author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20 values | license stringclasses 3 values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
258,388 | 17.06.2020 11:21:59 | 25,200 | 61c487950a3ed84d54e8e94d2911e6392181e057 | Request new AFL++ experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-06-17\n+ fuzzers:\n+ - aflplusplus\n+ - ... | Python | Apache License 2.0 | google/fuzzbench | Request new AFL++ experiment (#454) |
258,399 | 17.06.2020 17:29:04 | 18,000 | 560f472e604954b2d1eda0d49c95d796cd77260f | local experiment support
Related to and | [
{
"change_type": "MODIFY",
"old_path": "experiment/conftest.py",
"new_path": "experiment/conftest.py",
"diff": "@@ -27,3 +27,14 @@ def experiment_config():\nwith open(config_filepath) as file_handle:\nreturn yaml.load(file_handle, yaml.SafeLoader)\n+\n+\n+@pytest.fixture\n+def local_experiment_confi... | Python | Apache License 2.0 | google/fuzzbench | local experiment support (#444)
Related to #251 and #8. |
258,388 | 17.06.2020 19:27:34 | 25,200 | 97efaa5bf342a06ddcf84eb0baa7809b1137e49c | Request another AFL++ experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-06-18\n+ fuzzers:\n+ - aflplusplus\n+ - ... | Python | Apache License 2.0 | google/fuzzbench | Request another AFL++ experiment (#460) |
258,399 | 18.06.2020 12:24:32 | 18,000 | c40344d85cb128a639eeacfc5b6e884d1f3e4a3a | [NFC] `handle_preemptible` never True for local running
Related to | [
{
"change_type": "MODIFY",
"old_path": "experiment/scheduler.py",
"new_path": "experiment/scheduler.py",
"diff": "@@ -598,14 +598,16 @@ def schedule_loop(experiment_config: dict):\nhandle_preempted = False\nwhile not all_trials_ended(experiment):\ntry:\n- schedule(experiment_config, pool)\n- if not ... | Python | Apache License 2.0 | google/fuzzbench | [NFC] `handle_preemptible` never True for local running (#464)
Related to #444 |
258,399 | 19.06.2020 16:54:31 | 18,000 | c3ae4db58f60c182efe9e97204247575b0b44661 | Add `expect_zero` back for filestore_utils.cp
Fix | [
{
"change_type": "MODIFY",
"old_path": "common/filestore_utils.py",
"new_path": "common/filestore_utils.py",
"diff": "@@ -37,12 +37,15 @@ def get_impl():\nreturn local_filestore\n-def cp(source, destination, recursive=False, parallel=False): # pylint: disable=invalid-name\n- \"\"\"Copies |source| to... | Python | Apache License 2.0 | google/fuzzbench | Add `expect_zero` back for filestore_utils.cp (#466)
Fix #449. |
258,399 | 19.06.2020 17:18:02 | 18,000 | 7805093436f36ddaef155da8b045da2b57ec02b2 | remove shared_volume
Fix `coverage_binaries` will store under `experiment_filestore/experiment_name/`. | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/local_build.py",
"new_path": "experiment/build/local_build.py",
"diff": "\"\"\"Module for building things on Google Cloud Build for use in trials.\"\"\"\nimport os\n-import posixpath\nfrom typing import Tuple\nfrom common import benchmark_util... | Python | Apache License 2.0 | google/fuzzbench | remove shared_volume (#462)
Fix #457. `coverage_binaries` will store under `experiment_filestore/experiment_name/`. |
258,399 | 22.06.2020 11:17:53 | 18,000 | bb9076c9f1cb80f5ab55287cc42c7ed4a1df8c56 | [NFC] minor comment fix | [
{
"change_type": "MODIFY",
"old_path": "common/filestore_utils.py",
"new_path": "common/filestore_utils.py",
"diff": "@@ -39,8 +39,8 @@ def get_impl():\ndef cp(source, destination, recursive=False, parallel=False, expect_zero=True): # pylint: disable=invalid-name\n\"\"\"Copies |source| to |destinati... | Python | Apache License 2.0 | google/fuzzbench | [NFC] #466 minor comment fix (#475) |
258,399 | 22.06.2020 13:41:35 | 18,000 | ca24c304439466eab8331b1ba5bd5aaad76a58e8 | sql query optimization
Remove set construction. | [
{
"change_type": "MODIFY",
"old_path": "experiment/measurer.py",
"new_path": "experiment/measurer.py",
"diff": "@@ -570,11 +570,12 @@ def measure_snapshot_coverage(fuzzer: str, benchmark: str, trial_num: int,\ndef set_up_coverage_binaries(pool, experiment):\n\"\"\"Set up coverage binaries for all be... | Python | Apache License 2.0 | google/fuzzbench | sql query optimization (#469)
Remove set construction. |
258,388 | 22.06.2020 13:37:46 | 25,200 | 7d8527cbded8d0280cbed461058a7b89beb935cd | [woff2] Fix seeds
Use seeds from OSS-Fuzz instead of getting them manually
(and incorrectly).
Fixes | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/woff2-2016-05-06/build.sh",
"new_path": "benchmarks/woff2-2016-05-06/build.sh",
"diff": "@@ -22,10 +22,13 @@ apt-get update && \\\nautoconf \\\nlibtool\n+# Get seeds.\n+get_git_revision https://github.com/google/oss-fuzz.git e8ffee4077b59e35824a2e97... | Python | Apache License 2.0 | google/fuzzbench | [woff2] Fix seeds (#477)
Use seeds from OSS-Fuzz instead of getting them manually
(and incorrectly).
Fixes #463 |
258,399 | 24.06.2020 13:24:22 | 18,000 | b16c35cb5e819c8d025a6857e7266b457ae5b889 | remove `cloud_project` requirement for local run; add `docker_registry` as a required option for both settings
Fix related to and | [
{
"change_type": "MODIFY",
"old_path": "common/benchmark_utils.py",
"new_path": "common/benchmark_utils.py",
"diff": "import os\nimport re\n-from common import experiment_utils\nfrom common import fuzzer_utils\nfrom common import logs\nfrom common import oss_fuzz\n@@ -45,21 +44,18 @@ def get_fuzz_ta... | Python | Apache License 2.0 | google/fuzzbench | remove `cloud_project` requirement for local run; add `docker_registry` as a required option for both settings (#461)
Fix #445, related to #251 and #444. |
258,399 | 24.06.2020 15:08:25 | 18,000 | c08d2a131d510ce4e20a213003bb2de637d2314d | update service/experiment_config.yaml | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-config.yaml",
"new_path": "service/experiment-config.yaml",
"diff": "trials: 20\nmax_total_time: 82800 # 23 hours, the default time for preemptible experiments.\ncloud_project: fuzzbench\n+docker_registry: gcr.io/fuzzbench\ncloud_compute_zon... | Python | Apache License 2.0 | google/fuzzbench | update service/experiment_config.yaml (#485) |
258,388 | 25.06.2020 10:36:21 | 25,200 | f50e978cec3e060a7f446fe9d5d09a5c46f177c1 | [docs] Improve docs-serve and fix link
[docs] Improve docs-serve and fix link
1. Make sure dependencies are installed when using docs-serve
2. Fix link to customizing reports from report reference page. | [
{
"change_type": "MODIFY",
"old_path": "Makefile",
"new_path": "Makefile",
"diff": "@@ -42,7 +42,10 @@ lint: install-dependencies\ntypecheck: install-dependencies\nsource ${VENV_ACTIVATE} && python3 presubmit.py typecheck\n-docs-serve:\n+install-docs-dependencies: docs/Gemfile.lock\n+ cd docs && bun... | Python | Apache License 2.0 | google/fuzzbench | [docs] Improve docs-serve and fix link (#487)
[docs] Improve docs-serve and fix link
1. Make sure dependencies are installed when using docs-serve
2. Fix link to customizing reports from report reference page. |
258,388 | 26.06.2020 17:59:42 | 25,200 | bec1bdd7046fdda2a7fbc90dbbbbcd2d124e1995 | Request experiment for AFL++ and entropic | [
{
"change_type": "MODIFY",
"old_path": "presubmit.py",
"new_path": "presubmit.py",
"diff": "@@ -260,8 +260,9 @@ def validate_experiment_requests(paths: List[Path]):\nautomatic_run_experiment.REQUESTED_EXPERIMENTS_PATH)\nreturn False\n+ # Only validate the latest request.\nresult = automatic_run_expe... | Python | Apache License 2.0 | google/fuzzbench | Request experiment for AFL++ and entropic (#490) |
258,388 | 30.06.2020 14:48:46 | 25,200 | a4378dc95968c55758a3a6aa19979ad1b04b97ce | Reqeust experiment qemu mode fuzzers and aflplusplus_optimal_shmem | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-06-30\n+ fuzzers:\n+ - aflplusplus_qemu\... | Python | Apache License 2.0 | google/fuzzbench | Reqeust experiment qemu mode fuzzers and aflplusplus_optimal_shmem (#495) |
258,388 | 01.07.2020 10:16:57 | 25,200 | 71f5082fc9740d4a217633e7588f250aa7f1d4e3 | [NFC] Cleanup (mostly comments) in fuzzer integrations.
