jonathanmetzman
0a1c3c67c9
Enable i386 fuzzing on another 11 projects ( #2752 )
2019-08-23 11:59:56 -04:00
Marta Marczykowska-Górecka
3c93f4ffc0
Added integration for qubes-core-qubesdb ( #2540 )
...
* Added integration for qubes-core-qubesdb
Integration for qubesdb daemon used for communication between VMs.
* Build qubes fuzzers only for the appropriate sanitizer
2019-06-26 17:29:47 -07:00
Marek Marczykowski-Górecki
9d49131473
qubes-os: disable ubsan ( #1564 )
...
input-proxy (the only fuzzer target for now) have only 1 UBSan call right
now, which doesn't make much sense to fuzz. Disable it, until
input-proxy gets more complex for that.
2018-06-25 08:35:22 -07:00
Jean-Philippe Ouellet
b794dfe099
[qubes-os] New project: Qubes OS ( #637 )
...
Qubes OS wishes to improve its automated testing pipeline in various
ways, one of which being the introduction of continuous fuzzing.
The initial work will be performed by Paras Chetal as part of his
Google Summer of Code project [1], for which I am the mentor.
There are many pieces of code in Qubes OS which could benefit from
fuzzing, but initial focus is currently on the inter-vm file-copy
unpacker, and the GUI protocol [2][3].
According to [4], the way to request a new project be added to oss-fuzz
is for a member of the project to submit a PR here. I'm not an official
member of the Qubes OS team [5], but I am an active contributor.
Hopefully that's good enough...
[1]: https://summerofcode.withgoogle.com/projects/#5530206738579456
[2]: https://www.qubes-os.org/doc/gui/
[3]: https://github.com/QubesOS/qubes-gui-daemon/blob/master/gui-daemon/xside.c
[4]: https://github.com/google/oss-fuzz#accepting-new-projects
[5]: https://www.qubes-os.org/team/
2017-05-31 09:14:10 -07:00