Age | Commit message (Collapse) | Author |
|
mainline-extservices-release
Change-Id: Iede44eb9ed4213478bb18252ddc50f91bf9dcfe2
|
|
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/oss-fuzz/+/18059556
Change-Id: I67370c442389d1e4c5547d778b49791c8fc1c149
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
mainline-extservices-release
Change-Id: Ia435b6c13f16ae6743022bf70d2c4f332a1a46d1
|
|
If we statically link ldac, we enforce at build time the "api" are still
the same. We also enforce the current module version was tested against
a known ldac encoder and we do not have to deal with version mismatched
Bug: 226572369
Test: Build + boot + Not yet tested
Tag: #refactor
Ignore-AOSP-First: Apex only on TM
Merged-In: I69970a4bd5f6cbe5064b0be447ffcc8892e875a4
Change-Id: I69970a4bd5f6cbe5064b0be447ffcc8892e875a4
|
|
am: 83853d5c3c am: c85b7e55ec am: 771bcd4878 am: 99d4aa6a8d
Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1854493
Change-Id: Ic78475bc2c8df766f7eb8b128191f402573fbb91
|
|
am: 83853d5c3c am: c85b7e55ec am: 771bcd4878
Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1854493
Change-Id: I19b73b74ac475ff8cb9f4be6a260564d97fac5bc
|
|
am: 83853d5c3c am: c85b7e55ec
Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1854493
Change-Id: Ic3e07737fb49199dc2c3d37f810a7588098df3e9
|
|
am: 83853d5c3c
Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1854493
Change-Id: Ib651a9289868094de89fab8703ea57b3bbd6720c
|
|
Original change: https://android-review.googlesource.com/c/platform/external/oss-fuzz/+/1854493
Change-Id: If3c3af15f08f7f3028c21434c0f702c7918a43e9
|
|
Test: make
Change-Id: Ib2733efe65798b72a56aa5db61992b878b4c6be1
|
|
|
|
Enable fuzzing of QUIC traffic.
|
|
* Run multiple jobs/workers by setting env vars
```bash
$ infra/base-images/all.sh
$ python3 infra/helper.py run_fuzzer -e N_JOBS=4 -e N_WORKERS=4 --engine $ENGINE $PROJECT_NAME $FUZZ_TARGET
```
* Switched from N_JOBS/WORKERS to FUZZER_EXTRA_ARGS
* Added hashicorp/hcl/hclsyntax fuzzers
* Getting rid of FUZZER_EXTRA_ARGS
|
|
|
|
so can automatically update it as needed without churn at oss-fuzz side
|
|
This complements the function-jit fuzzer and tests the default
JIT configuration.
|
|
|
|
|
|
|
|
Don't delete unaffected fuzzers and don't do bad build check.
|
|
|
|
The mbstring fuzzer is really a fuzzer for the oniguruma library
through the PHP mbregex extension. This was important at the time
as the upstream oniguruma project did not have fuzzing and we were
bundling the library (and thus responsible for security backports).
Nowadays we no longer bundle this library and the upstream project
does their own fuzzing, including integration with oss-fuzz:
https://github.com/google/oss-fuzz/tree/master/projects/oniguruma
I haven't really done anything with reports from this fuzzer in a
long time, as issues get addressed upstream. As such, I think it's
safe to drop it on the PHP side.
|
|
|
|
* opensips: initial integration.
* opensips: include primary contact
|
|
* tint: add SPIRV-Tools fuzzers
* Fix script.
* Move to release builds.
* Reduce the number of targets that are built in CI.
|
|
* postgresql: fix build
* update PostgresMain params
* use PostgresSingle following updates in postgres
* postgresql tmp fix
* fix build
|
|
|
|
|
|
|
|
|
|
* Improves suricata corpus for one target
* suricata: use now sancov-module
* Better rust flags for suricata
|
|
Say path doesn't exist instead of the last directory in path.
Fixes: https://github.com/google/oss-fuzz/issues/6528
|
|
Also clean up the external action definitions:
- Set default values for the storage repo branches.
- Remove storage repo options from build_fuzzers.
|
|
Delete our python implementation which appears buggy and will be annoying to maintain.
Fixes: https://github.com/google/oss-fuzz/issues/6526
|
|
|
|
Fixes: #6525
Depends on: #6530
|
|
We will use this to upload artifacts in the future.
|
|
|
|
A printed message after bisection should be different depending on the bisection type
|
|
a bug). (#6549)
|
|
|
|
|
|
Sudo does not link executables using CFLAGS, only LDFLAGS.
When building with UBSan, the compiler warns that the object size
sanitizer has no effect at -O0 but is explicitly enabled.
|
|
Otherwise incomplete builds may be uploaded.
Fixes: https://github.com/google/oss-fuzz/issues/6529
Related: https://github.com/google/oss-fuzz/issues/6525
|
|
Fixes: #6527
|
|
* suricata: default rules in out directory
to be used as config by a dedicated target
* Adding a corpus and a dictionary to the next suricata fuzz target
|
|
This makes kfm@google.com the primary contact and allows access for some
more protobuf team members.
|
|
|
|
* [infra] Add block listed target name logic from ClusterFuzz
|
|
|