/third_party/skia/third_party/externals/tint/fuzzers/ |
D | tint_all_transforms_fuzzer.cc | 28 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kSpv); in LLVMFuzzerTestOneInput() local 29 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput() 30 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput() 32 fuzzer.Run(data, size); in LLVMFuzzerTestOneInput() 40 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kHLSL); in LLVMFuzzerTestOneInput() local 41 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput() 42 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput() 44 fuzzer.Run(data, size); in LLVMFuzzerTestOneInput() 53 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kMSL); in LLVMFuzzerTestOneInput() local 54 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput() [all …]
|
D | tint_black_box_fuzz_target.cc | 132 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local 134 return fuzzer.Run(data.data(), data.size()); in main() 139 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local 141 fuzzer.SetOptionsMsl(options); in main() 142 return fuzzer.Run(data.data(), data.size()); in main() 147 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local 149 fuzzer.SetOptionsSpirv(options); in main() 150 return fuzzer.Run(data.data(), data.size()); in main() 153 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local 155 return fuzzer.Run(data.data(), data.size()); in main()
|
D | tint_binding_remapper_fuzzer.cc | 26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local 27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput() 28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput() 30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
|
D | tint_single_entry_point_fuzzer.cc | 26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local 27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput() 28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput() 30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
|
D | tint_first_index_offset_fuzzer.cc | 26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local 27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput() 28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput() 30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
|
D | tint_renamer_fuzzer.cc | 26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local 27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput() 28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput() 30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
|
D | tint_wgsl_reader_spv_writer_fuzzer.cc | 27 tint::fuzzers::ReaderWriterFuzzer fuzzer(InputFormat::kWGSL, in LLVMFuzzerTestOneInput() local 29 fuzzer.SetOptionsSpirv(options); in LLVMFuzzerTestOneInput() 30 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput() 31 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
|
/third_party/skia/third_party/externals/harfbuzz/test/fuzzing/ |
D | Makefile.am | 20 run-shape-fuzzer-tests.py \ 21 run-subset-fuzzer-tests.py \ 22 run-draw-fuzzer-tests.py \ 28 hb-shape-fuzzer \ 29 hb-subset-fuzzer \ 30 hb-set-fuzzer \ 31 hb-draw-fuzzer \ 41 hb-fuzzer.hh \ 42 hb-shape-fuzzer.cc \ 50 hb-fuzzer.hh \ [all …]
|
D | meson.build | 2 'hb-shape-fuzzer.cc', 3 'hb-subset-fuzzer.cc', 4 'hb-set-fuzzer.cc', 5 'hb-draw-fuzzer.cc', 35 test('shape_fuzzer', find_program('run-shape-fuzzer-tests.py'), 46 test('subset_fuzzer', find_program('run-subset-fuzzer-tests.py'), 58 test('draw_fuzzer', find_program('run-draw-fuzzer-tests.py'),
|
/third_party/harfbuzz/test/fuzzing/ |
