Kitxuuu commited on
Commit
ad61100
·
verified ·
1 Parent(s): 422c328

Add files using upload-large-folder tool

Browse files
Files changed (50) hide show
  1. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-go/gosigfuzz.c +47 -0
  2. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-go/ossfuzz_coverage_runner.go +80 -0
  3. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-swift/Dockerfile +22 -0
  4. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/actions/build_fuzzers/action.yml +55 -0
  5. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/actions/run_fuzzers/action.yml +82 -0
  6. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/external-actions/build_fuzzers/action.yml +75 -0
  7. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/external-actions/run_fuzzers/action.yml +97 -0
  8. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/__init__.py +54 -0
  9. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/git/__init__.py +158 -0
  10. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/git/git_test.py +122 -0
  11. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/__init__.py +179 -0
  12. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/github_actions_test.py +283 -0
  13. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/github_api.py +109 -0
  14. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/github_api_test.py +41 -0
  15. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/upload.js +45 -0
  16. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/gitlab/__init__.py +133 -0
  17. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/gsutil/__init__.py +109 -0
  18. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/no_filestore/__init__.py +51 -0
  19. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/platform_config/__init__.py +124 -0
  20. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/platform_config/platform_config_test.py +82 -0
  21. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/platform_config/prow.py +64 -0
  22. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/TimeoutFuzzer.cpp +36 -0
  23. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/example_crash_fuzzer_output.txt +202 -0
  24. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/.clusterfuzzlite/Dockerfile +22 -0
  25. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/Makefile +44 -0
  26. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/do_stuff_fuzzer.cpp +24 -0
  27. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/do_stuff_fuzzer.dict +6 -0
  28. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/my_api.cpp +36 -0
  29. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/standalone_fuzz_target_runner.cpp +47 -0
  30. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/msan_crash_fuzzer_bug_summary.txt +22 -0
  31. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/msan_crash_fuzzer_output.txt +39 -0
  32. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/sarif_utils_msan_stack.txt +62 -0
  33. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/sarif_utils_only_llvmfuzzer_stack.txt +302 -0
  34. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/sarif_utils_systemd_stack.txt +302 -0
  35. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/experimental/sanitizers/ExecSan/README.md +3 -0
  36. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/launcher.py +34 -0
  37. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/.vscodeignore +10 -0
  38. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/LICENSE +201 -0
  39. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/cifuzz.ts +70 -0
  40. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commandUtils.ts +17 -0
  41. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdBuildFuzzerFromWorkspace.ts +80 -0
  42. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdCreateOSSFuzzSetup.ts +28 -0
  43. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdFIGetOptimalTargets.ts +21 -0
  44. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdListFuzzers.ts +42 -0
  45. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdRedo.ts +35 -0
  46. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdRunFI.ts +24 -0
  47. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdRunFuzzer.ts +83 -0
  48. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdSetupOSSFuzz.ts +53 -0
  49. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdTemplate.ts +357 -0
  50. local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/extension.ts +227 -0
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-go/gosigfuzz.c ADDED
@@ -0,0 +1,47 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ /*
2
+ * Copyright 2023 Google LLC
3
+
4
+ * Licensed under the Apache License, Version 2.0 (the "License");
5
+ * you may not use this file except in compliance with the License.
6
+ * You may obtain a copy of the License at
7
+
8
+ * http://www.apache.org/licenses/LICENSE-2.0
9
+
10
+ * Unless required by applicable law or agreed to in writing, software
11
+ * distributed under the License is distributed on an "AS IS" BASIS,
12
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ * See the License for the specific language governing permissions and
14
+ * limitations under the License.
15
+ */
16
+
17
+ #include<stdlib.h>
18
+ #include<signal.h>
19
+
20
+ static void fixSignalHandler(int signum) {
21
+ struct sigaction new_action;
22
+ struct sigaction old_action;
23
+ sigemptyset (&new_action.sa_mask);
24
+ sigaction (signum, NULL, &old_action);
25
+ new_action.sa_flags = old_action.sa_flags | SA_ONSTACK;
26
+ new_action.sa_sigaction = old_action.sa_sigaction;
27
+ new_action.sa_handler = old_action.sa_handler;
28
+ sigaction (signum, &new_action, NULL);
29
+ }
30
+
31
+ static void FixStackSignalHandler() {
32
+ fixSignalHandler(SIGSEGV);
33
+ fixSignalHandler(SIGABRT);
34
+ fixSignalHandler(SIGALRM);
35
+ fixSignalHandler(SIGINT);
36
+ fixSignalHandler(SIGTERM);
37
+ fixSignalHandler(SIGBUS);
38
+ fixSignalHandler(SIGFPE);
39
+ fixSignalHandler(SIGXFSZ);
40
+ fixSignalHandler(SIGUSR1);
41
+ fixSignalHandler(SIGUSR2);
42
+ }
43
+
44
+ int LLVMFuzzerInitialize(int *argc, char ***argv) {
45
+ FixStackSignalHandler();
46
+ return 0;
47
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-go/ossfuzz_coverage_runner.go ADDED
@@ -0,0 +1,80 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2020 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ package mypackagebeingfuzzed
16
+
17
+ import (
18
+ "io/fs"
19
+ "io/ioutil"
20
+ "os"
21
+ "path/filepath"
22
+ "runtime/pprof"
23
+ "testing"
24
+ )
25
+
26
+ func TestFuzzCorpus(t *testing.T) {
27
+ dir := os.Getenv("FUZZ_CORPUS_DIR")
28
+ if dir == "" {
29
+ t.Logf("No fuzzing corpus directory set")
30
+ return
31
+ }
32
+ filename := ""
33
+ defer func() {
34
+ if r := recover(); r != nil {
35
+ t.Error("Fuzz panicked in "+filename, r)
36
+ }
37
+ }()
38
+ profname := os.Getenv("FUZZ_PROFILE_NAME")
39
+ if profname != "" {
40
+ f, err := os.Create(profname + ".cpu.prof")
41
+ if err != nil {
42
+ t.Logf("error creating profile file %s\n", err)
43
+ } else {
44
+ _ = pprof.StartCPUProfile(f)
45
+ }
46
+ }
47
+ _, err := ioutil.ReadDir(dir)
48
+ if err != nil {
49
+ t.Logf("Not fuzzing corpus directory %s", err)
50
+ return
51
+ }
52
+ // recurse for regressions subdirectory
53
+ err = filepath.Walk(dir, func(fname string, info fs.FileInfo, err error) error {
54
+ if info.IsDir() {
55
+ return nil
56
+ }
57
+ data, err := ioutil.ReadFile(fname)
58
+ if err != nil {
59
+ t.Error("Failed to read corpus file", err)
60
+ return err
61
+ }
62
+ filename = fname
63
+ FuzzFunction(data)
64
+ return nil
65
+ })
66
+ if err != nil {
67
+ t.Error("Failed to run corpus", err)
68
+ }
69
+ if profname != "" {
70
+ pprof.StopCPUProfile()
71
+ f, err := os.Create(profname + ".heap.prof")
72
+ if err != nil {
73
+ t.Logf("error creating heap profile file %s\n", err)
74
+ }
75
+ if err = pprof.WriteHeapProfile(f); err != nil {
76
+ t.Logf("error writing heap profile file %s\n", err)
77
+ }
78
+ f.Close()
79
+ }
80
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-swift/Dockerfile ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ ARG IMG_TAG=latest
18
+ FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG}
19
+
20
+ RUN install_swift.sh
21
+
22
+ COPY precompile_swift /usr/local/bin/
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/actions/build_fuzzers/action.yml ADDED
@@ -0,0 +1,55 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # action.yml
2
+ name: 'build-fuzzers'
3
+ description: "Builds an OSS-Fuzz project's fuzzers."
4
+ inputs:
5
+ oss-fuzz-project-name:
6
+ description: 'Name of the corresponding OSS-Fuzz project.'
7
+ required: true
8
+ language:
9
+ description: 'Programming language project is written in.'
10
+ required: false
11
+ default: 'c++'
12
+ dry-run:
13
+ description: 'If set, run the action without actually reporting a failure.'
14
+ default: false
15
+ allowed-broken-targets-percentage:
16
+ description: 'The percentage of broken targets allowed in bad_build_check.'
17
+ required: false
18
+ sanitizer:
19
+ description: 'The sanitizer to build the fuzzers with.'
20
+ default: 'address'
21
+ architecture:
22
+ description: 'The architecture used to build the fuzzers.'
23
+ default: 'x86_64'
24
+ project-src-path:
25
+ description: "The path to the project's source code checkout."
26
+ required: false
27
+ bad-build-check:
28
+ description: "Whether or not OSS-Fuzz's check for bad builds should be done."
29
+ required: false
30
+ default: true
31
+ keep-unaffected-fuzz-targets:
32
+ description: "Whether to keep unaffected fuzzers or delete them."
33
+ required: false
34
+ default: false
35
+ output-sarif:
36
+ description: "Whether to output fuzzing results to SARIF."
37
+ required: false
38
+ default: false
39
+ runs:
40
+ using: 'docker'
41
+ image: '../../../build_fuzzers.Dockerfile'
42
+ env:
43
+ OSS_FUZZ_PROJECT_NAME: ${{ inputs.oss-fuzz-project-name }}
44
+ LANGUAGE: ${{ inputs.language }}
45
+ DRY_RUN: ${{ inputs.dry-run}}
46
+ ALLOWED_BROKEN_TARGETS_PERCENTAGE: ${{ inputs.allowed-broken-targets-percentage}}
47
+ SANITIZER: ${{ inputs.sanitizer }}
48
+ ARCHITECTURE: ${{ inputs.architecture }}
49
+ PROJECT_SRC_PATH: ${{ inputs.project-src-path }}
50
+ LOW_DISK_SPACE: 'True'
51
+ BAD_BUILD_CHECK: ${{ inputs.bad-build-check }}
52
+ CIFUZZ_DEBUG: 'True'
53
+ CFL_PLATFORM: 'github'
54
+ KEEP_UNAFFECTED_FUZZ_TARGETS: ${{ inputs.keep-unaffected-fuzz-targets }}
55
+ OUTPUT_SARIF: ${{ inputs.output-sarif }}
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/actions/run_fuzzers/action.yml ADDED
@@ -0,0 +1,82 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # action.yml
2
+ name: 'run-fuzzers'
3
+ description: 'Runs fuzz target binaries for a specified length of time.'
4
+ inputs:
5
+ oss-fuzz-project-name:
6
+ description: 'The OSS-Fuzz project name.'
7
+ required: true
8
+ language:
9
+ description: 'Programming language project is written in.'
10
+ required: false
11
+ default: 'c++'
12
+ fuzz-seconds:
13
+ description: 'The total time allotted for fuzzing in seconds.'
14
+ required: true
15
+ default: 600
16
+ dry-run:
17
+ description: 'If set, run the action without actually reporting a failure.'
18
+ default: false
19
+ sanitizer:
20
+ description: 'The sanitizer to run the fuzzers with.'
21
+ default: 'address'
22
+ mode:
23
+ description: |
24
+ The mode to run the fuzzers with ("code-change", "batch", "coverage", or "prune").
25
+ "code-change" is for fuzzing a pull request or commit.
26
+ "batch" is for non-interactive fuzzing of an entire project.
27
+ "coverage" is for coverage generation.
28
+ "prune" is for corpus pruning.
29
+ required: false
30
+ default: 'code-change'
31
+ github-token:
32
+ description: |
33
+ Token for GitHub API. WARNING: THIS SHOULD NOT BE USED IN PRODUCTION YET
34
+ You should use "secrets.GITHUB_TOKEN" in your workflow file, do not
35
+ hardcode the token.
36
+ TODO(https://github.com/google/oss-fuzz/pull/5841#discussion_r639393361):
37
+ Document locking this down.
38
+ required: false
39
+ report-unreproducible-crashes:
40
+ description: 'If True, then unreproducible crashes will be reported.'
41
+ required: false
42
+ default: False
43
+ minimize-crashes:
44
+ description: 'If True, reportable crashes will be minimized.'
45
+ required: false
46
+ default: False
47
+ parallel-fuzzing:
48
+ description: "Whether to use all available cores for fuzzing."
49
+ required: false
50
+ default: false
51
+ output-sarif:
52
+ description: "Whether to output fuzzing results to SARIF."
53
+ required: false
54
+ default: false
55
+ report-timeouts:
56
+ description: "Whether to report fails due to timeout."
57
+ required: false
58
+ default: true
59
+ report-ooms:
60
+ description: "Whether to report fails due to OOM."
61
+ required: false
62
+ default: true
63
+ runs:
64
+ using: 'docker'
65
+ image: '../../../run_fuzzers.Dockerfile'
66
+ env:
67
+ OSS_FUZZ_PROJECT_NAME: ${{ inputs.oss-fuzz-project-name }}
68
+ LANGUAGE: ${{ inputs.language }}
69
+ FUZZ_SECONDS: ${{ inputs.fuzz-seconds }}
70
+ DRY_RUN: ${{ inputs.dry-run}}
71
+ SANITIZER: ${{ inputs.sanitizer }}
72
+ MODE: ${{ inputs.mode }}
73
+ GITHUB_TOKEN: ${{ inputs.github-token }}
74
+ LOW_DISK_SPACE: 'True'
75
+ REPORT_UNREPRODUCIBLE_CRASHES: ${{ inputs.report-unreproducible-crashes }}
76
+ MINIMIZE_CRASHES: ${{ inputs.minimize-crashes }}
77
+ CIFUZZ_DEBUG: 'True'
78
+ CFL_PLATFORM: 'github'
79
+ PARALLEL_FUZZING: ${{ inputs.parallel-fuzzing }}
80
+ OUTPUT_SARIF: ${{ inputs.output-sarif }}
81
+ REPORT_TIMEOUTS: ${{ inputs.report-timeouts }}
82
+ REPORT_OOMS: ${{ inputs.report-ooms}}
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/external-actions/build_fuzzers/action.yml ADDED
@@ -0,0 +1,75 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # action.yml
2
+ name: 'build-fuzzers'
3
+ description: "Builds an OSS-Fuzz project's fuzzers."
4
+ inputs:
5
+ language:
6
+ description: 'Programming language project is written in.'
7
+ required: false
8
+ default: 'c++'
9
+ dry-run:
10
+ description: 'If set, run the action without actually reporting a failure.'
11
+ default: false
12
+ allowed-broken-targets-percentage:
13
+ description: 'The percentage of broken targets allowed in bad_build_check.'
14
+ required: false
15
+ sanitizer:
16
+ description: 'The sanitizer to build the fuzzers with.'
17
+ default: 'address'
18
+ project-src-path:
19
+ description: "The path to the project's source code checkout."
20
+ required: false
21
+ bad-build-check:
22
+ description: "Whether or not OSS-Fuzz's check for bad builds should be done."
23
+ required: false
24
+ default: true
25
+ keep-unaffected-fuzz-targets:
26
+ description: "Whether to keep unaffected fuzzers or delete them."
27
+ required: false
28
+ default: false
29
+ storage-repo:
30
+ description: |
31
+ The git repo to use for storing certain artifacts from fuzzing.
32
+ required: false
33
+ storage-repo-branch:
34
+ description: |
35
+ The branch of the git repo to use for storing certain artifacts from
36
+ fuzzing.
37
+ required: false
38
+ storage-repo-branch-coverage:
39
+ description: |
40
+ The branch of the git repo to use for storing coverage reports.
41
+ required: false
42
+ upload-build:
43
+ description: |
44
+ If set, will upload the build.
45
+ default: false
46
+ github-token:
47
+ description: |
48
+ Token for GitHub API. WARNING: THIS SHOULD NOT BE USED IN PRODUCTION YET
49
+ You should use "secrets.GITHUB_TOKEN" in your workflow file, do not
50
+ hardcode the token.
51
+ TODO(https://github.com/google/oss-fuzz/pull/5841#discussion_r639393361):
52
+ Document locking this down.
53
+ required: false
54
+ output-sarif:
55
+ description: "Whether to output fuzzing results to SARIF."
56
+ required: false
57
+ default: false
58
+ runs:
59
+ using: 'docker'
60
+ image: '../../../build_fuzzers.Dockerfile'
61
+ env:
62
+ OSS_FUZZ_PROJECT_NAME: ${{ inputs.oss-fuzz-project-name }}
63
+ LANGUAGE: ${{ inputs.language }}
64
+ DRY_RUN: ${{ inputs.dry-run}}
65
+ ALLOWED_BROKEN_TARGETS_PERCENTAGE: ${{ inputs.allowed-broken-targets-percentage}}
66
+ SANITIZER: ${{ inputs.sanitizer }}
67
+ PROJECT_SRC_PATH: ${{ inputs.project-src-path }}
68
+ GITHUB_TOKEN: ${{ inputs.github-token }}
69
+ LOW_DISK_SPACE: 'True'
70
+ BAD_BUILD_CHECK: ${{ inputs.bad-build-check }}
71
+ UPLOAD_BUILD: ${{ inputs.upload-build }}
72
+ CIFUZZ_DEBUG: 'True'
73
+ CFL_PLATFORM: 'github'
74
+ KEEP_UNAFFECTED_FUZZ_TARGETS: ${{ inputs.keep-unaffected-fuzz-targets }}
75
+ OUTPUT_SARIF: ${{ inputs.output-sarif }}
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/external-actions/run_fuzzers/action.yml ADDED
@@ -0,0 +1,97 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # action.yml
2
+ name: 'run-fuzzers'
3
+ description: 'Runs fuzz target binaries for a specified length of time.'
4
+ inputs:
5
+ language:
6
+ description: 'Programming language project is written in.'
7
+ required: false
8
+ default: 'c++'
9
+ fuzz-seconds:
10
+ description: 'The total time allotted for fuzzing in seconds.'
11
+ required: true
12
+ default: 600
13
+ dry-run:
14
+ description: 'If set, run the action without actually reporting a failure.'
15
+ default: false
16
+ sanitizer:
17
+ description: 'The sanitizer to run the fuzzers with.'
18
+ default: 'address'
19
+ mode:
20
+ description: |
21
+ The mode to run the fuzzers with ("code-change", "batch", "coverage", or "prune").
22
+ "code-change" is for fuzzing a pull request or commit.
23
+ "batch" is for non-interactive fuzzing of an entire project.
24
+ "coverage" is for coverage generation.
25
+ "prune" is for corpus pruning.
26
+ required: false
27
+ default: 'code-change'
28
+ github-token:
29
+ description: |
30
+ Token for GitHub API. WARNING: THIS SHOULD NOT BE USED IN PRODUCTION YET
31
+ You should use "secrets.GITHUB_TOKEN" in your workflow file, do not
32
+ hardcode the token.
33
+ TODO(https://github.com/google/oss-fuzz/pull/5841#discussion_r639393361):
34
+ Document locking this down.
35
+ required: true
36
+ storage-repo:
37
+ description: |
38
+ The git repo to use for storing certain artifacts from fuzzing.
39
+ required: false
40
+ storage-repo-branch:
41
+ description: |
42
+ The branch of the git repo to use for storing certain artifacts from
43
+ fuzzing.
44
+ default: main
45
+ required: false
46
+ storage-repo-branch-coverage:
47
+ description: |
48
+ The branch of the git repo to use for storing coverage reports.
49
+ default: gh-pages
50
+ required: false
51
+ report-unreproducible-crashes:
52
+ description: 'If True, then unreproducible crashes will be reported.'
53
+ required: false
54
+ default: false
55
+ minimize-crashes:
56
+ description: 'If True, reportable crashes will be minimized.'
57
+ required: false
58
+ default: False
59
+ parallel-fuzzing:
60
+ description: "Whether to use all available cores for fuzzing."
61
+ required: false
62
+ default: false
63
+ output-sarif:
64
+ description: "Whether to output fuzzing results to SARIF."
65
+ required: false
66
+ default: false
67
+ report-timeouts:
68
+ description: "Whether to report fails due to timeout."
69
+ required: false
70
+ default: true
71
+ report-ooms:
72
+ description: "Whether to report fails due to OOM."
73
+ required: false
74
+ default: true
75
+ runs:
76
+ using: 'docker'
77
+ image: '../../../run_fuzzers.Dockerfile'
78
+ env:
79
+ OSS_FUZZ_PROJECT_NAME: ${{ inputs.oss-fuzz-project-name }}
80
+ LANGUAGE: ${{ inputs.language }}
81
+ FUZZ_SECONDS: ${{ inputs.fuzz-seconds }}
82
+ DRY_RUN: ${{ inputs.dry-run}}
83
+ SANITIZER: ${{ inputs.sanitizer }}
84
+ MODE: ${{ inputs.mode }}
85
+ GITHUB_TOKEN: ${{ inputs.github-token }}
86
+ LOW_DISK_SPACE: 'True'
87
+ GIT_STORE_REPO: ${{ inputs.storage-repo }}
88
+ GIT_STORE_BRANCH: ${{ inputs.storage-repo-branch }}
89
+ GIT_STORE_BRANCH_COVERAGE: ${{ inputs.storage-repo-branch-coverage }}
90
+ REPORT_UNREPRODUCIBLE_CRASHES: ${{ inputs.report-unreproducible-crashes }}
91
+ MINIMIZE_CRASHES: ${{ inputs.minimize-crashes }}
92
+ CIFUZZ_DEBUG: 'True'
93
+ CFL_PLATFORM: 'github'
94
+ PARALLEL_FUZZING: ${{ inputs.parallel-fuzzing }}
95
+ OUTPUT_SARIF: ${{ inputs.output-sarif }}
96
+ REPORT_TIMEOUTS: ${{ inputs.report-timeouts }}
97
+ REPORT_OOMS: ${{ inputs.report-ooms}}
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/__init__.py ADDED
@@ -0,0 +1,54 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for a generic filestore."""
15
+
16
+
17
+ class FilestoreError(Exception):
18
+ """Error using the filestore."""
19
+
20
+
21
+ # pylint: disable=unused-argument,no-self-use
22
+ class BaseFilestore:
23
+ """Base class for a filestore."""
24
+
25
+ def __init__(self, config):
26
+ self.config = config
27
+
28
+ def upload_crashes(self, name, directory):
29
+ """Uploads the crashes at |directory| to |name|."""
30
+ raise NotImplementedError('Child class must implement method.')
31
+
32
+ def upload_corpus(self, name, directory, replace=False):
33
+ """Uploads the corpus at |directory| to |name|."""
34
+ raise NotImplementedError('Child class must implement method.')
35
+
36
+ def upload_build(self, name, directory):
37
+ """Uploads the build at |directory| to |name|."""
38
+ raise NotImplementedError('Child class must implement method.')
39
+
40
+ def upload_coverage(self, name, directory):
41
+ """Uploads the coverage report at |directory| to |name|."""
42
+ raise NotImplementedError('Child class must implement method.')
43
+
44
+ def download_corpus(self, name, dst_directory):
45
+ """Downloads the corpus located at |name| to |dst_directory|."""
46
+ raise NotImplementedError('Child class must implement method.')
47
+
48
+ def download_build(self, name, dst_directory):
49
+ """Downloads the build with |name| to |dst_directory|."""
50
+ raise NotImplementedError('Child class must implement method.')
51
+
52
+ def download_coverage(self, name, dst_directory):
53
+ """Downloads the latest project coverage report."""
54
+ raise NotImplementedError('Child class must implement method.')
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/git/__init__.py ADDED
@@ -0,0 +1,158 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for a git based filestore."""
15
+
16
+ import logging
17
+ import os
18
+ import shutil
19
+ import subprocess
20
+ import sys
21
+ import tempfile
22
+
23
+ import filestore
24
+
25
+ # pylint: disable=wrong-import-position
26
+ INFRA_DIR = os.path.dirname(
27
+ os.path.dirname(os.path.dirname(os.path.dirname(
28
+ os.path.abspath(__file__)))))
29
+ sys.path.append(INFRA_DIR)
30
+
31
+ import retry
32
+
33
+ _PUSH_RETRIES = 3
34
+ _PUSH_BACKOFF = 1
35
+ _GIT_EMAIL = 'cifuzz@clusterfuzz.com'
36
+ _GIT_NAME = 'CIFuzz'
37
+ _CORPUS_DIR = 'corpus'
38
+ _COVERAGE_DIR = 'coverage'
39
+
40
+
41
+ def git_runner(repo_path):
42
+ """Returns a gits runner for the repo_path."""
43
+
44
+ def func(*args):
45
+ return subprocess.check_call(('git', '-C', repo_path) + args)
46
+
47
+ return func
48
+
49
+
50
+ # pylint: disable=unused-argument,no-self-use
51
+ class GitFilestore(filestore.BaseFilestore):
52
+ """Generic git filestore. This still relies on another filestore provided by
53
+ the CI for larger artifacts or artifacts which make sense to be included as
54
+ the result of a workflow run."""
