searching for reviewer(decoder)
037e2534c8bd12a8a06ae7d128d01d11768ffe2a: Bug 1547682: Reenable wasm fuzzing for cranelift; r=decoder
Benjamin Bouvier <benj@benj.me> - Mon, 29 Apr 2019 13:05:15 +0200 - rev 473821
Push 113112 by bbouvier@mozilla.com at Wed, 15 May 2019 07:22:29 +0000
Bug 1547682: Reenable wasm fuzzing for cranelift; r=decoder Differential Revision: https://phabricator.services.mozilla.com/D29192
815455c1634eb1ca7f51f03a6117d4fe037809b5: Bug 1547682: Reenable wasm fuzzing for cranelift; r=decoder
Benjamin Bouvier <benj@benj.me> - Mon, 29 Apr 2019 13:05:15 +0200 - rev 472241
Push 112985 by bbouvier@mozilla.com at Thu, 02 May 2019 10:29:04 +0000
Bug 1547682: Reenable wasm fuzzing for cranelift; r=decoder Differential Revision: https://phabricator.services.mozilla.com/D29192
f23caf168c32b31b5bae01c15bf958dca5571a01: Bug 1538207 - Don't call into the prefs service OMT. r=decoder
Emilio Cobos Álvarez <emilio@crisal.io> - Fri, 22 Mar 2019 16:29:27 +0000 - rev 465745
Push 112523 by shindli@mozilla.com at Sat, 23 Mar 2019 09:54:29 +0000
Bug 1538207 - Don't call into the prefs service OMT. r=decoder Use a VarCache instead. Differential Revision: https://phabricator.services.mozilla.com/D24514
8f0821b17fd680a419dd6ce7f8b839c0318f3d69: Bug 1533092 - Add in-tree fuzzing support for dav1d r=decoder
Tyson Smith <twsmith@mozilla.com> - Mon, 11 Mar 2019 20:00:31 +0000 - rev 463591
Push 112400 by btara@mozilla.com at Tue, 12 Mar 2019 10:04:06 +0000
Bug 1533092 - Add in-tree fuzzing support for dav1d r=decoder Differential Revision: https://phabricator.services.mozilla.com/D22383
97c36c63095b318408a5c40d969347f4f432c86a: Bug 1519232 - simplify faulty's valid process logic; r=decoder,f=posidron
Nathan Froyd <froydnj@mozilla.com> - Fri, 11 Jan 2019 17:44:47 -0500 - rev 453533
Push 111106 by nfroyd@mozilla.com at Fri, 11 Jan 2019 22:45:06 +0000
Bug 1519232 - simplify faulty's valid process logic; r=decoder,f=posidron There's no need to explicit list out all the child process types that we care about, when a simple is-this-the-parent-process check can do the job just as well.
b6d7250b9df350bbd32a904076e8c3bcd76ff4fe: Bug 1514346 - Add --enable-gczeal to fuzzing builds, r=decoder
Steve Fink <sfink@mozilla.com> - Fri, 14 Dec 2018 11:47:30 -0800 - rev 450840
Push 110547 by sfink@mozilla.com at Sat, 15 Dec 2018 15:57:14 +0000
Bug 1514346 - Add --enable-gczeal to fuzzing builds, r=decoder
7c3b738cd87ca1680ea19f26248f1cb55c1d1285: Bug 1504489 - Make fuzzing ccov mozconfig import the code coverage opt mozconfig. r=decoder
Marco Castelluccio <mcastelluccio@mozilla.com> - Thu, 15 Nov 2018 00:40:19 +0100 - rev 446543
Push 109885 by mcastelluccio@mozilla.com at Thu, 15 Nov 2018 13:26:55 +0000
Bug 1504489 - Make fuzzing ccov mozconfig import the code coverage opt mozconfig. r=decoder DONTBUILD as the fuzzing ccov builds are only built on mozilla-central
70adf7cb715dd367468df923fe31d87d3b0dea88: Bug 1504489 - Compress debug info section to avoid package failure due to too big libxul.so. r=decoder
Marco Castelluccio <mcastelluccio@mozilla.com> - Wed, 14 Nov 2018 18:18:48 +0100 - rev 446542
Push 109885 by mcastelluccio@mozilla.com at Thu, 15 Nov 2018 13:26:55 +0000
