summaryrefslogtreecommitdiff
path: root/src/systemctl/fuzz-systemctl-parse-argv.c
Commit message (Collapse)AuthorAgeFilesLines
* fuzz-systemctl-parse-argv: call static destuctorsZbigniew Jędrzejewski-Szmek2021-02-161-0/+9
| | | | | | With all the preparatory work in previous PRs, we can now call static destructors repeatedly without issue. We need to do it here so that global variables allocated during parsing are properly freed.
* fuzz-systemctl-parse-argv: avoid "leak" of bus objectZbigniew Jędrzejewski-Szmek2021-02-161-0/+3
| | | | | | | | Memory sanitizer would report leaked memory from --boot-load-entry=help. Maybe we should disable all bus connections from the fuzzer? It seems not appropriate to communicate with logind. OTOH, in a real fuzzing environment this call should just fail, so maybe that's OK.
* fuzz-systemctl-parse-argv: a new fuzzerZbigniew Jędrzejewski-Szmek2021-02-091-0/+58
Does what the name suggests. Obviously inspired by sudoers, but note that our tools are not supposed to be installed suid, so there is no privilege boundary to cross here.