-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adds project suricata #2533
Adds project suricata #2533
Conversation
Travis seems to fail because my corpus building bash magic is too verbose... For instance, we have a corpus of about 50 000 rules and it gets computed with What should we do about it ? |
Can you redirect that output to >/dev/null. Log output is good to be readable. For future build breaks, it will make debugging harder with such big logs. |
Just like that ? |
You can verify locally with infra/helper.py. |
Yes, it is running... |
This does not seem to work.
So, I am trying something else |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The change looks good, but I don't see @victorjulien on the upstream contributors page: https://github.com/OISF/suricata/graphs/contributors
I do see Victor at this page though: https://github.com/orgs/OISF/people
So awaiting on the confirmation :)
projects/suricata/Dockerfile
Outdated
@@ -0,0 +1,34 @@ | |||
# Copyright 2018 Google Inc. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: 2019
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in the other files as well :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok
|
||
# build corpuses | ||
# default configuration file | ||
zip -r $OUT/fuzz_confyamlloadstring_seed_corpus.zip suricata.yaml |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is suricata.yaml
a directory? If not, are there any other potential seed inputs?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is suricata.yaml a directory?
No this is a single file (the default configuration)
I do not think of other available inputs...
He is the main contributor but as his profile says https://github.com/inliniac moved to https://github.com/victorjulien |
Please hold on this. I would like to make sure we have the necessary support merged in our git repo first. Also, due to team availability over the summer, it would work a lot better for us to start this in the fall. |
fe897ed
to
ca49159
Compare
Hey @catenacyber, TravisBuddy Request Identifier: ecffb3d0-53b8-11ea-b4ca-9b1f8367601b |
@victorjulien could you approve this now that we merged the fuzz targets in upstream Suricata repository ? Thanks :-) |
Still needs OISF/suricata#4732 before merging |
I have just merged OISF/suricata#4732, so upstream is ready. Approved from the Suricata project. |
Travis tests have failedHey @catenacyber, TravisBuddy Request Identifier: 96181f70-6ff7-11ea-8e1c-9749656638a8 |
Hey @catenacyber, TravisBuddy Request Identifier: c76e4060-6ffa-11ea-8e1c-9749656638a8 |
Thanks @Dor1s The language is actually C and Rust |
C or C++ doesn't matter, we use C++ by default as libFuzzer is C++ and is linked in :) I think fuzz targets are written in C, so |
I do not know. The C fuzz targets call Rust code at some points
Hope you have time to review #3142 soon ;-) |
Asked in #624
The code is not yet merged in suricata main repository cf OISF/suricata#3914
MSAN is not yet enabled because of Rust and C interactions cf #2145 (comment)
@victorjulien could you ack ?
cc @kcc as you seemed interested in rust targets