summaryrefslogtreecommitdiff
path: root/src/fuzz
Commit message (Collapse)AuthorAgeFilesLines
* tree-wide: drop license boilerplateZbigniew Jędrzejewski-Szmek2018-04-065-65/+0
| | | | | | | | | | Files which are installed as-is (any .service and other unit files, .conf files, .policy files, etc), are left as is. My assumption is that SPDX identifiers are not yet that well known, so it's better to retain the extended header to avoid any doubt. I also kept any copyright lines. We can probably remove them, but it'd nice to obtain explicit acks from all involved authors before doing that.
* fuzz-unit-file: allow a space between variable name and "=" (#8670)Zbigniew Jędrzejewski-Szmek2018-04-061-1/+1
| | | | | The parser allows that, so the check when to skip needs this too. https://oss-fuzz.com/v2/issue/5106486364602368/7422
* fuzz-unit-file: add __has_feature(memory_sanitizer) when skipping ListenNetlink=Zbigniew Jędrzejewski-Szmek2018-03-261-1/+1
| | | | | | | | | | | | https://clang.llvm.org/docs/MemorySanitizer.html#id5 documents this check as the way to detect MemorySanitizer at compilation time. We only need to skip the test if MemorySanitizer is used. Also, use this condition in cg_slice_to_path(). There, the code that is conditionalized is not harmful in any way (it's just unnecessary), so remove the FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION condition. Fixes #8482.
* fuzz-unit-file: adjust check for ListenNetlink yet againZbigniew Jędrzejewski-Szmek2018-03-261-2/+4
| | | | | | | | The test for ListenNetlink would abort the loop if a line longer then LINE_MAX was encountered (read_line() returns -ENOBUFS in that case). Let's use the the line length limit that the unit file parses uses. https://oss-fuzz.com/v2/issue/5546208027213824/7094.
* fuzz-unit-file: fix check if ListenNetlink is usedZbigniew Jędrzejewski-Szmek2018-03-211-1/+4
| | | | | A line may contain leading spaces which we should skip. Fixes https://oss-fuzz.com/v2/issue/5546208027213824/7049.
* fuzz-unit-file: simply do not test ListenNetlink= at allZbigniew Jędrzejewski-Szmek2018-03-181-0/+18
| | | | | | | | | msan doesn't understand sscanf with %ms, so it falsely reports unitialized memory. Using sscanf with %ms is quite convenient in socket_address_parse_netlink(), so let's just not run the fuzzer for ListenNetlink= at all for now. If msan is fixed, we can remove this. https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6884
* fuzz-dhcp-server: fix name of options fileZbigniew Jędrzejewski-Szmek2018-03-111-0/+0
|
* fuzz: allow logging to be configured, disable in fuzz-unit-fileZbigniew Jędrzejewski-Szmek2018-03-112-0/+9
| | | | | | fuzz-unit-file generated too much logs about invalid config lines. This just slows things down and fills the logs. If necessary, it's better to rerun the interesting cases with SYSTEMD_LOG_LEVEL=debug.
* Add fuzzer for unit file parserZbigniew Jędrzejewski-Szmek2018-03-112-3/+62
|
* fuzz: cast to void when return value is ignoredYu Watanabe2018-01-221-1/+1
|
* fuzz: check return valueYu Watanabe2018-01-221-7/+4
| | | | Closes CID #1385306 and #1385300.
* fuzz: fix coding styleYu Watanabe2018-01-221-1/+1
|
* fuzz: add DHCP server fuzzerJonathan Rudenberg2018-01-193-0/+75
|
* fuzz: add initial fuzzing infrastructureJonathan Rudenberg2018-01-175-0/+144
The fuzzers will be used by oss-fuzz to automatically and continuously fuzz systemd. This commit includes the build tooling necessary to build fuzz targets, and a fuzzer for the DNS packet parser.