Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/devel/honggfuzz honggfuzz: upgrade to 2.3



details:   https://anonhg.NetBSD.org/pkgsrc/rev/3c1ca60a8bfb
branches:  trunk
changeset: 435988:3c1ca60a8bfb
user:      kamil <kamil%pkgsrc.org@localhost>
date:      Wed Jul 22 20:43:22 2020 +0000

description:
honggfuzz: upgrade to 2.3

Take maintainership.

Upstream changelog:

2020-07-22 - Version 2.3
        - honggfuzz.h - split run_t into substructs
        - clang-format options in .clang-format
        - added missing mutex initializers
        - removed unncessary comparisons to 'true' and 'false'
        - improved NetBSD compatibility
        - removed unnecessary memory fences (speed ups)
        - faster searching through the binary for const 4/8-byte values
        - removed unnecessary includes with iwyu
        - libhfnetdriver - general improvements around local socket fuzzing and timeouts

2020-04-24 - Version 2.2
        - Added 8bitcnt instrumentation - use hfuzz-cc/hfuzz-8bitcnt-(gcc|clang) for that
        - PC-guard instrumentation now uses edge counting
        - --experimental_const_feedback is now set to true by default
        - additional string instrumentation wrappers: glib, lcms
        - additional mutators: splicing, changing ascii numbers
        - additional integer comparison instrumentation (adding integers to the dynamic dictionary)
        - fixed linking with ld.lld
        - removed `sanitizer-coverage-prune-blocks` from hfuzz-cc.c
        - most mutators have now either overwrite or insert versions
        - fixed memory barriers in libhfuzz/
        - implemented skip_factor which dictates how often a given input is fuzzed
        - lowered the default timeout to 1 second
        - honggfuzz now uses microseconds, instead of milliseconds across the code
        - added some new functions to libhfcommon/files
        - enabled more aggressive inlining in hfuzz-cc/
        - fixed compilation dependency under MacOS X

2020-03-03 - Version 2.1
        - string/int comparison enabled for targets built with *SAN, but w/o hfuzz-cc
        - Parallel work made faster by using faster ATOMIC constructs (check first, then update)
        - Implement --experimental_const_feedback - const string/integer feedback (used as an additional dictionary)
        - Sanitizer report files are "better"-deleted (i.e. based on PID and not TID)
        - New patches for fuzzing added (e.g. for bind-9.16.0/9.15.7)
        - Buffered output enabled in display.c
        - Some functions moved from per-arch arch.c to common subproc.c
        - Compilation under MacOS X 10.15 (Catalina) is now supported
        - Added suport for bfd/binutils-2.33

2019-12-07 - Version 2.0
        - Coverage-based corpus minimizer with '-M'
        - QEmu mode: coverage feedback for Linux binaries
        - *SAN sanitizer stack-parsing improved for Linux and for POSIX
        - Move signal functionality to libhfcommon/
        - Fixed Android builds with newer unwind and capstone
        - NetDriver: more functionality - e.g. specifying custom addresses and custom tmpfs mount points
        - Examples: for /usr/bin/file, newer ISC Bind patch, improved OpenSSL code

2019-05-22 - Version 1.9
        - Don't include netdriver if not needed
        - Updated examples (bind/openssl)
        - Add missing TEMP_FAILURE_RETRY() wrappers
        - Add additional _HF_STATE_DYNAMIC_SWITCH_TO_MAIN state

2019-02-23 - Version 1.8
        - Native support for NetBSD
        - Multiple smaller changes wrt threading - e.g. introducing the signal thread
        - Removed the support for -p (pid fuzzing), honggfuzz net driver, or persistent fuzzing mode should be used instead
        - Reimplementation of memory comparison routines, now verified with glibc's test-suite
        - Improved hfuzz-cc/clang/gcc - e.g. for the MacOSX platform, also using -fno-sanitize=fuzzer if -fsanitize=fuzzer is specified, + some samba code wrappers
        - Examples: new corpora for some of those, new patch for ISC Bind (9.13.5)

diffstat:

 devel/honggfuzz/Makefile |   8 +++++---
 devel/honggfuzz/PLIST    |  13 ++++++++++++-
 devel/honggfuzz/distinfo |  11 ++++++-----
 3 files changed, 23 insertions(+), 9 deletions(-)

diffs (62 lines):

diff -r a7bd0d9f54d6 -r 3c1ca60a8bfb devel/honggfuzz/Makefile
--- a/devel/honggfuzz/Makefile  Wed Jul 22 20:41:30 2020 +0000
+++ b/devel/honggfuzz/Makefile  Wed Jul 22 20:43:22 2020 +0000
@@ -1,14 +1,16 @@
-# $NetBSD: Makefile,v 1.1 2018/08/23 22:08:07 kamil Exp $
+# $NetBSD: Makefile,v 1.2 2020/07/22 20:43:22 kamil Exp $
 
