![]() | |
---|---|
Software: Apache. PHP/5.4.45 uname -a: Linux webm056.cluster010.gra.hosting.ovh.net 5.15.167-ovh-vps-grsec-zfs-classid #1 SMP Tue uid=243112(mycochar) gid=100(users) groups=100(users) Safe-mode: OFF (not secure) /home/mycochar/www/image/photo/go/src/cmd/go/testdata/script/ drwxr-xr-x |
Viewing file: Select action/file-type: # Test that coverage instrumentation is working. Without the instrumentation # it is _extremely_ unlikely that the fuzzer would produce this particular # input in any reasonable amount of time. [short] skip [!fuzz-instrumented] skip env GOCACHE=$WORK/cache # TODO(#51484): enabled debugging info to help diagnose a deadlock in the fuzzer env GODEBUG=fuzzdebug=1 ! go test -fuzz=FuzzCov -v ! stderr 'cov instrumentation working' -- go.mod -- module test -- cov_test.go -- package cov import "testing" func FuzzCov(f *testing.F) { f.Fuzz(func(t *testing.T, b []byte) { if len(b) == 8 && b[0] == 'h' && b[1] == 'e' && b[2] == 'l' && b[3] == 'l' && b[4] == 'o' && b[5] == ' ' && b[6] == ':' && b[7] == ')' { panic("cov instrumentation working") } }) } |
Useful Commands
|
Php Safe-Mode Bypass (Read Files)
|
--[ x2300 Locus7Shell v. 1.0a beta Modded by #!physx^ | www.LOCUS7S.com | Generation time: 0.006 ]-- |