b92paul
06efe97ba0
[MSAN] Enable memory sanitizer build ( #8094 )
...
* CRAS: Use CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"
In oss-fuzz, to build with MemorySanitizer, Rust part needs to use
```
CARGO_BUILD_TARGET="x86_64-unknown-linux-gnu"
```
to resolve libc `MemorySanitizer: use-of-uninitialized-value` error
according to https://github.com/google/oss-fuzz/issues/3469 .
* CRAS: Add new member to auto_ccs
Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-28 12:18:18 +01:00
Arthur Chan
6945f4c77c
oauth2client: initial integration ( #8083 )
...
* oauth2client: initial integration
Create fuzzers
* Update fuzz_basic.py
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-27 09:27:56 -07:00
aschaich
f23485dbad
[apache-commons] Add some fuzz-targets for commons-math ( #8089 )
...
Add some fuzz-targets for commons-math
Bring in some fuzz targets for Clustering, DistanceMetrics
and Linear Optimization
Co-authored-by: psy <patrice.salathe@code-intelligence.com>
2022-07-27 14:54:14 +00:00
Noah
7d01c93774
Switch to primary Google Account email address ( #8090 )
2022-07-27 14:52:45 +00:00
b92paul
d876e1aead
cras: Support -DHAVE_FUZZER ( #8088 )
...
To fix https://crbug.com/oss-fuzz/49371 ,
passing HAVE_FUZZER flag during library build stage.
And by pass DBus usage in https://crrev.com/c/3787999 .
BUG=oss-fuzz:49371
Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-27 14:29:57 +01:00
DavidKorczynski
c751c97df5
lcms: add dictionary to transform_all_fuzzer ( #8087 )
2022-07-27 10:53:13 +01:00
DavidKorczynski
c00c701743
wuffs: fix build by fixing corpus link ( #8084 )
...
Existing corpus link is no longer accessible. Switching to a reliable source.
Fixing this also to unbreak Fuzz Introspector tests here https://github.com/ossf/fuzz-introspector/issues/412#issuecomment-1195537545
2022-07-26 13:48:31 -07:00
Alexander Bulekov
0a8db249a5
qemu: limit input size to avoid timeouts ( #8085 )
...
QEMU coverage builds have been failing for a long time. Maybe this is
occuring due to the inputs being too large and timing out. Limit the
input size, in an attempt to fix this.
Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2022-07-26 17:01:17 +01:00
DavidKorczynski
2efe7c9ee5
g-api-auth-library-python: embed .pem files in pyinstalled exec ( #8082 )
...
This fixes:
https://github.com/google/oss-fuzz/issues/8030#issuecomment-1194645711
2022-07-26 09:56:36 +01:00
Guido Vranken
a34bf6d822
[nettle] Update auto_ccs ( #8076 )
2022-07-26 00:41:32 +01:00
Arthur Chan
3b7fa87b7d
Retry: initial integration ( #7952 )
...
* Retry: initial integration
Create retry fuzzer
* retry: Fix fuzzer
Remove randomization in fuzzer
2022-07-26 00:41:05 +01:00
Arthur Chan
7970e727ef
smart_open: initial integration ( #7799 )
...
* smart_open: initial integration
Add initial fuzzer
* Add new fuzzers
- fuzz_bytebuffer
- fuzz_utils
2022-07-25 20:02:00 +01:00
DavidKorczynski
1dd57d5480
netaddr-py: initial integration ( #7725 )
...
* netaddr-py: initial integration
2022-07-25 20:01:43 +01:00
DavidKorczynski
29f3f9e2c2
lcms: add myself in auto_ccs ( #8075 )
...
* lcms: add myself in auto_ccs
This is approved from internal conversation with LCMS maintainer @mm2 and @oliverchang
* lcms: add main repo
2022-07-25 19:47:21 +01:00
Guido Vranken
5dd45c4898
[wolfssl] Fix build ( #7994 )
...
