- 01 Apr, 2021 3 commits
-
-
Evgeny Vereshchagin authored
Signed-off-by:Evgeny Vereshchagin <evvers@ya.ru>
-
Evgeny Vereshchagin authored
``` 2021-04-02T05:45:54.9410345Z ==13==ERROR: LeakSanitizer: detected memory leaks 2021-04-02T05:45:54.9410737Z 2021-04-02T05:45:54.9411488Z Direct leak of 16 byte(s) in 1 object(s) allocated from: 2021-04-02T05:45:54.9412556Z #0 0x54d752 in calloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:154:3 2021-04-02T05:45:54.9413360Z #1 0x583795 in parse_new_conf_line /src/lxc/src/lxc/confile.c:3048:8 2021-04-02T05:45:54.9414057Z #2 0x582f1a in lxc_config_define_add /src/lxc/src/lxc/confile.c:3090:15 2021-04-02T05:45:54.9415352Z #3 0x5810fa in LLVMFuzzerTestOneInput /src/lxc/src/tests/fuzz-lxc-define-load.c:30:6 2021-04-02T05:45:54.9419212Z #4 0x483b93 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15 2021-04-02T05:45:54.9421819Z #5 0x48309a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:505:3 2021-04-02T05:45:54.9424205Z #6 0x485474 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:814:7 2021-04-02T05:45:54.9426658Z #7 0x485689 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3 2021-04-02T05:45:54.9428616Z #8 0x473717 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6 2021-04-02T05:45:54.9429989Z #9 0x49f572 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 2021-04-02T05:45:54.9433312Z #10 0x7fa96041b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) 2021-04-02T05:45:54.9433795Z 2021-04-02T05:45:54.9434661Z DEDUP_TOKEN: calloc--parse_new_conf_line--lxc_config_define_add 2021-04-02T05:45:54.9435483Z SUMMARY: AddressSanitizer: 16 byte(s) leaked in 1 allocation(s). 2021-04-02T05:45:54.9435958Z 2021-04-02T05:45:54.9436404Z INFO: a leak has been found in the initial corpus. ``` Signed-off-by:Evgeny Vereshchagin <evvers@ya.ru>
-
Evgeny Vereshchagin authored
Signed-off-by:Evgeny Vereshchagin <evvers@ya.ru>
-
- 02 Apr, 2021 2 commits
-
-
Stéphane Graber authored
confile: fix lxc.namespace.share.[identifier]
-
Christian Brauner authored
Link: https://github.com/lxc/lxc/pull/3763/files#r606089660Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 01 Apr, 2021 8 commits
-
-
Stéphane Graber authored
fixes: Makefile, lxc-user-nic, simplify get_network_config_ops()
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
It's the only place where it is still used. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
oss-fuzz: reject giant configs early
-
- 31 Mar, 2021 3 commits
-
-
Christian Brauner authored
build-system: make it compatible with ASan/UBsan/Msan
-
Stéphane Graber authored
confile: cap to last bit in set_config_net_ipv4_address()
-
Christian Brauner authored
Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32708Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 30 Mar, 2021 11 commits
-
-
Christian Brauner authored
oss-fuzz.sh: put the "lxc.net" keys to the seed corpus as well
-
Stéphane Graber authored
string_utils: switch to path_simplify()
-
Christian Brauner authored
Link: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32689Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
confile: don't jump into the global table twice
-
Christian Brauner authored
instead move networking keys into a subtable. This avoids even just the remote danger of recursion and also speeds up config parsing. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Evgeny Vereshchagin authored
It should help the fuzzer to avoid running into timeouts like https://oss-fuzz.com/testcase-detail/5132999948632064. Hopefully, once this is merged OSS-Fuzz will report only infinite loops as timeouts. Signed-off-by:
Evgeny Vereshchagin <evvers@ya.ru>
-
Evgeny Vereshchagin authored
Closes: https://github.com/lxc/lxc/issues/3727Signed-off-by:
Evgeny Vereshchagin <evvers@ya.ru>
-
Evgeny Vereshchagin authored
to make sure pam_cgfs is buildable with ASan/UBsan too Signed-off-by:Evgeny Vereshchagin <evvers@ya.ru>
-
Evgeny Vereshchagin authored
Signed-off-by:Evgeny Vereshchagin <evvers@ya.ru>
-
Evgeny Vereshchagin authored
Signed-off-by:Evgeny Vereshchagin <evvers@ya.ru>
-
Evgeny Vereshchagin authored
It's just a follow-up to 5f404236 (where --enable-ubsan was removed). Signed-off-by:
Evgeny Vereshchagin <evvers@ya.ru>
-
- 29 Mar, 2021 13 commits
-
-
Stéphane Graber authored
autotools: remove --enable-{asan,ubsan} in favor of --enable-sanitizers -
Christian Brauner authored
doc: Documented that net type field must come before other options on the net device
-
Thomas Parrott authored
Signed-off-by:Thomas Parrott <thomas.parrott@canonical.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
compiler: fix thread_local detection
-
Christian Brauner authored
CIFuzz: turn on MSan
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Stéphane Graber authored
fixes & config key validation
-
Evgeny Vereshchagin authored
It's just a follow-up to 0abcc213 (where the "lxc.net" keys were moved from config_jump_table to config_jump_table_net) Signed-off-by:
Evgeny Vereshchagin <evvers@ya.ru>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Our detection for TLS wasn't working. Fix it. Fixes: https://github.com/lxc/lxd/issues/8327Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
where a valid key has trailing garbage at the end before the "=". Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-