Bug 1504489 - Compress debug info section to avoid package failure due to too big libxul.so. r=decoder
9208f52dd028a6aaf187c9368c6141b62b5ac9d1: Bug 1502021 - Keep renaming __gcov_flush in LLVM to avoid naming clashes with builds mixing GCC and LLVM coverage instrumentation. r=decoder
Marco Castelluccio <mcastelluccio@mozilla.com> - Wed, 14 Nov 2018 01:41:22 +0100 - rev 446541
Push 109885 by mcastelluccio@mozilla.com at Thu, 15 Nov 2018 13:26:55 +0000
Bug 1502021 - Keep renaming __gcov_flush in LLVM to avoid naming clashes with builds mixing GCC and LLVM coverage instrumentation. r=decoder
d95dd4c9cdca35de156b2cf180591ac7ad094cf4: Bug 1495871 - use C++11 statics for Faulty instance; r=decoder
Nathan Froyd <froydnj@mozilla.com> - Fri, 05 Oct 2018 13:43:47 -0400 - rev 439812
Push 108681 by nfroyd@mozilla.com at Fri, 05 Oct 2018 17:44:10 +0000
Bug 1495871 - use C++11 statics for Faulty instance; r=decoder C++11 provides guaranteed thread-safe static initialization, so we can use that instead of ipc's baroque Singleton class.
d07de0b49710184495ad4f25b52517f0e44bd222: Bug 1487173 Switch asan-reporter to built-in r=decoder
Andrew Swan <aswan@mozilla.com> - Mon, 17 Sep 2018 18:19:33 +0000 - rev 436890
Push 107944 by btara@mozilla.com at Tue, 18 Sep 2018 04:15:37 +0000
Bug 1487173 Switch asan-reporter to built-in r=decoder Differential Revision: https://phabricator.services.mozilla.com/D5615
dedd5c14209a8a120ad837784362c5c8539d8784: Bug 1487098 - Reorder boolean expression to take advantage of short-circuiting. r=decoder
Jonathan Kew <jkew@mozilla.com> - Sat, 01 Sep 2018 22:41:59 +0100 - rev 434421
Push 107362 by jkew@mozilla.com at Sat, 01 Sep 2018 21:42:24 +0000
Bug 1487098 - Reorder boolean expression to take advantage of short-circuiting. r=decoder
16018f6ec0c897edf6f4fb82e462e057b8bfa712: Bug 1484556: add Qcms fuzzer seed profiles. r=decoder
Thomas P. <pdknsk+mozilla@gmail.com> - Fri, 24 Aug 2018 04:31:37 +0000 - rev 433704
Push 107167 by ebalazs@mozilla.com at Wed, 29 Aug 2018 07:24:25 +0000
Bug 1484556: add Qcms fuzzer seed profiles. r=decoder
c0d9b3d290c0d99c6a1417f6c5d58880b06ecb12: Bug 1475448 - Add ContentSecurityPolicyParser fuzzing target. r=ckerschb, sr=decoder
Thomas P. <pdknsk+mozilla@gmail.com> - Fri, 24 Aug 2018 08:30:24 +0000 - rev 433268
Push 107012 by ryanvm@gmail.com at Fri, 24 Aug 2018 12:04:15 +0000
Bug 1475448 - Add ContentSecurityPolicyParser fuzzing target. r=ckerschb, sr=decoder
f578ca2a361ec09d98582dc9428345d9c57096ec: Bug 1481237 - Automate updating internal libFuzzer code. r=decoder
Thomas P. <pdknsk+mozilla@gmail.com> - Wed, 15 Aug 2018 22:01:25 +0000 - rev 431841
Push 106566 by ryanvm@gmail.com at Thu, 16 Aug 2018 03:12:31 +0000
Bug 1481237 - Automate updating internal libFuzzer code. r=decoder
d89d8b34e5bd037928b22a6dafbf7137d812a936: Bug 1477858 - add Qcms fuzzing target dictionary. r=decoder
Thomas P. <pdknsk+mozilla@gmail.com> - Mon, 23 Jul 2018 22:34:16 +0000 - rev 428552
Push 105721 by nbeleuzu@mozilla.com at Thu, 26 Jul 2018 16:31:53 +0000
Bug 1477858 - add Qcms fuzzing target dictionary. r=decoder
22c4e17a6b309adc8bd34b3e24f2a6f272ec806b: Bug 1459425: add fuzzing target for qcms. r=bas sr=decoder
