Displaying 20 results from an estimated 10000 matches similar to: "CIFS mounting - can a remote directory be specified?"
2017 Aug 30
2
how to auto-report LLVM bugs found by fuzzing?
Bugs found by oss-fuzz in llvm are now public:
https://bugs.chromium.org/p/oss-fuzz/issues/list?q=proj-llvm
(and the new ones will be public too).
I've also added llvm-bugs at lists.llvm.org to the list of e-mail recipients:
https://github.com/google/oss-fuzz/blob/master/projects/llvm/project.yaml
On Tue, Aug 29, 2017 at 4:27 PM, Justin Bogner <mail at justinbogner.com>
wrote:
>
2017 Aug 29
2
how to auto-report LLVM bugs found by fuzzing?
On Tue, Aug 29, 2017 at 4:13 PM, Justin Bogner <mail at justinbogner.com>
wrote:
> Kostya Serebryany <kcc at google.com> writes:
> > Hi,
> >
> > We have several llvm fuzz targets running on OSS-Fuzz, a continuous
> > automated fuzzing service:
> > https://github.com/google/oss-fuzz
> >
2017 Aug 24
2
llvm-mc-[dis]assemble-fuzzer status?
On Tue, Aug 22, 2017 at 4:34 PM, Kostya Serebryany <kcc at google.com> wrote:
>
>
> On Tue, Aug 22, 2017 at 4:21 PM, George Karpenkov <ekarpenkov at apple.com>
> wrote:
>
>> Hi,
>>
>> As a part of a recent move of libFuzzer from LLVM to compiler-rt I am
>> looking into updating the build code
>> for the libraries which use libFuzzer.
2017 Aug 29
3
how to auto-report LLVM bugs found by fuzzing?
Hi,
We have several llvm fuzz targets running on OSS-Fuzz, a continuous
automated fuzzing service:
https://github.com/google/oss-fuzz
https://www.usenix.org/sites/default/files/conference/protected-files/usenixsecurity17_slides_serebryany.pdf
It has reported a few bugs in cxa_demangler, clang, and dwarfdump already,
and we expect to add more fuzz targets to it soon (llvm-isel-fuzzer,
2017 Feb 01
2
Fuzzing bitcode reader
On Wed, Feb 1, 2017 at 8:45 AM, Mehdi Amini <mehdi.amini at apple.com> wrote:
>
> > On Feb 1, 2017, at 8:34 AM, Michael Kruse via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
> >
> > Hi all,
> >
> > The blog entry [1] suggest that one of the buildbots constantly fuzzes
> > clang and clang-format. However, the actual bot [2] only tests the
2019 Nov 12
2
Using Libfuzzer on a library - linking the library to the fuzz target
Hi Mitch,
Thank you for the response.
1. You don't need to build the library with `-fsanitize-coverage=...`,
using `-fsanitize=fuzzer-no-link,address` should be sufficient. -
Acknowledged
2. (although you can actually build object files/shared libraries with
-fsanitize=fuzzer, and the libFuzzer main won't be linked, if this makes
your build process easier). - with just the *fuzzer
2001 Oct 01
1
generic default values
I have a generic function
test.equal <- function(obj1, obj2, ...) UseMethod("test.equal")
however, the only argument that specific methods use is "fuzz" so I
would like to change this to
test.equal <- function(obj1, obj2, fuzz=???) UseMethod("test.equal")
The problem is that some methods use slightly different default values
for fuzz than others. How should
2019 Nov 12
2
Using Libfuzzer on a library - linking the library to the fuzz target
I am working of using libfuzzer and asan to test out a third-party library.
As demonstrated in the tutorial, I wrote a fuzz target to fuzz a specific
function in the library. The fuzz target is then linked to the library and
compiles clean and I do see some tests generated by the fuzzer. However, I
have some questions regarding the "right" way to go about doing this. I
have doubts that
2017 Feb 01
3
Fuzzing bitcode reader
On Wed, Feb 1, 2017 at 9:19 AM, Michael Kruse <llvmdev at meinersbur.de> wrote:
> 2017-02-01 18:07 GMT+01:00 Kostya Serebryany <kcc at google.com>:
> > Yes, I used to run clang-fuzzer and clang-format-fuzzer on this bot, but
> not
> > any more.
> > The reason is simple -- the bot was always red (well, orange) and the
> bugs
> > were never fixed.
>
2003 Nov 29
0
cifs issues
I have a shared folder with 33GB of data (mostly 3-5MB files, approx. 10,500
files total) on a Windows 2000 server. If I mount it using smbfs I can see
all of the files and directories in the share's root but when entering into
sub-directories some will appear empty (allthough they are not), or fewer
than all of the files will be visible.
If I use smbclient to connect, all of the files,
2017 Jan 27
3
Adding a decoder fuzz target
Hi all,
I'm working on fuzzing Opus with OSS-Fuzz and have started with the
decoder. Attached is a patch to add the corresponding fuzz target. Please
let me know if there are any concerns?
Thanks,
Felicia
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xiph.org/pipermail/opus/attachments/20170127/f69951aa/attachment-0001.html>
2017 Feb 01
3
Fuzzing bitcode reader
Hi all,
The blog entry [1] suggest that one of the buildbots constantly fuzzes
clang and clang-format. However, the actual bot [2] only tests the
fuzzer itself over a well-known set of bugs in standard software (eg.
Heartbleed [3] seems to be among them). Has there actually ever been a
buildbot that fuzzes clang/LLVM itself?
Another (obvious?) fuzzing candidate would be the LLVM's bitcode
2017 Feb 10
2
Adding a decoder fuzz target
Thanks for your comments, Ralph and Jean-Marc.
Please find attached the amended patch:
- decodes a sequence of input packets rather than just one (I'm planning on
using the Opus test vectors as the seed corpus)
- decides on decoder setup and FEC independently of the packet data
- uses Opus functions to parse ToC
Cheers,
Felicia
On Sun, Jan 29, 2017 at 9:48 PM Jean-Marc Valin <jmvalin at
2004 Jan 08
2
Multihome- routes patch problem
Hi all
iam trying to setup Dual gate using Julian patch
DGD, but when i try tp patch to my kernel with fedora
iam getting the following eroor
can some one suggest me what is wrong
or i need a latest patch for fedora
[root@linux-2.4.22-1.2115.nptl]# patch -p1 <
/root/update/update/routes-2.4.20-9.diff
patching file include/linux/netfilter_ipv4/ip_nat.h
patching file
2023 Jan 09
1
Does samba provide a fuzzing mode that uses deterministic NTLMSSP_Challenge?
Hi,
Recently I want to fuzz samba systematically (instead of functional fuzzing like OSS-Fuzz/samba). However, the fuzzer acts like smbclient and needs to establish a connection with the samba server via NTLM authentication. The NTLMSSP_Challenge sent by the server is not deterministic, which can render the fuzzing based on previously captured traffic futile. Does samba provide a fuzzing mode
2005 Jun 21
1
ast_data help
hello,
I need help with ast_data
I downloaded asterisk from cvs
cvs -d :pserver:anoncvs@cvs.digium.com:/usr/cvsroot co
-r HEAD asterisk
and the latest ast_data.
When i run ./INSTALL.txt i get :
serveur1:/opt/asterisk/ast_data# ./INSTALL
patching file contrib/scripts/sip-friends.sql
patching file contrib/scripts/iax-friends.sql
patching file apps/app_voicemail.c
Hunk #1 succeeded at 27 with
2017 Aug 25
3
llvm-mc-[dis]assemble-fuzzer status?
On Fri, Aug 25, 2017 at 8:51 AM, Daniel Sanders <daniel_l_sanders at apple.com>
wrote:
> (removed my @imgtec.com address since it no longer exists)
>
> Sorry for the slow reply, it's a busy time for me right now.
>
> > On 23 Aug 2017, at 00:21, George Karpenkov via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
> >
> > Hi,
> >
> > As a
2001 Mar 05
1
histogram of frequencies (PR#861)
Full_Name: Dr. Bernd Winkler
Version: 1.2.2
OS: Linux
Submission from: (NULL) (194.59.179.176)
Hi all,
having updated to version 1.2.2 last week I experienced some strange behaviour
of
the hist function.
I want to plot a histogram of frequencies resp. counts, for example poisson
random numbers, on a predefined and fixed x scale
> hist(rpois(500, 2), breaks=0:10)
But instead of the
2017 Aug 24
2
llvm-mc-[dis]assemble-fuzzer status?
>
>
> I'd like llvm-isel-fuzzer to be added once its committed
consider it done (once it's there)
> (which should
> be as soon as LLVM fuzzers work in release builds again). One potential
> issue is that llvm-isel-fuzzer is more of a collection of fuzzers, and
> it needs some arguments to run (ie, to choose the backend).
>
I have the same problem with
2010 Jun 25
1
variograms and kriging
Hello
Trying to develop variograms and kriged surfaces from a point file. Here is
what I've done so far.
library(gstat) # also loads library(sp)
library(lattice)
soilpts$x <- soilpts$UTM_X
soilpts$y <- soilpts$UTM_Y
soil.dat <- subset(soilpts, select=c(x, y, Area, BulkDensity, LOI, TP, TN,
TC, Total_Mg))
dim(soil.dat)
[1] 1292 7
coordinates(soil.dat) <- ~ x+y