/external/oss-fuzz/projects/llvm/ |
D | build.sh | 20 clang-fuzzer \ 21 clang-format-fuzzer \ 22 clang-objc-fuzzer \ 23 clangd-fuzzer \ 24 llvm-itanium-demangle-fuzzer \ 25 llvm-microsoft-demangle-fuzzer \ 26 llvm-dwarfdump-fuzzer \ 27 llvm-isel-fuzzer \ 28 llvm-special-case-list-fuzzer \ 29 llvm-opt-fuzzer \ [all …]
|
/external/oss-fuzz/infra/cifuzz/test_data/ |
D | msan_crash_fuzzer_bug_summary.txt | 3 #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-proje… 4 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 5 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 6 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 7 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 11 …fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecu… 15 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 16 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 17 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 18 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 [all …]
|
D | msan_crash_fuzzer_output.txt | 10 #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-proje… 11 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 12 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 13 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 14 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 18 …fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecu… 22 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 23 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 24 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 25 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 [all …]
|
D | example_crash_fuzzer_bug_summary.txt | 14 …#10 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-pro… 15 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 16 …#12 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/Fuzzer… 17 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 18 …14 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /… 19 #15 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10 27 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 28 …#3 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerL… 29 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 30 …#5 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /… [all …]
|
D | example_crash_fuzzer_output.txt | 38 …#10 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-pro… 39 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 40 …#12 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/Fuzzer… 41 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 42 …14 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /… 43 #15 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10 51 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 52 …#3 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerL… 53 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 54 …#5 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /… [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/fuzz/ |
D | CMakeLists.txt | 5 macro(fuzzer name) macro 10 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer-no-link") 13 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer") 17 fuzzer(arm_cpuinfo) 18 fuzzer(bn_mod_exp) 19 fuzzer(bn_div) 20 fuzzer(privkey) 21 fuzzer(cert) 22 fuzzer(spki) 23 fuzzer(pkcs8) [all …]
|
/external/oss-fuzz/projects/bignum-fuzzer/ |
D | build.sh | 42 cd $SRC/bignum-fuzzer/modules/openssl 46 cd $SRC/bignum-fuzzer/modules/go 54 cd $SRC/bignum-fuzzer/modules/cpp_boost 58 cd $SRC/bignum-fuzzer/modules/libgmp 62 cd $SRC/bignum-fuzzer/modules/libmpdec 68 cd $SRC/bignum-fuzzer 74 cp $SRC/bignum-fuzzer/fuzzer $OUT/fuzzer_openssl_go_no_negative_num_len_1200_all_operations 87 cd $SRC/bignum-fuzzer 94 cp $SRC/bignum-fuzzer/fuzzer $OUT/fuzzer_openssl_cpp_boost_num_len_1200_all_operations_num_loops_1 97 cd $SRC/bignum-fuzzer [all …]
|
/external/oss-fuzz/projects/libwebp/ |
D | build.sh | 55 for fuzzer in "${webp_c_fuzzers[@]}"; do 56 $CC $CFLAGS -Isrc -I. tests/fuzzer/${fuzzer}.c -c -o tests/fuzzer/${fuzzer}.o 58 tests/fuzzer/${fuzzer}.o -o $OUT/${fuzzer} \ 62 for fuzzer in "${webp_cxx_fuzzers[@]}"; do 64 tests/fuzzer/${fuzzer}.cc -o $OUT/${fuzzer} \ 68 for fuzzer in "${webp_c_fuzzers[@]}" "${webp_cxx_fuzzers[@]}"; do 69 cp fuzz_seed_corpus.zip $OUT/${fuzzer}_seed_corpus.zip 70 cp tests/fuzzer/fuzz.dict $OUT/${fuzzer}.dict
|
/external/llvm-project/clang/tools/clang-fuzzer/ |
