-
Notifications
You must be signed in to change notification settings - Fork 11
Upload fuzz_ppd harness #6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Add fuzz_ppd harness for fuzzing, add build rules and seed corpus files.
d96ec71 to
a3f8124
Compare
|
Thank you for your contribution. The code looks good to me but please allow some time for testing the availability of the harness before merging, so it can be adopted into the OSS-Fuzz testing loop. Meanwhile, In line with the Open Source principles upheld by OpenPrinting, could you provide either the script (not the binary) or a description of how to generate the newly added three fuzz corpora located in |
|
The seed files for this harness can be generated this way, where echo -n -e "Letter\0na-letter\0roll_max_36.1025x3622.0472in\0 4x6\0Foo\0foo=buz option=option Foo=Buz tag=fooz\0datanum1920\0datanum1080\0" > 1
cat cups/test.ppd >> 1
echo -n -e "A4\0Letter\0iso_a4_210x297mm\0 2x8\0Option\0Option=Bar Foo=Buz AL=666 Astra=Aspera\0datanum1337\0datanum4242\0 " > 2
cat cups/test2.ppd >> 2
echo -n -e "A4\0A4\0iso_a4_210x297mm\0 2x8\0Astra\0Per=Aspera Ad=Astra\0datanum2048\0datanum2048\0 " > 3
cat cups/test2.ppd >> 3Arguments separated by '\0' because of the use of the |
Thank you for the detailed documentation regarding the fuzzing corpora. I will update the corresponding README. The local building for |
|
Ok! Thank you so much! |
|
Just a friendly reminder. |
Signed-off-by: TTFISH <jiongchiyu@gmail.com> Co-authored-by: k-furman <k-furman@users.noreply.github.com>
Direct leak exist in fuzzing harness, need refine and fix the issue first, then enable for production OSS-Fuzz. Signed-off-by: TTFISH <jiongchiyu@gmail.com>
|
Many thanks for your contribution! Currently the harness still exhibits memory-related issues within the OSS-Fuzz framework. The memory allocation within the harness requires revisions to properly manage the memory lifecycle. We will enable the harness after fixing this problem :) |
Add fuzz_ppd harness for fuzzing,
add build rules and seed corpus files.
This harness has been tested on the aflplusplus/aflplusplus docker container with these specifications:
Project was built this way:
Fuzzing runs like this:
Works well for afl-fuzz.