Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[muparser] initial integration #3814

Merged
merged 9 commits into from
Jun 1, 2020
Merged

Conversation

zchcai
Copy link
Contributor

@zchcai zchcai commented May 15, 2020

  1. provide one fuzz target example
  2. still waiting for primary contact reply ([email protected]), here is the created outreach issue

Zhicheng Cai added 2 commits May 15, 2020 00:07
Copy link
Collaborator

@inferno-chromium inferno-chromium left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM with minor changes, lets try to subsitute [email protected] with developer email. We can then land.

projects/muparser/set_eval_fuzzer.cc Outdated Show resolved Hide resolved
projects/muparser/set_eval_fuzzer.cc Show resolved Hide resolved
projects/muparser/set_eval_fuzzer.cc Show resolved Hide resolved
projects/muparser/build.sh Outdated Show resolved Hide resolved
projects/muparser/Dockerfile Outdated Show resolved Hide resolved
@TravisBuddy
Copy link

Travis tests have failed

Hey @zchcai,
Please read the following log in order to understand the failure reason.
It'll be awesome if you fix what's wrong and commit the changes.

1st Build

View build log

./infra/travis/travis_build.py
Building project muparser
Running command: python /home/travis/build/google/oss-fuzz/infra/helper.py build_fuzzers muparser --engine libfuzzer --sanitizer memory --architecture x86_64
Running: docker build -t gcr.io/oss-fuzz/muparser projects/muparser

Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder
latest: Pulling from oss-fuzz-base/base-builder




















