author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20 values | license stringclasses 3 values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
258,388 | 12.01.2021 07:59:24 | 28,800 | 51cdf447225cc76238e5fe7875507617ebc56101 | [run_experiment] Add argument for allowing uncommitted changes
Also:
1. Improve presubmit.
2. Use parent class to save code and fix type error. | [
{
"change_type": "MODIFY",
"old_path": "Makefile",
"new_path": "Makefile",
"diff": "@@ -59,6 +59,9 @@ docker/generated.mk: docker/generate_makefile.py docker/image_types.yaml fuzzers\npresubmit: install-dependencies\nsource ${VENV_ACTIVATE} && python3 presubmit.py\n+test: install-dependencies\n+ sou... | Python | Apache License 2.0 | google/fuzzbench | [run_experiment] Add argument for allowing uncommitted changes (#1027)
Also:
1. Improve presubmit.
2. Use parent class to save code and fix type error. |
258,388 | 19.01.2021 06:12:13 | 28,800 | 83c98788b2bcce47ed497a7ea07c668c51911a23 | Use secret manager to reuse service account keys
Use secret manager to store service account keys and reuse them
instead of recreating them every experiment.
Document new API for cloud users. | [
{
"change_type": "MODIFY",
"old_path": "common/gcloud.py",
"new_path": "common/gcloud.py",
"diff": "@@ -148,3 +148,9 @@ def delete_instance_template(template_name: str):\n'gcloud', 'compute', 'instance-templates', 'delete', template_name\n]\nreturn new_process.execute(command)\n+\n+\n+def get_accoun... | Python | Apache License 2.0 | google/fuzzbench | Use secret manager to reuse service account keys (#1039)
Use secret manager to store service account keys and reuse them
instead of recreating them every experiment.
Document new API for cloud users. |
258,390 | 27.01.2021 02:19:00 | -3,600 | 873723e8e1487a46c3aedc2717aeeafe5f5f5a4d | Update honggfuzz to the newest version (d9482931f22e532ae1948e4eb933e5d6c2c52ead) | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.1 + 1ec27b2e3652e6c0c94c28f547226a2dc6009f... | Python | Apache License 2.0 | google/fuzzbench | Update honggfuzz to the newest version (d9482931f22e532ae1948e4eb933e5d6c2c52ead) (#1053) |
258,388 | 28.01.2021 08:25:56 | 28,800 | 8e9823ebe203808187d2f8d9e60bdfcba6f5db4a | [run_experiment] Log more when we fail to create dispatcher. | [
{
"change_type": "MODIFY",
"old_path": "common/gcloud.py",
"new_path": "common/gcloud.py",
"diff": "@@ -19,6 +19,7 @@ import subprocess\nfrom typing import List\nfrom common import experiment_utils\n+from common import logs\nfrom common import new_process\n# Constants for dispatcher specs.\n@@ -86,7... | Python | Apache License 2.0 | google/fuzzbench | [run_experiment] Log more when we fail to create dispatcher. (#1055) |
258,388 | 28.01.2021 08:26:54 | 28,800 | afadc8d036d3ca0ace0436959cd0bffd3573b69c | Replace terms with more inclusive ones. | [
{
"change_type": "MODIFY",
"old_path": ".pylintrc",
"new_path": ".pylintrc",
"diff": "# run arbitrary code.\nextension-pkg-whitelist=\n-# Add files or directories to the blacklist. They should be base names, not\n+# Add files or directories to the blocklist. They should be base names, not\n# paths.\... | Python | Apache License 2.0 | google/fuzzbench | Replace terms with more inclusive ones. (#1051) |
258,382 | 29.01.2021 11:18:11 | 18,000 | 53e89c3182e587262479dd9a36e25b0facf30de4 | Neuzz integration
* Neuzz integration
Build succeds for all benchmarks except for arrow.
* Fixing noted issues.
* Linted.
* Adding neuzz to yml
Not sure, should I add neuzz here to keep the layout? Or just add to the end? | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -33,6 +33,7 @@ jobs:\n- libfuzzer\n- manul\n- mopt\n+ - neuzz\n# Binary-only (greybox) fuzzers.\n- eclipser\n- afl_qemu\n"
},
{
"change_type": "MODIFY",
"old_p... | Python | Apache License 2.0 | google/fuzzbench | Neuzz integration (#1056)
* Neuzz integration
Build succeds for all benchmarks except for arrow.
* Fixing noted issues.
* Linted.
* Adding neuzz to yml
Not sure, should I add neuzz here to keep the layout? Or just add to the end? |
258,390 | 01.02.2021 15:40:32 | -3,600 | 00b85975f8b2db8a99c21cf1cb1fc0c3eb3aac03 | Update honggfuzz to the newest version (b56729e6f29672be2edb2885807844df68d8db32)
* Update honggfuzz to the newest version (b56729e6f29672be2edb2885807844df68d8db32)
* Use -Wl,-z,muldefs when linking OpenEXR fuzzing targets
One of the archives used to build the final fuzzer binary
contains duplicated symbols (e.g. typeinfo for ImageChannel)
so instruct the linker to ignore it. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/openexr_openexr_exrenvmap_fuzzer/build.sh",
"new_path": "benchmarks/openexr_openexr_exrenvmap_fuzzer/build.sh",
"diff": "cd $WORK/\n+# /work/OpenEXR/libOpenexrUtils.a contains duplicated symbols,\n+# so instruct the linker not to complain about it.\... | Python | Apache License 2.0 | google/fuzzbench | Update honggfuzz to the newest version (b56729e6f29672be2edb2885807844df68d8db32) (#1066)
* Update honggfuzz to the newest version (b56729e6f29672be2edb2885807844df68d8db32)
* Use -Wl,-z,muldefs when linking OpenEXR fuzzing targets
One of the archives used to build the final fuzzer binary
contains duplicated symbols (e.g. typeinfo for ImageChannel)
so instruct the linker to ignore it. |
258,390 | 08.02.2021 18:28:31 | -3,600 | a92f94c646e79ffa3bcbf21e730964a013d62277 | honggfuzz: update to | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.3.1 + b56729e6f29672be2edb2885807844df68d8... | Python | Apache License 2.0 | google/fuzzbench | honggfuzz: update to b56729e6f29672be2edb2885807844df68d8db32 (#1079) |
258,390 | 16.02.2021 21:40:28 | -3,600 | 2e9f754423d114dcf8804fe7b6a255f41a2d6d86 | fuzzers/honggfuzz: update to | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz/builder.Dockerfile",
"diff": "@@ -23,14 +23,14 @@ RUN apt-get update -y && \\\nlibblocksruntime-dev \\\nliblzma-dev\n-# Download honggfuz version 2.3.1 + 129dc593e6f4f4f76d3270372c7dd37c1886... | Python | Apache License 2.0 | google/fuzzbench | fuzzers/honggfuzz: update to 9dc22189ac83eb148d836f186f6c0a7981b17062 (#1091) |
258,388 | 08.03.2021 13:17:35 | 28,800 | 1e4f5a90650696991f79d890f8e522a98b0ed22c | Restore intended behavior of run_experiment.py
* Restore intended behavior of run_experiment.py when omitting
benchmarks.
Use code cov benchmarks by default. | [
{
"change_type": "MODIFY",
"old_path": "common/benchmark_utils.py",
"new_path": "common/benchmark_utils.py",
"diff": "@@ -132,8 +132,14 @@ def get_all_benchmarks():\nreturn sorted(all_benchmarks)\n+def get_coverage_benchmarks():\n+ \"\"\"Returns the list of all coverage benchmarks.\"\"\"\n+ return (... | Python | Apache License 2.0 | google/fuzzbench | Restore intended behavior of run_experiment.py (#1107)
* Restore intended behavior of run_experiment.py when omitting
benchmarks.
