From: Evgeny Vereshchagin Date: Sat, 27 Jan 2018 09:56:42 +0000 (+0300) Subject: Merge pull request #7933 from keszybz/fuzz-regression X-Git-Tag: v237~13 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=4c0d48109540a0ab567de425cc904f6612c4ad1c;p=thirdparty%2Fsystemd.git Merge pull request #7933 from keszybz/fuzz-regression test: add fuzzer regression testing --- 4c0d48109540a0ab567de425cc904f6612c4ad1c diff --cc HACKING index 517b3c29bbc,8c72bdd3e2e..e9a159ba9f9 --- a/HACKING +++ b/HACKING @@@ -95,13 -95,17 +95,16 @@@ scripts/oss-fuzz.sh The fuzzers can be built locally if you have libFuzzer installed by running scripts/oss-fuzz.sh. You should also confirm that the fuzzer runs in the -OSS-Fuzz environment by checking out the OSS-Fuzz repo, modifying the git clone -in projects/systemd/Dockerfile to point at your code (for example, a fork on -GitHub) and then running these commands: +OSS-Fuzz environment by checking out the OSS-Fuzz repo, and then running +commands like this: python infra/helper.py build_image systemd - python infra/helper.py build_fuzzers --sanitizer memory systemd + python infra/helper.py build_fuzzers --sanitizer memory systemd ../systemd python infra/helper.py run_fuzzer systemd fuzz-foo + If you find a bug that impacts the security of systemd, please follow the + guidance in .github/CONTRIBUTING.md on how to report a security vulnerability. + For more details on building fuzzers and integrating with OSS-Fuzz, visit: https://github.com/google/oss-fuzz/blob/master/docs/new_project_guide.md