* [wolfssl] Fix build
* [wolfssl] Retrigger CI
* [wolfssl] Fix again
2022-07-25 19:08:35 +01:00
DavidKorczynski
a0948a54cf
fast-dds: fix build ( #8074 )
...
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49240
2022-07-25 17:40:09 +01:00
code-terror
eec428c9ad
Intital integration of pest ( #8071 )
...
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-25 22:58:01 +10:00
DavidKorczynski
2a0f13579e
googleapis-pubsub: initial integration ( #8072 )
2022-07-25 13:51:50 +01:00
Michael Macnair
cea71828c0
file: Add elf and pe seeds ( #8073 )
...
* file: Add elf and pe seeds
* file: make binary-samples path explicit
* Update Dockerfile
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-25 08:38:59 -04:00
DavidKorczynski
05d1ebf6c2
gcp-python-cloud-storage: add primary matiainer ( #8070 )
...
Ref: https://github.com/googleapis/python-storage/issues/828#issuecomment-1192029879
2022-07-25 10:15:17 +01:00
b92paul
274904fdc4
cras: Change to out-of-tree build ( #8069 )
...
When running fuzzers with local source tree,
```
python3 infra/helper.py build_fuzzers --sanitizer address cras
<source_tree>
```
will generate lots of root permission artifacts to local source tree.
Change to out-of-tree build, then
```
python3 infra/helper.py build_fuzzers --clean --sanitizer address cras
<source_tree>
```
could always start from a clean build.
Co-authored-by: paulhsia <paulhsia@google.com>
2022-07-24 17:37:07 -04:00
Josh Bleecher Snyder
2eed21485e
remove josharian from cc list ( #8068 )
...
I am stepping back from most of my Go-related maintainership.
2022-07-24 15:24:15 -04:00
M Hickford
8b2be73d66
Link to compile_native_go_fuzzer script source ( #8066 )
2022-07-23 17:09:33 +01:00
Evgeny Vereshchagin
6ab076f27a
[dbus-broker] show meson logs and turn off fuzz-introspector ( #8065 )
...
* [dbus-broker] show meson logs when it fails
* [dbus-broker] turn off fuzz-introspector
2022-07-23 17:09:06 +01:00
Aaron Boxer
581dd281ad
[grok] disable full codec and shared libs in cmake command ( #8064 )
...
only static library is needed for fuzzer
2022-07-23 15:03:02 +01:00
DavidKorczynski
c9f81256f9
lcms: add seeds and profile fuzzer ( #8063 )
2022-07-23 13:20:03 +01:00
DavidKorczynski
3c67623eb5
pidgin: fix build ( #8060 )
...
* pidgin: fix build
2022-07-23 01:14:26 +01:00
dependabot[bot]
f014b858d9
build(deps): bump tzinfo from 1.2.9 to 1.2.10 in /docs ( #8053 )
...
Bumps [tzinfo](https://github.com/tzinfo/tzinfo ) from 1.2.9 to 1.2.10.
- [Release notes](https://github.com/tzinfo/tzinfo/releases )
- [Changelog](https://github.com/tzinfo/tzinfo/blob/master/CHANGES.md )
- [Commits](https://github.com/tzinfo/tzinfo/compare/v1.2.9...v1.2.10 )
---
updated-dependencies:
- dependency-name: tzinfo
dependency-type: indirect
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-07-22 10:10:27 -04:00
Thomas Van Lenten
1a3a97dd93
Update Cory's requested address. ( #8057 )
2022-07-22 10:10:06 -04:00
Evgeny Vereshchagin
25bb9af326
[docs] point to the right systemd branch ( #8056 )
...
GitHub redirects it to the main branch but it keeps saying that
the branch was renamed and it's distracting.
2022-07-22 13:40:35 +01:00
Evgeny Vereshchagin
b6a9ed8ee1
[dbus-broker] turn on the alignment check ( #8055 )
...
By analogy with 8747524f04
it should help to somewhat cover architectures where unaligned access
can either crash code or be too expensive in terms of performance.
