Home
last modified time | relevance | path

Searched refs:Fuzz (Results 1 – 25 of 207) sorted by relevance

123456789

/external/oss-fuzz/projects/skia/
Dbuild.sh78 $SRC/skia/bin/gn gen out/Fuzz\
99 $SRC/depot_tools/ninja -C out/Fuzz \
140 mv out/Fuzz/region_deserialize $OUT/region_deserialize
142 mv out/Fuzz/region_set_path $OUT/region_set_path
145 mv out/Fuzz/textblob_deserialize $OUT/textblob_deserialize
148 mv out/Fuzz/path_deserialize $OUT/path_deserialize
151 mv out/Fuzz/animated_image_decode $OUT/animated_image_decode
159 cp out/Fuzz/image_filter_deserialize $OUT/image_filter_deserialize_width
165 mv out/Fuzz/image_filter_deserialize $OUT/image_filter_deserialize
168 mv out/Fuzz/api_draw_functions $OUT/api_draw_functions
[all …]
/external/oss-fuzz/
DREADME.md1 # OSS-Fuzz: Continuous Fuzzing for Open Source Software
3 [Fuzz testing] is a well-known technique for uncovering programming errors in
10 [Fuzz testing]: https://en.wikipedia.org/wiki/Fuzz_testing
16 OSS-Fuzz aims to make common open source software more secure and stable by
32 Currently, OSS-Fuzz supports C/C++, Rust, Go, Python and Java/JVM code. Other languages
33 supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 and i386
39 ![OSS-Fuzz process diagram](docs/images/process.png)
42 Read our [detailed documentation] to learn how to use OSS-Fuzz.
47 As of January 2021, OSS-Fuzz has found over [25,000] bugs in [375] open source
54 * 2016-12-01 - [Announcing OSS-Fuzz: Continuous fuzzing for open source software]
[all …]
/external/skqp/fuzz/
DFuzz.h23 class Fuzz : SkNoncopyable {
25 explicit Fuzz(sk_sp<SkData> bytes) : fBytes(bytes), fNextByte(0) {} in Fuzz() function
84 friend void fuzz__MakeEncoderCorpus(Fuzz*);
90 inline void Fuzz::next(Arg* first, Args... rest) { in next()
96 inline void Fuzz::nextRange(T* value, Min min, Max max) { in nextRange()
103 inline void Fuzz::nextN(T* ptr, int n) { in nextN()
111 void (*fn)(Fuzz*);
116 void fuzz_##name(Fuzz*); \
118 void fuzz_##name(Fuzz* f)
DFuzzCommon.h18 void FuzzNicePath(Fuzz* fuzz, SkPath* path, int maxOps);
20 void FuzzEvilPath(Fuzz* fuzz, SkPath* path, int last_verb);
22 void FuzzNiceRRect(Fuzz* fuzz, SkRRect* rr);
24 void FuzzNiceMatrix(Fuzz* fuzz, SkMatrix* m);
26 void FuzzNiceRegion(Fuzz* fuzz, SkRegion* region, int maxN);
DFuzz.cpp13 void Fuzz::next(bool* b) { in next()
19 void Fuzz::next(SkImageFilter::CropRect* cropRect) { in next()
27 void Fuzz::nextBytes(void* n, size_t size) { in nextBytes()
38 void Fuzz::next(SkRegion* region) { in next()
43 void Fuzz::nextRange(float* f, float min, float max) { in nextRange()
DFuzzDrawFunctions.cpp25 static void init_string(Fuzz* fuzz, char* str, size_t bufSize) { in init_string()
33 static void init_paint(Fuzz* fuzz, SkPaint* p) { in init_paint()
69 static void init_bitmap(Fuzz* fuzz, SkBitmap* bmp) { in init_bitmap()
100 static void init_surface(Fuzz* fuzz, sk_sp<SkSurface>* s) { in init_surface()
113 static void fuzz_drawText(Fuzz* fuzz, sk_sp<SkTypeface> typeface) { in fuzz_drawText()
158 static void fuzz_drawCircle(Fuzz* fuzz) { in fuzz_drawCircle()
169 static void fuzz_drawLine(Fuzz* fuzz) { in fuzz_drawLine()
180 static void fuzz_drawRect(Fuzz* fuzz) { in fuzz_drawRect()
201 static void fuzz_drawPath(Fuzz* fuzz) { in fuzz_drawPath()
252 static void fuzz_drawBitmap(Fuzz* fuzz) { in fuzz_drawBitmap()
[all …]
DFuzzParsePath.cpp38 static void add_white(Fuzz* fuzz, SkString* atom) { in add_white()
56 static void add_some_white(Fuzz* fuzz, SkString* atom) { in add_some_white()
62 static void add_comma(Fuzz* fuzz, SkString* atom) { in add_comma()
76 SkString MakeRandomParsePathPiece(Fuzz* fuzz) { in MakeRandomParsePathPiece()