Digest: sha256:71d86abccfaaec992a490826330998eb2f6f77853dc4e90dd5b26be908349367
Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest
 ---> eba515724a33
Step 2/6 : RUN apt-get update && apt-get install -y make autoconf automake libtool
 ---> Running in 1d63c299ec30
Hit:1 http://archive.ubuntu.com/ubuntu xenial InRelease
Get:2 http://security.ubuntu.com/ubuntu xenial-security InRelease [109 kB]
Get:3 http://archive.ubuntu.com/ubuntu xenial-updates InRelease [109 kB]
Get:4 http://security.ubuntu.com/ubuntu xenial-security/main amd64 Packages [1104 kB]
Get:5 http://archive.ubuntu.com/ubuntu xenial-backports InRelease [107 kB]
Get:6 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 Packages [1471 kB]
Fetched 2901 kB in 1s (2271 kB/s)
Reading package lists...
Reading package lists...
Building dependency tree...
Reading state information...
make is already the newest version (4.1-6).
The following additional packages will be installed:
  autotools-dev libltdl-dev libltdl7 libsigsegv2 m4
Suggested packages:
  autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran
  | fortran95-compiler gcj-jdk
The following NEW packages will be installed:
  autoconf automake autotools-dev libltdl-dev libltdl7 libsigsegv2 libtool m4
0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded.
Need to get 1472 kB of archives.
After this operation, 5939 kB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu xenial/main amd64 libsigsegv2 amd64 2.10-4 [14.1 kB]
Get:2 http://archive.ubuntu.com/ubuntu xenial/main amd64 m4 amd64 1.4.17-5 [195 kB]
Get:3 http://archive.ubuntu.com/ubuntu xenial/main amd64 autoconf all 2.69-9 [321 kB]
Get:4 http://archive.ubuntu.com/ubuntu xenial/main amd64 autotools-dev all 20150820.1 [39.8 kB]
Get:5 http://archive.ubuntu.com/ubuntu xenial/main amd64 automake all 1:1.15-4ubuntu1 [510 kB]
Get:6 http://archive.ubuntu.com/ubuntu xenial/main amd64 libltdl7 amd64 2.4.6-0.1 [38.3 kB]
Get:7 http://archive.ubuntu.com/ubuntu xenial/main amd64 libltdl-dev amd64 2.4.6-0.1 [162 kB]
Get:8 http://archive.ubuntu.com/ubuntu xenial/main amd64 libtool all 2.4.6-0.1 [193 kB]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 1472 kB in 0s (1529 kB/s)
Selecting previously unselected package libsigsegv2:amd64.
(Reading database ... 14801 files and directories currently installed.)
Preparing to unpack .../libsigsegv2_2.10-4_amd64.deb ...
Unpacking libsigsegv2:amd64 (2.10-4) ...
Selecting previously unselected package m4.
Preparing to unpack .../archives/m4_1.4.17-5_amd64.deb ...
Unpacking m4 (1.4.17-5) ...
Selecting previously unselected package autoconf.
Preparing to unpack .../autoconf_2.69-9_all.deb ...
Unpacking autoconf (2.69-9) ...
Selecting previously unselected package autotools-dev.
Preparing to unpack .../autotools-dev_20150820.1_all.deb ...
Unpacking autotools-dev (20150820.1) ...
Selecting previously unselected package automake.
Preparing to unpack .../automake_1%3a1.15-4ubuntu1_all.deb ...
Unpacking automake (1:1.15-4ubuntu1) ...
Selecting previously unselected package libltdl7:amd64.
Preparing to unpack .../libltdl7_2.4.6-0.1_amd64.deb ...
Unpacking libltdl7:amd64 (2.4.6-0.1) ...
Selecting previously unselected package libltdl-dev:amd64.
Preparing to unpack .../libltdl-dev_2.4.6-0.1_amd64.deb ...
Unpacking libltdl-dev:amd64 (2.4.6-0.1) ...
Selecting previously unselected package libtool.
Preparing to unpack .../libtool_2.4.6-0.1_all.deb ...
Unpacking libtool (2.4.6-0.1) ...
Processing triggers for libc-bin (2.23-0ubuntu11) ...
Setting up libsigsegv2:amd64 (2.10-4) ...
Setting up m4 (1.4.17-5) ...
Setting up autoconf (2.69-9) ...
Setting up autotools-dev (20150820.1) ...
Setting up automake (1:1.15-4ubuntu1) ...
update-alternatives: using /usr/bin/automake-1.15 to provide /usr/bin/automake (automake) in auto mode
Setting up libltdl7:amd64 (2.4.6-0.1) ...
Setting up libltdl-dev:amd64 (2.4.6-0.1) ...
Setting up libtool (2.4.6-0.1) ...
Processing triggers for libc-bin (2.23-0ubuntu11) ...
Removing intermediate container 1d63c299ec30
 ---> b0c5ef403daf
Step 3/6 : RUN apt-get install -y build-essential cmake pkg-config
 ---> Running in fbeaf525aafe
Reading package lists...
Building dependency tree...
Reading state information...
The following additional packages will be installed:
  bzip2 cmake-data dpkg-dev fakeroot g++ g++-5 libalgorithm-diff-perl
  libalgorithm-diff-xs-perl libalgorithm-merge-perl libarchive13 libcurl3
  libdpkg-perl libfakeroot libfile-fcntllock-perl libglib2.0-0 libglib2.0-data
  libicu55 libjsoncpp1 liblzo2-2 libstdc++-5-dev libxml2 sgml-base
  shared-mime-info xdg-user-dirs xml-core xz-utils
Suggested packages:
  bzip2-doc codeblocks eclipse ninja-build debian-keyring g++-multilib
  g++-5-multilib gcc-5-doc libstdc++6-5-dbg lrzip libstdc++-5-doc
  sgml-base-doc debhelper
The following NEW packages will be installed:
  build-essential bzip2 cmake cmake-data dpkg-dev fakeroot g++ g++-5
  libalgorithm-diff-perl libalgorithm-diff-xs-perl libalgorithm-merge-perl
  libarchive13 libcurl3 libdpkg-perl libfakeroot libfile-fcntllock-perl
  libglib2.0-0 libglib2.0-data libicu55 libjsoncpp1 liblzo2-2 libstdc++-5-dev
  libxml2 pkg-config sgml-base shared-mime-info xdg-user-dirs xml-core
  xz-utils
0 upgraded, 29 newly installed, 0 to remove and 0 not upgraded.
Need to get 25.4 MB of archives.
After this operation, 106 MB of additional disk space will be used.
Get:1 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libglib2.0-0 amd64 2.48.2-0ubuntu4.6 [1120 kB]
Get:2 http://archive.ubuntu.com/ubuntu xenial/main amd64 sgml-base all 1.26+nmu4ubuntu1 [12.5 kB]
Get:3 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 cmake-data all 3.5.1-1ubuntu3 [1121 kB]
Get:4 http://archive.ubuntu.com/ubuntu xenial/main amd64 liblzo2-2 amd64 2.08-1.2 [48.7 kB]
Get:5 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libicu55 amd64 55.1-7ubuntu0.5 [7650 kB]
Get:6 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libxml2 amd64 2.9.3+dfsg1-1ubuntu0.7 [698 kB]
Get:7 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libarchive13 amd64 3.1.2-11ubuntu0.16.04.8 [262 kB]
Get:8 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libcurl3 amd64 7.47.0-1ubuntu2.14 [186 kB]
Get:9 http://archive.ubuntu.com/ubuntu xenial/main amd64 libjsoncpp1 amd64 1.7.2-1 [73.0 kB]
Get:10 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 cmake amd64 3.5.1-1ubuntu3 [2623 kB]
Get:11 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 bzip2 amd64 1.0.6-8ubuntu0.2 [32.5 kB]
Get:12 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libglib2.0-data all 2.48.2-0ubuntu4.6 [131 kB]
Get:13 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 shared-mime-info amd64 1.5-2ubuntu0.2 [405 kB]
Get:14 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 xdg-user-dirs amd64 0.15-2ubuntu6.16.04.1 [61.8 kB]
Get:15 http://archive.ubuntu.com/ubuntu xenial/main amd64 xml-core all 0.13+nmu2 [23.3 kB]
Get:16 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libstdc++-5-dev amd64 5.4.0-6ubuntu1~16.04.12 [1428 kB]
Get:17 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 g++-5 amd64 5.4.0-6ubuntu1~16.04.12 [8430 kB]
Get:18 http://archive.ubuntu.com/ubuntu xenial/main amd64 g++ amd64 4:5.3.1-1ubuntu1 [1504 B]
Get:19 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 libdpkg-perl all 1.18.4ubuntu1.6 [195 kB]
Get:20 http://archive.ubuntu.com/ubuntu xenial/main amd64 xz-utils amd64 5.1.1alpha+20120614-2ubuntu2 [78.8 kB]
Get:21 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 dpkg-dev all 1.18.4ubuntu1.6 [584 kB]
Get:22 http://archive.ubuntu.com/ubuntu xenial/main amd64 build-essential amd64 12.1ubuntu2 [4758 B]
Get:23 http://archive.ubuntu.com/ubuntu xenial/main amd64 libfakeroot amd64 1.20.2-1ubuntu1 [25.5 kB]
Get:24 http://archive.ubuntu.com/ubuntu xenial/main amd64 fakeroot amd64 1.20.2-1ubuntu1 [61.8 kB]
Get:25 http://archive.ubuntu.com/ubuntu xenial/main amd64 libalgorithm-diff-perl all 1.19.03-1 [47.6 kB]
Get:26 http://archive.ubuntu.com/ubuntu xenial/main amd64 libalgorithm-diff-xs-perl amd64 0.04-4build1 [11.0 kB]
