuzz\n- lafintel\n"
},
{
"change_type": "DELETE",
"old_path": "fuzz... | Python | Apache License 2.0 | google/fuzzbench | Remove fastcgs and fastcgs_lm_huge. (#301)
Remove temporary fuzzer fastcgs_lm_huge.
It was tested in
https://www.fuzzbench.com/reports/2020-05-01-fastcgs/index.html
It also depends on #247 which was reverted in #294.
Also remove fastcgs |
258,372 | 05.05.2020 19:19:29 | 14,400 | 41aa9b4267907185bd51514a6fb335ff70f4990d | Fix memleak in the recently added benchmarks
Remove dupe call to pcap_datalink(). Add free() to pathname in delete_file(). Some spacing. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/jasper-1.701.0/jasper_fuzz.cc",
"new_path": "benchmarks/jasper-1.701.0/jasper_fuzz.cc",
"diff": "@@ -46,6 +46,7 @@ delete_file(const char *pathname)\nif (ret == -1) {\nwarn(\"failed to delete \\\"%s\\\"\", pathname);\n}\n+ free((void *)pathname);\nr... | Python | Apache License 2.0 | google/fuzzbench | Fix memleak in the recently added benchmarks (#305)
Remove dupe call to pcap_datalink(). Add free() to pathname in delete_file(). Some spacing. |
258,399 | 06.05.2020 21:37:00 | 18,000 | c5977212fd94ac9f4e2367d92922f36fd8d4ba5f | update prerequisites.md
Update outdated link and add Python dependencies install instructions | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/prerequisites.md",
"new_path": "docs/getting-started/prerequisites.md",
"diff": "@@ -35,7 +35,7 @@ Install Docker using the instructions\nGooglers can visit [go/installdocker](https://goto.google.com/installdocker).\nIf you want to run `do... | Python | Apache License 2.0 | google/fuzzbench | update prerequisites.md (#310)
Update outdated link and add Python dependencies install instructions |
258,388 | 07.05.2020 10:17:31 | 25,200 | a7d3b22f28dcc371f1467b535f83e2034d03d1dd | Dont run test_measure_snapshot_coverage by default
Don't run test_measure_snapshot_coverage by default
The test relies on a binary that may not run on everyone's machine.
Run it in CI though.
Also, avoid using tmp_path with fakefs. Change the experiment
fixture to not use tmp_path. Combining the two causes weird errors. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/presubmit.yml",
"new_path": ".github/workflows/presubmit.yml",
"diff": "@@ -16,4 +16,4 @@ jobs:\npython-version: 3.7\n- name: Run presubmit checks\nrun: |\n- make presubmit\n+ FUZZBENCH_TEST_INTEGRATION=1 make presubmit\n"
},
{
"chang... | Python | Apache License 2.0 | google/fuzzbench | Dont run test_measure_snapshot_coverage by default (#309)
Don't run test_measure_snapshot_coverage by default
The test relies on a binary that may not run on everyone's machine.
Run it in CI though.
