Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

infra: Roll OUR_LLVM_REVISION #11714

Merged
merged 90 commits into from
Apr 29, 2024
Merged

Commits on Jun 13, 2023

  1. Configuration menu
    Copy the full SHA
    d7624af View commit details
    Browse the repository at this point in the history
  2. Fix atheris install

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    e040cda View commit details
    Browse the repository at this point in the history
  3. try again

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    445af02 View commit details
    Browse the repository at this point in the history
  4. Fix i386 compilation

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    32cc42f View commit details
    Browse the repository at this point in the history
  5. Fix rust and python

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    f5c348a View commit details
    Browse the repository at this point in the history
  6. Fix atheris:

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    7c7b5fe View commit details
    Browse the repository at this point in the history
  7. fix

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    7426bbe View commit details
    Browse the repository at this point in the history
  8. Roll to clang 17

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    9734c6d View commit details
    Browse the repository at this point in the history
  9. fix

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    831a115 View commit details
    Browse the repository at this point in the history
  10. tmp

    jonathanmetzman committed Jun 13, 2023
    Configuration menu
    Copy the full SHA
    59acb96 View commit details
    Browse the repository at this point in the history

Commits on Feb 21, 2024

  1. Configuration menu
    Copy the full SHA
    9edffe3 View commit details
    Browse the repository at this point in the history
  2. 18

    jonathanmetzman committed Feb 21, 2024
    Configuration menu
    Copy the full SHA
    7cecde1 View commit details
    Browse the repository at this point in the history

Commits on Mar 5, 2024

  1. Fix

    jonathanmetzman committed Mar 5, 2024
    Configuration menu
    Copy the full SHA
    b572e75 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    af99d25 View commit details
    Browse the repository at this point in the history

Commits on Mar 18, 2024

  1. fixup

    maflcko committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    facb3da View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    99eb541 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    63ad15e View commit details
    Browse the repository at this point in the history
  4. infra: bump rust

    This reverts commit 54cf7a9.
    maflcko committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    73f101e View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    36cfd0d View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    497dbc7 View commit details
    Browse the repository at this point in the history
  7. infra: echo

    maflcko committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    1a37f77 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    6560eff View commit details
    Browse the repository at this point in the history
  9. Revert to 497dbc7

    maflcko committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    0371eb1 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    0e04b75 View commit details
    Browse the repository at this point in the history
  11. infra: echo

    maflcko committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    e8dece5 View commit details
    Browse the repository at this point in the history

Commits on Mar 19, 2024

  1. compiler-rt

    maflcko committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    1b5c0a9 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    ac94e64 View commit details
    Browse the repository at this point in the history
  3. i386

    maflcko committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    67511e4 View commit details
    Browse the repository at this point in the history

Commits on Mar 20, 2024

  1. Configuration menu
    Copy the full SHA
    e681e68 View commit details
    Browse the repository at this point in the history

Commits on Mar 25, 2024

  1. Configuration menu
    Copy the full SHA
    0fe67e0 View commit details
    Browse the repository at this point in the history

Commits on Mar 27, 2024

  1. Configuration menu
    Copy the full SHA
    d6a2a3e View commit details
    Browse the repository at this point in the history
  2. fix python fuzzing (take 2)

    maflcko committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    5f4bc6d View commit details
    Browse the repository at this point in the history

Commits on Mar 28, 2024

  1. Configuration menu
    Copy the full SHA
    a01baa6 View commit details
    Browse the repository at this point in the history
  2. pin more

    maflcko committed Mar 28, 2024
    Configuration menu
    Copy the full SHA
    f136d02 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    39fa5d7 View commit details
    Browse the repository at this point in the history

Commits on Mar 29, 2024

  1. Pin more

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    9ac77b2 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    dbc0a35 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    a51f59b View commit details
    Browse the repository at this point in the history
  4. Pin rust projects

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    cb50b3a View commit details
    Browse the repository at this point in the history
  5. Pin python projects

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    1431b42 View commit details
    Browse the repository at this point in the history
  6. Revert "Pin python projects"

    This reverts commit 1431b42.
    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    68ac6c7 View commit details
    Browse the repository at this point in the history
  7. Pin ffmpeg

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    31053b8 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    7add704 View commit details
    Browse the repository at this point in the history
  9. unlock projects again

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    a8f0448 View commit details
    Browse the repository at this point in the history
  10. unlock more projects

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    b0b3c5c View commit details
    Browse the repository at this point in the history
  11. infra: vla-cxx-extension

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    4b102bb View commit details
    Browse the repository at this point in the history
  12. unlock vla projects

    maflcko committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    e80d234 View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    61ade86 View commit details
    Browse the repository at this point in the history
  14. Configuration menu
    Copy the full SHA
    ac41c22 View commit details
    Browse the repository at this point in the history

Commits on Mar 30, 2024

  1. deprecated-declarations

    maflcko committed Mar 30, 2024
    Configuration menu
    Copy the full SHA
    77418cd View commit details
    Browse the repository at this point in the history
  2. re-pin still failing projects

    maflcko committed Mar 30, 2024
    Configuration menu
    Copy the full SHA
    c243fda View commit details
    Browse the repository at this point in the history

Commits on Apr 2, 2024

  1. Configuration menu
    Copy the full SHA
    730b595 View commit details
    Browse the repository at this point in the history
  2. pin libavif

    maflcko committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    83510f6 View commit details
    Browse the repository at this point in the history
  3. Pin projects due to ubsan function sanitizer

    Script used:
    
    echo "{'bearssl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-3815c669-5a8c-449d-a92e-144e7e8e883a.txt', 'cairo': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1b394519-7a63-47f0-b8be-ac045e46b363.txt', 'cpuinfo': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ccdf9b99-2b48-494d-b716-ec54777698be.txt', 'cpython3': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e2753a9c-b63d-49f9-9dfd-316c3646efcc.txt', 'cryptsetup': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e182ae09-9833-4c60-b035-19c22c202e27.txt', 'curl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-a392ed1b-34a1-42d2-8aae-ab5b959cb5c3.txt', 'dropbear': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-0402c0e3-ed52-40c1-b3e0-d72e7cd2278a.txt', 'fluent-bit': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-cba2f4cb-9717-41cd-af8b-470e404e56a6.txt', 'frr': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-b40f9ec0-020e-4b72-a3c2-84be311aeb89.txt', 'glib': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-a76134d4-8155-4568-aee6-2bec4d4f1466.txt', 'gpac': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-569f761e-7969-4bdf-8dea-c1ec6a0146b1.txt', 'gstreamer': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e872285e-7724-4c1e-a40b-977d31cb7737.txt', 'hdf5': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-265560b7-a6ad-49d8-bda2-2a254d3636a1.txt', 'igraph': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-44a5e01a-247d-4e0f-afe6-612ae0ebee6e.txt', 'immer': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-198f6b6a-fe05-4b6c-ba4b-46315bb2bbcd.txt', 'irssi': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e2d2480c-4e1b-4f25-bcc8-8a749de55171.txt', 'libavif': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e51e10cb-03ab-4672-b33b-d8e224d951ee.txt', 'libfido2': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1fd0add0-32d1-415f-b02f-ff17876f31bc.txt', 'libidn': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e7691127-1369-4f71-8790-d9009197dc2d.txt', 'libidn2': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-05d96571-d1a1-420d-9b9c-6445233079a3.txt', 'libspectre': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-a1bca425-733b-423a-be6e-8ae2824b6d43.txt', 'libtpms': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-8983ae1a-700e-4a16-9d99-b30c1243f47a.txt', 'mercurial': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-345f774f-c80d-4132-a499-6f92552676f0.txt', 'nss': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5929fa86-73cb-4d76-968e-bebc7ccbe4c6.txt', 'open62541': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1953d5b3-3f7e-49e4-86b7-59322535d980.txt', 'ostree': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5ef98ae2-6b5a-4f44-87fd-98fda2d3d109.txt', 'python3-libraries': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-9ced5789-ac45-4825-aa47-396bbaf99bdb.txt', 'rauc': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-f59923ed-6c8f-4c0a-93b2-9f52a1bd0016.txt', 'relic': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-96004083-bded-4bd0-91b8-dd99f4da4a55.txt', 'rtpproxy': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-c7132f6b-202a-459b-8bb1-a9709a06eea4.txt', 'sqlite3': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-aa5235c5-1eb6-4470-a1b4-2df7574848dd.txt', 'strongswan': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ba3e20ad-756a-4d48-b62a-c28fcad25c02.txt', 'tarantool': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-31be12ac-64ce-4e21-9a15-f55b9cf5484a.txt', 'vulnerable-project': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5ed7ebe3-994c-462d-90ac-0c2454d2777a.txt', 'wireshark': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1827fa8b-10a4-458c-b72f-4b795c6de077.txt', 'wuffs': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5aed25c4-0eb5-484d-93fb-7c7a75a18e34.txt', 'xnnpack': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5e8e3d06-1982-409e-8f3c-7d3ec27babf6.txt', 'xs': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-4e311ea4-e54e-407d-aa22-e8f4c6b37785.txt', 'yara': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-74a4892e-f801-404a-9199-7416d047d2af.txt', 'cmake': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-0bebc9b6-6be4-40e0-b679-a7ba57c7a4e5.txt', 'dovecot': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-22314291-95a3-48bd-a929-8c46bbecd4dc.txt', 'libpsl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-51ee4fc9-b7ef-48ef-9c66-1611f5ac22ee.txt', 'libvips': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-086fa696-8a2f-43a1-9ca1-ace22fe44e89.txt', 'openssl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-b8698b9e-195c-400d-9af3-58e8b855d90b.txt', 'qemu': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-f40e739c-1bb9-4415-b7f8-4bcdf212bd6a.txt', 'tor': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1b66c448-cbbe-455c-98bc-21bcc01b907d.txt', 'libyal': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ef5aa10b-44fb-4613-945c-3aee149d4511.txt' }" | tr "'" '"' | jq -r 'to_entries[] | .key as $key | .value as $url | [$key, $url] | @TSV'  | while IFS=$'\t' read -r key url; do echo "$key $url" && curl -s "$url" | grep -q "through pointer to incorrect function type" && sed --regexp-extended -i 's/base-builder$/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e  # Pin due to ubsan: call to function _ through pointer to incorrect function type/g' ./projects/$( echo $key          )/Dockerfile ; done
    maflcko committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    3900a29 View commit details
    Browse the repository at this point in the history
  4. formatting

