qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Paolo Bonzini <pbonzini@redhat.com>
To: qemu-devel@nongnu.org
Cc: Alexander Bulekov <alxndr@bu.edu>,
	Darren Kenny <darren.kenny@oracle.com>
Subject: [PULL 06/36] docs/fuzz: add some information about OSS-Fuzz
Date: Fri, 29 Jan 2021 12:17:44 +0100	[thread overview]
Message-ID: <20210129111814.566629-7-pbonzini@redhat.com> (raw)
In-Reply-To: <20210129111814.566629-1-pbonzini@redhat.com>

From: Alexander Bulekov <alxndr@bu.edu>

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
Reviewed-by: Darren Kenny <darren.kenny@oracle.com>
Message-Id: <20210117230924.449676-3-alxndr@bu.edu>
---
 docs/devel/fuzzing.rst | 30 ++++++++++++++++++++++++++++++
 1 file changed, 30 insertions(+)

diff --git a/docs/devel/fuzzing.rst b/docs/devel/fuzzing.rst
index 5f5200c843..97797c4f8c 100644
--- a/docs/devel/fuzzing.rst
+++ b/docs/devel/fuzzing.rst
@@ -180,6 +180,36 @@ To ensure that these env variables have been configured correctly, we can use::
 
 The output should contain a complete list of matched MemoryRegions.
 
+OSS-Fuzz
+--------
+QEMU is continuously fuzzed on `OSS-Fuzz` __(https://github.com/google/oss-fuzz).
+By default, the OSS-Fuzz build will try to fuzz every fuzz-target. Since the
+generic-fuzz target requires additional information provided in environment
+variables, we pre-define some generic-fuzz configs in
+``tests/qtest/fuzz/generic_fuzz_configs.h``. Each config must specify:
+
+- ``.name``: To identify the fuzzer config
+
+- ``.args`` OR ``.argfunc``: A string or pointer to a function returning a
+  string.  These strings are used to specify the ``QEMU_FUZZ_ARGS``
+  environment variable.  ``argfunc`` is useful when the config relies on e.g.
+  a dynamically created temp directory, or a free tcp/udp port.
+
+- ``.objects``: A string that specifies the ``QEMU_FUZZ_OBJECTS`` environment
+  variable.
+
+To fuzz additional devices/device configuration on OSS-Fuzz, send patches for
+either a new device-specific fuzzer or a new generic-fuzz config.
+
+Build details:
+
+- The Dockerfile that sets up the environment for building QEMU's
+  fuzzers on OSS-Fuzz can be fund in the OSS-Fuzz repository
+  __(https://github.com/google/oss-fuzz/blob/master/projects/qemu/Dockerfile)
+
+- The script responsible for building the fuzzers can be found in the
+  QEMU source tree at ``scripts/oss-fuzz/build.sh``
+
 Implementation Details / Fuzzer Lifecycle
 -----------------------------------------
 
