[GSoC] Progress report : Analysis of Qubes code base #1

54 views
Skip to first unread message

Paras Chetal

unread,
Jun 9, 2017, 8:20:00 AM6/9/17
to qubes...@googlegroups.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

The progress report for the past ten days (sorry for being late) is as
follows.

Blog post:
https://paraschetal.in/gsoc-progress-report01

Summary:
In the first ten days of GSoC:

* Qubes OS was accepted to run on oss-fuzz.
* The Dockerfile for building the project base image is complete.
* The build script for the fuzz target of libqubes-rpc-filecopy is
complete.
* The fuzz target successfully builds locally with the helper oss-fuzz
script.
* The fuzz target successfully runs locally with the helper oss-fuzz
script.

Code:
https://github.com/paraschetal/oss-fuzz/tree/qubes-linux-utils
https://github.com/paraschetal/qubes-linux-utils/tree/fuzz


So overall, the integration with oss-fuzz is now almost done. The
first time was a bit of a hurdle, since the whole environment was new
and took a lot of time to debug (building the docker images every time
I had to change a line took ~15 min). From now onward, adding more
fuzz targets should be smooth sailing because now I am well aware of
the environment. The next task will be to improve upon the coverage of
the fuzz targets and to add more of them. I will appreciate any
feedback and suggestions.

Thank You.

Sincere regards,
Paras Chetal
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJZOpJaAAoJEA4SQJU2s0ILSQUIAIjZhZbBMLm2bwa9IkvHucrB
DUwOawaMVfZkiidrRKYfDW00Ull5BdeBWCnbgGGMGiwttuZSsWTMSSc67u9wWhY3
Mnk8g7LrFMfHsCw72Sb3YCzGglXc5NzV8Tl5Zssm1v8CpVLV00N/P2F51YKC3ceh
8yDu0ceLEh3tDkGiBV+/oR4r7wdgXnsF7SOZ7XqziEtRvmffayrF4IKGPA4T32q7
ejcQVnuGmSOexq21FUQldN+qRzK3/3H0NFDzaUTs6DgRksN+rbQYnp5OTfNenkRG
bwS2RrAn35Ct/VsgFJ6OUcgsy7LJ0Ll6Fu0HEvkj5ikV3Rpd72u2/jTsRIbzMKg=
=mbMu
-----END PGP SIGNATURE-----
Reply all
Reply to author
Forward
0 new messages