Marek Marczykowski-Górecki
9d49131473
qubes-os: disable ubsan ( #1564 )
...
input-proxy (the only fuzzer target for now) have only 1 UBSan call right
now, which doesn't make much sense to fuzz. Disable it, until
input-proxy gets more complex for that.
2018-06-25 08:35:22 -07:00
Paras Chetal
d9f615a97c
Remove buggy libqubes-rpc-filecopy for now ( #1376 )
2018-04-29 07:17:05 -07:00
Marek Marczykowski-Górecki
e01619962e
qubes-os: add app-linux-input-proxy fuzzer ( #1340 )
2018-04-23 12:25:11 -07:00
Paras Chetal
2d577f5251
[qubes-os] Initial integration of libqubes-rpc-filecopy fuzz target ( #679 )
...
* Add Dockerfile for qubes-linux-utils build
* Add the outline for fuzzer build
* Integrate libqubes-rpc-filecopy
* Remove BACKEND_VMM env var
2017-06-16 08:43:59 -07:00
Jean-Philippe Ouellet
b794dfe099
[qubes-os] New project: Qubes OS ( #637 )
...
Qubes OS wishes to improve its automated testing pipeline in various
ways, one of which being the introduction of continuous fuzzing.
The initial work will be performed by Paras Chetal as part of his
Google Summer of Code project [1], for which I am the mentor.
There are many pieces of code in Qubes OS which could benefit from
fuzzing, but initial focus is currently on the inter-vm file-copy
unpacker, and the GUI protocol [2][3].
According to [4], the way to request a new project be added to oss-fuzz
is for a member of the project to submit a PR here. I'm not an official
member of the Qubes OS team [5], but I am an active contributor.
Hopefully that's good enough...
[1]: https://summerofcode.withgoogle.com/projects/#5530206738579456
[2]: https://www.qubes-os.org/doc/gui/
[3]: https://github.com/QubesOS/qubes-gui-daemon/blob/master/gui-daemon/xside.c
[4]: https://github.com/google/oss-fuzz#accepting-new-projects
[5]: https://www.qubes-os.org/team/
2017-05-31 09:14:10 -07:00