Also, avoid using tmp_path with fakefs. Change the experiment
fixture to not use tmp_path. Combining the two causes weird errors. |
258,388 | 07.05.2020 12:10:00 | 25,200 | 06a16cdacf9031d2045d11d15687ff043794b97a | Don't start trials for failed builds
Don't start trials for failed builds and skip builds we know fail
Don't start a trial (or save it to the db) for a fuzzer-benchmark
if the build failed (not counting builds that fail but succeed on a
retry). | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/builder.py",
"new_path": "experiment/build/builder.py",
"diff": "@@ -68,15 +68,16 @@ def build_measurer(benchmark: str) -> bool:\ndef build_all_measurers(benchmarks: List[str]) -> List[str]:\n- \"\"\"Build measurers for benchmarks.\"\"\"\n+ \"... | Python | Apache License 2.0 | google/fuzzbench | Don't start trials for failed builds (#307)
Don't start trials for failed builds and skip builds we know fail
Don't start a trial (or save it to the db) for a fuzzer-benchmark
if the build failed (not counting builds that fail but succeed on a
retry). |
258,388 | 08.05.2020 09:06:41 | 25,200 | 44fad335cf5d0161f20f4f4f31a2ccb65d45443f | Fix regex excluding OSS-Fuzz project builds
Fix regex excluding OSS-Fuzz project builds | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -260,7 +260,7 @@ def copy_resources_to_bucket(config_dir: str, config: Dict):\noptions = [\n'-x',\n('^\\\\.git/|^\\\\.pytype/|^\\\\.venv/|^.*\\\\.pyc$|^__pycache__/'\n- '|.*... | Python | Apache License 2.0 | google/fuzzbench | Fix regex excluding OSS-Fuzz project builds (#314)
Fix regex excluding OSS-Fuzz project builds |
258,388 | 14.05.2020 09:45:01 | 25,200 | fe3b005a6d89df7557faa91753d4d957c70a4d9d | Add instructions on testing new benchmarks in CI to docs. | [
{
"change_type": "MODIFY",
"old_path": "docs/developing-fuzzbench/adding_a_new_benchmark.md",
"new_path": "docs/developing-fuzzbench/adding_a_new_benchmark.md",
"diff": "@@ -126,5 +126,11 @@ make build-$FUZZER_NAME-$BENCHMARK_NAME\nmake run-$FUZZER_NAME-$BENCHMARK_NAME\n```\n+## Testing the benchmar... | Python | Apache License 2.0 | google/fuzzbench | Add instructions on testing new benchmarks in CI to docs. (#335) |
258,388 | 14.05.2020 14:33:38 | 25,200 | 056f224685a3682e9bbb04b2a927e82dc7a82274 | [builder] Raise GCB timeout to 4 hours | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/gcb_build.py",
"new_path": "experiment/build/gcb_build.py",
"diff": "@@ -35,7 +35,7 @@ BUILDER_STEP_IDS = [\nCONFIG_DIR = 'config'\n# Maximum time to wait for a GCB config to finish build.\n-GCB_BUILD_TIMEOUT = 2 * 60 * 60 # 2 hours.\n+GCB_BUI... | Python | Apache License 2.0 | google/fuzzbench | [builder] Raise GCB timeout to 4 hours (#340) |
258,388 | 18.05.2020 16:49:57 | 25,200 | f387ba05de20e0762a6f8ed34900c7cc7c609117 | [presubmit] Add options for verbose logging and running on all files. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -2,7 +2,7 @@ name: Build fuzzers\non:\npull_request:\npaths:\n- - 'docker/**' # Base images changes.\n+ - 'docker/**' # Base image changes.\n- 'fuzzers/**' # Changes to fu... | Python | Apache License 2.0 | google/fuzzbench | [presubmit] Add options for verbose logging and running on all files. (#344) |
258,388 | 19.05.2020 21:57:09 | 25,200 | 49958597046f65aaec02148f0ba50594fc65c3d4 | [run_experiment] Only permit selecting fuzzers in the repo. | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -466,6 +466,7 @@ def main():\n'more benchmarks.')\nall_benchmarks = benchmark_utils.get_all_benchmarks()\n+ all_fuzzers = fuzzer_utils.get_fuzzer_names()\nparser.add_argumen... | Python | Apache License 2.0 | google/fuzzbench | [run_experiment] Only permit selecting fuzzers in the repo. (#359) |
258,399 | 21.05.2020 02:39:52 | 0 | 54f7364fd1525663d5d9c14dacdf006836c126b4 | [doc] test-run | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/adding_a_new_fuzzer.md",
"new_path": "docs/getting-started/adding_a_new_fuzzer.md",
"diff": "@@ -237,6 +237,12 @@ make build-$FUZZER_NAME-$BENCHMARK_NAME\nmake run-$FUZZER_NAME-$BENCHMARK_NAME\n```\n+* Or use a quicker test run mode:\n+\n+... | Python | Apache License 2.0 | google/fuzzbench | [doc] test-run (#363) |
258,388 | 26.05.2020 12:19:00 | 25,200 | 8028c6ae16f331310d39340f3400610b9bf6f473 | Add pull-clang as depdendency of base-builder.