55
+
56
+ def __init__(self, config, ci_filestore):
57
+ super().__init__(config)
58
+ self.repo_path = tempfile.mkdtemp()
59
+ self._git = git_runner(self.repo_path)
60
+ self._clone(self.config.git_store_repo)
61
+
62
+ self._ci_filestore = ci_filestore
63
+
64
+ def __del__(self):
65
+ shutil.rmtree(self.repo_path)
66
+
67
+ def _clone(self, repo_url):
68
+ """Clones repo URL."""
69
+ self._git('clone', repo_url, '.')
70
+ self._git('config', '--local', 'user.email', _GIT_EMAIL)
71
+ self._git('config', '--local', 'user.name', _GIT_NAME)
72
+
73
+ def _reset_git(self, branch):
74
+ """Resets the git repo."""
75
+ self._git('fetch', 'origin')
76
+ try:
77
+ self._git('checkout', '-B', branch, 'origin/' + branch)
78
+ self._git('reset', '--hard', 'HEAD')
79
+ except subprocess.CalledProcessError:
80
+ self._git('checkout', '--orphan', branch)
81
+
82
+ self._git('clean', '-fxd')
83
+
84
+ # pylint: disable=too-many-arguments
85
+ @retry.wrap(_PUSH_RETRIES, _PUSH_BACKOFF)
86
+ def _upload_to_git(self,
87
+ message,
88
+ branch,
89
+ upload_path,
90
+ local_path,
91
+ replace=False):
92
+ """Uploads a directory to git. If `replace` is True, then existing contents
93
+ in the upload_path is deleted."""
94
+ self._reset_git(branch)
95
+
96
+ full_repo_path = os.path.join(self.repo_path, upload_path)
97
+ if replace and os.path.exists(full_repo_path):
98
+ shutil.rmtree(full_repo_path)
99
+
100
+ shutil.copytree(local_path, full_repo_path, dirs_exist_ok=True)
101
+ self._git('add', '.')
102
+ try:
103
+ self._git('commit', '-m', message)
104
+ except subprocess.CalledProcessError:
105
+ logging.debug('No changes, skipping git push.')
106
+ return
107
+
108
+ self._git('push', 'origin', branch)
109
+
110
+ def upload_crashes(self, name, directory):
111
+ """Uploads the crashes at |directory| to |name|."""
112
+ return self._ci_filestore.upload_crashes(name, directory)
113
+
114
+ def upload_corpus(self, name, directory, replace=False):
115
+ """Uploads the corpus at |directory| to |name|."""
116
+ self._upload_to_git('Corpus upload',
117
+ self.config.git_store_branch,
118
+ os.path.join(_CORPUS_DIR, name),
119
+ directory,
120
+ replace=replace)
121
+
122
+ def upload_build(self, name, directory):
123
+ """Uploads the build at |directory| to |name|."""
124
+ return self._ci_filestore.upload_build(name, directory)
125
+
126
+ def upload_coverage(self, name, directory):
127
+ """Uploads the coverage report at |directory| to |name|."""
128
+ self._upload_to_git('Coverage upload',
129
+ self.config.git_store_branch_coverage,
130
+ os.path.join(_COVERAGE_DIR, name),
131
+ directory,
132
+ replace=True)
133
+
134
+ def download_corpus(self, name, dst_directory):
135
+ """Downloads the corpus located at |name| to |dst_directory|."""
136
+ self._reset_git(self.config.git_store_branch)
137
+ path = os.path.join(self.repo_path, _CORPUS_DIR, name)
138
+ if not os.path.exists(path):
139
+ logging.debug('Corpus does not exist at %s.', path)
140
+ return False
141
+
142
+ shutil.copytree(path, dst_directory, dirs_exist_ok=True)
143
+ return True
144
+
145
+ def download_build(self, name, dst_directory):
146
+ """Downloads the build with |name| to |dst_directory|."""
147
+ return self._ci_filestore.download_build(name, dst_directory)
148
+
149
+ def download_coverage(self, name, dst_directory):
150
+ """Downloads the latest project coverage report."""
151
+ self._reset_git(self.config.git_store_branch_coverage)
152
+ path = os.path.join(self.repo_path, _COVERAGE_DIR, name)
153
+ if not os.path.exists(path):
154
+ logging.debug('Coverage does not exist at %s.', path)
155
+ return False
156
+
157
+ shutil.copytree(path, dst_directory, dirs_exist_ok=True)
158
+ return True
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/git/git_test.py ADDED
@@ -0,0 +1,122 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Tests for git."""
15
+ import filecmp
16
+ import os
17
+ import tempfile
18
+ import subprocess
19
+ import sys
20
+ import unittest
21
+ from unittest import mock
22
+
23
+ # pylint: disable=wrong-import-position
24
+ INFRA_DIR = os.path.dirname(
25
+ os.path.dirname(os.path.dirname(os.path.dirname(
26
+ os.path.abspath(__file__)))))
27
+ sys.path.append(INFRA_DIR)
28
+
29
+ from filestore import git
30
+ import test_helpers
31
+
32
+ # pylint: disable=protected-access,no-self-use
33
+
34
+
35
+ class GitFilestoreTest(unittest.TestCase):
36
+ """Tests for GitFilestore."""
37
+
38
+ def setUp(self):
39
+ self.git_dir = tempfile.TemporaryDirectory()
40
+ self.addCleanup(self.git_dir.cleanup)
41
+
42
+ self.local_dir = tempfile.TemporaryDirectory()
43
+ self.addCleanup(self.local_dir.cleanup)
44
+
45
+ self.download_dir = tempfile.TemporaryDirectory()
46
+ self.addCleanup(self.download_dir.cleanup)
47
+
48
+ with open(os.path.join(self.local_dir.name, 'a'), 'w') as handle:
49
+ handle.write('')
50
+
51
+ os.makedirs(os.path.join(self.local_dir.name, 'b'))
52
+
53
+ with open(os.path.join(self.local_dir.name, 'b', 'c'), 'w') as handle:
54
+ handle.write('')
55
+
56
+ self.git_repo = git.git_runner(self.git_dir.name)
57
+ self.git_repo('init', '--bare')
58
+
59
+ self.config = test_helpers.create_run_config(
60
+ git_store_repo='file://' + self.git_dir.name,
61
+ git_store_branch='main',
62
+ git_store_branch_coverage='cov-branch')
63
+
64
+ self.mock_ci_filestore = mock.MagicMock()
65
+ self.git_store = git.GitFilestore(self.config, self.mock_ci_filestore)
66
+
67
+ def assert_dirs_same(self, first, second):
68
+ """Asserts two dirs are the same."""
69
+ dcmp = filecmp.dircmp(first, second)
70
+ if dcmp.diff_files or dcmp.left_only or dcmp.right_only:
71
+ return False
72
+
73
+ return all(
74
+ self.assert_dirs_same(os.path.join(first, subdir),
75
+ os.path.join(second, subdir))
76
+ for subdir in dcmp.common_dirs)
77
+
78
+ def get_repo_filelist(self, branch):
79
+ """Get files in repo."""
80
+ return subprocess.check_output([
81
+ 'git', '-C', self.git_dir.name, 'ls-tree', '-r', '--name-only', branch
82
+ ]).decode().splitlines()
83
+
84
+ def test_upload_download_corpus(self):
85
+ """Tests uploading and downloading corpus."""
86
+ self.git_store.upload_corpus('target', self.local_dir.name)
87
+ self.git_store.download_corpus('target', self.download_dir.name)
88
+ self.assert_dirs_same(self.local_dir.name, self.download_dir.name)
89
+
90
+ self.assertCountEqual([
91
+ 'corpus/target/a',
92
+ 'corpus/target/b/c',
93
+ ], self.get_repo_filelist('main'))
94
+
95
+ def test_upload_download_coverage(self):
96
+ """Tests uploading and downloading corpus."""
97
+ self.git_store.upload_coverage('latest', self.local_dir.name)
98
+ self.git_store.download_coverage('latest', self.download_dir.name)
99
+ self.assert_dirs_same(self.local_dir.name, self.download_dir.name)
100
+
101
+ self.assertCountEqual([
102
+ 'coverage/latest/a',
103
+ 'coverage/latest/b/c',
104
+ ], self.get_repo_filelist('cov-branch'))
105
+
106
+ def test_upload_crashes(self):
107
+ """Tests uploading crashes."""
108
+ self.git_store.upload_crashes('current', self.local_dir.name)
109
+ self.mock_ci_filestore.upload_crashes.assert_called_with(
110
+ 'current', self.local_dir.name)
111
+
112
+ def test_upload_build(self):
113
+ """Tests uploading build."""
114
+ self.git_store.upload_build('sanitizer', self.local_dir.name)
115
+ self.mock_ci_filestore.upload_build.assert_called_with(
116
+ 'sanitizer', self.local_dir.name)
117
+
118
+ def test_download_build(self):
119
+ """Tests downloading build."""
120
+ self.git_store.download_build('sanitizer', self.download_dir.name)
121
+ self.mock_ci_filestore.download_build.assert_called_with(
122
+ 'sanitizer', self.download_dir.name)
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/__init__.py ADDED
@@ -0,0 +1,179 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Implementation of a filestore using Github actions artifacts."""
15
+ import logging
16
+ import os
17
+ import shutil
18
+ import sys
19
+ import tarfile
20
+ import tempfile
21
+
22
+ # pylint: disable=wrong-import-position,import-error
23
+ INFRA_DIR = os.path.abspath(
24
+ os.path.join(os.path.dirname(__file__), os.path.pardir, os.path.pardir,
25
+ os.path.pardir))
26
+ sys.path.append(INFRA_DIR)
27
+ OSS_FUZZ_ROOT_DIR = os.path.dirname(INFRA_DIR)
28
+
29
+ import utils
30
+ import http_utils
31
+ import filestore
32
+ from filestore.github_actions import github_api
33
+
34
+ UPLOAD_JS = os.path.join(os.path.dirname(__file__), 'upload.js')
35
+
36
+
37
+ def tar_directory(directory, archive_path):
38
+ """Tars a |directory| and stores archive at |archive_path|. |archive_path|
39
+ must end in .tar"""
40
+ assert archive_path.endswith('.tar')
41
+ # Do this because make_archive will append the extension to archive_path.
42
+ archive_path = os.path.splitext(archive_path)[0]
43
+
44
+ root_directory = os.path.abspath(directory)
45
+ shutil.make_archive(archive_path,
46
+ 'tar',
47
+ root_dir=root_directory,
48
+ base_dir='./')
49
+
50
+
51
+ class GithubActionsFilestore(filestore.BaseFilestore):
52
+ """Implementation of BaseFilestore using Github actions artifacts. Relies on
53
+ github_actions_toolkit for using the GitHub actions API and the github_api
54
+ module for using GitHub's standard API. We need to use both because the GitHub
55
+ actions API is the only way to upload an artifact but it does not support
56
+ downloading artifacts from other runs. The standard GitHub API does support
57
+ this however."""
58
+
59
+ ARTIFACT_PREFIX = 'cifuzz-'
60
+ BUILD_PREFIX = 'build-'
61
+ CRASHES_PREFIX = 'crashes-'
62
+ CORPUS_PREFIX = 'corpus-'
63
+ COVERAGE_PREFIX = 'coverage-'
64
+
65
+ def __init__(self, config):
66
+ super().__init__(config)
67
+ self.github_api_http_headers = github_api.get_http_auth_headers(config)
68
+
69
+ def _get_artifact_name(self, name):
70
+ """Returns |name| prefixed with |self.ARITFACT_PREFIX| if it isn't already
71
+ prefixed. Otherwise returns |name|."""
72
+ if name.startswith(self.ARTIFACT_PREFIX):
73
+ return name
74
+ return f'{self.ARTIFACT_PREFIX}{name}'
75
+
76
+ def _upload_directory(self, name, directory): # pylint: disable=no-self-use
77
+ """Uploads |directory| as artifact with |name|."""
78
+ name = self._get_artifact_name(name)
79
+ with tempfile.TemporaryDirectory() as temp_dir:
80
+ archive_path = os.path.join(temp_dir, name + '.tar')
81
+ tar_directory(directory, archive_path)
82
+ _raw_upload_directory(name, temp_dir)
83
+
84
+ def upload_crashes(self, name, directory):
85
+ """Uploads the crashes at |directory| to |name|."""
86
+ return _raw_upload_directory(self.CRASHES_PREFIX + name, directory)
87
+
88
+ def upload_corpus(self, name, directory, replace=False):
89
+ """Uploads the corpus at |directory| to |name|."""
90
+ # Not applicable as the the entire corpus is uploaded under a single
91
+ # artifact name.
92
+ del replace
93
+ return self._upload_directory(self.CORPUS_PREFIX + name, directory)
94
+
95
+ def upload_build(self, name, directory):
96
+ """Uploads the build at |directory| to |name|."""
97
+ return self._upload_directory(self.BUILD_PREFIX + name, directory)
98
+
99
+ def upload_coverage(self, name, directory):
100
+ """Uploads the coverage report at |directory| to |name|."""
101
+ return self._upload_directory(self.COVERAGE_PREFIX + name, directory)
102
+
103
+ def download_corpus(self, name, dst_directory): # pylint: disable=unused-argument,no-self-use
104
+ """Downloads the corpus located at |name| to |dst_directory|."""
105
+ return self._download_artifact(self.CORPUS_PREFIX + name, dst_directory)
106
+
107
+ def _find_artifact(self, name):
108
+ """Finds an artifact using the GitHub API and returns it."""
109
+ logging.debug('Listing artifacts.')
110
+ artifacts = self._list_artifacts()
111
+ artifact = github_api.find_artifact(name, artifacts)
112
+ logging.debug('Artifact: %s.', artifact)
113
+ return artifact
114
+
115
+ def _download_artifact(self, name, dst_directory):
116
+ """Downloads artifact with |name| to |dst_directory|. Returns True on
117
+ success."""
118
+ name = self._get_artifact_name(name)
119
+
120
+ with tempfile.TemporaryDirectory() as temp_dir:
121
+ if not self._raw_download_artifact(name, temp_dir):
122
+ logging.warning('Could not download artifact: %s.', name)
123
+ return False
124
+
125
+ artifact_tarfile_path = os.path.join(temp_dir, name + '.tar')
126
+ if not os.path.exists(artifact_tarfile_path):
127
+ logging.error('Artifact zip did not contain a tarfile.')
128
+ return False
129
+
130
+ # TODO(jonathanmetzman): Replace this with archive.unpack from
131
+ # libClusterFuzz so we can avoid path traversal issues.
132
+ with tarfile.TarFile(artifact_tarfile_path) as artifact_tarfile:
133
+ artifact_tarfile.extractall(dst_directory)
134
+ return True
135
+
136
+ def _raw_download_artifact(self, name, dst_directory):
137
+ """Downloads the artifact with |name| to |dst_directory|. Returns True on
138
+ success. Does not do any untarring or adding prefix to |name|."""
139
+ artifact = self._find_artifact(name)
140
+ if not artifact:
141
+ logging.warning('Could not find artifact: %s.', name)
142
+ return False
143
+ download_url = artifact['archive_download_url']
144
+ return http_utils.download_and_unpack_zip(
145
+ download_url, dst_directory, headers=self.github_api_http_headers)
146
+
147
+ def _list_artifacts(self):
148
+ """Returns a list of artifacts."""
149
+ return github_api.list_artifacts(self.config.project_repo_owner,
150
+ self.config.project_repo_name,
151
+ self.github_api_http_headers)
152
+
153
+ def download_build(self, name, dst_directory):
154
+ """Downloads the build with name |name| to |dst_directory|."""
155
+ return self._download_artifact(self.BUILD_PREFIX + name, dst_directory)
156
+
157
+ def download_coverage(self, name, dst_directory):
158
+ """Downloads the latest project coverage report."""
159
+ return self._download_artifact(self.COVERAGE_PREFIX + name, dst_directory)
160
+
161
+
162
+ def _upload_artifact_with_upload_js(name, artifact_paths, directory):
163
+ """Uploads the artifacts in |artifact_paths| that are located in |directory|
164
+ to |name|, using the upload.js script."""
165
+ command = [UPLOAD_JS, name, directory] + artifact_paths
166
+ _, _, retcode = utils.execute(command, location=OSS_FUZZ_ROOT_DIR)
167
+ return retcode == 0
168
+
169
+
170
+ def _raw_upload_directory(name, directory):
171
+ """Uploads the artifacts located in |directory| to |name|. Does not do any
172
+ tarring or adding prefixes to |name|."""
173
+ # Get file paths.
174
+ artifact_paths = []
175
+ for root, _, curr_file_paths in os.walk(directory):
176
+ for file_path in curr_file_paths:
177
+ artifact_paths.append(os.path.join(root, file_path))
178
+ logging.debug('Artifact paths: %s.', artifact_paths)
179
+ return _upload_artifact_with_upload_js(name, artifact_paths, directory)
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/github_actions_test.py ADDED
@@ -0,0 +1,283 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Tests for github_actions."""
15
+ import os
16
+ import shutil
17
+ import sys
18
+ import tarfile
19
+ import tempfile
20
+ import unittest
21
+ from unittest import mock
22
+
23
+ from pyfakefs import fake_filesystem_unittest
24
+
25
+ # pylint: disable=wrong-import-position
26
+ INFRA_DIR = os.path.dirname(
27
+ os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
28
+ sys.path.append(INFRA_DIR)
29
+
30
+ from filestore import github_actions
31
+ import test_helpers
32
+
33
+ # pylint: disable=protected-access,no-self-use
34
+
35
+
36
+ class GithubActionsFilestoreTest(fake_filesystem_unittest.TestCase):
37
+ """Tests for GithubActionsFilestore."""
38
+
39
+ @mock.patch('platform_config.github._get_event_data', return_value={})
40
+ def setUp(self, _): # pylint: disable=arguments-differ
41
+ test_helpers.patch_environ(self)
42
+ self.token = 'example githubtoken'
43
+ self.owner = 'exampleowner'
44
+ self.repo = 'examplerepo'
45
+ os.environ['GITHUB_REPOSITORY'] = f'{self.owner}/{self.repo}'
46
+ os.environ['GITHUB_EVENT_PATH'] = '/fake'
47
+ os.environ['CFL_PLATFORM'] = 'github'
48
+ os.environ['GITHUB_WORKSPACE'] = '/workspace'
49
+ self.config = test_helpers.create_run_config(token=self.token)
50
+ self.local_dir = '/local-dir'
51
+ self.testcase = os.path.join(self.local_dir, 'testcase')
52
+
53
+ def _get_expected_http_headers(self):
54
+ return {
55
+ 'Authorization': f'token {self.token}',
56
+ 'Accept': 'application/vnd.github.v3+json',
57
+ }
58
+
59
+ @mock.patch('filestore.github_actions.github_api.list_artifacts')
60
+ def test_list_artifacts(self, mock_list_artifacts):
61
+ """Tests that _list_artifacts works as intended."""
62
+ filestore = github_actions.GithubActionsFilestore(self.config)
63
+ filestore._list_artifacts()
64
+ mock_list_artifacts.assert_called_with(self.owner, self.repo,
65
+ self._get_expected_http_headers())
66
+
67
+ @mock.patch('logging.warning')
68
+ @mock.patch('filestore.github_actions.GithubActionsFilestore._list_artifacts',
69
+ return_value=None)
70
+ @mock.patch('filestore.github_actions.github_api.find_artifact',
71
+ return_value=None)
72
+ def test_download_build_no_artifact(self, _, __, mock_warning):
73
+ """Tests that download_build returns None and doesn't exception when
74
+ find_artifact can't find an artifact."""
75
+ filestore = github_actions.GithubActionsFilestore(self.config)
76
+ name = 'name'
77
+ build_dir = 'build-dir'
78
+ self.assertFalse(filestore.download_build(name, build_dir))
79
+ mock_warning.assert_called_with('Could not download artifact: %s.',
80
+ 'cifuzz-build-' + name)
81
+
82
+ @mock.patch('logging.warning')
83
+ @mock.patch('filestore.github_actions.GithubActionsFilestore._list_artifacts',
84
+ return_value=None)
85
+ @mock.patch('filestore.github_actions.github_api.find_artifact',
86
+ return_value=None)
87
+ def test_download_corpus_no_artifact(self, _, __, mock_warning):
88
+ """Tests that download_corpus_build returns None and doesn't exception when
89
+ find_artifact can't find an artifact."""
90
+ filestore = github_actions.GithubActionsFilestore(self.config)
91
+ name = 'name'
92
+ dst_dir = 'local-dir'
93
+ self.assertFalse(filestore.download_corpus(name, dst_dir))
94
+ mock_warning.assert_called_with('Could not download artifact: %s.',
95
+ 'cifuzz-corpus-' + name)
96
+
97
+ @mock.patch('filestore.github_actions.tar_directory')
98
+ @mock.patch('filestore.github_actions._upload_artifact_with_upload_js')
99
+ def test_upload_corpus(self, mock_upload_artifact, mock_tar_directory):
100
+ """Test uploading corpus."""
101
+ self._create_local_dir()
102
+
103
+ def mock_tar_directory_impl(_, archive_path):
104
+ self.fs.create_file(archive_path)
105
+
106
+ mock_tar_directory.side_effect = mock_tar_directory_impl
107
+
108
+ filestore = github_actions.GithubActionsFilestore(self.config)
109
+ filestore.upload_corpus('target', self.local_dir)
110
+ self.assert_upload(mock_upload_artifact, mock_tar_directory,
111
+ 'corpus-target')
112
+
113
+ @mock.patch('filestore.github_actions._upload_artifact_with_upload_js')
114
+ def test_upload_crashes(self, mock_upload_artifact):
115
+ """Test uploading crashes."""
116
+ self._create_local_dir()
117
+
118
+ filestore = github_actions.GithubActionsFilestore(self.config)
119
+ filestore.upload_crashes('current', self.local_dir)
120
+ mock_upload_artifact.assert_has_calls(
121
+ [mock.call('crashes-current', ['/local-dir/testcase'], '/local-dir')])
122
+
123
+ @mock.patch('filestore.github_actions.tar_directory')
124
+ @mock.patch('filestore.github_actions._upload_artifact_with_upload_js')
125
+ def test_upload_build(self, mock_upload_artifact, mock_tar_directory):
126
+ """Test uploading build."""
127
+ self._create_local_dir()
128
+
129
+ def mock_tar_directory_impl(_, archive_path):
130
+ self.fs.create_file(archive_path)
131
+
132
+ mock_tar_directory.side_effect = mock_tar_directory_impl
133
+
134
+ filestore = github_actions.GithubActionsFilestore(self.config)
135
+ filestore.upload_build('sanitizer', self.local_dir)
136
+ self.assert_upload(mock_upload_artifact, mock_tar_directory,
137
+ 'build-sanitizer')
138
+
139
+ @mock.patch('filestore.github_actions.tar_directory')
140
+ @mock.patch('filestore.github_actions._upload_artifact_with_upload_js')
141
+ def test_upload_coverage(self, mock_upload_artifact, mock_tar_directory):
142
+ """Test uploading coverage."""
143
+ self._create_local_dir()
144
+
145
+ def mock_tar_directory_impl(_, archive_path):
146
+ self.fs.create_file(archive_path)
147
+
148
+ mock_tar_directory.side_effect = mock_tar_directory_impl
149
+
150
+ filestore = github_actions.GithubActionsFilestore(self.config)
151
+ filestore.upload_coverage('latest', self.local_dir)
152
+ self.assert_upload(mock_upload_artifact, mock_tar_directory,
153
+ 'coverage-latest')
154
+
155
+ def assert_upload(self, mock_upload_artifact, mock_tar_directory,
156
+ expected_artifact_name):
157
+ """Tests that upload_directory invokes tar_directory and
158
+ artifact_client.upload_artifact properly."""
159
+ # Don't assert what second argument will be since it's a temporary
160
+ # directory.
161
+ self.assertEqual(mock_tar_directory.call_args_list[0][0][0], self.local_dir)
162
+
163
+ # Don't assert what second and third arguments will be since they are
164
+ # temporary directories.
165
+ expected_artifact_name = 'cifuzz-' + expected_artifact_name
166
+ self.assertEqual(mock_upload_artifact.call_args_list[0][0][0],
167
+ expected_artifact_name)
168
+
169
+ # Assert artifacts list contains one tarfile.
170
+ artifacts_list = mock_upload_artifact.call_args_list[0][0][1]
171
+ self.assertEqual(len(artifacts_list), 1)
172
+ self.assertEqual(os.path.basename(artifacts_list[0]),
173
+ expected_artifact_name + '.tar')
174
+
175
+ def _create_local_dir(self):
176
+ """Sets up pyfakefs and creates a corpus directory containing
177
+ self.testcase."""
178
+ self.setUpPyfakefs()
179
+ self.fs.create_file(self.testcase, contents='hi')
180
+
181
+ @mock.patch('filestore.github_actions.GithubActionsFilestore._find_artifact')
182
+ @mock.patch('http_utils.download_and_unpack_zip')
183
+ def test_download_artifact(self, mock_download_and_unpack_zip,
184
+ mock_find_artifact):
185
+ """Tests that _download_artifact works as intended."""