Thomas P. <pdknsk+mozilla@gmail.com> - Tue, 26 Jun 2018 02:40:45 +0000 - rev 423681
Push 104629 by nbeleuzu@mozilla.com at Tue, 26 Jun 2018 11:00:13 +0000
Bug 1459425: add fuzzing target for qcms. r=bas sr=decoder hybrid target that works with both the native interface and oss-fuzz
c8d6bf455ae5ac9a31ff9fc5418e87a66f12e89c: Bug 1452576 - Improve StructuredCloneHolder for fuzzy tests, r=decoder
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 10 May 2018 09:02:16 +0200 - rev 417647
Push 103117 by amarchesini@mozilla.com at Thu, 10 May 2018 07:06:17 +0000
Bug 1452576 - Improve StructuredCloneHolder for fuzzy tests, r=decoder
8b78c29994008a5830db0386f9547d5dfb60ab79: Bug 1452784 - Use malloc() instead of new[] in IDBObjectStorage to match the use of free() in memory BlobImpl, r=decoder
Andrea Marchesini <amarchesini@mozilla.com> - Wed, 09 May 2018 11:02:12 +0200 - rev 417497
Push 103077 by amarchesini@mozilla.com at Wed, 09 May 2018 09:02:35 +0000
Bug 1452784 - Use malloc() instead of new[] in IDBObjectStorage to match the use of free() in memory BlobImpl, r=decoder
470ed9163d2219a5dfd9b26f8fce4842ecbeab9d: Bug 1452625 - bumped in-tree libFuzzer to latest version; r=decoder
Alex Gaynor <agaynor@mozilla.com> - Mon, 09 Apr 2018 10:00:54 -0400 - rev 412534
Push 101941 by ncsoregi@mozilla.com at Tue, 10 Apr 2018 10:02:49 +0000
Bug 1452625 - bumped in-tree libFuzzer to latest version; r=decoder MozReview-Commit-ID: 4Y5MMrK45ts
900b21685bc45f123eb2daa9e468e0aadee3282d: Bug 1450047 - part 2 - updated in-tree copy of libFuzzer; r=decoder
Alex Gaynor <agaynor@mozilla.com> - Thu, 29 Mar 2018 14:18:36 -0400 - rev 410758
Push 101561 by shindli@mozilla.com at Fri, 30 Mar 2018 10:02:18 +0000
Bug 1450047 - part 2 - updated in-tree copy of libFuzzer; r=decoder MozReview-Commit-ID: I1LZ8N82kr7
1caa3b80f1faf1c0fe5cc30ff572df340280b9a4: Bug 1450047 - Part 1 - switch libFuzzer update script to new git repo; r=decoder
Alex Gaynor <agaynor@mozilla.com> - Thu, 29 Mar 2018 14:17:44 -0400 - rev 410757
Push 101561 by shindli@mozilla.com at Fri, 30 Mar 2018 10:02:18 +0000
Bug 1450047 - Part 1 - switch libFuzzer update script to new git repo; r=decoder MozReview-Commit-ID: Fg6b2UyvoyS
4d4d38e826db359a39b7511cd541dbf3ae0461bb: Bug 1437739 - Don't blacklist the entirety of the JS engine for the signed integer overflow sanitizer. jstests and jit-tests only report two runtime signed overflows, so the problem appears easily well corralled enough to not exclude the entire engine. r=decoder
Jeff Walden <jwalden@mit.edu> - Fri, 02 Feb 2018 21:35:30 -0800 - rev 404048
Push 99932 by jwalden@mit.edu at Fri, 16 Feb 2018 01:43:58 +0000
Bug 1437739 - Don't blacklist the entirety of the JS engine for the signed integer overflow sanitizer. jstests and jit-tests only report two runtime signed overflows, so the problem appears easily well corralled enough to not exclude the entire engine. r=decoder
7144fcd531df304bea9bc2031fab6bc56c405095: Bug 1435484 - Split the integer-overflow blacklist into two blacklists, one for signed integer overflow and one for unsigned integer overflow, and rename both configure flags to be clearer. r=decoder, r=froydnj