Clean up (mostly comments) in fuzzer integrations.
Integrations get copied so stale comments and other small nits
multiply. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -32,7 +32,7 @@ jobs:\n- libfuzzer_nocmp\n- manul\n- mopt\n- # Greybox fuzzers\n+ # Binary-only (greybox) fuzzers.\n- eclipser\n- afl_qemu\n- aflplusplus_qemu\n"
},
{
... | Python | Apache License 2.0 | google/fuzzbench | [NFC] Cleanup (mostly comments) in fuzzer integrations. (#496)
Clean up (mostly comments) in fuzzer integrations.
Integrations get copied so stale comments and other small nits
multiply. |
258,388 | 09.07.2020 14:05:00 | 25,200 | 4e905184736152341d340fbeccf6c6b19e29c548 | Use a startup script for launching the dispatcher
Using ssh is hacky and error prone. Use a startup script instead.
This will also help with servicification as run_experiment.py will finish immediately after an experiment is started.
Fixes and | [
{
"change_type": "MODIFY",
"old_path": "common/gcloud.py",
"new_path": "common/gcloud.py",
"diff": "import enum\nimport subprocess\n-import time\nfrom typing import List\nfrom common import experiment_utils\n-from common import logs\nfrom common import new_process\n# Constants for dispatcher specs.\... | Python | Apache License 2.0 | google/fuzzbench | Use a startup script for launching the dispatcher (#489)
Using ssh is hacky and error prone. Use a startup script instead.
This will also help with servicification as run_experiment.py will finish immediately after an experiment is started.
Fixes #361 and #486 |
258,388 | 09.07.2020 19:09:17 | 25,200 | bf11656eef7832b4d773d81532172e2312e70001 | Request new aflplusplus experiment
Request new aflplusplus experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-07-09\n+ fuzzers:\n+ - aflplusplus_lto_d... | Python | Apache License 2.0 | google/fuzzbench | Request new aflplusplus experiment (#511)
Request new aflplusplus experiment |
258,388 | 10.07.2020 12:11:43 | 25,200 | aba7f1dad6141f1ca53e7be54f994e893514cc28 | Install dependencies in seperate step.
This should make output of failures easier to read. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/presubmit.yml",
"new_path": ".github/workflows/presubmit.yml",
"diff": "@@ -10,10 +10,16 @@ jobs:\n- run: | # Needed for presubmit to work.\ngit fetch origin master --depth 1\ngit symbolic-ref refs/remotes/origin/HEAD refs/remotes/origin/mast... | Python | Apache License 2.0 | google/fuzzbench | Install dependencies in seperate step. (#517)
This should make output of failures easier to read. |
258,388 | 10.07.2020 12:17:32 | 25,200 | d46a990810dd1105386f9c3e3388d4d374c8b031 | Don't stop experiment in automatic_run_experiment
Don't stop experiment in automatic_run_experiment
After landed
run_experiment will exit after starting the dispatcher, not after
the experiment terminates. Stopping the experiment immediately after
starting the experiment isn't what we want. | [
{
"change_type": "MODIFY",
"old_path": "service/automatic_run_experiment.py",
"new_path": "service/automatic_run_experiment.py",
"diff": "@@ -29,7 +29,6 @@ from common import yaml_utils\nfrom database import models\nfrom database import utils as db_utils\nfrom experiment import run_experiment\n-from... | Python | Apache License 2.0 | google/fuzzbench | Don't stop experiment in automatic_run_experiment (#514)
Don't stop experiment in automatic_run_experiment
After https://github.com/google/fuzzbench/pull/489 landed
run_experiment will exit after starting the dispatcher, not after
the experiment terminates. Stopping the experiment immediately after
starting the experiment isn't what we want. |
258,388 | 13.07.2020 12:24:05 | 25,200 | 60eee494f2d7d4142ee7a19df7891a3cef3921ce | Remove some blockers for Python3.8 support.
Remove some blockers for Python3.8 support.
1. Only use pytype on 3.7 since it doesn't work on 3.8+
2. Skip a test that hangs if not on Python3.7.
Also, mark a test as "slow" instead of "long" and register the marker
to avoid getting the warnings. | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/test_builder.py",
"new_path": "experiment/build/test_builder.py",
"diff": "import itertools\nimport os\n+import sys\nfrom unittest import mock\nimport pytest\n@@ -62,7 +63,8 @@ def get_benchmarks_or_fuzzers(benchmarks_or_fuzzers_directory, fil... | Python | Apache License 2.0 | google/fuzzbench | Remove some blockers for Python3.8 support. (#516)
Remove some blockers for Python3.8 support.
1. Only use pytype on 3.7 since it doesn't work on 3.8+
2. Skip a test that hangs if not on Python3.7.
Also, mark a test as "slow" instead of "long" and register the marker
to avoid getting the warnings. |
258,388 | 14.07.2020 08:44:19 | 25,200 | 5e742da97d1544e93b155c12f0ae2a7a6cbc6452 | [service] Use automatic report merging | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-config.yaml",
"new_path": "service/experiment-config.yaml",
"diff": "@@ -11,3 +11,10 @@ experiment_filestore: gs://fuzzbench-data\nreport_filestore: gs://www.fuzzbench.com/reports\ncloud_sql_instance_connection_name: \"fuzzbench:us-central1:... | Python | Apache License 2.0 | google/fuzzbench | [service] Use automatic report merging (#525) |
258,388 | 14.07.2020 08:44:38 | 25,200 | 008421a5c2d4cb4815b06fc6eb94715ca522107d | [experiment-requests] New AFL++ variant experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-07-13\n+ fuzzers:\n+ - aflplusplus_ctx_d... | Python | Apache License 2.0 | google/fuzzbench | [experiment-requests] New AFL++ variant experiment (#526) |
258,388 | 14.07.2020 10:03:48 | 25,200 | c983645e2d3f2e72183d0d54afc8dfd8bb189c16 | [service] Fix issues with bash script | [
{
"change_type": "MODIFY",
"old_path": "service/run.bash",
"new_path": "service/run.bash",
"diff": "@@ -22,6 +22,8 @@ expriment_working_dir=/tmp/fuzzbench-automatic-experiment-working-dir\nrepo_path=/tmp/fuzzbench-automatic-experiment-repo\nrm -rf $repo_path $expriment_working_dir\n+mkdir $expriment... | Python | Apache License 2.0 | google/fuzzbench | [service] Fix issues with bash script (#528) |
258,388 | 14.07.2020 12:16:16 | 25,200 | 88d5aba08bbaea0b015143232039db2c733269e7 | [benchmarks][libxml2-v2.9.2] Fix broken build
Fix broken build by ignoring git's unhelpful conversion of CRLF to LF. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/libxml2-v2.9.2/build.sh",
"new_path": "benchmarks/libxml2-v2.9.2/build.sh",
"diff": "@@ -33,7 +33,15 @@ build_lib() {\n)\n}\n-get_git_tag https://gitlab.gnome.org/GNOME/libxml2.git v2.9.2 SRC\n+git clone https://gitlab.gnome.org/GNOME/libxml2.git SR... | Python | Apache License 2.0 | google/fuzzbench | [benchmarks][libxml2-v2.9.2] Fix broken build (#531)
Fix broken build by ignoring git's unhelpful conversion of CRLF to LF. |
258,388 | 14.07.2020 12:17:11 | 25,200 | 581a41edfdd75d83983a608e0f71c463efc69f97 | [service] Cleanup run bash script and add setup script for initialization | [
{
"change_type": "MODIFY",
"old_path": "service/run.bash",
"new_path": "service/run.bash",
"diff": "# See the License for the specific language governing permissions and\n# limitations under the License.\n-# Use this script to clone a new copy of fuzzbench and run a diff experiment.\n+# Use this scr... | Python | Apache License 2.0 | google/fuzzbench | [service] Cleanup run bash script and add setup script for initialization (#533) |
258,388 | 14.07.2020 13:58:38 | 25,200 | 64de6d7bf32296fc3309c28437026bcd807f4483 | [service] Fix nits | [
{
"change_type": "MODIFY",
"old_path": "service/run.bash",
"new_path": "service/run.bash",
"diff": "# Use a seperate working directory to run the experiment so we don't pollute\n# the source code with the config directory created by run_experiment.py\n-expriment_working_dir=/tmp/fuzzbench-automatic-... | Python | Apache License 2.0 | google/fuzzbench | [service] Fix nits (#534) |
258,396 | 17.07.2020 03:33:58 | 0 | 140e69107d725611290a05d6369f159337d61bdf | Use libFuzzer that supports interceptors for memcmp-like functions without ASan | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/libfuzzer/builder.Dockerfile",
"new_path": "fuzzers/libfuzzer/builder.Dockerfile",
"diff": "@@ -17,7 +17,7 @@ FROM $parent_image\nRUN git clone https://github.com/llvm/llvm-project.git /llvm-project && \\\ncd /llvm-project/ && \\\n- git checkout d8981c... | Python | Apache License 2.0 | google/fuzzbench | Use libFuzzer that supports interceptors for memcmp-like functions without ASan (#549) |
258,388 | 20.07.2020 12:49:18 | 25,200 | 7cb2023a669ecb178b414fef3bc2b5201f973c98 | [libFuzzer] Request experiment for libFuzzer changes in | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-07-20\n+ fuzzers:\n+ - libfuzzer\n+\n- e... | Python | Apache License 2.0 | google/fuzzbench | [libFuzzer] Request experiment for libFuzzer changes in #549 (#552) |
258,388 | 20.07.2020 13:44:07 | 25,200 | b7443c6364049884fd6a2d4d53ac003252494960 | Make experiments private by default.