Use code cov benchmarks by default. |
258,388 | 23.04.2021 13:07:24 | 25,200 | d766ea11b944059f1ef626129a2dfb8adccb2986 | Add CLI sugar to support reproducing experiments using a few commands | [
{
"change_type": "MODIFY",
"old_path": ".pylintrc",
"new_path": ".pylintrc",
"diff": "@@ -64,8 +64,7 @@ confidence=\n# --enable=similarities\". If you want to run only the classes checker, but have\n# no Warning level messages displayed, use \"--disable=all --enable=classes\n# --disable=W\".\n-disab... | Python | Apache License 2.0 | google/fuzzbench | Add CLI sugar to support reproducing experiments using a few commands (#1132) |
258,410 | 12.05.2021 20:45:37 | -3,600 | 9b977c28257cc1fc20363788c1be099079782ef0 | Intergrate benchmark "libarchive" with target "libarchive_fuzzer", commit date "2019-05-03 02:15:00+00:00" | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "benchmarks/libarchive_libarchive_fuzzer/Dockerfile",
"diff": "+# Copyright 2016 Google Inc.\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You ma... | Python | Apache License 2.0 | google/fuzzbench | Intergrate benchmark "libarchive" with target "libarchive_fuzzer", commit date "2019-05-03 02:15:00+00:00" (#1146) |
258,374 | 31.05.2021 18:07:15 | -7,200 | 31769b156e45d69d68603cd8b6059044b985304b | add experiment request | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "#\n# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n+\n+- experiment: 2021-06-... | Python | Apache License 2.0 | google/fuzzbench | add experiment request (#1164) |
258,410 | 01.06.2021 20:02:26 | -3,600 | e68d51bafded3d876469068b9d2f6c7c4424af70 | Fixed wrong commit used for required library libXfixes | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/ffmpeg_ffmpeg_demuxer_fuzzer/Dockerfile",
"new_path": "benchmarks/ffmpeg_ffmpeg_demuxer_fuzzer/Dockerfile",
"diff": "@@ -26,12 +26,13 @@ RUN apt-get update && apt-get install -y make autoconf automake libtool build-es\nRUN git clone https://git.ffmp... | Python | Apache License 2.0 | google/fuzzbench | Fixed wrong commit used for required library libXfixes (#1167)
Co-authored-by: Dario Asprone <aspronedario@gmail.com> |
258,388 | 09.06.2021 16:14:35 | 25,200 | 0eea26137cb8eb37adcac2d41745885de2ea46b2 | Don't do 2021-06-09-aflpp-sat for now
We need to make sure we aren't blocking some projects that
have very imminent deadlines. | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n-- experiment: 2021-06-09-afl... | Python | Apache License 2.0 | google/fuzzbench | Don't do 2021-06-09-aflpp-sat for now (#1177)
We need to make sure we aren't blocking some projects that
have very imminent deadlines. |
258,388 | 11.06.2021 10:22:44 | 25,200 | b41b68cbaca4c217b8c86b457157f6fdd7a723ee | Do aflpp-sat experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n-# - experiment: 2021-06-09-a... | Python | Apache License 2.0 | google/fuzzbench | Do aflpp-sat experiment (#1180) |
258,375 | 18.06.2021 02:36:45 | -25,200 | 2898c5139d2028a86013905b1f7d502da24a58c7 | Request new experiment for AFL variants | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -65,6 +65,8 @@ jobs:\n- aflplusplus_frida_old\n- aflplusplus_frida_new\n- afl_two_instances\n+ - afl_no_favored\n+ - afl_random_favored\nbenchmark_type:\n- oss-fuzz\n"
}... | Python | Apache License 2.0 | google/fuzzbench | Request new experiment for AFL variants (#1175) |
258,393 | 25.06.2021 20:46:43 | -7,200 | efb908fc44640ebb752eb8b5a41b4cad9628e5de | Requesting new experiments on two AFL variants.
* requesting new experiments.
* Update fuzzer.py
fix format | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -59,6 +59,8 @@ jobs:\n- aflplusplus_unusual_partial\n- aflplusplus_unusual_partial_early\n- aflplusplus_unusual_enabled_early\n+ - aflprefix\n+ - dropfuzzer\n# Concolic ex... | Python | Apache License 2.0 | google/fuzzbench | Requesting new experiments on two AFL variants. (#1186)
* requesting new experiments.
* Update fuzzer.py
fix format |
258,388 | 15.07.2021 07:42:50 | 25,200 | 3100d797a6ab54d6bf820fb4cd1037ee02923469 | Rerequest saturated experiment (original: | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n+- experiment: 2021-07-15-sat... | Python | Apache License 2.0 | google/fuzzbench | Rerequest saturated experiment (original: #1191) (#1204) |
258,419 | 16.07.2021 15:36:00 | -7,200 | 7431d845da55e34ee51ac28b441d89ce16f89299 | compare two different afl++ customized versions (dd and no dd) | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -32,6 +32,8 @@ jobs:\n- mopt\n- neuzz\n- libafl\n+ - afldd\n+ - aflpp_vs_dd\n# Binary-only (greybox) fuzzers.\n- eclipser\n- afl_qemu\n"
},
{
"change_type": "ADD",... | Python | Apache License 2.0 | google/fuzzbench | compare two different afl++ customized versions (dd and no dd) (#1199)
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,388 | 19.07.2021 08:53:41 | 25,200 | f095fe1cb838fb906046a1716c1e2f96cb098982 | Refactor generate_report | [
{
"change_type": "MODIFY",
"old_path": "analysis/generate_report.py",
"new_path": "analysis/generate_report.py",
"diff": "@@ -30,6 +30,8 @@ from common import logs\nlogger = logs.Logger('generate_report')\n+DATA_FILENAME = 'data.csv.gz'\n+\ndef get_arg_parser():\n\"\"\"Returns argument parser.\"\"\"... | Python | Apache License 2.0 | google/fuzzbench | Refactor generate_report (#1210) |
258,388 | 04.08.2021 20:47:41 | 25,200 | 692981bcb393af176f5656fe6c29dd639576ae9f | Support experiments with multi-core fuzzers.
Also support KLEE experiments without commenting out code. | [
{
"change_type": "MODIFY",
"old_path": "common/gcloud.py",
"new_path": "common/gcloud.py",
"diff": "@@ -28,7 +28,6 @@ DISPATCHER_BOOT_DISK_SIZE = '4TB'\nDISPATCHER_BOOT_DISK_TYPE = 'pd-ssd'\n# Constants for runner specs.\n-RUNNER_MACHINE_TYPE = 'n1-standard-1'\nRUNNER_BOOT_DISK_SIZE = '30GB'\n# Cons... | Python | Apache License 2.0 | google/fuzzbench | Support experiments with multi-core fuzzers. (#1215)
Also support KLEE experiments without commenting out code. |
258,388 | 04.08.2021 20:49:46 | 25,200 | 7c3d47a822ed3d2cf34cee79fbeb5c0f1877e0af | [docs] Mention BUILDKIT might need to be enabled on old docker releases
Related: | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/prerequisites.md",
"new_path": "docs/getting-started/prerequisites.md",
"diff": "@@ -37,8 +37,16 @@ Googlers can visit [go/installdocker](https://goto.google.com/installdocker).\nIf you want to run `docker` without `sudo`, you can\n[create... | Python | Apache License 2.0 | google/fuzzbench | [docs] Mention BUILDKIT might need to be enabled on old docker releases (#1218)
Related: #1211 |
258,388 | 04.08.2021 20:50:17 | 25,200 | 229b22551e46d8e7c8b6a7a677ba3901711688f1 | [runner] Fix logging message
Related: | [
{
"change_type": "MODIFY",
"old_path": "experiment/runner.py",
"new_path": "experiment/runner.py",
"diff": "@@ -375,7 +375,7 @@ class TrialRunner: # pylint: disable=too-many-instance-attributes\nself.log_file)\nexcept Exception: # pylint: disable=broad-except\n- logs.error('Call to %d failed.', fuzz... | Python | Apache License 2.0 | google/fuzzbench | [runner] Fix logging message (#1216)
Related: #1198 |
258,388 | 04.08.2021 21:23:18 | 25,200 | 77c7ab44d33efc9a8cf12684818741cc56852f10 | Replace deprecated yield_fixture with equivalent to silence warning | [
{
"change_type": "MODIFY",
"old_path": "conftest.py",
"new_path": "conftest.py",
"diff": "@@ -37,7 +37,7 @@ from database import models\n# Give this a short name since it is a fixture.\n-@pytest.yield_fixture\n+@pytest.fixture\ndef db(): # pylint: disable=invalid-name\n\"\"\"Connect to the SQLite da... | Python | Apache License 2.0 | google/fuzzbench | Replace deprecated yield_fixture with equivalent to silence warning (#1220) |
258,388 | 04.08.2021 21:23:44 | 25,200 | 9692525ec5f722b4b8af5680d1f5cad39f7a0f60 | Add more logging to oss-fuzz integration script to improve UX | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"new_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"diff": "@@ -19,7 +19,6 @@ import datetime\nfrom distutils import spawn\nfrom distutils import dir_util\nimport os\n-import logging\nimport sys\nimport s... | Python | Apache License 2.0 | google/fuzzbench | Add more logging to oss-fuzz integration script to improve UX (#1217) |
258,388 | 06.08.2021 14:29:57 | 25,200 | f826181ef25fa81c2cc19446fd2f5aebe6098ec7 | Add a parallel fuzzer
Based off of | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "fuzzers/glibfuzzer/builder.Dockerfile",
"diff": "+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You may obtain a cop... | Python | Apache License 2.0 | google/fuzzbench | Add a parallel fuzzer (#1221)
Based off of #1197 |
258,388 | 18.10.2021 13:20:31 | 14,400 | 90d0c398496e8c70e414cea00dd3e541344f2acf | [aspell] Fix build failure.
