aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2021-04-03Snap for 7256110 from 75c8dcf71ca8652f671b4ca5fea780a558c86e08 to sc-d1-releaseandroid-12.0.0_r7android-12.0.0_r6android-12.0.0_r5android-12.0.0_r4android-12.0.0_r15android-12.0.0_r14android-12.0.0_r13android-12.0.0_r12android12-d1-s6-releaseandroid12-d1-s5-releaseandroid12-d1-s4-releaseandroid12-d1-s3-releaseandroid12-d1-s2-releaseandroid12-d1-s1-releaseandroid12-d1-releaseandroid-build-team Robot
Change-Id: Iebe8b2ff0050db7f231492bb4ab8088f1495c87f
2021-04-02Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712 ↵android-12.1.0_r9android-12.1.0_r8android-12.1.0_r7android-12.1.0_r26android-12.1.0_r25android-12.1.0_r24android-12.1.0_r23android-12.1.0_r22android-12.1.0_r21android-12.1.0_r20android-12.1.0_r19android-12.1.0_r18android-12.1.0_r17android-12.1.0_r16android-12.1.0_r15android-12.1.0_r14android-12.1.0_r13android-12.1.0_r12android-12.1.0_r11android-12.1.0_r10android-12.0.0_r32android-12.0.0_r29android-12.0.0_r28android-12.0.0_r27android-12.0.0_r26android-12.0.0_r21android-12.0.0_r20android-12.0.0_r19android-12.0.0_r18android-12.0.0_r16android12L-devandroid12L-d2-s8-releaseandroid12L-d2-s7-releaseandroid12L-d2-s6-releaseandroid12L-d2-s5-releaseandroid12L-d2-s4-releaseandroid12L-d2-s3-releaseandroid12L-d2-s2-releaseandroid12L-d2-s1-releaseandroid12L-d2-releaseandroid12-qpr3-s7-releaseandroid12-qpr3-s6-releaseandroid12-qpr3-s5-releaseandroid12-qpr3-s4-releaseandroid12-qpr3-s3-releaseandroid12-qpr3-s2-releaseandroid12-qpr3-s1-releaseandroid12-qpr3-releaseandroid12-qpr1-releaseandroid12-qpr1-d-s3-releaseandroid12-qpr1-d-s2-releaseandroid12-qpr1-d-s1-releaseandroid12-qpr1-d-releaseandroid12-devElliott Hughes
am: 1117028736 am: 235e96b2f8 Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261 Change-Id: Ib7b7a79b38e1261c1d5fb4ccb1a5dfd106588996
2021-04-02Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712 ↵Elliott Hughes
am: 1117028736 Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261 Change-Id: I8526ccfaeb10e35f986e2e8cc24c66e965584281
2021-04-02Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266ae am: f3764d0712android-s-beta-5android-s-beta-4android-s-beta-3android-s-beta-5android-s-beta-4Elliott Hughes
Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1662261 Change-Id: I18045be87879187bbbe56998975665b475a99c13
2021-04-01Upgrade oss-fuzz to 947169dc86572e121c3e138f366a9f39ac6266aeandroid-s-beta-2android-s-beta-1Elliott Hughes
Test: make Change-Id: I236ee3c6ec56da682c1fb018727089b10e4f5dda
2021-04-01[java-example] Speculative fix for JVM segfault crashes (#5554)Fabian Meumertzheim
The JVM uses custom SIGSEGV handlers, which leads to fuzzer crashes on ClusterFuzz when running with ASAN likely due to the allow_user_segv_handler=1 default on the platform.
2021-04-01[kamailio] Update project.yaml (#5553)DavidKorczynski
add maintainer email
2021-04-01pillow: trying to fix build. (#5552)DavidKorczynski
2021-03-31rustls: initial integration. (#5332)DavidKorczynski
2021-03-31kamailio: initial integration (#5279)DavidKorczynski
2021-03-31httparse: Initial integration (#5331)DavidKorczynski
2021-03-31[lotus] Fix coverage build (#5544)AdamKorcz
2021-03-31Update the Bazel project integration guide to capture the new simpler tool. ↵Stefan Bucur
(#5550) * Update the Bazel project integration guide to capture the new simpler tool. * Update bazel.md Co-authored-by: Abhishek Arya <inferno@chromium.org>
2021-03-31Implement the Bazel building recipe as a stand-alone script that can be ↵Stefan Bucur
invoked from build.sh. (#5548)
2021-03-31Adds project fast-dds (#5487)Catena cyber
2021-03-31[grpc-gateway] Fix coverage build (#5545)AdamKorcz
2021-03-31[capnproto] Initial integration (#5202)Catena cyber
2021-03-31[thrift] Initial integration (#5264)Catena cyber
2021-03-31[mupdf] Improve custom allocator (#5505)Sebastian Rasmussen
Previously the allocator handled small pointer values incorrectly and prevented multiple executions (unexpectedly used when OSS-fuzz uses LSAN to look for memory leaks).
2021-03-31[hugo] Fix build (#5538)AdamKorcz
2021-03-31[dart] initial integration (#5515)Catena cyber
2021-03-31[tinygltf] initial project integration (#5535)Catena cyber
2021-03-31[CIFuzz] Print crash stacktraces no matter what (#5474)jonathanmetzman
Even if we don't want to report them, print the stacktrace. Related: https://github.com/google/oss-fuzz/issues/5461
2021-03-31[lxc] move the build script and fuzz target upstream (#5514)Evgeny Vereshchagin
Now that https://github.com/lxc/lxc/pull/3733 is merged, it should be safe to point OSS-Fuzz to the lxc repository.
