-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Index projects on infra #13249
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Index projects on infra #13249
Conversation
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
3 similar comments
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
bba4927
to
0b698c4
Compare
/gcbrun trial_build.py unrar --fuzzing-engines libfuzzer --sanitizers address |
1 similar comment
/gcbrun trial_build.py unrar --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py jq --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py jq unrar --fuzzing-engines libfuzzer --sanitizers address |
1 similar comment
/gcbrun trial_build.py jq unrar --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py yara expat --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py yara expat --fuzzing-engines libfuzzer --sanitizers address |
1 similar comment
/gcbrun trial_build.py yara expat --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py yara harfbuzz glslang --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py openssl --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py openssl --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
cb26cb7
to
53f2b9f
Compare
/gcbrun trial_build.py systemd --fuzzing-engines libfuzzer --sanitizers address |
Oliver, do you get this when trying to build systemd locally?
|
My bad -- I had a fix that I didn't push. pushed now. |
/gcbrun trial_build.py systemd --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py openssl libfido2 nss --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py openssl systemd --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py boringssl --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py nss --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
32f1cf7
to
53f2b9f
Compare
Change path so our wrapper is loaded when "clang" is called. To deal with build systems that inspect the directory of the clang binary, we symlink to every thing (except clang and clang++) from the indexer directory. Also, handle people hardcoding -fsanitize=fuzzer and using libFuzzingEngine.a for linking.
/gcbrun trial_build.py c c++ --fuzzing-engines libfuzzer --sanitizers address |
No description provided.