DFuzzCommon.cpp12 static void fuzz_nice_float(Fuzz* fuzz, float* f) { in fuzz_nice_float()
20 static void fuzz_nice_float(Fuzz* fuzz, float* f, Args... rest) { in fuzz_nice_float()
25 static void fuzz_nice_rect(Fuzz* fuzz, SkRect* r) { in fuzz_nice_rect()
31 void FuzzNicePath(Fuzz* fuzz, SkPath* path, int maxOps) { in FuzzNicePath()
228 void FuzzEvilPath(Fuzz* fuzz, SkPath* path, int last_verb) { in FuzzEvilPath()
273 void FuzzNiceRRect(Fuzz* fuzz, SkRRect* rr) { in FuzzNiceRRect()
288 void FuzzNiceMatrix(Fuzz* fuzz, SkMatrix* m) { in FuzzNiceMatrix()
324 void FuzzNiceRegion(Fuzz* fuzz, SkRegion* region, int maxN) { in FuzzNiceRegion()
/external/skia/fuzz/
DFuzz.h24 class Fuzz : SkNoncopyable {
26 explicit Fuzz(sk_sp<SkData> bytes) : fBytes(bytes), fNextByte(0) {} in Fuzz() function
88 friend void fuzz__MakeEncoderCorpus(Fuzz*);
94 inline void Fuzz::next(Arg* first, Args... rest) { in next()
100 inline void Fuzz::nextRange(T* value, Min min, Max max) { in nextRange()
112 inline void Fuzz::nextEnum(T* value, T max) { in nextEnum()
125 inline void Fuzz::nextN(T* ptr, int n) { in nextN()
133 void (*fn)(Fuzz*);
138 void fuzz_##name(Fuzz*); \
140 void fuzz_##name(Fuzz* f)
DFuzzCommon.h18 void FuzzNicePath(Fuzz* fuzz, SkPath* path, int maxOps);
20 void FuzzEvilPath(Fuzz* fuzz, SkPath* path, int last_verb);
22 void FuzzNiceRRect(Fuzz* fuzz, SkRRect* rr);
24 void FuzzNiceMatrix(Fuzz* fuzz, SkMatrix* m);
26 void FuzzNiceRegion(Fuzz* fuzz, SkRegion* region, int maxN);
DFuzzSkParagraph.cpp114 uint8_t RandomText(T* buffer, Fuzz* fuzz) { in RandomText()
122 void AddASCIIText(ParagraphBuilder* builder,Fuzz* fuzz) { in AddASCIIText()
128 void AddUnicodeText(ParagraphBuilder* builder,Fuzz* fuzz) { in AddUnicodeText()
139 void AddZalgoText(ParagraphBuilder* builder, Fuzz* fuzz) { in AddZalgoText()
168 void AddStyle(ParagraphBuilder* builder, Fuzz* fuzz) { in AddStyle()
195 void RemoveStyle(ParagraphBuilder* builder, Fuzz* fuzz) { in RemoveStyle()
203 void AddStyleAndText(ParagraphBuilder* builder, Fuzz* fuzz) { in AddStyleAndText()
222 ParagraphStyle BuildParagraphStyle(Fuzz* fuzz) { in BuildParagraphStyle()
DFuzz.cpp13 void Fuzz::next(bool* b) { in next()
19 void Fuzz::nextBytes(void* n, size_t size) { in nextBytes()
30 void Fuzz::next(SkRegion* region) { in next()
35 void Fuzz::nextRange(float* f, float min, float max) { in nextRange()
DFuzzDrawFunctions.cpp26 static void init_string(Fuzz* fuzz, char* str, size_t bufSize) { in init_string()
34 static void init_paint(Fuzz* fuzz, SkPaint* p) { in init_paint()
67 static void init_bitmap(Fuzz* fuzz, SkBitmap* bmp) { in init_bitmap()
98 static void init_surface(Fuzz* fuzz, sk_sp<SkSurface>* s) { in init_surface()
111 static void fuzz_drawText(Fuzz* fuzz, sk_sp<SkTypeface> typeface) { in fuzz_drawText()
156 static void fuzz_drawCircle(Fuzz* fuzz) { in fuzz_drawCircle()
167 static void fuzz_drawLine(Fuzz* fuzz) { in fuzz_drawLine()
178 static void fuzz_drawRect(Fuzz* fuzz) { in fuzz_drawRect()
199 static void fuzz_drawPath(Fuzz* fuzz) { in fuzz_drawPath()
250 static void fuzz_drawImage(Fuzz* fuzz) { in fuzz_drawImage()
[all …]
DFuzzCreateDDL.cpp39 static SkSurfaceProps gen_fuzzed_surface_props(Fuzz* fuzz) { in gen_fuzzed_surface_props()
45 static SkPaint gen_fuzzed_skpaint(Fuzz* fuzz) { in gen_fuzzed_skpaint()
55 static SkImageInfo gen_fuzzed_imageinfo(Fuzz* fuzz, SkColorType surfaceType) { in gen_fuzzed_imageinfo()
124 static SkSurfaceCharacterization make_characterization(Fuzz* fuzz, GrDirectContext* dContext, in make_characterization()
158 static sk_sp<SkDeferredDisplayList> make_ddl(Fuzz* fuzz, GrDirectContext* dContext, in make_ddl()