2021-03-31Fix minor typo in docs (#5540)AdamKorcz
2021-03-30Adds project openbabel (#5492)Catena cyber
* Adds project openbabel * fixup target merged upstream
2021-03-29[wasmtime] Tweak member e-mail (#5532)Andrew Brown
2021-03-29[wasmtime] add another member e-mail (#5517)Andrew Brown
2021-03-29[skia] Add Region Op fuzzer (#5527)Kevin Lubick
2021-03-29Suricata pcap-aware target (#5528)Catena cyber
* Adds structure-aware target for suricata * Remove rustc wrapper for suricata now that https://github.com/rust-lang/rust/issues/82144 got fixed * Remove suricata rust workarounds for coverage Now that https://github.com/rust-lang/rust/issues/82144 got fixed
2021-03-29Fix build failure in unbound (#5529)Abhishek Arya
Fixes #5513
2021-03-28the fuzz directory was moved to nom's repository (#5523)Geoffroy Couprie
2021-03-28Added libpff and libmodi to libyal project configuration (#5520)Joachim Metz
2021-03-26[libjpeg-turbo] Fix build with libjpeg-turbo 2.1.x (#5519)DRC
libjpeg-turbo 2.1 now requires NASM 2.13 or later or YASM 1.2.0 or later. Since the Docker image is based on Ubuntu 16.04, NASM 2.13 isn't available, so the easiest workaround is to use YASM instead. Fixes #4931
2021-03-26Update wasmtime config to use new x86-64 backend. (#5518)Chris Fallin
In bytecodealliance/rfcs#10, we have outlined a process by which we're switching to a new compiler backend by default. The first step in this process is to switch our fuzzing targets to use the new backend and wait for any issues. This PR adds the Cargo feature that enables the new backend in all fuzzing targets.
2021-03-25Bump pyyaml from 5.2 to 5.4 in /infra/build/functions (#5512)dependabot[bot]
Bumps [pyyaml](https://github.com/yaml/pyyaml) from 5.2 to 5.4. - [Release notes](https://github.com/yaml/pyyaml/releases) - [Changelog](https://github.com/yaml/pyyaml/blob/master/CHANGES) - [Commits](https://github.com/yaml/pyyaml/compare/5.2...5.4) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2021-03-25Bump pyyaml from 5.3.1 to 5.4 in /infra/ci (#5511)dependabot[bot]
Bumps [pyyaml](https://github.com/yaml/pyyaml) from 5.3.1 to 5.4. - [Release notes](https://github.com/yaml/pyyaml/releases) - [Changelog](https://github.com/yaml/pyyaml/blob/master/CHANGES) - [Commits](https://github.com/yaml/pyyaml/compare/5.3.1...5.4) Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2021-03-25projects/lxc: update mail addresses (#5510)Christian Brauner
The other two mail addresses are aliases and so we can't use them to access oss-fuzz. Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2021-03-25Clarify in the new project guide that pull_images may be needed for coverage ↵Stefan Bucur
runs. (#5506)
2021-03-25[ghostscript] Make stderr quiet to avoid excessive output. (#5502)Sebastian Rasmussen
2021-03-25[lxc] initial integration (#5498)Evgeny Vereshchagin
2021-03-25[jbig2dec] Improve custom allocator (#5503)Sebastian Rasmussen
Previously the allocator handled small pointer values incorrectly and prevented multiple executions (unexpectedly used when OSS-fuzz uses LSAN to look for memory leaks). More over there were cases where too large allocations were not caught and the allocator needlessly kept track of peak allocation statistics.
2021-03-25[ghostscript] Copy fuzzer glue code to dir outside of git repo (#5501)Sebastian Rasmussen
This makes it easier to build the fuzzer using a locally checked out git repo without having to manually copy the fuzzer glue code into the locally checked out git repo first.
2021-03-25[relic] Various improvements (#5500)Guido Vranken
- Enable i386 fuzzing - Enable more operations (Digest, HMAC, KDF_X963, ECC_ValidatePubkey) - Scope the calc operations in order to spend less time trying to run calculations not supported by relic - Compile Botan module in oracle mode: makes it more likely to find discrepancies
2021-03-25use the fuzz directory from nom's repository (#5499)Geoffroy Couprie
added in https://github.com/Geal/nom/commit/0a499cd123cca25bd48d243c0109147c7627f155
2021-03-25[wuffs] Don't build with -std=c99 (#5497)Nigel Tao
MAP_ANONYMOUS, getpagesize and strnlen do not mix with c99. Updates #32432 "wuffs: Fuzzing build failure"
2021-03-24Only remove `external/org_tensorflow` if it exists (#5494)Mihai Maruseac
This should fix coverage build broken again today. It seems that a recent change in TF toolchains removed the creation of `org_tensorflow` but it is likely that this change will be rolled back in the future. Hence, to keep OSSFuzz working, we conditionally remove this symlink.
2021-03-24qemu: disable honggfuzz fuzzing (#5489)Alexander Bulekov
We don't do any internal tests using honggfuzz, and our code is highly unlikely to work with honggfuzz in the current shape. All of the true-positive bugs seem to be libfuzzer bugs. Lets disable honggfuzz, to avoid wasting resources. We will try to get afl++ working, before taking another look at honggfuzz. Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
2021-03-24[vitess] Add maintainer (#5490)AdamKorcz
2021-03-24libfido2: change location of fuzz corpora (#5486)pedro martelletto