-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
The progress report for the past ten days (sorry for being late) is as
follows.
Blog post:
https://paraschetal.in/gsoc-progress-report01
Summary:
In the first ten days of GSoC:
* Qubes OS was accepted to run on oss-fuzz.
* The Dockerfile for building the project base image is complete.
* The build script for the fuzz target of libqubes-rpc-filecopy is
complete.
* The fuzz target successfully builds locally with the helper oss-fuzz
script.
* The fuzz target successfully runs locally with the helper oss-fuzz
script.
Code:
https://github.com/paraschetal/oss-fuzz/tree/qubes-linux-utils
https://github.com/paraschetal/qubes-linux-utils/tree/fuzz
So overall, the integration with oss-fuzz is now almost done. The
first time was a bit of a hurdle, since the whole environment was new
and took a lot of time to debug (building the docker images every time
I had to change a line took ~15 min). From now onward, adding more
fuzz targets should be smooth sailing because now I am well aware of
the environment. The next task will be to improve upon the coverage of
the fuzz targets and to add more of them. I will appreciate any
feedback and suggestions.
Thank You.
Sincere regards,
Paras Chetal
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJZOpJaAAoJEA4SQJU2s0ILSQUIAIjZhZbBMLm2bwa9IkvHucrB
DUwOawaMVfZkiidrRKYfDW00Ull5BdeBWCnbgGGMGiwttuZSsWTMSSc67u9wWhY3
Mnk8g7LrFMfHsCw72Sb3YCzGglXc5NzV8Tl5Zssm1v8CpVLV00N/P2F51YKC3ceh
8yDu0ceLEh3tDkGiBV+/oR4r7wdgXnsF7SOZ7XqziEtRvmffayrF4IKGPA4T32q7
ejcQVnuGmSOexq21FUQldN+qRzK3/3H0NFDzaUTs6DgRksN+rbQYnp5OTfNenkRG
bwS2RrAn35Ct/VsgFJ6OUcgsy7LJ0Ll6Fu0HEvkj5ikV3Rpd72u2/jTsRIbzMKg=
=mbMu
-----END PGP SIGNATURE-----