Home
last modified time | relevance | path

Searched refs:fuzzer (Results 1 – 25 of 220) sorted by relevance

123456789

/third_party/skia/third_party/externals/tint/fuzzers/
Dtint_all_transforms_fuzzer.cc28 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kSpv); in LLVMFuzzerTestOneInput() local
29 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput()
30 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput()
32 fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
40 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kHLSL); in LLVMFuzzerTestOneInput() local
41 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput()
42 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput()
44 fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
53 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kMSL); in LLVMFuzzerTestOneInput() local
54 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput()
[all …]
Dtint_black_box_fuzz_target.cc132 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local
134 return fuzzer.Run(data.data(), data.size()); in main()
139 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local
141 fuzzer.SetOptionsMsl(options); in main()
142 return fuzzer.Run(data.data(), data.size()); in main()
147 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local
149 fuzzer.SetOptionsSpirv(options); in main()
150 return fuzzer.Run(data.data(), data.size()); in main()
153 tint::fuzzers::CommonFuzzer fuzzer(tint::fuzzers::InputFormat::kWGSL, in main() local
155 return fuzzer.Run(data.data(), data.size()); in main()
Dtint_binding_remapper_fuzzer.cc26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local
27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput()
28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput()
30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
Dtint_single_entry_point_fuzzer.cc26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local
27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput()
28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput()
30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
Dtint_first_index_offset_fuzzer.cc26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local
27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput()
28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput()
30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
Dtint_renamer_fuzzer.cc26 fuzzers::CommonFuzzer fuzzer(InputFormat::kWGSL, OutputFormat::kWGSL); in LLVMFuzzerTestOneInput() local
27 fuzzer.SetTransformManager(tb.manager(), tb.data_map()); in LLVMFuzzerTestOneInput()
28 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput()
30 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
Dtint_wgsl_reader_spv_writer_fuzzer.cc27 tint::fuzzers::ReaderWriterFuzzer fuzzer(InputFormat::kWGSL, in LLVMFuzzerTestOneInput() local
29 fuzzer.SetOptionsSpirv(options); in LLVMFuzzerTestOneInput()
30 fuzzer.SetDumpInput(GetCliParams().dump_input); in LLVMFuzzerTestOneInput()
31 return fuzzer.Run(data, size); in LLVMFuzzerTestOneInput()
/third_party/skia/third_party/externals/harfbuzz/test/fuzzing/
DMakefile.am20 run-shape-fuzzer-tests.py \
21 run-subset-fuzzer-tests.py \
22 run-draw-fuzzer-tests.py \
28 hb-shape-fuzzer \
29 hb-subset-fuzzer \
30 hb-set-fuzzer \
31 hb-draw-fuzzer \
41 hb-fuzzer.hh \
42 hb-shape-fuzzer.cc \
50 hb-fuzzer.hh \
[all …]
Dmeson.build2 'hb-shape-fuzzer.cc',
3 'hb-subset-fuzzer.cc',
4 'hb-set-fuzzer.cc',
5 'hb-draw-fuzzer.cc',
35 test('shape_fuzzer', find_program('run-shape-fuzzer-tests.py'),
46 test('subset_fuzzer', find_program('run-subset-fuzzer-tests.py'),
58 test('draw_fuzzer', find_program('run-draw-fuzzer-tests.py'),
/third_party/harfbuzz/test/fuzzing/
DMakefile.am20 run-shape-fuzzer-tests.py \
21 run-subset-fuzzer-tests.py \
22 run-draw-fuzzer-tests.py \
28 hb-shape-fuzzer \
29 hb-subset-fuzzer \
30 hb-set-fuzzer \
31 hb-draw-fuzzer \
41 hb-fuzzer.hh \
42 hb-shape-fuzzer.cc \