173 static sk_sp<SkSurface> make_surface(Fuzz* fuzz, GrDirectContext* dContext, const SkImageInfo& ii, in make_surface()
188 static SurfaceAndChar create_surface_and_characterization(Fuzz* fuzz, GrDirectContext* dContext, in create_surface_and_characterization()
DFuzzParsePath.cpp38 static void add_white(Fuzz* fuzz, SkString* atom) { in add_white()
56 static void add_some_white(Fuzz* fuzz, SkString* atom) { in add_some_white()
62 static void add_comma(Fuzz* fuzz, SkString* atom) { in add_comma()
76 SkString MakeRandomParsePathPiece(Fuzz* fuzz) { in MakeRandomParsePathPiece()
/external/oss-fuzz/projects/quic-go/
Dbuild.sh23 compile_go_fuzzer github.com/marten-seemann/qpack/fuzzing Fuzz qpack_fuzzer
29 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/frames Fuzz frame_fuzzer
30 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/header Fuzz header_fuzzer
31 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/transportparameters Fuzz transportparam…
32 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/tokens Fuzz token_fuzzer
33 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/handshake Fuzz handshake_fuzzer
/external/oss-fuzz/docs/oss-fuzz/
Darchitecture.md6 parent: OSS-Fuzz
10 ![OSS-Fuzz architecture diagram]({{ site.baseurl }}/images/process.png?raw=true)
18 1. The project is [accepted to OSS-Fuzz]({{ site.baseurl }}/getting-started/accepting-new-projects/…
19 1. The OSS-Fuzz [builder](jenkins.io) builds the project from the committed configs.
20 1. The builder uploads the fuzz targets to the OSS-Fuzz GCS bucket.
23 bug, it reports the issue automatically to the OSS-Fuzz
28 1. The project developer fixes the bug upstream and credits OSS-Fuzz for the
29 discovery (the commit message should contain the string **'Credit to OSS-Fuzz'**).
/external/llvm-project/compiler-rt/test/fuzzer/
Donly-some-bytes.test8 RUN: %cpp_compiler %S/OnlySomeBytesTest.cpp -o %t-Fuzz
19 RUN: %t-Fuzz -focus_function='fB(unsigned char const*)' -runs=0 %t/IN 2>&1 | FileCheck %s --check-p…
22 RUN: %t-Fuzz -focus_function=f0 -runs=0 %t/IN 2>&1 | FileCheck %s --check-prefix=NO_FOCUSED_INPUT
27 RUN: %t-Fuzz -focus_function=f0 -runs=0 %t/IN 2>&1 | FileCheck %s --check-prefix=ONE_FOCUSED_INPUT
31 RUN: %t-Fuzz -collect_data_flow=%t-DFT %t/IN -data_flow_trace=%t/IN_DFT > /dev/null 2>&1
34 RUN: %t-Fuzz -focus_function=f0 -data_flow_trace=%t/IN_DFT -runs=100 %t/IN 2>&1 | FileCheck %s --ch…
35 RUN: %t-Fuzz -focus_function=f0 -data_flow_trace=%t/IN_DFT -runs=100 %t/IN 2>&1 | FileCheck %s --ch…
40 RUN: rm -rf %t/C_DFT && %t-Fuzz -collect_data_flow=%t-DFT %t/C -data_flow_trace=%t/C_DFT > /dev/nul…
41 RUN: not %t-Fuzz -focus_function=f0 -data_flow_trace=%t/C_DFT -seed=1 -runs=1000000 -use_value_prof…
47 RUN: %t-Fuzz -focus_function=auto -data_flow_trace=%t/C_DFT -runs=0 %t/C -jobs=100 2>&1 | grep AUTO…
[all …]
/external/oss-fuzz/docs/
Dindex.md3 title: OSS-Fuzz
10 # OSS-Fuzz
12 [Fuzz testing] is a well-known technique for uncovering programming errors in
19 [Fuzz testing]: https://en.wikipedia.org/wiki/Fuzz_testing
25 OSS-Fuzz aims to make common open source software more secure and stable by
41 Currently, OSS-Fuzz supports C/C++, Rust, Go, Python and Java/JVM code. Other
42 languages supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64
49 This documentation describes how to use OSS-Fuzz service for your open source
59 As of January 2021, OSS-Fuzz has found over [25,000] bugs in [375] open source
Dfaq.md50 Fuzz target sources as well as the build script may temporarily live inside the
51 `projects/<your_project>` directory in the OSS-Fuzz repository. Note that we do
55 ## My project is not open source. Can I use OSS-Fuzz?