186
+ artifact_download_url = 'http://example.com/download'
187
+ artifact_listing = {
188
+ 'expired': False,
189
+ 'name': 'corpus',
190
+ 'archive_download_url': artifact_download_url
191
+ }
192
+ mock_find_artifact.return_value = artifact_listing
193
+
194
+ self._create_local_dir()
195
+ with tempfile.TemporaryDirectory() as temp_dir:
196
+ # Create a tarball.
197
+ archive_path = os.path.join(temp_dir, 'cifuzz-corpus.tar')
198
+ github_actions.tar_directory(self.local_dir, archive_path)
199
+
200
+ artifact_download_dst_dir = os.path.join(temp_dir, 'dst')
201
+ os.mkdir(artifact_download_dst_dir)
202
+
203
+ def mock_download_and_unpack_zip_impl(url, download_artifact_temp_dir,
204
+ headers):
205
+ self.assertEqual(url, artifact_download_url)
206
+ self.assertEqual(headers, self._get_expected_http_headers())
207
+ shutil.copy(
208
+ archive_path,
209
+ os.path.join(download_artifact_temp_dir,
210
+ os.path.basename(archive_path)))
211
+ return True
212
+
213
+ mock_download_and_unpack_zip.side_effect = (
214
+ mock_download_and_unpack_zip_impl)
215
+ filestore = github_actions.GithubActionsFilestore(self.config)
216
+ self.assertTrue(
217
+ filestore._download_artifact('corpus', artifact_download_dst_dir))
218
+ mock_find_artifact.assert_called_with('cifuzz-corpus')
219
+ self.assertTrue(
220
+ os.path.exists(
221
+ os.path.join(artifact_download_dst_dir,
222
+ os.path.basename(self.testcase))))
223
+
224
+ @mock.patch('filestore.github_actions.github_api.list_artifacts')
225
+ def test_find_artifact(self, mock_list_artifacts):
226
+ """Tests that _find_artifact works as intended."""
227
+ artifact_listing_1 = {
228
+ 'expired': False,
229
+ 'name': 'other',
230
+ 'archive_download_url': 'http://download1'
231
+ }
232
+ artifact_listing_2 = {
233
+ 'expired': False,
234
+ 'name': 'artifact',
235
+ 'archive_download_url': 'http://download2'
236
+ }
237
+ artifact_listing_3 = {
238
+ 'expired': True,
239
+ 'name': 'artifact',
240
+ 'archive_download_url': 'http://download3'
241
+ }
242
+ artifact_listing_4 = {
243
+ 'expired': False,
244
+ 'name': 'artifact',
245
+ 'archive_download_url': 'http://download4'
246
+ }
247
+ artifacts = [
248
+ artifact_listing_1, artifact_listing_2, artifact_listing_3,
249
+ artifact_listing_4
250
+ ]
251
+ mock_list_artifacts.return_value = artifacts
252
+ filestore = github_actions.GithubActionsFilestore(self.config)
253
+ # Test that find_artifact will return the most recent unexpired artifact
254
+ # with the correct name.
255
+ self.assertEqual(filestore._find_artifact('artifact'), artifact_listing_2)
256
+ mock_list_artifacts.assert_called_with(self.owner, self.repo,
257
+ self._get_expected_http_headers())
258
+
259
+
260
+ class TarDirectoryTest(unittest.TestCase):
261
+ """Tests for tar_directory."""
262
+
263
+ def test_tar_directory(self):
264
+ """Tests that tar_directory writes the archive to the correct location and
265
+ archives properly."""
266
+ with tempfile.TemporaryDirectory() as temp_dir:
267
+ archive_path = os.path.join(temp_dir, 'myarchive.tar')
268
+ archived_dir = os.path.join(temp_dir, 'toarchive')
269
+ os.mkdir(archived_dir)
270
+ archived_filename = 'file1'
271
+ archived_file_path = os.path.join(archived_dir, archived_filename)
272
+ with open(archived_file_path, 'w') as file_handle:
273
+ file_handle.write('hi')
274
+ github_actions.tar_directory(archived_dir, archive_path)
275
+ self.assertTrue(os.path.exists(archive_path))
276
+
277
+ # Now check it archives correctly.
278
+ unpacked_directory = os.path.join(temp_dir, 'unpacked')
279
+ with tarfile.TarFile(archive_path) as artifact_tarfile:
280
+ artifact_tarfile.extractall(unpacked_directory)
281
+ unpacked_archived_file_path = os.path.join(unpacked_directory,
282
+ archived_filename)
283
+ self.assertTrue(os.path.exists(unpacked_archived_file_path))
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/github_api.py ADDED
@@ -0,0 +1,109 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for dealing with the GitHub API. This is different from
15
+ github_actions_toolkit which only deals with the actions API. We need to use
16
+ both."""
17
+ import logging
18
+ import os
19
+ import sys
20
+
21
+ import requests
22
+
23
+ import filestore
24
+
25
+ # pylint: disable=wrong-import-position,import-error
26
+
27
+ sys.path.append(
28
+ os.path.join(__file__, os.path.pardir, os.path.pardir, os.path.pardir,
29
+ os.path.pardir))
30
+ import retry
31
+
32
+ _MAX_ITEMS_PER_PAGE = 100
33
+
34
+ _GET_ATTEMPTS = 3
35
+ _GET_BACKOFF = 1
36
+
37
+
38
+ def get_http_auth_headers(config):
39
+ """Returns HTTP headers for authentication to the API."""
40
+ authorization = f'token {config.token}'
41
+ return {
42
+ 'Authorization': authorization,
43
+ 'Accept': 'application/vnd.github.v3+json'
44
+ }
45
+
46
+
47
+ def _get_artifacts_list_api_url(repo_owner, repo_name):
48
+ """Returns the artifacts_api_url for |repo_name| owned by |repo_owner|."""
49
+ github_api_url = os.getenv('GITHUB_API_URL', 'https://api.github.com')
50
+ return (f'{github_api_url}/repos/{repo_owner}/'
51
+ f'{repo_name}/actions/artifacts')
52
+
53
+
54
+ @retry.wrap(_GET_ATTEMPTS, _GET_BACKOFF)
55
+ def _do_get_request(*args, **kwargs):
56
+ """Wrapped version of requests.get that does retries."""
57
+ return requests.get(*args, **kwargs)
58
+
59
+
60
+ def _get_items(url, headers):
61
+ """Generator that gets and yields items from a GitHub API endpoint (specified
62
+ by |URL|) sending |headers| with the get request."""
63
+ # Github API response pages are 1-indexed.
64
+ page_counter = 1
65
+
66
+ # Set to infinity so we run loop at least once.
67
+ total_num_items = float('inf')
68
+
69
+ item_num = 0
70
+ while item_num < total_num_items:
71
+ params = {'per_page': _MAX_ITEMS_PER_PAGE, 'page': str(page_counter)}
72
+ response = _do_get_request(url, params=params, headers=headers)
73
+ response_json = response.json()
74
+ if not response.status_code == 200:
75
+ # Check that request was successful.
76
+ logging.error('Request to %s failed. Code: %d. Response: %s',
77
+ response.request.url, response.status_code, response_json)
78
+ raise filestore.FilestoreError('Github API request failed.')
79
+
80
+ if total_num_items == float('inf'):
81
+ # Set proper total_num_items
82
+ total_num_items = response_json['total_count']
83
+
84
+ # Get the key for the items we are after.
85
+ keys = [key for key in response_json.keys() if key != 'total_count']
86
+ assert len(keys) == 1, keys
87
+ items_key = keys[0]
88
+
89
+ for item in response_json[items_key]:
90
+ yield item
91
+ item_num += 1
92
+
93
+ page_counter += 1
94
+
95
+
96
+ def find_artifact(artifact_name, artifacts):
97
+ """Find the artifact with the name |artifact_name| in |artifacts|."""
98
+ for artifact in artifacts:
99
+ # TODO(metzman): Handle multiple by making sure we download the latest.
100
+ if artifact['name'] == artifact_name and not artifact['expired']:
101
+ return artifact
102
+ return None
103
+
104
+
105
+ def list_artifacts(owner, repo, headers):
106
+ """Returns a generator of all the artifacts for |owner|/|repo|."""
107
+ url = _get_artifacts_list_api_url(owner, repo)
108
+ logging.debug('Getting artifacts from: %s', url)
109
+ return _get_items(url, headers)
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/github_api_test.py ADDED
@@ -0,0 +1,41 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Tests for github_api."""
15
+ import os
16
+ import sys
17
+ import unittest
18
+
19
+ # pylint: disable=wrong-import-position,import-error
20
+ sys.path.append(
21
+ os.path.abspath(
22
+ os.path.join(os.path.dirname(__file__), os.path.pardir, os.path.pardir,
23
+ os.path.pardir)))
24
+
25
+ from filestore.github_actions import github_api
26
+ import test_helpers
27
+
28
+
29
+ class GetHttpAuthHeaders(unittest.TestCase):
30
+ """Tests for get_http_auth_headers."""
31
+
32
+ def test_get_http_auth_headers(self):
33
+ """Tests that get_http_auth_headers returns the correct result."""
34
+ token = 'example githubtoken'
35
+ run_config = test_helpers.create_run_config(token=token)
36
+ expected_headers = {
37
+ 'Authorization': f'token {token}',
38
+ 'Accept': 'application/vnd.github.v3+json',
39
+ }
40
+ self.assertEqual(expected_headers,
41
+ github_api.get_http_auth_headers(run_config))
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/github_actions/upload.js ADDED
@@ -0,0 +1,45 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/env node
2
+ // Copyright 2021 Google LLC
3
+ //
4
+ // Licensed under the Apache License, Version 2.0 (the "License");
5
+ // you may not use this file except in compliance with the License.
6
+ // You may obtain a copy of the License at
7
+ //
8
+ // http://www.apache.org/licenses/LICENSE-2.0
9
+ //
10
+ // Unless required by applicable law or agreed to in writing, software
11
+ // distributed under the License is distributed on an "AS IS" BASIS,
12
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ // See the License for the specific language governing permissions and
14
+ // limitations under the License.
15
+ // Script for uploading an artifact. Returns 0 on success.
16
+ // Usage: upload.js <artifactName> <rootDirectory> <file 1>...<file N>
17
+
18
+ const fs = require('fs');
19
+ const { DefaultArtifactClient } = require('@actions/artifact');
20
+
21
+ const artifactClient = new DefaultArtifactClient();
22
+ const artifactName = process.argv[2];
23
+ const rootDirectory = process.argv[3]
24
+ const files = process.argv.slice(4);
25
+ const options = {
26
+ continueOnError: true
27
+ };
28
+
29
+ async function uploadArtifact() {
30
+ try {
31
+ const uploadResult = await artifactClient.uploadArtifact(artifactName, files, rootDirectory, options);
32
+ console.log(uploadResult);
33
+ if (uploadResult.failedItems.length > 0) {
34
+ return 1;
35
+ }
36
+ return 0;
37
+ } catch (error) {
38
+ console.error('Error uploading artifact:', error);
39
+ return 1;
40
+ }
41
+ }
42
+
43
+ uploadArtifact().then(exitCode => {
44
+ process.exit(exitCode);
45
+ });
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/gitlab/__init__.py ADDED
@@ -0,0 +1,133 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """GitLab filestore implementation."""
15
+ import logging
16
+
17
+ import json
18
+ import os
19
+ import shutil
20
+ import tempfile
21
+
22
+ import filestore
23
+ import http_utils
24
+
25
+ # pylint: disable=no-self-use,unused-argument
26
+
27
+
28
+ class GitlabFilestore(filestore.BaseFilestore):
29
+ """Implementation of BaseFilestore using GitLab.
30
+ Needs a cache to upload and download builds.
31
+ Needs a git repository for corpus and coverage.
32
+ """
33
+
34
+ BUILD_PREFIX = 'build-'
35
+ CORPUS_PREFIX = 'corpus-'
36
+ COVERAGE_PREFIX = 'coverage-'
37
+ CRASHES_PREFIX = 'crashes-'
38
+
39
+ def __init__(self, config):
40
+ super().__init__(config)
41
+ self.artifacts_dir = self.config.platform_conf.artifacts_dir
42
+ self.cache_dir = self.config.platform_conf.cache_dir
43
+ if self.config.git_store_repo:
44
+ self.git_filestore = filestore.git.GitFilestore(config, None)
45
+ else:
46
+ self.git_filestore = None
47
+
48
+ def upload_crashes(self, name, directory):
49
+ """GitLab artifacts implementation of upload_crashes."""
50
+ # Upload crashes as job artifacts.
51
+ if os.listdir(directory):
52
+ dest_dir_artifacts = os.path.join(self.config.project_src_path,
53
+ self.artifacts_dir,
54
+ self.CRASHES_PREFIX + name)
55
+ logging.info('Uploading artifacts to %s.', dest_dir_artifacts)
56
+ shutil.copytree(directory, dest_dir_artifacts)
57
+
58
+ def upload_corpus(self, name, directory, replace=False):
59
+ """GitLab artifacts implementation of upload_corpus."""
60
+ # Use the git filestore if any.
61
+ if self.git_filestore:
62
+ self.git_filestore.upload_corpus(name, directory, replace)
63
+ return
64
+ # Fall back to cache.
65
+ dest_dir_cache = os.path.join(self.config.project_src_path, self.cache_dir,
66
+ self.CORPUS_PREFIX + name)
67
+ logging.info('Copying from %s to cache %s.', directory, dest_dir_cache)
68
+ # Remove previous corpus from cache if any.
69
+ shutil.rmtree(dest_dir_cache, ignore_errors=True)
70
+ shutil.copytree(directory, dest_dir_cache, dirs_exist_ok=True)
71
+
72
+ def upload_build(self, name, directory):
73
+ """GitLab artifacts implementation of upload_build."""
74
+ # Puts build into the cache.
75
+ dest_dir_cache = os.path.join(self.config.project_src_path, self.cache_dir,
76
+ self.BUILD_PREFIX + name)
77
+ logging.info('Copying from %s to cache %s.', directory, dest_dir_cache)
78
+ shutil.copytree(directory, dest_dir_cache, dirs_exist_ok=True)
79
+
80
+ def upload_coverage(self, name, directory):
81
+ """GitLab artifacts implementation of upload_coverage."""
82
+ # Use the git filestore.
83
+ if self.git_filestore:
84
+ self.git_filestore.upload_coverage(name, directory)
85
+ return
86
+ # Fall back to cache.
87
+ dest_dir_cache = os.path.join(self.config.project_src_path, self.cache_dir,
88
+ self.COVERAGE_PREFIX + name)
89
+ logging.info('Copying from %s to cache %s.', directory, dest_dir_cache)
90
+ shutil.copytree(directory, dest_dir_cache, dirs_exist_ok=True)
91
+ # And also updates coverage reports as artifacts
92
+ # as it should not be too big.
93
+ dest_dir_artifacts = os.path.join(self.config.project_src_path,
94
+ self.artifacts_dir,
95
+ self.COVERAGE_PREFIX + name)
96
+ logging.info('Uploading artifacts to %s.', dest_dir_artifacts)
97
+ shutil.copytree(directory, dest_dir_artifacts)
98
+
99
+ def _copy_from_cache(self, src_dir_cache, dst_directory):
100
+ if not os.path.exists(src_dir_cache):
101
+ logging.info('Cache %s does not exist.', src_dir_cache)
102
+ return False
103
+ logging.info('Copying %s from cache to %s.', src_dir_cache, dst_directory)
104
+ shutil.copytree(src_dir_cache, dst_directory, dirs_exist_ok=True)
105
+ return True
106
+
107
+ def download_corpus(self, name, dst_directory):
108
+ """GitLab artifacts implementation of download_corpus."""
109
+ # Use the git filestore if any.
110
+ if self.git_filestore:
111
+ self.git_filestore.download_corpus(name, dst_directory)
112
+ return
113
+ # Fall back to cache.
114
+ src_dir_cache = os.path.join(self.config.project_src_path, self.cache_dir,
115
+ self.CORPUS_PREFIX + name)
116
+ self._copy_from_cache(src_dir_cache, dst_directory)
117
+
118
+ def download_build(self, name, dst_directory):
119
+ """GitLab artifacts implementation of download_build."""
120
+ # Gets build from the cache.
121
+ src_dir_cache = os.path.join(self.config.project_src_path, self.cache_dir,
122
+ self.BUILD_PREFIX + name)
123
+ return self._copy_from_cache(src_dir_cache, dst_directory)
124
+
125
+ def download_coverage(self, name, dst_directory):
126
+ """GitLab artifacts implementation of download_coverage."""
127
+ # Use the git filestore if any.
128
+ if self.git_filestore:
129
+ return self.git_filestore.download_coverage(name, dst_directory)
130
+ # Fall back to cache.
131
+ src_dir_cache = os.path.join(self.config.project_src_path, self.cache_dir,
132
+ self.COVERAGE_PREFIX + name)
133
+ return self._copy_from_cache(src_dir_cache, dst_directory)
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/gsutil/__init__.py ADDED
@@ -0,0 +1,109 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Filestore implementation using gsutil."""
15
+ import logging
16
+ import os
17
+ import posixpath
18
+ import subprocess
19
+ import sys
20
+
21
+ # pylint: disable=wrong-import-position,import-error
22
+ sys.path.append(
23
+ os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir,
24
+ os.pardir, os.pardir))
25
+ import filestore
26
+ import utils
27
+
28
+
29
+ def _gsutil_execute(*args, parallel=True):
30
+ """Executes a gsutil command, passing |*args| to gsutil and returns the
31
+ stdout, stderr and returncode. Exceptions on failure."""
32
+ command = ['gsutil']
33
+ if parallel:
34
+ command.append('-m')
35
+ command += list(args)
36
+ logging.info('Executing gsutil command: %s', command)
37
+ return utils.execute(command, check_result=True)
38
+
39
+
40
+ def _rsync(src, dst, recursive=True, delete=False):
41
+ """Executes gsutil rsync on |src| and |dst|"""
42
+ args = ['rsync']
43
+ if recursive:
44
+ args.append('-r')
45
+ if delete:
46
+ args.append('-d')
47
+ args += [src, dst]
48
+ return _gsutil_execute(*args)
49
+
50
+
51
+ class GSUtilFilestore(filestore.BaseFilestore):
52
+ """Filestore implementation using gsutil."""
53
+ BUILD_DIR = 'build'
54
+ CRASHES_DIR = 'crashes'
55
+ CORPUS_DIR = 'corpus'
56
+ COVERAGE_DIR = 'coverage'
57
+
58
+ def __init__(self, config):
59
+ super().__init__(config)
60
+ self._cloud_bucket = self.config.cloud_bucket
61
+
62
+ def _get_gsutil_url(self, name, prefix_dir):
63
+ """Returns the gsutil URL for |name| and |prefix_dir|."""
64
+ if not prefix_dir:
65
+ return posixpath.join(self._cloud_bucket, name)
66
+ return posixpath.join(self._cloud_bucket, prefix_dir, name)
67
+
68
+ def _upload_directory(self, name, directory, prefix, delete=False):
69
+ gsutil_url = self._get_gsutil_url(name, prefix)
70
+ return _rsync(directory, gsutil_url, delete=delete)
71
+
72
+ def _download_directory(self, name, dst_directory, prefix):
73
+ gsutil_url = self._get_gsutil_url(name, prefix)
74
+ return _rsync(gsutil_url, dst_directory)
75
+
76
+ def upload_crashes(self, name, directory):
77
+ """Uploads the crashes at |directory| to |name|."""
78
+ # Name is going to be "current". I don't know if this makes sense outside of
79
+ # GitHub Actions.
80
+ gsutil_url = self._get_gsutil_url(name, self.CRASHES_DIR)
81
+ logging.info('Uploading crashes to %s.', gsutil_url)
82
+ return _rsync(directory, gsutil_url)
83
+
84
+ def upload_corpus(self, name, directory, replace=False):
85
+ """Uploads the crashes at |directory| to |name|."""
86
+ return self._upload_directory(name,
87
+ directory,
88
+ self.CORPUS_DIR,
89
+ delete=replace)
90
+
91
+ def upload_build(self, name, directory):
92
+ """Uploads the build located at |directory| to |name|."""
93
+ return self._upload_directory(name, directory, self.BUILD_DIR)
94
+
95
+ def upload_coverage(self, name, directory):
96
+ """Uploads the coverage report at |directory| to |name|."""
97
+ return self._upload_directory(name, directory, self.COVERAGE_DIR)
98
+
99
+ def download_corpus(self, name, dst_directory):
100
+ """Downloads the corpus located at |name| to |dst_directory|."""
101
+ return self._download_directory(name, dst_directory, self.CORPUS_DIR)
102
+
103
+ def download_build(self, name, dst_directory):
104
+ """Downloads the build with |name| to |dst_directory|."""
105
+ return self._download_directory(name, dst_directory, self.BUILD_DIR)
106
+
107
+ def download_coverage(self, name, dst_directory):
108
+ """Downloads the latest project coverage report."""
109
+ return self._download_directory(name, dst_directory, self.COVERAGE_DIR)
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/no_filestore/__init__.py ADDED
@@ -0,0 +1,51 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Empty filestore implementation for platforms that haven't implemented it."""
15
+ import logging
16
+
17
+ import filestore
18
+
19
+ # pylint:disable=no-self-use,unused-argument
20
+
21
+
22
+ class NoFilestore(filestore.BaseFilestore):
23
+ """Empty Filestore implementation."""
24
+
25
+ def upload_crashes(self, name, directory):
26
+ """Noop implementation of upload_crashes."""
27
+ logging.info('Not uploading crashes because no Filestore.')
28
+
29
+ def upload_corpus(self, name, directory, replace=False):
30
+ """Noop implementation of upload_corpus."""
31
+ logging.info('Not uploading corpus because no Filestore.')
32
+
33
+ def upload_build(self, name, directory):
34
+ """Noop implementation of upload_build."""
35
+ logging.info('Not uploading build because no Filestore.')
36
+
37
+ def upload_coverage(self, name, directory):
38
+ """Noop implementation of upload_coverage."""
39
+ logging.info('Not uploading coverage because no Filestore.')
40
+
41
+ def download_corpus(self, name, dst_directory):
42
+ """Noop implementation of download_corpus."""
43
+ logging.info('Not downloading corpus because no Filestore.')
44
+
45
+ def download_build(self, name, dst_directory):
46
+ """Noop implementation of download_build."""
47
+ logging.info('Not downloading build because no Filestore.')
48
+
49
+ def download_coverage(self, name, dst_directory):
50
+ """Noop implementation of download_coverage."""
51
+ logging.info('Not downloading coverage because no Filestore.')
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/platform_config/__init__.py ADDED
@@ -0,0 +1,124 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for getting the configuration CIFuzz needs to run."""
15
+ import logging
16
+ import os
17
+
18
+ import environment
19
+
20
+
21
+ class BasePlatformConfig:
22
+ """Base class for PlatformConfig subclasses."""
23
+
24
+ @property
25
+ def project_src_path(self):
26
+ """Returns the manually checked out path of the project's source if
27
+ specified or None."""
28
+ path = os.getenv('PROJECT_SRC_PATH')
29
+ if not path:
30
+ logging.debug('No PROJECT_SRC_PATH.')
31
+ return path
32
+
33
+ logging.debug('PROJECT_SRC_PATH: %s.', path)
34
+ return path
35
+
36
+ @property
37
+ def workspace(self):
38
+ """Returns the workspace."""
39
+ return os.getenv('WORKSPACE')
40
+
41
+ # Optional config variables.
42
+
43
+ @property
44
+ def git_sha(self):
45
+ """Returns the Git SHA to checkout and fuzz. This is used only by GitHub
46
+ projects when commit fuzzing. It is not used when PR fuzzing. It is
47
+ definitely needed by OSS-Fuzz on GitHub since they have no copy of the repo
48
+ on the host and the repo on the builder image is a clone from main/master.
49
+ Right now it is needed by external on GitHub because we need to clone a new
50
+ repo because the copy they give us doesn't work for diffing.
51
+
52
+ TODO(metzman): Try to eliminate the need for this by 1. Making the clone
53
+ from external github projects usable. 2. Forcing OSS-Fuzz on Github to clone
54
+ before starting CIFuzz."""
55
+ return None
56
+
57
+ @property
58
+ def base_commit(self):
59
+ """Returns the base commit to diff against (commit fuzzing)."""
60
+ # TODO(metzman) Rename base_commit to git_base_commit.
61
+ return os.getenv('GIT_BASE_COMMIT')
62
+
63
+ @property
64
+ def base_ref(self):
65
+ """Returns the base branch to diff against (pr fuzzing)."""
66
+ # TODO(metzman) Rename base_ref to git_base_ref.
