Skip to content

Experiment request #2078

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 12 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
23 changes: 23 additions & 0 deletions benchmarks/libaom_av1_dec_fuzzer/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# Copyright 2018 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

FROM gcr.io/oss-fuzz-base/base-builder@sha256:87ca1e9e19235e731fac8de8d1892ebe8d55caf18e7aa131346fc582a2034fdd

RUN apt-get update && apt-get install -y cmake yasm wget
RUN git clone https://aomedia.googlesource.com/aom
ADD https://storage.googleapis.com/aom-test-data/fuzzer/dec_fuzzer_seed_corpus.zip $SRC/
COPY build.sh $SRC/
WORKDIR aom
5 changes: 5 additions & 0 deletions benchmarks/libaom_av1_dec_fuzzer/benchmark.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# 4601636403675136
commit: 6E184898310E49E33231B508618D6FDE8B84AB90
fuzz_target: av1_dec_fuzzer
project: libaom

69 changes: 69 additions & 0 deletions benchmarks/libaom_av1_dec_fuzzer/build.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
#!/bin/bash -eu
# Copyright 2018 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

# Build libaom
build_dir=$WORK/build
mkdir -p ${build_dir}
pushd ${build_dir}
# Remove files generated by the previous build.
rm -rf ./*

# oss-fuzz has 2 GB total memory allocation limit. So, we limit per-allocation
# limit in libaom to 1 GB to avoid OOM errors. A smaller per-allocation is
# needed for MemorySanitizer (see bug oss-fuzz:9497 and bug oss-fuzz:9499).
if [[ $CFLAGS = *sanitize=memory* ]]; then
extra_c_flags='-DAOM_MAX_ALLOCABLE_MEMORY=536870912'
else
extra_c_flags='-DAOM_MAX_ALLOCABLE_MEMORY=1073741824'
fi
# Also, enable DO_RANGE_CHECK_CLAMP to suppress the noise of integer overflows
# in the transform functions.
extra_c_flags+=' -DDO_RANGE_CHECK_CLAMP=1'

extra_cmake_flags=
# MemorySanitizer requires that all program code is instrumented. Therefore we
# need to replace all inline assembly code that writes to memory with pure C
# code. Disable all assembly code for MemorySanitizer.
if [[ $CFLAGS = *sanitize=memory* ]]; then
extra_cmake_flags+="-DAOM_TARGET_CPU=generic"
fi

cmake $SRC/aom -DCMAKE_BUILD_TYPE=Release -DCMAKE_C_FLAGS_RELEASE='-O3 -g' \
-DCMAKE_CXX_FLAGS_RELEASE='-O3 -g' -DCONFIG_PIC=1 -DCONFIG_LOWBITDEPTH=1 \
-DCONFIG_AV1_ENCODER=0 -DENABLE_EXAMPLES=0 -DENABLE_DOCS=0 -DENABLE_TESTS=0 \
-DCONFIG_SIZE_LIMIT=1 -DDECODE_HEIGHT_LIMIT=12288 -DDECODE_WIDTH_LIMIT=12288 \
-DAOM_EXTRA_C_FLAGS="${extra_c_flags}" -DENABLE_TOOLS=0 \
-DAOM_EXTRA_CXX_FLAGS="${extra_c_flags}" ${extra_cmake_flags}
make -j$(nproc)
popd

# build fuzzers
fuzzer_src_name=av1_dec_fuzzer
fuzzer_name=${fuzzer_src_name}

$CXX $CXXFLAGS -std=c++11 \
-I$SRC/aom \
-I${build_dir} \
-Wl,--start-group \
$LIB_FUZZING_ENGINE \
$SRC/aom/examples/${fuzzer_src_name}.cc -o $OUT/${fuzzer_name} \
${build_dir}/libaom.a -Wl,--end-group

# copy seed corpus.
cp $SRC/dec_fuzzer_seed_corpus.zip $OUT/${fuzzer_name}_seed_corpus.zip
cp $SRC/aom/examples/av1_dec_fuzzer.dict $OUT/${fuzzer_name}.dict

22 changes: 22 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp8/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
# Copyright 2018 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

FROM gcr.io/oss-fuzz-base/base-builder@sha256:fb1a9a49752c9e504687448d1f1a048ec1e062e2e40f7e8a23e86b63ff3dad7c
RUN apt-get update && apt-get install -y yasm wget gcc
RUN git clone https://chromium.googlesource.com/webm/libvpx
ADD https://storage.googleapis.com/downloads.webmproject.org/test_data/fuzzer/vpx_fuzzer_seed_corpus.zip $SRC/
COPY build.sh vpx_dec_fuzzer.dict $SRC/
WORKDIR libvpx
4 changes: 4 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp8/benchmark.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
commit: 349820a50dd2c0afbfb26f7b12fc1a83588a52c0
commit_date: 2025-03-13 22:58:09+00:00
fuzz_target: vpx_dec_fuzzer_vp8
project: libvpx
63 changes: 63 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp8/build.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
#!/bin/bash -eu
# Copyright 2018 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

# Build libvpx
build_dir=$WORK/build
rm -rf ${build_dir}
mkdir -p ${build_dir}
pushd ${build_dir}

# oss-fuzz has 2 GB total memory allocation limit. So, we limit per-allocation
# limit in libvpx to 1 GB to avoid OOM errors. A smaller per-allocation is
# needed for MemorySanitizer (see bug oss-fuzz:9497 and bug oss-fuzz:9499).
if [[ $CFLAGS = *sanitize=memory* ]]; then
extra_c_flags='-DVPX_MAX_ALLOCABLE_MEMORY=536870912'
else
extra_c_flags='-DVPX_MAX_ALLOCABLE_MEMORY=1073741824'
fi

LDFLAGS="$CXXFLAGS" LD=$CXX $SRC/libvpx/configure \
--enable-vp9-highbitdepth \
--disable-unit-tests \
--disable-examples \
--size-limit=12288x12288 \
--extra-cflags="${extra_c_flags}" \
--disable-webm-io \
--enable-debug \
--disable-vp8-encoder \
--disable-vp9-encoder
make -j$(nproc) all
popd

# build fuzzers
fuzzer_src_name=vpx_dec_fuzzer
fuzzer_decoders=( 'vp9' 'vp8' )
for decoder in "${fuzzer_decoders[@]}"; do
fuzzer_name=${fuzzer_src_name}"_"${decoder}

$CXX $CXXFLAGS -std=c++11 \
-DDECODER=${decoder} \
-I$SRC/libvpx \
-I${build_dir} \
-Wl,--start-group \
$LIB_FUZZING_ENGINE \
$SRC/libvpx/examples/${fuzzer_src_name}.cc -o $OUT/${fuzzer_name} \
${build_dir}/libvpx.a \
-Wl,--end-group
cp $SRC/vpx_fuzzer_seed_corpus.zip $OUT/${fuzzer_name}_seed_corpus.zip
cp $SRC/vpx_dec_fuzzer.dict $OUT/${fuzzer_name}.dict
done
8 changes: 8 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp8/vpx_dec_fuzzer.dict
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# IVF Signature + version (bytes 0-5)
kw1="DKIF\x00\x00"

# VP9 codec fourCC (bytes 8-11)
kw2="VP90"

# VP8 codec fourCC (bytes 8-11)
kw3="VP80"
22 changes: 22 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp9/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
# Copyright 2018 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

FROM gcr.io/oss-fuzz-base/base-builder@sha256:fb1a9a49752c9e504687448d1f1a048ec1e062e2e40f7e8a23e86b63ff3dad7c
RUN apt-get update && apt-get install -y yasm wget gcc
RUN git clone https://chromium.googlesource.com/webm/libvpx
ADD https://storage.googleapis.com/downloads.webmproject.org/test_data/fuzzer/vpx_fuzzer_seed_corpus.zip $SRC/
COPY build.sh vpx_dec_fuzzer.dict $SRC/
WORKDIR libvpx
4 changes: 4 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp9/benchmark.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
commit: 349820a50dd2c0afbfb26f7b12fc1a83588a52c0
commit_date: 2025-03-13 22:58:09+00:00
fuzz_target: vpx_dec_fuzzer_vp9
project: libvpx
63 changes: 63 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp9/build.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
#!/bin/bash -eu
# Copyright 2018 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

# Build libvpx
build_dir=$WORK/build
rm -rf ${build_dir}
mkdir -p ${build_dir}
pushd ${build_dir}

# oss-fuzz has 2 GB total memory allocation limit. So, we limit per-allocation
# limit in libvpx to 1 GB to avoid OOM errors. A smaller per-allocation is
# needed for MemorySanitizer (see bug oss-fuzz:9497 and bug oss-fuzz:9499).
if [[ $CFLAGS = *sanitize=memory* ]]; then
extra_c_flags='-DVPX_MAX_ALLOCABLE_MEMORY=536870912'
else
extra_c_flags='-DVPX_MAX_ALLOCABLE_MEMORY=1073741824'
fi

LDFLAGS="$CXXFLAGS" LD=$CXX $SRC/libvpx/configure \
--enable-vp9-highbitdepth \
--disable-unit-tests \
--disable-examples \
--size-limit=12288x12288 \
--extra-cflags="${extra_c_flags}" \
--disable-webm-io \
--enable-debug \
--disable-vp8-encoder \
--disable-vp9-encoder
make -j$(nproc) all
popd

# build fuzzers
fuzzer_src_name=vpx_dec_fuzzer
fuzzer_decoders=( 'vp9' 'vp8' )
for decoder in "${fuzzer_decoders[@]}"; do
fuzzer_name=${fuzzer_src_name}"_"${decoder}

$CXX $CXXFLAGS -std=c++11 \
-DDECODER=${decoder} \
-I$SRC/libvpx \
-I${build_dir} \
-Wl,--start-group \
$LIB_FUZZING_ENGINE \
$SRC/libvpx/examples/${fuzzer_src_name}.cc -o $OUT/${fuzzer_name} \
${build_dir}/libvpx.a \
-Wl,--end-group
cp $SRC/vpx_fuzzer_seed_corpus.zip $OUT/${fuzzer_name}_seed_corpus.zip
cp $SRC/vpx_dec_fuzzer.dict $OUT/${fuzzer_name}.dict
done
8 changes: 8 additions & 0 deletions benchmarks/libvpx_vpx_dec_fuzzer_vp9/vpx_dec_fuzzer.dict
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# IVF Signature + version (bytes 0-5)
kw1="DKIF\x00\x00"

# VP9 codec fourCC (bytes 8-11)
kw2="VP90"

# VP8 codec fourCC (bytes 8-11)
kw3="VP80"
24 changes: 24 additions & 0 deletions benchmarks/mruby_mruby_fuzzer/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
# Copyright 2019 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

FROM gcr.io/oss-fuzz-base/base-builder@sha256:87ca1e9e19235e731fac8de8d1892ebe8d55caf18e7aa131346fc582a2034fdd
RUN apt-get update && apt-get install -y build-essential ruby bison ninja-build \
cmake zlib1g-dev libbz2-dev liblzma-dev
RUN git clone \
https://github.com/mruby/mruby
RUN git clone --depth 1 https://github.com/bshastry/mruby_seeds.git mruby_seeds
WORKDIR mruby
COPY build.sh *.c *.options *.dict $SRC/
5 changes: 5 additions & 0 deletions benchmarks/mruby_mruby_fuzzer/benchmark.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
commit: 8c8bbd94dce3b3eabcf72c674e690516c075b0ee
commit_date: 2023-02-03T04:41:10+0000
fuzz_target: mruby_fuzzer
project: mruby
unsupported_fuzzers:
44 changes: 44 additions & 0 deletions benchmarks/mruby_mruby_fuzzer/build.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
#!/bin/bash -eu
# Copyright 2019 Google Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

# Instrument mruby
(
cd $SRC/mruby
export LD=$CC
export LDFLAGS="$CFLAGS -fPIE"

# No you cannot overwrite CC/CXX, otherwise afl++, libafl, etc. wont work!
#LD=/usr/local/bin/clang CC=/usr/local/bin/clang CXX=/usr/local/bin/clang++ rake -m || true
rake -m || true

test -f $SRC/mruby/build/host/lib/libmruby.a

# build fuzzers
FUZZ_TARGET=$SRC/mruby_fuzzer.c
name=$(basename $FUZZ_TARGET .c)
$CC -c $CFLAGS -Iinclude \
${FUZZ_TARGET} -o $OUT/${name}.o
$CXX $CXXFLAGS $OUT/${name}.o $LIB_FUZZING_ENGINE -lm \
$SRC/mruby/build/host/lib/libmruby.a -o $OUT/${name}
rm -f $OUT/${name}.o
)

# dict
cp $SRC/mruby.dict $OUT/mruby_fuzzer.dict

# seeds
zip -rq $OUT/mruby_fuzzer_seed_corpus $SRC/mruby_seeds
Loading