Commit Graph

7481 Commits

Author SHA1 Message Date
b92paul 06efe97ba0
[MSAN] Enable memory sanitizer build (#8094)
* CRAS: Use CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"

In oss-fuzz, to build with MemorySanitizer, Rust part needs to use

```
CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"
```

to resolve libc `MemorySanitizer: use-of-uninitialized-value` error
according to https://github.com/google/oss-fuzz/issues/3469.

* CRAS: Add new member to auto_ccs

Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-28 12:18:18 +01:00
Arthur Chan 6945f4c77c
oauth2client: initial integration (#8083)
* oauth2client: initial integration
Create fuzzers

* Update fuzz_basic.py

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-27 09:27:56 -07:00
aschaich f23485dbad
[apache-commons] Add some fuzz-targets for commons-math (#8089)
Add some fuzz-targets for commons-math

Bring in some fuzz targets for Clustering, DistanceMetrics
and Linear Optimization

Co-authored-by: psy <patrice.salathe@code-intelligence.com>
2022-07-27 14:54:14 +00:00
Noah 7d01c93774
Switch to primary Google Account email address (#8090) 2022-07-27 14:52:45 +00:00
b92paul d876e1aead
cras: Support -DHAVE_FUZZER (#8088)
To fix https://crbug.com/oss-fuzz/49371,
passing HAVE_FUZZER flag during library build stage.

And by pass DBus usage in https://crrev.com/c/3787999.

BUG=oss-fuzz:49371

Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-27 14:29:57 +01:00
DavidKorczynski c751c97df5
lcms: add dictionary to transform_all_fuzzer (#8087) 2022-07-27 10:53:13 +01:00
DavidKorczynski c00c701743
wuffs: fix build by fixing corpus link (#8084)
Existing corpus link is no longer accessible. Switching to a reliable source.

Fixing this also to unbreak Fuzz Introspector tests here https://github.com/ossf/fuzz-introspector/issues/412#issuecomment-1195537545
2022-07-26 13:48:31 -07:00
Alexander Bulekov 0a8db249a5
qemu: limit input size to avoid timeouts (#8085)
QEMU coverage builds have been failing for a long time. Maybe this is
occuring due to the inputs being too large and timing out. Limit the
input size, in an attempt to fix this.

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2022-07-26 17:01:17 +01:00
DavidKorczynski 2efe7c9ee5
g-api-auth-library-python: embed .pem files in pyinstalled exec (#8082)
This fixes:
https://github.com/google/oss-fuzz/issues/8030#issuecomment-1194645711
2022-07-26 09:56:36 +01:00
Guido Vranken a34bf6d822
[nettle] Update auto_ccs (#8076) 2022-07-26 00:41:32 +01:00
Arthur Chan 3b7fa87b7d
Retry: initial integration (#7952)
* Retry: initial integration
Create retry fuzzer

* retry: Fix fuzzer
Remove randomization in fuzzer
2022-07-26 00:41:05 +01:00
Arthur Chan 7970e727ef
smart_open: initial integration (#7799)
* smart_open: initial integration
Add initial fuzzer

* Add new fuzzers
- fuzz_bytebuffer
- fuzz_utils
2022-07-25 20:02:00 +01:00
DavidKorczynski 1dd57d5480
netaddr-py: initial integration (#7725)
* netaddr-py: initial integration
2022-07-25 20:01:43 +01:00
DavidKorczynski 29f3f9e2c2
lcms: add myself in auto_ccs (#8075)
* lcms: add myself in auto_ccs

This is approved from internal conversation with LCMS maintainer @mm2 and @oliverchang

* lcms: add main repo
2022-07-25 19:47:21 +01:00
Guido Vranken 5dd45c4898
[wolfssl] Fix build (#7994)
* [wolfssl] Fix build

* [wolfssl] Retrigger CI

* [wolfssl] Fix again
2022-07-25 19:08:35 +01:00
DavidKorczynski a0948a54cf
fast-dds: fix build (#8074)
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49240
2022-07-25 17:40:09 +01:00
code-terror eec428c9ad
Intital integration of pest (#8071)
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-25 22:58:01 +10:00
DavidKorczynski 2a0f13579e
googleapis-pubsub: initial integration (#8072) 2022-07-25 13:51:50 +01:00
Michael Macnair cea71828c0
file: Add elf and pe seeds (#8073)
* file: Add elf and pe seeds

* file: make binary-samples path explicit

* Update Dockerfile

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-25 08:38:59 -04:00
DavidKorczynski 05d1ebf6c2
gcp-python-cloud-storage: add primary matiainer (#8070)
Ref: https://github.com/googleapis/python-storage/issues/828#issuecomment-1192029879
2022-07-25 10:15:17 +01:00
b92paul 274904fdc4
cras: Change to out-of-tree build (#8069)
When running fuzzers with local source tree,

```
python3 infra/helper.py build_fuzzers --sanitizer address cras
<source_tree>
```

will generate lots of root permission artifacts to local source tree.

Change to out-of-tree build, then

```
python3 infra/helper.py build_fuzzers --clean --sanitizer address cras
<source_tree>
```

could always start from a clean build.

Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-24 17:37:07 -04:00
Josh Bleecher Snyder 2eed21485e
remove josharian from cc list (#8068)
I am stepping back from most of my Go-related maintainership.
2022-07-24 15:24:15 -04:00
M Hickford 8b2be73d66
Link to compile_native_go_fuzzer script source (#8066) 2022-07-23 17:09:33 +01:00
Evgeny Vereshchagin 6ab076f27a
[dbus-broker] show meson logs and turn off fuzz-introspector (#8065)
* [dbus-broker] show meson logs when it fails

* [dbus-broker] turn off fuzz-introspector
2022-07-23 17:09:06 +01:00
Aaron Boxer 581dd281ad
[grok] disable full codec and shared libs in cmake command (#8064)
only static library is needed for fuzzer
2022-07-23 15:03:02 +01:00
DavidKorczynski c9f81256f9
lcms: add seeds and profile fuzzer (#8063) 2022-07-23 13:20:03 +01:00
DavidKorczynski 3c67623eb5
pidgin: fix build (#8060)
* pidgin: fix build
2022-07-23 01:14:26 +01:00
dependabot[bot] f014b858d9
build(deps): bump tzinfo from 1.2.9 to 1.2.10 in /docs (#8053)
Bumps [tzinfo](https://github.com/tzinfo/tzinfo) from 1.2.9 to 1.2.10.
- [Release notes](https://github.com/tzinfo/tzinfo/releases)
- [Changelog](https://github.com/tzinfo/tzinfo/blob/master/CHANGES.md)
- [Commits](https://github.com/tzinfo/tzinfo/compare/v1.2.9...v1.2.10)

---
updated-dependencies:
- dependency-name: tzinfo
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-07-22 10:10:27 -04:00
Thomas Van Lenten 1a3a97dd93
Update Cory's requested address. (#8057) 2022-07-22 10:10:06 -04:00
Evgeny Vereshchagin 25bb9af326
[docs] point to the right systemd branch (#8056)
GitHub redirects it to the main branch but it keeps saying that
the branch was renamed and it's distracting.
2022-07-22 13:40:35 +01:00
Evgeny Vereshchagin b6a9ed8ee1
[dbus-broker] turn on the alignment check (#8055)
By analogy with 8747524f04
it should help to somewhat cover architectures where unaligned access
can either crash code or be too expensive in terms of performance.
2022-07-22 13:40:03 +01:00
M Hickford 6bce362a80
Link to Go fuzzing docs (#8054) 2022-07-22 13:39:20 +01:00
Evgeny Vereshchagin ed8ad012a2
[dbus-broker] add build script and fuzz target (#7870) 2022-07-22 10:12:14 +10:00
DavidKorczynski 33127a01cb
pytz: initial integration (#7730)
* pytz: initial integration

* Catch highest pytz exception
2022-07-22 00:44:58 +01:00
Jonas Devlieghere 49ce84fb16
[llvm] Use my commit email address instead of the corp one (#8052)
I lost access to the Google account associated with my corporate e-mail
address. Switch to using the one I use for contributing to LLVM, which I
should've done from the beginning.
2022-07-21 17:54:01 -04:00
DavidKorczynski aaa321c88d
libphonenumber: remove fuzzer as it's upstream now (#8051)
libphonenumber: remove fuzzer as its upstream now

Ref: https://github.com/google/libphonenumber/pull/2548
2022-07-21 15:53:17 +01:00
Michelle Wang b3f34b0ba8
Cras fuzz (#8047)
CRAS: Build cras_fl_media_fuzzer

Modify cras/build.sh to compile cras_fl_media_fuzzer.
2022-07-21 08:57:45 -04:00
DavidKorczynski 8968a41910
lcms: add extended transform fuzzer (#8050) 2022-07-21 11:31:09 +01:00
code-terror 463073282c
Initial integration of Bincode (#8045)
* add cloud-hypervisor

* adding dockerfile and build.sh

* fix issue

* add copyright

* fix year in copyright

* optimise

* add bincode

* Update project.yaml

Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-21 03:51:04 -04:00
Mihai Maruseac 0296d0f379
Use `rsync` instead of `cp -r` and resolve symlinks. (#8044)
Resolving symlinks makes the test start executing. However, locally I
still got some test failures, which I don't know if are expected or not.
But still, it is some progress.

Signed-off-by: Mihai Maruseac <mihaimaruseac@google.com>
2022-07-20 17:09:07 -04:00
Tim Wojtulewicz 71f4c01843
zeek: Fix installation of filesystem module (#8043) 2022-07-20 17:04:15 -04:00
jonathanmetzman c50e257afb
[wycheproof] improve build (#8042)
Still doesn't work outside the same image
Related #8034
2022-07-20 15:34:07 -04:00
Jonathan Metzman 8d5c72d77a [wycheproof] Support wycheproof in bad_build_check.
Related #8040
2022-07-20 14:45:50 -04:00
jonathanmetzman 427c930c2e
[wycheproof] Add CI support (#8040)
Update project_tests.yml
2022-07-20 14:36:44 -04:00
jonathanmetzman 68f2340a6a
[wycheproof] Add build infra support (#8041)
* Build infra

* [wycheproof] Add build infra support

* Fix

* undo
2022-07-20 14:34:19 -04:00
jonathanmetzman d50556b758
[NFC] Fix build URL (#8039)
Fix build URL
2022-07-20 14:25:14 -04:00
jonathanmetzman a1f62a25ff
[wycheproof] Get compilation working (#8037) 2022-07-20 13:26:43 -04:00
jonathanmetzman 5f28ebd877
[wycheproof] Get example working (#8038)
Related: #8034
2022-07-20 13:26:18 -04:00
John Howard 4138b03a98
istio: switch to standard base-builder-go (#7992)
* istio: switch to standard base-builder-go

This is required to use the Go 1.18 native fuzzing

* Update Dockerfile
2022-07-20 17:28:03 +01:00
jonathanmetzman f8208fc0b8
[wycheproof] Add example integration (#8036)
Related #8034
2022-07-20 11:30:18 -04:00