Otherwise, a stale clang might be used that is different from the one
used in CI and in experiments. | [
{
"change_type": "MODIFY",
"old_path": "docker/build.mk",
"new_path": "docker/build.mk",
"diff": "@@ -39,16 +39,16 @@ base-image:\npull-base-image:\ndocker pull $(BASE_TAG)/base-image\n-base-builder: base-image\n+pull-base-clang:\n+ docker pull gcr.io/oss-fuzz-base/base-clang\n+\n+base-builder: base... | Python | Apache License 2.0 | google/fuzzbench | Add pull-clang as depdendency of base-builder. (#371)
Otherwise, a stale clang might be used that is different from the one
used in CI and in experiments. |
258,388 | 26.05.2020 12:21:35 | 25,200 | ec2f795a7302cd956c27b339b6d27764ab8068aa | Create an image for the measurer's worker and add steps to build it.
Create an image for the measurer's worker and add steps to build it.
Also:
Add .dockerignore
Add some more files to .gitignore
Remove some unneeded patterns from .gitignore. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": ".dockerignore",
"diff": "+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You may obtain a copy of the License at\n+#\... | Python | Apache License 2.0 | google/fuzzbench | Create an image for the measurer's worker and add steps to build it. (#372)
Create an image for the measurer's worker and add steps to build it.
Also:
Add .dockerignore
Add some more files to .gitignore
Remove some unneeded patterns from .gitignore. |
258,399 | 26.05.2020 22:21:19 | 0 | 0ad99c056eeaef1fdc6ebf534b5d89ed23558659 | [Ankou] Initial fuzzer integration | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -20,6 +20,7 @@ jobs:\n- aflplusplus_optimal\n- aflplusplus_shmem\n- aflsmart\n+ - ankou\n- eclipser\n- entropic\n- fairfuzz\n"
},
{
"change_type": "MODIFY",
"o... | Python | Apache License 2.0 | google/fuzzbench | [Ankou] Initial fuzzer integration (#364) |
258,399 | 04.06.2020 17:32:06 | 0 | d618fe043fe30cf6cef769290ce4c7b2500ed2a3 | Refactor gsutils to filestore_utils
This is first step towards abstracting away file store operations to support other systems than Google Cloud Storage, i.e. local storage. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "common/filestore_utils.py",
"diff": "+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You may obtain a copy of the Lic... | Python | Apache License 2.0 | google/fuzzbench | Refactor gsutils to filestore_utils (#394)
This is first step towards abstracting away file store operations to support other systems than Google Cloud Storage, i.e. local storage. |
258,388 | 08.06.2020 11:53:40 | 25,200 | cb0af301e4869c10c122b01e31a8dffdb776a0af | [NFC] Replace uses of side_effect with return_value.
return_value is clearer and simpler and can be used in these cases. | [
{
"change_type": "MODIFY",
"old_path": "experiment/test_run_experiment.py",
"new_path": "experiment/test_run_experiment.py",
"diff": "@@ -64,7 +64,7 @@ class TestReadAndValdiateExperimentConfig(unittest.TestCase):\n# All but cloud_compute_zone.\ndel self.config['cloud_compute_zone']\nwith mock.patch... | Python | Apache License 2.0 | google/fuzzbench | [NFC] Replace uses of side_effect with return_value. (#409)
return_value is clearer and simpler and can be used in these cases. |
258,388 | 08.06.2020 13:38:20 | 25,200 | 99256e13720d5f42d957ba0cdbfdec827f1cf3f5 | [NFC] Remove unused logger. | [
{
"change_type": "MODIFY",
"old_path": "common/filestore_utils.py",
"new_path": "common/filestore_utils.py",
"diff": "# limitations under the License.\n\"\"\"Helper functions for interacting with the file storage.\"\"\"\n-from common import logs\nfrom common import experiment_utils\n-logger = logs.L... | Python | Apache License 2.0 | google/fuzzbench | [NFC] Remove unused logger. (#410) |
258,388 | 10.06.2020 10:11:12 | 25,200 | 6cdf384a19a43310a3d3e72795c1df0919b2f0ab | [make][runner] Use FORCE_LOCAL in debug-, test-run-, run- make targets
They targets are only used locally, and FORCE_LOCAL won't be propagated
from the user's environment to the docker container unless we do this.
So best to assume it is needed. | [
{
"change_type": "MODIFY",
"old_path": "docker/generate_makefile.py",
"new_path": "docker/generate_makefile.py",
"diff": "@@ -184,6 +184,7 @@ run-{fuzzer}-{benchmark}: .{fuzzer}-{benchmark}-oss-fuzz-runner\n--cap-add SYS_NICE \\\\\n--cap-add SYS_PTRACE \\\\\n-e FUZZ_OUTSIDE_EXPERIMENT=1 \\\\\n+ -e F... | Python | Apache License 2.0 | google/fuzzbench | [make][runner] Use FORCE_LOCAL in debug-, test-run-, run- make targets (#418)
They targets are only used locally, and FORCE_LOCAL won't be propagated
from the user's environment to the docker container unless we do this.
So best to assume it is needed. |
258,370 | 10.06.2020 23:01:15 | 14,400 | 416d49ae13ce4cb05f46a7c5c71daa3b37359c10 | Manul - Initial Integration | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -30,6 +30,7 @@ jobs:\n- honggfuzz\n- lafintel\n- libfuzzer\n+ - manul\n- mopt\nbenchmark_type:\n"
},
{
"change_type": "MODIFY",
"old_path": "docker/base-runner... | Python | Apache License 2.0 | google/fuzzbench | Manul - Initial Integration (#419) |
258,388 | 11.06.2020 15:52:14 | 25,200 | 8a93b2ba97015c6f25a9b85a4e9c7d11bb9eea07 | Ensure FORCE_LOCAL=1 for presubmit.
Ensure FORCE_LOCAL=1 for presubmit.
Many googlers using Google Cloud for development need this and it will probably never hurt
to have.
Also add assertion that FORCE_LOCAL and FORCE_NOT_LOCAL aren't both enabled | [
{
"change_type": "MODIFY",
"old_path": "common/utils.py",
"new_path": "common/utils.py",
"diff": "@@ -20,12 +20,17 @@ import urllib.error\nROOT_DIR = os.path.abspath(os.path.dirname(os.path.dirname(__file__)))\n+assert not (os.getenv('FORCE_NOT_LOCAL') and os.getenv('FORCE_LOCAL')), (\n+ 'You can\\'... | Python | Apache License 2.0 | google/fuzzbench | Ensure FORCE_LOCAL=1 for presubmit. (#426)
Ensure FORCE_LOCAL=1 for presubmit.
Many googlers using Google Cloud for development need this and it will probably never hurt
to have.
Also add assertion that FORCE_LOCAL and FORCE_NOT_LOCAL aren't both enabled |
258,388 | 12.06.2020 12:51:55 | 25,200 | d075d3365e33af64287dad1049080bc2a8443f25 | [libfuzzer] Add libfuzzer variant that doesn't use cmp instrumentation
[libfuzzer] Add libfuzzer variant that doesn't use cmp instrumentation | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -31,6 +31,7 @@ jobs:\n- honggfuzz\n- lafintel\n- libfuzzer\n+ - libfuzzer_nocmp\n- manul\n- mopt\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path"... | Python | Apache License 2.0 | google/fuzzbench | [libfuzzer] Add libfuzzer variant that doesn't use cmp instrumentation (#432)
[libfuzzer] Add libfuzzer variant that doesn't use cmp instrumentation |
258,388 | 12.06.2020 17:58:09 | 25,200 | f810d635aeb68f3b5cbb405143035aa5ac5de56d | Make automatic_run_experiment run experiments based on requests
This functionality will be tested by fuzzbench maintainers. It isn't for users yet. | [
{
"change_type": "MODIFY",
"old_path": "presubmit.py",
"new_path": "presubmit.py",
"diff": "@@ -31,10 +31,14 @@ import subprocess\nimport sys\nfrom typing import List, Optional\n+import yaml\n+\nfrom common import benchmark_utils\nfrom common import fuzzer_utils\nfrom common import filesystem\nfrom ... | Python | Apache License 2.0 | google/fuzzbench | Make automatic_run_experiment run experiments based on requests (#416)
This functionality will be tested by fuzzbench maintainers. It isn't for users yet. |
258,371 | 15.06.2020 15:03:54 | 14,400 | 69feb9c327094033ced66ec2aea362c54bbbbb2a | [clang-coverage] Add build
Add clang source based coverage build. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": ".vscode/settings.json",
"diff": "+{\n+ \"python.linting.pylintEnabled\": true\n+}\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "common/fuzzer_utils.py",
"new_path": "common/fuzzer_utils.py",
"dif... | Python | Apache License 2.0 | google/fuzzbench | [clang-coverage] Add build (#424)
Add clang source based coverage build. |
258,399 | 15.06.2020 22:09:20 | 18,000 | 8ce3eb649e838f25d3445195ceee9c46c7ce5266 | [local support] set related environ var for local running
Related to | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -287,8 +287,11 @@ def copy_resources_to_bucket(config_dir: str, config: Dict):\nreturn None\nreturn tar_info\n- experiment_filestore_path = os.path.join(config['experiment_f... | Python | Apache License 2.0 | google/fuzzbench | [local support] set related environ var for local running (#441)
Related to https://github.com/google/fuzzbench/issues/251 |
258,399 | 15.06.2020 22:50:07 | 18,000 | 5ecbe7ef496c9a879af8d87a9d0726fa650ab383 | [local support] local filestore rsync intermediate folders creation
Also add tests for this behavior.
Related: | [
{
"change_type": "MODIFY",
"old_path": "common/local_filestore.py",
"new_path": "common/local_filestore.py",
"diff": "@@ -73,6 +73,11 @@ def rsync( # pylint: disable=too-many-arguments\ndefaults that can be overriden.\"\"\"\n# Add check to behave like `gsutil.rsync`.\nassert os.path.isdir(source), '... | Python | Apache License 2.0 | google/fuzzbench | [local support] local filestore rsync intermediate folders creation (#440)
Also add tests for this behavior.
Related: #251 |
258,388 | 16.06.2020 09:42:08 | 25,200 | 648a6969a00e89efa90aab7b150d63bb0a6ec8b6 | Add PHP benchmark to service
Add PHP benchmark to service | [
{
"change_type": "MODIFY",
"old_path": "service/automatic_run_experiment.py",
"new_path": "service/automatic_run_experiment.py",
"diff": "@@ -55,6 +55,7 @@ BENCHMARKS = [\n'libpcap_fuzz_both',\n'mbedtls_fuzz_dtlsclient',\n'openssl_x509',\n+ 'php_php-fuzz-parser',\n'sqlite3_ossfuzz',\n'systemd_fuzz-l... | Python | Apache License 2.0 | google/fuzzbench | Add PHP benchmark to service (#443)
Add PHP benchmark to service |
258,399 | 16.06.2020 16:54:27 | 18,000 | 552c297719fe8f475ac7291f3585a93dd645f55f | [NFC] typo fix | [
{
"change_type": "MODIFY",
"old_path": "analysis/data_utils.py",
"new_path": "analysis/data_utils.py",
"diff": "@@ -132,7 +132,7 @@ _DEFAULT_FUZZER_SAMPLE_NUM_THRESHOLD = 0.8\ndef get_fuzzers_with_not_enough_samples(\nbenchmark_snapshot_df, threshold=_DEFAULT_FUZZER_SAMPLE_NUM_THRESHOLD):\n- \"\"\"R... | Python | Apache License 2.0 | google/fuzzbench | [NFC] typo fix (#446) |
258,399 | 16.06.2020 20:44:27 | 18,000 | 1ab6a11a1ae397cae494e4d04835340db3064fc7 | [NFC] rename `experiment_path.gcs` to `experiment_path.filestore`
Resolve | [
{
"change_type": "MODIFY",
"old_path": "common/experiment_path.py",
"new_path": "common/experiment_path.py",
"diff": "@@ -23,11 +23,11 @@ def path(*path_segments) -> Path:\nreturn Path(experiment_utils.get_work_dir(), *path_segments)\n-def gcs(path_obj: Path) -> str:\n- \"\"\"Returns a string with W... | Python | Apache License 2.0 | google/fuzzbench | [NFC] rename `experiment_path.gcs` to `experiment_path.filestore` (#451)
Resolve #447. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.