You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// NrbfDecoderFuzzer
WARNING: Failed to find function "__sanitizer_acquire_crash_state".
WARNING: Failed to find function "__sanitizer_print_stack_trace".
WARNING: Failed to find function "__sanitizer_set_death_callback".
D:\runner-dir>D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\deployment\NrbfDecoderFuzzer\/libfuzzer-dotnet.exe --target_path=D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\deployment\NrbfDecoderFuzzer\/DotnetFuzzing.exe --target_arg=NrbfDecoderFuzzer -dict=D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\deployment\NrbfDecoderFuzzer\dictionary -timeout=60 -max_total_time=3600 NrbfDecoderFuzzer-inputs -exact_artifact_path=NrbfDecoderFuzzer-artifact-3 -print_final_stats=1
INFO: libFuzzer ignores flags that start with '--'
Dictionary: 8 entries
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 153171003
INFO: Loaded 1 modules (82 inline 8-bit counters): 82 [00007FF7BAC53008, 00007FF7BAC5305A),
INFO: Loaded 1 PC tables (82 PCs): 82 [00007FF7BAC236F8,00007FF7BAC23C18),
INFO: 65536 Extra Counters
INFO: 9724 files found in NrbfDecoderFuzzer-inputs
INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes
INFO: seed corpus: files: 9724 min: 1b max: 1585b total: 1149642b rss: 30Mb
System.InvalidOperationException: Operation is not valid due to the current state of the object.
at System.Formats.Nrbf.NrbfDecoder.DecodeMemberPrimitiveTypedRecord(BinaryReader reader)
at System.Formats.Nrbf.NrbfDecoder.DecodeNext(BinaryReader reader, RecordMap recordMap, AllowedRecordTypes allowed, PayloadOptions options, SerializationRecordType& recordType)
at System.Formats.Nrbf.NrbfDecoder.Decode(BinaryReader reader, PayloadOptions options, IReadOnlyDictionary`2& readOnlyRecordMap)
at System.Formats.Nrbf.NrbfDecoder.Decode(Stream payload, IReadOnlyDictionary`2& recordMap, PayloadOptions options, Boolean leaveOpen)
at DotnetFuzzing.Fuzzers.NrbfDecoderFuzzer.Test(Span`1 testSpan, Stream stream) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Fuzzers\NrbfDecoderFuzzer.cs:line 43
at DotnetFuzzing.Fuzzers.NrbfDecoderFuzzer.Test(ReadOnlySpan`1 bytes, PoisonPagePlacement poisonPagePlacement) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Fuzzers\NrbfDecoderFuzzer.cs:line 30
at DotnetFuzzing.Fuzzers.NrbfDecoderFuzzer.FuzzTarget(ReadOnlySpan`1 bytes) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Fuzzers\NrbfDecoderFuzzer.cs:line 21
at DotnetFuzzing.Program.<>c__DisplayClass1_0.<RunFuzzer>b__0(ReadOnlySpan`1 bytes) in D:\runner-dir\runtime\src\libraries\Fuzzing\DotnetFuzzing\Program.cs:line 91
at SharpFuzz.Fuzzer.LibFuzzer.Run(ReadOnlySpanAction action, Boolean ignoreExceptions)
==2996== ERROR: libFuzzer: deadly signal
NOTE: libFuzzer has rudimentary signal handlers.
Combine libFuzzer with AddressSanitizer or similar for better crash reports.
SUMMARY: libFuzzer: deadly signal
MS: 0 ; base unit: 0000000000000000000000000000000000000000
0x0,0x1,0x0,0x0,0xff,0x0,0x30,0xff,0xff,0x1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x8,0x12,
\000\001\000\000\377\0000\377\377\001\000\000\000\000\000\000\000\010\022
artifact_prefix='./'; Test unit written to NrbfDecoderFuzzer-artifact-3
Base64: AAEAAP8AMP//AQAAAAAAAAAIEg==
Job completed in 37 minutes 30 seconds.
dotnet/runtime#107682
Artifacts:
The text was updated successfully, but these errors were encountered: