Displaying 20 results from an estimated 1000 matches similar to: "fuzzer crash (but not the good kind)"
2015 Dec 03
2
fuzzer crash (but not the good kind)
Kostya,
Here's the git repo: https://bitbucket.org/ebadf/fuzzpy
I've only tested it on arm7 and x86_64 linux, I expect there's a good
chance it may not work on other OSs.
If you can build it successfully ("./build.sh", requires clang and clang++
in your path), then you should run the "testemail" case like so:
while true; do ITERS=1000 ./run.sh
2015 Dec 03
2
fuzzer crash (but not the good kind)
Ah, yes -- you need to clone with --recursive.
I will try the workaround though.
On Dec 3, 2015 1:12 PM, "Kostya Serebryany" <kcc at google.com> wrote:
>
>
> On Wed, Dec 2, 2015 at 7:17 PM, Brian Cain <brian.cain at gmail.com> wrote:
>
>> Kostya,
>>
>> Here's the git repo: https://bitbucket.org/ebadf/fuzzpy
>>
>> I've only
2015 Aug 11
3
libfuzzer questions
First off, thanks -- this is a pretty great library and it feels like I'm
learning a lot. I'm getting some more experience with libfuzzer and
finding that I have a couple of questions:
- How does libfuzzer decide to write a new test file? What distinguishes
this one from all the other cases for which new test inputs were not
written? Must be something about the path taken through the
2015 Aug 11
3
libfuzzer questions
On Mon, Aug 10, 2015 at 8:08 PM, Kostya Serebryany <kcc at google.com> wrote:
>
>
> On Mon, Aug 10, 2015 at 5:53 PM, Brian Cain via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
>
>>
>> First off, thanks -- this is a pretty great library and it feels like I'm
>> learning a lot.
>>
>
> Thanks!
>
>
>> I'm getting some
2015 Sep 03
2
Fuzzing complex programs
I'm fairly sure your compiler (or rather linker) errors are coming from the
fact that you are not linking to the C++ runtime library. Use `clang++
-std=c++11 *.o`, and I'm reasonably sure it will do what you want.
--
Mats
On 3 September 2015 at 12:26, Greg Stark via llvm-dev <
llvm-dev at lists.llvm.org> wrote:
> On Sun, Aug 30, 2015 at 3:30 PM, Greg Stark <stark at
2015 May 17
2
[LLVMdev] Building the fuzzer library
I decided to try out the fuzzer library and clang-fuzzer, but it doesn't
seem to build for me. From the cmake files, I was pretty sure all I need
to do is set -DLLVM_USE_SANITIZE_COVERAGE=ON, but with this I get a
number of link errors for "lib/Fuzzer/test/LLVMFuzzer-CounterTest", for
example:
lib/libLLVMFuzzer.a(FuzzerLoop.cpp.o): In function `SetDeathCallback':
2015 Nov 22
2
[cfe-dev] [3.7.1 Release] -rc2 has been tagged
Should I expect the "-openmp" to work for this RC? I got a link error
(only in phase 3?). Maybe the fact that it happened in phase 3 suggests
some hardware malfunction of mine? Or are there tests executed on phase 3
that aren't attempted on earlier phases?
$ CC=clang CXX=clang++ ./test-release.sh -release 3.7.1 -rc 2 -j1 -openmp
-triple armv7l-ubuntu15.10-linux-gnueabihf
...
cd
2015 Nov 21
11
[3.7.1 Release] -rc2 has been tagged
Hi,
There was one problem in -rc1, so we had to do another release
candidate. -rc2 has now been tagged and is ready for testing.
-Tom
2015 Aug 30
4
Fuzzing complex programs
I have a project I want to do based on Libfuzzer. Is there a separate
list for it or should I bring up any ideas for it here?
What I have in mind is to fuzz Postgres. Trying to fuzz the SQL
interpreter in general
is not very productive because traditional fuzzers try to execute the
entire program repeatedly and it has a fairly high startup and
shutdown cost. Also the instrumentation-guided
2015 Sep 08
2
Some feedback on Libfuzzer
On Sat, Sep 5, 2015 at 11:50 AM, Greg Stark <stark at mit.edu> wrote:
> On Sat, Sep 5, 2015 at 6:38 PM, Kostya Serebryany <kcc at google.com> wrote:
> >
> > This is more like a limitation of asan, not libFuzzer.
> > By design, asan does not recover from the first crash.
> > This feature has been criticized quite a lot, but I am still convinced
> this
>
2017 Aug 24
3
Building LLVM's fuzzers
On Thu, Aug 24, 2017 at 3:38 PM, Kostya Serebryany <kcc at google.com> wrote:
>
>
> On Thu, Aug 24, 2017 at 3:35 PM, Peter Collingbourne <peter at pcc.me.uk>
> wrote:
>
>> On Thu, Aug 24, 2017 at 3:21 PM, Kostya Serebryany via llvm-dev <
>> llvm-dev at lists.llvm.org> wrote:
>>
>>>
>>>
>>> On Thu, Aug 24, 2017 at 3:20
2017 Aug 25
2
Building LLVM's fuzzers
On Thu, Aug 24, 2017 at 6:30 PM, Justin Bogner <mail at justinbogner.com>
wrote:
> Peter Collingbourne <peter at pcc.me.uk> writes:
> > On Thu, Aug 24, 2017 at 3:38 PM, Kostya Serebryany <kcc at google.com>
> wrote:
> >
> >>
> >>
> >> On Thu, Aug 24, 2017 at 3:35 PM, Peter Collingbourne <peter at pcc.me.uk>
> >> wrote:
2015 Oct 14
2
Compiling SAFECode poolalloc in cygwin create different libraries compared to linux.
Hi John,
That worked for me. I am using llvm 3.2 only and following
http://safecode.cs.illinois.edu/docs/Install.html
So for I am able to make inside llvm/projects/poolalloc by doing such
cosmetic changes.
Now, when I tried to make inside llvm/projects/safecode, I see another
error.
kpawar at KPAWAR-LT ~/SAFECode/LLVM_SRC/llvm/projects/safecode
$ /usr/bin/clang -cc1 -triple
2015 Sep 03
2
Fuzzing complex programs
On Thu, Sep 3, 2015 at 6:25 PM, Kostya Serebryany <kcc at google.com> wrote:
> Not sure I understood this correctly.
> Example?
I've made a Postgres module which is dynamically loaded by Postgres as
a shared library from which I can call the fuzzer on the SQL function
of my choice. Postgres has enough meta information about the functions
that I think the eventual interface might
2017 Sep 11
2
Building LLVM's fuzzers
Kostya Serebryany <kcc at google.com> writes:
> Justin,
> Calling appendToUsed has horrible complexity and if we call it in
> every function clang consumes tons of memory (6Gb when compiling one
> of the clang's source files). This killed my machine today :)
>
> The solution is to call appendToUsed once per module, instead of once
> per function.
Oh right,
2015 Aug 30
2
Fuzzing complex programs
On Sun, Aug 30, 2015 at 9:11 AM, Brian Cain via llvm-dev <
llvm-dev at lists.llvm.org> wrote:
>
>
> On Sun, Aug 30, 2015 at 9:30 AM, Greg Stark via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
>
>> I have a project I want to do based on Libfuzzer. Is there a separate
>> list for it or should I bring up any ideas for it here?
>>
>> No separate
2014 Jul 04
2
[LLVMdev] Using git bisect with LLVM
Hello,
git bisect helped me today in tracking down a regression in LLVM/Clang.
Because LLVM/Clang code is split across multiple git repositories, there
were a few obstacles to overcome prior to using git bisect. I thought I
would share them here, in the hope that they're useful for others.
The main difficulty was to check out the version of clang and compiler-rt
that would compile with a
2008 Apr 15
1
[LLVMdev] Linking to LLVM libs from new project
Hi all,
I have a new sample project set up in my llvm/projects directory, and
I'd eventually like my frontend to generate an LLVM IR tree. To do so,
I believe I need to link to the appropriate LLVM libraries. That's
where I'm stuck.
I can't seem to find any specific documentation that describes how to
set up a new project to link to LLVM libraries.
To get started, I added a
2015 Oct 13
2
Compiling SAFECode poolalloc in cygwin create different libraries compared to linux.
Hi,
On Linux I observed
[root at localhost poolalloc]# find . -name *.a
./Release+Asserts/lib/LLVMDataStructure.a
./Release+Asserts/lib/poolalloc.a
./Release+Asserts/lib/AssistDS.a
./Release+Asserts/lib/libpoolalloc_fl_rt.a
./Release+Asserts/lib/libpoolalloc_rt.a
./Release+Asserts/lib/libpa_pre_rt.a
./Release+Asserts/lib/libcount.a
On cygwin I observed
kpawar at KPAWAR-LT
2006 Aug 16
2
[LLVMdev] Weird behavior of llvm-ld
Hi,
I'm using LLVM 1.8 with the GCC4-frontend on a Slackware 10.2 box (GCC
3.3.6). When issuing the following command (line 14 in a script called
manual.sh):
llvm-ld -O1 *.trans -L${SOME_LIB_DIR} -L${SOME_OTHER_LIB_DIR}
-L${LLVM_FRONT}/lib -lSOME_LIB -lSOME_OTHER_LIB
-load=${MY_LIB_DIR}/opt1.so -load=${MY_LIB_DIR}/opt2.so
-debug-pass=Details -debug -o test
... I get the following