collabora-online/fuzzer
Miklos Vajna c3c80f00a6 wsd, clientsession: guard against negative w/h in clientvisiblearea
Signed-off-by: Miklos Vajna <vmiklos@collabora.com>
Change-Id: I34435276afbdc02b6e820b630560608f16f3a0e0
2024-02-26 08:27:21 +00:00
..
admin-data admin: handle errors while decoding URLs 2024-01-16 21:36:43 +01:00
data wsd, clientsession: guard against negative w/h in clientvisiblearea 2024-02-26 08:27:21 +00:00
httpecho-data fuzzers: add http corpus and dictionary 2022-08-17 08:55:12 -04:00
httpresponse-data http response: check if result would fit into chunkLen 2021-07-08 14:51:11 +02:00
Admin.cpp HttpRequest: add missing config.h include 2021-03-30 12:23:09 +02:00
ClientSession.cpp client session fuzzer: try harder to empty SocketPoll::_newCallbacks on shutdown 2022-05-31 15:10:51 +02:00
HttpEcho.cpp Fix fuzzers build 2023-11-29 15:41:00 +00:00
HttpResponse.cpp fuuzer, httpresponse: clear state before each run 2023-02-28 10:18:41 +01:00
README fuzzers: add httpecho fuzzer script 2022-08-17 08:55:12 -04:00
httpecho-fuzz.sh fuzzers: add httpecho fuzzer script 2022-08-17 08:55:12 -04:00

README

These fuzzers are meant to be built and executed inside lode.git's sanitizers
environment (currently enables both asan and ubsan).

online.git can be built the usual way, just the additional `--enable-fuzzers`
flag is needed to build the fuzzers. It is useful to do this in a separate
build tree, since the fuzzers config doesn't produce a `coolwsd` binary.

Run the fuzzers like this:

- Admin:

----
./admin_fuzzer -max_len=16384 fuzzer/admin-data/
----

- ClientSession:

----
./clientsession_fuzzer -max_len=16384 fuzzer/data/
----

- HttpResponse:

----
./httpresponse_fuzzer -max_len=16384 fuzzer/httpresponse-data/
----

- HttpEcho:

----
./httpecho_fuzzer -max_len=16384 fuzzer/httpecho-data/
OR, better:
./fuzzer/httpecho-fuzz.sh
----