50 hb-fuzzer.hh \
[all …]
Dmeson.build2 'hb-shape-fuzzer.cc',
3 'hb-subset-fuzzer.cc',
4 'hb-set-fuzzer.cc',
5 'hb-draw-fuzzer.cc',
35 test('shape_fuzzer', find_program('run-shape-fuzzer-tests.py'),
46 test('subset_fuzzer', find_program('run-subset-fuzzer-tests.py'),
58 test('draw_fuzzer', find_program('run-draw-fuzzer-tests.py'),
/third_party/flutter/skia/third_party/externals/harfbuzz/test/fuzzing/
DCMakeLists.txt8 #add_executable (hb-shape-fuzzer # it should be run only after ragel execution
12 add_executable (hb-shape-fuzzer ${hb_shape_fuzzer_SOURCES})
13 target_link_libraries (hb-shape-fuzzer harfbuzz)
15 add_executable (hb-subset-fuzzer ${hb_subset_fuzzer_SOURCES})
16 target_link_libraries (hb-subset-fuzzer harfbuzz-subset)
18 target_compile_definitions(hb-shape-fuzzer PUBLIC ${FUZZING_CPPFLAGS})
19 target_compile_definitions(hb-subset-fuzzer PUBLIC ${FUZZING_CPPFLAGS})
21 add_test (NAME hb-shape-fuzzer
22 COMMAND "${PYTHON_EXECUTABLE}" run-shape-fuzzer-tests.py $<TARGET_FILE:hb-shape-fuzzer>
24 add_test (NAME hb-subset-fuzzer
[all …]
DMakefile.am20 run-shape-fuzzer-tests.py \
21 run-subset-fuzzer-tests.py \
27 hb-shape-fuzzer \
28 hb-subset-fuzzer \
38 hb-fuzzer.hh \
39 hb-shape-fuzzer.cc \
47 hb-fuzzer.hh \
48 hb-subset-fuzzer.cc \
58 … srcdir="$(srcdir)" builddir="$(builddir)" LIBTOOL="$(LIBTOOL)" $(srcdir)/run-shape-fuzzer-tests.py
59 …srcdir="$(srcdir)" builddir="$(builddir)" LIBTOOL="$(LIBTOOL)" $(srcdir)/run-subset-fuzzer-tests.py
/third_party/skia/fuzz/
DREADME.md3 randomly, focusing on specific APIs). For example, we have a codec fuzzer which takes a mutated
4 png/jpeg or similar file and attempts to turn it into an `SkImage`. We also have a canvas fuzzer
9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also
10 single fuzzer executables containing exactly one fuzzer, which are convenient to build with
28 When enabling a fuzzer in OSS-Fuzz, we typically need to follow these steps:
29 1. *Add a seed corpus to `gs://skia-fuzzer/oss-fuzz/` (in the
30 …[skia-public project](https://console.cloud.google.com/storage/browser/skia-fuzzer?project=skia-pu…
37 to build the desired fuzzer target and move it into $OUT. If there is a seed corpus, move
38 it into $OUT and make sure it is the same name as the fuzzer executable with `_seed_corpus.zip`
53 <https://oss-fuzz.com/fuzzer-stats> is useful to see metrics on how our fuzzers are running. It
[all …]
/third_party/skia/third_party/externals/libwebp/
D.gitignore47 tests/fuzzer/advanced_api_fuzzer
48 tests/fuzzer/animation_api_fuzzer
49 tests/fuzzer/animdecoder_fuzzer
50 tests/fuzzer/animencoder_fuzzer
51 tests/fuzzer/demux_api_fuzzer
52 tests/fuzzer/enc_dec_fuzzer
53 tests/fuzzer/mux_demux_api_fuzzer
54 tests/fuzzer/simple_api_fuzzer
/third_party/skia/third_party/externals/dawn/infra/config/global/
Dmain.star197 def get_default_properties(os, clang, debug, cpu, fuzzer):
218 if fuzzer:
233 def add_ci_builder(name, os, clang, debug, cpu, fuzzer):
246 properties_ci = get_default_properties(os, clang, debug, cpu, fuzzer)
248 if fuzzer:
251 if not fuzzer:
265 def add_try_builder(name, os, clang, debug, cpu, fuzzer):
278 properties_try = get_default_properties(os, clang, debug, cpu, fuzzer)
292 def dawn_standalone_builder(name, clang, debug, cpu, fuzzer = False):
305 add_ci_builder(name, os, clang, debug, cpu, fuzzer)
[all …]
/third_party/json/test/
DMakefile12 FUZZER_ENGINE = src/fuzzer-driver_afl.cpp
17 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_json.cpp -o $@
20 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_bson.cpp -o $@
23 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_cbor.cpp -o $@
26 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_msgpack.cpp -o $@
29 $(CXX) $(CXXFLAGS) $(CPPFLAGS) $(FUZZER_ENGINE) src/fuzzer-parse_ubjson.cpp -o $@
/third_party/openssl/fuzz/
DREADME.md15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage)
23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`.