Get:27 http://archive.ubuntu.com/ubuntu xenial/main amd64 libalgorithm-merge-perl all 0.08-3 [12.0 kB]
Get:28 http://archive.ubuntu.com/ubuntu xenial/main amd64 libfile-fcntllock-perl amd64 0.22-3 [32.0 kB]
Get:29 http://archive.ubuntu.com/ubuntu xenial/main amd64 pkg-config amd64 0.29.1-0ubuntu1 [45.0 kB]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 25.4 MB in 1s (13.6 MB/s)
Selecting previously unselected package libglib2.0-0:amd64.
(Reading database ... 15171 files and directories currently installed.)
Preparing to unpack .../libglib2.0-0_2.48.2-0ubuntu4.6_amd64.deb ...
Unpacking libglib2.0-0:amd64 (2.48.2-0ubuntu4.6) ...
Selecting previously unselected package sgml-base.
Preparing to unpack .../sgml-base_1.26+nmu4ubuntu1_all.deb ...
Unpacking sgml-base (1.26+nmu4ubuntu1) ...
Selecting previously unselected package cmake-data.
Preparing to unpack .../cmake-data_3.5.1-1ubuntu3_all.deb ...
Unpacking cmake-data (3.5.1-1ubuntu3) ...
Selecting previously unselected package liblzo2-2:amd64.
Preparing to unpack .../liblzo2-2_2.08-1.2_amd64.deb ...
Unpacking liblzo2-2:amd64 (2.08-1.2) ...
Selecting previously unselected package libicu55:amd64.
Preparing to unpack .../libicu55_55.1-7ubuntu0.5_amd64.deb ...
Unpacking libicu55:amd64 (55.1-7ubuntu0.5) ...
Selecting previously unselected package libxml2:amd64.
Preparing to unpack .../libxml2_2.9.3+dfsg1-1ubuntu0.7_amd64.deb ...
Unpacking libxml2:amd64 (2.9.3+dfsg1-1ubuntu0.7) ...
Selecting previously unselected package libarchive13:amd64.
Preparing to unpack .../libarchive13_3.1.2-11ubuntu0.16.04.8_amd64.deb ...
Unpacking libarchive13:amd64 (3.1.2-11ubuntu0.16.04.8) ...
Selecting previously unselected package libcurl3:amd64.
Preparing to unpack .../libcurl3_7.47.0-1ubuntu2.14_amd64.deb ...
Unpacking libcurl3:amd64 (7.47.0-1ubuntu2.14) ...
Selecting previously unselected package libjsoncpp1:amd64.
Preparing to unpack .../libjsoncpp1_1.7.2-1_amd64.deb ...
Unpacking libjsoncpp1:amd64 (1.7.2-1) ...
Selecting previously unselected package cmake.
Preparing to unpack .../cmake_3.5.1-1ubuntu3_amd64.deb ...
Unpacking cmake (3.5.1-1ubuntu3) ...
Selecting previously unselected package bzip2.
Preparing to unpack .../bzip2_1.0.6-8ubuntu0.2_amd64.deb ...
Unpacking bzip2 (1.0.6-8ubuntu0.2) ...
Selecting previously unselected package libglib2.0-data.
Preparing to unpack .../libglib2.0-data_2.48.2-0ubuntu4.6_all.deb ...
Unpacking libglib2.0-data (2.48.2-0ubuntu4.6) ...
Selecting previously unselected package shared-mime-info.
Preparing to unpack .../shared-mime-info_1.5-2ubuntu0.2_amd64.deb ...
Unpacking shared-mime-info (1.5-2ubuntu0.2) ...
Selecting previously unselected package xdg-user-dirs.
Preparing to unpack .../xdg-user-dirs_0.15-2ubuntu6.16.04.1_amd64.deb ...
Unpacking xdg-user-dirs (0.15-2ubuntu6.16.04.1) ...
Selecting previously unselected package xml-core.
Preparing to unpack .../xml-core_0.13+nmu2_all.deb ...
Unpacking xml-core (0.13+nmu2) ...
Selecting previously unselected package libstdc++-5-dev:amd64.
Preparing to unpack .../libstdc++-5-dev_5.4.0-6ubuntu1~16.04.12_amd64.deb ...
Unpacking libstdc++-5-dev:amd64 (5.4.0-6ubuntu1~16.04.12) ...
Selecting previously unselected package g++-5.
Preparing to unpack .../g++-5_5.4.0-6ubuntu1~16.04.12_amd64.deb ...
Unpacking g++-5 (5.4.0-6ubuntu1~16.04.12) ...
Selecting previously unselected package g++.
Preparing to unpack .../g++_4%3a5.3.1-1ubuntu1_amd64.deb ...
Unpacking g++ (4:5.3.1-1ubuntu1) ...
Selecting previously unselected package libdpkg-perl.
Preparing to unpack .../libdpkg-perl_1.18.4ubuntu1.6_all.deb ...
Unpacking libdpkg-perl (1.18.4ubuntu1.6) ...
Selecting previously unselected package xz-utils.
Preparing to unpack .../xz-utils_5.1.1alpha+20120614-2ubuntu2_amd64.deb ...
Unpacking xz-utils (5.1.1alpha+20120614-2ubuntu2) ...
Selecting previously unselected package dpkg-dev.
Preparing to unpack .../dpkg-dev_1.18.4ubuntu1.6_all.deb ...
Unpacking dpkg-dev (1.18.4ubuntu1.6) ...
Selecting previously unselected package build-essential.
Preparing to unpack .../build-essential_12.1ubuntu2_amd64.deb ...
Unpacking build-essential (12.1ubuntu2) ...
Selecting previously unselected package libfakeroot:amd64.
Preparing to unpack .../libfakeroot_1.20.2-1ubuntu1_amd64.deb ...
Unpacking libfakeroot:amd64 (1.20.2-1ubuntu1) ...
Selecting previously unselected package fakeroot.
Preparing to unpack .../fakeroot_1.20.2-1ubuntu1_amd64.deb ...
Unpacking fakeroot (1.20.2-1ubuntu1) ...
Selecting previously unselected package libalgorithm-diff-perl.
Preparing to unpack .../libalgorithm-diff-perl_1.19.03-1_all.deb ...
Unpacking libalgorithm-diff-perl (1.19.03-1) ...
Selecting previously unselected package libalgorithm-diff-xs-perl.
Preparing to unpack .../libalgorithm-diff-xs-perl_0.04-4build1_amd64.deb ...
Unpacking libalgorithm-diff-xs-perl (0.04-4build1) ...
Selecting previously unselected package libalgorithm-merge-perl.
Preparing to unpack .../libalgorithm-merge-perl_0.08-3_all.deb ...
Unpacking libalgorithm-merge-perl (0.08-3) ...
Selecting previously unselected package libfile-fcntllock-perl.
Preparing to unpack .../libfile-fcntllock-perl_0.22-3_amd64.deb ...
Unpacking libfile-fcntllock-perl (0.22-3) ...
Selecting previously unselected package pkg-config.
Preparing to unpack .../pkg-config_0.29.1-0ubuntu1_amd64.deb ...
Unpacking pkg-config (0.29.1-0ubuntu1) ...
Processing triggers for libc-bin (2.23-0ubuntu11) ...
Setting up libglib2.0-0:amd64 (2.48.2-0ubuntu4.6) ...
No schema files found: doing nothing.
Setting up sgml-base (1.26+nmu4ubuntu1) ...
Setting up cmake-data (3.5.1-1ubuntu3) ...
Setting up liblzo2-2:amd64 (2.08-1.2) ...
Setting up libicu55:amd64 (55.1-7ubuntu0.5) ...
Setting up libxml2:amd64 (2.9.3+dfsg1-1ubuntu0.7) ...
Setting up libarchive13:amd64 (3.1.2-11ubuntu0.16.04.8) ...
Setting up libcurl3:amd64 (7.47.0-1ubuntu2.14) ...
Setting up libjsoncpp1:amd64 (1.7.2-1) ...
Setting up cmake (3.5.1-1ubuntu3) ...
Setting up bzip2 (1.0.6-8ubuntu0.2) ...
Setting up libglib2.0-data (2.48.2-0ubuntu4.6) ...
Setting up shared-mime-info (1.5-2ubuntu0.2) ...
Setting up xdg-user-dirs (0.15-2ubuntu6.16.04.1) ...
Setting up xml-core (0.13+nmu2) ...
Setting up libstdc++-5-dev:amd64 (5.4.0-6ubuntu1~16.04.12) ...
Setting up g++-5 (5.4.0-6ubuntu1~16.04.12) ...
Setting up g++ (4:5.3.1-1ubuntu1) ...
update-alternatives: using /usr/bin/g++ to provide /usr/bin/c++ (c++) in auto mode
Setting up libdpkg-perl (1.18.4ubuntu1.6) ...
Setting up xz-utils (5.1.1alpha+20120614-2ubuntu2) ...
update-alternatives: using /usr/bin/xz to provide /usr/bin/lzma (lzma) in auto mode
Setting up dpkg-dev (1.18.4ubuntu1.6) ...
Setting up build-essential (12.1ubuntu2) ...
Setting up libfakeroot:amd64 (1.20.2-1ubuntu1) ...
Setting up fakeroot (1.20.2-1ubuntu1) ...
update-alternatives: using /usr/bin/fakeroot-sysv to provide /usr/bin/fakeroot (fakeroot) in auto mode
Setting up libalgorithm-diff-perl (1.19.03-1) ...
Setting up libalgorithm-diff-xs-perl (0.04-4build1) ...
Setting up libalgorithm-merge-perl (0.08-3) ...
Setting up libfile-fcntllock-perl (0.22-3) ...
Setting up pkg-config (0.29.1-0ubuntu1) ...
Processing triggers for libc-bin (2.23-0ubuntu11) ...
Removing intermediate container fbeaf525aafe
 ---> b02db6416f70
Step 4/6 : RUN git clone --depth 1 https://github.com/beltoforion/muparser.git muparser
 ---> Running in 8d230837cbf8
Cloning into 'muparser'...
Removing intermediate container 8d230837cbf8
 ---> 74432eb34439
Step 5/6 : WORKDIR muparser
 ---> Running in 46e3e8ad8065
Removing intermediate container 46e3e8ad8065
 ---> 339393fbad58
Step 6/6 : COPY build.sh set_eval_fuzzer.cc $SRC/
 ---> 8c1a5710e031
Successfully built 8c1a5710e031
Successfully tagged gcr.io/oss-fuzz/muparser:latest
Keeping existing build artifacts as-is (if any).
Running: docker run --rm --privileged -i -v /home/travis/build/google/oss-fuzz/build/work/muparser:/work gcr.io/oss-fuzz-base/msan-builder bash -c 'cp -r /msan /work'
Unable to find image 'gcr.io/oss-fuzz-base/msan-builder:latest' locally
latest: Pulling from oss-fuzz-base/msan-builder
















Digest: sha256:064aaae67423c51c755afd2e522aeade63c0c3a634c1269fadee59b2ce9de9b5
Status: Downloaded newer image for gcr.io/oss-fuzz-base/msan-builder:latest
Running: docker run --rm --privileged -i --cap-add SYS_PTRACE -e FUZZING_ENGINE=libfuzzer -e SANITIZER=memory -e ARCHITECTURE=x86_64 -e MSAN_LIBS_PATH=/work/msan -v /home/travis/build/google/oss-fuzz/build/out/muparser:/out -v /home/travis/build/google/oss-fuzz/build/work/muparser:/work -t gcr.io/oss-fuzz/muparser
---------------------------------------------------------------
Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... ar: creating /usr/lib/libFuzzingEngine.a
 done.
CC=clang
CXX=clang++
CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link
CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++
---------------------------------------------------------------
+ cmake . -DBUILD_SHARED_LIBS=OFF
-- The C compiler identification is Clang 11.0.0
-- The CXX compiler identification is Clang 11.0.0
-- Check for working C compiler: /usr/local/bin/clang
-- Check for working C compiler: /usr/local/bin/clang -- works
-- Detecting C compiler ABI info
-- Detecting C compiler ABI info - done
-- Detecting C compile features
-- Detecting C compile features - done
-- Check for working CXX compiler: /usr/local/bin/clang++
-- Check for working CXX compiler: /usr/local/bin/clang++ -- works
-- Detecting CXX compiler ABI info
-- Detecting CXX compiler ABI info - done
-- Detecting CXX compile features
-- Detecting CXX compile features - done
-- Configuring done
-- Generating done
-- Build files have been written to: /src/muparser
++ nproc
+ make -j2
Scanning dependencies of target muparser
[ 12%] Building CXX object CMakeFiles/muparser.dir/src/muParserBytecode.cpp.o
[ 12%] Building CXX object CMakeFiles/muparser.dir/src/muParserBase.cpp.o
[ 18%] Building CXX object CMakeFiles/muparser.dir/src/muParserCallback.cpp.o
[ 25%] Building CXX object CMakeFiles/muparser.dir/src/muParser.cpp.o
[ 31%] Building CXX object CMakeFiles/muparser.dir/src/muParserDLL.cpp.o
[ 37%] Building CXX object CMakeFiles/muparser.dir/src/muParserError.cpp.o
[ 43%] Building CXX object CMakeFiles/muparser.dir/src/muParserInt.cpp.o
[ 50%] Building CXX object CMakeFiles/muparser.dir/src/muParserTest.cpp.o
[ 56%] Building CXX object CMakeFiles/muparser.dir/src/muParserTokenReader.cpp.o
[ 62%] Linking CXX static library libmuparser.a
[ 62%] Built target muparser
Scanning dependencies of target example1
Scanning dependencies of target t_ParserTest
[ 68%] Building CXX object CMakeFiles/t_ParserTest.dir/test/t_ParserTest.cpp.o
[ 75%] Building CXX object CMakeFiles/example1.dir/samples/example1/example1.cpp.o
[ 81%] Linking CXX executable t_ParserTest
[ 81%] Built target t_ParserTest
Scanning dependencies of target example2
[ 87%] Building C object CMakeFiles/example2.dir/samples/example2/example2.c.o
/src/muparser/samples/example2/example2.c:101:127: warning: cast to smaller integer type 'int' from 'void *' [-Wvoid-pointer-to-int-cast]
    myprintf(_T("Generating new variable \"%s\" (slots left: %d; context pointer: 0x%x)\n"), a_szName, PARSER_MAXVARS - iVal, (int)pUserData);
                                                                                                                              ^~~~~~~~~~~~~~
/src/muparser/samples/example2/example2.c:181:63: warning: cast to smaller integer type 'int' from 'muFloat_t *' (aka 'double *') [-Wpointer-to-int-cast]
        myprintf(_T("Name: %s    Address: [0x%x]\n"), szName, (int)pVar);
                                                              ^~~~~~~~~
/src/muparser/samples/example2/example2.c:208:62: warning: cast to smaller integer type 'int' from 'muFloat_t *' (aka 'double *') [-Wpointer-to-int-cast]
        myprintf(_T("Name: %s   Address: [0x%x]\n"), szName, (int)pVar);
                                                             ^~~~~~~~~
3 warnings generated.
[ 93%] Linking CXX executable example2
[ 93%] Built target example2
[100%] Linking CXX executable example1
[100%] Built target example1
+ make install
[ 62%] Built target muparser
[ 75%] Built target t_ParserTest
[ 87%] Built target example1
[100%] Built target example2
Install the project...
-- Install configuration: "Release"
-- Installing: /usr/local/lib/libmuparser.a
-- Installing: /usr/local/include/muParserBase.h
-- Installing: /usr/local/include/muParserBytecode.h
-- Installing: /usr/local/include/muParserCallback.h
-- Installing: /usr/local/include/muParserDef.h
-- Installing: /usr/local/include/muParserDLL.h
-- Installing: /usr/local/include/muParserError.h
-- Installing: /usr/local/include/muParserFixes.h
-- Installing: /usr/local/include/muParser.h
-- Installing: /usr/local/include/muParserInt.h
-- Installing: /usr/local/include/muParserStack.h
-- Installing: /usr/local/include/muParserTemplateMagic.h
-- Installing: /usr/local/include/muParserTest.h
-- Installing: /usr/local/include/muParserToken.h
-- Installing: /usr/local/include/muParserTokenReader.h
-- Installing: /usr/local/lib/pkgconfig/muparser.pc
+ ldconfig
++ pkg-config muparser --cflags
+ MU_CXXFLAGS=-I/usr/local/include
++ pkg-config muparser --libs
+ MU_LIBS='-L/usr/local/lib -lmuparser'
+ clang++ -std=c++11 -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ -I. -I/usr/local/include -L/usr/local/lib -lmuparser /src/set_eval_fuzzer.cc -o /out/set_eval_fuzzer -fsanitize=fuzzer libmuparser.a
Running: docker run --rm --privileged -i -v /home/travis/build/google/oss-fuzz/build/out/muparser:/out -v /home/travis/build/google/oss-fuzz/build/work/muparser:/work -e FUZZING_ENGINE=libfuzzer -e SANITIZER=memory -e ARCHITECTURE=x86_64 -e MSAN_LIBS_PATH=/work/msan gcr.io/oss-fuzz-base/base-msan-builder patch_build.py /out
Unable to find image 'gcr.io/oss-fuzz-base/base-msan-builder:latest' locally
latest: Pulling from oss-fuzz-base/base-msan-builder















Digest: sha256:df2b63c8683ce3107b61565184a5abbd086660c32eb33f60ab9d6d01b2333196
Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-msan-builder:latest
WARNING: Instrumented library not found for /lib/x86_64-linux-gnu/libm.so.6
WARNING: Instrumented library not found for /lib/x86_64-linux-gnu/libpthread.so.0
WARNING: Instrumented library not found for /lib/x86_64-linux-gnu/librt.so.1
WARNING: Instrumented library not found for /lib/x86_64-linux-gnu/libdl.so.2
WARNING: Instrumented library not found for /lib/x86_64-linux-gnu/libgcc_s.so.1
WARNING: Instrumented library not found for /lib/x86_64-linux-gnu/libc.so.6
Running command: python /home/travis/build/google/oss-fuzz/infra/helper.py check_build muparser --engine libfuzzer --sanitizer memory --architecture x86_64
Running: docker run --rm --privileged -i -e FUZZING_ENGINE=libfuzzer -e SANITIZER=memory -e ARCHITECTURE=x86_64 -v /home/travis/build/google/oss-fuzz/build/out/muparser:/out -t gcr.io/oss-fuzz-base/base-runner test_all
Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally
latest: Pulling from oss-fuzz-base/base-runner













Digest: sha256:0af748c955288bb2998c4591b3536c507e1b23db42da3c2221b3bcf77351198a
Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest
INFO: performing bad build checks for /tmp/not-out/set_eval_fuzzer.
Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
    #8 0x45b6d6 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:743:3
    #9 0x45bb49 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:794:3
    #10 0x44ae1e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:826:6
    #11 0x4735f2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
    #12 0x7fc90554482f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
    #13 0x41f528 in _start (/tmp/not-out/set_eval_fuzzer+0x41f528)

DEDUP_TOKEN: length--basic_string<nullptr_t>--mu::ParserBase::AddCallback(std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const&, mu::ParserCallback const&, std::__1::map<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, mu::ParserCallback, std::__1::less<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > >, std::__1::allocator<std::__1::pair<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > const, mu::ParserCallback> > >&, char const*)
  Uninitialized value was created by a heap allocation
    #0 0x521379 in operator new(unsigned long) /src/llvm-project/compiler-rt/lib/msan/msan_new_delete.cpp:45:35
    #1 0x6011e4 in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >::assign(char const*, unsigned long) (/tmp/not-out/set_eval_fuzzer+0x6011e4)
    #2 0x58bab8 in mu::Parser::Parser() /src/muparser/src/muParser.cpp:243:5
    #3 0x522376 in LLVMFuzzerTestOneInput /src/set_eval_fuzzer.cc:25:16
    #4 0x459bb1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
    #5 0x45b6d6 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:743:3
    #6 0x45bb49 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:794:3
    #7 0x44ae1e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:826:6
    #8 0x4735f2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
    #9 0x7fc90554482f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)

DEDUP_TOKEN: operator new(unsigned long)--std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >::assign(char const*, unsigned long)--mu::Parser::Parser()
SUMMARY: MemorySanitizer: use-of-uninitialized-value /usr/local/bin/../include/c++/v1/__string:370:53 in length
Exiting
MS: 0 ; base unit: 0000000000000000000000000000000000000000


artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709
Base64: 
ERROR: 100% of fuzz targets seem to be broken. See the list above for a detailed information.
Check build failed.
Failed projects: muparser
TravisBuddy Request Identifier: e80b03c0-96e3-11ea-a4b4-15e25fe479ac

@TravisBuddy
Copy link

Hey @zchcai,
Your changes look good to me!

View build log

TravisBuddy Request Identifier: 9b2b1d80-96e6-11ea-a4b4-15e25fe479ac

@beltoforion
Copy link

I'd like to give this a try. However i cannot merge the pull request

@inferno-chromium inferno-chromium marked this pull request as ready for review June 1, 2020 14:07
@inferno-chromium inferno-chromium merged commit 0f50310 into google:master Jun 1, 2020
@inferno-chromium
Copy link
Collaborator

I'd like to give this a try. However i cannot merge the pull request

Merged :)
To access bug reports, you would need to associate this email with a google account - https://google.github.io/oss-fuzz/faq/#why-do-you-require-a-google-account-for-authentication see https://support.google.com/accounts/answer/176347?hl=en

@TravisBuddy
Copy link

Hey @zchcai,
Your changes look good to me!

View build log

TravisBuddy Request Identifier: d90600b0-a411-11ea-946e-418bdaa55b61

@zchcai
Copy link
Contributor Author

zchcai commented Jun 1, 2020

Thanks!

@inferno-chromium
Copy link
Collaborator

@zchcai - the build is broken, any thoughts - https://oss-fuzz-build-logs.storage.googleapis.com/index.html#muparser

zchcai added a commit to zchcai/oss-fuzz that referenced this pull request Jun 3, 2020
* [cryptofuzz] Add Microsoft SymCrypt (google#3826)

* [gRPC-gateway] Initial integration (google#3807)

* [doc] Update new_project_guide.md (google#3828)

* [knot-dns] link against liblmdb statically (google#3797)

Relates to https://gitlab.labs.nic.cz/knot/knot-dns/-/commit/d4ec3a3aa8b7e2ba4d196e2f7984173069e3d91b

Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22191

* Simplify rust project setup. (google#3830)

* Simplify rust project setup.

- Add rust and cargo-fuzz in base builder.
- Set RUSTC_BOOSTRAP to make ASan available.
- Set RUSTFLAGS and C,CXXFLAGS properly.

* Quick fix for helper.py build_fuzzers. (google#3832)

* Parse project language and use in infra/helper.py (google#3834)

* Parse project language and use in infra/helper.py

* Fix exception message.

* Add FUZZING_LANGUAGE to build step. (google#3835)

* Add fuzzing language correctly during compile step. (google#3837)

* Remove unneeded rust hacks after google#3830. (google#3840)

* Fix missing FUZZING_LANGUAGE in coverage build. (google#3843)

* Use hardcoded FUZZING_LANGUAGE to unbreak CIFuzz. (google#3844)

* solidity: Disable Z3 build in dockerfile (google#3831)

* cifuzz: use pull_request.number instead of GITHUB_REF (google#3845)

Closes google#3732

* wasmtime: build fuzz targets with --all-features (google#3850)

This enables not only the binaryen-using fuzz targets, but also the peepmatic fuzz targets (which is necessary after bytecodealliance/wasmtime#1727).

* Relax project language requirement. (google#3846)

This is necessary for the bisector to be able to build older revisions.

Print a warning instead.

* libzmq: add maintainer, add UBSAN (google#3829)

* Add another maintainer to libzmq's CC list

* Enable UBSAN for libzmq

* libzmq: disable afl fuzzer, CI fails

* libsodium: do not let libsodium's autogen.sh download files from gnu.org

There is no sanity check and if the download fails because gnu.org is down
the build fails with unhelpful errors

* Fixed changes added in clang-11.0. (google#3852)

* Bump httplib2 from 0.11.3 to 0.18.0 in /infra/gcb (google#3853)

Bumps [httplib2](https://github.com/httplib2/httplib2) from 0.11.3 to 0.18.0.
- [Release notes](https://github.com/httplib2/httplib2/releases)
- [Changelog](https://github.com/httplib2/httplib2/blob/master/CHANGELOG)
- [Commits](httplib2/httplib2@v0.11.3...v0.18.0)

Signed-off-by: dependabot[bot] <[email protected]>

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* [TiDB] initial integration (google#3849)

* [Minify] Initial integration (google#3848)

* Set rust flags always in compile step. (google#3859)

This is needed for projects that mix both rust and c/c++.

* Remove unneeded RUSTC_BOOTSTRAP since nightly is used

* [fasthttp] Initial integration (google#3858)

* [libfido2] bump libcbor version from 0.5.0 to 0.7.0 (google#3861)

* Fix cras build failure, use default rust nightly.

* Don't add Rust sanitizer flags when using ubsan or i386. (google#3862)

Rust sanitizer flags are not supported for these configs.
Fixes Cras and ecc-diff-fuzzer builds.

* [hermes] Initial setup for Hermes (google#3698)

* [poppler] Exercise a few more methods (google#3857)

* [minify] Moved build script upstream (google#3867)

* Use available nightly rust for spidermonkey build

* Use available rust nightly in spidermonkey-ufi

* Use available rust nightly in firefox

* [python3-libraries] Fix build (google#3869)

* Use latest git version. (google#3870)

Adds features needed by firefox and spidermonkey-ufi builds.

* libzmq: fix MSAN (google#3868)

* libzmq: build libsodium with --disable-asm to avoid false positives in MSAN checks

* libzmq: set autoconf install prefix to avoid /usr/local being added to the linker library paths

A non-working version of the standard library is installed in oss-fuzz's images
under /usr/local/lib. Using it breaks MSAN's tests with false positives.
Set the prefix in autoconf to something different from the default
/usr/local, as /lib is added by autoconf automatically to the linker
flags, which means this broken standard library is used instead of the
instrumented one in /usr/lib.

* build_specified_commit: revert to using cp. (google#3871)


rsync seems to have disappeared in the latest images somehow, and we
can't rely on it always existing.

* Don't add sanitizer=coverage in RUSTFLAGS

* Remove libpcap patch merged upstream (google#3865)

* Install Python 3.8.3 on builder image. (google#3874)

Part of fixing google#3756.

* [qt] Get a shallow clone of qtbase (google#3872)

Reduces the size by nearly 200 MB

* [qt] Add fuzzer for QImage::loadFromData() (google#3873)

* Fix jsoncpp build

* build_specified_commit: Don't replace gitdir if already relative. (google#3875)

Upgraded git broke this.

* [skia] Speculative build fix (google#3847)

* [stb] extend code coverage for stb_image (google#3784)

* [stb] extend code coverage for stb_image

* remove wget's from build.sh

* add wget's to Dockerfile

* fix Dockerfile

* [hermes] Fix coverage build (google#3877)

* Update email address to non-alias for clusterfuzz login (google#3878)

* add hosts and interns (google#3879)

Signed-off-by: Asra Ali <[email protected]>

* [qt] Don't install build-essential (google#3880)

It's in base-builder now.

* [hermes] Add CC for issues (google#3882)

* [systemd] turn off hongfuzz (google#3889)

See google#3887

* Remove libbz2-dev dependency installed in base-builder for python3 (google#3890)

* Remove libbz2-dev dependency installed in base-builder for python3

Fixes google#3888

* Revert "[systemd] turn off hongfuzz (google#3889)" (google#3891)

This reverts commit d638fac.

* Set up python in one docker layer, remove python deps. (google#3893)

* Set up python in one docker layer.

Address review comment in google#3890 (review)

* Remove all python dependencies, keep build-essential.

* Makes suricata work with rust sanitizers (google#3897)

* [firefox] Fix libFuzzer cloning process (google#3896)

* Fix spidermonkey-ufi build.

* [nanopb] Use $(which python3) instead of hardcoding /usr/bin/python3 (google#3895)

After the addition of Python 3.8 in google#3874, the default python3 is
now /usr/local/bin/python3. The nanopb Dockerfile hardcoded a path
of /usr/bin/python3, causing again problems of Python packages being
installed for different version than attempting to run with.

* Fix CIFuzz issue where targets assumed in OSS-Fuzz build if exists (google#3817)

Make some other changes:
1. Refactor fuzz_target.py and fuzz_target_test.py
2. Introduce pyfakefs and parameterized as dependencies and use them
in tests.
3. Fix infra-tests in CI so that they use installed dependencies

* Fix spidermonkey-ufi build

* Extend Zeek project auto_ccs (google#3898)

* [libgd] Add another fuzzer to libgd (google#3892)

* [qt] Add qtdeclarative (google#3901)

* [qt] Add qtdeclarative

* [qt] Ignore stdout from make

"The job exceeded the maximum log length, and has been terminated."

* Updating jsoncpp primary contact (google#3900)

* [php] Remove --enable-json (google#3899)

JSON is now always compiled in, and cannot be explicitly enabled.

* Don't create empty corpus archive as it wont unpack. (google#3903)

* Update email addresses for Prometheus (google#3905)

Signed-off-by: Julius Volz <[email protected]>

* [cryptofuzz] wolfCrypt: Build with support for AES-CFB, AES-OFB (google#3904)

* libzmq: enable honggfuzz (google#3909)

* Update Prometheus maintainer in Dockerfile (google#3906)

...to myself (Prometheus co-creator).

Signed-off-by: Julius Volz <[email protected]>

* Revert "[systemd] remove my non-gmail address (google#3606)" (google#3910)

This reverts commit 65dcabc.

