aboutsummaryrefslogtreecommitdiffhomepage
path: root/projects/qubes-os
Commit message (Collapse)AuthorAge
* qubes-os: disable ubsan (#1564)Gravatar Marek Marczykowski-Górecki2018-06-25
| | | | | input-proxy (the only fuzzer target for now) have only 1 UBSan call right now, which doesn't make much sense to fuzz. Disable it, until input-proxy gets more complex for that.
* Remove buggy libqubes-rpc-filecopy for now (#1376)Gravatar Paras Chetal2018-04-29
|
* qubes-os: add app-linux-input-proxy fuzzer (#1340)Gravatar Marek Marczykowski-Górecki2018-04-23
|
* [qubes-os] Initial integration of libqubes-rpc-filecopy fuzz target (#679)Gravatar Paras Chetal2017-06-16
| | | | | | | | | | * Add Dockerfile for qubes-linux-utils build * Add the outline for fuzzer build * Integrate libqubes-rpc-filecopy * Remove BACKEND_VMM env var
* [qubes-os] New project: Qubes OS (#637)Gravatar Jean-Philippe Ouellet2017-05-31
Qubes OS wishes to improve its automated testing pipeline in various ways, one of which being the introduction of continuous fuzzing. The initial work will be performed by Paras Chetal as part of his Google Summer of Code project [1], for which I am the mentor. There are many pieces of code in Qubes OS which could benefit from fuzzing, but initial focus is currently on the inter-vm file-copy unpacker, and the GUI protocol [2][3]. According to [4], the way to request a new project be added to oss-fuzz is for a member of the project to submit a PR here. I'm not an official member of the Qubes OS team [5], but I am an active contributor. Hopefully that's good enough... [1]: https://summerofcode.withgoogle.com/projects/#5530206738579456 [2]: https://www.qubes-os.org/doc/gui/ [3]: https://github.com/QubesOS/qubes-gui-daemon/blob/master/gui-daemon/xside.c [4]: https://github.com/google/oss-fuzz#accepting-new-projects [5]: https://www.qubes-os.org/team/