Jeff Walden <jwalden@mit.edu> - Fri, 02 Feb 2018 21:25:31 -0800 - rev 402831
Push 99663 by jwalden@mit.edu at Wed, 07 Feb 2018 23:45:09 +0000
Bug 1435484 - Split the integer-overflow blacklist into two blacklists, one for signed integer overflow and one for unsigned integer overflow, and rename both configure flags to be clearer. r=decoder, r=froydnj
70cfa86b3b9c69bfb0fd83efa7b8c431dd42cbde: Bug 1435170 - Split out --enable-ubsan-uint-overflow from --enable-ubsan-int-overflow. r=decoder, r=froydnj
Jeff Walden <jwalden@mit.edu> - Fri, 02 Feb 2018 18:29:29 -0800 - rev 402306
Push 99537 by jwalden@mit.edu at Sat, 03 Feb 2018 06:43:42 +0000
Bug 1435170 - Split out --enable-ubsan-uint-overflow from --enable-ubsan-int-overflow. r=decoder, r=froydnj
1578425fbe9f3c00489dddcc6a1ed447b4721fc1: Bug 1418052 Correctly process hardening flags for ASAN, --disable-hardening, and --disable-optimize r=decoder,glandium
Tom Ritter <tom@mozilla.com> - Mon, 20 Nov 2017 22:20:56 -0600 - rev 400012
Push 99079 by rgurzau@mozilla.com at Sat, 20 Jan 2018 09:46:52 +0000
Bug 1418052 Correctly process hardening flags for ASAN, --disable-hardening, and --disable-optimize r=decoder,glandium Will also address Bug 1377553 and part of Bug 1419607 MozReview-Commit-ID: AUCqBxEGpAl
1ee72d1a943068ec55007fbc11ae58df10522d0c: Bug 1418052 Correctly process hardening flags for ASAN, --disable-hardening, and --disable-optimize r=decoder,glandium
Tom Ritter <tom@mozilla.com> - Mon, 20 Nov 2017 22:20:56 -0600 - rev 395771
Push 98192 by rgurzau@mozilla.com at Fri, 08 Dec 2017 22:58:36 +0000
Bug 1418052 Correctly process hardening flags for ASAN, --disable-hardening, and --disable-optimize r=decoder,glandium Will also address Bug 1377553 and part of Bug 1419607 MozReview-Commit-ID: AUCqBxEGpAl
41717d086ca159c51f5e63aeec2ee32888405e92: Bug 1419608. Make SurfaceKey::SVGContext return a reference instead of a copy. r=decoder
Timothy Nikkel <tnikkel@gmail.com> - Wed, 22 Nov 2017 01:41:35 +0100 - rev 392990
Push 97570 by choller@mozilla.com at Wed, 22 Nov 2017 00:42:28 +0000
Bug 1419608. Make SurfaceKey::SVGContext return a reference instead of a copy. r=decoder MozReview-Commit-ID: Cuee03ukO0k
7dbef7d88601a8e85e27c020e1be4953c6af6385: Bug 1415085 - Make CachedSurface::GetSurfaceKey return a reference instead of a copy. r=decoder
Andrew Osmond <aosmond@mozilla.com> - Tue, 07 Nov 2017 08:10:01 -0500 - rev 390498
Push 97054 by aosmond@gmail.com at Tue, 07 Nov 2017 13:10:15 +0000
Bug 1415085 - Make CachedSurface::GetSurfaceKey return a reference instead of a copy. r=decoder
34ddff9dde5093e226866c74cda9f74aaf4fade8: Bug 1373843: Add a libfuzzer test for the stun parser; r=decoder
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 16 Jun 2017 16:01:19 -0700 - rev 381867
Push 95215 by dminor@mozilla.com at Wed, 20 Sep 2017 11:17:06 +0000
Bug 1373843: Add a libfuzzer test for the stun parser; r=decoder MozReview-Commit-ID: BWUnBIMhT5C
ea883b4c00cdf658699c5cde0995925eeaebac68: Bug 1389851 - libfuzzer: Suppress -Wunreachable-code-return warnings in FuzzerDriver.cpp. r=decoder
Chris Peterson <cpeterson@mozilla.com> - Tue, 15 Aug 2017 21:04:55 -0700 - rev 375713
