Lines Matching +full:docs +full:- +full:lldb +full:- +full:html
5 --------
7 LLDB has fuzzers that provide automated `fuzz testing <https://en.wikipedia.org/wiki/Fuzzing>`_ for…
10 --------------------
12 Building the LLDB fuzzers requires a build configuration that has the address sanitizer and sanitiz…
16 -DLLVM_USE_SANITIZER='Address' \
17 -DLLVM_USE_SANITIZE_COVERAGE=On \
18 -DCLANG_ENABLE_PROTO_FUZZER=ON
20 …zzer's sanitizer coverage is available here: `<https://llvm.org/docs/LibFuzzer.html#fuzzer-usage>`_
22 If you want to debug LLDB itself when you find a bug using the fuzzers, use the CMake option ``-DCM…
28 $ ninja lldb-target-fuzzer
29 $ ninja lldb-commandinterpreter-fuzzer
30 $ ninja lldb-expression-fuzzer
35 ----------------------
37 Currently, there are plans to integrate the LLDB fuzzers into the `OSS Fuzz <https://github.com/goo…
40 -------------------
46 $ ./bin/lldb-target-fuzzer
47 $ ./bin/lldb-commandinterpreter-fuzzer
48 $ ./bin/lldb-expression-fuzzer
50 …directly, and you can use the `libFuzzer options <https://llvm.org/docs/LibFuzzer.html#options>`_ …
52 …-line arguments that provide better fuzzing for the components being tested. Running the fuzzers t…
58 $ ninja fuzz-lldb-target
59 $ ninja fuzz-lldb-commandinterpreter
60 $ ninja fuzz-lldb-expression
63 ----------------------------------
65 …LLDB to crash, timeout or run out of memory, the input is saved to a file in the build directory. …
67 …r-artifacts/<fuzzer name>-artifacts``, which is created in your build directory. The input files w…
69 …otten the input, you can pass the individual input to the fuzzer binary as a command-line argument: