All of lore.kernel.org
 help / color / mirror / Atom feed
From: Paolo Bonzini <pbonzini@redhat.com>
To: qemu-devel@nongnu.org
Cc: Alexander Bulekov <alxndr@bu.edu>
Subject: [PULL 04/20] scripts/oss-fuzz: rename bin/qemu-fuzz-i386
Date: Wed,  4 Nov 2020 10:01:37 -0500	[thread overview]
Message-ID: <20201104150153.541326-5-pbonzini@redhat.com> (raw)
In-Reply-To: <20201104150153.541326-1-pbonzini@redhat.com>

From: Alexander Bulekov <alxndr@bu.edu>

OSS-Fuzz changed the way it scans for fuzzers in $DEST_DIR. The new code
also scans subdirectories for fuzzers. This means that OSS-Fuzz is
considering bin/qemu-fuzz-i386 as an independent fuzzer (it is not - it
requires a --fuzz-target argument). This has led to coverage-build
failures and false crash reports. To work around this, we take advantage
of OSS-Fuzz' filename extension check - OSS-Fuzz will not run anything
that has an extension that is not ".exe":
https://github.com/google/oss-fuzz/blob/master/infra/utils.py#L115

Reported-by: OSS-Fuzz (Issue 26725)
Reported-by: OSS-Fuzz (Issue 26679)
Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
Message-Id: <20201101212245.185819-1-alxndr@bu.edu>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
---
 scripts/oss-fuzz/build.sh | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/scripts/oss-fuzz/build.sh b/scripts/oss-fuzz/build.sh
index fcae4a0c26..3b1c82b63d 100755
--- a/scripts/oss-fuzz/build.sh
+++ b/scripts/oss-fuzz/build.sh
@@ -91,7 +91,7 @@ make "-j$(nproc)" qemu-fuzz-i386 V=1
 # Copy over the datadir
 cp  -r ../pc-bios/ "$DEST_DIR/pc-bios"
 
-cp "./qemu-fuzz-i386" "$DEST_DIR/bin/"
+cp "./qemu-fuzz-i386" "$DEST_DIR/bin/qemu-fuzz-i386.base"
 
 # Run the fuzzer with no arguments, to print the help-string and get the list
 # of available fuzz-targets. Copy over the qemu-fuzz-i386, naming it according
@@ -104,7 +104,7 @@ do
     # that are thin wrappers around this target that set the required
     # environment variables according to predefined configs.
     if [ "$target" != "generic-fuzz" ]; then
-        ln  "$DEST_DIR/bin/qemu-fuzz-i386" \
+        ln  "$DEST_DIR/bin/qemu-fuzz-i386.base" \
             "$DEST_DIR/qemu-fuzz-i386-target-$target"
     fi
 done
-- 
2.26.2




  parent reply	other threads:[~2020-11-04 15:05 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-11-04 15:01 [PULL 00/20] Misc patches for QEMU 5.2-rc1 Paolo Bonzini
2020-11-04 15:01 ` [PULL 01/20] cutils: replace strdup with g_strdup Paolo Bonzini
2020-11-04 15:01 ` [PULL 02/20] docs: expand sourceset documentation Paolo Bonzini
2020-11-04 15:01 ` [PULL 03/20] exec: Remove dead code (CID 1432876) Paolo Bonzini
2020-11-04 15:01 ` Paolo Bonzini [this message]
2020-11-04 15:01 ` [PULL 05/20] hw/isa/lpc_ich9: Ignore reserved/invalid SCI IRQ Paolo Bonzini
2020-11-04 15:01 ` [PULL 06/20] qtest: add a reproducer for LP#1878642 Paolo Bonzini
2020-11-04 15:01 ` [PULL 07/20] meson: use b_staticpic=false for meson >=0.56.0 Paolo Bonzini
2020-11-04 15:01 ` [PULL 08/20] meson: vhost-user-gpu/virtiofsd: use absolute path Paolo Bonzini
2020-11-04 15:01 ` [PULL 09/20] tests/qtest/libqtest.c: Check for setsockopt() failure Paolo Bonzini
2020-11-04 15:01 ` [PULL 10/20] tests/qtest/libqos/ahci.c: Avoid NULL dereference in ahci_exec() Paolo Bonzini
2020-11-04 15:01 ` [PULL 11/20] meson: fix warning for bad sphinx-build Paolo Bonzini
2020-11-04 15:01 ` [PULL 12/20] configure: fix gio_libs reference Paolo Bonzini
2020-11-04 15:01 ` [PULL 13/20] tests/qtest: Fix potential NULL pointer dereference in qos_build_main_args() Paolo Bonzini
2020-11-04 15:01 ` [PULL 14/20] fuzz: fix writing DMA patterns Paolo Bonzini
2020-11-04 15:01 ` [PULL 15/20] fuzz: check the MR in the DMA callback Paolo Bonzini
2020-11-04 15:01 ` [PULL 16/20] fuzz: fuzz offsets within pio/mmio regions Paolo Bonzini
2020-11-04 15:01 ` [PULL 17/20] semihosting: fix order of initialization functions Paolo Bonzini
2020-11-04 15:01 ` [PULL 18/20] qapi, qemu-options: make all parsing visitors parse boolean options the same Paolo Bonzini
2020-11-04 15:01 ` [PULL 19/20] ivshmem-test: do not use short-form boolean option Paolo Bonzini
2020-11-04 15:01 ` [PULL 20/20] qtest: escape device name in device-introspect-test Paolo Bonzini

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20201104150153.541326-5-pbonzini@redhat.com \
    --to=pbonzini@redhat.com \
    --cc=alxndr@bu.edu \
    --cc=qemu-devel@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.