    maflcko committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    77e2416 View commit details
    Browse the repository at this point in the history
  5. Pin gdal due to 32-bit issue

    maflcko committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    05f9912 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    8411086 View commit details
    Browse the repository at this point in the history

Commits on Apr 3, 2024

  1. Configuration menu
    Copy the full SHA
    6fbacb2 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    5fe9a77 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    21d3761 View commit details
    Browse the repository at this point in the history

Commits on Apr 4, 2024

  1. Configuration menu
    Copy the full SHA
    fd20335 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    488a9eb View commit details
    Browse the repository at this point in the history
  3. int-conversion + envoy

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    a440a47 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    a996285 View commit details
    Browse the repository at this point in the history
  5. grpc-httpjson-transcoding: Pin due to /usr/bin/ld.gold: warning: Cann…

    …ot export local symbol '__asan_extra_spill_area'
    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    a996f20 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    44c695d View commit details
    Browse the repository at this point in the history
  7. Pin 32-bit build failures

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    ac95179 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    1fa5335 View commit details
    Browse the repository at this point in the history
  9. enum-constexpr-conversion

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    d083d8b View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    659d1e6 View commit details
    Browse the repository at this point in the history
  11. pin hdf5 due to dwarf error

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    8a14a29 View commit details
    Browse the repository at this point in the history
  12. UBSAN_CALLS_THRESHOLD_FOR_UBSAN_BUILD=168

    I determined the value via:
    
    $ python infra/helper.py check_build --sanitizer undefined --engine libfuzzer --architecture x86_64 vulnerable-project
    
    INFO:__main__:Running: docker run --rm --privileged --shm-size=2g --platform linux/amd64 -i -e FUZZING_ENGINE=libfuzzer -e SANITIZER=undefined -e ARCHITECTURE=x86_64 -e FUZZING_LANGUAGE=c++ -e HELPER=True -v /root/oss-fuzz/build/out/vulnerable-project:/out -t gcr.io/oss-fuzz-base/base-runner test_all.py.
    INFO: performing bad build checks for /tmp/not-out/tmpscntlbk6/vulnerable
    Retrying failed fuzz targets sequentially 1
    INFO: performing bad build checks for /tmp/not-out/tmpscntlbk6/vulnerable
    Broken fuzz targets 1
    ('/tmp/not-out/tmpscntlbk6/vulnerable', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpscntlbk6/vulnerable'], returncode=1, stdout=b'BAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable seems to have only partial coverage instrumentation.\nBAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable does not seem to be compiled with UBSan.\n', stderr=b"+ MIN_NUMBER_OF_RUNS=4\n+ THRESHOLD_FOR_NUMBER_OF_EDGES=100\n+ THRESHOLD_FOR_NUMBER_OF_FUNCTIONS=2\n+ ASAN_CALLS_THRESHOLD_FOR_ASAN_BUILD=1000\n+ ASAN_CALLS_THRESHOLD_FOR_NON_ASAN_BUILD=0\n+ DFSAN_CALLS_THRESHOLD_FOR_DFSAN_BUILD=100\n+ DFSAN_CALLS_THRESHOLD_FOR_NON_DFSAN_BUILD=0\n+ MSAN_CALLS_THRESHOLD_FOR_MSAN_BUILD=1000\n+ MSAN_CALLS_THRESHOLD_FOR_NON_MSAN_BUILD=3\n+ UBSAN_CALLS_THRESHOLD_FOR_UBSAN_BUILD=169\n+ UBSAN_CALLS_THRESHOLD_FOR_NON_UBSAN_BUILD=200\n+ [[ x86_64 == \\i\\3\\8\\6 ]]\n+ '[' 1 -ne 1 -a 1 -ne 2 ']'\n+ FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable\n+ AUXILIARY_FUZZER=\n+ main /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable\n+ local AUXILIARY_FUZZER=\n+ local checks_failed=0\n+ local result=0\n+ export RUN_FUZZER_MODE=batch\n+ RUN_FUZZER_MODE=batch\n+ check_engine /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable\n++ basename /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER_NAME=vulnerable\n+ local FUZZER_OUTPUT=/tmp/vulnerable.output\n+ local CHECK_FAILED=0\n+ [[ libfuzzer == libfuzzer ]]\n+ /tmp/not-out/tmpscntlbk6/vulnerable -seed=1337 -runs=4\n++ egrep 'ERROR: no interesting inputs were found. Is the code instrumented' -c /tmp/vulnerable.output\n+ CHECK_FAILED=0\n+ ((  0 > 0  ))\n++ grep -Po 'INFO: Loaded [[:digit:]]+ module.*\\(.*(counters|guards)\\):[[:space:]]+\\K[[:digit:]]+' /tmp/vulnerable.output\n+ local NUMBER_OF_EDGES=18\n+ [[ -z 18 ]]\n+ ((  18 < 100  ))\n+ echo 'BAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable seems to have only partial coverage instrumentation.'\n+ return 0\n+ result=0\n+ checks_failed=0\n+ check_architecture /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable\n++ basename /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER_NAME=vulnerable\n+ '[' c++ = jvm ']'\n+ '[' c++ = javascript ']'\n+ '[' c++ = python ']'\n+ [[ /tmp/not-out/tmpscntlbk6/vulnerable == *\\@* ]]\n++ file /tmp/not-out/tmpscntlbk6/vulnerable\n+ FILE_OUTPUT='/tmp/not-out/tmpscntlbk6/vulnerable: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, with debug_info, not stripped'\n+ [[ x86_64 == \\x\\8\\6\\_\\6\\4 ]]\n+ echo /tmp/not-out/tmpscntlbk6/vulnerable: ELF 64-bit LSB shared object, x86-64, version 1 '(SYSV),' dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, with debug_info, not stripped\n+ grep x86-64\n+ result=0\n+ [[ 0 != 0 ]]\n+ return 0\n+ result=0\n+ checks_failed=0\n+ [[ libfuzzer == centipede ]]\n+ check_mixed_sanitizers /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable\n+ local result=0\n+ local CALL_INSN=\n+ '[' c++ = jvm ']'\n+ '[' c++ = javascript ']'\n+ '[' c++ = python ']'\n+ [[ /tmp/not-out/tmpscntlbk6/vulnerable == *\\@* ]]\n+ CALL_INSN=\n+ [[ x86_64 == \\x\\8\\6\\_\\6\\4 ]]\n+ CALL_INSN='callq?\\s+[0-9a-f]+\\s+<'\n++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable\n++ egrep 'callq?\\s+[0-9a-f]+\\s+<__asan' -c\n+ local ASAN_CALLS=0\n++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable\n++ egrep 'callq?\\s+[0-9a-f]+\\s+<__dfsan' -c\n+ local DFSAN_CALLS=0\n++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable\n++ egrep 'callq?\\s+[0-9a-f]+\\s+<__msan' -c\n+ local MSAN_CALLS=0\n++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable\n++ egrep 'callq?\\s+[0-9a-f]+\\s+<__ubsan' -c\n+ local UBSAN_CALLS=168\n+ [[ undefined = address ]]\n+ [[ undefined = dataflow ]]\n+ [[ undefined = memory ]]\n+ [[ undefined = undefined ]]\n+ check_ubsan_build /tmp/not-out/tmpscntlbk6/vulnerable 0 0 0 168\n+ local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable\n+ local ASAN_CALLS=0\n+ local DFSAN_CALLS=0\n+ local MSAN_CALLS=0\n+ local UBSAN_CALLS=168\n+ [[ libfuzzer != libfuzzer ]]\n+ ((  0 > 0  ))\n+ ((  0 > 0  ))\n+ ((  0 > 3  ))\n+ ((  168 < 169  ))\n+ echo 'BAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable does not seem to be compiled with UBSan.'\n+ return 1\n+ result=1\n+ return 1\n+ result=1\n+ checks_failed=1\n+ check_startup_crash /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable\n++ basename /tmp/not-out/tmpscntlbk6/vulnerable\n+ local FUZZER_NAME=vulnerable\n+ local FUZZER_OUTPUT=/tmp/vulnerable.output\n+ local CHECK_PASSED=0\n+ [[ libfuzzer = libfuzzer ]]\n+ SKIP_SEED_CORPUS=1\n+ run_fuzzer vulnerable -seed=1337 -runs=4\n++ egrep 'Done 4 runs' -c /tmp/vulnerable.output\n+ CHECK_PASSED=1\n+ '[' 1 -eq 0 ']'\n+ return 0\n+ result=0\n+ checks_failed=1\n+ return 1\n+ exit 1\n"))
    BAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable seems to have only partial coverage instrumentation.
    BAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable does not seem to be compiled with UBSan.
    + MIN_NUMBER_OF_RUNS=4
    + THRESHOLD_FOR_NUMBER_OF_EDGES=100
    + THRESHOLD_FOR_NUMBER_OF_FUNCTIONS=2
    + ASAN_CALLS_THRESHOLD_FOR_ASAN_BUILD=1000
    + ASAN_CALLS_THRESHOLD_FOR_NON_ASAN_BUILD=0
    + DFSAN_CALLS_THRESHOLD_FOR_DFSAN_BUILD=100
    + DFSAN_CALLS_THRESHOLD_FOR_NON_DFSAN_BUILD=0
    + MSAN_CALLS_THRESHOLD_FOR_MSAN_BUILD=1000
    + MSAN_CALLS_THRESHOLD_FOR_NON_MSAN_BUILD=3
    + UBSAN_CALLS_THRESHOLD_FOR_UBSAN_BUILD=169
    + UBSAN_CALLS_THRESHOLD_FOR_NON_UBSAN_BUILD=200
    + [[ x86_64 == \i\3\8\6 ]]
    + '[' 1 -ne 1 -a 1 -ne 2 ']'
    + FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable
    + AUXILIARY_FUZZER=
    + main /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable
    + local AUXILIARY_FUZZER=
    + local checks_failed=0
    + local result=0
    + export RUN_FUZZER_MODE=batch
    + RUN_FUZZER_MODE=batch
    + check_engine /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable
    ++ basename /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER_NAME=vulnerable
    + local FUZZER_OUTPUT=/tmp/vulnerable.output
    + local CHECK_FAILED=0
    + [[ libfuzzer == libfuzzer ]]
    + /tmp/not-out/tmpscntlbk6/vulnerable -seed=1337 -runs=4
    ++ egrep 'ERROR: no interesting inputs were found. Is the code instrumented' -c /tmp/vulnerable.output
    + CHECK_FAILED=0
    + ((  0 > 0  ))
    ++ grep -Po 'INFO: Loaded [[:digit:]]+ module.*\(.*(counters|guards)\):[[:space:]]+\K[[:digit:]]+' /tmp/vulnerable.output
    + local NUMBER_OF_EDGES=18
    + [[ -z 18 ]]
    + ((  18 < 100  ))
    + echo 'BAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable seems to have only partial coverage instrumentation.'
    + return 0
    + result=0
    + checks_failed=0
    + check_architecture /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable
    ++ basename /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER_NAME=vulnerable
    + '[' c++ = jvm ']'
    + '[' c++ = javascript ']'
    + '[' c++ = python ']'
    + [[ /tmp/not-out/tmpscntlbk6/vulnerable == *\@* ]]
    ++ file /tmp/not-out/tmpscntlbk6/vulnerable
    + FILE_OUTPUT='/tmp/not-out/tmpscntlbk6/vulnerable: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, with debug_info, not stripped'
    + [[ x86_64 == \x\8\6\_\6\4 ]]
    + echo /tmp/not-out/tmpscntlbk6/vulnerable: ELF 64-bit LSB shared object, x86-64, version 1 '(SYSV),' dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, with debug_info, not stripped
    + grep x86-64
    + result=0
    + [[ 0 != 0 ]]
    + return 0
    + result=0
    + checks_failed=0
    + [[ libfuzzer == centipede ]]
    + check_mixed_sanitizers /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable
    + local result=0
    + local CALL_INSN=
    + '[' c++ = jvm ']'
    + '[' c++ = javascript ']'
    + '[' c++ = python ']'
    + [[ /tmp/not-out/tmpscntlbk6/vulnerable == *\@* ]]
    + CALL_INSN=
    + [[ x86_64 == \x\8\6\_\6\4 ]]
    + CALL_INSN='callq?\s+[0-9a-f]+\s+<'
    ++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable
    ++ egrep 'callq?\s+[0-9a-f]+\s+<__asan' -c
    + local ASAN_CALLS=0
    ++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable
    ++ egrep 'callq?\s+[0-9a-f]+\s+<__dfsan' -c
    + local DFSAN_CALLS=0
    ++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable
    ++ egrep 'callq?\s+[0-9a-f]+\s+<__msan' -c
    + local MSAN_CALLS=0
    ++ objdump -dC /tmp/not-out/tmpscntlbk6/vulnerable
    ++ egrep 'callq?\s+[0-9a-f]+\s+<__ubsan' -c
    + local UBSAN_CALLS=168
    + [[ undefined = address ]]
    + [[ undefined = dataflow ]]
    + [[ undefined = memory ]]
    + [[ undefined = undefined ]]
    + check_ubsan_build /tmp/not-out/tmpscntlbk6/vulnerable 0 0 0 168
    + local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable
    + local ASAN_CALLS=0
    + local DFSAN_CALLS=0
    + local MSAN_CALLS=0
    + local UBSAN_CALLS=168
    + [[ libfuzzer != libfuzzer ]]
    + ((  0 > 0  ))
    + ((  0 > 0  ))
    + ((  0 > 3  ))
    + ((  168 < 169  ))
    + echo 'BAD BUILD: /tmp/not-out/tmpscntlbk6/vulnerable does not seem to be compiled with UBSan.'
    + return 1
    + result=1
    + return 1
    + result=1
    + checks_failed=1
    + check_startup_crash /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER=/tmp/not-out/tmpscntlbk6/vulnerable
    ++ basename /tmp/not-out/tmpscntlbk6/vulnerable
    + local FUZZER_NAME=vulnerable
    + local FUZZER_OUTPUT=/tmp/vulnerable.output
    + local CHECK_PASSED=0
    + [[ libfuzzer = libfuzzer ]]
    + SKIP_SEED_CORPUS=1
    + run_fuzzer vulnerable -seed=1337 -runs=4
    ++ egrep 'Done 4 runs' -c /tmp/vulnerable.output
    + CHECK_PASSED=1
    + '[' 1 -eq 0 ']'
    + return 0
    + result=0
    + checks_failed=1
    + return 1
    + exit 1
    
    ERROR: 100.0% of fuzz targets seem to be broken. See the list above for a detailed information.
    ERROR:__main__:Check build failed.
    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    601eb97 View commit details
    Browse the repository at this point in the history
  13. unpin projects

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    32fee35 View commit details
    Browse the repository at this point in the history
  14. Revert "unpin projects"

    This reverts commit 32fee35.
    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    1614e2f View commit details
    Browse the repository at this point in the history
  15. Disable failing msan

    echo "{ 'ampproject': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-0aba63af-f97f-4267-8037-4ef20255b019.txt', 'aptos-core': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-f085c889-9df6-476f-ab27-5d736e165a4f.txt', 'arrow': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-f1f5e465-98a5-45a8-b374-393fdf0d0d60.txt', 'bignum-fuzzer': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-6083635a-3f72-444d-80ef-3a0a26670cf7.txt', 'bitcoin-core': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-8908958a-ccd9-4b5d-a7bb-2ee531a55c24.txt', 'boost': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-9aa4122e-6abc-4a63-a4a9-7b63640e31b4.txt', 'boost-json': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1be5ef3e-0b29-497f-ac3e-767f93c5fac6.txt', 'brunsli': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-f5583c45-faa2-44d4-8b2f-b27e83c25588.txt', 'croaring': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-12b78d7a-4346-47d6-8109-5ede78fbad38.txt', 'crosvm': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-77751e82-3e71-48f6-b2f4-ae727b2d57ff.txt', 'cryptofuzz': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-8bc8a5ea-9bfb-421d-bfe9-911828e88741.txt', 'cryptsetup': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-bf77a9dc-080e-4e3b-ba89-cbaf65a54e61.txt', 'envoy': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-0d20bf28-2a86-4569-b3f6-9fe3a982fe55.txt', 'flatbuffers': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-95e0163b-a2c5-4cfe-8e1f-dcf521c125e0.txt', 'fluent-bit': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-44e092bc-a17c-4c70-b928-0dfacfd522e5.txt', 'freeimage': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-d6661966-7581-45a3-a739-3b734c78e114.txt', 'gdk-pixbuf': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5c1309be-0911-41bf-9367-6c0686584aa8.txt', 'gnutls': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-b6399aa9-b7ba-494d-a317-fa86968f9bff.txt', 'grpc-httpjson-transcoding': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-c5d9348a-50d6-4d1f-9a7f-62f3b74bfde7.txt', 'grpc-swift': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-a546b7f5-8b9b-4ab3-ba73-96b939205528.txt', 'gstreamer': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5294bfca-5896-4a62-b503-a41214d786dd.txt', 'hadoop': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-7adf92a8-e2d7-4f1c-8f23-9f811a8351f7.txt', 'hdf5': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5ba8ebd3-3686-4fe7-a0b5-6d7e03bfcba6.txt', 'hunspell': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-46e640a5-de1c-4dcf-9812-d4f69c75dbbb.txt', 'jansi': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-c159725b-77cd-469b-841e-54d17291eba2.txt', 'jettison': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-bd1a6d19-e1ec-4944-a8fc-53fe0d982bb3.txt', 'json': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-2934fed0-ecd0-4bd9-800d-872b35e844e9.txt', 'kimageformats': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5d0f6c23-845b-4a89-bc62-184b3eec4ffc.txt', 'knot-dns': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-502f58fd-d62b-4f42-b7c7-1878cd4df1d6.txt', 'leveldb': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ae7a114e-6410-4bfb-a444-a068bdc9cc1c.txt', 'libavif': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ffe75b3d-0f1a-48c5-b687-c9b47e2bf24b.txt', 'libecc': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-bca72181-cfb2-4b2f-98f1-c2addee0aa4b.txt', 'libfido2': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-64f6f45d-a700-42a0-9675-31f43e230e10.txt', 'libressl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-db180642-1ff0-4223-91e6-3bf060adb174.txt', 'libultrahdr': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-c0b4a952-1726-4be3-9260-c4f9dd8c8550.txt', 'lua': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e39e53e2-ce13-4754-8218-7048a5e4b736.txt', 'migtd': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-bccc5bba-c976-4fb7-a98c-2359d6a37835.txt', 'monero': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-b7f4c92c-91cb-4398-bd3d-212ec2765e8f.txt', 'mongoose': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-57ef8651-c8bf-44d2-a44e-d4385844837d.txt', 'msquic': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-494c9b6f-f4a2-4a88-b82c-3b4182c6e420.txt', 'nettle': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e701b6fa-f3a0-414e-ad6e-0223e6d42ebd.txt', 'oak': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-9d32da56-cbed-47a9-9f2b-0ec927aee64d.txt', 'opennavsurf-bag': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ba0d87bd-a741-4415-8fc3-c96fd151be8c.txt', 'pcapplusplus': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1f13ef0f-0037-49c3-8d80-9b784f8f7589.txt', 'pcl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ab5a2af3-714a-4128-8592-c303aeb944ef.txt', 