| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
cases where libFuzzer is run w/o initial corpus or with a corpus of very small items.
llvm-svn: 305521
|
|
|
|
|
|
| |
On Darwin, section names have a 16char length limit.
llvm-svn: 305429
|
|
|
|
|
|
| |
currently)
llvm-svn: 305346
|
|
|
|
| |
llvm-svn: 305335
|
|
|
|
|
|
| |
libFuzzer. This is not fully functional yet, but simple tests work
llvm-svn: 305331
|
|
|
|
|
|
|
| |
dependencies and add comments to tell future maintainers about those
requirements.
llvm-svn: 304843
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
I did this a long time ago with a janky python script, but now
clang-format has built-in support for this. I fed clang-format every
line with a #include and let it re-sort things according to the precise
LLVM rules for include ordering baked into clang-format these days.
I've reverted a number of files where the results of sorting includes
isn't healthy. Either places where we have legacy code relying on
particular include ordering (where possible, I'll fix these separately)
or where we have particular formatting around #include lines that
I didn't want to disturb in this patch.
This patch is *entirely* mechanical. If you get merge conflicts or
anything, just ignore the changes in this patch and run clang-format
over your #include lines in the files.
Sorry for any noise here, but it is important to keep these things
stable. I was seeing an increasing number of patches with irrelevant
re-ordering of #include lines because clang-format was used. This patch
at least isolates that churn, makes it easy to skip when resolving
conflicts, and gets us to a clean baseline (again).
llvm-svn: 304787
|
|
|
|
|
|
|
|
|
|
|
|
| |
Reviewers: craig.topper, arsenm, mehdi_amini
Reviewed By: mehdi_amini
Subscribers: mehdi_amini, wdng, nhaehnle, javed.absar, llvm-commits
Differential Revision: https://reviews.llvm.org/D33924
llvm-svn: 304767
|
|
|
|
| |
llvm-svn: 304333
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
This allows to keep handlers installed by sanitizers.
In other cases third-party code can replace handlers after libFuzzer
initialization anyway.
Reviewers: kcc
Subscribers: llvm-commits
Differential Revision: https://reviews.llvm.org/D33522
llvm-svn: 303828
|
|
|
|
| |
llvm-svn: 303128
|
|
|
|
|
|
| |
individual inputs with afl driver
llvm-svn: 303125
|
|
|
|
|
|
| |
Christian Holler. This also fixes a logical bug, which however does not affect the libFuzzer's ability too much (I wasn't able to create a differentiating test)
llvm-svn: 303087
|
|
|
|
| |
llvm-svn: 302747
|
|
|
|
| |
llvm-svn: 302498
|
|
|
|
|
|
| |
(if it is -- report an error)
llvm-svn: 302494
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
It's not safe to assume that atexit handlers can be run once the app crashed.
Patch by Jochen Eisinger.
Reviewers: kcc, vitalybuka
Subscribers: llvm-commits
Differential Revision: https://reviews.llvm.org/D32640
llvm-svn: 302076
|
|
|
|
|
|
|
|
|
| |
This has been mysteriously failing since r301593, which cleaned up the
types of things like size_t and SIZE_MAX for freestanding targets. Reid
and Kostya suggested marking it as UNSUPPORTED on windows, given that no
one has been able to reproduce locally.
llvm-svn: 301719
|
|
|
|
|
|
| |
This shows up as a -Wpendatic error on GCC.
llvm-svn: 301616
|
|
|
|
| |
llvm-svn: 301061
|
|
|
|
|
|
| |
available.
llvm-svn: 301058
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
There are two reasons why users might want to build libfuzzer:
- To fuzz LLVM itself
- To get the libFuzzer.a archive file, so that they can attach it to their code
This change always builds libfuzzer, and supports the second use case if the specified flag is set.
The point of this patch is to have something that can potentially be shipped with the compiler, and this also ensures that the version of libFuzzer is correct to use with that compiler.
Patch by George Karpenkov.
Differential Revision: https://reviews.llvm.org/D32096
llvm-svn: 301054
|
|
|
|
| |
llvm-svn: 301017
|
|
|
|
| |
llvm-svn: 301012
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
There are two reasons why users might want to build libfuzzer:
- To fuzz LLVM itself
- To get the libFuzzer.a archive file, so that they can attach it to their code
This change always builds libfuzzer, and supports the second use case if the specified flag is set.
The point of this patch is to have something that can potentially be shipped with the compiler, and this also ensures that the version of libFuzzer is correct to use with that compiler.
Patch by George Karpenkov.
Differential Revision: https://reviews.llvm.org/D32096
llvm-svn: 301010
|
|
|
|
|
|
|
|
| |
Old Apple compilers do not support thread_local keyword. This patch adds -Dthread_local=__thread when the compiler doesn't support thread_local.
Differential Revision: https://reviews.llvm.org/D32312
llvm-svn: 301007
|
|
|
|
|
|
|
|
|
|
|
| |
Older compilers (e.g. LLVM 3.4) do not support the attribute target("popcnt").
In order to support those, this diff check the attribute support using the preprocessor.
Patch by George Karpenkov.
Differential Revision: https://reviews.llvm.org/D32311
llvm-svn: 300999
|
|
|
|
|
|
|
|
| |
This reverts commit r300127.
r300759 implemented StopTheWorld for Darwin, so the test passes again.
llvm-svn: 300801
|
|
|
|
|
|
| |
ASAN_OPTIONS=dedup_token_length=3
llvm-svn: 300800
|
|
|
|
| |
llvm-svn: 300794
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
There are two reasons why users might want to build libfuzzer:
- To fuzz LLVM itself
- To get the libFuzzer.a archive file, so that they can attach it to their code
This change always builds libfuzzer, and supports the second use case if the specified flag is set.
The point of this patch is to have something that can potentially be shipped with the compiler, and this also ensures that the version of libFuzzer is correct to use with that compiler.
Differential Revision: https://reviews.llvm.org/D32096
llvm-svn: 300789
|
|
|
|
|
|
| |
got out of sync
llvm-svn: 300768
|
|
|
|
|
|
| |
-minimize_crash and -cleanse_crash
llvm-svn: 300642
|
|
|
|
|
|
| |
in a crash reproducer with garbage, while still preserving the crash
llvm-svn: 300498
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The test fails on Darwin because Fuzzer::DeathCallback (which calls
DumpCurrentUnit("crash-")) is called before DumpCurrentUnit("oom-") is
called in Fuzzer::RssLimitCallback. DeathCallback is transitively called
from __sanitizer_print_memory_profile.
This should fix the fuzzer bot that has been failing for a while:
http://lab.llvm.org:8080/green/job/libFuzzer/
llvm-svn: 300127
|
|
|
|
|
|
|
|
| |
Fixes PR32576.
Patch by Jakub Zawadzki.
llvm-svn: 299968
|
|
|
|
|
|
|
| |
On Windows, abort() does not appear to flush std::cout. Should fix red
sanitizer-windows bot.
llvm-svn: 299398
|
|
|
|
| |
llvm-svn: 299180
|
|
|
|
| |
llvm-svn: 299179
|
|
|
|
| |
llvm-svn: 299177
|
|
|
|
|
|
| |
calling mem*/str* inside libFuzzer itself
llvm-svn: 299167
|
|
|
|
| |
llvm-svn: 299145
|
|
|
|
|
|
| |
longer (hopefully, will fix the OSX bot)
llvm-svn: 299051
|
|
|
|
|
|
| |
instrumentation. It is less efficient and precise than -fsanitize-coverage=trace-pc-guard, but still works
llvm-svn: 299046
|
|
|
|
|
|
|
|
| |
This test is now passing on Darwin.
See rdar://problem/31282257.
llvm-svn: 298886
|
|
|
|
| |
llvm-svn: 298757
|
|
|
|
|
|
| |
minimization if another bug was found during minimization (https://github.com/google/oss-fuzz/issues/452)
llvm-svn: 298755
|
|
|
|
| |
llvm-svn: 298746
|
|
|
|
|
|
| |
crash minimization (https://github.com/google/oss-fuzz/issues/250)
llvm-svn: 298740
|
|
|
|
| |
llvm-svn: 298673
|