* [GDAL] Move clone of dependencies to upstream repository (google#3911)

Cloning of build dependencies and patching is now done by
https://github.com/OSGeo/gdal/blob/master/gdal/fuzzers/build.sh

* bump libtorrent to fuzz the 2.0 release branch (google#3913)

* [FFmpeg] install rsync as it is required for the seed corpus (google#3912)

Fixes: Issue 22500 (build failure)

* Fix builds_status cron exception. (google#3914)

When build log is not found, skip it and avoid 404.
Fixes exception
```
Traceback (most recent call last):
  File "oss-fuzz/infra/gcb/builds_status.py", line 243, in <module>
    main()
  File "oss-fuzz/infra/gcb/builds_status.py", line 228, in main
    status_filename='status.json')
  File "oss-fuzz/infra/gcb/builds_status.py", line 159, in update_build_status
    last_build = find_last_build(builds, project, build_tag_suffix)
  File "oss-fuzz/infra/gcb/builds_status.py", line 102, in find_last_build
    log.download_to_filename(f.name)
  File "/var/jenkins_home/workspace/infra/builds_status/ENV/local/lib/python2.7/site-packages/google/cloud/storage/blob.py", line 565, in download_to_filename
    file_obj, client=client, start=start, end=end)
  File "/var/jenkins_home/workspace/infra/builds_status/ENV/local/lib/python2.7/site-packages/google/cloud/storage/blob.py", line 537, in download_to_file
    _raise_from_invalid_response(exc)
  File "/var/jenkins_home/workspace/infra/builds_status/ENV/local/lib/python2.7/site-packages/google/cloud/storage/blob.py", line 1873, in _raise_from_invalid_response
    raise exceptions.from_http_response(error.response)
google.api_core.exceptions.NotFound: 404 GET https://www.googleapis.com/download/storage/v1/b/oss-fuzz-gcb-logs/o/log-9fca5dab-72bf-4970-9557-86b93ede51e0.txt?alt=media: No such object: oss-fuzz-gcb-logs/log-9fca5dab-72bf-4970-9557-86b93ede51e0.txt
Build step 'Execute shell' marked build as failure
Finished: FAILURE
```

* Retry building project images in build_specified_commit. (google#3915)

To mitigate transient network issues.

* Prometheus: Don't use WORKDIR $SRC (google#3908)

This makes build_fuzzers work with local checkouts.

Without this, it complains with 'Cannot use local checkout with "WORKDIR
/src".'

Signed-off-by: Julien Pivotto <[email protected]>

* [systemd] add DaanDeMeyer's address (google#3916)

* [muparser] initial integration (google#3814)

* [haproxy] Fix build failures. (google#3884)

* Updated the haproxy fuzzers to build again.

* The frame decoder needs additional updates since we need to call init_h2 to initialise a memory pool. Disabling this for now as this is a larger change in the code base and will fix up in the coming week.

* Fixed hpack decode.

* Updated the yaml since we dont want memory sanitizer.

* Update project.yaml (google#3917)

* install rsync (google#3920)

* [LibRaw] Initial integration (google#3918)

* Init integration

* Fix formatting

* Add size check

* Update maintainers

* PR Feedback

* Add newline

* Disable UBSan vptr

* Disable building examples

* Remove disabling UBSan vptr

Co-authored-by: Jamie Pinheiro <[email protected]>

* ecc-diff-fuzzer buils nettle without openssl (google#3922)

* Update Dockerfile (google#3923)

* Added contact to zlib-ng project auto_ccs. (google#3924)

* [qt] Add pdf to image corpus (google#3926)

* [haproxy] Minor fix (google#3928)

* Revert "[qt] Add pdf to image corpus (google#3926)" (google#3929)

To handle PDFs, QImage requires qtwebengine
which doesn't build statically.

This reverts commit 934c770.

* Fix TensorFlow build (google#3930)

* Remove [email protected] as he left Google

* Use python3 as python2 is deprecated

* Need to manually install numpy now as it is used in the toolchain

* Use bazelisk instead of the grep configure -> get Bazel version -> curl hack

* Remove C++11 constraint as TF now builds and uses C++14

* Handle review

* Remove source sed/replace as it is no longer needed

Co-authored-by: Guido Vranken <[email protected]>
Co-authored-by: AdamKorcz <[email protected]>
Co-authored-by: Daniel Salzman <[email protected]>
Co-authored-by: Abhishek Arya <[email protected]>
Co-authored-by: Oliver Chang <[email protected]>
Co-authored-by: Bhargava Shastry <[email protected]>
Co-authored-by: Evgeny Vereshchagin <[email protected]>
Co-authored-by: Nick Fitzgerald <[email protected]>
Co-authored-by: Luca Boccassi <[email protected]>
Co-authored-by: DavidKorczynski <[email protected]>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Gabriel Kihlman <[email protected]>
Co-authored-by: neildhar <[email protected]>
Co-authored-by: tsdgeos <[email protected]>
Co-authored-by: Catena cyber <[email protected]>
Co-authored-by: Robert Löhning <[email protected]>
Co-authored-by: Kevin Lubick <[email protected]>
Co-authored-by: Randy <[email protected]>
Co-authored-by: Will <[email protected]>
Co-authored-by: asraa <[email protected]>
Co-authored-by: Christian Holler (:decoder) <[email protected]>
Co-authored-by: Petteri Aimonen <[email protected]>
Co-authored-by: jonathanmetzman <[email protected]>
Co-authored-by: Jon Siwek <[email protected]>
Co-authored-by: Google AutoFuzz Team <[email protected]>
Co-authored-by: kabeer27 <[email protected]>
Co-authored-by: Nikita Popov <[email protected]>
Co-authored-by: Julius Volz <[email protected]>
Co-authored-by: Even Rouault <[email protected]>
Co-authored-by: Arvid Norberg <[email protected]>
Co-authored-by: Michael Niedermayer <[email protected]>
Co-authored-by: Julien Pivotto <[email protected]>
Co-authored-by: Ingo Berg <[email protected]>
Co-authored-by: Teju Nareddy <[email protected]>
Co-authored-by: Jamie Pinheiro <[email protected]>
Co-authored-by: Jamie Pinheiro <[email protected]>
Co-authored-by: Nathan Moinvaziri <[email protected]>
Co-authored-by: Mihai Maruseac <[email protected]>
@beltoforion
Copy link

I modified the cmakefile to use the openmp option by default. Clang seems to have difficulty finding OpenMP. i also had to modify the travis-ci integration.

You can also build the project with disabled openmp by using the option -DENABLE_OPENMP=OFF for cmake. It would not make a difference for the fuzzer. Can that be done?

@zchcai
Copy link
Contributor Author

zchcai commented Jun 4, 2020

Yes, we already make it disabled now.

@beltoforion
Copy link

ok, thanks

@zchcai zchcai deleted the muparser branch June 4, 2020 14:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants