/external/oss-fuzz/projects/skia/ |
D | build.sh | 78 $SRC/skia/bin/gn gen out/Fuzz\ 99 $SRC/depot_tools/ninja -C out/Fuzz \ 140 mv out/Fuzz/region_deserialize $OUT/region_deserialize 142 mv out/Fuzz/region_set_path $OUT/region_set_path 145 mv out/Fuzz/textblob_deserialize $OUT/textblob_deserialize 148 mv out/Fuzz/path_deserialize $OUT/path_deserialize 151 mv out/Fuzz/animated_image_decode $OUT/animated_image_decode 159 cp out/Fuzz/image_filter_deserialize $OUT/image_filter_deserialize_width 165 mv out/Fuzz/image_filter_deserialize $OUT/image_filter_deserialize 168 mv out/Fuzz/api_draw_functions $OUT/api_draw_functions [all …]
|
/external/oss-fuzz/ |
D | README.md | 1 # OSS-Fuzz: Continuous Fuzzing for Open Source Software 3 [Fuzz testing] is a well-known technique for uncovering programming errors in 10 [Fuzz testing]: https://en.wikipedia.org/wiki/Fuzz_testing 16 OSS-Fuzz aims to make common open source software more secure and stable by 32 Currently, OSS-Fuzz supports C/C++, Rust, Go, Python and Java/JVM code. Other languages 33 supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 and i386 39 ![OSS-Fuzz process diagram](docs/images/process.png) 42 Read our [detailed documentation] to learn how to use OSS-Fuzz. 47 As of January 2021, OSS-Fuzz has found over [25,000] bugs in [375] open source 54 * 2016-12-01 - [Announcing OSS-Fuzz: Continuous fuzzing for open source software] [all …]
|
/external/skqp/fuzz/ |
D | Fuzz.h | 23 class Fuzz : SkNoncopyable { 25 explicit Fuzz(sk_sp<SkData> bytes) : fBytes(bytes), fNextByte(0) {} in Fuzz() function 84 friend void fuzz__MakeEncoderCorpus(Fuzz*); 90 inline void Fuzz::next(Arg* first, Args... rest) { in next() 96 inline void Fuzz::nextRange(T* value, Min min, Max max) { in nextRange() 103 inline void Fuzz::nextN(T* ptr, int n) { in nextN() 111 void (*fn)(Fuzz*); 116 void fuzz_##name(Fuzz*); \ 118 void fuzz_##name(Fuzz* f)
|
D | FuzzCommon.h | 18 void FuzzNicePath(Fuzz* fuzz, SkPath* path, int maxOps); 20 void FuzzEvilPath(Fuzz* fuzz, SkPath* path, int last_verb); 22 void FuzzNiceRRect(Fuzz* fuzz, SkRRect* rr); 24 void FuzzNiceMatrix(Fuzz* fuzz, SkMatrix* m); 26 void FuzzNiceRegion(Fuzz* fuzz, SkRegion* region, int maxN);
|
D | Fuzz.cpp | 13 void Fuzz::next(bool* b) { in next() 19 void Fuzz::next(SkImageFilter::CropRect* cropRect) { in next() 27 void Fuzz::nextBytes(void* n, size_t size) { in nextBytes() 38 void Fuzz::next(SkRegion* region) { in next() 43 void Fuzz::nextRange(float* f, float min, float max) { in nextRange()
|
D | FuzzDrawFunctions.cpp | 25 static void init_string(Fuzz* fuzz, char* str, size_t bufSize) { in init_string() 33 static void init_paint(Fuzz* fuzz, SkPaint* p) { in init_paint() 69 static void init_bitmap(Fuzz* fuzz, SkBitmap* bmp) { in init_bitmap() 100 static void init_surface(Fuzz* fuzz, sk_sp<SkSurface>* s) { in init_surface() 113 static void fuzz_drawText(Fuzz* fuzz, sk_sp<SkTypeface> typeface) { in fuzz_drawText() 158 static void fuzz_drawCircle(Fuzz* fuzz) { in fuzz_drawCircle() 169 static void fuzz_drawLine(Fuzz* fuzz) { in fuzz_drawLine() 180 static void fuzz_drawRect(Fuzz* fuzz) { in fuzz_drawRect() 201 static void fuzz_drawPath(Fuzz* fuzz) { in fuzz_drawPath() 252 static void fuzz_drawBitmap(Fuzz* fuzz) { in fuzz_drawBitmap() [all …]
|
D | FuzzParsePath.cpp | 38 static void add_white(Fuzz* fuzz, SkString* atom) { in add_white() 56 static void add_some_white(Fuzz* fuzz, SkString* atom) { in add_some_white() 62 static void add_comma(Fuzz* fuzz, SkString* atom) { in add_comma() 76 SkString MakeRandomParsePathPiece(Fuzz* fuzz) { in MakeRandomParsePathPiece()
|
