Displaying 20 results from an estimated 1300 matches similar to: "how to auto-report LLVM bugs found by fuzzing?"
2017 Aug 29
2
how to auto-report LLVM bugs found by fuzzing?
On Tue, Aug 29, 2017 at 4:13 PM, Justin Bogner <mail at justinbogner.com>
wrote:
> Kostya Serebryany <kcc at google.com> writes:
> > Hi,
> >
> > We have several llvm fuzz targets running on OSS-Fuzz, a continuous
> > automated fuzzing service:
> > https://github.com/google/oss-fuzz
> >
2017 Aug 30
2
how to auto-report LLVM bugs found by fuzzing?
Bugs found by oss-fuzz in llvm are now public:
https://bugs.chromium.org/p/oss-fuzz/issues/list?q=proj-llvm
(and the new ones will be public too).
I've also added llvm-bugs at lists.llvm.org to the list of e-mail recipients:
https://github.com/google/oss-fuzz/blob/master/projects/llvm/project.yaml
On Tue, Aug 29, 2017 at 4:27 PM, Justin Bogner <mail at justinbogner.com>
wrote:
>
2017 Aug 22
8
llvm-mc-[dis]assemble-fuzzer status?
Hi,
As a part of a recent move of libFuzzer from LLVM to compiler-rt I am looking into updating the build code
for the libraries which use libFuzzer.
I have tried to compile llvm-mc-assemble-fuzzer, and llvm-mc-disassemble-fuzzer, and I couldn’t build either of those.
For the first one, the reason is that it refers to a nonexistent enum,
and for the second one I believe the reason is that it
2017 Aug 24
2
llvm-mc-[dis]assemble-fuzzer status?
On Tue, Aug 22, 2017 at 4:34 PM, Kostya Serebryany <kcc at google.com> wrote:
>
>
> On Tue, Aug 22, 2017 at 4:21 PM, George Karpenkov <ekarpenkov at apple.com>
> wrote:
>
>> Hi,
>>
>> As a part of a recent move of libFuzzer from LLVM to compiler-rt I am
>> looking into updating the build code
>> for the libraries which use libFuzzer.
2018 Jul 04
2
Why SI.isSigned() is not equals to E->getType()->isSignedIntegerOrEnumerationType()?
Hi LLVM developers,
I am implementing Loong Language[1] using Clang FrontEnd and LLVM
MiddleEnd. I add `wire`[2] Builtin Type, and clang is able to parse very
small testcase fulladder[3] but failed to work for 10+K loc RISCV E203
project[4]:
Loongson clang version 7.0.0
(git at github.com:Loong-Language/loong-clang.git
8f7e826f27abbe12ea08d9563490298c38d3adc1)
(git at
2020 Aug 25
9
[Proposal][Debuginfo] dsymutil-like tool for ELF.
Hi,
We propose llvm-dwarfutil - a dsymutil-like tool for ELF.
Any thoughts on this?
Thanks in advance, Alexey.
======================================================================
llvm-dwarfutil(Apndx A) - is a tool that is used for processing debug
info(DWARF)
located in built binary files to improve debug info quality,
reduce debug info size and accelerate debug info processing.
2020 Sep 01
2
[Proposal][Debuginfo] dsymutil-like tool for ELF.
On 01.09.2020 06:27, David Blaikie wrote:
> A quick note: The feature as currently proposed sounds like it's an
> exact match for 'dwz'? Is there any benefit to this over the existing
> dwz project? Is it different in some ways I'm not aware of? (I haven't
> actually used dwz, so I might have some mistaken ideas about how it
> should work)
>
> If
2020 Aug 26
3
[Proposal][Debuginfo] dsymutil-like tool for ELF.
On 26.08.2020 10:58, James Henderson wrote:
> In principle, this sounds reasonable to me. I don't know enough about
> dsymutil's interface to know whether it makes sense to try to make it
> multi-format compatible or not. If it doesn't I'm perfectly happy for
> a new tool to be added using the DWARFLinker library.
>
> Some more general thoughts:
> 1)
2020 Sep 02
2
[Proposal][Debuginfo] dsymutil-like tool for ELF.
On 01.09.2020 20:07, David Blaikie wrote:
> Fair enough - thanks for clarifying the differences! (I'd still lean a
> bit towards this being dwz-esque, as you say "an extension of classic dwz"
I doubt a little about "llvm-dwz" since it might confuse people who
would expect exactly the same behavior.
But if we think of it as "an extension of classic dwz" and
2020 Sep 02
2
[Proposal][Debuginfo] dsymutil-like tool for ELF.
On 02.09.2020 21:44, David Blaikie wrote:
>
>
> On Wed, Sep 2, 2020 at 9:56 AM Alexey <avl.lapshin at gmail.com
> <mailto:avl.lapshin at gmail.com>> wrote:
>
>
> On 01.09.2020 20:07, David Blaikie wrote:
>> Fair enough - thanks for clarifying the differences! (I'd still
>> lean a bit towards this being dwz-esque, as you say "an
2020 Mar 18
6
Re: Fuzzing Questions
On Wed, Mar 18, 2020 at 01:46:14PM -0400, habib dan aouta wrote:
> Hello Richard,
>
> Hope you are doing well. My name is Habib and I am current student
> at the University of North Carolina at Charlotte(U.S). I am
> currently following your Libnbd client fuzzing tutorial from the
> Wordpress articles
2001 Oct 01
1
generic default values
I have a generic function
test.equal <- function(obj1, obj2, ...) UseMethod("test.equal")
however, the only argument that specific methods use is "fuzz" so I
would like to change this to
test.equal <- function(obj1, obj2, fuzz=???) UseMethod("test.equal")
The problem is that some methods use slightly different default values
for fuzz than others. How should
2019 Nov 12
2
Using Libfuzzer on a library - linking the library to the fuzz target
I am working of using libfuzzer and asan to test out a third-party library.
As demonstrated in the tutorial, I wrote a fuzz target to fuzz a specific
function in the library. The fuzz target is then linked to the library and
compiles clean and I do see some tests generated by the fuzzer. However, I
have some questions regarding the "right" way to go about doing this. I
have doubts that
2011 Jun 10
4
Connected Line ID
Hai,
Does anybody have problems with a wrong Connected Line ID with asterisk version 1.6
The following bug was for version 1.4, but I cannot make up if this bug is still in version 1.6
http://forums.digium.com/viewtopic.php?t=7780
In version 1.8 it is possible to change the Connected Line ID, but this isn't the case in version 1.6
Regards,
Arjan Kroon
Mobillion BV
2015 Mar 03
2
openssh-SNAP-20150304 issues
Damien Miller wrote:
>
> On Tue, 3 Mar 2015, The Doctor wrote:
>
>> regress/unittests/test_helper/test_helper.c: In function `test_data_file':
>> regress/unittests/test_helper/test_helper.c:177: warning: implicit declaration of function `strlcpy'
>> regress/unittests/test_helper/test_helper.c: At top level:
>>
2019 Nov 12
2
Using Libfuzzer on a library - linking the library to the fuzz target
Hi Mitch,
Thank you for the response.
1. You don't need to build the library with `-fsanitize-coverage=...`,
using `-fsanitize=fuzzer-no-link,address` should be sufficient. -
Acknowledged
2. (although you can actually build object files/shared libraries with
-fsanitize=fuzzer, and the libFuzzer main won't be linked, if this makes
your build process easier). - with just the *fuzzer
2017 Feb 01
2
Fuzzing bitcode reader
On Wed, Feb 1, 2017 at 8:45 AM, Mehdi Amini <mehdi.amini at apple.com> wrote:
>
> > On Feb 1, 2017, at 8:34 AM, Michael Kruse via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
> >
> > Hi all,
> >
> > The blog entry [1] suggest that one of the buildbots constantly fuzzes
> > clang and clang-format. However, the actual bot [2] only tests the
2017 Aug 25
3
llvm-mc-[dis]assemble-fuzzer status?
On Fri, Aug 25, 2017 at 8:51 AM, Daniel Sanders <daniel_l_sanders at apple.com>
wrote:
> (removed my @imgtec.com address since it no longer exists)
>
> Sorry for the slow reply, it's a busy time for me right now.
>
> > On 23 Aug 2017, at 00:21, George Karpenkov via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
> >
> > Hi,
> >
> > As a
2017 Feb 01
3
Fuzzing bitcode reader
Hi all,
The blog entry [1] suggest that one of the buildbots constantly fuzzes
clang and clang-format. However, the actual bot [2] only tests the
fuzzer itself over a well-known set of bugs in standard software (eg.
Heartbleed [3] seems to be among them). Has there actually ever been a
buildbot that fuzzes clang/LLVM itself?
Another (obvious?) fuzzing candidate would be the LLVM's bitcode
2017 Jan 27
3
Adding a decoder fuzz target
Hi all,
I'm working on fuzzing Opus with OSS-Fuzz and have started with the
decoder. Attached is a patch to add the corresponding fuzz target. Please
let me know if there are any concerns?
Thanks,
Felicia
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xiph.org/pipermail/opus/attachments/20170127/f69951aa/attachment-0001.html>