-DISTNAME=      honggfuzz-1.7
+DISTNAME=      honggfuzz-2.3
 CATEGORIES=    devel
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=google/}
 
-MAINTAINER=    tomsun.0.7%gmail.com@localhost
+MAINTAINER=    kamil%NetBSD.org@localhost
 HOMEPAGE=      https://github.com/google/honggfuzz/
 COMMENT=       Security oriented fuzzer based on code coverage
 LICENSE=       apache-2.0
 
+FORTIFY_SUPPORTED=     no # fortify-source intercepts some functions
+
 USE_TOOLS+=    bash:run gmake
 
 .include "../../lang/libBlocksRuntime/buildlink3.mk"
diff -r a7bd0d9f54d6 -r 3c1ca60a8bfb devel/honggfuzz/PLIST
--- a/devel/honggfuzz/PLIST     Wed Jul 22 20:41:30 2020 +0000
+++ b/devel/honggfuzz/PLIST     Wed Jul 22 20:43:22 2020 +0000
@@ -1,7 +1,18 @@
-@comment $NetBSD: PLIST,v 1.1 2018/08/23 22:08:07 kamil Exp $
+@comment $NetBSD: PLIST,v 1.2 2020/07/22 20:43:22 kamil Exp $
 bin/hfuzz-cc
 bin/hfuzz-clang
 bin/hfuzz-clang++
 bin/hfuzz-g++
 bin/hfuzz-gcc
 bin/honggfuzz
+include/libhfcommon/common.h
+include/libhfcommon/files.h
+include/libhfcommon/log.h
+include/libhfcommon/ns.h
+include/libhfcommon/util.h
+include/libhfuzz/fetch.h
+include/libhfuzz/instrument.h
+include/libhfuzz/libhfuzz.h
+include/libhfuzz/performance.h
+include/libhfuzz/persistent.h
+include/libhnetdriver/netdriver.h
diff -r a7bd0d9f54d6 -r 3c1ca60a8bfb devel/honggfuzz/distinfo
--- a/devel/honggfuzz/distinfo  Wed Jul 22 20:41:30 2020 +0000
+++ b/devel/honggfuzz/distinfo  Wed Jul 22 20:43:22 2020 +0000
@@ -1,6 +1,7 @@
-$NetBSD: distinfo,v 1.1 2018/08/23 22:08:07 kamil Exp $
+$NetBSD: distinfo,v 1.2 2020/07/22 20:43:22 kamil Exp $
 
-SHA1 (honggfuzz-1.7.tar.gz) = ab7163cb72178dee16c4593cc3478153c4247dc8
-RMD160 (honggfuzz-1.7.tar.gz) = 39fe9163d8635a5dc70444ad5dbe77fe47d17e00
-SHA512 (honggfuzz-1.7.tar.gz) = d7d9cdba67fc7cabb6991850d725f13377614785b397acbeae6c5d64414ae826ac1c8c7fc0fb2ce83d1e5d2df64875a39df0160367d2d8e244b996d8de0d08d2
-Size (honggfuzz-1.7.tar.gz) = 70077774 bytes
+SHA1 (honggfuzz-2.3.tar.gz) = 0cca7144d2785c8d54277f4057692906dd812b48
+RMD160 (honggfuzz-2.3.tar.gz) = 49596ddcc9703af0d57cc19c1809612f3f1002c5
+SHA512 (honggfuzz-2.3.tar.gz) = b06906595ec59dbe1ccffeb55ecf4f309b6f7b0fdce268d0528de05c4f1537b71c5056638ec419a1f875484e0120d45f32b8bec1b485060ebedde58aa16b5842
+Size (honggfuzz-2.3.tar.gz) = 65223517 bytes
+SHA1 (patch-Makefile) = b0d9745bec55ac9f395a71036f2cf5805301f0de



Home | Main Index | Thread Index | Old Index