-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[toml-rs] initial integration #5865
Conversation
What's weird though is that when I run
but with
I wonder if this is a known issue |
I've just opened toml-rs/toml-rs#430 to make it easier to review the fuzz target. |
It should make it easier to see where all the rustc flags come from. RUSTFLAGS along with `cargo fuzz build --verbose` should help to track down weird issues like google#5865 (comment) It's a follow-up to ecf3d38
The fuzzer built with @inferno-chromium I wonder what ClusterFuzz does when fuzz targets crash like that. Would it report issues without backtraces? |
It should make it easier to see where all the rustc flags come from. RUSTFLAGS along with `cargo fuzz build --verbose` should help to track down weird issues like #5865 (comment) It's a follow-up to ecf3d38
It should make it easier to track down issues like google/oss-fuzz#5865 (comment)
Mostly to be able to experiment with the fuzz target by injecting trivial bugs catchable by ASan to make sure that they aren't compiled out. It should help to track down weird issues like google/oss-fuzz#5865 (comment)
Thanks for the offer here! Unfortunately though I don't have a ton of time to maintain and fix fuzz bugs found. I suspect that they're probably somewhat easy-ish to fix but I don't have the time to track them all down just yet (and I suspect there's at least a few others lurking). If someone else is willing to help fix these issues though I would be fine adding this to oss-fuzz! |
It should make it easier to track down issues like google/oss-fuzz#5865 (comment)
Mostly to be able to experiment with the fuzz target by injecting trivial bugs catchable by ASan to make sure that they aren't compiled out. It should help to track down weird issues like google/oss-fuzz#5865 (comment)
It should make it easier to track down issues like google/oss-fuzz#5865 (comment)
Mostly to be able to experiment with the fuzz target by injecting trivial bugs catchable by ASan to make sure that they aren't compiled out. It should help to track down weird issues like google/oss-fuzz#5865 (comment)
It should make it easier to track down issues like google/oss-fuzz#5865 (comment)
Mostly to be able to experiment with the fuzz target by injecting trivial bugs catchable by ASan to make sure that they aren't compiled out. It should help to track down weird issues like google/oss-fuzz#5865 (comment)
As far as know |
I'm trying to figure out how
cargo fuzz
is integrated into OSS-Fuzz. The build script points to my fork: https://github.com/evverx/toml-rs/commits/fuzzThe fuzz target has found a stack-overflow locally (as far as I can tell, it's the same stack overflow as the one reported in toml-rs/toml-rs#428) so it seems to be working more or less
@alexcrichton I'd appreciate it if you could take a look at the fuzzer. It's currently at toml-rs/toml-rs#430