aboutsummaryrefslogtreecommitdiff
path: root/tests/docker/common.rc
diff options
context:
space:
mode:
authorAlexander Bulekov <alxndr@bu.edu>2020-10-23 11:07:45 -0400
committerThomas Huth <thuth@redhat.com>2020-10-26 09:53:54 +0100
commita942f64cc4b875c2fe92ea91fea85741e00b12b9 (patch)
tree633ac958a8ce4dfe6605675e4218add159afc89d /tests/docker/common.rc
parent7fdb50538470a0ce60044cf93a55ec5ee3ff6f57 (diff)
downloadqemu-a942f64cc4b875c2fe92ea91fea85741e00b12b9.zip
qemu-a942f64cc4b875c2fe92ea91fea85741e00b12b9.tar.gz
qemu-a942f64cc4b875c2fe92ea91fea85741e00b12b9.tar.bz2
scripts/oss-fuzz: use hardlinks instead of copying
Prior to this, fuzzers in the output oss-fuzz directory were exactly the same executable, with a different name to do argv[0]-based fuzz-target selection. This is a waste of space, especially since these binaries can weigh many MB. Instead of copying, use hard links, to cut down on wasted space. We need to place the primary copy of the executable into DEST_DIR, since this is a separate file-system on oss-fuzz. We should not place it directly into $DEST_DIR, since oss-fuzz will treat it as an independent fuzzer and try to run it for fuzzing. Instead, we create a DEST_DIR/bin directory to store the primary copy. Suggested-by: Darren Kenny <darren.kenny@oracle.com> Signed-off-by: Alexander Bulekov <alxndr@bu.edu> Message-Id: <20201023150746.107063-17-alxndr@bu.edu> Reviewed-by: Darren Kenny <darren.kenny@oracle.com> Signed-off-by: Thomas Huth <thuth@redhat.com>
Diffstat (limited to 'tests/docker/common.rc')
0 files changed, 0 insertions, 0 deletions