'php': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-d696e7e3-3995-4587-93d5-6a3a495c6c73.txt', 'powerdns': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-dd90b3cd-8abf-4d26-a9ef-671a3bcf4920.txt', 'proj4': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-3a3f7406-cea8-46d5-b14d-c8aaaa84f986.txt', 'quantlib': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-2062da72-afc5-4418-95cf-b6c94927069e.txt', 'rdf4j': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-5da37707-012d-465e-9c78-174db950ac7b.txt', 'readstat': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-8025367d-cb2c-4438-8da4-3be282b66587.txt', 'relic': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-0f11d5c7-bf6c-440f-8861-48c1ba79f4de.txt', 'rome': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-da74a231-d1ec-4c39-8ce7-604ffbee279c.txt', 'rust-lexical': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ed12eb54-79ed-4cf3-ae69-b67bf3172051.txt', 's2geometry': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-d1550028-db2f-45ad-b9fa-da7c127c6954.txt', 'samba': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-eacc567d-7953-477c-9d22-22577a6eb478.txt', 'scipy': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-92c55d73-3f1e-428e-87f8-7defdcd6578c.txt', 'sketches-core': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-e0084fb2-a510-446c-b0cd-6ed9ebc1096e.txt', 'solidity': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-df8ad50b-0615-43ea-bfcd-c1c90874b34a.txt', 'spdm-rs': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-822fb40f-23ac-4d78-ace4-a22d9b04f1cf.txt', 'spicy': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-6cd32221-5444-4290-8dc7-b46a0b1c9c93.txt', 'spirv-tools': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-8e0fc9d7-ba92-4454-94f7-93c4223a30a6.txt', 'suricata': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-766d7f55-0523-4760-be0c-6c2d7f59dedd.txt', 'swift-nio': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-9bfb5d86-d255-46a4-aa84-debc07d954f1.txt', 'swift-protobuf': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-b9133259-ee38-4663-ad70-a5fe86f6e297.txt', 'tablesaw': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-2bb65e8d-cc74-410f-9c75-7ea80f1ad3d1.txt', 'tarantool': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-ca19c0f1-4c14-46e6-8629-dae0a2a1a64c.txt', 'td-shim': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-16ae04d2-83cf-41bd-a4be-f2b4ec52d0e9.txt', 'tinyusb': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-417021a1-ef19-4f88-acce-76bce0af28a7.txt', 'tungstenite-rs': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-be892186-bfeb-46c0-b93a-fe1c9b48646d.txt', 'unrar': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-0e63ea12-6919-4452-a96c-7dbe4c9811ae.txt', 'vtpm-td': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-cc350fb4-1db5-4ed2-8599-39472ca468e4.txt', 'vulnerable-project': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-73b3949a-af4d-405f-a61d-ef8bcedf878f.txt', 'wpantund': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-a0035ad8-8815-4a94-9a6a-825e52efc7dd.txt', 'xnu': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-779a6d10-e7f1-4feb-a108-1e53e6842c14.txt', 'frr': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-578d5cfd-98af-4f99-81cd-dba1f9849c8c.txt', 'libigl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-1fb2e80c-1d08-443f-947d-57fde65a721f.txt', 'orbit': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-fb01fb49-2057-41b4-b4fb-6c684cbf5c52.txt', 'thrift': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-8f1934bf-9b56-46b2-b7d5-f872e92a1342.txt', 'undertow': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-fee1aabb-f60a-4a33-a96c-77328e965b34.txt', 'bearssl': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-86a9ca7b-98e8-4e7e-a138-16d4acacc17f.txt', 'bls-signatures': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-3cd81ff0-7552-4e87-973e-ff5da4520ad5.txt', 'exprtk': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-fbecbadc-e426-46cb-b2fc-be9012b5f1be.txt', 'libass': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-513ca43e-8181-4b8a-941f-3097e3969cc5.txt', 'poppler': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-f0a61dd9-892d-4284-a61b-2546c6628b91.txt', 'wasmer': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-eea663ee-fc5f-4572-90f9-a5c327e6aa4c.txt', 'gdal': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-70e475c5-67ca-468d-9f14-cae4fae694f3.txt', 'skia': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-8aacfca6-c946-4753-a977-d836fc3e334f.txt', 'imagemagick': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-b070b9c3-fcf2-4220-84f7-a99937964cc5.txt', 'graphicsmagick': 'https://oss-fuzz-gcb-logs.storage.googleapis.com/log-17b7b4f4-53de-4bd7-878c-d1240f276016.txt' }" | tr "'" '"' | jq -r 'to_entries[] | .key as $key | .value as $url | [$key, $url] | @TSV'  | while IFS=$'\t' read -r key url; do curl -s "$url" | grep -q "build_fuzzers --sanitizer memory --engine libfuzzer --architecture x86_64" &&  echo "msan $key $value" && sed --regexp-extended -i "$(echo "s|- memory|# - memory ## msan disabled after a clang bump. Please re-enable it, Try to fix any build warnings and build errors, as well as msan runtime warnings and errors. msan failure log: $url|g" )" ./projects/$( echo $key          )/project.yaml     ; done
    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    0f72c7f View commit details
    Browse the repository at this point in the history
  16. format