67
+ return os.getenv('GIT_BASE_REF')
68
+
69
+ @property
70
+ def pr_ref(self):
71
+ """Returns the pull request to checkout and fuzz. This is used only by
72
+ GitHub projects when PR fuzzing. It is not used when commit fuzzing. It is
73
+ definitely needed by OSS-Fuzz on GitHub since they have no copy of the repo
74
+ on the host and the repo on the builder image is a clone from main/master.
75
+ Right now it is needed by external on GitHub because we need to clone a new
76
+ repo because the copy they give us doesn't work for diffing.
77
+
78
+ TODO(metzman): Try to eliminate the need for this by 1. Making the clone
79
+ from external github projects usable. 2. Forcing OSS-Fuzz on Github to clone
80
+ before starting CIFuzz."""
81
+ return None
82
+
83
+ @property
84
+ def project_repo_owner(self):
85
+ """Returns the project repo owner (githubism)."""
86
+ return None
87
+
88
+ @property
89
+ def project_repo_name(self):
90
+ """Returns the project repo name."""
91
+ return os.environ.get('REPOSITORY')
92
+
93
+ @property
94
+ def actor(self):
95
+ """Name of the actor for the CI."""
96
+ return None
97
+
98
+ @property
99
+ def token(self):
100
+ """Returns the CI API token."""
101
+ return None
102
+
103
+ @property
104
+ def docker_in_docker(self):
105
+ """Returns whether or not CFL is running using Docker in Docker."""
106
+ return environment.get_bool('DOCKER_IN_DOCKER', False)
107
+
108
+ @property
109
+ def filestore(self):
110
+ """Returns the filestore used to store persistent data."""
111
+ return os.environ.get('FILESTORE')
112
+
113
+ @property
114
+ def git_url(self):
115
+ """Returns the repo URL. This is only used by GitHub users. Right now it is
116
+ needed by external on GitHub because we need to clone a new repo because the
117
+ copy they give us doesn't work for diffing. It isn't used by OSS-Fuzz on
118
+ github users since the Git URL is determined using repo detection.
119
+
120
+ TODO(metzman): Try to eliminate the need for this by making the clone
121
+ from external github projects usable.
122
+ TODO(metzman): As an easier goal, maybe make OSS-Fuzz GitHub use this too
123
+ for: 1. Consistency 2. Maybe it will allow use on forks."""
124
+ return None
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/platform_config/platform_config_test.py ADDED
@@ -0,0 +1,82 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Tests for platform_config."""
15
+ import os
16
+ import unittest
17
+
18
+ import platform_config
19
+ import test_helpers
20
+
21
+
22
+ class GetProjectRepoOwnerAndNameTest(unittest.TestCase):
23
+ """Tests for get_project_repo_owner and get_project_repo_name."""
24
+
25
+ def setUp(self):
26
+ test_helpers.patch_environ(self)
27
+ self.repo_owner = 'repo-owner'
28
+ self.repo_name = 'repo-name'
29
+ self.env = platform_config.BasePlatformConfig()
30
+
31
+ def test_unset_repository(self):
32
+ """Tests that the correct result is returned when repository is not set."""
33
+ self.assertIsNone(self.env.project_repo_name)
34
+
35
+ def test_owner(self):
36
+ """Tests that the correct result is returned for owner."""
37
+ self.assertIsNone(self.env.project_repo_owner)
38
+
39
+ def test_empty_repository(self):
40
+ """Tests that the correct result is returned when repository is an empty
41
+ string."""
42
+ os.environ['REPOSITORY'] = ''
43
+ self.assertEqual(self.env.project_repo_name, '')
44
+
45
+ def test_repository(self):
46
+ """Tests that the correct result is returned when repository contains the
47
+ just the repo name (as it does outside of GitHub)."""
48
+ os.environ['REPOSITORY'] = self.repo_name
49
+ self.assertEqual(self.env.project_repo_name, self.repo_name)
50
+
51
+
52
+ class ProjectSrcPathTest(unittest.TestCase):
53
+ """Tests for project_src_path."""
54
+
55
+ def setUp(self):
56
+ test_helpers.patch_environ(self)
57
+
58
+ def test_not_github(self):
59
+ """Tests that project_src_path returns the correct result not on
60
+ GitHub."""
61
+ project_src_path = 'project-src'
62
+ os.environ['PROJECT_SRC_PATH'] = project_src_path
63
+ generic_ci_env = platform_config.BasePlatformConfig()
64
+ self.assertEqual(generic_ci_env.project_src_path, project_src_path)
65
+
66
+
67
+ class GetGitUrlTest(unittest.TestCase):
68
+ """Tests for BasePlatformConfig.git_url."""
69
+
70
+ def setUp(self):
71
+ test_helpers.patch_environ(self)
72
+ self.env = platform_config.BasePlatformConfig()
73
+
74
+ def test_unset_repository(self):
75
+ """Tests that the correct result is returned when repository is not set."""
76
+ self.assertEqual(self.env.git_url, None)
77
+
78
+ def test_repository(self):
79
+ """Tests that the correct result is returned when GITHUB_REPOSITORY is
80
+ set."""
81
+ os.environ['GITHUB_REPOSITORY'] = 'repo/owner'
82
+ self.assertIsNone(self.env.git_url)
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/platform_config/prow.py ADDED
@@ -0,0 +1,64 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2021 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Module for getting the configuration CIFuzz needs to run on prow."""
15
+ import logging
16
+ import os
17
+
18
+ import platform_config
19
+
20
+ # pylint: disable=too-few-public-methods
21
+
22
+
23
+ class PlatformConfig(platform_config.BasePlatformConfig):
24
+ """CI environment for Prow."""
25
+
26
+ @property
27
+ def project_src_path(self):
28
+ """Returns the manually checked out path of the project's source if
29
+ specified or the current directory if not. Prow will run ClusterfuzzLite
30
+ at the directory head for the repo."""
31
+ project_src_path = os.getenv('PROJECT_SRC_PATH', os.getcwd())
32
+ logging.debug('PROJECT_SRC_PATH: %s.', project_src_path)
33
+ return project_src_path
34
+
35
+ @property
36
+ def workspace(self):
37
+ """Returns the workspace."""
38
+ # Let Prow user override workspace, but default to using artifacts dir
39
+ return os.getenv('WORKSPACE', os.getenv('ARTIFACTS'))
40
+
41
+ @property
42
+ def base_ref(self):
43
+ """Returns the base branch to diff against (pr fuzzing)."""
44
+ return os.getenv('PULL_BASE_REF')
45
+
46
+ @property
47
+ def project_repo_name(self):
48
+ """Returns the project repo name."""
49
+ return os.getenv('REPO_NAME')
50
+
51
+ @property
52
+ def base_commit(self):
53
+ """Returns the base commit to diff against (commit fuzzing)."""
54
+ return os.getenv('PULL_BASE_SHA')
55
+
56
+ @property
57
+ def docker_in_docker(self):
58
+ """Returns True if using Docker in Docker."""
59
+ return True
60
+
61
+ @property
62
+ def filestore(self):
63
+ """Returns the filestore used to store persistent data."""
64
+ return os.environ.get('FILESTORE', 'gsutil')
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/TimeoutFuzzer.cpp ADDED
@@ -0,0 +1,36 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2021 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ // Example of a standalone runner for "fuzz targets".
16
+ // It reads all files passed as parameters and feeds their contents
17
+ // one by one into the fuzz target (LLVMFuzzerTestOneInput).
18
+ // This runner does not do any fuzzing, but allows us to run the fuzz target
19
+ // on the test corpus (e.g. "do_stuff_test_data") or on a single file,
20
+ // e.g. the one that comes from a bug report.
21
+
22
+ // This is a fuzz target that times out on every input by infinite looping.
23
+ // This is used for testing.
24
+ // Build instructions:
25
+ // 1. clang++ -fsanitize=fuzzer TimeoutFuzzer.cpp -o timeout_fuzzer
26
+ // 2. strip timeout_fuzzer
27
+ // The binary is stripped to save space in the git repo.
28
+
29
+ #include <stddef.h>
30
+ #include <stdint.h>
31
+
32
+ extern "C" int LLVMFuzzerTestOneInput(uint8_t* data, size_t size) {
33
+ while (true)
34
+ ;
35
+ return 0;
36
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/example_crash_fuzzer_output.txt ADDED
@@ -0,0 +1,202 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ /github/workspace/build-out/do_stuff_fuzzer -timeout=25 -rss_limit_mb=2560 -dict=/github/workspace/build-out/do_stuff_fuzzer.dict -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmp9p1w4p8r/ -max_total_time=600 -print_final_stats=1 /github/workspace/cifuzz-corpus/do_stuff_fuzzer >fuzz-0.log 2>&1
2
+ ================== Job 0 exited with exit code 77 ============
3
+ Dictionary: 3 entries
4
+ INFO: Running with entropic power schedule (0xFF, 100).
5
+ INFO: Seed: 1337
6
+ INFO: Loaded 1 modules (86 inline 8-bit counters): 86 [0x6150e0, 0x615136),
7
+ INFO: Loaded 1 PC tables (86 PCs): 86 [0x5c8b08,0x5c9068),
8
+ INFO: 5 files found in /github/workspace/cifuzz-corpus/do_stuff_fuzzer
9
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes
10
+ INFO: seed corpus: files: 5 min: 3b max: 44b total: 64b rss: 31Mb
11
+ #6 INITED cov: 64 ft: 70 corp: 5/64b exec/s: 0 rss: 32Mb
12
+ #9 NEW cov: 64 ft: 72 corp: 6/74b lim: 4096 exec/s: 0 rss: 32Mb L: 10/44 MS: 3 ChangeBit-InsertByte-ManualDict- DE: "foo"-
13
+ #17 NEW cov: 64 ft: 74 corp: 7/86b lim: 4096 exec/s: 0 rss: 32Mb L: 12/44 MS: 3 ChangeBit-ManualDict-PersAutoDict- DE: "ouch"-"foo"-
14
+ #18 NEW cov: 64 ft: 76 corp: 8/100b lim: 4096 exec/s: 0 rss: 32Mb L: 14/44 MS: 1 CrossOver-
15
+ #22 NEW cov: 64 ft: 78 corp: 9/141b lim: 4096 exec/s: 0 rss: 32Mb L: 41/44 MS: 4 InsertRepeatedBytes-CopyPart-ChangeBinInt-ChangeBit-
16
+ #24 NEW cov: 64 ft: 80 corp: 10/151b lim: 4096 exec/s: 0 rss: 32Mb L: 10/44 MS: 2 CrossOver-CopyPart-
17
+ #28 NEW cov: 64 ft: 81 corp: 11/171b lim: 4096 exec/s: 0 rss: 32Mb L: 20/44 MS: 4 InsertByte-PersAutoDict-ShuffleBytes-ManualDict- DE: "foo"-"ouch"-
18
+ #43 NEW cov: 65 ft: 83 corp: 12/175b lim: 4096 exec/s: 0 rss: 32Mb L: 4/44 MS: 5 InsertByte-ChangeBit-ManualDict-ManualDict-EraseBytes- DE: "bar"-"bar"-
19
+ #54 NEW cov: 65 ft: 84 corp: 13/191b lim: 4096 exec/s: 0 rss: 32Mb L: 16/44 MS: 1 CrossOver-
20
+ #64 NEW cov: 65 ft: 86 corp: 14/209b lim: 4096 exec/s: 0 rss: 32Mb L: 18/44 MS: 5 InsertByte-ChangeBinInt-CMP-PersAutoDict-CopyPart- DE: "\000\000"-"foo"-
21
+ #75 REDUCE cov: 65 ft: 86 corp: 14/203b lim: 4096 exec/s: 0 rss: 32Mb L: 35/44 MS: 1 EraseBytes-
22
+ #76 REDUCE cov: 65 ft: 86 corp: 14/195b lim: 4096 exec/s: 0 rss: 32Mb L: 36/36 MS: 1 EraseBytes-
23
+ =================================================================
24
+ ==26==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000003114 at pc 0x00000056d1db bp 0x7fffd6a72bf0 sp 0x7fffd6a72be8
25
+ READ of size 4 at 0x603000003114 thread T0
26
+ SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
27
+ #0 0x56d1da in DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) /src/cifuzz-example/my_api.cpp:26:10
28
+ #1 0x56c5d6 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:15:3
29
+ #2 0x43de23 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
30
+ #3 0x43d60a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
31
+ #4 0x43ecd9 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:757:19
32
+ #5 0x43f9a5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:895:5
33
+ #6 0x42ed0f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
34
+ #7 0x458362 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
35
+ #8 0x7fcfaa2aa082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
36
+ #9 0x41f74d in _start (build-out/do_stuff_fuzzer+0x41f74d)
37
+
38
+ DEDUP_TOKEN: DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&)--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
39
+ 0x603000003114 is located 0 bytes to the right of 20-byte region [0x603000003100,0x603000003114)
40
+ allocated by thread T0 here:
41
+ #0 0x569dfd in operator new(unsigned long) /src/llvm-project/compiler-rt/lib/asan/asan_new_delete.cpp:95:3
42
+ #1 0x56c9d4 in __libcpp_operator_new<unsigned long> /usr/local/bin/../include/c++/v1/new:245:10
43
+ #2 0x56c9d4 in __libcpp_allocate /usr/local/bin/../include/c++/v1/new:271:10
44
+ #3 0x56c9d4 in allocate /usr/local/bin/../include/c++/v1/__memory/allocator.h:105:38
45
+ #4 0x56c9d4 in allocate /usr/local/bin/../include/c++/v1/__memory/allocator_traits.h:262:20
46
+ #5 0x56c9d4 in __vallocate /usr/local/bin/../include/c++/v1/vector:931:37
47
+ #6 0x56c9d4 in vector /usr/local/bin/../include/c++/v1/vector:1236:9
48
+ #7 0x56c9d4 in DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) /src/cifuzz-example/my_api.cpp:14:20
49
+ #8 0x56c5d6 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:15:3
50
+ #9 0x43de23 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
51
+ #10 0x43d60a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
52
+ #11 0x43ecd9 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:757:19
53
+ #12 0x43f9a5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:895:5
54
+ #13 0x42ed0f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
55
+ #14 0x458362 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
56
+ #15 0x7fcfaa2aa082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
57
+
58
+ DEDUP_TOKEN: operator new(unsigned long)--__libcpp_operator_new<unsigned long>--__libcpp_allocate
59
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/cifuzz-example/my_api.cpp:26:10 in DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&)
60
+ Shadow bytes around the buggy address:
61
+ 0x0c067fff85d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
62
+ 0x0c067fff85e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
63
+ 0x0c067fff85f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
64
+ 0x0c067fff8600: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
65
+ 0x0c067fff8610: fd fa fa fa fd fd fd fa fa fa 00 00 00 00 fa fa
66
+ =>0x0c067fff8620: 00 00[04]fa fa fa fa fa fa fa fa fa fa fa fa fa
67
+ 0x0c067fff8630: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
68
+ 0x0c067fff8640: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
69
+ 0x0c067fff8650: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
70
+ 0x0c067fff8660: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
71
+ 0x0c067fff8670: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
72
+ Shadow byte legend (one shadow byte represents 8 application bytes):
73
+ Addressable: 00
74
+ Partially addressable: 01 02 03 04 05 06 07
75
+ Heap left redzone: fa
76
+ Freed heap region: fd
77
+ Stack left redzone: f1
78
+ Stack mid redzone: f2
79
+ Stack right redzone: f3
80
+ Stack after return: f5
81
+ Stack use after scope: f8
82
+ Global redzone: f9
83
+ Global init order: f6
84
+ Poisoned by user: f7
85
+ Container overflow: fc
86
+ Array cookie: ac
87
+ Intra object redzone: bb
88
+ ASan internal: fe
89
+ Left alloca redzone: ca
90
+ Right alloca redzone: cb
91
+ ==26==ABORTING
92
+ MS: 4 PersAutoDict-ManualDict-CrossOver-PersAutoDict- DE: "foo"-"ouch"-"bar"-; base unit: 1a25c32303e03f997166aee1c665b5ae9f66ec7d
93
+ 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x66,0x6f,0x6f,0xff,0x1,0x62,0x61,0x72,0x63,0x68,0x6f,0x75,0x63,0x68,0x66,0x6f,0x66,0x6e,0x6f,0x6d,0x67,0x6d,
94
+ \377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377foo\377\001barchouchfofnomgm
95
+ artifact_prefix='/tmp/tmp9p1w4p8r/'; Test unit written to /tmp/tmp9p1w4p8r/crash-1c750df432fe458b738987ba69cd20a598708775
96
+ Base64: //////////////////////9mb2//AWJhcmNob3VjaGZvZm5vbWdt
97
+ stat::number_of_executed_units: 90
98
+ stat::average_exec_per_sec: 0
99
+ stat::new_units_added: 11
100
+ stat::slowest_unit_time_sec: 0
101
+ stat::peak_rss_mb: 33
102
+ /github/workspace/build-out/do_stuff_fuzzer -timeout=25 -rss_limit_mb=2560 -dict=/github/workspace/build-out/do_stuff_fuzzer.dict -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmp9p1w4p8r/ -max_total_time=600 -print_final_stats=1 /github/workspace/cifuzz-corpus/do_stuff_fuzzer >fuzz-1.log 2>&1
103
+ ================== Job 1 exited with exit code 77 ============
104
+ Dictionary: 3 entries
105
+ INFO: Running with entropic power schedule (0xFF, 100).
106
+ INFO: Seed: 1337
107
+ INFO: Loaded 1 modules (86 inline 8-bit counters): 86 [0x6150e0, 0x615136),
108
+ INFO: Loaded 1 PC tables (86 PCs): 86 [0x5c8b08,0x5c9068),
109
+ INFO: 15 files found in /github/workspace/cifuzz-corpus/do_stuff_fuzzer
110
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes
111
+ INFO: seed corpus: files: 15 min: 3b max: 44b total: 239b rss: 31Mb
112
+ #16 INITED cov: 65 ft: 86 corp: 13/159b exec/s: 0 rss: 32Mb
113
+ #38 NEW cov: 65 ft: 88 corp: 14/188b lim: 4096 exec/s: 0 rss: 32Mb L: 29/35 MS: 2 InsertByte-CopyPart-
114
+ #43 REDUCE cov: 65 ft: 88 corp: 14/187b lim: 4096 exec/s: 0 rss: 32Mb L: 2/35 MS: 5 InsertByte-ChangeByte-ChangeBinInt-EraseBytes-EraseBytes-
115
+ #64 NEW cov: 66 ft: 89 corp: 15/191b lim: 4096 exec/s: 0 rss: 32Mb L: 4/35 MS: 1 ChangeByte-
116
+ #78 REDUCE cov: 66 ft: 89 corp: 15/190b lim: 4096 exec/s: 0 rss: 32Mb L: 15/35 MS: 4 ChangeBinInt-CopyPart-EraseBytes-EraseBytes-
117
+ #95 REDUCE cov: 66 ft: 89 corp: 15/188b lim: 4096 exec/s: 0 rss: 32Mb L: 16/35 MS: 2 ChangeBinInt-EraseBytes-
118
+ #110 REDUCE cov: 66 ft: 89 corp: 15/184b lim: 4096 exec/s: 0 rss: 32Mb L: 31/31 MS: 5 CrossOver-ChangeByte-ShuffleBytes-InsertByte-EraseBytes-
119
+ #146 REDUCE cov: 66 ft: 89 corp: 15/183b lim: 4096 exec/s: 0 rss: 32Mb L: 1/31 MS: 1 EraseBytes-
120
+ #157 NEW cov: 66 ft: 90 corp: 16/210b lim: 4096 exec/s: 0 rss: 32Mb L: 27/31 MS: 1 CrossOver-
121
+ #230 REDUCE cov: 66 ft: 92 corp: 17/318b lim: 4096 exec/s: 0 rss: 32Mb L: 108/108 MS: 3 CopyPart-InsertRepeatedBytes-CrossOver-
122
+ #277 NEW cov: 66 ft: 94 corp: 18/429b lim: 4096 exec/s: 0 rss: 32Mb L: 111/111 MS: 2 ManualDict-CMP- DE: "bar"-"\000\000\000\000"-
123
+ #337 NEW cov: 67 ft: 95 corp: 19/439b lim: 4096 exec/s: 0 rss: 32Mb L: 10/111 MS: 5 ChangeByte-ChangeBit-ManualDict-CopyPart-EraseBytes- DE: "bar"-
124
+ =================================================================
125
+ ==30==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000007d94 at pc 0x00000056d1db bp 0x7ffdb9da4b50 sp 0x7ffdb9da4b48
126
+ READ of size 4 at 0x603000007d94 thread T0
127
+ SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
128
+ #0 0x56d1da in DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) /src/cifuzz-example/my_api.cpp:26:10
129
+ #1 0x56c5d6 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:15:3
130
+ #2 0x43de23 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
131
+ #3 0x43d60a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
132
+ #4 0x43ecd9 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:757:19
133
+ #5 0x43f9a5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:895:5
134
+ #6 0x42ed0f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
135
+ #7 0x458362 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
136
+ #8 0x7fc2c6bd3082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
137
+ #9 0x41f74d in _start (build-out/do_stuff_fuzzer+0x41f74d)
138
+
139
+ DEDUP_TOKEN: DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&)--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
140
+ 0x603000007d94 is located 0 bytes to the right of 20-byte region [0x603000007d80,0x603000007d94)
141
+ allocated by thread T0 here:
142
+ #0 0x569dfd in operator new(unsigned long) /src/llvm-project/compiler-rt/lib/asan/asan_new_delete.cpp:95:3
143
+ #1 0x56c9d4 in __libcpp_operator_new<unsigned long> /usr/local/bin/../include/c++/v1/new:245:10
144
+ #2 0x56c9d4 in __libcpp_allocate /usr/local/bin/../include/c++/v1/new:271:10
145
+ #3 0x56c9d4 in allocate /usr/local/bin/../include/c++/v1/__memory/allocator.h:105:38
146
+ #4 0x56c9d4 in allocate /usr/local/bin/../include/c++/v1/__memory/allocator_traits.h:262:20
147
+ #5 0x56c9d4 in __vallocate /usr/local/bin/../include/c++/v1/vector:931:37
148
+ #6 0x56c9d4 in vector /usr/local/bin/../include/c++/v1/vector:1236:9
149
+ #7 0x56c9d4 in DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&) /src/cifuzz-example/my_api.cpp:14:20
150
+ #8 0x56c5d6 in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:15:3
151
+ #9 0x43de23 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
152
+ #10 0x43d60a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
153
+ #11 0x43ecd9 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:757:19
154
+ #12 0x43f9a5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:895:5
155
+ #13 0x42ed0f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
156
+ #14 0x458362 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
157
+ #15 0x7fc2c6bd3082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
158
+
159
+ DEDUP_TOKEN: operator new(unsigned long)--__libcpp_operator_new<unsigned long>--__libcpp_allocate
160
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/cifuzz-example/my_api.cpp:26:10 in DoStuff(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&)
161
+ Shadow bytes around the buggy address:
162
+ 0x0c067fff8f60: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
163
+ 0x0c067fff8f70: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa
164
+ 0x0c067fff8f80: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa
165
+ 0x0c067fff8f90: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
166
+ 0x0c067fff8fa0: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa
167
+ =>0x0c067fff8fb0: 00 00[04]fa fa fa fa fa fa fa fa fa fa fa fa fa
168
+ 0x0c067fff8fc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
169
+ 0x0c067fff8fd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
170
+ 0x0c067fff8fe0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
171
+ 0x0c067fff8ff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
172
+ 0x0c067fff9000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
173
+ Shadow byte legend (one shadow byte represents 8 application bytes):
174
+ Addressable: 00
175
+ Partially addressable: 01 02 03 04 05 06 07
176
+ Heap left redzone: fa
177
+ Freed heap region: fd
178
+ Stack left redzone: f1
179
+ Stack mid redzone: f2
180
+ Stack right redzone: f3
181
+ Stack after return: f5
182
+ Stack use after scope: f8
183
+ Global redzone: f9
184
+ Global init order: f6
185
+ Poisoned by user: f7
186
+ Container overflow: fc
187
+ Array cookie: ac
188
+ Intra object redzone: bb
189
+ ASan internal: fe
190
+ Left alloca redzone: ca
191
+ Right alloca redzone: cb
192
+ ==30==ABORTING
193
+ MS: 4 ShuffleBytes-ManualDict-CrossOver-PersAutoDict- DE: "foo"-"bar"-; base unit: 8fc7da8d952ed1aa5c7415e21b3d52b42402973d
194
+ 0x66,0x6f,0x6f,0x63,0x6f,0x75,0x6f,0x75,0x63,0x68,0x63,0x68,0x66,0x62,0x61,0x72,0x6f,0x6f,0x6d,0x67,0x66,0x6f,0x6f,0x2f,0x99,0x6f,0x6f,0x90,0x6f,0x6f,0x6d,0x0,0x0,0x67,0x2f,
195
+ foocououchchfbaroomgfoo/\231oo\220oom\000\000g/
196
+ artifact_prefix='/tmp/tmp9p1w4p8r/'; Test unit written to /tmp/tmp9p1w4p8r/crash-f8a2a1e84f58a2d676e5ad8078119a39b78df901
197
+ Base64: Zm9vY291b3VjaGNoZmJhcm9vbWdmb28vmW9vkG9vbQAAZy8=
198
+ stat::number_of_executed_units: 366
199
+ stat::average_exec_per_sec: 0
200
+ stat::new_units_added: 11
201
+ stat::slowest_unit_time_sec: 0
202
+ stat::peak_rss_mb: 33
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/.clusterfuzzlite/Dockerfile ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2020 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ #
15
+ ################################################################################
16
+
17
+ FROM ghcr.io/aixcc-finals/base-builder
18
+ RUN apt-get update && apt-get install -y make
19
+
20
+ COPY . $SRC/external-project
21
+ WORKDIR $SRC/external-project
22
+ COPY .clusterfuzzlite/build.sh $SRC/
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/Makefile ADDED
@@ -0,0 +1,44 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2017 Google Inc. All Rights Reserved.
2
+ # Licensed under the Apache License, Version 2.0 (the "License");
3
+
4
+ # Simple example of a build file that nicely integrates a fuzz target
5
+ # with the rest of the project.
6
+ #
7
+ # We use 'make' as the build system, but these ideas are applicable
8
+ # to any other build system
9
+
10
+ # By default, use our own standalone_fuzz_target_runner.
11
+ # This runner does no fuzzing, but simply executes the inputs
12
+ # provided via parameters.
13
+ # Run e.g. "make all LIB_FUZZING_ENGINE=/path/to/libFuzzer.a"
14
+ # to link the fuzzer(s) against a real fuzzing engine.
15
+ #
16
+ # OSS-Fuzz will define its own value for LIB_FUZZING_ENGINE.
17
+ LIB_FUZZING_ENGINE ?= standalone_fuzz_target_runner.o
18
+
19
+ # Values for CC, CFLAGS, CXX, CXXFLAGS are provided by OSS-Fuzz.
20
+ # Outside of OSS-Fuzz use the ones you prefer or rely on the default values.
21
+ # Do not use the -fsanitize=* flags by default.
22
+ # OSS-Fuzz will use different -fsanitize=* flags for different builds (asan, ubsan, msan, ...)
23
+
24
+ # You may add extra compiler flags like this:
25
+ CXXFLAGS += -std=c++11
26
+
27
+ all: do_stuff_fuzzer
28
+
29
+ clean:
30
+ rm -fv *.a *.o *_fuzzer crash-* *.zip
31
+
32
+ # Fuzz target, links against $LIB_FUZZING_ENGINE, so that
33
+ # you may choose which fuzzing engine to use.
34
+ do_stuff_fuzzer: do_stuff_fuzzer.cpp my_api.a standalone_fuzz_target_runner.o
35
+ ${CXX} ${CXXFLAGS} $< my_api.a ${LIB_FUZZING_ENGINE} -o $@
36
+
37
+
38
+ # The library itself.
39
+ my_api.a: my_api.cpp my_api.h
40
+ ${CXX} ${CXXFLAGS} $< -c
41
+ ar ruv my_api.a my_api.o
42
+
43
+ # The standalone fuzz target runner.
44
+ standalone_fuzz_target_runner.o: standalone_fuzz_target_runner.cpp
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/do_stuff_fuzzer.cpp ADDED
@@ -0,0 +1,24 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2020 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ #include "my_api.h"
15
+
16
+ #include <string>
17
+
18
+ // Simple fuzz target for DoStuff().
19
+ // See https://llvm.org/docs/LibFuzzer.html for details.
20
+ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
21
+ std::string str(reinterpret_cast<const char *>(data), size);
22
+ DoStuff(str); // Disregard the output.
23
+ return 0;
24
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/do_stuff_fuzzer.dict ADDED
@@ -0,0 +1,6 @@
 
 
 
 
 
 
 
1
+ # A dictionary for more efficient fuzzing of DoStuff().
2
+ # If the inputs contain multi-byte tokens, list them here.
3
+ # See https://llvm.org/docs/LibFuzzer.html#dictionaries
4
+ "foo"
5
+ "bar"
6
+ "ouch"
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/my_api.cpp ADDED
@@ -0,0 +1,36 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2020 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ // Implementation of "my_api".
16
+ #include "my_api.h"
17
+
18
+ #include <vector>
19
+
20
+ // Do some computations with 'str', return the result.
21
+ // This function contains a bug. Can you spot it?
22
+ size_t DoStuff(const std::string &str) {
23
+ std::vector<int> Vec({0, 1, 2, 3, 4});
24
+ size_t Idx = 0;
25
+ if (str.size() > 5)
26
+ Idx++;
27
+ if (str.find("foo") != std::string::npos)
28
+ Idx++;
29
+ if (str.find("bar") != std::string::npos)
30
+ Idx++;
31
+ if (str.find("ouch") != std::string::npos)
32
+ Idx++;
33
+ if (str.find("omg") != std::string::npos)
34
+ Idx++;
35
+ return Vec[Idx];
36
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/standalone_fuzz_target_runner.cpp ADDED
@@ -0,0 +1,47 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2020 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ // Example of a standalone runner for "fuzz targets".
16
+ // It reads all files passed as parameters and feeds their contents
17
+ // one by one into the fuzz target (LLVMFuzzerTestOneInput).
18
+ // This runner does not do any fuzzing, but allows us to run the fuzz target
19
+ // on the test corpus (e.g. "do_stuff_test_data") or on a single file,
20
+ // e.g. the one that comes from a bug report.
21
+
22
+ #include <cassert>
23
+ #include <iostream>
24
+ #include <fstream>
25
+ #include <vector>
26
+
27
+ // Forward declare the "fuzz target" interface.
28
+ // We deliberately keep this inteface simple and header-free.
29
+ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size);
30
+
31
+ int main(int argc, char **argv) {
32
+ for (int i = 1; i < argc; i++) {
33
+ std::ifstream in(argv[i]);
34
+ in.seekg(0, in.end);
35
+ size_t length = in.tellg();
36
+ in.seekg (0, in.beg);
37
+ std::cout << "Reading " << length << " bytes from " << argv[i] << std::endl;
38
+ // Allocate exactly length bytes so that we reliably catch buffer overflows.
39
+ std::vector<char> bytes(length);
40
+ in.read(bytes.data(), bytes.size());
41
+ assert(in);
42
+ LLVMFuzzerTestOneInput(reinterpret_cast<const uint8_t *>(bytes.data()),
43
+ bytes.size());
44
+ std::cout << "Execution successful" << std::endl;
45
+ }
46
+ return 0;
47
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/msan_crash_fuzzer_bug_summary.txt ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MemorySanitizer: use-of-uninitialized-value
2
+ #0 0x52675f in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:13:7
3
+ #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
4
+ #2 0x45ba46 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
5
+ #3 0x45bed9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
6
+ #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
7
+ #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
8
+ #6 0x7eff5562683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
9
+ #7 0x41eab8 in _start (out/do_stuff_fuzzer+0x41eab8)
10
+
11
+ DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&)
12
+ Uninitialized value was created by a heap allocation
13
+ #0 0x4d57ad in malloc /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:901:3
14
+ #1 0x437c07 in operator new(unsigned long) (out/do_stuff_fuzzer+0x437c07)
15
+ #2 0x45ba46 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
16
+ #3 0x45bed9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
17
+ #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
18
+ #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
19
+ #6 0x7eff5562683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
20
+ DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&)
21
+
22
+ SUMMARY:
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/msan_crash_fuzzer_output.txt ADDED
@@ -0,0 +1,39 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dictionary: 3 entries
2
+ INFO: Running with entropic power schedule (0xFF, 100).
3
+ INFO: Seed: 1337
4
+ INFO: Loaded 1 modules (184 inline 8-bit counters): 184 [0x829300, 0x8293b8),
5
+ INFO: Loaded 1 PC tables (184 PCs): 184 [0x5dc910,0x5dd490),
6
+ INFO: 5 files found in /tmp/do_stuff_fuzzer_corpus
7
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes
8
+ ==13==WARNING: MemorySanitizer: use-of-uninitialized-value
9
+ #0 0x52675f in LLVMFuzzerTestOneInput /src/cifuzz-example/do_stuff_fuzzer.cpp:13:7
10
+ #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
11
+ #2 0x45ba46 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
12
+ #3 0x45bed9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
13
+ #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
14
+ #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
15
+ #6 0x7eff5562683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
16
+ #7 0x41eab8 in _start (out/do_stuff_fuzzer+0x41eab8)
17
+
18
+ DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&)
19
+ Uninitialized value was created by a heap allocation
20
+ #0 0x4d57ad in malloc /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:901:3
21
+ #1 0x437c07 in operator new(unsigned long) (out/do_stuff_fuzzer+0x437c07)
22
+ #2 0x45ba46 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
23
+ #3 0x45bed9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
24
+ #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
25
+ #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
26
+ #6 0x7eff5562683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
27
+ DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&)
28
+
29
+ SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/cifuzz-example/do_stuff_fuzzer.cpp:13:7 in LLVMFuzzerTestOneInput
30
+ Unique heap origins: 65
31
+ Stack depot allocated bytes: 4424
32
+ Unique origin histories: 29
33
+ History depot allocated bytes: 696
34
+ Exiting
35
+ MS: 0 ; base unit: 0000000000000000000000000000000000000000
36
+
37
+
38
+ artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709
39
+ Base64:
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/sarif_utils_msan_stack.txt ADDED
@@ -0,0 +1,62 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Dictionary: 3 entries
2
+ 2024-05-07 18:49:02,343 - root - INFO - Fuzzer: do_stuff_fuzzer. Detected bug.
3
+ INFO: Running with entropic power schedule (0xFF, 100).
4
+ INFO: Seed: 1337
5
+ INFO: Loaded 1 modules (83 inline 8-bit counters): 83 [0x563ff0e03e98, 0x563ff0e03eeb),
6
+ INFO: Loaded 1 PC tables (83 PCs): 83 [0x563ff0e03ef0,0x563ff0e04420),
7
+ INFO: 0 files found in /github/workspace/cifuzz-corpus/do_stuff_fuzzer
8
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes
9
+ INFO: A corpus is not provided, starting from an empty corpus
10
+ #2 INITED cov: 2 ft: 2 corp: 1/1b exec/s: 0 rss: 69Mb
11
+ #4 NEW cov: 3 ft: 3 corp: 2/3b lim: 4096 exec/s: 0 rss: 69Mb L: 2/2 MS: 2 ChangeBit-InsertByte-
12
+ ==23==WARNING: MemorySanitizer: use-of-uninitialized-value
13
+ #0 0x563ff0d278f0 in LLVMFuzzerTestOneInput /src/cifuzz-external-example/do_stuff_fuzzer.cpp:24:1
14
+ #1 0x563ff0c24340 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13
15
+ #2 0x563ff0c23b65 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:516:7
16
+ #3 0x563ff0c25335 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:760:19
17
+ #4 0x563ff0c26125 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile>>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:905:5
18
+ #5 0x563ff0c14436 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:914:6
19
+ #6 0x563ff0c40962 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
20
+ #7 0x7f4c156ed082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 87b331c034a6458c64ce09c03939e947212e18ce)
21
+ #8 0x563ff0c055ad in _start (build-out/do_stuff_fuzzer+0x4a5ad)
22
+
23
+ DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*)
24
+ Uninitialized value was stored to memory at
25
+ #0 0x563ff0d278e9 in LLVMFuzzerTestOneInput /src/cifuzz-external-example/do_stuff_fuzzer.cpp
26
+ #1 0x563ff0c24340 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13
27
+ #2 0x563ff0c23b65 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:516:7
28
+ #3 0x563ff0c25335 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:760:19
29
+ #4 0x563ff0c26125 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile>>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:905:5
30
+ #5 0x563ff0c14436 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:914:6
31
+ #6 0x563ff0c40962 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
32
+ #7 0x7f4c156ed082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 87b331c034a6458c64ce09c03939e947212e18ce)
33
+
34
+ DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*)
35
+ Uninitialized value was created by a heap deallocation
36
+ #0 0x563ff0cc7480 in free /src/llvm-project/compiler-rt/lib/msan/msan_interceptors.cpp:218:3
37
+ #1 0x563ff0d27800 in LLVMFuzzerTestOneInput /src/cifuzz-external-example/do_stuff_fuzzer.cpp:21:5
38
+ #2 0x563ff0c24340 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13
39
+ #3 0x563ff0c23b65 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:516:7
40
+ #4 0x563ff0c25335 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:760:19
41
+ #5 0x563ff0c26125 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile>>&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:905:5
42
+ #6 0x563ff0c14436 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:914:6
43
+ #7 0x563ff0c40962 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
44
+ #8 0x7f4c156ed082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 87b331c034a6458c64ce09c03939e947212e18ce)
45
+
46
+ DEDUP_TOKEN: __interceptor_free--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
47
+ SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/cifuzz-external-example/do_stuff_fuzzer.cpp:24:1 in LLVMFuzzerTestOneInput
48
+ Unique heap origins: 201
49
+ Stack depot allocated bytes: 9764880
50
+ Unique origin histories: 181
51
+ History depot allocated bytes: 196608
52
+ Exiting
53
+ MS: 5 ShuffleBytes-CopyPart-InsertByte-CopyPart-ManualDict- DE: "bar"-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
54
+ 0xa,0x62,0x61,0x72,0xa,
55
+ \012bar\012
56
+ artifact_prefix='/tmp/tmp1tc5b3m2/'; Test unit written to /tmp/tmp1tc5b3m2/crash-c935b6724d7e27401ac9af3773700ca86ac38dea
57
+ Base64: CmJhcgo=
58
+ stat::number_of_executed_units: 159
59
+ stat::average_exec_per_sec: 0
60
+ stat::new_units_added: 1
61
+ stat::slowest_unit_time_sec: 0
62
+ stat::peak_rss_mb: 69
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/sarif_utils_only_llvmfuzzer_stack.txt ADDED
@@ -0,0 +1,302 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ /github/workspace/build-out/fuzz-bus-label -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpsngf52cy/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bus-label >fuzz-0.log 2>&1
2
+ ================== Job 0 exited with exit code 0 ============
3
+ INFO: Running with entropic power schedule (0xFF, 100).
4
+ INFO: Seed: 1337
5
+ INFO: Loaded 2 modules (82577 inline 8-bit counters): 82573 [0x7fc55e6bedf0, 0x7fc55e6d307d), 4 [0x5e9c28, 0x5e9c2c),
6
+ 2023-05-04 01:02:55,065 - root - INFO - Not reporting crash in fuzz-bus-label because process timed out.
7
+ 2023-05-04 01:02:55,069 - root - INFO - Deleting corpus and seed corpus of fuzz-bus-label to save disk.
8
+ INFO: Loaded 2 PC tables (82577 PCs): 82573 [0x7fc55e6d3080,0x7fc55e815950), 4 [0x5a6c78,0x5a6cb8),
9
+ INFO: 256 files found in /github/workspace/cifuzz-corpus/fuzz-bus-label
10
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
11
+ INFO: seed corpus: files: 256 min: 1b max: 5242880b total: 30968483b rss: 48Mb
12
+ #257 INITED cov: 41 ft: 230 corp: 111/4360b exec/s: 0 rss: 73Mb
13
+ #131072 pulse cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43690 rss: 76Mb
14
+ #262144 pulse cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43690 rss: 76Mb
15
+ #524288 pulse cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43690 rss: 77Mb
16
+ #609082 DONE cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43505 rss: 77Mb
17
+ Done 609082 runs in 14 second(s)
18
+ stat::number_of_executed_units: 609082
19
+ stat::average_exec_per_sec: 43505
20
+ stat::new_units_added: 0
21
+ stat::slowest_unit_time_sec: 0
22
+ stat::peak_rss_mb: 77
23
+ /github/workspace/build-out/fuzz-bus-label -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpsngf52cy/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bus-label >fuzz-1.log 2>&1
24
+ 2023-05-04 01:02:55,082 - root - INFO - Deleting fuzz target: fuzz-bus-label.
25
+ 2023-05-04 01:02:55,083 - root - INFO - Done deleting.
26
+ 2023-05-04 01:02:55,084 - root - INFO - Fuzzer fuzz-bus-label finished running without reportable crashes.
27
+ 2023-05-04 01:02:55,084 - root - INFO - Running fuzzer: fuzz-dhcp-server.
28
+ 2023-05-04 01:02:55,085 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-dhcp-server/public.zip
29
+ 2023-05-04 01:02:55,088 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
30
+ 2023-05-04 01:02:55,145 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-dhcp-server/public.zip HTTP/1.1" 200 806749
31
+ 2023-05-04 01:02:55,350 - root - INFO - Starting fuzzing
32
+ Fuzzing logs:
33
+ /github/workspace/build-out/fuzz-dhcp-server -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpyxgwwsvr/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-dhcp-server >fuzz-0.log 2>&1
34
+ ================== Job 0 exited with exit code 0 ============
35
+ INFO: Running with entropic power schedule (0xFF, 100).
36
+ INFO: Seed: 1337
37
+ INFO: Loaded 2 modules (83640 inline 8-bit counters): 82573 [0x7fe86ff70df0, 0x7fe86ff8507d), 1067 [0x60c638, 0x60ca63),
38
+ INFO: Loaded 2 PC tables (83640 PCs): 82573 [0x7fe86ff85080,0x7fe8700c7950), 1067 [0x60ca68,0x610d18),
39
+ INFO: 1153 files found in /github/workspace/cifuzz-corpus/fuzz-dhcp-server
40
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
41
+ INFO: seed corpus: files: 1153 min: 1b max: 5242879b total: 17056071b rss: 50Mb
42
+ #1155 INITED cov: 577 ft: 1116 corp: 203/54Kb exec/s: 0 rss: 86Mb
43
+ #1167 NEW cov: 577 ft: 1117 corp: 204/54Kb lim: 1048576 exec/s: 0 rss: 86Mb L: 243/1071 MS: 2 ChangeASCIIInt-CrossOver-
44
+ #1509 NEW cov: 577 ft: 1118 corp: 205/54Kb lim: 1048576 exec/s: 0 rss: 86Mb L: 243/1071 MS: 2 ChangeBit-CopyPart-
45
+ #63018 NEW cov: 577 ft: 1119 corp: 206/55Kb lim: 1048576 exec/s: 21006 rss: 86Mb L: 245/1071 MS: 4 InsertByte-ChangeByte-CMP-InsertByte- DE: "2\000\000\000\000\000\000\000"-
46
+ #65536 pulse cov: 577 ft: 1119 corp: 206/55Kb lim: 1048576 exec/s: 21845 rss: 86Mb
47
+ Loaded 1024/1155 files from /github/workspace/cifuzz-corpus/fuzz-dhcp-server
48
+ #99784 NEW cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 19956 rss: 105Mb L: 243/1071 MS: 2 ChangeASCIIInt-ChangeBinInt-
49
+ #131072 pulse cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 21845 rss: 105Mb
50
+ #262144 pulse cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 20164 rss: 105Mb
51
+ #275639 DONE cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 19688 rss: 105Mb
52
+ ###### Recommended dictionary. ######
53
+ "2\000\000\000\000\000\000\000" # Uses: 17879
54
+ ###### End of recommended dictionary. ######
55
+ Done 275639 runs in 14 second(s)
56
+ stat::number_of_executed_units: 275639
57
+ stat::average_exec_per_sec: 19688
58
+ stat::new_units_added: 4
59
+ stat::slowest_unit_time_sec: 0
60
+ stat::peak_rss_mb: 105
61
+ /github/workspace/build-out/fuzz-dhcp-server -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpyxgwwsvr/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-dhcp-server >fuzz-1.log 2>&1
62
+ 2023-05-04 01:03:18,374 - root - INFO - Not reporting crash in fuzz-dhcp-server because process timed out.
63
+ 2023-05-04 01:03:18,377 - root - INFO - Deleting corpus and seed corpus of fuzz-dhcp-server to save disk.
64
+ 2023-05-04 01:03:18,399 - root - INFO - Deleting fuzz target: fuzz-dhcp-server.
65
+ 2023-05-04 01:03:18,400 - root - INFO - Done deleting.
66
+ 2023-05-04 01:03:18,400 - root - INFO - Fuzzer fuzz-dhcp-server finished running without reportable crashes.
67
+ 2023-05-04 01:03:18,401 - root - INFO - Running fuzzer: fuzz-bcd.
68
+ 2023-05-04 01:03:18,401 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-bcd/public.zip
69
+ 2023-05-04 01:03:18,404 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
70
+ 2023-05-04 01:03:18,582 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-bcd/public.zip HTTP/1.1" 200 2293254
71
+ 2023-05-04 01:03:18,804 - root - INFO - Starting fuzzing
72
+ Fuzzing logs:
73
+ /github/workspace/build-out/fuzz-bcd -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpgvqlyr8q/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bcd >fuzz-0.log 2>&1
74
+ ================== Job 0 exited with exit code 0 ============
75
+ INFO: Running with entropic power schedule (0xFF, 100).
76
+ INFO: Seed: 1337
77
+ INFO: Loaded 2 modules (83175 inline 8-bit counters): 82573 [0x7f1b5387edf0, 0x7f1b5389307d), 602 [0x5f8718, 0x5f8972),
78
+ INFO: Loaded 2 PC tables (83175 PCs): 82573 [0x7f1b53893080,0x7f1b539d5950), 602 [0x5f8978,0x5faf18),
79
+ INFO: 1260 files found in /github/workspace/cifuzz-corpus/fuzz-bcd
80
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 946175 bytes
81
+ INFO: seed corpus: files: 1260 min: 1b max: 946175b total: 10373697b rss: 48Mb
82
+ #1261 INITED cov: 137 ft: 653 corp: 282/1416Kb exec/s: 0 rss: 91Mb
83
+ #65536 pulse cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 32768 rss: 98Mb
84
+ #131072 pulse cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 32768 rss: 98Mb
85
+ #262144 pulse cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 37449 rss: 98Mb
86
+ #475081 DONE cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 33934 rss: 98Mb
87
+ Done 475081 runs in 14 second(s)
88
+ stat::number_of_executed_units: 475081
89
+ stat::average_exec_per_sec: 33934
90
+ stat::new_units_added: 0
91
+ stat::slowest_unit_time_sec: 0
92
+ stat::peak_rss_mb: 98
93
+ /github/workspace/build-out/fuzz-bcd -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpgvqlyr8q/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bcd >fuzz-1.log 2>&1
94
+ 2023-05-04 01:03:41,821 - root - INFO - Not reporting crash in fuzz-bcd because process timed out.
95
+ 2023-05-04 01:03:41,822 - root - INFO - Deleting corpus and seed corpus of fuzz-bcd to save disk.
96
+ 2023-05-04 01:03:41,848 - root - INFO - Deleting fuzz target: fuzz-bcd.
97
+ 2023-05-04 01:03:41,848 - root - INFO - Done deleting.
98
+ 2023-05-04 01:03:41,848 - root - INFO - Fuzzer fuzz-bcd finished running without reportable crashes.
99
+ 2023-05-04 01:03:41,848 - root - INFO - Running fuzzer: fuzz-varlink.
100
+ 2023-05-04 01:03:41,849 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-varlink/public.zip
101
+ 2023-05-04 01:03:41,852 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
102
+ 2023-05-04 01:03:41,906 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-varlink/public.zip HTTP/1.1" 200 2586434
103
+ 2023-05-04 01:03:42,671 - root - INFO - Starting fuzzing
104
+ 2023-05-04 01:04:05,709 - root - INFO - Not reporting crash in fuzz-varlink because process timed out.
105
+ Fuzzing logs:
106
+ /github/workspace/build-out/fuzz-varlink -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpbtf4f932/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-varlink >fuzz-0.log 2>&1
107
+ 2023-05-04 01:04:05,709 - root - INFO - Deleting corpus and seed corpus of fuzz-varlink to save disk.
108
+ 2023-05-04 01:04:05,806 - root - INFO - Deleting fuzz target: fuzz-varlink.
109
+ 2023-05-04 01:04:05,806 - root - INFO - Done deleting.
110
+ 2023-05-04 01:04:05,806 - root - INFO - Fuzzer fuzz-varlink finished running without reportable crashes.
111
+ 2023-05-04 01:04:05,806 - root - INFO - Running fuzzer: fuzz-unit-file.
112
+ 2023-05-04 01:04:05,807 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-unit-file/public.zip
113
+ 2023-05-04 01:04:05,809 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
114
+ 2023-05-04 01:04:05,897 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-unit-file/public.zip HTTP/1.1" 200 4999974
115
+ 2023-05-04 01:04:07,869 - root - INFO - Starting fuzzing
116
+ 2023-05-04 01:04:09,516 - root - INFO - Fuzzer: fuzz-unit-file. Detected bug.
117
+ Fuzzing logs:
118
+ /github/workspace/build-out/fuzz-unit-file -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpjhswtxiw/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-unit-file >fuzz-0.log 2>&1
119
+ 2023-05-04 01:04:09,517 - root - INFO - Trying to reproduce crash using: /tmp/tmpjhswtxiw/crash-7be9e0f3a71d95f8d5e67c5a9d84273d6f4e3c03.
120
+ ================== Job 0 exited with exit code 77 ============
121
+ INFO: Running with entropic power schedule (0xFF, 100).
122
+ INFO: Seed: 1337
123
+ INFO: Loaded 2 modules (82576 inline 8-bit counters): 82573 [0x7f3b0de4cdf0, 0x7f3b0de6107d), 3 [0x5e9b28, 0x5e9b2b),
124
+ INFO: Loaded 2 PC tables (82576 PCs): 82573 [0x7f3b0de61080,0x7f3b0dfa3950), 3 [0x5a6af8,0x5a6b28),
125
+ INFO: 20907 files found in /github/workspace/cifuzz-corpus/fuzz-unit-file
126
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 604973 bytes
127
+ INFO: seed corpus: files: 20907 min: 1b max: 604973b total: 16005340b rss: 61Mb
128
+ =================================================================
129
+ ==74==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000005078 at pc 0x0000004ddffa bp 0x7fffeea64fe0 sp 0x7fffeea64fd8
130
+ READ of size 4 at 0x602000005078 thread T0
131
+ SCARINESS: 27 (4-byte-read-heap-buffer-overflow-far-from-bounds)
132
+ #0 0x4ddff9 in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16
133
+ #1 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
134
+ #2 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
135
+ #3 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
136
+ #4 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
137
+ #5 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
138
+ #6 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
139
+ #7 0x7f3b0ce20082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
140
+ #8 0x41f6ed in _start (build-out/fuzz-unit-file+0x41f6ed)
141
+
142
+ DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*)
143
+ 0x602000005078 is located 38 bytes to the right of 2-byte region [0x602000005050,0x602000005052)
144
+ freed by thread T0 here:
145
+ #0 0x4a0882 in __interceptor_free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
146
+ #1 0x4ddfb7 in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:29:9
147
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
148
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
149
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
150
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
151
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
152
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
153
+ #8 0x7f3b0ce20082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
154
+
155
+ DEDUP_TOKEN: __interceptor_free--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
156
+ previously allocated by thread T0 here:
157
+ #0 0x4a0b26 in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
158
+ #1 0x4ddfac in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:28:25
159
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
160
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
161
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
162
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
163
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
164
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
165
+ #8 0x7f3b0ce20082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
166
+
167
+ DEDUP_TOKEN: malloc--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
168
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16 in LLVMFuzzerTestOneInput
169
+ Shadow bytes around the buggy address:
170
+ 0x0c047fff89b0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
171
+ 0x0c047fff89c0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
172
+ 0x0c047fff89d0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
173
+ 0x0c047fff89e0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
174
+ 0x0c047fff89f0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
175
+ =>0x0c047fff8a00: fa fa 00 02 fa fa 00 02 fa fa fd fa fa fa fa[fa]
176
+ 0x0c047fff8a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
177
+ 0x0c047fff8a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
178
+ 0x0c047fff8a30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
179
+ 0x0c047fff8a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
180
+ 0x0c047fff8a50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
181
+ Shadow byte legend (one shadow byte represents 8 application bytes):
182
+ Addressable: 00
183
+ Partially addressable: 01 02 03 04 05 06 07
184
+ Heap left redzone: fa
185
+ Freed heap region: fd
186
+ Stack left redzone: f1
187
+ Stack mid redzone: f2
188
+ Stack right redzone: f3
189
+ Stack after return: f5
190
+ Stack use after scope: f8
191
+ Global redzone: f9
192
+ Global init order: f6
193
+ Poisoned by user: f7
194
+ Container overflow: fc
195
+ Array cookie: ac
196
+ Intra object redzone: bb
197
+ ASan internal: fe
198
+ Left alloca redzone: ca
199
+ Right alloca redzone: cb
200
+ ==74==ABORTING
201
+ MS: 0 ; base unit: 0000000000000000000000000000000000000000
202
+ 0x61,0x75,0x74,0x6f,0x6d,0x6f,0x75,0x6e,0x74,0x48,
203
+ automountH
204
+ artifact_prefix='/tmp/tmpjhswtxiw/'; Test unit written to /tmp/tmpjhswtxiw/crash-7be9e0f3a71d95f8d5e67c5a9d84273d6f4e3c03
205
+ Base64: YXV0b21vdW50SA==
206
+ stat::number_of_executed_units: 314
207
+ stat::average_exec_per_sec: 0
208
+ stat::new_units_added: 0
209
+ stat::slowest_unit_time_sec: 0
210
+ stat::peak_rss_mb: 67
211
+ /github/workspace/build-out/fuzz-unit-file -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpjhswtxiw/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-unit-file >fuzz-1.log 2>&1
212
+ ================== Job 1 exited with exit code 77 ============
213
+ INFO: Running with entropic power schedule (0xFF, 100).
214
+ INFO: Seed: 1337
215
+ INFO: Loaded 2 modules (82576 inline 8-bit counters): 82573 [0x7ff1ba038df0, 0x7ff1ba04d07d), 3 [0x5e9b28, 0x5e9b2b),
216
+ INFO: Loaded 2 PC tables (82576 PCs): 82573 [0x7ff1ba04d080,0x7ff1ba18f950), 3 [0x5a6af8,0x5a6b28),
217
+ INFO: 20907 files found in /github/workspace/cifuzz-corpus/fuzz-unit-file
218
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 604973 bytes
219
+ INFO: seed corpus: files: 20907 min: 1b max: 604973b total: 16005340b rss: 61Mb
220
+ =================================================================
221
+ ==78==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000005078 at pc 0x0000004ddffa bp 0x7ffc2e6825c0 sp 0x7ffc2e6825b8
222
+ READ of size 4 at 0x602000005078 thread T0
223
+ SCARINESS: 27 (4-byte-read-heap-buffer-overflow-far-from-bounds)
224
+ #0 0x4ddff9 in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16
225
+ #1 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
226
+ #2 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
227
+ #3 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
228
+ #4 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
229
+ #5 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
230
+ #6 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
231
+ #7 0x7ff1b900c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
232
+ #8 0x41f6ed in _start (build-out/fuzz-unit-file+0x41f6ed)
233
+
234
+ DEDUP_TOKEN: LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*)
235
+ 0x602000005078 is located 38 bytes to the right of 2-byte region [0x602000005050,0x602000005052)
236
+ freed by thread T0 here:
237
+ #0 0x4a0882 in __interceptor_free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
238
+ #1 0x4ddfb7 in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:29:9
239
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
240
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
241
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
242
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
243
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
244
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
245
+ #8 0x7ff1b900c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
246
+
247
+ DEDUP_TOKEN: __interceptor_free--LLVMFuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
248
+ previously allocated by thread T0 here:
249
+ #0 0x4a0b26 in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
250
+ #1 0x4ddfac in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:28:25
251
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
252
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
253
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
254
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
255
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
256
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
257
+ #8 0x7ff1b900c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
258
+
259
+ DEDUP_TOKEN: malloc--samLLVM2FuzzerTestOneInput --fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
260
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16 in samsamLLVM2FuzzerTestOneInput
261
+ Shadow bytes around the buggy address:
262
+ 0x0c047fff89b0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
263
+ 0x0c047fff89c0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
264
+ 0x0c047fff89d0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
265
+ 0x0c047fff89e0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
266
+ 0x0c047fff89f0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
267
+ =>0x0c047fff8a00: fa fa 00 02 fa fa 00 02 fa fa fd fa fa fa fa[fa]
268
+ 0x0c047fff8a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
269
+ 0x0c047fff8a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
270
+ 0x0c047fff8a30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
271
+ 0x0c047fff8a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
272
+ 0x0c047fff8a50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
273
+ Shadow byte legend (one shadow byte represents 8 application bytes):
274
+ Addressable: 00
275
+ Partially addressable: 01 02 03 04 05 06 07
276
+ Heap left redzone: fa
277
+ Freed heap region: fd
278
+ Stack left redzone: f1
279
+ Stack mid redzone: f2
280
+ Stack right redzone: f3
281
+ Stack after return: f5
282
+ Stack use after scope: f8
283
+ Global redzone: f9
284
+ Global init order: f6
285
+ Poisoned by user: f7
286
+ Container overflow: fc
287
+ Array cookie: ac
288
+ Intra object redzone: bb
289
+ ASan internal: fe
290
+ Left alloca redzone: ca
291
+ Right alloca redzone: cb
292
+ ==78==ABORTING
293
+ MS: 0 ; base unit: 0000000000000000000000000000000000000000
294
+ 0x61,0x75,0x74,0x6f,0x6d,0x6f,0x75,0x6e,0x74,0x48,
295
+ automountH
296
+ artifact_prefix='/tmp/tmpjhswtxiw/'; Test unit written to /tmp/tmpjhswtxiw/crash-7be9e0f3a71d95f8d5e67c5a9d84273d6f4e3c03
297
+ Base64: YXV0b21vdW50SA==
298
+ stat::number_of_executed_units: 314
299
+ stat::average_exec_per_sec: 0
300
+ stat::new_units_added: 0
301
+ stat::slowest_unit_time_sec: 0
302
+ stat::peak_rss_mb: 68
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/sarif_utils_systemd_stack.txt ADDED
@@ -0,0 +1,302 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ /github/workspace/build-out/fuzz-bus-label -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpsngf52cy/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bus-label >fuzz-0.log 2>&1
2
+ ================== Job 0 exited with exit code 0 ============
3
+ INFO: Running with entropic power schedule (0xFF, 100).
4
+ INFO: Seed: 1337
5
+ INFO: Loaded 2 modules (82577 inline 8-bit counters): 82573 [0x7fc55e6bedf0, 0x7fc55e6d307d), 4 [0x5e9c28, 0x5e9c2c),
6
+ 2023-05-04 01:02:55,065 - root - INFO - Not reporting crash in fuzz-bus-label because process timed out.
7
+ 2023-05-04 01:02:55,069 - root - INFO - Deleting corpus and seed corpus of fuzz-bus-label to save disk.
8
+ INFO: Loaded 2 PC tables (82577 PCs): 82573 [0x7fc55e6d3080,0x7fc55e815950), 4 [0x5a6c78,0x5a6cb8),
9
+ INFO: 256 files found in /github/workspace/cifuzz-corpus/fuzz-bus-label
10
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
11
+ INFO: seed corpus: files: 256 min: 1b max: 5242880b total: 30968483b rss: 48Mb
12
+ #257 INITED cov: 41 ft: 230 corp: 111/4360b exec/s: 0 rss: 73Mb
13
+ #131072 pulse cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43690 rss: 76Mb
14
+ #262144 pulse cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43690 rss: 76Mb
15
+ #524288 pulse cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43690 rss: 77Mb
16
+ #609082 DONE cov: 41 ft: 230 corp: 111/4360b lim: 1048576 exec/s: 43505 rss: 77Mb
17
+ Done 609082 runs in 14 second(s)
18
+ stat::number_of_executed_units: 609082
19
+ stat::average_exec_per_sec: 43505
20
+ stat::new_units_added: 0
21
+ stat::slowest_unit_time_sec: 0
22
+ stat::peak_rss_mb: 77
23
+ /github/workspace/build-out/fuzz-bus-label -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpsngf52cy/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bus-label >fuzz-1.log 2>&1
24
+ 2023-05-04 01:02:55,082 - root - INFO - Deleting fuzz target: fuzz-bus-label.
25
+ 2023-05-04 01:02:55,083 - root - INFO - Done deleting.
26
+ 2023-05-04 01:02:55,084 - root - INFO - Fuzzer fuzz-bus-label finished running without reportable crashes.
27
+ 2023-05-04 01:02:55,084 - root - INFO - Running fuzzer: fuzz-dhcp-server.
28
+ 2023-05-04 01:02:55,085 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-dhcp-server/public.zip
29
+ 2023-05-04 01:02:55,088 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
30
+ 2023-05-04 01:02:55,145 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-dhcp-server/public.zip HTTP/1.1" 200 806749
31
+ 2023-05-04 01:02:55,350 - root - INFO - Starting fuzzing
32
+ Fuzzing logs:
33
+ /github/workspace/build-out/fuzz-dhcp-server -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpyxgwwsvr/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-dhcp-server >fuzz-0.log 2>&1
34
+ ================== Job 0 exited with exit code 0 ============
35
+ INFO: Running with entropic power schedule (0xFF, 100).
36
+ INFO: Seed: 1337
37
+ INFO: Loaded 2 modules (83640 inline 8-bit counters): 82573 [0x7fe86ff70df0, 0x7fe86ff8507d), 1067 [0x60c638, 0x60ca63),
38
+ INFO: Loaded 2 PC tables (83640 PCs): 82573 [0x7fe86ff85080,0x7fe8700c7950), 1067 [0x60ca68,0x610d18),
39
+ INFO: 1153 files found in /github/workspace/cifuzz-corpus/fuzz-dhcp-server
40
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
41
+ INFO: seed corpus: files: 1153 min: 1b max: 5242879b total: 17056071b rss: 50Mb
42
+ #1155 INITED cov: 577 ft: 1116 corp: 203/54Kb exec/s: 0 rss: 86Mb
43
+ #1167 NEW cov: 577 ft: 1117 corp: 204/54Kb lim: 1048576 exec/s: 0 rss: 86Mb L: 243/1071 MS: 2 ChangeASCIIInt-CrossOver-
44
+ #1509 NEW cov: 577 ft: 1118 corp: 205/54Kb lim: 1048576 exec/s: 0 rss: 86Mb L: 243/1071 MS: 2 ChangeBit-CopyPart-
45
+ #63018 NEW cov: 577 ft: 1119 corp: 206/55Kb lim: 1048576 exec/s: 21006 rss: 86Mb L: 245/1071 MS: 4 InsertByte-ChangeByte-CMP-InsertByte- DE: "2\000\000\000\000\000\000\000"-
46
+ #65536 pulse cov: 577 ft: 1119 corp: 206/55Kb lim: 1048576 exec/s: 21845 rss: 86Mb
47
+ Loaded 1024/1155 files from /github/workspace/cifuzz-corpus/fuzz-dhcp-server
48
+ #99784 NEW cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 19956 rss: 105Mb L: 243/1071 MS: 2 ChangeASCIIInt-ChangeBinInt-
49
+ #131072 pulse cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 21845 rss: 105Mb
50
+ #262144 pulse cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 20164 rss: 105Mb
51
+ #275639 DONE cov: 577 ft: 1120 corp: 207/55Kb lim: 1048576 exec/s: 19688 rss: 105Mb
52
+ ###### Recommended dictionary. ######
53
+ "2\000\000\000\000\000\000\000" # Uses: 17879
54
+ ###### End of recommended dictionary. ######
55
+ Done 275639 runs in 14 second(s)
56
+ stat::number_of_executed_units: 275639
57
+ stat::average_exec_per_sec: 19688
58
+ stat::new_units_added: 4
59
+ stat::slowest_unit_time_sec: 0
60
+ stat::peak_rss_mb: 105
61
+ /github/workspace/build-out/fuzz-dhcp-server -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpyxgwwsvr/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-dhcp-server >fuzz-1.log 2>&1
62
+ 2023-05-04 01:03:18,374 - root - INFO - Not reporting crash in fuzz-dhcp-server because process timed out.
63
+ 2023-05-04 01:03:18,377 - root - INFO - Deleting corpus and seed corpus of fuzz-dhcp-server to save disk.
64
+ 2023-05-04 01:03:18,399 - root - INFO - Deleting fuzz target: fuzz-dhcp-server.
65
+ 2023-05-04 01:03:18,400 - root - INFO - Done deleting.
66
+ 2023-05-04 01:03:18,400 - root - INFO - Fuzzer fuzz-dhcp-server finished running without reportable crashes.
67
+ 2023-05-04 01:03:18,401 - root - INFO - Running fuzzer: fuzz-bcd.
68
+ 2023-05-04 01:03:18,401 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-bcd/public.zip
69
+ 2023-05-04 01:03:18,404 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
70
+ 2023-05-04 01:03:18,582 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-bcd/public.zip HTTP/1.1" 200 2293254
71
+ 2023-05-04 01:03:18,804 - root - INFO - Starting fuzzing
72
+ Fuzzing logs:
73
+ /github/workspace/build-out/fuzz-bcd -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpgvqlyr8q/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bcd >fuzz-0.log 2>&1
74
+ ================== Job 0 exited with exit code 0 ============
75
+ INFO: Running with entropic power schedule (0xFF, 100).
76
+ INFO: Seed: 1337
77
+ INFO: Loaded 2 modules (83175 inline 8-bit counters): 82573 [0x7f1b5387edf0, 0x7f1b5389307d), 602 [0x5f8718, 0x5f8972),
78
+ INFO: Loaded 2 PC tables (83175 PCs): 82573 [0x7f1b53893080,0x7f1b539d5950), 602 [0x5f8978,0x5faf18),
79
+ INFO: 1260 files found in /github/workspace/cifuzz-corpus/fuzz-bcd
80
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 946175 bytes
81
+ INFO: seed corpus: files: 1260 min: 1b max: 946175b total: 10373697b rss: 48Mb
82
+ #1261 INITED cov: 137 ft: 653 corp: 282/1416Kb exec/s: 0 rss: 91Mb
83
+ #65536 pulse cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 32768 rss: 98Mb
84
+ #131072 pulse cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 32768 rss: 98Mb
85
+ #262144 pulse cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 37449 rss: 98Mb
86
+ #475081 DONE cov: 137 ft: 653 corp: 282/1416Kb lim: 946175 exec/s: 33934 rss: 98Mb
87
+ Done 475081 runs in 14 second(s)
88
+ stat::number_of_executed_units: 475081
89
+ stat::average_exec_per_sec: 33934
90
+ stat::new_units_added: 0
91
+ stat::slowest_unit_time_sec: 0
92
+ stat::peak_rss_mb: 98
93
+ /github/workspace/build-out/fuzz-bcd -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpgvqlyr8q/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-bcd >fuzz-1.log 2>&1
94
+ 2023-05-04 01:03:41,821 - root - INFO - Not reporting crash in fuzz-bcd because process timed out.
95
+ 2023-05-04 01:03:41,822 - root - INFO - Deleting corpus and seed corpus of fuzz-bcd to save disk.
96
+ 2023-05-04 01:03:41,848 - root - INFO - Deleting fuzz target: fuzz-bcd.
97
+ 2023-05-04 01:03:41,848 - root - INFO - Done deleting.
98
+ 2023-05-04 01:03:41,848 - root - INFO - Fuzzer fuzz-bcd finished running without reportable crashes.
99
+ 2023-05-04 01:03:41,848 - root - INFO - Running fuzzer: fuzz-varlink.
100
+ 2023-05-04 01:03:41,849 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-varlink/public.zip
101
+ 2023-05-04 01:03:41,852 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
102
+ 2023-05-04 01:03:41,906 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-varlink/public.zip HTTP/1.1" 200 2586434
103
+ 2023-05-04 01:03:42,671 - root - INFO - Starting fuzzing
104
+ 2023-05-04 01:04:05,709 - root - INFO - Not reporting crash in fuzz-varlink because process timed out.
105
+ Fuzzing logs:
106
+ /github/workspace/build-out/fuzz-varlink -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpbtf4f932/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-varlink >fuzz-0.log 2>&1
107
+ 2023-05-04 01:04:05,709 - root - INFO - Deleting corpus and seed corpus of fuzz-varlink to save disk.
108
+ 2023-05-04 01:04:05,806 - root - INFO - Deleting fuzz target: fuzz-varlink.
109
+ 2023-05-04 01:04:05,806 - root - INFO - Done deleting.
110
+ 2023-05-04 01:04:05,806 - root - INFO - Fuzzer fuzz-varlink finished running without reportable crashes.
111
+ 2023-05-04 01:04:05,806 - root - INFO - Running fuzzer: fuzz-unit-file.
112
+ 2023-05-04 01:04:05,807 - root - INFO - Downloading corpus from OSS-Fuzz: https://storage.googleapis.com/systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-unit-file/public.zip
113
+ 2023-05-04 01:04:05,809 - urllib3.connectionpool - DEBUG - Starting new HTTPS connection (1): storage.googleapis.com:443
114
+ 2023-05-04 01:04:05,897 - urllib3.connectionpool - DEBUG - https://storage.googleapis.com:443 "GET /systemd-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/systemd_fuzz-unit-file/public.zip HTTP/1.1" 200 4999974
115
+ 2023-05-04 01:04:07,869 - root - INFO - Starting fuzzing
116
+ 2023-05-04 01:04:09,516 - root - INFO - Fuzzer: fuzz-unit-file. Detected bug.
117
+ Fuzzing logs:
118
+ /github/workspace/build-out/fuzz-unit-file -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpjhswtxiw/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-unit-file >fuzz-0.log 2>&1
119
+ 2023-05-04 01:04:09,517 - root - INFO - Trying to reproduce crash using: /tmp/tmpjhswtxiw/crash-7be9e0f3a71d95f8d5e67c5a9d84273d6f4e3c03.
120
+ ================== Job 0 exited with exit code 77 ============
121
+ INFO: Running with entropic power schedule (0xFF, 100).
122
+ INFO: Seed: 1337
123
+ INFO: Loaded 2 modules (82576 inline 8-bit counters): 82573 [0x7f3b0de4cdf0, 0x7f3b0de6107d), 3 [0x5e9b28, 0x5e9b2b),
124
+ INFO: Loaded 2 PC tables (82576 PCs): 82573 [0x7f3b0de61080,0x7f3b0dfa3950), 3 [0x5a6af8,0x5a6b28),
125
+ INFO: 20907 files found in /github/workspace/cifuzz-corpus/fuzz-unit-file
126
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 604973 bytes
127
+ INFO: seed corpus: files: 20907 min: 1b max: 604973b total: 16005340b rss: 61Mb
128
+ =================================================================
129
+ ==74==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000005078 at pc 0x0000004ddffa bp 0x7fffeea64fe0 sp 0x7fffeea64fd8
130
+ READ of size 4 at 0x602000005078 thread T0
131
+ SCARINESS: 27 (4-byte-read-heap-buffer-overflow-far-from-bounds)
132
+ #0 0x4ddff9 in samLLVM2FuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16
133
+ #1 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
134
+ #2 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
135
+ #3 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
136
+ #4 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
137
+ #5 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
138
+ #6 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
139
+ #7 0x7f3b0ce20082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
140
+ #8 0x41f6ed in _start (build-out/fuzz-unit-file+0x41f6ed)
141
+
142
+ DEDUP_TOKEN: samLLVM2FuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*)
143
+ 0x602000005078 is located 38 bytes to the right of 2-byte region [0x602000005050,0x602000005052)
144
+ freed by thread T0 here:
145
+ #0 0x4a0882 in __interceptor_free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
146
+ #1 0x4ddfb7 in samLLVM2FuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:29:9
147
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
148
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
149
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
150
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
151
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
152
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
153
+ #8 0x7f3b0ce20082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
154
+
155
+ DEDUP_TOKEN: __interceptor_free--samLLVM2FuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
156
+ previously allocated by thread T0 here:
157
+ #0 0x4a0b26 in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
158
+ #1 0x4ddfac in samLLVM2FuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:28:25
159
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
160
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
161
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
162
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
163
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
164
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
165
+ #8 0x7f3b0ce20082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
166
+
167
+ DEDUP_TOKEN: malloc--samLLVM2FuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
168
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16 in samLLVM2FuzzerTestOneInput
169
+ Shadow bytes around the buggy address:
170
+ 0x0c047fff89b0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
171
+ 0x0c047fff89c0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
172
+ 0x0c047fff89d0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
173
+ 0x0c047fff89e0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
174
+ 0x0c047fff89f0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
175
+ =>0x0c047fff8a00: fa fa 00 02 fa fa 00 02 fa fa fd fa fa fa fa[fa]
176
+ 0x0c047fff8a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
177
+ 0x0c047fff8a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
178
+ 0x0c047fff8a30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
179
+ 0x0c047fff8a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
180
+ 0x0c047fff8a50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
181
+ Shadow byte legend (one shadow byte represents 8 application bytes):
182
+ Addressable: 00
183
+ Partially addressable: 01 02 03 04 05 06 07
184
+ Heap left redzone: fa
185
+ Freed heap region: fd
186
+ Stack left redzone: f1
187
+ Stack mid redzone: f2
188
+ Stack right redzone: f3
189
+ Stack after return: f5
190
+ Stack use after scope: f8
191
+ Global redzone: f9
192
+ Global init order: f6
193
+ Poisoned by user: f7
194
+ Container overflow: fc
195
+ Array cookie: ac
196
+ Intra object redzone: bb
197
+ ASan internal: fe
198
+ Left alloca redzone: ca
199
+ Right alloca redzone: cb
200
+ ==74==ABORTING
201
+ MS: 0 ; base unit: 0000000000000000000000000000000000000000
202
+ 0x61,0x75,0x74,0x6f,0x6d,0x6f,0x75,0x6e,0x74,0x48,
203
+ automountH
204
+ artifact_prefix='/tmp/tmpjhswtxiw/'; Test unit written to /tmp/tmpjhswtxiw/crash-7be9e0f3a71d95f8d5e67c5a9d84273d6f4e3c03
205
+ Base64: YXV0b21vdW50SA==
206
+ stat::number_of_executed_units: 314
207
+ stat::average_exec_per_sec: 0
208
+ stat::new_units_added: 0
209
+ stat::slowest_unit_time_sec: 0
210
+ stat::peak_rss_mb: 67
211
+ /github/workspace/build-out/fuzz-unit-file -timeout=25 -rss_limit_mb=2560 -len_control=0 -seed=1337 -artifact_prefix=/tmp/tmpjhswtxiw/ -max_total_time=13 -print_final_stats=1 /github/workspace/cifuzz-corpus/fuzz-unit-file >fuzz-1.log 2>&1
212
+ ================== Job 1 exited with exit code 77 ============
213
+ INFO: Running with entropic power schedule (0xFF, 100).