Push 93959 by cpeterson@mozilla.com at Sat, 19 Aug 2017 05:49:46 +0000
Bug 1389851 - libfuzzer: Suppress -Wunreachable-code-return warnings in FuzzerDriver.cpp. r=decoder Suppress these warnings intead of fixing them because libfuzzer is a third-party llvm library: tools/fuzzing/libfuzzer/FuzzerDriver.cpp:450:10: warning: 'return' will never be executed [-Wunreachable-code-return] tools/fuzzing/libfuzzer/FuzzerDriver.cpp:663:12: warning: 'return' will never be executed [-Wunreachable-code-return] MozReview-Commit-ID: 9mWEuc5wCn9
8873830c2c94af5a1acb37a913160565e656764c: Bug 1376968 - Remove obsolete -fsantize-coverage=edge from fuzzing config. r=decoder
rforbes <rforbes@mozilla.com> - Wed, 28 Jun 2017 15:58:42 -0700 - rev 367569
Push 92263 by cbook@mozilla.com at Thu, 06 Jul 2017 09:21:27 +0000
Bug 1376968 - Remove obsolete -fsantize-coverage=edge from fuzzing config. r=decoder MozReview-Commit-ID: IJAoxu9Ovze
ef52b30f64606d6e0c2f2781b37812f8bb5ae179: Bug 1376978 - Add separate tooltool manifest for TC fuzzing build. r=decoder
rforbes <rforbes@mozilla.com> - Fri, 30 Jun 2017 09:38:54 -0700 - rev 367050
Push 92107 by philringnalda@gmail.com at Sun, 02 Jul 2017 02:01:35 +0000
Bug 1376978 - Add separate tooltool manifest for TC fuzzing build. r=decoder MozReview-Commit-ID: BXEX5uHzjRx *** Bug 1359328 - Add fuzzing.manifest file MozReview-Commit-ID: 4ggQvY1yISY
6bb7ab0e0ce2d6e014f1b171a3538bfec1bb1ce0: Bug 1377562 - Turn off LeakSanitizer for ASan fuzzing build. r=decoder
rforbes <rforbes@mozilla.com> - Fri, 30 Jun 2017 13:10:32 -0700 - rev 367049
Push 92107 by philringnalda@gmail.com at Sun, 02 Jul 2017 02:01:35 +0000
Bug 1377562 - Turn off LeakSanitizer for ASan fuzzing build. r=decoder MozReview-Commit-ID: L97sua9dYX4
2cd5acf5ef6178b604d11acf7dd939cb681c36f4: Bug 1373525 - libfuzzer: Remove unused member function ScopedXPCOM::failed(). r=decoder
Chris Peterson <cpeterson@mozilla.com> - Tue, 13 Jun 2017 00:42:23 -0700 - rev 365409
Push 91741 by cpeterson@mozilla.com at Thu, 22 Jun 2017 05:37:07 +0000
Bug 1373525 - libfuzzer: Remove unused member function ScopedXPCOM::failed(). r=decoder tools/fuzzing/libfuzzer/harness/LibFuzzerTestHarness.h:118:10: warning: unused member function 'failed' [-Wunused-member-function] MozReview-Commit-ID: 7hsvvnnolcl
c902eebc01918850ae3a00c9f9c0d842de988af7: Bug 1371161: port SDP file parser to LibFuzzer r=decoder
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 09 Jun 2017 16:36:38 -0700 - rev 363871
Push 91433 by cbook@mozilla.com at Wed, 14 Jun 2017 12:50:52 +0000
Bug 1371161: port SDP file parser to LibFuzzer r=decoder MozReview-Commit-ID: FJhOdy2ZVqf
0b0edaa4552b1303e2ae011a01a134c10e03a35c: Bug 1359328 - disable libstdc++ compat check for fuzzing tc build r=aobreja,decoder
rforbes <rforbes@mozilla.com> - Thu, 25 May 2017 16:35:57 -0700 - rev 361388
Push 90850 by ryanvm@gmail.com at Wed, 31 May 2017 00:47:26 +0000
Bug 1359328 - disable libstdc++ compat check for fuzzing tc build r=aobreja,decoder MozReview-Commit-ID: 4ZgdtnG2ayx
0dde8401aa7045c9233aed3a2121047ef3867733: Bug 1359328 - update geck_v2_whitelist.py r=aobreja,decoder
rforbes <rforbes@mozilla.com> - Thu, 25 May 2017 15:47:36 -0700 - rev 361387
Push 90850 by ryanvm@gmail.com at Wed, 31 May 2017 00:47:26 +0000
Bug 1359328 - update geck_v2_whitelist.py r=aobreja,decoder MozReview-Commit-ID: HMKKfKbuWEl
de7eb82f8b791e8a0fca88f1573383fe0cf8a68c: Bug 1359328 - Updates for fuzzing taskcluster build r=aobreja,decoder
rforbes <rforbes@mozilla.com> - Thu, 25 May 2017 15:36:21 -0700 - rev 361386
Push 90850 by ryanvm@gmail.com at Wed, 31 May 2017 00:47:26 +0000
Bug 1359328 - Updates for fuzzing taskcluster build r=aobreja,decoder MozReview-Commit-ID: 1RDQYnGTE2s
cd192fa5f5de8d771c59b573de0ba3692da62211: Bug 1359328 - Add a fuzzing build to taskcluster r=aobreja,decoder
rforbes <rforbes@mozilla.com> - Thu, 25 May 2017 12:47:59 -0700 - rev 361385
Push 90850 by ryanvm@gmail.com at Wed, 31 May 2017 00:47:26 +0000
Bug 1359328 - Add a fuzzing build to taskcluster r=aobreja,decoder MozReview-Commit-ID: BYbycnB5wdV
3e17a3e6de6f156ce68c4be10093f84e786aac3a: Bug 1365994 - Update libfuzzer r=decoder
rforbes <rforbes@mozilla.com> - Thu, 18 May 2017 10:23:05 -0700 - rev 359147
Push 90480 by ryanvm@gmail.com at Fri, 19 May 2017 16:25:39 +0000
Bug 1365994 - Update libfuzzer r=decoder MozReview-Commit-ID: GCwIIZd5PTS *** 1365994 - update moz.build for libfuzzer MozReview-Commit-ID: IxbLnviJC08
e685016e259743cdae7ce9f8c70a981b91e5955c: Bug 1330533 - Remove XRE_LibFuzzerGetFuncs. r=decoder
Mike Hommey <mh+mozilla@glandium.org> - Thu, 12 Jan 2017 16:02:50 +0900 - rev 330455
Push 85978 by philringnalda@gmail.com at Sat, 21 Jan 2017 03:16:30 +0000
Bug 1330533 - Remove XRE_LibFuzzerGetFuncs. r=decoder Now that XRE_LibFuzzerGetFuncs is not used from outside libxul, it can be inlined in LibFuzzerRunner::Run, simplifying things a little more.
7fc26210eee598018ce3e926ce413118f19ccf1f: Bug 1330533 - Use FuzzerDriver directly instead of wrapping it in a libfuzzer_main function. r=decoder
Mike Hommey <mh+mozilla@glandium.org> - Thu, 12 Jan 2017 14:44:18 +0900 - rev 330454
Push 85978 by philringnalda@gmail.com at Sat, 21 Jan 2017 03:16:30 +0000
Bug 1330533 - Use FuzzerDriver directly instead of wrapping it in a libfuzzer_main function. r=decoder Going further from the previous changes, all libfuzzer_main really does is call the init function, and then proceed to call the fuzzer driver with the testing function. So instead of calling that function for it to do all that, the LibFuzzerRunner can just call the init function itself, and then call the fuzzer driver with the testing function.
b22cd126ae14dd01ced45406664bbff4394ec3fe: Bug 1330533 - Pass LibFuzzerInitFunc and LibFuzzerTestingFunc to libfuzzer_main. r=decoder
Mike Hommey <mh+mozilla@glandium.org> - Thu, 12 Jan 2017 14:50:14 +0900 - rev 330453
Push 85978 by philringnalda@gmail.com at Sat, 21 Jan 2017 03:16:30 +0000
Bug 1330533 - Pass LibFuzzerInitFunc and LibFuzzerTestingFunc to libfuzzer_main. r=decoder The LibFuzzerRunner code lives in libxul. It's unnecessary complications to have it call back a function in the firefox executable just so that it calls another function that is in libxul. Passing the init and testing functions to the libfuzzer_main function allows to just bypass that roundtrip, simplifying the setup.
