Open
Description
Job completed in 37 minutes 30 seconds.
dotnet/runtime#107682
// NrbfDecoderFuzzer
WARNING: Failed to find function "__sanitizer_acquire_crash_state".
WARNING: Failed to find function "__sanitizer_print_stack_trace".
WARNING: Failed to find function "__sanitizer_set_death_callback".
D:\runner-dir>D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\deployment\NrbfDecoderFuzzer\/libfuzzer-dotnet.exe --target_path=D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\deployment\NrbfDecoderFuzzer\/DotnetFuzzing.exe --target_arg=NrbfDecoderFuzzer -dict=D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\deployment\NrbfDecoderFuzzer\dictionary -timeout=60 -max_total_time=3600 NrbfDecoderFuzzer-inputs -exact_artifact_path=NrbfDecoderFuzzer-artifact-3 -print_final_stats=1
INFO: libFuzzer ignores flags that start with '--'
Dictionary: 8 entries
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 153171003
INFO: Loaded 1 modules (82 inline 8-bit counters): 82 [00007FF7BAC53008, 00007FF7BAC5305A),
INFO: Loaded 1 PC tables (82 PCs): 82 [00007FF7BAC236F8,00007FF7BAC23C18),
INFO: 65536 Extra Counters
INFO: 9724 files found in NrbfDecoderFuzzer-inputs
INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes
INFO: seed corpus: files: 9724 min: 1b max: 1585b total: 1149642b rss: 30Mb
System.InvalidOperationException: Operation is not valid due to the current state of the object.
at System.Formats.Nrbf.NrbfDecoder.DecodeMemberPrimitiveTypedRecord(BinaryReader reader)
at System.Formats.Nrbf.NrbfDecoder.DecodeNext(BinaryReader reader, RecordMap recordMap, AllowedRecordTypes allowed, PayloadOptions options, SerializationRecordType& recordType)
at System.Formats.Nrbf.NrbfDecoder.Decode(BinaryReader reader, PayloadOptions options, IReadOnlyDictionary`2& readOnlyRecordMap)
at System.Formats.Nrbf.NrbfDecoder.Decode(Stream payload, IReadOnlyDictionary`2& recordMap, PayloadOptions options, Boolean leaveOpen)
at DotnetFuzzing.Fuzzers.NrbfDecoderFuzzer.Test(Span`1 testSpan, Stream stream) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Fuzzers\NrbfDecoderFuzzer.cs:line 43
at DotnetFuzzing.Fuzzers.NrbfDecoderFuzzer.Test(ReadOnlySpan`1 bytes, PoisonPagePlacement poisonPagePlacement) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Fuzzers\NrbfDecoderFuzzer.cs:line 30
at DotnetFuzzing.Fuzzers.NrbfDecoderFuzzer.FuzzTarget(ReadOnlySpan`1 bytes) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Fuzzers\NrbfDecoderFuzzer.cs:line 21
at DotnetFuzzing.Program.<>c__DisplayClass1_0.<RunFuzzer>b__0(ReadOnlySpan`1 bytes) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Program.cs:line 91
at SharpFuzz.Fuzzer.LibFuzzer.Run(ReadOnlySpanAction action, Boolean ignoreExceptions)
==2996== ERROR: libFuzzer: deadly signal
NOTE: libFuzzer has rudimentary signal handlers.
Combine libFuzzer with AddressSanitizer or similar for better crash reports.
SUMMARY: libFuzzer: deadly signal
MS: 0 ; base unit: 0000000000000000000000000000000000000000
0x0,0x1,0x0,0x0,0xff,0x0,0x30,0xff,0xff,0x1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x8,0x12,
\000\001\000\000\377\0000\377\377\001\000\000\000\000\000\000\000\010\022
artifact_prefix='./'; Test unit written to NrbfDecoderFuzzer-artifact-3
Base64: AAEAAP8AMP//AQAAAAAAAAAIEg==
Artifacts:
- NrbfDecoderFuzzer-stack.txt (3 KB)
- NrbfDecoderFuzzer-input.bin (19 B)
- NrbfDecoderFuzzer-inputs.zip (1 MB)
Metadata
Metadata
Assignees
Labels
No labels