D | Makefile.am | 20 run-shape-fuzzer-tests.py \ 21 run-subset-fuzzer-tests.py \ 22 run-draw-fuzzer-tests.py \ 28 hb-shape-fuzzer \ 29 hb-subset-fuzzer \ 30 hb-set-fuzzer \ 31 hb-draw-fuzzer \ 41 hb-fuzzer.hh \ 42 hb-shape-fuzzer.cc \ 50 hb-fuzzer.hh \ [all …]
|
D | meson.build | 2 'hb-shape-fuzzer.cc', 3 'hb-subset-fuzzer.cc', 4 'hb-set-fuzzer.cc', 5 'hb-draw-fuzzer.cc', 35 test('shape_fuzzer', find_program('run-shape-fuzzer-tests.py'), 46 test('subset_fuzzer', find_program('run-subset-fuzzer-tests.py'), 58 test('draw_fuzzer', find_program('run-draw-fuzzer-tests.py'),
|
/third_party/flutter/skia/third_party/externals/harfbuzz/test/fuzzing/ |
D | CMakeLists.txt | 8 #add_executable (hb-shape-fuzzer # it should be run only after ragel execution 12 add_executable (hb-shape-fuzzer ${hb_shape_fuzzer_SOURCES}) 13 target_link_libraries (hb-shape-fuzzer harfbuzz) 15 add_executable (hb-subset-fuzzer ${hb_subset_fuzzer_SOURCES}) 16 target_link_libraries (hb-subset-fuzzer harfbuzz-subset) 18 target_compile_definitions(hb-shape-fuzzer PUBLIC ${FUZZING_CPPFLAGS}) 19 target_compile_definitions(hb-subset-fuzzer PUBLIC ${FUZZING_CPPFLAGS}) 21 add_test (NAME hb-shape-fuzzer 22 COMMAND "${PYTHON_EXECUTABLE}" run-shape-fuzzer-tests.py $<TARGET_FILE:hb-shape-fuzzer> 24 add_test (NAME hb-subset-fuzzer [all …]
|
D | Makefile.am | 20 run-shape-fuzzer-tests.py \ 21 run-subset-fuzzer-tests.py \ 27 hb-shape-fuzzer \ 28 hb-subset-fuzzer \ 38 hb-fuzzer.hh \ 39 hb-shape-fuzzer.cc \ 47 hb-fuzzer.hh \ 48 hb-subset-fuzzer.cc \ 58 … srcdir="$(srcdir)" builddir="$(builddir)" LIBTOOL="$(LIBTOOL)" $(srcdir)/run-shape-fuzzer-tests.py 59 …srcdir="$(srcdir)" builddir="$(builddir)" LIBTOOL="$(LIBTOOL)" $(srcdir)/run-subset-fuzzer-tests.py
|
/third_party/skia/fuzz/ |
D | README.md | 3 randomly, focusing on specific APIs). For example, we have a codec fuzzer which takes a mutated 4 png/jpeg or similar file and attempts to turn it into an `SkImage`. We also have a canvas fuzzer 9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also 10 single fuzzer executables containing exactly one fuzzer, which are convenient to build with 28 When enabling a fuzzer in OSS-Fuzz, we typically need to follow these steps: 29 1. *Add a seed corpus to `gs://skia-fuzzer/oss-fuzz/` (in the 30 …[skia-public project](https://console.cloud.google.com/storage/browser/skia-fuzzer?project=skia-pu… 37 to build the desired fuzzer target and move it into $OUT. If there is a seed corpus, move 38 it into $OUT and make sure it is the same name as the fuzzer executable with `_seed_corpus.zip` 53 <https://oss-fuzz.com/fuzzer-stats> is useful to see metrics on how our fuzzers are running. It [all …]
|
/third_party/skia/third_party/externals/libwebp/ |
D | .gitignore | 47 tests/fuzzer/advanced_api_fuzzer 48 tests/fuzzer/animation_api_fuzzer 49 tests/fuzzer/animdecoder_fuzzer 50 tests/fuzzer/animencoder_fuzzer 51 tests/fuzzer/demux_api_fuzzer 52 tests/fuzzer/enc_dec_fuzzer 53 tests/fuzzer/mux_demux_api_fuzzer 54 tests/fuzzer/simple_api_fuzzer
|
/third_party/skia/third_party/externals/dawn/infra/config/global/ |
D | main.star | 197 def get_default_properties(os, clang, debug, cpu, fuzzer): 218 if fuzzer: 233 def add_ci_builder(name, os, clang, debug, cpu, fuzzer): 246 properties_ci = get_default_properties(os, clang, debug, cpu, fuzzer) 248 if fuzzer: 251 if not fuzzer: 265 def add_try_builder(name, os, clang, debug, cpu, fuzzer): 278 properties_try = get_default_properties(os, clang, debug, cpu, fuzzer) 292 def dawn_standalone_builder(name, clang, debug, cpu, fuzzer = False): 305 add_ci_builder(name, os, clang, debug, cpu, fuzzer) [all …]
|
/third_party/json/test/ |