For the most part all nonprivate experiments are run by the service
which explicitly makes them nonprivate. So private should be the
default since most other experiments are not ones I want to
be merged into other experiments. | [
{
"change_type": "MODIFY",
"old_path": "experiment/dispatcher.py",
"new_path": "experiment/dispatcher.py",
"diff": "@@ -59,7 +59,7 @@ def _initialize_experiment_in_db(experiment_config: dict,\ndb_utils.get_or_create(models.Experiment,\nname=experiment_config['experiment'],\ngit_hash=experiment_confi... | Python | Apache License 2.0 | google/fuzzbench | Make experiments private by default. (#554)
For the most part all nonprivate experiments are run by the service
which explicitly makes them nonprivate. So private should be the
default since most other experiments are not ones I want to
be merged into other experiments. |
258,388 | 20.07.2020 15:29:24 | 25,200 | d9cda8ba5ee7ff5563d11c2b9ca613df138f6f4f | [service] Make service ready for external users
1. Document service for external users.
2. Document service for FuzzBench maintainers.
3. Include a copy of the service's crontab.
4. Output stdout/stderr of cron job to a file. | [
{
"change_type": "MODIFY",
"old_path": "docs/faq.md",
"new_path": "docs/faq.md",
"diff": "---\nlayout: default\ntitle: FAQ\n-has_children: true\n+has_children: false\nnav_order: 6\npermalink: /faq/\n---\n"
},
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/adding_a_new_fuzze... | Python | Apache License 2.0 | google/fuzzbench | [service] Make service ready for external users (#553)
1. Document service for external users.
2. Document service for FuzzBench maintainers.
3. Include a copy of the service's crontab.
4. Output stdout/stderr of cron job to a file. |
258,388 | 21.07.2020 10:17:03 | 25,200 | 5db871f65c312d4b2cedf16bd7ac2c6311987b26 | [GCB] Fix image tagging
Don't add two tags in a single command. One is sufficient and two
is an error. | [
{
"change_type": "MODIFY",
"old_path": "docker/gcb/coverage.yaml",
"new_path": "docker/gcb/coverage.yaml",
"diff": "@@ -31,10 +31,10 @@ steps:\n# Use two tags so that the image builds properly and we can push it to the\n# correct location.\n'--tag',\n- 'gcr.io/fuzzbench/builders/coverage:${_EXPERIME... | Python | Apache License 2.0 | google/fuzzbench | [GCB] Fix image tagging (#561)
Don't add two tags in a single command. One is sufficient and two
is an error. |
258,399 | 22.07.2020 12:30:48 | 18,000 | 0198c184f30738109ce436b2394ddb68519de16c | Job dependency test | [
{
"change_type": "RENAME",
"old_path": "fuzzbench/fake_jobs.py",
"new_path": "fuzzbench/jobs.py",
"diff": "# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n# See the License for the specific language governing permissions and\n# limitations under the License.\n-\"\"\"Fake ... | Python | Apache License 2.0 | google/fuzzbench | Job dependency test (#548) |
258,396 | 23.07.2020 01:04:10 | 0 | 17959e39a2b00b239e8c4e0edbeced31536e50cc | [libFuzzer] Add -fno-builtin flags to disable optimizing calls to memcmp-like functions | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/libfuzzer/fuzzer.py",
"new_path": "fuzzers/libfuzzer/fuzzer.py",
"diff": "@@ -25,6 +25,18 @@ def build():\n# /usr/lib/libFuzzer.a as the FUZZER_LIB for the main fuzzing binary. This\n# allows us to link against a version of LibFuzzer that we specify.\n... | Python | Apache License 2.0 | google/fuzzbench | [libFuzzer] Add -fno-builtin flags to disable optimizing calls to memcmp-like functions (#571) |
258,388 | 24.07.2020 15:21:44 | 25,200 | 86a64bc4d523a5ff11cca529d34e3e5886913b71 | Eliminate OSS-Fuzz runner.
It's the same thing as benchmark-runner. | [
{
"change_type": "MODIFY",
"old_path": "docker/gcb/oss-fuzz-fuzzer.yaml",
"new_path": "docker/gcb/oss-fuzz-fuzzer.yaml",
"diff": "@@ -175,7 +175,7 @@ steps:\n'benchmark=${_BENCHMARK}',\n'--file',\n- 'docker/oss-fuzz-runner/Dockerfile',\n+ 'docker/benchmark-runner/Dockerfile',\n'.',\n]\n"
},
{
... | Python | Apache License 2.0 | google/fuzzbench | Eliminate OSS-Fuzz runner. (#582)
It's the same thing as benchmark-runner. |
258,396 | 27.07.2020 21:42:42 | 0 | d012101bcfc2141ff214fb617ec488f74d5a5632 | [libFuzzer] Update libFuzzer.a version | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/libfuzzer/builder.Dockerfile",
"new_path": "fuzzers/libfuzzer/builder.Dockerfile",
"diff": "@@ -17,7 +17,7 @@ FROM $parent_image\nRUN git clone https://github.com/llvm/llvm-project.git /llvm-project && \\\ncd /llvm-project/ && \\\n- git checkout 12d112... | Python | Apache License 2.0 | google/fuzzbench | [libFuzzer] Update libFuzzer.a version (#596) |
258,399 | 28.07.2020 15:00:22 | 18,000 | 6090e47d0319ffa4e820885592d653d9b2aa0487 | [NFC] update current jobs status reporting info | [
{
"change_type": "MODIFY",
"old_path": "fuzzbench/run_experiment.py",
"new_path": "fuzzbench/run_experiment.py",
"diff": "@@ -46,8 +46,14 @@ def run_experiment():\nwhile True:\nprint('Current status of jobs:')\n+ print('\\tqueued:\\t%d' % queue.count)\n+ print('\\tstarted:\\t%d' % queue.started_job_... | Python | Apache License 2.0 | google/fuzzbench | [NFC] update current jobs status reporting info (#588) |
258,399 | 28.07.2020 16:12:07 | 18,000 | 94e3c0aeb82c3503b77fb8e5aaf4894e5c10131b | add stop logic: docker-compose down | [
{
"change_type": "MODIFY",
"old_path": "Makefile",
"new_path": "Makefile",
"diff": "# Running experiments locally.\n-run-experiment: export COMPOSE_PROJECT_NAME := fuzzbench\n-run-experiment: export COMPOSE_FILE := compose/fuzzbench.yaml\n+run-experiment stop-experiment: export COMPOSE_PROJECT_NAME ... | Python | Apache License 2.0 | google/fuzzbench | add stop logic: docker-compose down (#600) |
258,396 | 28.07.2020 22:58:05 | 0 | 28d27f34449204712a6f57a8ddf64ef419996ef5 | Request 2020-07-28 experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-07-28\n+ fuzzers:\n+ - afl\n+ - honggfuz... | Python | Apache License 2.0 | google/fuzzbench | Request 2020-07-28 experiment (#604) |
258,371 | 29.07.2020 00:27:01 | 14,400 | 486c708f1d0f03de85e9e6a7c91360f97f3e8f24 | Store specific coverage data in the end of measuring. | [
{
"change_type": "MODIFY",
"old_path": "experiment/dispatcher.py",
"new_path": "experiment/dispatcher.py",
"diff": "@@ -133,18 +133,16 @@ def dispatcher_main():\nargs=(experiment.config,))\nscheduler_loop_thread.start()\n- max_total_time = experiment.config['max_total_time']\n- measurer_loop_process... | Python | Apache License 2.0 | google/fuzzbench | Store specific coverage data in the end of measuring. (#595) |
258,388 | 30.07.2020 10:19:50 | 25,200 | fadaaafbc2f3dc6c3c25acfac28161c6ccc0ebed | [GCB] Fix parent_image outside of FuzzBench cloud project
GCB was broken on non-FuzzBench cloud projects because experiment
tagging meant that certain images were no longer tagged the way
they were passed as parent_image. | [
{
"change_type": "MODIFY",
"old_path": "docker/gcb/coverage.yaml",
"new_path": "docker/gcb/coverage.yaml",
"diff": "@@ -101,7 +101,7 @@ steps:\n'${_REPO}/builders/coverage/${_BENCHMARK}',\n'--build-arg',\n- 'parent_image=${_REPO}/builders/coverage/${_BENCHMARK}-intermediate',\n+ 'parent_image=gcr.io... | Python | Apache License 2.0 | google/fuzzbench | [GCB] Fix parent_image outside of FuzzBench cloud project (#612)
GCB was broken on non-FuzzBench cloud projects because experiment
tagging meant that certain images were no longer tagged the way
they were passed as parent_image. |
258,399 | 30.07.2020 17:07:24 | 18,000 | 6dcf2696f446338746b59de2892cb60bc775f5d4 | change worker mode | [
{
"change_type": "MODIFY",
"old_path": "compose/fuzzbench.yaml",
"new_path": "compose/fuzzbench.yaml",
"diff": "@@ -14,7 +14,8 @@ services:\nimage: fuzzbench\nenvironment:\nRQ_REDIS_URL: redis://queue-server\n- command: rq worker --burst\n+ PYTHONPATH: .\n+ command: python3 fuzzbench/worker.py\nvolu... | Python | Apache License 2.0 | google/fuzzbench | change worker mode (#585) |
258,370 | 31.07.2020 15:25:57 | 14,400 | 9f07002ccf8e7ef50a983d2d8921fcedbcd78a4a | Makefile build simplification using image definitions instead of text-template
Makefile build simplification using image definitions. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"new_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"diff": "@@ -77,6 +77,9 @@ def delete_docker_images():\nimage_ids = result.stdout.splitlines()\nsubprocess.run(['docker', 'rmi'... | Python | Apache License 2.0 | google/fuzzbench | Makefile build simplification using image definitions instead of text-template (#567)
Makefile build simplification using image definitions. |
258,396 | 31.07.2020 14:44:02 | 25,200 | 8b738d4e2a5a55ff9c5f11294546500e366e6384 | Add temporary libfuzzer/entropic variants for evaluating the impact of keeping all seed inputs. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -35,7 +35,9 @@ jobs:\n# temporary variants.\n- aflplusplus_havoc\n- libfuzzer_interceptors\n+ - libfuzzer_keepseed\n- entropic_interceptors\n+ - entropic_keepseed\nbenchma... | Python | Apache License 2.0 | google/fuzzbench | Add temporary libfuzzer/entropic variants for evaluating the impact of keeping all seed inputs. (#614) |
258,371 | 03.08.2020 19:25:45 | 14,400 | 96c0ccd7893e8fb070de56b17644df9f8bba1717 | Use -summary-only flag for coverage measuring | [
{
"change_type": "MODIFY",
"old_path": "experiment/measurer.py",
"new_path": "experiment/measurer.py",
"diff": "@@ -163,6 +163,7 @@ def get_covered_region(experiment: str, fuzzer: str, benchmark: str,\n})\nsnapshot_measurer = SnapshotMeasurer(fuzzer, benchmark, trial_id,\nsnapshot_logger)\n+ snapsho... | Python | Apache License 2.0 | google/fuzzbench | Use -summary-only flag for coverage measuring (#622) |
258,388 | 04.08.2020 15:58:28 | 25,200 | da808b6b3c4798522f60e5683e8aba3cfa842c77 | Fix make debug- | [
{
"change_type": "MODIFY",
"old_path": "docker/generate_makefile.py",
"new_path": "docker/generate_makefile.py",
"diff": "@@ -58,7 +58,7 @@ def _print_makefile_run_template(image):\nif run_type == 'test-run':\nprint('\\t-e MAX_TOTAL_TIME=20 \\\\\\n\\t-e SNAPSHOT_PERIOD=10 \\\\')\nif run_type == 'deb... | Python | Apache License 2.0 | google/fuzzbench | Fix make debug- (#628) |
258,370 | 05.08.2020 11:37:53 | 14,400 | 6058b6c0433a5ce82e4b4f20af65e28dc90700fb | Fix Make issue: Ctrl-C out of run-benchmark | [
{
"change_type": "MODIFY",
"old_path": "docker/generate_makefile.py",
"new_path": "docker/generate_makefile.py",
"diff": "@@ -59,6 +59,8 @@ def _print_makefile_run_template(image):\nprint('\\t-e MAX_TOTAL_TIME=20 \\\\\\n\\t-e SNAPSHOT_PERIOD=10 \\\\')\nif run_type == 'debug':\nprint('\\t--entrypoint... | Python | Apache License 2.0 | google/fuzzbench | Fix Make issue: Ctrl-C out of run-benchmark (#630) |
258,388 | 05.08.2020 08:42:14 | 25,200 | 43b38e82633717b6e1d5b5e04d811f33b3aabb01 | [CI] Cache Python packages
Transient pip install errors are a large source of spurious CI
failures. Most of these seem to be related to downloading packages.
Caching should therefore cutdown on a lot of spurious CI failures.
Caching also speeds up CI by ~10 seconds. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -66,6 +66,20 @@ jobs:\nwith:\npython-version: 3.7\n+ # Copied from:\n+ # https://docs.github.com/en/actions/language-and-framework-guides/using-python-with-github-actions\... | Python | Apache License 2.0 | google/fuzzbench | [CI] Cache Python packages (#631)
Transient pip install errors are a large source of spurious CI
failures. Most of these seem to be related to downloading packages.
Caching should therefore cutdown on a lot of spurious CI failures.
Caching also speeds up CI by ~10 seconds. |
258,388 | 05.08.2020 19:20:07 | 25,200 | cdeebaa3c47299231b8fd4fa42f7d139841b3e72 | Support running experiments without seeds or dictionaries.
This adds two new flags to run_experiment: --no-seeds and --no-dictionaries.
When passed, they cause trials run as part of the experiment not to use seed corpus files or dictionaries (respectively) even if they are provided by the benchmark.
Fixes | [
{
"change_type": "MODIFY",
"old_path": "experiment/resources/runner-startup-script-template.sh",
"new_path": "experiment/resources/runner-startup-script-template.sh",
"diff": "@@ -36,6 +36,8 @@ docker run \\\n-e EXPERIMENT={{experiment}} \\\n-e TRIAL_ID={{trial_id}} \\\n-e MAX_TOTAL_TIME={{max_total... | Python | Apache License 2.0 | google/fuzzbench | Support running experiments without seeds or dictionaries. (#633)
This adds two new flags to run_experiment: --no-seeds and --no-dictionaries.
When passed, they cause trials run as part of the experiment not to use seed corpus files or dictionaries (respectively) even if they are provided by the benchmark.