2022-07-22 13:40:03 +01:00
M Hickford
6bce362a80
Link to Go fuzzing docs ( #8054 )
2022-07-22 13:39:20 +01:00
Evgeny Vereshchagin
ed8ad012a2
[dbus-broker] add build script and fuzz target ( #7870 )
2022-07-22 10:12:14 +10:00
DavidKorczynski
33127a01cb
pytz: initial integration ( #7730 )
...
* pytz: initial integration
* Catch highest pytz exception
2022-07-22 00:44:58 +01:00
Jonas Devlieghere
49ce84fb16
[llvm] Use my commit email address instead of the corp one ( #8052 )
...
I lost access to the Google account associated with my corporate e-mail
address. Switch to using the one I use for contributing to LLVM, which I
should've done from the beginning.
2022-07-21 17:54:01 -04:00
DavidKorczynski
aaa321c88d
libphonenumber: remove fuzzer as it's upstream now ( #8051 )
...
libphonenumber: remove fuzzer as its upstream now
Ref: https://github.com/google/libphonenumber/pull/2548
2022-07-21 15:53:17 +01:00
Michelle Wang
b3f34b0ba8
Cras fuzz ( #8047 )
...
CRAS: Build cras_fl_media_fuzzer
Modify cras/build.sh to compile cras_fl_media_fuzzer.
2022-07-21 08:57:45 -04:00
DavidKorczynski
8968a41910
lcms: add extended transform fuzzer ( #8050 )
2022-07-21 11:31:09 +01:00
code-terror
463073282c
Initial integration of Bincode ( #8045 )
...
* add cloud-hypervisor
* adding dockerfile and build.sh
* fix issue
* add copyright
* fix year in copyright
* optimise
* add bincode
* Update project.yaml
Co-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>
2022-07-21 03:51:04 -04:00
Mihai Maruseac
0296d0f379
Use `rsync` instead of `cp -r` and resolve symlinks. ( #8044 )
...
Resolving symlinks makes the test start executing. However, locally I
still got some test failures, which I don't know if are expected or not.
But still, it is some progress.
Signed-off-by: Mihai Maruseac <mihaimaruseac@google.com>
2022-07-20 17:09:07 -04:00
Tim Wojtulewicz
71f4c01843
zeek: Fix installation of filesystem module ( #8043 )
2022-07-20 17:04:15 -04:00
jonathanmetzman
c50e257afb
[wycheproof] improve build ( #8042 )
...
Still doesn't work outside the same image
Related #8034
2022-07-20 15:34:07 -04:00
Jonathan Metzman
8d5c72d77a
[wycheproof] Support wycheproof in bad_build_check.
...
Related #8040
2022-07-20 14:45:50 -04:00
jonathanmetzman
427c930c2e
[wycheproof] Add CI support ( #8040 )
...
Update project_tests.yml
2022-07-20 14:36:44 -04:00
jonathanmetzman
68f2340a6a
[wycheproof] Add build infra support ( #8041 )
...
* Build infra
* [wycheproof] Add build infra support
* Fix
* undo
2022-07-20 14:34:19 -04:00
jonathanmetzman
d50556b758
[NFC] Fix build URL ( #8039 )
...
Fix build URL
2022-07-20 14:25:14 -04:00
jonathanmetzman
a1f62a25ff
[wycheproof] Get compilation working ( #8037 )
2022-07-20 13:26:43 -04:00
jonathanmetzman
5f28ebd877
[wycheproof] Get example working ( #8038 )
...
Related: #8034
2022-07-20 13:26:18 -04:00
John Howard
4138b03a98
istio: switch to standard base-builder-go ( #7992 )
...
* istio: switch to standard base-builder-go
This is required to use the Go 1.18 native fuzzing
* Update Dockerfile
2022-07-20 17:28:03 +01:00
jonathanmetzman
f8208fc0b8
[wycheproof] Add example integration ( #8036 )
...
Related #8034
2022-07-20 11:30:18 -04:00