Fix SSL error by upgrading ubuntu packages.
This should unbreak CI. | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/aspell_aspell_fuzzer/Dockerfile",
"new_path": "benchmarks/aspell_aspell_fuzzer/Dockerfile",
"diff": "FROM gcr.io/oss-fuzz-base/base-builder@sha256:1b6a6993690fa947df74ceabbf6a1f89a46d7e4277492addcd45a8525e34be5a\n-RUN apt-get update && apt-get insta... | Python | Apache License 2.0 | google/fuzzbench | [aspell] Fix build failure. (#1261)
Fix SSL error by upgrading ubuntu packages.
This should unbreak CI. |
258,375 | 12.10.2021 06:51:49 | -25,200 | 262b4637bb011bcd118ac23c6a2fb2c7954d30ef | rename ambiguous fuzzer | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -75,7 +75,7 @@ jobs:\n- afl_two_instances\n- afl_no_favored\n- afl_random_favored\n- - aflpp_random_base\n+ - aflpp_random_default\n- aflpp_random_no_favs\n- aflpp_random_... | Python | Apache License 2.0 | google/fuzzbench | rename ambiguous fuzzer |
258,409 | 17.11.2021 03:11:58 | -39,600 | a78d310b6acbaf412a8feee2290a718580833124 | Add new fuzzer pythia_bb with improvements to pythia_effect_bb | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -38,6 +38,7 @@ jobs:\n- afldd\n- aflpp_vs_dd\n- pythia_effect_bb\n+ - pythia_bb\n# Binary-only (greybox) fuzzers.\n- eclipser\n- afl_qemu\n"
},
{
"change_type": "A... | Python | Apache License 2.0 | google/fuzzbench | Add new fuzzer pythia_bb with improvements to pythia_effect_bb (#1282)
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,416 | 18.11.2021 19:57:27 | 18,000 | 976e933726beb218c5a48e55ef64ff479b324418 | Fix broken link: master -> main for llvm repo | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/adding_a_new_fuzzer.md",
"new_path": "docs/getting-started/adding_a_new_fuzzer.md",
"diff": "@@ -187,13 +187,13 @@ If, like AFL, your fuzzer has a [persistent mode](https://lcamtuf.blogspot.com/2\nyour `FUZZER_LIB` should be a library that... | Python | Apache License 2.0 | google/fuzzbench | Fix broken link: master -> main for llvm repo (#1288) |
258,388 | 19.11.2021 16:13:19 | 18,000 | aeb2f6b956f3600ed748270881cee6bd1d83cc1d | Fix sqlite3 benchmark | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/sqlite3_ossfuzz/Dockerfile",
"new_path": "benchmarks/sqlite3_ossfuzz/Dockerfile",
"diff": "################################################################################\nFROM gcr.io/oss-fuzz-base/base-builder@sha256:1b6a6993690fa947df74ceabbf6a1f... | Python | Apache License 2.0 | google/fuzzbench | Fix sqlite3 benchmark (#1289) |
258,388 | 23.11.2021 13:23:11 | 18,000 | 7b87c735c8ac28d71b2895a15a9992b439d634b1 | Don't log retries when reporting errors.
This can lead to infinite loop. | [
{
"change_type": "MODIFY",
"old_path": "common/logs.py",
"new_path": "common/logs.py",
"diff": "@@ -183,8 +183,10 @@ def error(message, *args, extras=None, logger=None):\n\"\"\"Logs |message| to stackdriver logging and error reporting (including\nexception if there was one.\"\"\"\n- @retry.wrap(NUM_... | Python | Apache License 2.0 | google/fuzzbench | Don't log retries when reporting errors. (#1287)
This can lead to infinite loop. |
258,388 | 06.12.2021 14:56:18 | 18,000 | 5a00b761e550e64693233d18fc5eff5f79adf022 | Fix fafuzzer experiment name | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n#\n-- experiment: 2021-12-2-f... | Python | Apache License 2.0 | google/fuzzbench | Fix fafuzzer experiment name (#1301) |
258,388 | 09.12.2021 13:51:49 | 18,000 | 81c45872f7158d59f3200ad3b58082834e6d904e | [benchmarks] Run apt-get upgrade in broken benchmarks
To prevent | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/arrow_parquet-arrow-fuzz/Dockerfile",
"new_path": "benchmarks/arrow_parquet-arrow-fuzz/Dockerfile",
"diff": "@@ -18,7 +18,7 @@ FROM gcr.io/oss-fuzz-base/base-builder@sha256:1b6a6993690fa947df74ceabbf6a1f89a4\nENV DEBIAN_FRONTEND noninteractive\nRUN ... | Python | Apache License 2.0 | google/fuzzbench | [benchmarks] Run apt-get upgrade in broken benchmarks (#1305)
To prevent https://github.com/google/fuzzbench/issues/1304 |
258,413 | 15.12.2021 00:30:49 | -28,800 | 65297c4c76e63cbe4025f1ce7abc1e89b7a1566c | add afl-2.52b & requesting for a new experiment | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -60,6 +60,7 @@ jobs:\n- symcc_afl_single\n# Temporary variants.\n- aflplusplus_dict2file\n+ - afl_2_52_b\n- aflplusplus_cmplog\n- aflplusplus_311\n- aflplusplus_313\n"
}... | Python | Apache License 2.0 | google/fuzzbench | add afl-2.52b & requesting for a new experiment (#1307)
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,375 | 12.02.2022 01:48:41 | -25,200 | f6924fc84563b9c8428c035ba329cedcc42c33fb | request experiment 2022-01-31-main-fuzzers | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-01-31-main-fuzzers\n+ description: \"evaluate up-to-date version of main fuzz... | Python | Apache License 2.0 | google/fuzzbench | request experiment 2022-01-31-main-fuzzers (#1328) |
258,375 | 25.02.2022 23:52:40 | -25,200 | c01034d0764eceb9f2fa782c0332f6ef72bdc0c0 | Benchmark variants of libfuzzer that skip intermediate inputs | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -77,6 +77,8 @@ jobs:\n- aflplusplus_pcguard\n- aflplusplus_classic\n- aflplusplus_frida_cache\n+ - entropic_execute_final\n+ - libfuzzer_exeute_final\nbenchmark_type:\n- o... | Python | Apache License 2.0 | google/fuzzbench | Benchmark variants of libfuzzer that skip intermediate inputs (#1336) |
258,423 | 27.02.2022 09:10:44 | 25,200 | 6236cecdcfe06b94ae43a1fd31f4821a8b56485c | Fix libxml2_xml_reader_for_file_fuzzer cert error | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/libxml2_libxml2_xml_reader_for_file_fuzzer/Dockerfile",
"new_path": "benchmarks/libxml2_libxml2_xml_reader_for_file_fuzzer/Dockerfile",
"diff": "FROM gcr.io/oss-fuzz-base/base-builder@sha256:1b6a6993690fa947df74ceabbf6a1f89a46d7e4277492addcd45a8525e... | Python | Apache License 2.0 | google/fuzzbench | Fix libxml2_xml_reader_for_file_fuzzer cert error (#1339)
Co-authored-by: Sears <sears-s@users.noreply.github.com> |
258,388 | 02.03.2022 09:18:47 | 18,000 | 8858be7e05035103eac5db46ae682fad2c84fe5e | Remove tpm2 benchmark.
