@@ -33,7 +33,7 @@ clang-proto-fuzzer
33
33
A |protobuf fuzzer | that compiles valid C++ programs generated from a protobuf
34
34
class that describes a subset of the C++ language.
35
35
36
- This fuzzer accepts clang command line options after `ignore_remaining_args=1 `.
36
+ This fuzzer accepts clang command- line options after `ignore_remaining_args=1 `.
37
37
For example, the following command will fuzz clang with a higher optimization
38
38
level:
39
39
@@ -106,7 +106,7 @@ llvm-opt-fuzzer
106
106
107
107
A |LLVM IR fuzzer | aimed at finding bugs in optimization passes.
108
108
109
- It receives optimization pipeline and runs it for each fuzzer input.
109
+ It receives an optimization pipeline and runs it for each fuzzer input.
110
110
111
111
Interface of this fuzzer almost directly mirrors ``llvm-isel-fuzzer ``. Both
112
112
``mtriple `` and ``passes `` arguments are required. Passes are specified in a
@@ -117,7 +117,7 @@ this format in the doxygen for ``PassBuilder::parsePassPipeline``.
117
117
118
118
% bin/llvm-opt-fuzzer < corpus-dir> -ignore_remaining_args=1 -mtriple x86_64 -passes instcombine
119
119
120
- Similarly to the ``llvm-isel-fuzzer `` arguments in some predefined configurations
120
+ Similarly to the ``llvm-isel-fuzzer ``, arguments in some predefined configurations
121
121
might be embedded directly into the binary file name:
122
122
123
123
.. code-block :: shell
@@ -176,7 +176,7 @@ mutations that a fuzzer in LLVM might want.
176
176
Generic Random Fuzzing
177
177
----------------------
178
178
179
- The most basic form of input mutation is to use the built in mutators of
179
+ The most basic form of input mutation is to use the built- in mutators of
180
180
LibFuzzer. These simply treat the input corpus as a bag of bits and make random
181
181
mutations. This type of fuzzer is good for stressing the surface layers of a
182
182
program, and is good at testing things like lexers, parsers, or binary
@@ -244,7 +244,7 @@ by adding the following two flags to your CMake invocation:
244
244
to avoid building the sanitizers themselves with sanitizers enabled.
245
245
246
246
.. note :: You may run into issues if you build with BFD ld, which is the
247
- default linker on many unix systems. These issues are being tracked
247
+ default linker on many Unix systems. These issues are being tracked
248
248
in https://llvm.org/PR34636.
249
249
250
250
Continuously Running and Finding Bugs
@@ -280,6 +280,6 @@ your fuzzer can be built and tested when not built against libFuzzer.
280
280
281
281
There is also some handling of the CMake config for fuzzers, where you should
282
282
use the ``add_llvm_fuzzer `` to set up fuzzer targets. This function works
283
- similarly to functions such as ``add_llvm_tool ``, but they take care of linking
283
+ similarly to functions such as ``add_llvm_tool ``, but it takes care of linking
284
284
to LibFuzzer when appropriate and can be passed the ``DUMMY_MAIN `` argument to
285
285
enable standalone testing.
0 commit comments