Fixes #127 |
258,388 | 06.08.2020 09:33:50 | 25,200 | 519113937a43d79b33ec14b1537f8babdd83e1c6 | Fix issue with presubmit in CI
Fixes the failures occurring here:
Basically, somehow the branch we are on became shallow, so make it unshallow in order to diff it against origin/master | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -60,7 +60,7 @@ jobs:\nsteps:\n- uses: actions/checkout@v2\n- run: | # Needed for git diff to work.\n- git fetch origin master --depth 1\n+ git fetch origin master --unshal... | Python | Apache License 2.0 | google/fuzzbench | Fix issue with presubmit in CI (#636)
Fixes the failures occurring here: https://github.com/google/fuzzbench/pull/632/checks?check_run_id=954303324
Basically, somehow the branch we are on became shallow, so make it unshallow in order to diff it against origin/master |
258,370 | 06.08.2020 13:44:19 | 14,400 | a0fb95b518cb727f58d21c8fe96592c7249a0ec3 | Use single source of truth for building images for Local and GCB build systems | [
{
"change_type": "MODIFY",
"old_path": "docker/gcb/base-images.yaml",
"new_path": "docker/gcb/base-images.yaml",
"diff": "# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n# See the License for the specific language governing permissions and\n# limitations under the License... | Python | Apache License 2.0 | google/fuzzbench | Use single source of truth for building images for Local and GCB build systems (#615) |
258,370 | 07.08.2020 16:24:01 | 14,400 | b431926ac716b378b416725956c3b801cb5f6e6d | Test fix - BuildKit Fails on CI
Fix | [
{
"change_type": "MODIFY",
"old_path": "docker/benchmark-runner/Dockerfile",
"new_path": "docker/benchmark-runner/Dockerfile",
"diff": "@@ -54,13 +54,15 @@ ENV WORKDIR /out\nRUN mkdir -p $WORKDIR\nWORKDIR $WORKDIR\n+# The argument needs to be re-declared otherwise it returns an empty string.\n+ARG f... | Python | Apache License 2.0 | google/fuzzbench | Test fix - BuildKit Fails on CI (#632)
Fix |
258,396 | 07.08.2020 19:28:29 | 25,200 | 8d4cb49cee270687f4222c2e97815a5e2786e7ca | [libFuzzer] Add (libfuzzer|entropic)_fixcrossover variants to test whether fixing CrossOver mutator gives an average input size decrease (and perhaps a throughput increase). | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -46,8 +46,10 @@ jobs:\n- aflplusplus_seek\n- libfuzzer_interceptors\n- libfuzzer_keepseed\n+ - libfuzzer_fixcrossover\n- entropic_interceptors\n- entropic_keepseed\n+ - en... | Python | Apache License 2.0 | google/fuzzbench | [libFuzzer] Add (libfuzzer|entropic)_fixcrossover variants to test whether fixing CrossOver mutator gives an average input size decrease (and perhaps a throughput increase). (#644) |
258,399 | 09.08.2020 21:33:44 | 18,000 | 60a994829c1abc5a38ebaf0a8f4d111b817d9a30 | Add default end to end test config file for testing; prepare for config validation refactoring
The initial version for enqueuing and working image building jobs in the new arch. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/presubmit.yml",
"new_path": ".github/workflows/presubmit.yml",
"diff": "@@ -37,4 +37,7 @@ jobs:\n- name: Run presubmit checks\nrun: |\nFUZZBENCH_TEST_INTEGRATION=1 make presubmit\n- # TODO(zhichengcai): Add back end to end test.\n+\n+ - name:... | Python | Apache License 2.0 | google/fuzzbench | Add default end to end test config file for testing; prepare for config validation refactoring (#550)
The initial version for enqueuing and working image building jobs in the new arch. |
258,388 | 09.08.2020 21:23:20 | 25,200 | c730a34cfaca8c3661103e04b88bf002b6ba9eb4 | [docs] Update gem dependency kramdown | [
{
"change_type": "MODIFY",
"old_path": "docs/Gemfile.lock",
"new_path": "docs/Gemfile.lock",
"diff": "@@ -67,7 +67,7 @@ GEM\njekyll-theme-time-machine (= 0.1.1)\njekyll-titles-from-headings (= 0.5.3)\njemoji (= 0.11.1)\n- kramdown (= 1.17.0)\n+ kramdown (= 2.3.0)\nliquid (= 4.0.3)\nmercenary (~> 0.3... | Python | Apache License 2.0 | google/fuzzbench | [docs] Update gem dependency kramdown (#649) |
258,388 | 10.08.2020 08:10:43 | 25,200 | 8d9452fc5468905616d5bfc839eae08895cdd039 | [docs] Run `bundle update github-pages`
We need to run this to use the new version of kramdown. | [
{
"change_type": "MODIFY",
"old_path": "docs/Gemfile.lock",
"new_path": "docs/Gemfile.lock",
"diff": "GEM\nremote: https://rubygems.org/\nspecs:\n- activesupport (6.0.3.1)\n+ activesupport (6.0.3.2)\nconcurrent-ruby (~> 1.0, >= 1.0.2)\ni18n (>= 0.7, < 2)\nminitest (~> 5.1)\n@@ -16,9 +16,9 @@ GEM\nco... | Python | Apache License 2.0 | google/fuzzbench | [docs] Run `bundle update github-pages` (#652)
We need to run this to use the new version of kramdown. |
258,371 | 10.08.2020 14:43:09 | 14,400 | 127e5816148761db3633fa8ed55127629ab4ecc0 | Generate coverage reports. | [
{
"change_type": "MODIFY",
"old_path": "analysis/benchmark_results.py",
"new_path": "analysis/benchmark_results.py",
"diff": "@@ -58,6 +58,12 @@ class BenchmarkResults: # pylint: disable=too-many-public-methods\ndef _benchmark_snapshot_df(self):\nreturn data_utils.get_benchmark_snapshot(self._benchm... | Python | Apache License 2.0 | google/fuzzbench | Generate coverage reports. (#618) |
258,388 | 11.08.2020 13:22:20 | 25,200 | c014024a2c5a3c154595a01530939abee6e0f342 | Fix issue with multiple mounts and don't pull images in CI anymore | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"new_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"diff": "@@ -52,11 +52,9 @@ STANDARD_BENCHMARKS = {\ndef get_make_targets(benchmarks, fuzzer):\n- \"\"\"Return pull and test ta... | Python | Apache License 2.0 | google/fuzzbench | Fix issue with multiple mounts and don't pull images in CI anymore (#660) |
258,396 | 12.08.2020 10:23:18 | 25,200 | 7f83f9821d68a43428efadd9652321ecb6c15114 | An experiment request of libFuzzer CrossOver fix with dictionaries | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# are still testing this feature. You should request an experiment by contacting\n# us as you normally do.\n+- experiment: 2020-08-14\n+ fuzzers:\n+ - libfuzzer_fixcros... | Python | Apache License 2.0 | google/fuzzbench | An experiment request of libFuzzer CrossOver fix with dictionaries (#668) |
258,396 | 12.08.2020 16:53:25 | 25,200 | ce391a80df984be3abfd03bcaa3124f6ec395177 | Rebase libfuzzer/entropic's keepseed variants on fixcrossover variants | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/entropic_keepseed/builder.Dockerfile",
"new_path": "fuzzers/entropic_keepseed/builder.Dockerfile",
"diff": "ARG parent_image\nFROM $parent_image\n+COPY patch-crossover.diff /\nCOPY patch.diff /\nRUN git clone https://github.com/llvm/llvm-project.git /l... | Python | Apache License 2.0 | google/fuzzbench | Rebase libfuzzer/entropic's keepseed variants on fixcrossover variants (#669) |
258,396 | 15.08.2020 10:31:09 | 25,200 | e4004fa181446ae030212030418d0866d4256628 | Modify the patch for the libfuzzer/entropic's keepseed variants such that seed inputs are not replaced even if -reduce_inputs=1 | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/entropic_keepseed/fuzzer.py",
"new_path": "fuzzers/entropic_keepseed/fuzzer.py",
"diff": "@@ -27,4 +27,7 @@ def fuzz(input_corpus, output_corpus, target_binary):\nlibfuzzer_fuzzer.run_fuzzer(input_corpus,\noutput_corpus,\ntarget_binary,\n- extra_flags=... | Python | Apache License 2.0 | google/fuzzbench | Modify the patch for the libfuzzer/entropic's keepseed variants such that seed inputs are not replaced even if -reduce_inputs=1 (#678) |
258,371 | 15.08.2020 13:38:32 | 14,400 | d27bae7382e3863d9798b8342ad87bcfd4a119d7 | Differential graphs on report | [
{
"change_type": "MODIFY",
"old_path": "analysis/benchmark_results.py",
"new_path": "analysis/benchmark_results.py",
"diff": "@@ -17,10 +17,12 @@ import os\nimport functools\nfrom analysis import data_utils\n+from analysis import coverage_data_utils\nfrom analysis import stat_tests\n-class Benchmark... | Python | Apache License 2.0 | google/fuzzbench | Differential graphs on report (#657) |
258,388 | 17.08.2020 14:57:51 | 25,200 | 1f0ff440db47ff7216a7b96acceb9cd7d9dd2814 | [scheduler] Use instance api instead of operations to find preempted instances accurately
* [scheduler] Try using a query for terminated instances to find
the preempted instances.
The previous query for preemption operations seems to return incomplete
results in many-trial experiments.
* Complete fix with test fixes. | [
{
"change_type": "MODIFY",
"old_path": "common/gce.py",
"new_path": "common/gce.py",
"diff": "\"\"\"Module for using the Google Compute Engine (GCE) API.\"\"\"\nimport threading\n-import dateutil.parser\n-\nfrom googleapiclient import discovery\nfrom oauth2client.client import GoogleCredentials\n@@ ... | Python | Apache License 2.0 | google/fuzzbench | [scheduler] Use instance api instead of operations to find preempted instances accurately (#674)
* [scheduler] Try using a query for terminated instances to find
the preempted instances.
The previous query for preemption operations seems to return incomplete
results in many-trial experiments.
* Complete fix with test fixes.