Under UBSAN it crashes way too often (likely very shallow bugs).
This makes it not useful as a benchmark. It also makes it bad to
use with good benchmarks since it basically steals all the measurer's
time running crashing testcases. | [
{
"change_type": "DELETE",
"old_path": "benchmarks/tpm2_tpm2_execute_command_fuzzer/Dockerfile",
"new_path": null,
"diff": "-# Copyright 2017 The Chromium Authors. All rights reserved.\n-# Use of this source code is governed by a BSD-style license that can be\n-# found in the LICENSE file.\n-#\n-# D... | Python | Apache License 2.0 | google/fuzzbench | Remove tpm2 benchmark. (#1345)
Under UBSAN it crashes way too often (likely very shallow bugs).
This makes it not useful as a benchmark. It also makes it bad to
use with good benchmarks since it basically steals all the measurer's
time running crashing testcases. |
258,388 | 10.03.2022 14:35:35 | 18,000 | b4c55087eb995be8909f3790ff7a808c69608efe | Mess up graphs to unbreak report generation.
Related: | [
{
"change_type": "MODIFY",
"old_path": "analysis/plotting.py",
"new_path": "analysis/plotting.py",
"diff": "@@ -413,7 +413,8 @@ class Plotter:\ncmap_colors = ['#005a32', '#238b45', '#a1d99b', '#fbd7d4']\ncmap = colors.ListedColormap(cmap_colors)\n- boundaries = [0, 0.001, 0.01, 0.05, 1]\n+ # TODO(ls... | Python | Apache License 2.0 | google/fuzzbench | Mess up graphs to unbreak report generation. (#1352)
Related: #1351 |
258,388 | 17.03.2022 10:27:52 | 14,400 | 131ea6ede12f845f72de5aecef5f7a85efe777ff | Fix instructions on reproducing experiments | [
{
"change_type": "MODIFY",
"old_path": "analysis/experiment_results.py",
"new_path": "analysis/experiment_results.py",
"diff": "@@ -24,6 +24,14 @@ from analysis import data_utils\nfrom analysis import stat_tests\n+def strip_gs_protocol(url):\n+ \"\"\"Removes the leading gs:// from |url|.\"\"\"\n+ pr... | Python | Apache License 2.0 | google/fuzzbench | Fix instructions on reproducing experiments (#1354) |
258,388 | 21.03.2022 19:07:10 | 14,400 | 8db1d4222a17372e328d8148a772cd48a98b3edb | Prevent benchmark integration after a certain date.
These benchmarks use Ubuntu 20.04 which FuzzBench does not use.
Fixes: | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"new_path": "benchmarks/oss_fuzz_benchmark_integration.py",
"diff": "@@ -32,6 +32,8 @@ from common import yaml_utils\nOSS_FUZZ_DIR = os.path.join(utils.ROOT_DIR, 'third_party', 'oss-fuzz')\nOSS_FUZZ_REPO_PATH = os... | Python | Apache License 2.0 | google/fuzzbench | Prevent benchmark integration after a certain date. (#1355)
These benchmarks use Ubuntu 20.04 which FuzzBench does not use.
Fixes: https://github.com/google/fuzzbench/issues/1353 |
258,388 | 22.03.2022 15:30:52 | 14,400 | 5e871d47c92fa44d778f2e9e6584e3bbc17e473f | Handle local reports in repro instructions.
Fixes | [
{
"change_type": "MODIFY",
"old_path": "analysis/experiment_results.py",
"new_path": "analysis/experiment_results.py",
"diff": "@@ -27,9 +27,9 @@ from analysis import stat_tests\ndef strip_gs_protocol(url):\n\"\"\"Removes the leading gs:// from |url|.\"\"\"\nprotocol = 'gs://'\n- if not url.startswi... | Python | Apache License 2.0 | google/fuzzbench | Handle local reports in repro instructions. (#1358)
Fixes https://github.com/google/fuzzbench/issues/1357 |
258,388 | 28.03.2022 14:59:42 | 14,400 | a3238755cdb958d86d7413dff6cf8ca1e7b61c5d | Add back sanitizer coverage fuzzer.
* Add back sanitizer coverage fuzzer.
This will be used to measure go coverage
* Fix presubmit issue | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "fuzzers/sanitizer_coverage/builder.Dockerfile",
"diff": "+# Copyright 2020 Google LLC\n+#\n+# Licensed under the Apache License, Version 2.0 (the \"License\");\n+# you may not use this file except in compliance with the License.\n+# You may obta... | Python | Apache License 2.0 | google/fuzzbench | Add back sanitizer coverage fuzzer. (#1365)
* Add back sanitizer coverage fuzzer.
This will be used to measure go coverage
* Fix presubmit issue |
258,379 | 01.04.2022 15:33:17 | -7,200 | 402c398db2028285ed2da6491abc90a96c74de3f | Tortoise
* Integrating TortoiseFuzz
* added newlines according to make format
* Fix curl_curl_fuzzer_http
Fixes:
Related:
* removed -j flag to utilize full parallelization | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -37,6 +37,7 @@ jobs:\n- pythia_effect_bb\n- pythia_bb\n- fafuzz\n+ - tortoisefuzz\n# Binary-only (greybox) fuzzers.\n- eclipser\n- afl_qemu\n"
},
{
"change_type": ... | Python | Apache License 2.0 | google/fuzzbench | Tortoise (#1366)
* Integrating TortoiseFuzz
* added newlines according to make format
* Fix curl_curl_fuzzer_http
Fixes: #1369
Related: #1366
* removed -j flag to utilize full parallelization
Co-authored-by: Jonathan Metzman <metzman@chromium.org> |
258,388 | 07.04.2022 15:28:58 | 14,400 | 594c69b04584e7d6ba7c497369542a7ffdebad4d | Fix arrow benchmark | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/arrow_parquet-arrow-fuzz/Dockerfile",
"new_path": "benchmarks/arrow_parquet-arrow-fuzz/Dockerfile",
"diff": "@@ -30,4 +30,4 @@ RUN apt-get update -y -q && \\\nRUN git clone --depth=1 https://github.com/apache/arrow.git $SRC/arrow\n-COPY build.sh $SR... | Python | Apache License 2.0 | google/fuzzbench | Fix arrow benchmark (#1364) |
258,388 | 12.04.2022 11:24:22 | 14,400 | 8d06cbfd526336e9f08c250fd9ae21fb26a987f5 | Fix re2 dictionary
Fixes: | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/re2-2014-12-09/Dockerfile",
"new_path": "benchmarks/re2-2014-12-09/Dockerfile",
"diff": "@@ -25,6 +25,6 @@ RUN apt-get update && \\\nRUN git clone https://github.com/google/re2.git\n-RUN wget -qO $OUT/fuzz-target.dict \\\n+RUN wget -qO $OUT/fuzzer.d... | Python | Apache License 2.0 | google/fuzzbench | Fix re2 dictionary (#1378)
Fixes: https://github.com/google/fuzzbench/issues/1377 |
258,388 | 19.04.2022 12:43:25 | 14,400 | 90e59b678c889111aebc893544cddcc59634b38b | Do main experiments | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-04-19\n+ description: \"Main coverage experiment\"\n+ type: code\n+ fuzzers:\... | Python | Apache License 2.0 | google/fuzzbench | Do main experiments (#1387) |
258,388 | 20.04.2022 09:49:17 | 14,400 | 43452996e71129d70f980d4bdb5d65bdc22e4ba3 | [docs] Remove outdated sections.