26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
29 -fsanitize=fuzzer-no-link \
59 a `--with-fuzzer-include` option, which should be the parent directory of the
60 prebuilt fuzzer library. This is represented as `$PATH_TO_LIBFUZZER_DIR` below.
63 --with-fuzzer-include=$PATH_TO_LIBFUZZER_DIR \
64 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
67 -fsanitize=fuzzer-no-link \
100 If a fuzzer generates a reproducible error, you can reproduce the problem using
[all …]
/third_party/openssl/test/recipes/
D99-test_fuzz_cms.t15 my $fuzzer = "cms";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
D99-test_fuzz_ct.t15 my $fuzzer = "ct";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
D99-test_fuzz_cmp.t15 my $fuzzer = "cmp";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
/third_party/json/
DMakefile74 mv test/parse_afl_fuzzer fuzz-testing/fuzzer
82 mv test/parse_bson_fuzzer fuzz-testing/fuzzer
90 mv test/parse_cbor_fuzzer fuzz-testing/fuzzer
98 mv test/parse_msgpack_fuzzer fuzz-testing/fuzzer
106 mv test/parse_ubjson_fuzzer fuzz-testing/fuzzer
111 afl-fuzz -S fuzzer1 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null &
112 afl-fuzz -S fuzzer2 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null &
113 afl-fuzz -S fuzzer3 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null &
114 afl-fuzz -S fuzzer4 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null &
115 afl-fuzz -S fuzzer5 -i fuzz-testing/testcases -o fuzz-testing/out fuzz-testing/fuzzer > /dev/null &
[all …]
/third_party/json/test/thirdparty/Fuzzer/
DFuzzerTracePC.cpp27 namespace fuzzer { namespace
265 fuzzer::TPC.HandleTrace(Guard, PC); in __sanitizer_cov_trace_pc_guard()
270 fuzzer::TPC.HandleInit(Start, Stop); in __sanitizer_cov_trace_pc_guard_init()
276 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir()
281 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp8()
285 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp4()
289 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp2()
293 fuzzer::TPC.HandleCmp(__builtin_return_address(0), Arg1, Arg2); in __sanitizer_cov_trace_cmp1()
320 fuzzer::TPC.HandleCmp(PC + Idx, static_cast<uint32_t>(Val), in __sanitizer_cov_trace_switch()
323 fuzzer::TPC.HandleCmp(PC + Idx, Val, Vals[Idx]); in __sanitizer_cov_trace_switch()
[all …]
/third_party/libxml2/fuzz/
DgenSeed.c41 const char *fuzzer; member
212 globalData.fuzzer, base); in processPattern()
378 const char *fuzzer; in main() local
390 fuzzer = argv[1]; in main()
391 if (strcmp(fuzzer, "html") == 0) { in main()
396 } else if (strcmp(fuzzer, "schema") == 0) { in main()
401 } else if (strcmp(fuzzer, "xml") == 0) { in main()
406 } else if (strcmp(fuzzer, "xpath") == 0) { in main()
411 fprintf(stderr, "unknown fuzzer %s\n", fuzzer); in main()
414 globalData.fuzzer = fuzzer; in main()
/third_party/skia/site/docs/dev/testing/
Dfuzz.md48 Your fuzzer entry point should implement this API:
56 You should now be able to use `-fsanitize=fuzzer` with Clang.
62 sanitize = "fuzzer"
63 extra_cflags = [ "-DSK_BUILD_FOR_LIBFUZZER", # enables fuzzer-constraints (see below)
68 Build Skia and your fuzzer entry point:
71 clang++-10 -I. -O1 -fsanitize=fuzzer fuzz/oss_fuzz/whatever.cpp out/libfuzzer/libskia.a
73 Run your new fuzzer binary
79 There are some defines that can help guide a fuzzer to be more productive (e.g.

123456789