D | FuzzCommon.cpp | 12 static void fuzz_nice_float(Fuzz* fuzz, float* f) { in fuzz_nice_float() 20 static void fuzz_nice_float(Fuzz* fuzz, float* f, Args... rest) { in fuzz_nice_float() 25 static void fuzz_nice_rect(Fuzz* fuzz, SkRect* r) { in fuzz_nice_rect() 31 void FuzzNicePath(Fuzz* fuzz, SkPath* path, int maxOps) { in FuzzNicePath() 228 void FuzzEvilPath(Fuzz* fuzz, SkPath* path, int last_verb) { in FuzzEvilPath() 273 void FuzzNiceRRect(Fuzz* fuzz, SkRRect* rr) { in FuzzNiceRRect() 288 void FuzzNiceMatrix(Fuzz* fuzz, SkMatrix* m) { in FuzzNiceMatrix() 324 void FuzzNiceRegion(Fuzz* fuzz, SkRegion* region, int maxN) { in FuzzNiceRegion()
|
/external/skia/fuzz/ |
D | Fuzz.h | 24 class Fuzz : SkNoncopyable { 26 explicit Fuzz(sk_sp<SkData> bytes) : fBytes(bytes), fNextByte(0) {} in Fuzz() function 88 friend void fuzz__MakeEncoderCorpus(Fuzz*); 94 inline void Fuzz::next(Arg* first, Args... rest) { in next() 100 inline void Fuzz::nextRange(T* value, Min min, Max max) { in nextRange() 112 inline void Fuzz::nextEnum(T* value, T max) { in nextEnum() 125 inline void Fuzz::nextN(T* ptr, int n) { in nextN() 133 void (*fn)(Fuzz*); 138 void fuzz_##name(Fuzz*); \ 140 void fuzz_##name(Fuzz* f)
|
D | FuzzCommon.h | 18 void FuzzNicePath(Fuzz* fuzz, SkPath* path, int maxOps); 20 void FuzzEvilPath(Fuzz* fuzz, SkPath* path, int last_verb); 22 void FuzzNiceRRect(Fuzz* fuzz, SkRRect* rr); 24 void FuzzNiceMatrix(Fuzz* fuzz, SkMatrix* m); 26 void FuzzNiceRegion(Fuzz* fuzz, SkRegion* region, int maxN);
|
D | FuzzSkParagraph.cpp | 114 uint8_t RandomText(T* buffer, Fuzz* fuzz) { in RandomText() 122 void AddASCIIText(ParagraphBuilder* builder,Fuzz* fuzz) { in AddASCIIText() 128 void AddUnicodeText(ParagraphBuilder* builder,Fuzz* fuzz) { in AddUnicodeText() 139 void AddZalgoText(ParagraphBuilder* builder, Fuzz* fuzz) { in AddZalgoText() 168 void AddStyle(ParagraphBuilder* builder, Fuzz* fuzz) { in AddStyle() 195 void RemoveStyle(ParagraphBuilder* builder, Fuzz* fuzz) { in RemoveStyle() 203 void AddStyleAndText(ParagraphBuilder* builder, Fuzz* fuzz) { in AddStyleAndText() 222 ParagraphStyle BuildParagraphStyle(Fuzz* fuzz) { in BuildParagraphStyle()
|
D | Fuzz.cpp | 13 void Fuzz::next(bool* b) { in next() 19 void Fuzz::nextBytes(void* n, size_t size) { in nextBytes() 30 void Fuzz::next(SkRegion* region) { in next() 35 void Fuzz::nextRange(float* f, float min, float max) { in nextRange()
|
D | FuzzDrawFunctions.cpp | 26 static void init_string(Fuzz* fuzz, char* str, size_t bufSize) { in init_string() 34 static void init_paint(Fuzz* fuzz, SkPaint* p) { in init_paint() 67 static void init_bitmap(Fuzz* fuzz, SkBitmap* bmp) { in init_bitmap() 98 static void init_surface(Fuzz* fuzz, sk_sp<SkSurface>* s) { in init_surface() 111 static void fuzz_drawText(Fuzz* fuzz, sk_sp<SkTypeface> typeface) { in fuzz_drawText() 156 static void fuzz_drawCircle(Fuzz* fuzz) { in fuzz_drawCircle() 167 static void fuzz_drawLine(Fuzz* fuzz) { in fuzz_drawLine() 178 static void fuzz_drawRect(Fuzz* fuzz) { in fuzz_drawRect() 199 static void fuzz_drawPath(Fuzz* fuzz) { in fuzz_drawPath() 250 static void fuzz_drawImage(Fuzz* fuzz) { in fuzz_drawImage() [all …]
|
D | FuzzCreateDDL.cpp | 39 static SkSurfaceProps gen_fuzzed_surface_props(Fuzz* fuzz) { in gen_fuzzed_surface_props() 45 static SkPaint gen_fuzzed_skpaint(Fuzz* fuzz) { in gen_fuzzed_skpaint() 55 static SkImageInfo gen_fuzzed_imageinfo(Fuzz* fuzz, SkColorType surfaceType) { in gen_fuzzed_imageinfo() 124 static SkSurfaceCharacterization make_characterization(Fuzz* fuzz, GrDirectContext* dContext, in make_characterization() 158 static sk_sp<SkDeferredDisplayList> make_ddl(Fuzz* fuzz, GrDirectContext* dContext, in make_ddl() 173 static sk_sp<SkSurface> make_surface(Fuzz* fuzz, GrDirectContext* dContext, const SkImageInfo& ii, in make_surface() 188 static SurfaceAndChar create_surface_and_characterization(Fuzz* fuzz, GrDirectContext* dContext, in create_surface_and_characterization()
|
D | FuzzParsePath.cpp | 38 static void add_white(Fuzz* fuzz, SkString* atom) { in add_white() 56 static void add_some_white(Fuzz* fuzz, SkString* atom) { in add_some_white() 62 static void add_comma(Fuzz* fuzz, SkString* atom) { in add_comma() 76 SkString MakeRandomParsePathPiece(Fuzz* fuzz) { in MakeRandomParsePathPiece()
|
/external/oss-fuzz/projects/quic-go/ |
D | build.sh | 23 compile_go_fuzzer github.com/marten-seemann/qpack/fuzzing Fuzz qpack_fuzzer 29 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/frames Fuzz frame_fuzzer 30 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/header Fuzz header_fuzzer 31 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/transportparameters Fuzz transportparam… 32 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/tokens Fuzz token_fuzzer 33 compile_go_fuzzer github.com/lucas-clemente/quic-go/fuzzing/handshake Fuzz handshake_fuzzer
|
/external/oss-fuzz/docs/oss-fuzz/ |
D | architecture.md | 6 parent: OSS-Fuzz 10 ![OSS-Fuzz architecture diagram]({{ site.baseurl }}/images/process.png?raw=true) 18 1. The project is [accepted to OSS-Fuzz]({{ site.baseurl }}/getting-started/accepting-new-projects/… 19 1. The OSS-Fuzz [builder](jenkins.io) builds the project from the committed configs. 20 1. The builder uploads the fuzz targets to the OSS-Fuzz GCS bucket. 23 bug, it reports the issue automatically to the OSS-Fuzz 28 1. The project developer fixes the bug upstream and credits OSS-Fuzz for the 29 discovery (the commit message should contain the string **'Credit to OSS-Fuzz'**).
|
/external/llvm-project/compiler-rt/test/fuzzer/ |
D | only-some-bytes.test | 8 RUN: %cpp_compiler %S/OnlySomeBytesTest.cpp -o %t-Fuzz 19 RUN: %t-Fuzz -focus_function='fB(unsigned char const*)' -runs=0 %t/IN 2>&1 | FileCheck %s --check-p… 22 RUN: %t-Fuzz -focus_function=f0 -runs=0 %t/IN 2>&1 | FileCheck %s --check-prefix=NO_FOCUSED_INPUT 27 RUN: %t-Fuzz -focus_function=f0 -runs=0 %t/IN 2>&1 | FileCheck %s --check-prefix=ONE_FOCUSED_INPUT 31 RUN: %t-Fuzz -collect_data_flow=%t-DFT %t/IN -data_flow_trace=%t/IN_DFT > /dev/null 2>&1 34 RUN: %t-Fuzz -focus_function=f0 -data_flow_trace=%t/IN_DFT -runs=100 %t/IN 2>&1 | FileCheck %s --ch… 35 RUN: %t-Fuzz -focus_function=f0 -data_flow_trace=%t/IN_DFT -runs=100 %t/IN 2>&1 | FileCheck %s --ch… 40 RUN: rm -rf %t/C_DFT && %t-Fuzz -collect_data_flow=%t-DFT %t/C -data_flow_trace=%t/C_DFT > /dev/nul… 41 RUN: not %t-Fuzz -focus_function=f0 -data_flow_trace=%t/C_DFT -seed=1 -runs=1000000 -use_value_prof… 47 RUN: %t-Fuzz -focus_function=auto -data_flow_trace=%t/C_DFT -runs=0 %t/C -jobs=100 2>&1 | grep AUTO… [all …]
|
/external/oss-fuzz/docs/ |
D | index.md | 3 title: OSS-Fuzz 10 # OSS-Fuzz 12 [Fuzz testing] is a well-known technique for uncovering programming errors in 19 [Fuzz testing]: https://en.wikipedia.org/wiki/Fuzz_testing 25 OSS-Fuzz aims to make common open source software more secure and stable by 41 Currently, OSS-Fuzz supports C/C++, Rust, Go, Python and Java/JVM code. Other 42 languages supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 49 This documentation describes how to use OSS-Fuzz service for your open source 59 As of January 2021, OSS-Fuzz has found over [25,000] bugs in [375] open source
|
D | faq.md | 50 Fuzz target sources as well as the build script may temporarily live inside the 51 `projects/<your_project>` directory in the OSS-Fuzz repository. Note that we do 55 ## My project is not open source. Can I use OSS-Fuzz? 57 You cannot use OSS-Fuzz, but you can use [ClusterFuzz] which OSS-Fuzz is based 61 OSS-Fuzz is a production instance of ClusterFuzz, plus the code living in 62 [OSS-Fuzz repository]: build scripts, `project.yaml` files with contacts, etc. 64 [OSS-Fuzz repository]: https://github.com/google/oss-fuzz 68 Security access control is important for the kind of issues that OSS-Fuzz detects. 131 is maintained in OSS-Fuzz, you can search for contacts in the respective 186 ## Does OSS-Fuzz support AFL or honggfuzz? [all …]
|
/external/oss-fuzz/docs/getting-started/new-project-guide/ |
D | bazel.md | 20 build system with OSS-Fuzz is very similar to the general 35 test artifacts in the OSS-Fuzz format. Each `//path/to:fuzz_test` fuzz test 38 in the OSS-Fuzz environment variables, and (b) generates an archive containing 40 OSS-Fuzz provides a standard tool to automatically process these targets, 48 `rules_fuzzing` library with OSS-Fuzz. You can also see a complete example in the 52 The structure of the project directory in the OSS-Fuzz repository does not 60 Since the OSS-Fuzz target builds the fuzz test using the instrumentation and 61 engine specified in the OSS-Fuzz environment variables, all the engine and 67 There is no need to install Bazel in your Docker image. The OSS-Fuzz builder 78 which fuzz tests to build, (2) building their OSS-Fuzz package targets in the [all …]
|
D | rust_lang.md | 17 The process of integrating a project written in Rust with OSS-Fuzz is very 24 Rust integration with OSS-Fuzz is expected to use [`cargo 27 correct libFuzzer on OSS-Fuzz itself. Note that using `cargo fuzz` also makes it 38 compiled and run on OSS-Fuzz. 41 the scripts below to integrate into OSS-Fuzz. 64 The OSS-Fuzz builder image has the latest nightly release of Rust as well as 93 automatically integrated into OSS-Fuzz:
|
/external/oss-fuzz/docs/getting-started/ |
D | integration_rewards.md | 12 is successfully integrated with OSS-Fuzz. Please see the details in our blog post 15 Rewards are based on the quality of integration with OSS-Fuzz, which is evaluated using 19 * Regression testing in the upstream repository using fuzz targets and OSS-Fuzz corpora. 24 For each of the points above, the OSS-Fuzz rewards panel first sets up a cap of up to $5,000.
|
D | continuous_integration.md | 11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets 26 * If the crash does not occur on older OSS-Fuzz builds. Because if it does occur 30 If your project supports [OSS-Fuzz's code coverage]({{ site.baseurl }}/advanced-topics/code-coverag… 35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes 40 1. Your project must be integrated with OSS-Fuzz. 49 file over from the OSS-Fuzz repository to the `workflows` directory. 50 …yml` from `example` to the name of your OSS-Fuzz project. It is **very important** that you use yo… 51 …in the [`projects`](https://github.com/google/oss-fuzz/tree/master/projects) directory of OSS-Fuzz. 113 limit for broken fuzz targets than OSS-Fuzz's check_build. Most users should 202 You can checkout CIFuzz configs for OSS-Fuzz projects. Example - [all …]
|
/external/oss-fuzz/docs/advanced-topics/ |
D | ideal_integration.md | 9 # Ideal integration with OSS-Fuzz 13 implement and maintain fuzz targets or integrate them with OSS-Fuzz in the same 37 ## Fuzz Target 69 Many different build systems exist in the open-source world. The less OSS-Fuzz 72 An ideal build integration for OSS-Fuzz looks like this: 77 …env var [provided]({{ site.baseurl }}/getting-started/new-project-guide/) by OSS-Fuzz environment). 87 This minimizes OSS-Fuzz-specific configuration, making your fuzzing more robust. 101 For better OSS-Fuzz integration, the seed corpus should be available in 137 Fuzz targets should be regularly tested (not necessarily fuzzed!) as a part of 150 Fuzz targets should perform well, because high memory usage and/or slow [all …]
|