Fixes: | [
{
"change_type": "MODIFY",
"old_path": "docs/developing-fuzzbench/adding_a_new_benchmark.md",
"new_path": "docs/developing-fuzzbench/adding_a_new_benchmark.md",
"diff": "@@ -215,19 +215,9 @@ make build-$FUZZER_NAME-$BENCHMARK_NAME\n# This command will fuzz forever. Press Ctrl-C to stop it.\nmake run... | Python | Apache License 2.0 | google/fuzzbench | [docs] Remove outdated sections. (#1388)
Fixes: https://github.com/google/fuzzbench/issues/1386 |
258,388 | 20.04.2022 15:06:16 | 14,400 | 7cd47833e704b72c7136ce72bdc59eb5964b270b | blocklist dataflow fuzzers on benchmarks they fail on | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/curl_curl_fuzzer_http/benchmark.yaml",
"new_path": "benchmarks/curl_curl_fuzzer_http/benchmark.yaml",
"diff": "@@ -18,3 +18,6 @@ fuzz_target: curl_fuzzer_http\nproject: curl\nunsupported_fuzzers:\n- klee\n+ - libfuzzer_dataflow\n+ - libfuzzer_datafl... | Python | Apache License 2.0 | google/fuzzbench | blocklist dataflow fuzzers on benchmarks they fail on (#1390) |
258,375 | 26.05.2022 23:26:30 | -25,200 | 526b834db206e284082ffe477f67aa52c2a7eb7f | New option for custom seed corpus | [
{
"change_type": "MODIFY",
"old_path": "common/experiment_utils.py",
"new_path": "common/experiment_utils.py",
"diff": "@@ -72,6 +72,12 @@ def get_oss_fuzz_corpora_filestore_path():\nreturn posixpath.join(get_experiment_filestore_path(), 'oss_fuzz_corpora')\n+def get_custom_seed_corpora_filestore_pa... | Python | Apache License 2.0 | google/fuzzbench | New option for custom seed corpus (#1395) |
258,375 | 07.06.2022 21:39:37 | -25,200 | 5408256b0fb01e8a4791a90f2d60d0e38b4ed30c | parameterize snapshot period | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -77,6 +77,8 @@ def read_and_validate_experiment_config(config_filename: str) -> Dict:\nbool_params = {'private', 'merge_with_nonprivate'}\nlocal_experiment = config.get('loc... | Python | Apache License 2.0 | google/fuzzbench | parameterize snapshot period (#1405) |
258,388 | 08.06.2022 09:38:48 | 14,400 | 39141786018f727686100a84bc0772649a665d02 | Fix failing integration test for measuring coverage
Test now fails because we default to branch coverage. | [
{
"change_type": "MODIFY",
"old_path": "experiment/measurer/test_data/llvm_tools/llvm-cov",
"new_path": "experiment/measurer/test_data/llvm_tools/llvm-cov",
"diff": "Binary files a/experiment/measurer/test_data/llvm_tools/llvm-cov and b/experiment/measurer/test_data/llvm_tools/llvm-cov differ\n"
}... | Python | Apache License 2.0 | google/fuzzbench | Fix failing integration test for measuring coverage (#1408)
Test now fails because we default to branch coverage. |
258,388 | 08.06.2022 12:41:08 | 14,400 | 889718617d09ff81540a5d73abce74223861851c | Redo failed experiment 2022-06-01-dissecting | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-06-08-dissecting\n+ description: \"Dissecting AFL paper (scheduling)\"\n+ typ... | Python | Apache License 2.0 | google/fuzzbench | Redo failed experiment 2022-06-01-dissecting (#1411) |
258,388 | 08.06.2022 19:39:17 | 14,400 | 4a43f727bf97f901680452797d06d2bbaf4d367a | Handle RemoteDisconnected in is_local check.
Fixes | [
{
"change_type": "MODIFY",
"old_path": "common/utils.py",
"new_path": "common/utils.py",
"diff": "\"\"\"Common utilities.\"\"\"\nimport hashlib\n+import http.client\nimport os\nimport urllib.request\nimport urllib.error\n@@ -50,6 +51,8 @@ def is_local():\n_is_local = False\nexcept urllib.error.URLEr... | Python | Apache License 2.0 | google/fuzzbench | Handle RemoteDisconnected in is_local check. (#1409)
Fixes https://github.com/google/fuzzbench/issues/1401 |
258,402 | 13.07.2022 09:51:20 | -36,000 | e29f74ea46dfe5a83c3e0feebe9835608e4ac6a5 | Fix a bug in libfuzzer_dataflow (should have pushed this a long time ago)
Update patch because of [this commit](https://github.com/Alan32Liu/llvm-llvm-project/commit/9141d410f2b16964967702b07cf83ae63a73148a). | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/libfuzzer_dataflow/Trace-store-and-load-commands.patch",
"new_path": "fuzzers/libfuzzer_dataflow/Trace-store-and-load-commands.patch",
"diff": "-From e7b02154a90480ed6bca8ba7203c70e7b5a27203 Mon Sep 17 00:00:00 2001\n-From: Alan32Liu <donggeliu@google.... | Python | Apache License 2.0 | google/fuzzbench | Fix a bug in libfuzzer_dataflow (should have pushed this a long time ago) (#1422)
Update patch because of [this commit](https://github.com/Alan32Liu/llvm-llvm-project/commit/9141d410f2b16964967702b07cf83ae63a73148a). |
258,402 | 14.07.2022 07:20:28 | -36,000 | 494fc08da31c84435a9e4238fa3efead3b7b60c8 | Update ca-certificates
Fix the *server certificate verification failed* error in `honggfuzz_qemu`. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/honggfuzz_qemu/builder.Dockerfile",
"new_path": "fuzzers/honggfuzz_qemu/builder.Dockerfile",
"diff": "@@ -17,6 +17,7 @@ FROM $parent_image\n# Honggfuzz requires libbfd and libunwid.\nRUN apt-get update -y && \\\n+ apt-get upgrade -y ca-certificates && ... | Python | Apache License 2.0 | google/fuzzbench | Update ca-certificates (#1424)
Fix the *server certificate verification failed* error in `honggfuzz_qemu`. |
258,388 | 20.07.2022 10:54:10 | 14,400 | faa55785a8c06330c5f11e92d37edc90f90cb16b | Redo 2022-07-13 | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-07-20-aflpp\n+ description: \"afl++ libafl tests. Redo 07-13.\"\n+ fuzzers:\n... | Python | Apache License 2.0 | google/fuzzbench | Redo 2022-07-13 (#1430) |
258,388 | 22.07.2022 12:09:23 | 14,400 | e920ef4e52feaecd29806ec064c63ad832a87200 | Fix ffmpeg build failure by not specifying depth
Fixes | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/ffmpeg_ffmpeg_demuxer_fuzzer/Dockerfile",
"new_path": "benchmarks/ffmpeg_ffmpeg_demuxer_fuzzer/Dockerfile",
"diff": "@@ -30,8 +30,10 @@ RUN git clone -n https://gitlab.freedesktop.org/mesa/drm.git\nRUN cd drm; git checkout 5db0f7692d1fdf05f9f6c0c02f... | Python | Apache License 2.0 | google/fuzzbench | Fix ffmpeg build failure by not specifying depth (#1435)
Fixes #1434 |
258,388 | 22.07.2022 14:48:17 | 14,400 | d45decbae6a56f649337476cebb90fd0d7824f65 | [centipede] Fix compilation flags
* [centipede] Fix compilation flags
Add compiler flags to instrument edges and comparisions.
Also do centipede experiment.
* Dont do bug experiment
* more missing flags | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/centipede/fuzzer.py",
"new_path": "fuzzers/centipede/fuzzer.py",
"diff": "@@ -23,10 +23,12 @@ def build():\n\"\"\"Build benchmark.\"\"\"\n# TODO(Dongge): Build targets with sanitizers.\ncflags = [\n+ '-fno-builtin',\n+ '-gline-tables-only',\n'-ldl',\n'... | Python | Apache License 2.0 | google/fuzzbench | [centipede] Fix compilation flags (#1437)
* [centipede] Fix compilation flags
Add compiler flags to instrument edges and comparisions.
Also do centipede experiment.