57 You cannot use OSS-Fuzz, but you can use [ClusterFuzz] which OSS-Fuzz is based
61 OSS-Fuzz is a production instance of ClusterFuzz, plus the code living in
62 [OSS-Fuzz repository]: build scripts, `project.yaml` files with contacts, etc.
64 [OSS-Fuzz repository]: https://github.com/google/oss-fuzz
68 Security access control is important for the kind of issues that OSS-Fuzz detects.
131 is maintained in OSS-Fuzz, you can search for contacts in the respective
186 ## Does OSS-Fuzz support AFL or honggfuzz?
[all …]
/external/oss-fuzz/docs/getting-started/new-project-guide/
Dbazel.md20 build system with OSS-Fuzz is very similar to the general
35 test artifacts in the OSS-Fuzz format. Each `//path/to:fuzz_test` fuzz test
38 in the OSS-Fuzz environment variables, and (b) generates an archive containing
40 OSS-Fuzz provides a standard tool to automatically process these targets,
48 `rules_fuzzing` library with OSS-Fuzz. You can also see a complete example in the
52 The structure of the project directory in the OSS-Fuzz repository does not
60 Since the OSS-Fuzz target builds the fuzz test using the instrumentation and
61 engine specified in the OSS-Fuzz environment variables, all the engine and
67 There is no need to install Bazel in your Docker image. The OSS-Fuzz builder
78 which fuzz tests to build, (2) building their OSS-Fuzz package targets in the
[all …]
Drust_lang.md17 The process of integrating a project written in Rust with OSS-Fuzz is very
24 Rust integration with OSS-Fuzz is expected to use [`cargo
27 correct libFuzzer on OSS-Fuzz itself. Note that using `cargo fuzz` also makes it
38 compiled and run on OSS-Fuzz.
41 the scripts below to integrate into OSS-Fuzz.
64 The OSS-Fuzz builder image has the latest nightly release of Rust as well as
93 automatically integrated into OSS-Fuzz:
/external/oss-fuzz/docs/getting-started/
Dintegration_rewards.md12 is successfully integrated with OSS-Fuzz. Please see the details in our blog post
15 Rewards are based on the quality of integration with OSS-Fuzz, which is evaluated using
19 * Regression testing in the upstream repository using fuzz targets and OSS-Fuzz corpora.
24 For each of the points above, the OSS-Fuzz rewards panel first sets up a cap of up to $5,000.
Dcontinuous_integration.md11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets
26 * If the crash does not occur on older OSS-Fuzz builds. Because if it does occur
30 If your project supports [OSS-Fuzz's code coverage]({{ site.baseurl }}/advanced-topics/code-coverag…
35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes
40 1. Your project must be integrated with OSS-Fuzz.
49 file over from the OSS-Fuzz repository to the `workflows` directory.
50 …yml` from `example` to the name of your OSS-Fuzz project. It is **very important** that you use yo…
51 …in the [`projects`](https://github.com/google/oss-fuzz/tree/master/projects) directory of OSS-Fuzz.
113 limit for broken fuzz targets than OSS-Fuzz's check_build. Most users should
202 You can checkout CIFuzz configs for OSS-Fuzz projects. Example -
[all …]
/external/oss-fuzz/docs/advanced-topics/
Dideal_integration.md9 # Ideal integration with OSS-Fuzz
13 implement and maintain fuzz targets or integrate them with OSS-Fuzz in the same
37 ## Fuzz Target
69 Many different build systems exist in the open-source world. The less OSS-Fuzz
72 An ideal build integration for OSS-Fuzz looks like this:
77 …env var [provided]({{ site.baseurl }}/getting-started/new-project-guide/) by OSS-Fuzz environment).
87 This minimizes OSS-Fuzz-specific configuration, making your fuzzing more robust.
101 For better OSS-Fuzz integration, the seed corpus should be available in
137 Fuzz targets should be regularly tested (not necessarily fuzzed!) as a part of
150 Fuzz targets should perform well, because high memory usage and/or slow
[all …]

123456789