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    53d96ab View commit details
    Browse the repository at this point in the history
  17. Pin afl link errors

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    5e168fe View commit details
    Browse the repository at this point in the history
  18. Add comment about the pin

    maflcko committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    27148ba View commit details
    Browse the repository at this point in the history

Commits on Apr 5, 2024

  1. Configuration menu
    Copy the full SHA
    5b56d71 View commit details
    Browse the repository at this point in the history

Commits on Apr 9, 2024

  1. Configuration menu
    Copy the full SHA
    7271062 View commit details
    Browse the repository at this point in the history

Commits on Apr 10, 2024

  1. Roll clang to a previous 18-trunk to allow the coverage build for pin…

    …ned projects
    
    Taken from:
    
     commit 5c46fabf81887bcf9e6292551e38b8d0fd03548f
     Author: Hans Wennborg <[email protected]>
     Date:   Fri Sep 8 18:38:56 2023 +0000
    
         Roll clang llvmorg-17-init-16420-g0c545a44-8 : llvmorg-18-init-4631-gd50b56d1-1 (skipping rust)
    
         https://chromium.googlesource.com/external/github.com/llvm/llvm-project/+log/0c545a44..d50b56d1
    
         Ran: ./tools/clang/scripts/upload_revision.py d50b56d18c96e0ce462d7236eb268c54098cbaf9
    
         Bug: 1472655
         Change-Id: I4a97764a8d5680f4a500d5f7e0e42438eb01381c
         Disable-Rts: True
         Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/4852899
         Reviewed-by: Nico Weber <[email protected]>
         Commit-Queue: Hans Wennborg <[email protected]>
         Reviewed-by: danakj <[email protected]>
         Cr-Commit-Position: refs/heads/main@{#1194242}
         NOKEYCHECK=True
         GitOrigin-RevId: 7c883a7eae94d250ba0ee14e152968fa68e76720
    maflcko committed Apr 10, 2024
    Configuration menu
    Copy the full SHA
    7977bcd View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    314d7d9 View commit details
    Browse the repository at this point in the history

Commits on Apr 12, 2024

  1. Configuration menu
    Copy the full SHA
    672117a View commit details
    Browse the repository at this point in the history

Commits on Apr 15, 2024

  1. Configuration menu
    Copy the full SHA
    e2fffee View commit details
    Browse the repository at this point in the history

Commits on Apr 17, 2024

  1. Revert "infra: bump rust"

    This reverts commit 73f101e.
    
    This is required, because the llvm version in oss-fuzz has been
    downgraded to before the coverage raw profile version bump. However,
    rust is using a more recent llvm version after the raw profile version
    bump.
    
    Restore the current pin, which can then be removed once all projects are
    unpinned, and the oss-fuzz clang version has been bumped again.
    maflcko committed Apr 17, 2024
    Configuration menu
    Copy the full SHA
    2a40864 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    cf1c790 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    767c7d3 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    321ebca View commit details
    Browse the repository at this point in the history

Commits on Apr 29, 2024

  1. Configuration menu
    Copy the full SHA
    c6a6d86 View commit details
    Browse the repository at this point in the history
  2. projects: Two small fixups

    maflcko committed Apr 29, 2024
    Configuration menu
    Copy the full SHA
    cdd10ad View commit details
    Browse the repository at this point in the history