Co-authored-by: Abhishek Arya <inferno@chromium.org> |
258,396 | 18.08.2020 17:57:06 | 25,200 | 12f3485bb0104f5cb2d6145db799f262363a11c5 | Add a temporary entropic variant for testing scheduling policy that uses exectime. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -37,6 +37,7 @@ jobs:\n# Temporary variants.\n- libfuzzer_keepseed\n- entropic_keepseed\n+ - entropic_exectime\n- aflplusplus_classic\n- aflplusplus_lto_pcguard\n- aflplusp... | Python | Apache License 2.0 | google/fuzzbench | Add a temporary entropic variant for testing scheduling policy that uses exectime. (#688) |
258,396 | 19.08.2020 23:11:21 | 25,200 | c585161d3253904c40b15616265520630a550f8a | Base entropic_keepseed variant on entropic_exectime variant | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/entropic_keepseed/fuzzer.py",
"new_path": "fuzzers/entropic_keepseed/fuzzer.py",
"diff": "@@ -29,5 +29,6 @@ def fuzz(input_corpus, output_corpus, target_binary):\ntarget_binary,\nextra_flags=[\n'-entropic=1', '-keep_seed=1',\n- '-cross_over_uniformdist... | Python | Apache License 2.0 | google/fuzzbench | Base entropic_keepseed variant on entropic_exectime variant (#690) |
258,388 | 25.08.2020 09:35:56 | 25,200 | 4c659ef98f942517773ddfc94c04568bd4fc95ea | Remove service users disclaimer for requesting experiments
The disclaimer is no longer true, we want people to request experiments now. | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "#\n# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n-# NOTE: Users of the Fuzz... | Python | Apache License 2.0 | google/fuzzbench | Remove service users disclaimer for requesting experiments
The disclaimer is no longer true, we want people to request experiments now. |
258,388 | 25.08.2020 11:07:19 | 25,200 | 87e711666a552fec76d1743004fec83ec3647193 | [docs] Improve wording in benchmark docs | [
{
"change_type": "MODIFY",
"old_path": "docs/developing-fuzzbench/adding_a_new_benchmark.md",
"new_path": "docs/developing-fuzzbench/adding_a_new_benchmark.md",
"diff": "@@ -27,8 +27,8 @@ repo, you must create these yourself.\nYou can use most existing OSS-Fuzz projects a benchmark. First decide whi... | Python | Apache License 2.0 | google/fuzzbench | [docs] Improve wording in benchmark docs |
258,396 | 25.08.2020 17:29:00 | 25,200 | 38e66c2cc0cec7b43bd2db8c39cedd3900b7e022 | Add (libfuzzer|entropic)_magicbytes variants for testing the effectiveness of magic byte mutation | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -36,7 +36,9 @@ jobs:\n- weizz\n# Temporary variants.\n- libfuzzer_keepseed\n+ - libfuzzer_magicbytes\n- entropic_keepseed\n+ - entropic_magicbytes\n- entropic_exectime\nbe... | Python | Apache License 2.0 | google/fuzzbench | Add (libfuzzer|entropic)_magicbytes variants for testing the effectiveness of magic byte mutation (#693) |
258,388 | 27.08.2020 12:14:30 | 25,200 | 729585596d74405758e87d7c41b72c36067f784e | Improve fuzzer and benchmark validation
* [presubmit] Fix validation for benchmarks and fuzzer names.
GCB apparently does not like capital letters.
* Seperate name validation into it's own function.
* improve validation
* nits and remove dead code | [
{
"change_type": "MODIFY",
"old_path": "common/benchmark_utils.py",
"new_path": "common/benchmark_utils.py",
"diff": "import os\nimport re\n+import yaml\n+\nfrom common import environment\nfrom common import logs\nfrom common import benchmark_config\nfrom common import utils\n-VALID_BENCHMARK_REGEX ... | Python | Apache License 2.0 | google/fuzzbench | Improve fuzzer and benchmark validation (#698)
* [presubmit] Fix validation for benchmarks and fuzzer names.
GCB apparently does not like capital letters.
* Seperate name validation into it's own function.
* improve validation
* nits and remove dead code |
258,399 | 17.09.2020 15:54:18 | 18,000 | 1b20111481e7f5c779f33a9183b996b2c05b4119 | [doc] local running | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/prerequisites.md",
"new_path": "docs/getting-started/prerequisites.md",
"diff": "@@ -90,3 +90,11 @@ You can format your changes using the following command:\n```bash\nmake format\n```\n+\n+### Local Support\n+\n+If you want to run FuzzBenc... | Python | Apache License 2.0 | google/fuzzbench | [doc] local running (#459) |
258,388 | 25.09.2020 15:28:07 | 25,200 | 08b0bbd86404770fb90a8ddd8f58227367d0383e | Add details on what we want to test privately. | [
{
"change_type": "MODIFY",
"old_path": "docker/generate_makefile.py",
"new_path": "docker/generate_makefile.py",
"diff": "@@ -137,6 +137,12 @@ def main():\n])\nprint('build-{fuzzer}-all: {all_targets}'.format(\nfuzzer=fuzzer, all_targets=all_build_targets))\n+ all_test_run_targets = ' '.join([\n+ 't... | Python | Apache License 2.0 | google/fuzzbench | Add details on what we want to test privately. (#321) |
258,388 | 13.10.2020 10:04:56 | 25,200 | 1447ee4ddeae15c670d42041674883f743b738f7 | [CI] Upgrade python environment action to silence warnings
This upgrades the versions of github actions we use to setup the python environment.
Using the old action results in these warnings:
More details here: | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -60,10 +60,6 @@ jobs:\n- oss-fuzz\n- standard\n- env:\n- FUZZER: ${{ matrix.fuzzer }}\n- BENCHMARK_TYPE: ${{ matrix.benchmark_type }}\n-\nsteps:\n- uses: actions/checkout@... | Python | Apache License 2.0 | google/fuzzbench | [CI] Upgrade python environment action to silence warnings (#823)
This upgrades the versions of github actions we use to setup the python environment.
Using the old action results in these warnings: https://github.com/google/fuzzbench/actions/runs/304779767
More details here: https://github.blog/changelog/2020-10-01-github-actions-deprecating-set-env-and-add-path-commands/ |
258,388 | 13.10.2020 10:40:24 | 25,200 | 74d9f3a216a04354d393942bd82414355dddd6cf | Add optional experiment description
This can be specified using the service or manually.
When specified, Fuzzbench will include the description in the experiment report.
Fixes | [
{
"change_type": "MODIFY",
"old_path": "analysis/generate_report.py",
"new_path": "analysis/generate_report.py",
"diff": "@@ -147,7 +147,8 @@ def generate_report(experiment_names,\nqueries.add_nonprivate_experiments_for_merge_with_clobber(\nexperiment_names))\n- report_name = report_name or experime... | Python | Apache License 2.0 | google/fuzzbench | Add optional experiment description (#822)
This can be specified using the service or manually.
When specified, Fuzzbench will include the description in the experiment report.
Fixes #805. |
258,388 | 13.10.2020 11:39:47 | 25,200 | 521479c1cd9d4817861a7572b5d4889331956ee3 | [CI][GCB] Fix commit build trigger
This fixes the commit build trigger we use to build base-images
on every commit to master. While this trigger is not mandatory,
using it speeds up builds in CI by ensuring they never have to build
base-images (including python). | [
{
"change_type": "MODIFY",
"old_path": "docker/gcb/base-images.yaml",
"new_path": "docker/gcb/base-images.yaml",
"diff": "@@ -18,6 +18,13 @@ images:\n- gcr.io/fuzzbench/base-image:test-experiment\n- gcr.io/fuzzbench/base-image\nsteps:\n+- args:\n+ - pull\n+ - ubuntu:xenial\n+ env:\n+ - DOCKER_BUILDK... | Python | Apache License 2.0 | google/fuzzbench | [CI][GCB] Fix commit build trigger (#824)
This fixes the commit build trigger we use to build base-images
on every commit to master. While this trigger is not mandatory,
using it speeds up builds in CI by ensuring they never have to build
base-images (including python). |
258,388 | 16.10.2020 11:23:16 | 25,200 | 78068745ecc4b7156e33522c5b5a039d703c53a7 | Fix building in other cloud projects.
Allow specifying a different docker registry.
Also:
1. Change references from cloud_build to cloudbuild for consistency.
2. Use fixtures for consistency
Fixes | [
{
"change_type": "MODIFY",
"old_path": "conftest.py",
"new_path": "conftest.py",
"diff": "@@ -80,6 +80,7 @@ def experiment(environ): # pylint: disable=redefined-outer-name,unused-argument\nos.environ['EXPERIMENT_FILESTORE'] = 'gs://experiment-data'\nos.environ['REPORT_FILESTORE'] = 'gs://web-bucket'... | Python | Apache License 2.0 | google/fuzzbench | Fix building in other cloud projects. (#843)
Allow specifying a different docker registry.
Also:
1. Change references from cloud_build to cloudbuild for consistency.
2. Use fixtures for consistency
Fixes https://github.com/google/fuzzbench/issues/842 |
258,388 | 16.10.2020 12:39:34 | 25,200 | e2fb96b96b7a679ef5774a41d960a919b90d174e | [docker] Authenticate to Google Cloud Artifact registries.
This allows use of private docker registries in the same project
as a public one. | [
{
"change_type": "MODIFY",
"old_path": "experiment/resources/dispatcher-startup-script-template.sh",
"new_path": "experiment/resources/dispatcher-startup-script-template.sh",
"diff": "# See the License for the specific language governing permissions and\n# limitations under the License.\n+docker-cre... | Python | Apache License 2.0 | google/fuzzbench | [docker] Authenticate to Google Cloud Artifact registries. (#845)
This allows use of private docker registries in the same project
as a public one. |
258,388 | 16.10.2020 12:40:18 | 25,200 | 231373e461820b6c06990657aa86ee92a07efc4c | [build] Fix use of docker registries.
Use docker registry from config to set the docker URLs instead
of using CLOUD_PROJECT. | [
{
"change_type": "MODIFY",
"old_path": "common/experiment_utils.py",
"new_path": "common/experiment_utils.py",
"diff": "@@ -81,16 +81,6 @@ def get_crashes_archive_name(cycle: int) -> str:\nreturn 'crashes-%04d.tar.gz' % cycle\n-def get_base_docker_tag(cloud_project=None):\n- \"\"\"Returns the base d... | Python | Apache License 2.0 | google/fuzzbench | [build] Fix use of docker registries. (#844)
Use docker registry from config to set the docker URLs instead
of using CLOUD_PROJECT. |
258,388 | 23.10.2020 12:40:04 | 25,200 | 123da94c7a0ff55e251b9aa9f5e7407759882340 | [build][make] Add dependency on base-image
base-image was not listed as a dependency of images that depended
on it in image_types.yaml. This problem was hidden by buildkit.
Fixes | [
{
"change_type": "MODIFY",
"old_path": "Makefile",
"new_path": "Makefile",
"diff": "@@ -53,7 +53,7 @@ ${VENV_ACTIVATE}: requirements.txt\ninstall-dependencies: ${VENV_ACTIVATE}\n-docker/generated.mk: docker/generate_makefile.py fuzzers benchmarks ${VENV_ACTIVATE}\n+docker/generated.mk: docker/genera... | Python | Apache License 2.0 | google/fuzzbench | [build][make] Add dependency on base-image (#864)
base-image was not listed as a dependency of images that depended
on it in image_types.yaml. This problem was hidden by buildkit.
Fixes #863 |
258,388 | 26.10.2020 08:47:53 | 25,200 | 99ec8af8c0a682839ec392c7f9812516b672c74a | Write the makefile instead of printing it
This makes testing nicer and makes the makefile generation more readable. | [
{
"change_type": "MODIFY",
"old_path": "Makefile",
"new_path": "Makefile",
"diff": "@@ -54,7 +54,7 @@ ${VENV_ACTIVATE}: requirements.txt\ninstall-dependencies: ${VENV_ACTIVATE}\ndocker/generated.mk: docker/generate_makefile.py docker/image_types.yaml fuzzers benchmarks ${VENV_ACTIVATE}\n- source ${V... | Python | Apache License 2.0 | google/fuzzbench | Write the makefile instead of printing it (#865)
This makes testing nicer and makes the makefile generation more readable. |
258,388 | 26.10.2020 12:31:45 | 25,200 | 77bfc5c2fe5c5fcd051a4ea87dc0397d62fa8b76 | [CI] Sort benchmarks before building them.
Sort benchmarks before building them to make CI more deterministic.
This change will ensure that benchmarks are built in the same order. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"new_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"diff": "@@ -96,6 +96,9 @@ def make_builds(benchmarks, fuzzer):\n\"\"\"Use make to test the fuzzer on each benchmark in |benchm... | Python | Apache License 2.0 | google/fuzzbench | [CI] Sort benchmarks before building them. (#876)
Sort benchmarks before building them to make CI more deterministic.
This change will ensure that benchmarks are built in the same order. |
258,388 | 28.10.2020 07:05:15 | 25,200 | 0d309e68f7401fe9bc278a4638c4d8f9edb48f77 | [benchmark integration] Remove stale attribute
Remove attribute leftover from OSS-Fuzz corpus usage. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"new_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"diff": "@@ -212,7 +212,7 @@ def main():\nhelp='Date of the commit. Example: 2019-10-19T09:07:25+01:00')\nargs = parser.parse_args()\nintegrate_benchmark... | Python | Apache License 2.0 | google/fuzzbench | [benchmark integration] Remove stale attribute (#887)
Remove attribute leftover from OSS-Fuzz corpus usage. |
258,388 | 28.10.2020 07:24:36 | 25,200 | 7c8b3b2988ee21d150299d6451718f106478a914 | [new_process] Fix logging
When logging the result of an executed command process, the
command was put directly in the log message prior to formatting.
This caused exceptions during logging if the command contained
something that looked like a print format directive (e.g. %H). | [
{
"change_type": "MODIFY",
"old_path": "common/new_process.py",
"new_path": "common/new_process.py",
"diff": "@@ -109,8 +109,8 @@ def execute( # pylint: disable=too-many-locals,too-many-branches\nretcode = process.returncode\n- log_message = ('Executed command: \"{command}\" returned: {retcode}.'.fo... | Python | Apache License 2.0 | google/fuzzbench | [new_process] Fix logging (#888)
When logging the result of an executed command process, the
command was put directly in the log message prior to formatting.
This caused exceptions during logging if the command contained
something that looked like a print format directive (e.g. %H). |
258,388 | 28.10.2020 07:44:11 | 25,200 | 11ce9e316a824a718255708c4910b1c64af70a27 | [pylint][NFC] Remove old pylint protected-access directives
The benchmark integration script has some leftover
protected-access directives that were used when the script used
protected functions from OSS-Fuzz. These aren't needed any longer. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"new_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"diff": "@@ -149,11 +149,11 @@ def replace_base_builder(benchmark_dir, commit_date):\n\"\"\"Replace the parent image of the Dockerfile in |benchmark_dir|... | Python | Apache License 2.0 | google/fuzzbench | [pylint][NFC] Remove old pylint protected-access directives (#889)
The benchmark integration script has some leftover
protected-access directives that were used when the script used
protected functions from OSS-Fuzz. These aren't needed any longer. |
258,388 | 28.10.2020 07:57:22 | 25,200 | 3cf22fad6ec831ee5221cc63f0ceeb529ca374ad | [benchmark integration] Check third_party/oss-fuzz is a git repo.
If third_party/oss-fuzz isn't a repo, then exit and explain to
users that they need to checkout submodules.
Previously, if it was not a repo, `git reset --hard` would be done
on the fuzzbench repo, which could unexpectedly cause users to lose
work. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"new_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"diff": "@@ -36,7 +36,7 @@ OSS_FUZZ_REPO_PATH = os.path.join(OSS_FUZZ_DIR, 'infra')\nclass GitRepoManager:\n- \"\"\"Base repo manager.\"\"\"\n+ \"\"\"Git... | Python | Apache License 2.0 | google/fuzzbench | [benchmark integration] Check third_party/oss-fuzz is a git repo. (#892)
If third_party/oss-fuzz isn't a repo, then exit and explain to
users that they need to checkout submodules.
Previously, if it was not a repo, `git reset --hard` would be done
on the fuzzbench repo, which could unexpectedly cause users to lose
work. |
258,388 | 28.10.2020 08:51:14 | 25,200 | dadb84735144cebdcc7310b62c238f299971ac02 | [experiment_utils] Use one source of truth for cycle filenames.
Use one source of truth for naming of cycle files (e.g.
corpus-archive-0001).
Part of queue based measurer | [
{
"change_type": "MODIFY",
"old_path": "common/experiment_utils.py",
"new_path": "common/experiment_utils.py",
"diff": "@@ -71,19 +71,26 @@ def get_trial_instance_name(experiment: str, trial_id: int) -> str:\nreturn 'r-%s-%d' % (experiment, trial_id)\n+def get_cycle_filename(basename: str, cycle: in... | Python | Apache License 2.0 | google/fuzzbench | [experiment_utils] Use one source of truth for cycle filenames. (#896)
Use one source of truth for naming of cycle files (e.g.
corpus-archive-0001).
Part of queue based measurer (#895). |
258,388 | 28.10.2020 08:56:18 | 25,200 | 411b3bb5ebb0cab7a5d699383145ada68d0209c5 | [queue][NFC] Improve .gitignore file
Ignore emacs backup files.
Don't bother ignoring variants of virtualenvs, we only use one.
See | [
{
"change_type": "MODIFY",
"old_path": ".gitignore",
"new_path": ".gitignore",
"diff": "@@ -19,12 +19,8 @@ __pycache__/\n.pytype/\n-# Virtual environments.\n-.env\n+# Virtualenv\n.venv\n-env/\n-venv/\n-ENV/\n# Reports generated by FuzzBench.\nreport/\n@@ -36,3 +32,7 @@ docs/vendor/\n# Auto-generated... | Python | Apache License 2.0 | google/fuzzbench | [queue][NFC] Improve .gitignore file (#897)
Ignore emacs backup files.
Don't bother ignoring variants of virtualenvs, we only use one.
See #895. |
258,388 | 28.10.2020 09:29:30 | 25,200 | aeb8eff56139933fdba672211b310c7aa3943f07 | [queue][filestore_utils] Add `cat` and fix consistency.
Add `cat` function.
Make arguments to cp consistent with the rest of the file (parallel
should be last). | [
{
"change_type": "MODIFY",
"old_path": "common/filestore_utils.py",
"new_path": "common/filestore_utils.py",
"diff": "@@ -37,15 +37,15 @@ def get_impl():\nreturn local_filestore\n-def cp(source, destination, recursive=False, parallel=False, expect_zero=True): # pylint: disable=invalid-name\n+def cp(... | Python | Apache License 2.0 | google/fuzzbench | [queue][filestore_utils] Add `cat` and fix consistency. (#899)
Add `cat` function.
Make arguments to cp consistent with the rest of the file (parallel
should be last). |
258,388 | 28.10.2020 11:59:39 | 25,200 | 894a9d598cfc47527b6eb9053896f3f81e7baa15 | [queue][presubmit] Allow third_party directories anywhere.
Ignore files in directories named third_party when doing license checks
even if they aren't in $ROOT/third_party.
See | [
{
"change_type": "MODIFY",
"old_path": "presubmit.py",
"new_path": "presubmit.py",
"diff": "@@ -60,9 +60,9 @@ _LICENSE_CHECK_EXTENSIONS = [\n_LICENSE_CHECK_STRING = 'http://www.apache.org/licenses/LICENSE-2.0'\n_SRC_ROOT = Path(__file__).absolute().parent\n+THIRD_PARTY_DIR_NAME = 'third_party'\n_IGN... | Python | Apache License 2.0 | google/fuzzbench | [queue][presubmit] Allow third_party directories anywhere. (#904)
Ignore files in directories named third_party when doing license checks
even if they aren't in $ROOT/third_party.
See #895. |
258,388 | 28.10.2020 12:10:17 | 25,200 | 1280814b2f8accaee9c8a01b45bf2dc34aea43ba | [queue] Add queue_utils
Add queue_utils module. | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "common/queue_utils.py",
"diff": "+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You may obtain a copy of the License... | Python | Apache License 2.0 | google/fuzzbench | [queue] Add queue_utils (#906)
Add queue_utils module. |
258,388 | 28.10.2020 12:27:27 | 25,200 | 7b169858bb9407d4ea8e9b5beb9a2908569b6654 | [queue][GCE] Add instance group code to gce module.
Also add tests.
See | [
{
"change_type": "MODIFY",
"old_path": "common/gce.py",
"new_path": "common/gce.py",
"diff": "@@ -54,3 +54,55 @@ def get_preempted_instances(project, zone):\nif (instance['scheduling']['preemptible'] and\ninstance['status'] == 'TERMINATED'):\nyield instance['name']\n+\n+\n+def get_instance_group_man... | Python | Apache License 2.0 | google/fuzzbench | [queue][GCE] Add instance group code to gce module. (#907)
Also add tests.
See #895. |
258,388 | 28.10.2020 13:49:55 | 25,200 | 17bb285afeed21370d5c86733c3d9b80d98024b0 | [queue][worker] Set up worker image and build
Create an image for workers and set up building of the image.
These will be used to run measure workers in the queue-based measurer.
See | [
{
"change_type": "MODIFY",
"old_path": "docker/generate_makefile.py",
"new_path": "docker/generate_makefile.py",
"diff": "@@ -91,7 +91,7 @@ def _get_makefile_run_template(image):\ndef get_rules_for_image(name, image):\n\"\"\"Returns makefile section for |image|.\"\"\"\n- if not ('base-' in name or '... | Python | Apache License 2.0 | google/fuzzbench | [queue][worker] Set up worker image and build (#908)
Create an image for workers and set up building of the image.
These will be used to run measure workers in the queue-based measurer.
See #895. |
258,388 | 28.10.2020 15:02:59 | 25,200 | e807a4c5eb77a476ec6becfcf982da19e864910b | [queue][gcloud] Add instance template code to gcloud
See | [
{
"change_type": "MODIFY",
"old_path": "common/gcloud.py",
"new_path": "common/gcloud.py",
"diff": "\"\"\"Google cloud related code.\"\"\"\nimport enum\n+import posixpath\nimport subprocess\nfrom typing import List\n@@ -112,3 +113,33 @@ def run_local_instance(startup_script: str = None) -> bool:\nco... | Python | Apache License 2.0 | google/fuzzbench | [queue][gcloud] Add instance template code to gcloud (#909)
See #895 |
258,388 | 28.10.2020 17:40:13 | 25,200 | 1ffdcf3ed246f047c5d6ef7cbc911a60599918e7 | Remove .vscode directory
Also add .vscode to .gitignore. | [
{
"change_type": "MODIFY",
"old_path": ".gitignore",
"new_path": ".gitignore",
"diff": "@@ -36,3 +36,5 @@ docker/generated.mk\n# Emacs backup files.\n*~\n\\#*\\#\n+\n+.vscode\n\\ No newline at end of file\n"
},
{
"change_type": "DELETE",
"old_path": ".vscode/settings.json",
"new_path... | Python | Apache License 2.0 | google/fuzzbench | Remove .vscode directory (#913)
Also add .vscode to .gitignore. |
258,388 | 29.10.2020 07:40:06 | 25,200 | c7fa3d8709ee5b1e4ec9270983a2bba41b4382c2 | [queue][gcloud] Add module for scheduling measure workers
See | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "experiment/schedule_measure_workers.py",
"diff": "+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You may obtain a co... | Python | Apache License 2.0 | google/fuzzbench | [queue][gcloud] Add module for scheduling measure workers (#910)
See #895 |
258,388 | 29.10.2020 07:43:44 | 25,200 | 497c9d08ec780d48d2e4819a88b172fbf855f27e | [CI] Seperate buggy benchmarks into their own build jobs
Do this to speed up builds and make timeouts less frequent. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"new_path": ".github/workflows/build_and_test_run_fuzzer_benchmarks.py",
"diff": "@@ -25,26 +25,19 @@ ALWAYS_BUILD_FUZZER = 'afl'\nNUM_RETRIES = 2\nRETRY_DELAY = 60\n-# TODO(tanq16): Get list of Bench... | Python | Apache License 2.0 | google/fuzzbench | [CI] Seperate buggy benchmarks into their own build jobs (#912)
Do this to speed up builds and make timeouts less frequent. |
258,388 | 29.10.2020 07:50:12 | 25,200 | 61b2314c30ed89be95c88339e3a86fcfad84e394 | [queue][schedule_measure_workers] Add helper method.
Add helper method requested in
See | [
{
"change_type": "MODIFY",
"old_path": "experiment/schedule_measure_workers.py",
"new_path": "experiment/schedule_measure_workers.py",
"diff": "@@ -45,6 +45,12 @@ def get_measure_worker_instance_template_name(experiment: str):\nreturn 'worker-' + experiment\n+def get_base_worker_instance_name(experi... | Python | Apache License 2.0 | google/fuzzbench | [queue][schedule_measure_workers] Add helper method. (#915)
Add helper method requested in #910.
See #895. |
258,420 | 30.10.2020 15:04:39 | 0 | 07e8d72cea7431c8d7595d2d5da33fa6abaf0f72 | Pin base-builder parent image using sha256 hash for bug based benchmarks | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/harfbuzz_hb-subset-fuzzer/Dockerfile",
"new_path": "benchmarks/harfbuzz_hb-subset-fuzzer/Dockerfile",
"diff": "#\n################################################################################\n-FROM gcr.io/oss-fuzz-base/base-builder\n+FROM gcr.io... | Python | Apache License 2.0 | google/fuzzbench | Pin base-builder parent image using sha256 hash for bug based benchmarks (#923) |
258,388 | 30.10.2020 08:14:39 | 25,200 | bfda841140c1e6db258cf9b2e9e387420fa3bf1e | [queue] Rename measurer to measurer_manager
Do this in anticipation of splitting the module into two parts:
manager and worker.
See | [
{
"change_type": "MODIFY",
"old_path": "experiment/dispatcher.py",
"new_path": "experiment/dispatcher.py",
"diff": "@@ -31,7 +31,7 @@ from common import yaml_utils\nfrom database import models\nfrom database import utils as db_utils\nfrom experiment.build import builder\n-from experiment.measurer im... | Python | Apache License 2.0 | google/fuzzbench | [queue] Rename measurer to measurer_manager (#916)
Do this in anticipation of splitting the module into two parts:
manager and worker.
See #895. |
258,417 | 03.12.2020 16:28:22 | 28,800 | 0ec632fb9e4f747436dd6d2f6d592f06eae94e20 | add aflplusplus_268c_qemu | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -55,6 +55,7 @@ jobs:\n- aflplusplus_fast_branches_v2\n- aflplusplus_cmplog\n- aflplusplus_dict2file\n+ - aflplusplus_268c_qemu\n- aflplusplus_fast_v2_add\n- aflplusplus_fa... | Python | Apache License 2.0 | google/fuzzbench | add aflplusplus_268c_qemu (#970)
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,388 | 18.12.2020 11:30:31 | 28,800 | ea4f768b84424d51c67d04be06d66a6db6a69725 | Disable coverage building in CI and don't complain about coverage not being tested in CI. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -17,7 +17,6 @@ jobs:\nfail-fast: false\nmatrix:\nfuzzer:\n- - coverage\n- afl\n- aflcc\n- aflfast\n"
},
{
"change_type": "MODIFY",
"old_path": "presubmit.py",
... | Python | Apache License 2.0 | google/fuzzbench | Disable coverage building in CI and don't complain about coverage not being tested in CI. (#997) |
258,388 | 11.01.2021 12:02:00 | 28,800 | fc35cc7bd571fdf23691fb5751d1454def51888c | [gcb] Log build failures | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/gcb_build.py",
"new_path": "experiment/build/gcb_build.py",
"diff": "# limitations under the License.\n\"\"\"Module for building things on Google Cloud Build for use in trials.\"\"\"\n+import subprocess\nimport tempfile\nfrom typing import Dic... | Python | Apache License 2.0 | google/fuzzbench | [gcb] Log build failures (#1025) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.