214
+ INFO: Seed: 1337
215
+ INFO: Loaded 2 modules (82576 inline 8-bit counters): 82573 [0x7ff1ba038df0, 0x7ff1ba04d07d), 3 [0x5e9b28, 0x5e9b2b),
216
+ INFO: Loaded 2 PC tables (82576 PCs): 82573 [0x7ff1ba04d080,0x7ff1ba18f950), 3 [0x5a6af8,0x5a6b28),
217
+ INFO: 20907 files found in /github/workspace/cifuzz-corpus/fuzz-unit-file
218
+ INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 604973 bytes
219
+ INFO: seed corpus: files: 20907 min: 1b max: 604973b total: 16005340b rss: 61Mb
220
+ =================================================================
221
+ ==78==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000005078 at pc 0x0000004ddffa bp 0x7ffc2e6825c0 sp 0x7ffc2e6825b8
222
+ READ of size 4 at 0x602000005078 thread T0
223
+ SCARINESS: 27 (4-byte-read-heap-buffer-overflow-far-from-bounds)
224
+ #0 0x4ddff9 in samLLVM2FuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16
225
+ #1 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
226
+ #2 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
227
+ #3 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
228
+ #4 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
229
+ #5 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
230
+ #6 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
231
+ #7 0x7ff1b900c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
232
+ #8 0x41f6ed in _start (build-out/fuzz-unit-file+0x41f6ed)
233
+
234
+ DEDUP_TOKEN: samLLVM2FuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*)
235
+ 0x602000005078 is located 38 bytes to the right of 2-byte region [0x602000005050,0x602000005052)
236
+ freed by thread T0 here:
237
+ #0 0x4a0882 in __interceptor_free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
238
+ #1 0x4ddfb7 in samLLVM2FuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:29:9
239
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
240
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
241
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
242
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
243
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
244
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
245
+ #8 0x7ff1b900c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
246
+
247
+ DEDUP_TOKEN: __interceptor_free--samLLVM2FuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
248
+ previously allocated by thread T0 here:
249
+ #0 0x4a0b26 in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
250
+ #1 0x4ddfac in samLLVM2FuzzerTestOneInput /work/build/../../src/systemd/src/core/fuzz-unit-file.c:28:25
251
+ #2 0x4fc653 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:611:15
252
+ #3 0x4fbe3a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:514:3
253
+ #4 0x4fdca4 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:826:7
254
+ #5 0x4fded9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, std::__Fuzzer::allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:857:3
255
+ #6 0x4ed53f in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:912:6
256
+ #7 0x516b92 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
257
+ #8 0x7ff1b900c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee)
258
+
259
+ DEDUP_TOKEN: malloc--samLLVM2FuzzerTestOneInput--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)
260
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /work/build/../../src/systemd/src/core/fuzz-unit-file.c:30:16 in samsamLLVM2FuzzerTestOneInput
261
+ Shadow bytes around the buggy address:
262
+ 0x0c047fff89b0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
263
+ 0x0c047fff89c0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
264
+ 0x0c047fff89d0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
265
+ 0x0c047fff89e0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
266
+ 0x0c047fff89f0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
267
+ =>0x0c047fff8a00: fa fa 00 02 fa fa 00 02 fa fa fd fa fa fa fa[fa]
268
+ 0x0c047fff8a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
269
+ 0x0c047fff8a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
270
+ 0x0c047fff8a30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
271
+ 0x0c047fff8a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
272
+ 0x0c047fff8a50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
273
+ Shadow byte legend (one shadow byte represents 8 application bytes):
274
+ Addressable: 00
275
+ Partially addressable: 01 02 03 04 05 06 07
276
+ Heap left redzone: fa
277
+ Freed heap region: fd
278
+ Stack left redzone: f1
279
+ Stack mid redzone: f2
280
+ Stack right redzone: f3
281
+ Stack after return: f5
282
+ Stack use after scope: f8
283
+ Global redzone: f9
284
+ Global init order: f6
285
+ Poisoned by user: f7
286
+ Container overflow: fc
287
+ Array cookie: ac
288
+ Intra object redzone: bb
289
+ ASan internal: fe
290
+ Left alloca redzone: ca
291
+ Right alloca redzone: cb
292
+ ==78==ABORTING
293
+ MS: 0 ; base unit: 0000000000000000000000000000000000000000
294
+ 0x61,0x75,0x74,0x6f,0x6d,0x6f,0x75,0x6e,0x74,0x48,
295
+ automountH
296
+ artifact_prefix='/tmp/tmpjhswtxiw/'; Test unit written to /tmp/tmpjhswtxiw/crash-7be9e0f3a71d95f8d5e67c5a9d84273d6f4e3c03
297
+ Base64: YXV0b21vdW50SA==
298
+ stat::number_of_executed_units: 314
299
+ stat::average_exec_per_sec: 0
300
+ stat::new_units_added: 0
301
+ stat::slowest_unit_time_sec: 0
302
+ stat::peak_rss_mb: 68
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/experimental/sanitizers/ExecSan/README.md ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ # Moved
2
+
3
+ This has moved to <https://github.com/google/oss-fuzz/tree/master/infra/experimental/SystemSan>.
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/launcher.py ADDED
@@ -0,0 +1,34 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/env python
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ """Script for running wycheproof."""
18
+
19
+ import logging
20
+ import sys
21
+ import subprocess
22
+
23
+
24
+ def main():
25
+ """Runs wycheproof."""
26
+ if len(sys.argv) < 3:
27
+ logging.error('Usage: %s <test_app> <testcase>.', sys.argv[0])
28
+ return 1
29
+
30
+ return subprocess.run(sys.argv[1:], check=False).returncode
31
+
32
+
33
+ if __name__ == '__main__':
34
+ sys.exit(main())
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/.vscodeignore ADDED
@@ -0,0 +1,10 @@
 
 
 
 
 
 
 
 
 
 
 
1
+ .vscode/**
2
+ .vscode-test/**
3
+ src/**
4
+ .gitignore
5
+ .yarnrc
6
+ vsc-extension-quickstart.md
7
+ **/tsconfig.json
8
+ **/.eslintrc.json
9
+ **/*.map
10
+ **/*.ts
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/LICENSE ADDED
@@ -0,0 +1,201 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Apache License
2
+ Version 2.0, January 2004
3
+ http://www.apache.org/licenses/
4
+
5
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
6
+
7
+ 1. Definitions.
8
+
9
+ "License" shall mean the terms and conditions for use, reproduction,
10
+ and distribution as defined by Sections 1 through 9 of this document.
11
+
12
+ "Licensor" shall mean the copyright owner or entity authorized by
13
+ the copyright owner that is granting the License.
14
+
15
+ "Legal Entity" shall mean the union of the acting entity and all
16
+ other entities that control, are controlled by, or are under common
17
+ control with that entity. For the purposes of this definition,
18
+ "control" means (i) the power, direct or indirect, to cause the
19
+ direction or management of such entity, whether by contract or
20
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
21
+ outstanding shares, or (iii) beneficial ownership of such entity.
22
+
23
+ "You" (or "Your") shall mean an individual or Legal Entity
24
+ exercising permissions granted by this License.
25
+
26
+ "Source" form shall mean the preferred form for making modifications,
27
+ including but not limited to software source code, documentation
28
+ source, and configuration files.
29
+
30
+ "Object" form shall mean any form resulting from mechanical
31
+ transformation or translation of a Source form, including but
32
+ not limited to compiled object code, generated documentation,
33
+ and conversions to other media types.
34
+
35
+ "Work" shall mean the work of authorship, whether in Source or
36
+ Object form, made available under the License, as indicated by a
37
+ copyright notice that is included in or attached to the work
38
+ (an example is provided in the Appendix below).
39
+
40
+ "Derivative Works" shall mean any work, whether in Source or Object
41
+ form, that is based on (or derived from) the Work and for which the
42
+ editorial revisions, annotations, elaborations, or other modifications
43
+ represent, as a whole, an original work of authorship. For the purposes
44
+ of this License, Derivative Works shall not include works that remain
45
+ separable from, or merely link (or bind by name) to the interfaces of,
46
+ the Work and Derivative Works thereof.
47
+
48
+ "Contribution" shall mean any work of authorship, including
49
+ the original version of the Work and any modifications or additions
50
+ to that Work or Derivative Works thereof, that is intentionally
51
+ submitted to Licensor for inclusion in the Work by the copyright owner
52
+ or by an individual or Legal Entity authorized to submit on behalf of
53
+ the copyright owner. For the purposes of this definition, "submitted"
54
+ means any form of electronic, verbal, or written communication sent
55
+ to the Licensor or its representatives, including but not limited to
56
+ communication on electronic mailing lists, source code control systems,
57
+ and issue tracking systems that are managed by, or on behalf of, the
58
+ Licensor for the purpose of discussing and improving the Work, but
59
+ excluding communication that is conspicuously marked or otherwise
60
+ designated in writing by the copyright owner as "Not a Contribution."
61
+
62
+ "Contributor" shall mean Licensor and any individual or Legal Entity
63
+ on behalf of whom a Contribution has been received by Licensor and
64
+ subsequently incorporated within the Work.
65
+
66
+ 2. Grant of Copyright License. Subject to the terms and conditions of
67
+ this License, each Contributor hereby grants to You a perpetual,
68
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
69
+ copyright license to reproduce, prepare Derivative Works of,
70
+ publicly display, publicly perform, sublicense, and distribute the
71
+ Work and such Derivative Works in Source or Object form.
72
+
73
+ 3. Grant of Patent License. Subject to the terms and conditions of
74
+ this License, each Contributor hereby grants to You a perpetual,
75
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
76
+ (except as stated in this section) patent license to make, have made,
77
+ use, offer to sell, sell, import, and otherwise transfer the Work,
78
+ where such license applies only to those patent claims licensable
79
+ by such Contributor that are necessarily infringed by their
80
+ Contribution(s) alone or by combination of their Contribution(s)
81
+ with the Work to which such Contribution(s) was submitted. If You
82
+ institute patent litigation against any entity (including a
83
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
84
+ or a Contribution incorporated within the Work constitutes direct
85
+ or contributory patent infringement, then any patent licenses
86
+ granted to You under this License for that Work shall terminate
87
+ as of the date such litigation is filed.
88
+
89
+ 4. Redistribution. You may reproduce and distribute copies of the
90
+ Work or Derivative Works thereof in any medium, with or without
91
+ modifications, and in Source or Object form, provided that You
92
+ meet the following conditions:
93
+
94
+ (a) You must give any other recipients of the Work or
95
+ Derivative Works a copy of this License; and
96
+
97
+ (b) You must cause any modified files to carry prominent notices
98
+ stating that You changed the files; and
99
+
100
+ (c) You must retain, in the Source form of any Derivative Works
101
+ that You distribute, all copyright, patent, trademark, and
102
+ attribution notices from the Source form of the Work,
103
+ excluding those notices that do not pertain to any part of
104
+ the Derivative Works; and
105
+
106
+ (d) If the Work includes a "NOTICE" text file as part of its
107
+ distribution, then any Derivative Works that You distribute must
108
+ include a readable copy of the attribution notices contained
109
+ within such NOTICE file, excluding those notices that do not
110
+ pertain to any part of the Derivative Works, in at least one
111
+ of the following places: within a NOTICE text file distributed
112
+ as part of the Derivative Works; within the Source form or
113
+ documentation, if provided along with the Derivative Works; or,
114
+ within a display generated by the Derivative Works, if and
115
+ wherever such third-party notices normally appear. The contents
116
+ of the NOTICE file are for informational purposes only and
117
+ do not modify the License. You may add Your own attribution
118
+ notices within Derivative Works that You distribute, alongside
119
+ or as an addendum to the NOTICE text from the Work, provided
120
+ that such additional attribution notices cannot be construed
121
+ as modifying the License.
122
+
123
+ You may add Your own copyright statement to Your modifications and
124
+ may provide additional or different license terms and conditions
125
+ for use, reproduction, or distribution of Your modifications, or
126
+ for any such Derivative Works as a whole, provided Your use,
127
+ reproduction, and distribution of the Work otherwise complies with
128
+ the conditions stated in this License.
129
+
130
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
131
+ any Contribution intentionally submitted for inclusion in the Work
132
+ by You to the Licensor shall be under the terms and conditions of
133
+ this License, without any additional terms or conditions.
134
+ Notwithstanding the above, nothing herein shall supersede or modify
135
+ the terms of any separate license agreement you may have executed
136
+ with Licensor regarding such Contributions.
137
+
138
+ 6. Trademarks. This License does not grant permission to use the trade
139
+ names, trademarks, service marks, or product names of the Licensor,
140
+ except as required for reasonable and customary use in describing the
141
+ origin of the Work and reproducing the content of the NOTICE file.
142
+
143
+ 7. Disclaimer of Warranty. Unless required by applicable law or
144
+ agreed to in writing, Licensor provides the Work (and each
145
+ Contributor provides its Contributions) on an "AS IS" BASIS,
146
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
147
+ implied, including, without limitation, any warranties or conditions
148
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
149
+ PARTICULAR PURPOSE. You are solely responsible for determining the
150
+ appropriateness of using or redistributing the Work and assume any
151
+ risks associated with Your exercise of permissions under this License.
152
+
153
+ 8. Limitation of Liability. In no event and under no legal theory,
154
+ whether in tort (including negligence), contract, or otherwise,
155
+ unless required by applicable law (such as deliberate and grossly
156
+ negligent acts) or agreed to in writing, shall any Contributor be
157
+ liable to You for damages, including any direct, indirect, special,
158
+ incidental, or consequential damages of any character arising as a
159
+ result of this License or out of the use or inability to use the
160
+ Work (including but not limited to damages for loss of goodwill,
161
+ work stoppage, computer failure or malfunction, or any and all
162
+ other commercial damages or losses), even if such Contributor
163
+ has been advised of the possibility of such damages.
164
+
165
+ 9. Accepting Warranty or Additional Liability. While redistributing
166
+ the Work or Derivative Works thereof, You may choose to offer,
167
+ and charge a fee for, acceptance of support, warranty, indemnity,
168
+ or other liability obligations and/or rights consistent with this
169
+ License. However, in accepting such obligations, You may act only
170
+ on Your own behalf and on Your sole responsibility, not on behalf
171
+ of any other Contributor, and only if You agree to indemnify,
172
+ defend, and hold each Contributor harmless for any liability
173
+ incurred by, or claims asserted against, such Contributor by reason
174
+ of your accepting any such warranty or additional liability.
175
+
176
+ END OF TERMS AND CONDITIONS
177
+
178
+ APPENDIX: How to apply the Apache License to your work.
179
+
180
+ To apply the Apache License to your work, attach the following
181
+ boilerplate notice, with the fields enclosed by brackets "{}"
182
+ replaced with your own identifying information. (Don't include
183
+ the brackets!) The text should be enclosed in the appropriate
184
+ comment syntax for the file format. We also recommend that a
185
+ file or class name and description of purpose be included on the
186
+ same "printed page" as the copyright notice for easier
187
+ identification within third-party archives.
188
+
189
+ Copyright {yyyy} {name of copyright owner}
190
+
191
+ Licensed under the Apache License, Version 2.0 (the "License");
192
+ you may not use this file except in compliance with the License.
193
+ You may obtain a copy of the License at
194
+
195
+ http://www.apache.org/licenses/LICENSE-2.0
196
+
197
+ Unless required by applicable law or agreed to in writing, software
198
+ distributed under the License is distributed on an "AS IS" BASIS,
199
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
200
+ See the License for the specific language governing permissions and
201
+ limitations under the License.
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/cifuzz.ts ADDED
@@ -0,0 +1,70 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import {println} from './logger';
18
+
19
+ /**
20
+ * Creates a CIFuzz template
21
+ * @param language
22
+ * @param projectName
23
+ * @param secondToRun
24
+ * @returns
25
+ */
26
+ export function cifuzzGenerator(
27
+ language: string,
28
+ projectName: string,
29
+ secondToRun: Number
30
+ ) {
31
+ println('Exporting cifuzz logic ' + language);
32
+
33
+ const cifuzzTemplate = `name: CIFuzz
34
+ on: [pull_request]
35
+ permissions: {}
36
+ jobs:
37
+ Fuzzing:
38
+ runs-on: ubuntu-latest
39
+ permissions:
40
+ security-events: write
41
+ steps:
42
+ - name: Build Fuzzers
43
+ id: build
44
+ uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
45
+ with:
46
+ oss-fuzz-project-name: '${projectName}'
47
+ language: ${language}
48
+ - name: Run Fuzzers
49
+ uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
50
+ with:
51
+ oss-fuzz-project-name: '${projectName}'
52
+ language: ${language}
53
+ fuzz-seconds: ${secondToRun}
54
+ output-sarif: true
55
+ - name: Upload Crash
56
+ uses: actions/upload-artifact@v3
57
+ if: failure() && steps.build.outcome == 'success'
58
+ with:
59
+ name: artifacts
60
+ path: ./out/artifacts
61
+ - name: Upload Sarif
62
+ if: always() && steps.build.outcome == 'success'
63
+ uses: github/codeql-action/upload-sarif@v2
64
+ with:
65
+ # Path to SARIF file relative to the root of the repository
66
+ sarif_file: cifuzz-sarif/results.sarif
67
+ checkout_path: cifuzz-sarif`;
68
+
69
+ return cifuzzTemplate;
70
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commandUtils.ts ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ export const commandHistory: any[] = [];
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdBuildFuzzerFromWorkspace.ts ADDED
@@ -0,0 +1,80 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import * as vscode from 'vscode';
18
+ import {println} from '../logger';
19
+ import {commandHistory} from '../commandUtils';
20
+ import {
21
+ hasOssFuzzInWorkspace,
22
+ getOssFuzzWorkspaceProjectName,
23
+ setStatusText,
24
+ } from '../utils';
25
+ import {buildFuzzersFromWorkspace} from '../ossfuzzWrappers';
26
+
27
+ export async function cmdInputCollectorBuildFuzzersFromWorkspace() {
28
+ let ossFuzzProjectName = '';
29
+ // First determine if we have a name in the workspace
30
+ if (await hasOssFuzzInWorkspace()) {
31
+ /**
32
+ * The fuzzers are in the workspace, as opposed to e.g. the oss-fuzz dirctory.
33
+ */
34
+ ossFuzzProjectName = await getOssFuzzWorkspaceProjectName();
35
+ } else {
36
+ // If we did not have that, ask the user.
37
+
38
+ const ossFuzzProjectNameInput = await vscode.window.showInputBox({
39
+ value: '',
40
+ placeHolder: 'The OSS-Fuzz project name',
41
+ });
42
+ if (!ossFuzzProjectNameInput) {
43
+ println('Did not get a ossFuzzTargetProject');
44
+ return false;
45
+ }
46
+ ossFuzzProjectName = ossFuzzProjectNameInput.toString();
47
+ }
48
+
49
+ // Create an history object
50
+ const args = new Object({
51
+ projectName: ossFuzzProjectName,
52
+ sanitizer: '',
53
+ toClean: false,
54
+ });
55
+
56
+ const commandObject = new Object({
57
+ commandType: 'oss-fuzz.WSBuildFuzzers',
58
+ Arguments: args,
59
+ dispatcherFunc: cmdDispatchBuildFuzzersFromWorkspace,
60
+ });
61
+ console.log('L1: ' + commandHistory.length);
62
+ commandHistory.push(commandObject);
63
+
64
+ await cmdDispatchBuildFuzzersFromWorkspace(args);
65
+ return true;
66
+ }
67
+
68
+ async function cmdDispatchBuildFuzzersFromWorkspace(args: any) {
69
+ await setStatusText('Building fuzzers: starting');
70
+ const res = await buildFuzzersFromWorkspace(
71
+ args.projectName,
72
+ args.sanitizer,
73
+ args.toClean
74
+ );
75
+ if (res) {
76
+ await setStatusText('Building fuzzers: finished');
77
+ } else {
78
+ await setStatusText('Building fuzzers: failed');
79
+ }
80
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdCreateOSSFuzzSetup.ts ADDED
@@ -0,0 +1,28 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import {setupProjectInitialFiles} from '../projectIntegrationHelper';
18
+ import {setStatusText} from '../utils';
19
+
20
+ export async function createOssFuzzSetup() {
21
+ await setStatusText('Creating OSS-Fuzz setup: starting');
22
+ const res = await setupProjectInitialFiles(false);
23
+ if (res) {
24
+ await setStatusText('Creating OSS-Fuzz setup: finished');
25
+ } else {
26
+ await setStatusText('Creating OSS-Fuzz setup: failed');
27
+ }
28
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdFIGetOptimalTargets.ts ADDED
@@ -0,0 +1,21 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2025 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import {getOptimalTargetsFromIntrospector} from '../fuzzIntrospectorHelper';
18
+
19
+ export async function runGetOptimalTargetsHandler() {
20
+ getOptimalTargetsFromIntrospector();
21
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdListFuzzers.ts ADDED
@@ -0,0 +1,42 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import * as vscode from 'vscode';
18
+
19
+ import {listFuzzersForProject} from '../utils';
20
+ import {println} from '../logger';
21
+ import {extensionConfig} from '../config';
22
+
23
+ /**
24
+ * Lists all the fuzzers for a project.
25
+ */
26
+ export async function listFuzzersHandler() {
27
+ // Lists all of the fuzzers from a project.
28
+ const projectName = await vscode.window.showInputBox({
29
+ value: '',
30
+ placeHolder: 'Type a project name',
31
+ });
32
+ if (!projectName) {
33
+ console.log('Failed to get project name');
34
+ return;
35
+ }
36
+ println('Listing fuzzers for project ' + projectName);
37
+
38
+ await listFuzzersForProject(
39
+ projectName?.toString(),
40
+ extensionConfig.ossFuzzPepositoryWorkPath
41
+ );
42
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdRedo.ts ADDED
@@ -0,0 +1,35 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import {commandHistory} from '../commandUtils';
18
+
19
+ /**
20
+ * Rerun the latest command
21
+ */
22
+ export async function cmdDispatcherRe() {
23
+ if (commandHistory.length === 0) {
24
+ console.log('command history is empty');
25
+ return false;
26
+ }
27
+
28
+ const commandObj: any = commandHistory[commandHistory.length - 1];
29
+
30
+ console.log('Redoing');
31
+ console.log(commandObj.commandType);
32
+ await commandObj.dispatcherFunc(commandObj.Arguments);
33
+ //await commandObj.dispatcherFunc(commandObj.args);
34
+ return true;
35
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdRunFI.ts ADDED
@@ -0,0 +1,24 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2024 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import {runFuzzIntrospector} from '../fuzzIntrospectorHelper';
18
+
19
+ /**
20
+ * Function for setting up Fuzz Introspector by way of a Python virtual env.
21
+ */
22
+ export async function runFuzzIntrospectorHandler() {
23
+ runFuzzIntrospector();
24
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdRunFuzzer.ts ADDED
@@ -0,0 +1,83 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import * as vscode from 'vscode';
18
+ import {println} from '../logger';
19
+ import {commandHistory} from '../commandUtils';
20
+ import {runFuzzerHandler} from '../ossfuzzWrappers';
21
+
22
+ export async function cmdInputCollectorRunSpecificFuzzer() {
23
+ let projectNameArg = '';
24
+ let fuzzerName = '';
25
+ let secondsToRun = '';
26
+
27
+ // Runs a fuzzer from a given project.
