-
Notifications
You must be signed in to change notification settings - Fork 336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fuzzing: cifuzz workflow, fix oss-fuzz issues, updated dir name #1327
Conversation
FAQUpload CrashUpload Crash uses artifacts to save crashes found by fuzzing as artifacts.
Upload SarifThere is no proper information available that I could find. |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
I doubt that.
Let's wait for 24 hours and then see. Edit: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This
conf: add %Z to resolve oss-fuzz issue 69758 use-of-uninitialized-value
Signed-off-by: Arjun <[email protected]>
Could do with a commit message, I wasn't even aware (or if I was I had completely forgotten) that nxt_sprintf() doesn't nul-terminate strings by default.
But then at the very least it probably also needs a
Co-developed-by: Zhidao HONG <[email protected]>
Signed-off-by: Zhidao HONG <[email protected]>
@hongzhidao are you OK with that?
The commit subject prefix could probably be tstr, conf:
. Perhaps something like
tstr, conf: Ensure error strings are nul-terminated
Are these bug reports publicly accessible?
If not I don't think we should mention specific bug numbers but just a general 'found with oss-fuss`, if so, it would be better to reference it with a link
Link: <https://oss-fuzz.com/testcase-detail/5545917827055616>
I think it would actually be better to open a separate pull-request for this where we can discuss the finer details and to get this fix in...
I'm fine with it.
Yep, it's not nul-temmiate by default.
We could show the concrete function Btw, I'd like to use |
It it's in a separate PR then it's not reliant on getting this whole thing in...
Yes, that would be part of the commit message explaining that you need to explicitly nul-terminate the string.
You can have multiple So the whole thing might look like
The second link may or may not be included, depending if it's publicly accessible or not... |
If you're good with the commit message etc, then I'm happy to merge this patch in and then it can simply be dropped from this PR... EDIT: Nuts, only I can't because it would need approving... I'll create a new PR for this patch... |
PR for bug fix #1342 |
OK @pkillarjun you can remove this patch from this PR now, thanks!
|
This can be merge now. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi, regarding
fuzzing: fix Null-dereference 69754, 69745, 69741
I assume those numbers are some bug ticket references?
As a rule we don't put those kinds of things in the commit subject. If those things are publicly accessible then you can reference them via Link:
tags...
However...
This is just in the fuzzing code, not in Unit right?
So is this fixing fuzzing code that was previously committed?
If so it could do with a Fixes:
tag, e.g
Fixes: SHORT_HASH ("COMMIT_SUBJECT")
E.g
Fixes: c1e3f02f9 ("Compile with -fno-strict-overflow")
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nuts!
fuzzing: updated build-fuzz.sh help echo dir
This could do with a
Fixes: 965fc94e4 ("fuzzing: add fuzzing infrastructure in build system")
I also notice the ./fuzzing/README.md
still has a bunch of references to src/fuzz/
Hi @pkillarjun The If those commits are fixing previous commits, please explain in the commit message what they are fixing. |
ff9a484
to
91a4bfd
Compare
Alright, thanks. |
Signed-off-by: Arjun <[email protected]> Signed-off-by: Andrew Clayton <[email protected]>
There are multiple false positive bugs in harness due to improper use of the internal API. Fixes: a93d878 ("fuzzing: add fuzzing targets") Signed-off-by: Arjun <[email protected]> [ Removed private links - Andrew ] Signed-off-by: Andrew Clayton <[email protected]>
Fixes: 965fc94 ("fuzzing: add fuzzing infrastructure in build system") Fixes: 5b65134 ("fuzzing: add a basic README") Signed-off-by: Arjun <[email protected]> Signed-off-by: Andrew Clayton <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks Arjun!
Continuing the fuzzing integration: #1291.
Adding cifuzz for checking build failures and PR fuzzing.
Using the main example provided by the OSS-Fuzz team, with an updated time of only 300 seconds.