* Dont do bug experiment
* more missing flags |
258,388 | 03.08.2022 10:34:19 | 25,200 | d914f24a07c1fc866894fece5b93f4a8b5f00023 | Update checkout_commit.py | [
{
"change_type": "MODIFY",
"old_path": "docker/benchmark-builder/checkout_commit.py",
"new_path": "docker/benchmark-builder/checkout_commit.py",
"diff": "@@ -78,7 +78,7 @@ def checkout_repo_commit(commit, repo_dir):\ndef main():\n\"\"\"Check out an OSS-Fuzz project repo.\"\"\"\nif len(sys.argv) != 3... | Python | Apache License 2.0 | google/fuzzbench | Update checkout_commit.py |
258,388 | 05.08.2022 14:09:55 | 14,400 | bb837a37813095558d8a29f31a0342a9cb4a3e2a | Update experiment-requests.yaml
I broke some things yesterday | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-08-04-... | Python | Apache License 2.0 | google/fuzzbench | Update experiment-requests.yaml
@andreafioraldi I broke some things yesterday |
258,403 | 08.08.2022 13:54:07 | 25,200 | 0d01b2921a337c00f3c0d0da6843a8f25788d8c2 | Removing unused files and old flags. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/libfuzzer/fuzzer.py",
"new_path": "fuzzers/libfuzzer/fuzzer.py",
"diff": "@@ -38,10 +38,7 @@ def build():\ndef fuzz(input_corpus, output_corpus, target_binary):\n\"\"\"Run fuzzer. Wrapper that uses the defaults when calling\nrun_fuzzer.\"\"\"\n- run_fu... | Python | Apache License 2.0 | google/fuzzbench | Removing unused files and old flags. (#1449) |
258,388 | 11.08.2022 16:01:59 | 14,400 | 14c6c8336786e638efc3288bedb817ad073da1ed | Get rid of clear-cache from documentation
Fixes: | [
{
"change_type": "MODIFY",
"old_path": "docs/getting-started/adding_a_new_fuzzer.md",
"new_path": "docs/getting-started/adding_a_new_fuzzer.md",
"diff": "@@ -287,9 +287,6 @@ make build-$FUZZER_NAME-all\n* Run `make presubmit` to lint your code and ensure all tests are passing.\n-* Run `make clear-ca... | Python | Apache License 2.0 | google/fuzzbench | Get rid of clear-cache from documentation (#1454)
Fixes: https://github.com/google/fuzzbench/issues/1453 |
258,402 | 12.08.2022 20:25:01 | -36,000 | 47e96a805c044e11d25cc0de55c034c195c5c275 | Add a new experiment to test centipede | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "config/experiment.yaml",
"diff": "+benchmarks:\n+- curl_curl_fuzzer_http\n+- harfbuzz-1.3.2\n+- jsoncpp_jsoncpp_fuzzer\n+- lcms-2017-03-21\n+- libjpeg-turbo-07-2017\n+- libpcap_fuzz_both\n+- libpng-1.2.56\n+- libxml2-v2.9.2\n+- libxslt_xpath\n+-... | Python | Apache License 2.0 | google/fuzzbench | Add a new experiment to test centipede |
258,402 | 12.08.2022 20:34:09 | -36,000 | 0fbf89a9e3040395a1ecb65523bb3929ec2783f1 | Uncommit garbage | [
{
"change_type": "DELETE",
"old_path": "config/experiment.yaml",
"new_path": null,
"diff": "-benchmarks:\n-- curl_curl_fuzzer_http\n-- harfbuzz-1.3.2\n-- jsoncpp_jsoncpp_fuzzer\n-- lcms-2017-03-21\n-- libjpeg-turbo-07-2017\n-- libpcap_fuzz_both\n-- libpng-1.2.56\n-- libxml2-v2.9.2\n-- libxslt_xpath\... | Python | Apache License 2.0 | google/fuzzbench | Uncommit garbage |
258,377 | 16.08.2022 03:09:35 | -10,800 | 68291d2c0026cdecba802ce3474ba30757ece93b | Fix saving corpus for a cycle | [
{
"change_type": "MODIFY",
"old_path": "experiment/resources/runner-startup-script-template.sh",
"new_path": "experiment/resources/runner-startup-script-template.sh",
"diff": "@@ -57,4 +57,4 @@ docker run \\\n--shm-size=2g \\\n--cap-add SYS_NICE --cap-add SYS_PTRACE \\\n--security-opt seccomp=unconf... | Python | Apache License 2.0 | google/fuzzbench | Fix saving corpus for a cycle (#1452) |
258,403 | 18.08.2022 17:29:58 | 25,200 | 58eebaf836dd00d4f7f9720ba244118d79d04724 | Request new focus experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-08-18-libfuzzer-focus\n+ description: \"Testing with focus function driven by... | Python | Apache License 2.0 | google/fuzzbench | Request new focus experiment (#1462) |
258,403 | 24.08.2022 11:46:22 | 25,200 | 63ece1cb1b5e50b03fc4a514ab1eaecf044e8619 | Check for env before setting it | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/libfuzzer/fuzzer.py",
"new_path": "fuzzers/libfuzzer/fuzzer.py",
"diff": "@@ -58,8 +58,14 @@ def run_fuzzer(input_corpus, output_corpus, target_binary, extra_flags=None):\n# only symbolize=1 is respected.\nfor flag in extra_flags:\nif flag.startswith('... | Python | Apache License 2.0 | google/fuzzbench | Check for env before setting it (#1471) |
258,403 | 29.08.2022 09:47:56 | 25,200 | 187953de5271389c4d8cc784001bf8c79a16c29a | Fix function name discrepancies between OSS-Fuzz projects and FB benchmarks | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/introspector_driven_focus/focus_map.yaml",
"new_path": "fuzzers/introspector_driven_focus/focus_map.yaml",
"diff": "@@ -39,7 +39,7 @@ bloaty_fuzz_target:\n- bloaty::BloatyDoMain(bloaty::Options const&, bloaty::InputFileFactory const&, bloaty::RollupOut... | Python | Apache License 2.0 | google/fuzzbench | Fix function name discrepancies between OSS-Fuzz projects and FB benchmarks (#1473) |
258,403 | 29.08.2022 15:47:10 | 25,200 | ef2274015cd89caf6520b434c2bf60bf67a21638 | Use extra_flags
This makes the `fuzzer.py` re-usable by future variants of `centipede` | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/centipede/fuzzer.py",
"new_path": "fuzzers/centipede/fuzzer.py",
"diff": "@@ -80,6 +80,7 @@ def run_fuzzer(input_corpus, output_corpus, target_binary, extra_flags=None):\n'--rss_limit_mb=0',\n'--address_space_limit_mb=0',\n]\n+ flags += extra_flags\ndi... | Python | Apache License 2.0 | google/fuzzbench | Use extra_flags (#1475)
This makes the `fuzzer.py` re-usable by future variants of `centipede` |
258,402 | 30.08.2022 14:15:36 | -36,000 | 71d2d24c3e759308044d3743295ec32d5f441c41 | Reuse the weak references defined in Centipede | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/centipede/builder.Dockerfile",
"new_path": "fuzzers/centipede/builder.Dockerfile",
"diff": "@@ -28,5 +28,4 @@ RUN git clone -n \\\nbazel build -c opt :all) && \\\ncp \"$CENTIPEDE_SRC/bazel-bin/centipede\" '/out/centipede'\n-COPY weak.c /src\n-RUN /clan... | Python | Apache License 2.0 | google/fuzzbench | Reuse the weak references defined in Centipede (#1469) |
258,402 | 08.09.2022 22:03:37 | -36,000 | 5648934c75ed503a59066b1d40cfcecabd3ef91c | Launch another round of Centipede exp | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-09-08-centipede\n+ description: \"Another round of centipede experiment\"\n+ ... | Python | Apache License 2.0 | google/fuzzbench | Launch another round of Centipede exp (#1485) |
258,402 | 14.09.2022 17:22:34 | -36,000 | cbe55b937d3dc250a1ef1b9898539ef160636b7b | Add new fuzzers to fuzzer list | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -26,6 +26,16 @@ jobs:\n- aflplusplus_um_random\n- aflsmart\n- centipede\n+ - centipede_corpus_1000\n+ - centipede_corpus_10000\n+ - centipede_counter\n+ - centipede_covera... | Python | Apache License 2.0 | google/fuzzbench | Add new fuzzers to fuzzer list |
258,388 | 18.09.2022 14:48:54 | 14,400 | 391cad9395848dc2fa1540af7e2833edbeb641a6 | Another first fuzz the mutants experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-09-18-... | Python | Apache License 2.0 | google/fuzzbench | Another first fuzz the mutants experiment |
258,394 | 27.09.2022 15:56:17 | -36,000 | 63cd1fc58c0681f0023745eb7e60d8fba62bdd83 | Request new saturated experiment for centipede vs centipede filter | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-09-27-... | Python | Apache License 2.0 | google/fuzzbench | Request new saturated experiment for centipede vs centipede filter (#1499) |
258,394 | 27.09.2022 16:04:46 | -36,000 | 1957fc53d1ee2c855d567ba48d16969b0b696ea2 | Shorten last request name.
Hit the merge button too early, when it failed CI: | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n#\n-- experiment: 2022-09-27-... | Python | Apache License 2.0 | google/fuzzbench | Shorten last request name. (#1500)
Hit the merge button too early, when it failed CI:
https://github.com/google/fuzzbench/actions/runs/3133264956/jobs/5086454501 |
258,388 | 28.09.2022 06:29:57 | 14,400 | 4695d8631bf578644d2f9be837a3f4d8592b2d26 | Try to repro 2022-05-06-dissecting-repro | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# You can run \"make presubmit\" to do basic validation on this file.\n# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-05-06-... | Python | Apache License 2.0 | google/fuzzbench | Try to repro 2022-05-06-dissecting-repro (#1503) |
258,408 | 28.09.2022 11:51:09 | 18,000 | ce4efb764f9b2ab0b2cf2f0424b6e78d550377ed | Fix typo on build() of AFL++. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/aflplusplus/fuzzer.py",
"new_path": "fuzzers/aflplusplus/fuzzer.py",
"diff": "@@ -213,15 +213,15 @@ def build(*args): # pylint: disable=too-many-branches,too-many-statements\nnew_env['SYMCC_NO_SYMBOLIC_INPUT'] = \"1\"\nnew_env['SYMCC_SILENT'] = \"1\"\n... | Python | Apache License 2.0 | google/fuzzbench | Fix typo on build() of AFL++. (#1501) |
258,400 | 30.09.2022 02:07:56 | -28,800 | 9915bd59f6d14098257c0222d22bee11088dff9e | Request experiment for WingFuzz
This PR adds WingFuzz, an experimental fuzzer featuring memory coverage
guidance. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -53,6 +53,7 @@ jobs:\n- pythia_bb\n- fafuzz\n- tortoisefuzz\n+ - wingfuzz\n# Binary-only (greybox) fuzzers.\n- eclipser\n- eclipser_um_prioritize\n"
},
{
"change_t... | Python | Apache License 2.0 | google/fuzzbench | Request experiment for WingFuzz (#1497)
This PR adds WingFuzz, an experimental fuzzer featuring memory coverage
guidance. |
258,388 | 29.09.2022 17:25:56 | 14,400 | f3afeee7ba6c770cc7b09d4d65823f9e67629c32 | Do a main experiment | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "- libfuzzer\n- mopt\n- wingfuzz\n+\n+- experiment: 2022-09-29\n+ description: \"Main coverage experiment\"\n+ type: code\n+ fuzzers:\n+ - honggfuzz\n+ - aflplusplus\n+ ... | Python | Apache License 2.0 | google/fuzzbench | Do a main experiment |
258,388 | 03.10.2022 17:37:56 | 14,400 | 7132a8f6145950a8ccac3dc757ac641b8aa7da52 | Fix benchmark integration script
The previous model used a submodule that was never updated and thus the
stuff copied from oss-fuzz repo was very old and generally not working.
Change this to use the latest oss-fuzz clone. | [
{
"change_type": "MODIFY",
"old_path": ".gitmodules",
"new_path": ".gitmodules",
"diff": "-[submodule \"third_party/oss-fuzz\"]\n- path = third_party/oss-fuzz\n- url = https://github.com/google/oss-fuzz.git\n"
},
{
"change_type": "MODIFY",
"old_path": "analysis/test_data/pairwise_unique_... | Python | Apache License 2.0 | google/fuzzbench | Fix benchmark integration script (#1504)
The previous model used a submodule that was never updated and thus the
stuff copied from oss-fuzz repo was very old and generally not working.
Change this to use the latest oss-fuzz clone. |
258,380 | 04.10.2022 13:05:37 | 14,400 | e4ab7e6ebe7a31a476377dad1ca6654475076feb | Fixing bugs with UM fuzzers
PR to fix build issues and runtime issues along with starting a new
experiment for the UM fuzzer fixed. | [
{
"change_type": "MODIFY",
"old_path": "fuzzers/aflplusplus_um_random/fuzzer.py",
"new_path": "fuzzers/aflplusplus_um_random/fuzzer.py",
"diff": "@@ -41,7 +41,7 @@ class TimeoutException(Exception):\nTOTAL_FUZZING_TIME_DEFAULT = 82800 # 23 hours\n-TOTAL_BUILD_TIME = 43200 # 12 hours\n+TOTAL_BUILD_TI... | Python | Apache License 2.0 | google/fuzzbench | Fixing bugs with UM fuzzers (#1510)
PR to fix build issues and runtime issues along with starting a new
experiment for the UM fuzzer fixed.
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,380 | 04.10.2022 14:29:18 | 14,400 | 5001fcb13f03ca06bc222788ba7cab32af6c54df | Adding 6/12 hour builds for UM fuzzers
Add 6/12 hour versions of aflplusplus_um_random fuzzer. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -27,6 +27,8 @@ jobs:\n- aflplusplus_tracepc\n- aflplusplus_um_prioritize\n- aflplusplus_um_random\n+ - aflplusplus_um_random_6\n+ - aflplusplus_um_random_12\n- aflplusplus... | Python | Apache License 2.0 | google/fuzzbench | Adding 6/12 hour builds for UM fuzzers (#1513)
Add 6/12 hour versions of aflplusplus_um_random fuzzer.
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,380 | 06.10.2022 11:46:26 | 14,400 | 36029fa4a5de92fcf08c559a837c5bb0c30e4134 | Add large experiment for all UM fuzzers
Adding new experiment for all UM fuzzers | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-10-06-um-full\n+ description: \"UM fuzzer experiment\"\n+ fuzzers:\n+ - aflpl... | Python | Apache License 2.0 | google/fuzzbench | Add large experiment for all UM fuzzers (#1516)
Adding new experiment for all UM fuzzers
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,380 | 12.10.2022 00:07:28 | 14,400 | 51f17f8f84bfc4cdce53a105d7d6532690defc45 | Run UM only for failing benchmarks
New experiment to run UM fuzzers for only failing benchmarks. | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-10-11-um-3\n+ description: \"UM fuzzer experiment\"\n+ fuzzers:\n+ - aflplusp... | Python | Apache License 2.0 | google/fuzzbench | Run UM only for failing benchmarks (#1520)
New experiment to run UM fuzzers for only failing benchmarks.
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com> |
258,397 | 12.10.2022 22:32:53 | -19,080 | bb0e6327bdaec5176c7074e5abf738c4ec3ee0cc | Update README.md
Image Border In readme.md file
* For better looking in dark mode | [
{
"change_type": "MODIFY",
"old_path": "README.md",
"new_path": "README.md",
"diff": "@@ -23,8 +23,13 @@ your fuzzer and generate a report comparing your fuzzer to others.\nSee [a sample report](https://www.fuzzbench.com/reports/sample/index.html).\n## Overview\n+<kbd>\n+\n![FuzzBench Service diagra... | Python | Apache License 2.0 | google/fuzzbench | Update README.md (#1519)
Image Border In readme.md file
* For better looking in dark mode |
258,388 | 13.10.2022 11:21:00 | 14,400 | 97e17b1638faa0b361093b3c79906ad168c7f5b7 | [build] improve debugging | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/gcb_build.py",
"new_path": "experiment/build/gcb_build.py",
"diff": "@@ -48,7 +48,10 @@ def build_base_images():\nimage_templates = {\nimage: buildable_images[image] for image in ['base-image', 'worker']\n}\n- config = generate_cloudbuild.crea... | Python | Apache License 2.0 | google/fuzzbench | [build] improve debugging (#1511)
Co-authored-by: Alan32Liu <donggeliu@google.com> |
258,388 | 13.10.2022 14:41:23 | 14,400 | 906023a4f5e902285b8ad3255e18d5f7df118fde | Use private buildpools for build | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/builder.py",
"new_path": "experiment/build/builder.py",
"diff": "import argparse\nimport itertools\n+import multiprocessing\nfrom multiprocessing import pool as mp_pool\nimport os\nimport random\n@@ -40,10 +41,8 @@ if not experiment_utils.is_l... | Python | Apache License 2.0 | google/fuzzbench | Use private buildpools for build (#1523) |
258,388 | 20.10.2022 16:37:10 | 14,400 | 53b37d364556106e8c54e6b7925ac8296599f69d | Fix curl_curl_fuzzer_http benchmark.