-- 
2.29.2




  parent reply	other threads:[~2021-01-29 11:37 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-01-29 11:17 [PULL 00/36] Misc patches (buildsys, i386, fuzzing) for 2021-01-29 Paolo Bonzini
2021-01-29 11:17 ` [PULL 01/36] fuzz: ignore address_space_map is_write flag Paolo Bonzini
2021-01-29 11:17 ` [PULL 02/36] fuzz: refine the ide/ahci fuzzer configs Paolo Bonzini
2021-01-29 11:17 ` [PULL 03/36] docs/fuzz: fix pre-meson path Paolo Bonzini
2021-01-29 11:17 ` [PULL 04/36] fuzz: log the arguments used to initialize QEMU Paolo Bonzini
2021-01-29 11:17 ` [PULL 05/36] fuzz: enable dynamic args for generic-fuzz configs Paolo Bonzini
2021-01-29 11:17 ` Paolo Bonzini [this message]
2021-01-29 11:17 ` [PULL 07/36] fuzz: add virtio-9p configurations for fuzzing Paolo Bonzini
2021-01-29 11:17 ` [PULL 08/36] target/i386: do not set LM for 32-bit emulation "-cpu host/max" Paolo Bonzini
2021-01-29 11:17 ` [PULL 09/36] machine: add missing doc for memory-backend option Paolo Bonzini
2021-01-29 11:17 ` [PULL 10/36] meson: accept either shared or static libraries if --disable-static Paolo Bonzini
2021-01-29 11:17 ` [PULL 11/36] meson: honor --enable-rbd if cc.links test fails Paolo Bonzini
2021-01-29 11:17 ` [PULL 12/36] x86/cpu: Populate SVM CPUID feature bits Paolo Bonzini
2021-01-29 11:17 ` [PULL 13/36] fuzz: fix wrong index in clear_bits Paolo Bonzini
2021-01-29 11:17 ` [PULL 14/36] docs: don't install corresponding man page if guest agent is disabled Paolo Bonzini
2021-01-29 11:17 ` [PULL 15/36] virtio-scsi: don't uninitialize queues that we didn't initialize Paolo Bonzini
2021-01-29 11:17 ` [PULL 16/36] event_notifier: handle initialization failure better Paolo Bonzini
2021-01-29 11:17 ` [PULL 17/36] target/i386: Fix decoding of certain BMI instructions Paolo Bonzini
2021-01-29 11:17 ` [PULL 18/36] target/i86: implement PKS Paolo Bonzini
2021-01-29 11:17 ` [PULL 19/36] configure: Fix --enable-tcg-interpreter Paolo Bonzini
2021-01-29 11:17 ` [PULL 20/36] configure: Improve TCI feature description Paolo Bonzini
2021-01-29 11:17 ` [PULL 21/36] meson: Explicit TCG backend used Paolo Bonzini
2021-01-29 11:18 ` [PULL 22/36] meson: Warn when TCI is selected but TCG backend is available Paolo Bonzini
2021-01-29 11:18 ` [PULL 23/36] slirp: update to git master Paolo Bonzini
2021-01-29 11:18 ` [PULL 24/36] build-sys: make libslirp a meson subproject Paolo Bonzini
2021-01-29 11:18 ` [PULL 25/36] tests/meson: Only build softfloat objects if TCG is selected Paolo Bonzini
2021-01-29 11:18 ` [PULL 26/36] pc-bios/meson: Only install EDK2 blob firmwares with system emulation Paolo Bonzini
2021-01-29 11:18 ` [PULL 27/36] meson: Restrict block subsystem processing Paolo Bonzini
2021-01-29 11:18 ` [PULL 28/36] meson: Merge trace_events_subdirs array Paolo Bonzini
2021-01-29 11:18 ` [PULL 29/36] meson: Restrict some trace event directories to user/system emulation Paolo Bonzini
2021-01-29 11:18 ` [PULL 30/36] meson: Restrict emulation code Paolo Bonzini
2021-01-29 11:18 ` [PULL 31/36] qapi/meson: Restrict qdev code to system-mode emulation Paolo Bonzini
2021-01-29 11:18 ` [PULL 32/36] qapi/meson: Remove QMP from user-mode emulation Paolo Bonzini
2021-01-29 11:18 ` [PULL 33/36] qapi/meson: Restrict system-mode specific modules Paolo Bonzini
2021-01-29 11:18 ` [PULL 34/36] qapi/meson: Restrict UI module to system emulation and tools Paolo Bonzini
2021-01-29 11:18 ` [PULL 35/36] hvf: Fetch cr4 before evaluating CPUID(1) Paolo Bonzini
2021-01-29 11:18 ` [PULL 36/36] accel/kvm/kvm-all: Fix wrong return code handling in dirty log code Paolo Bonzini
2021-01-29 19:49 ` [PULL 00/36] Misc patches (buildsys, i386, fuzzing) for 2021-01-29 Peter Maydell
2021-01-29 19:54   ` Paolo Bonzini
2021-01-30 10:11     ` Marc-André Lureau
2021-01-30 11:14       ` Peter Maydell

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210129111814.566629-7-pbonzini@redhat.com \
    --to=pbonzini@redhat.com \
    --cc=alxndr@bu.edu \
    --cc=darren.kenny@oracle.com \
    --cc=qemu-devel@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).