1. 21 Aug, 2018 1 commit
  2. 20 Aug, 2018 3 commits
  3. 19 Aug, 2018 3 commits
  4. 17 Aug, 2018 1 commit
  5. 16 Aug, 2018 4 commits
  6. 14 Aug, 2018 4 commits
  7. 09 Aug, 2018 4 commits
  8. 06 Aug, 2018 8 commits
  9. 05 Aug, 2018 5 commits
  10. 04 Aug, 2018 1 commit
    • parse: Do not initialize the content in context to NULL · d1bfe614
      String operations in libgit2 are supposed to never receive `NULL`, e.g.
      they are not `NULL`-save. In the case of `git__linenlen()`, invocation
      with `NULL` leads to undefined behavior.
      
      In a `git_parse_ctx` however, the `content` field used in these
      operations was initialized to `NULL` if the `git_parse_ctx_init()` was
      called with `NULL` for `content` or `0` for `content_len`. For the
      latter case, the initialization function even contained some logic for
      initializing `content` with `NULL`.
      
      This commit mitigates triggering undefined behavior by rewriting the
      logic. Now `content` is always initialized to a non-null buffer. Instead
      of a null buffer, an empty string is used for denoting an empty buffer.
      Julian Ganz committed
  11. 03 Aug, 2018 6 commits
    • ci: fix location of fuzzer corpora on VSTS · 835d6043
      When using VSTS-based builds, we are in a different location than when
      doing Travis builds. Due to this, the relative path to our fuzzer
      corpora does not work on VSTS. Fix it by using `${SOURCE_DIR}` instead.
      Patrick Steinhardt committed
    • fuzzers: limit maximum pack object count · e38ddc90
      By default, libgit2 allows up to 2^32 objects when downloading a
      packfile from a remote. For each of these objects, libgit2 will allocate
      up to two small structs, which in total adds up to quite a lot of
      memory. As a result, our fuzzers might run out of memory rather quick in
      case where they receive as input a packfile with such a huge count of
      objects.
      
      Limit the packfile object count to 10M objects. This is sufficiently big
      to still work with most largish repos (linux.git has around 6M objects
      as of now), but small enough to not cause the fuzzer to OOM.
      Patrick Steinhardt committed
    • fuzzers: convert download_refs fuzzer to C · 5db64e2f
      Convert the "download_refs" fuzzer from C++ to C. Rename the source file
      to have it be picked up by our build system.
      Patrick Steinhardt committed
    • fuzzers: import download_refs fuzzer from oss-fuzz · 730c0edb
      This is a direct copy of the code from google/oss-fuzz, written by
      Nelson Elhage (@nelhage). Note that due to the ".cc" ending, the file
      will not yet be picked up by the build system. This is intended, as
      currently that file is partly written in C++, requiring a conversion to
      C.
      Patrick Steinhardt committed
    • fuzzers: avoid use of libgit2 internals in packfile_raw · de53972f
      The packfile_raw fuzzer is using some internal APIs from libgit2, which
      makes it hard to compile it as part of the oss-fuzz project. As oss-fuzz
      requires us to link against the C++ FuzzingEngine library, we cannot use
      "-DBUILD_FUZZERS=ON" directly but instead have to first compile an
      object from our fuzzers and then link against the C++ library. Compiling
      the fuzzer objects thus requires an external invocation of CC, and we
      certainly don't want to do further black magic by adding libgit2's
      private source directory to the header include path.
      
      To fix the issue, convert the code to not use any internal APIs. Besides
      some headers which we have to add now, this also requires us to change
      to the hashing function of the ODB. Note that this will change the
      hashing result, as we have previously not prepended the object header to
      the data that is to be hashed. But this shouldn't matter in practice, as
      we don't care for the hash value anyway.
      Patrick Steinhardt committed