Fixes | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/curl_curl_fuzzer_http/Dockerfile",
"new_path": "benchmarks/curl_curl_fuzzer_http/Dockerfile",
"diff": "@@ -19,7 +19,7 @@ FROM gcr.io/oss-fuzz-base/base-builder@sha256:1b6a6993690fa947df74ceabbf6a1f89a4\n# Curl will be checked out to the commit hash ... | Python | Apache License 2.0 | google/fuzzbench | Fix curl_curl_fuzzer_http benchmark. (#1534)
Fixes #1528 |
258,388 | 24.10.2022 14:07:07 | 14,400 | 5624dfea608c1ff55a11f82ac8f724877b7c85fa | [curl] mess up cache to fix | [
{
"change_type": "MODIFY",
"old_path": "benchmarks/curl_curl_fuzzer_http/Dockerfile",
"new_path": "benchmarks/curl_curl_fuzzer_http/Dockerfile",
"diff": "FROM gcr.io/oss-fuzz-base/base-builder@sha256:1b6a6993690fa947df74ceabbf6a1f89a46d7e4277492addcd45a8525e34be5a\n# Curl will be checked out to the ... | Python | Apache License 2.0 | google/fuzzbench | [curl] mess up cache to fix #1528 (#1536) |
258,388 | 25.10.2022 10:13:58 | 14,400 | da05da0dcb3680deee9d894d1bfa61edbbf4a90c | Remove a bunch of fuzzers from CI testing | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/fuzzers.yml",
"new_path": ".github/workflows/fuzzers.yml",
"diff": "@@ -95,20 +95,6 @@ jobs:\n- afl_random_favored\n- entropic_execute_final\n- libfuzzer_exeute_final\n- - afl_no_favored\n- - afl_collision_free\n- - afl_double_timeout\n- - af... | Python | Apache License 2.0 | google/fuzzbench | Remove a bunch of fuzzers from CI testing (#1537) |
258,402 | 01.11.2022 14:16:50 | -39,600 | 2ee25c513299c859b95a32a6ff9c8d8b24f9ee62 | More configurable builds
Address
1. Make the worker pool configurable;
2. Make the number of concurrent builds configurable. | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/builder.py",
"new_path": "experiment/build/builder.py",
"diff": "import argparse\nimport itertools\n-import multiprocessing\nfrom multiprocessing import pool as mp_pool\nimport os\nimport random\n@@ -35,15 +34,13 @@ from common import utils\nf... | Python | Apache License 2.0 | google/fuzzbench | More configurable builds (#1535)
Address #1512:
1. Make the worker pool configurable;
2. Make the number of concurrent builds configurable. |
258,402 | 02.11.2022 10:20:23 | -39,600 | 40843bc313d46484e48058d6a6203a8841eba754 | Fix parameters validation
Validating command line parameters (`concurrent_builds`, `runners_cpu`,
`measurers_cpu`) with `argparser`'s built-in typecheck. | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -574,6 +574,8 @@ class GoogleCloudDispatcher(BaseDispatcher):\n'concurrent_builds': self.config['concurrent_builds'],\n'worker_pool_name': self.config['worker_pool_name']\n}... | Python | Apache License 2.0 | google/fuzzbench | Fix parameters validation (#1539)
Validating command line parameters (`concurrent_builds`, `runners_cpu`,
`measurers_cpu`) with `argparser`'s built-in typecheck. |
258,402 | 11.11.2022 14:00:15 | -39,600 | 0d270030170e9a4984a18e09304643e72b4ba3c4 | Add worker pool name to config
A follow-up of Add `worker_pool_name` to config file. | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-config.yaml",
"new_path": "service/experiment-config.yaml",
"diff": "@@ -10,6 +10,7 @@ cloud_compute_zone: us-central1-c\nexperiment_filestore: gs://fuzzbench-data\nreport_filestore: gs://www.fuzzbench.com/reports\ncloud_sql_instance_connect... | Python | Apache License 2.0 | google/fuzzbench | Add worker pool name to config (#1548)
A follow-up of #1535: Add `worker_pool_name` to config file. |
258,402 | 11.11.2022 14:13:55 | -39,600 | 489ca6f27ed112e83d40db4b9c0431f8ccbcf46a | Relaunch the most recent 3 experiments after adding workerpool to config
It seems these 3 experiments were not launched properly due to a missing
config in
Relaunching them now as should have patched the config file and fixed
the issue. | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-11-06-muttfuzz\n+ description: \"Try out muttfuzz and compare against afl\"\n... | Python | Apache License 2.0 | google/fuzzbench | Relaunch the most recent 3 experiments after adding workerpool to config (#1549)
It seems these 3 experiments were not launched properly due to a missing
config in #1535.
Relaunching them now as #1548 should have patched the config file and fixed
the issue. |
258,402 | 11.11.2022 15:44:51 | -39,600 | 1149e7bf2c835d7a496f08b7b6984c92f106f9e5 | Make 2 optional config parameters recognizable
Fix | [
{
"change_type": "MODIFY",
"old_path": "experiment/run_experiment.py",
"new_path": "experiment/run_experiment.py",
"diff": "@@ -172,6 +172,8 @@ def read_and_validate_experiment_config(config_filename: str) -> Dict:\nRequirement(not local_experiment, str, False, ''),\n'experiment':\nRequirement(False... | Python | Apache License 2.0 | google/fuzzbench | Make 2 optional config parameters recognizable (#1551)
Fix #1535. |
258,402 | 11.11.2022 17:09:08 | -39,600 | dc682183f2e5f37bfd40003be97afff394d95591 | Re-relaunch these two experiments
relaunched 3 experiments but was unsuccessful because of a code
bug: two valid parameters in the config file were not recognized.
fixed that bug.
I re-relaunched the `libFuzzer` experiment manually to confirm it works,
and re-relaunch the other two here. | [
{
"change_type": "MODIFY",
"old_path": "service/experiment-requests.yaml",
"new_path": "service/experiment-requests.yaml",
"diff": "# Please add new experiment requests towards the top of this file.\n#\n+- experiment: 2022-11-11-muttfuzz\n+ description: \"Try out muttfuzz and compare against afl\"\n... | Python | Apache License 2.0 | google/fuzzbench | Re-relaunch these two experiments (#1552)
#1549 relaunched 3 experiments but was unsuccessful because of a code
bug: two valid parameters in the config file were not recognized.
#1551 fixed that bug.
I re-relaunched the `libFuzzer` experiment manually to confirm it works,
and re-relaunch the other two here. |
258,388 | 11.11.2022 12:39:20 | 18,000 | 5e37b392529208dbcfcda8699ee091dbcaab1020 | Fix error
CC | [
{
"change_type": "MODIFY",
"old_path": "experiment/build/builder.py",
"new_path": "experiment/build/builder.py",
"diff": "@@ -140,7 +140,7 @@ def retry_build_loop(build_func: Callable, inputs: List[Tuple]) -> List:\n|NUM_BUILD_ATTEMPTS| times. Returns the list of inputs that |build_func| was\ncalled... | Python | Apache License 2.0 | google/fuzzbench | Fix error (#1553)
CC @Alan32Liu @kjain14 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.