28
+ const projectNameFromPrompt = await vscode.window.showInputBox({
29
+ value: '',
30
+ placeHolder: 'Type a project name',
31
+ });
32
+ if (!projectNameFromPrompt) {
33
+ println('Failed to get project name');
34
+ return;
35
+ }
36
+ projectNameArg = projectNameFromPrompt.toString();
37
+ const fuzzerNameFromPrompt = await vscode.window.showInputBox({
38
+ value: '',
39
+ placeHolder: 'Type a fuzzer name',
40
+ });
41
+ if (!fuzzerNameFromPrompt) {
42
+ println('Failed to get fuzzer name');
43
+ return;
44
+ }
45
+ fuzzerName = fuzzerNameFromPrompt.toString();
46
+ const secondsToRunInp = await vscode.window.showInputBox({
47
+ value: '',
48
+ placeHolder: 'Type the number of seconds to run the fuzzer',
49
+ });
50
+ if (!secondsToRunInp) {
51
+ return;
52
+ }
53
+ secondsToRun = secondsToRunInp.toString();
54
+
55
+ // Create an history object
56
+ const args = new Object({
57
+ projectName: projectNameArg,
58
+ fuzzerName: fuzzerName,
59
+ secondsToRun: secondsToRun,
60
+ fuzzerCorpusPath: '',
61
+ });
62
+
63
+ const commandObject = new Object({
64
+ commandType: 'oss-fuzz.RunFuzzer',
65
+ Arguments: args,
66
+ dispatcherFunc: cmdDispatchRunFuzzerHandler,
67
+ });
68
+ console.log('L1: ' + commandHistory.length);
69
+ commandHistory.push(commandObject);
70
+
71
+ await cmdDispatchRunFuzzerHandler(args);
72
+ return true;
73
+ }
74
+
75
+ async function cmdDispatchRunFuzzerHandler(args: any) {
76
+ await runFuzzerHandler(
77
+ args.projectName,
78
+ args.fuzzerName,
79
+ args.secondsToRun,
80
+ args.fuzzerCorpusPath
81
+ );
82
+ return;
83
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdSetupOSSFuzz.ts ADDED
@@ -0,0 +1,53 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import {println} from '../logger';
18
+ import {extensionConfig} from '../config';
19
+ import {isPathValidOssFuzzPath} from '../ossfuzzWrappers';
20
+ import {systemSync} from '../utils';
21
+
22
+ /**
23
+ * Function for setting up oss-fuzz. This clones the relevant directory
24
+ * and sets the oss-fuzz variable accordingly.
25
+ */
26
+ export async function setUpOssFuzzHandler() {
27
+ println('Setting up oss-fuzz in /tmp/');
28
+
29
+ // First check if we already have an OSS-Fuzz path
30
+ const tmpOssFuzzRepositoryPath = '/tmp/oss-fuzz';
31
+
32
+ if ((await isPathValidOssFuzzPath(tmpOssFuzzRepositoryPath)) === true) {
33
+ println('OSS-Fuzz already exists in /tmp/oss-fuzz');
34
+ extensionConfig.ossFuzzPepositoryWorkPath = tmpOssFuzzRepositoryPath;
35
+ return;
36
+ }
37
+
38
+ const cmdToExec = 'git';
39
+ const args: Array<string> = [
40
+ 'clone',
41
+ 'https://github.com/google/oss-fuzz',
42
+ tmpOssFuzzRepositoryPath,
43
+ ];
44
+ const [res, output] = await systemSync(cmdToExec, args);
45
+ if (res === false) {
46
+ println('Failed to clone oss-fuzz');
47
+ println(output);
48
+ return;
49
+ }
50
+ println('Finished cloning oss-fuzz');
51
+
52
+ extensionConfig.ossFuzzPepositoryWorkPath = tmpOssFuzzRepositoryPath;
53
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/commands/cmdTemplate.ts ADDED
@@ -0,0 +1,357 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ /**
18
+ * Command for generating template fuzzers. This is a short-cut for rapid
19
+ * prototyping as well as an archive for inspiration.
20
+ */
21
+ import * as vscode from 'vscode';
22
+ import {println} from '../logger';
23
+
24
+ export const cLangSimpleStringFuzzer = `#include <stdint.h>
25
+ #include <string.h>
26
+ #include <stdlib.h>
27
+
28
+ int
29
+ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
30
+ {
31
+ char *new_str = (char *)malloc(size+1);
32
+ if (new_str == NULL){
33
+ return 0;
34
+ }
35
+ memcpy(new_str, data, size);
36
+ new_str[size] = '\\0';
37
+
38
+ // Insert fuzzer contents here
39
+ // fuzz data in new_str
40
+
41
+ // end of fuzzer contents
42
+
43
+ free(new_str);
44
+ return 0;
45
+ }`;
46
+
47
+ const cLangFileInputFuzzer = `int
48
+ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
49
+ {
50
+ char filename[256];
51
+ sprintf(filename, "/tmp/libfuzzer.%d", getpid());
52
+
53
+ // Create a file on the filesystem with fuzzer data in it
54
+ FILE *fp = fopen(filename, "wb");
55
+ if (!fp) {
56
+ return 0;
57
+ }
58
+ fwrite(data, size, 1, fp);
59
+ fclose(fp);
60
+
61
+ // Fuzzer logic here. Use the file as a source of data.
62
+
63
+ // Fuzzer logic end
64
+
65
+ // Clean up the file.
66
+ unlink(filename);
67
+
68
+ return 0;
69
+ }`;
70
+
71
+ const cLangBareTemplateFuzzer = `int
72
+ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
73
+ {
74
+ return 0;
75
+ }`;
76
+
77
+ const cppLangBareTemplateFuzzer = `extern "C" int
78
+ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
79
+ {
80
+ return 0;
81
+ }`;
82
+
83
+ const cppLangStdStringTemplateFuzzer = `extern "C" int
84
+ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
85
+ {
86
+ std::string input(reinterpret_cast<const char*>(data), size);
87
+
88
+ return 0;
89
+ }`;
90
+
91
+ export const cppLangFDPTemplateFuzzer = `#include <fuzzer/FuzzedDataProvider.h>
92
+
93
+ #include <string>
94
+
95
+ extern "C" int
96
+ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
97
+ {
98
+ FuzzedDataProvider fdp(data, size);
99
+
100
+ // Extract higher level data types used for fuzzing, e.g.
101
+ // int ran_int = fdp.ConsumeIntegralInRange<int>(1, 1024);
102
+ // std::string s = fdp.ConsumeRandomLengthString();
103
+
104
+ return 0;
105
+ }`;
106
+
107
+ const cppLangFileInputFuzzer = `extern "C" int
108
+ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
109
+ {
110
+ char filename[256];
111
+ sprintf(filename, "/tmp/libfuzzer.%d", getpid());
112
+
113
+ FILE *fp = fopen(filename, "wb");
114
+ if (!fp) {
115
+ return 0;
116
+ }
117
+ fwrite(data, size, 1, fp);
118
+ fclose(fp);
119
+
120
+ // Fuzzer logic here
121
+
122
+ // Fuzzer logic end
123
+
124
+ unlink(filename);
125
+ }`;
126
+
127
+ const pythonLangBareTemplate = `import sys
128
+ import atheris
129
+
130
+
131
+ def TestOneInput(fuzz_bytes):
132
+ return
133
+
134
+
135
+ def main():
136
+ atheris.Setup(sys.argv, TestOneInput)
137
+ atheris.Fuzz()
138
+
139
+
140
+ if __name__ == "__main__":
141
+ main()`;
142
+
143
+ export const pythonLangFileInputFuzzer = `import sys
144
+ import atheris
145
+
146
+ @atheris.instrument_func
147
+ def TestOneInput(data):
148
+ # Write fuzz data to a file
149
+ with open('/tmp/fuzz_input.b') as f:
150
+ f.write(data)
151
+
152
+ # Use '/tmp/fuzz_input.b' as input to file handling logic.
153
+
154
+
155
+ def main():
156
+ atheris.instrument_all()
157
+ atheris.Setup(sys.argv, TestOneInput)
158
+ atheris.Fuzz()
159
+
160
+
161
+ if __name__ == "__main__":
162
+ main()`;
163
+
164
+ const pythonLongFdpTemplate = `import sys
165
+ import atheris
166
+
167
+ def TestOneInput(fuzz_bytes):
168
+ fdp = atheris.FuzzedDataProvider(fuzz_bytes)
169
+ return
170
+
171
+ def main():
172
+ atheris.Setup(sys.argv, TestOneInput)
173
+ atheris.Fuzz()
174
+
175
+ if __name__ == "__main__":
176
+ main()`;
177
+
178
+ export const javaLangBareTemplate = `import com.code_intelligence.jazzer.api.FuzzedDataProvider;
179
+ public class SampleFuzzer {
180
+ public static void fuzzerTestOneInput(FuzzedDataProvider fdp) {
181
+ // Use fdp to create arbitrary types seeded with fuzz data
182
+ }
183
+ }
184
+ `;
185
+
186
+ /**
187
+ * C templates
188
+ */
189
+ async function cTemplates() {
190
+ let template = '';
191
+ const result = await vscode.window.showQuickPick(
192
+ ['Bare template', 'Null-terminated string input', 'File input'],
193
+ {
194
+ placeHolder: 'Pick which template',
195
+ }
196
+ );
197
+ vscode.window.showInformationMessage(`Got: ${result}`);
198
+
199
+ if (result === 'Null-terminated string input') {
200
+ template = cLangSimpleStringFuzzer;
201
+ } else if (result === 'File input') {
202
+ template = cLangFileInputFuzzer;
203
+ } else if (result === 'Bare template') {
204
+ template = cLangBareTemplateFuzzer;
205
+ } else {
206
+ template = 'empty';
207
+ }
208
+ const workspaceFolder = vscode.workspace.workspaceFolders;
209
+ if (!workspaceFolder) {
210
+ return;
211
+ }
212
+
213
+ const wsPath = workspaceFolder[0].uri.fsPath; // gets the path of the first workspace folder
214
+
215
+ const cifuzzYml = vscode.Uri.file(wsPath + '/oss-fuzz-template.c');
216
+ const wsedit = new vscode.WorkspaceEdit();
217
+ wsedit.createFile(cifuzzYml, {ignoreIfExists: true});
218
+ wsedit.insert(cifuzzYml, new vscode.Position(0, 0), template);
219
+ vscode.workspace.applyEdit(wsedit);
220
+ return;
221
+ }
222
+
223
+ /**
224
+ * CPP templates
225
+ */
226
+ async function cppTemplates() {
227
+ let template = '';
228
+ const result = await vscode.window.showQuickPick(
229
+ [
230
+ 'Bare template',
231
+ 'Simple CPP string',
232
+ 'File input fuzzer',
233
+ 'Fuzzed data provider',
234
+ ],
235
+ {
236
+ placeHolder: 'Pick which template',
237
+ }
238
+ );
239
+ vscode.window.showInformationMessage(`Got: ${result}`);
240
+
241
+ if (result === 'Bare template') {
242
+ template = cppLangBareTemplateFuzzer;
243
+ } else if (result === 'Simple CPP string') {
244
+ template = cppLangStdStringTemplateFuzzer;
245
+ } else if (result === 'File input fuzzer') {
246
+ template = cppLangFileInputFuzzer;
247
+ } else if (result === 'Fuzzed data provider') {
248
+ template = cppLangFDPTemplateFuzzer;
249
+ } else {
250
+ template = 'empty';
251
+ }
252
+ const workspaceFolder = vscode.workspace.workspaceFolders;
253
+ if (!workspaceFolder) {
254
+ return;
255
+ }
256
+
257
+ const wsPath = workspaceFolder[0].uri.fsPath; // gets the path of the first workspace folder
258
+
259
+ const cifuzzYml = vscode.Uri.file(wsPath + '/oss-fuzz-template.cpp');
260
+ const wsedit = new vscode.WorkspaceEdit();
261
+ wsedit.createFile(cifuzzYml, {ignoreIfExists: true});
262
+ wsedit.insert(cifuzzYml, new vscode.Position(0, 0), template);
263
+ vscode.workspace.applyEdit(wsedit);
264
+ return;
265
+ }
266
+
267
+ /**
268
+ * Python templates
269
+ */
270
+ async function pythonTepmlates() {
271
+ let template = '';
272
+ const result = await vscode.window.showQuickPick(
273
+ ['Bare template', 'Fuzzed Data Provider', 'File input fuzzer'],
274
+ {
275
+ placeHolder: 'Pick which template',
276
+ }
277
+ );
278
+ vscode.window.showInformationMessage(`Got: ${result}`);
279
+
280
+ if (result === 'Fuzzed Data Provider') {
281
+ template = pythonLongFdpTemplate;
282
+ } else if (result === 'Bare template') {
283
+ template = pythonLangBareTemplate;
284
+ } else if (result === 'File input fuzzer') {
285
+ template = pythonLangFileInputFuzzer;
286
+ } else {
287
+ template = 'empty';
288
+ }
289
+ const workspaceFolder = vscode.workspace.workspaceFolders;
290
+ if (!workspaceFolder) {
291
+ return;
292
+ }
293
+
294
+ const wsPath = workspaceFolder[0].uri.fsPath; // gets the path of the first workspace folder
295
+
296
+ const cifuzzYml = vscode.Uri.file(wsPath + '/oss-fuzz-template.py');
297
+ const wsedit = new vscode.WorkspaceEdit();
298
+ wsedit.createFile(cifuzzYml, {ignoreIfExists: true});
299
+ wsedit.insert(cifuzzYml, new vscode.Position(0, 0), template);
300
+ vscode.workspace.applyEdit(wsedit);
301
+ return;
302
+ }
303
+
304
+ /**
305
+ * Java templates
306
+ */
307
+ async function javaTemplates() {
308
+ let template = '';
309
+ const result = await vscode.window.showQuickPick(['Bare template'], {
310
+ placeHolder: 'Pick which template',
311
+ });
312
+ vscode.window.showInformationMessage(`Got: ${result}`);
313
+
314
+ if (result === 'Bare template') {
315
+ template = javaLangBareTemplate;
316
+ } else {
317
+ template = 'empty';
318
+ }
319
+ const workspaceFolder = vscode.workspace.workspaceFolders;
320
+ if (!workspaceFolder) {
321
+ return;
322
+ }
323
+
324
+ const wsPath = workspaceFolder[0].uri.fsPath; // gets the path of the first workspace folder
325
+
326
+ const cifuzzYml = vscode.Uri.file(wsPath + '/oss-fuzz-template.java');
327
+ const wsedit = new vscode.WorkspaceEdit();
328
+ wsedit.createFile(cifuzzYml, {ignoreIfExists: true});
329
+ wsedit.insert(cifuzzYml, new vscode.Position(0, 0), template);
330
+ vscode.workspace.applyEdit(wsedit);
331
+ return;
332
+ }
333
+
334
+ export async function cmdDispatcherTemplate(context: vscode.ExtensionContext) {
335
+ println('Creating template');
336
+ const options: {
337
+ [key: string]: (context: vscode.ExtensionContext) => Promise<void>;
338
+ } = {
339
+ C: cTemplates,
340
+ CPP: cppTemplates,
341
+ Python: pythonTepmlates,
342
+ Java: javaTemplates,
343
+ };
344
+
345
+ const quickPick = vscode.window.createQuickPick();
346
+ quickPick.items = Object.keys(options).map(label => ({label}));
347
+ quickPick.onDidChangeSelection(selection => {
348
+ if (selection[0]) {
349
+ options[selection[0].label](context).catch(console.error);
350
+ }
351
+ });
352
+ quickPick.onDidHide(() => quickPick.dispose());
353
+ quickPick.placeholder = 'Pick language';
354
+ quickPick.show();
355
+
356
+ return;
357
+ }
local-test-tika-full-01-vuln_6/fuzz-tooling/tools/vscode-extension/src/extension.ts ADDED
@@ -0,0 +1,227 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2023 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+ //
15
+ ////////////////////////////////////////////////////////////////////////////////
16
+
17
+ import * as vscode from 'vscode';
18
+
19
+ import {clearCoverage} from './coverageHelper';
20
+ import {println} from './logger';
21
+
22
+ // Import the command dispatcher functions
23
+ import {cmdInputCollectorRunSpecificFuzzer} from './commands/cmdRunFuzzer';
24
+ import {cmdInputCollectorBuildFuzzersFromWorkspace} from './commands/cmdBuildFuzzerFromWorkspace';
25
+ import {cmdInputCollectorBuildFuzzersFromWorkspaceCFLite} from './commands/cmdBuildFuzzerFromWorkspaceCFLite';
26
+ import {cmdInputCollectorTestFuzzerCFLite} from './commands/cmdTestFuzzerCFLite';
27
+ import {cmdDispatcherRe} from './commands/cmdRedo';
28
+ import {setupCIFuzzHandler} from './commands/cmdSetupCIFuzz';
29
+ import {cmdInputCollectorTestFuzzer} from './commands/cmdTestFuzzer';
30
+ import {displayCodeCoverageFromOssFuzz} from './commands/cmdDisplayCoverage';
31
+ import {createOssFuzzSetup} from './commands/cmdCreateOSSFuzzSetup';
32
+ import {runEndToEndAndGetCoverage} from './commands/cmdEndToEndCoverage';
33
+ import {listFuzzersHandler} from './commands/cmdListFuzzers';
34
+ import {cmdInputCollectorReproduceTestcase} from './commands/cmdReproduceTestcase';
35
+ import {cmdDispatcherTemplate} from './commands/cmdTemplate';
36
+ import {runGetOptimalTargetsHandler} from './commands/cmdFIGetOptimalTargets';
37
+ import {setUpFuzzIntrospectorHandler} from './commands/cmdSetupFI';
38
+ import {runFuzzIntrospectorHandler} from './commands/cmdRunFI';
39
+ import {cmdDispatcherGenerateClusterfuzzLite} from './commands/cmdDispatcherGenerateClusterfuzzLite';
40
+ import {setUpOssFuzzHandler} from './commands/cmdSetupOSSFuzz';
41
+ import {setOssFuzzPath} from './commands/cmdSetOSSFuzzPath';
42
+ import {extensionConfig} from './config';
43
+
44
+ /**
45
+ * Extension entrypoint. Activate the extension and register the commands.
46
+ */
47
+ export function activate(context: vscode.ExtensionContext) {
48
+ console.log('Activating extension)');
49
+ extensionConfig.printConfig();
50
+ println('OSS-Fuzz extension is now active!');
51
+
52
+ // Command registration
53
+ context.subscriptions.push(
54
+ vscode.commands.registerCommand('oss-fuzz.SetUp', async () => {
55
+ println('CMD start: SetUp');
56
+ await setUpOssFuzzHandler();
57
+ println('CMD end: SetUp');
58
+ })
59
+ );
60
+
61
+ context.subscriptions.push(
62
+ vscode.commands.registerCommand('oss-fuzz.RunFuzzer', async () => {
63
+ println('CMD start: Run Fuzzer');
64
+ //await runFuzzerHandler('', '', '', '');
65
+ cmdInputCollectorRunSpecificFuzzer();
66
+ println('CMD end: Run Fuzzer');
67
+ })
68
+ );
69
+
70
+ context.subscriptions.push(
71
+ vscode.commands.registerCommand('oss-fuzz.ListFuzzers', async () => {
72
+ println('CMD start: ListFuzzers');
73
+ await listFuzzersHandler();
74
+ println('CMD end: ListFuzzers');
75
+ })
76
+ );
77
+
78
+ context.subscriptions.push(
79
+ vscode.commands.registerCommand('oss-fuzz.SetOSSFuzzPath', async () => {
80
+ println('CMD start: SetOSSFuzzPath');
81
+ await setOssFuzzPath();
82
+ println('CMD end: SetOSSFuzzPath');
83
+ })
84
+ );
85
+
86
+ context.subscriptions.push(
87
+ vscode.commands.registerCommand('oss-fuzz.GetCodeCoverage', async () => {
88
+ println('CMD start: GetCodeCoverage');
89
+ await displayCodeCoverageFromOssFuzz(context);
90
+ println('CMD end: GetCodeCoverage');
91
+ })
92
+ );
93
+
94
+ context.subscriptions.push(
95
+ vscode.commands.registerCommand('oss-fuzz.ClearCodeCoverage', async () => {
96
+ println('CMD start: ClearCodeCoverage');
97
+ await clearCoverage();
98
+ println('CMD end: ClearCodeCoverage');
99
+ })
100
+ );
101
+
102
+ context.subscriptions.push(
103
+ vscode.commands.registerCommand('oss-fuzz.CreateOSSFuzzSetup', async () => {
104
+ println('CMD start: CreateOSSFuzzSetup');
105
+ await createOssFuzzSetup();
106
+ println('CMD end: CreateOSSFuzzSetup');
107
+ })
108
+ );
109
+
110
+ context.subscriptions.push(
111
+ vscode.commands.registerCommand('oss-fuzz.WSBuildFuzzers', async () => {
112
+ println('CMD start: WSBuildFuzzers3');
113
+ await cmdInputCollectorBuildFuzzersFromWorkspace();
114
+ println('CMD end: WSBuildFuzzers4');
115
+ })
116
+ );
117
+
118
+ context.subscriptions.push(
119
+ vscode.commands.registerCommand('oss-fuzz.SetupCIFuzz', async () => {
120
+ println('CMD start: SetupCIFuzz');
121
+ await setupCIFuzzHandler();
122
+ println('CMD end: SetupCIFuzz');
123
+ })
124
+ );
125
+
126
+ context.subscriptions.push(
127
+ vscode.commands.registerCommand('oss-fuzz.testFuzzer', async () => {
128
+ println('CMD start: testFuzzer');
129
+ await cmdInputCollectorTestFuzzer();
130
+ println('CMD end: testFuzzer');
131
+ })
132
+ );
133
+
134
+ context.subscriptions.push(
135
+ vscode.commands.registerCommand('oss-fuzz.testCodeCoverage', async () => {
136
+ println('CMD start: testCodeCoverage');
137
+ await runEndToEndAndGetCoverage(context);
138
+ println('CMD end: testCodeCoverage');
139
+ })
140
+ );
141
+
142
+ context.subscriptions.push(
143
+ vscode.commands.registerCommand('oss-fuzz.Reproduce', async () => {
144
+ println('CMD start: Reproduce');
145
+ await cmdInputCollectorReproduceTestcase();
146
+ println('CMD end: Reproduce');
147
+ })
148
+ );
149
+
150
+ context.subscriptions.push(
151
+ vscode.commands.registerCommand('oss-fuzz.Redo', async () => {
152
+ println('CMD start: Re');
153
+ await cmdDispatcherRe();
154
+ println('CMD end: Re');
155
+ })
156
+ );
157
+
158
+ context.subscriptions.push(
159
+ vscode.commands.registerCommand('oss-fuzz.Template', async () => {
160
+ println('CMD start: remplate');
161
+ await cmdDispatcherTemplate(context);
162
+ println('CMD end: template');
163
+ })
164
+ );
165
+
166
+ context.subscriptions.push(
167
+ vscode.commands.registerCommand(
168
+ 'oss-fuzz.GenerateClusterfuzzLite',
169
+ async () => {
170
+ println('CMD start: GenerateClusterfuzzLite');
171
+ await cmdDispatcherGenerateClusterfuzzLite(context);
172
+ println('CMD end: GenerateClusterfuzzLite');
173
+ }
174
+ )
175
+ );
176
+
177
+ context.subscriptions.push(
178
+ vscode.commands.registerCommand(
179
+ 'oss-fuzz.WSBuildFuzzersCFLite',
180
+ async () => {
181
+ println('CMD start: WSBuildFuzzersCFLite');
182
+ await cmdInputCollectorBuildFuzzersFromWorkspaceCFLite();
183
+ println('CMD end: WSBuildFuzzersCFLite');
184
+ }
185
+ )
186
+ );
187
+
188
+ context.subscriptions.push(
189
+ vscode.commands.registerCommand('oss-fuzz.testFuzzerCFLite', async () => {
190
+ println('CMD start: testFuzzerCFLite');
191
+ await cmdInputCollectorTestFuzzerCFLite();
192
+ println('CMD end: testFuzzerCFLite');
193
+ })
194
+ );
195
+
196
+ context.subscriptions.push(
197
+ vscode.commands.registerCommand(
198
+ 'oss-fuzz.setupFuzzIntrospector',
199
+ async () => {
200
+ println('CMD start: setup FI');
201
+ await setUpFuzzIntrospectorHandler();
202
+ }
203
+ )
204
+ );
205
+
206
+ context.subscriptions.push(
207
+ vscode.commands.registerCommand(
208
+ 'oss-fuzz.runFuzzIntrospector',
209
+ async () => {
210
+ println('CMD start: run Fuzz Introspector');
211
+ await runFuzzIntrospectorHandler();
212
+ }
213
+ )
214
+ );
215
+
216
+ context.subscriptions.push(
217
+ vscode.commands.registerCommand('oss-fuzz.GetOptimalTargets', async () => {
218
+ println('CMD start: run GetOptimalTargets');
219
+ await runGetOptimalTargetsHandler();
220
+ })
221
+ );
222
+ }
223
+
224
+ // This method is called when your extension is deactivated
225
+ export function deactivate() {
226
+ println('Deactivating the extension');
227
+ }