<html>
    <head>
      <base href="https://llvm.org/bugs/" />
    </head>
    <body><table border="1" cellspacing="0" cellpadding="8">
        <tr>
          <th>Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_NEW "
   title="NEW --- - Seed values for LibFuzzer are read in as signed integers"
   href="https://llvm.org/bugs/show_bug.cgi?id=25767">25767</a>
          </td>
        </tr>

        <tr>
          <th>Summary</th>
          <td>Seed values for LibFuzzer are read in as signed integers
          </td>
        </tr>

        <tr>
          <th>Product</th>
          <td>new-bugs
          </td>
        </tr>

        <tr>
          <th>Version</th>
          <td>trunk
          </td>
        </tr>

        <tr>
          <th>Hardware</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>OS</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>Status</th>
          <td>NEW
          </td>
        </tr>

        <tr>
          <th>Severity</th>
          <td>normal
          </td>
        </tr>

        <tr>
          <th>Priority</th>
          <td>P
          </td>
        </tr>

        <tr>
          <th>Component</th>
          <td>new bugs
          </td>
        </tr>

        <tr>
          <th>Assignee</th>
          <td>unassignedbugs@nondot.org
          </td>
        </tr>

        <tr>
          <th>Reporter</th>
          <td>danielaustin@google.com
          </td>
        </tr>

        <tr>
          <th>CC</th>
          <td>llvm-bugs@lists.llvm.org
          </td>
        </tr>

        <tr>
          <th>Classification</th>
          <td>Unclassified
          </td>
        </tr></table>
      <p>
        <div>
        <pre>In FuzzerDriver.cpp, this happened:

#define FUZZER_FLAG_INT(Name, Default, Description) int Name;

This results in 'stol: out of range' exceptions when processing a value larger
than 2147483647. This was identified by running:

./fuzzer -seed=2574387484 

on a 32-bit ARM device (Current AOSP, Nexus 6)

Fuzzing session replay requires first checking if the generated seed value is
greater than 2147483647, and translating it to its hex representation, which
does not trigger the out of range issue.

This only seems to be an issue when using the seed flag, the seed value in
FuzzerDriver is an unsigned and appears to be handled correctly in the rest of
the library.</pre>
        </div>
      </p>
      <hr>
      <span>You are receiving this mail because:</span>
      
      <ul>
          <li>You are on the CC list for the bug.</li>
      </ul>
    </body>
</html>