D | Makefile | 12 FUZZER_ENGINE = src/fuzzer-driver_afl.cpp 17 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_json.cpp -o $@ 20 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_bson.cpp -o $@ 23 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_cbor.cpp -o $@ 26 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_msgpack.cpp -o $@ 29 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_ubjson.cpp -o $@
|
/third_party/openssl/fuzz/ |
D | README.md | 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 29 -fsanitize=fuzzer-no-link \ 59 a `--with-fuzzer-include` option, which should be the parent directory of the 60 prebuilt fuzzer library. This is represented as `$PATH_TO_LIBFUZZER_DIR` below. 63 --with-fuzzer-include=$PATH_TO_LIBFUZZER_DIR \ 64 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 67 -fsanitize=fuzzer-no-link \ 100 If a fuzzer generates a reproducible error, you can reproduce the problem using [all …]
|
/third_party/openssl/test/recipes/ |
D | 99-test_fuzz_cms.t | 15 my $fuzzer = "cms"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
D | 99-test_fuzz_ct.t | 15 my $fuzzer = "ct"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
D | 99-test_fuzz_cmp.t | 15 my $fuzzer = "cmp"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
/third_party/json/ |
D | Makefile | 74 mv test/parse_afl_fuzzer fuzz-testing/fuzzer 82 mv test/parse_bson_fuzzer fuzz-testing/fuzzer 90 mv test/parse_cbor_fuzzer fuzz-testing/fuzzer 98 mv test/parse_msgpack_fuzzer fuzz-testing/fuzzer 106 mv test/parse_ubjson_fuzzer fuzz-testing/fuzzer 111 afl-fuzz -S fuzzer1 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null & 112 afl-fuzz -S fuzzer2 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null & 113 afl-fuzz -S fuzzer3 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null & 114 afl-fuzz -S fuzzer4 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null & 115 afl-fuzz -S fuzzer5 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null & [all …]
|
/third_party/json/test/thirdparty/Fuzzer/ |
D | FuzzerTracePC.cpp | 27 namespace fuzzer { namespace 265 fuzzer::TPC.HandleTrace(Guard, PC); in __sanitizer_cov_trace_pc_guard() 270 fuzzer::TPC.HandleInit(Start, Stop); in __sanitizer_cov_trace_pc_guard_init() 276 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir() 281 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp8() 285 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp4() 289 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp2() 293 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp1() 320 fuzzer::TPC.HandleCmp(PC + Idx, static_cast<uint32_t>(Val), in __sanitizer_cov_trace_switch() 323 fuzzer::TPC.HandleCmp(PC + Idx, Val, Vals[Idx]); in __sanitizer_cov_trace_switch() [all …]
|
/third_party/libxml2/fuzz/ |
D | genSeed.c | 41 const char *fuzzer; member 212 globalData.fuzzer, base); in processPattern() 378 const char *fuzzer; in main() local 390 fuzzer = argv[1]; in main() 391 if (strcmp(fuzzer, "html") == 0) { in main() 396 } else if (strcmp(fuzzer, "schema") == 0) { in main() 401 } else if (strcmp(fuzzer, "xml") == 0) { in main() 406 } else if (strcmp(fuzzer, "xpath") == 0) { in main() 411 fprintf(stderr, "unknown fuzzer %s\n", fuzzer); in main() 414 globalData.fuzzer = fuzzer; in main()
|
/third_party/skia/site/docs/dev/testing/ |
D | fuzz.md | 48 Your fuzzer entry point should implement this API: 56 You should now be able to use `-fsanitize=fuzzer` with Clang. 62 sanitize = "fuzzer" 63 extra_cflags = [ "-DSK_BUILD_FOR_LIBFUZZER", # enables fuzzer-constraints (see below) 68 Build Skia and your fuzzer entry point: 71 clang++-10 -I. -O1 -fsanitize=fuzzer fuzz/oss_fuzz/whatever.cpp out/libfuzzer/libskia.a 73 Run your new fuzzer binary 79 There are some defines that can help guide a fuzzer to be more productive (e.g.
|