| Commit message (Collapse) | Author | Age |
|
|
| |
Migrate from -lFuzzingEngine to $LIB_FUZZING_ENGINE where possible and not causing breakage
|
|
|
| |
Modify accounts for CRAS team member changes.
|
|
|
|
| |
Migrate projects that broke libFuzzer with exceptions to $LIB_FUZZING_ENGINE.
Replace uses of -lFuzzingEngine with `$LIB_FUZZING_ENGINE`
|
|
|
| |
Roll clang to r359254 to uptake fixes for exception handling and MSAN.
|
|
|
|
|
|
|
|
| |
(#2316) (#2356)
* Revert "[infra] Revert the recent clang roll to fix some builds (#2315). (#2316)"
This reverts commit 8b34fd89d24551a2268099a6213a6152922cb601.
|
| |
|
| |
|
|
|
| |
Temporary workaround for OpenSSL's build system problems.
|
|
|
|
|
|
|
| |
This is no longer needed as we handle this Envoy-side. This should fix
the build that has been broken since
https://github.com/envoyproxy/envoy/pull/6610.
Signed-off-by: Harvey Tuch <htuch@google.com>
|
| |
|
|
|
|
| |
build fuzzers from there (as they recently landed in the release branch) (#2339)
|
| |
|
|
|
| |
Don't allow using check_build with builds it doesn't actually support.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* [cryptofuzz] Use latest OpenSSL version
This is a workaround for an issue OpenSSL's build system is currently
having. I've appended || true to the build command so failure is not
signaled to the Docker process running the build script, and the build
is not aborted.
Multithreaded compiling has been removed temporarily to avoid a race
condition that causes the make procedure to abort before libcrypto.a
has been compiled.
* [cryptofuzz] Build against LIB_FUZZING_ENGINE_DEPRECATED to prevent crashes
|
|
|
| |
Uses a newly compiled file for next branch only
|
|
|
|
|
|
| |
I just added a new fuzzer, `zstd_frame_info`, and want to be able to add new
fuzzers without submitting a pull request to oss-fuzz. This change uses zstd's
Makefile to download the corpora. Now I can add a new fuzzer to zstd and it will
automatically get built and download the seed corpus in oss-fuzz.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Add cryptofuzz
* [cryptofuzz] Specify sanitizers
* [cryptofuzz] Actually disable assembly in second OpenSSL build
* [cryptofuzz] Add BoringSSL
* [cryptofuzz] Enable MemorySanitizer builds
* [cryptofuzz] Fix OpenSSL build
* [cryptofuzz] Add LibreSSL target
* [cryptofuzz] Don't build LibreSSL if MemorySanitizer is enabled
* [cryptofuzz] Adapt build script to latest cryptofuzz code
* [cryptofuzz] Force rebuild of OpenSSL
* [cryptofuzz] Comment and move to Dockerfile OpenSSL's commit lock
* [cryptofuzz] BoringSSL, LibreSSL: only build libcrypto.a for faster builds
* [cryptofuzz] Replace -lFuzzingEngine -> $LIB_FUZZING_ENGINE for compatibility with OSS-Fuzz' new build setup
* [cryptofuzz] Add README.md
|
|
|
| |
This will give us more information if the clone fails (which it does sometimes, probably due to sourceforge infra issues)
|
| |
|
|
|
| |
oss-fuzz devels say this is optimal
|
|
|
|
| |
Update skia.diff to fix build breakage.
Also, use $LIB_FUZZING_ENGINE instead of -lFuzzingEngine to start using -fsanitize=fuzzer
|
| |
|
| |
|
|
|
| |
Integrate the first fuzz targets from libxslt.
|
| |
|
| |
|
| |
|
|
|
|
| |
Build clang so that it can compile targets with -fsanitize=fuzzer
without adding any runtime dependencies.
|
|
|
|
|
|
|
|
| |
* [zstd] Add seed corpora for two new fuzzers
* [zstd] Add two more emails to cc list
It is helpful to add in the corporate email so we don't miss bugs.
|
|
|
|
| |
The cmake option for disabling shared libs was not the correct one
and the compilation was getting confused
|
|
|
|
|
|
| |
* Enable experimental XMSS keys for fuzzing
* Enable auth options fuzzer
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* switch to another fuzzer repo aimed to be merged upstream
* update email addresses
checked with arvid, he approved adding his address
* [libtorrent] improve building
- use ninja
- don't build tests
- respect CXXFLAGS when building boost
- less verbose output when downloading
* create initial corpus zip files from git
this makes it much easier to add and remove
both fuzzers and corpus upstream and make
sure they work well.
|
| |
|
| |
|
|
|
| |
This reverts commit cce2ed4d23eb65251c0cd6b44cc666d91c883803.
|
|
|
|
|
|
| |
* [infra] Enabling DataFlow build configuration (#1632).
* Copy all data flow scripts from the libFuzzer repo.
|
| |
|
|
|
|
|
| |
Proto fuzzers are slow and haven't found bugs in a long time. Their
builds are also hard to maintain since they build in a different
configuration than any of the LLVM build bots.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Determine Bazel version from configure.py script
* Install Bazel at the version from configure.py
* Don't downgrade Bazel on Dockerfile
* Make sure we were able to install proper Bazel
* Comment update
|
| |
|
|
|
|
| |
Don't test compilation with afl-clang and afl-fuzz
|
|
|
|
|
|
| |
* Update Bazel to 0.24.0
* Always run ./configure
|
| |
|
|
|
| |
see https://github.com/google/oss-fuzz/issues/2261#issuecomment-479085906
|