7d3a760bda8f25c469e06081dd9cc9189e32f6bb: Bug 1330533 - Remove argc/argv arguments to XRE_LibFuzzerSetMain. r=decoder
Mike Hommey <mh+mozilla@glandium.org> - Thu, 12 Jan 2017 11:59:37 +0900 - rev 330452
Push 85978 by philringnalda@gmail.com at Sat, 21 Jan 2017 03:16:30 +0000
Bug 1330533 - Remove argc/argv arguments to XRE_LibFuzzerSetMain. r=decoder The function given to XRE_LibFuzzerSetMain is called from somewhere that does have access to argc/argv already, so we can avoid passing them to XRE_LibFuzzerSetMain. This actually might fix subtle issues with argc/argv not really matching reality when calling the LibFuzzerMain function in the current code: some arguments are handled before the call, and both argc and argv are modified from within XRE_main, but the values stored for the LibFuzzerMain call still are the original ones. Argv being a pointer, and it not being reallocated, the value stored for the LibFuzzerMain call points to the changed one, but argc, being an integer, is not modified accordingly. In fact, it's actually worse, because while the Gecko code doesn't reallocate argv, gtk_main might. So if some GTK flag is passed on the command line, there's also a possibility that the LibFuzzerMain function will do a use-after-free. So all in all, it's just better to use the set of modified argc/argv from XRE_main instead of storing them from main().
065803891c856a98ab946a755301194f3fc9c82b: Bug 1330481 - Fix "error: a storage class can only be specified for objects and functions". r=decoder
Mike Hommey <mh+mozilla@glandium.org> - Thu, 12 Jan 2017 11:01:37 +0900 - rev 330114
Push 85897 by cbook@mozilla.com at Thu, 19 Jan 2017 15:35:41 +0000
Bug 1330481 - Fix "error: a storage class can only be specified for objects and functions". r=decoder
41b22909f10a0a8b4657da8170d10aeaec2b4af8: Bug 1301496 - Simplify runtime check when tracing helper threads r=terrence a=decoder
Jon Coppeard <jcoppeard@mozilla.com> - Thu, 22 Sep 2016 13:02:40 +0100 - rev 314906
Push 82002 by jcoppeard@mozilla.com at Thu, 22 Sep 2016 12:06:35 +0000
Bug 1301496 - Simplify runtime check when tracing helper threads r=terrence a=decoder
c03ed1e5700b6dd2edd6c4756428cf1b4e943578: Bug 1278718 - Use clang 3.8 on ASAN builds. r=decoder
Mike Hommey <mh+mozilla@glandium.org> - Tue, 07 Jun 2016 20:20:55 +0900 - rev 301805
Push 78463 by mh@glandium.org at Wed, 15 Jun 2016 03:23:32 +0000
Bug 1278718 - Use clang 3.8 on ASAN builds. r=decoder
9c62a8406a127e087c5aa72461a0621b23080ead: Bug 1279096 - Exclude ffi_call from ASAN. r=decoder
Mike Hommey <mh+mozilla@glandium.org> - Thu, 09 Jun 2016 08:48:39 +0900 - rev 301378
Push 78317 by mh@glandium.org at Fri, 10 Jun 2016 00:58:25 +0000
Bug 1279096 - Exclude ffi_call from ASAN. r=decoder
756dae0c26b2f6c7e7c44b63de333854a0997191: Bug 1036235 - Do not use __asan_default_options with clang-cl because it is not supported yet; r=decoder
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 09 Jul 2014 15:16:55 -0400 - rev 193108
Push 46025 by eakhgari@mozilla.com at Wed, 09 Jul 2014 19:17:05 +0000
Bug 1036235 - Do not use __asan_default_options with clang-cl because it is not supported yet; r=decoder