D | README.txt | 1 This directory contains three utilities for fuzzing Clang: clang-fuzzer, 2 clang-objc-fuzzer, and clang-proto-fuzzer. All use libFuzzer to generate inputs 6 clang-fuzzer makes no attempt to generate valid C++ programs and is therefore 9 clang-objc-fuzzer is similar but for Objective-C: it makes no attempt to 12 clang-proto-fuzzer uses a protobuf class to describe a subset of the C++ 15 clang-proto-fuzzer is better at stressing deeper layers of Clang and LLVM. 20 Building clang-fuzzer 29 Then build the clang-fuzzer target. 36 ninja clang-fuzzer 39 Running clang-fuzzer [all …]
|
D | CMakeLists.txt | 7 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=fuzzer") 8 set(CXX_FLAGS_NOFUZZ "${CXX_FLAGS_NOFUZZ} -fsanitize=fuzzer-no-link") 24 # clang-proto-fuzzer components. 58 # Build the fuzzer initialization library. 59 add_clang_subdirectory(fuzzer-initialize) 61 # Build the protobuf fuzzer 62 add_clang_executable(clang-proto-fuzzer 67 # Build the loop protobuf fuzzer 68 add_clang_executable(clang-loop-proto-fuzzer 73 # Build the llvm protobuf fuzzer [all …]
|
/external/llvm-project/llvm/docs/ |
D | FuzzingLLVM.rst | 20 clang-fuzzer 23 A |generic fuzzer| that tries to compile textual input as C++ code. Some of the 24 bugs this fuzzer has reported are `on bugzilla`__ and `on OSS Fuzz's 28 __ https://bugs.chromium.org/p/oss-fuzz/issues/list?q=proj-llvm+clang-fuzzer 30 clang-proto-fuzzer 33 A |protobuf fuzzer| that compiles valid C++ programs generated from a protobuf 36 This fuzzer accepts clang command line options after `ignore_remaining_args=1`. 42 % bin/clang-proto-fuzzer <corpus-dir> -ignore_remaining_args=1 -O3 44 clang-format-fuzzer 47 A |generic fuzzer| that runs clang-format_ on C++ text fragments. Some of the [all …]
|
/external/harfbuzz_ng/test/fuzzing/ |
D | CMakeLists.txt | 8 #add_executable (hb-shape-fuzzer # it should be run only after ragel execution 12 add_executable (hb-shape-fuzzer ${hb_shape_fuzzer_SOURCES}) 13 target_link_libraries (hb-shape-fuzzer harfbuzz) 15 add_executable (hb-subset-fuzzer ${hb_subset_fuzzer_SOURCES}) 16 target_link_libraries (hb-subset-fuzzer harfbuzz-subset) 18 target_compile_definitions(hb-shape-fuzzer PUBLIC ${FUZZING_CPPFLAGS}) 19 target_compile_definitions(hb-subset-fuzzer PUBLIC ${FUZZING_CPPFLAGS}) 21 add_test (NAME hb-shape-fuzzer 22 COMMAND "${PYTHON_EXECUTABLE}" run-shape-fuzzer-tests.py $<TARGET_FILE:hb-shape-fuzzer> 24 add_test (NAME hb-subset-fuzzer [all …]
|
D | Makefile.am | 20 run-shape-fuzzer-tests.py \ 21 run-subset-fuzzer-tests.py \ 27 hb-shape-fuzzer \ 28 hb-subset-fuzzer \ 38 hb-fuzzer.hh \ 39 hb-shape-fuzzer.cc \ 47 hb-fuzzer.hh \ 48 hb-subset-fuzzer.cc \ 58 … srcdir="$(srcdir)" builddir="$(builddir)" LIBTOOL="$(LIBTOOL)" $(srcdir)/run-shape-fuzzer-tests.py 59 …srcdir="$(srcdir)" builddir="$(builddir)" LIBTOOL="$(LIBTOOL)" $(srcdir)/run-subset-fuzzer-tests.py
|
/external/oss-fuzz/projects/python3-libraries/ |
D | build.sh | 64 cp $SRC/python-library-fuzzers/fuzzer-html $OUT/ 66 zip -j $OUT/fuzzer-html_seed_corpus.zip corp-html/* 68 cp $SRC/python-library-fuzzers/fuzzer-email $OUT/ 70 zip -j $OUT/fuzzer-email_seed_corpus.zip corp-email/* 72 cp $SRC/python-library-fuzzers/fuzzer-httpclient $OUT/ 74 zip -j $OUT/fuzzer-httpclient_seed_corpus.zip corp-httpclient/* 76 cp $SRC/python-library-fuzzers/fuzzer-json $OUT/ 78 zip -j $OUT/fuzzer-json_seed_corpus.zip corp-json/* 80 cp $SRC/python-library-fuzzers/fuzzer-difflib $OUT/ 82 zip -j $OUT/fuzzer-difflib_seed_corpus.zip corp-difflib/* [all …]
|
/external/libsrtp2/fuzzer/ |
D | Makefile.in | 22 all : srtp-fuzzer 26 fuzzer.o: fuzzer.c fuzzer.h testmem.h 27 $(COMPILE) fuzzer.c -c -o fuzzer.o 30 srtp-fuzzer: fuzzer.o mt19937.o testmem.o 31 …$(COMPILECXX) -L. -L.. fuzzer.o mt19937.o testmem.o $(LIBFUZZER) $(CRYPTOLIB) $(LIBS) -o srtp-fuzz… 34 rm -rf srtp-fuzzer *.o
|
/external/oss-fuzz/projects/opus/ |
D | build.sh | 45 for fuzzer in $FUZZERS; do 47 tests/$fuzzer.c \ 48 -o $fuzzer.o 51 $fuzzer.o \ 52 -o $OUT/${fuzzer}_${build} \ 57 [ -f tests/$fuzzer.options ] \ 58 && cp tests/$fuzzer.options $OUT/${fuzzer}_${build}.options 59 zip -r $OUT/${fuzzer}_${build}_seed_corpus.zip opus_testvectors/
|
/external/libprotobuf-mutator/examples/libfuzzer/ |
D | CMakeLists.txt | 29 add_library(fuzzer-example-proto 31 set_property(TARGET fuzzer-example-proto 34 foreach(fuzzer libfuzzer_example libfuzzer_bin_example) 35 add_executable(${fuzzer} ${fuzzer}.cc) 36 target_link_libraries(${fuzzer} 37 fuzzer-example-proto 40 set_property(TARGET ${fuzzer} 42 set_property(TARGET ${fuzzer} 45 add_dependencies(libfuzzer_example_test ${fuzzer}) 47 endforeach(fuzzer)
|
/external/oss-fuzz/projects/skia/ |
D | Dockerfile | 35 …e_filter_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/image_fil… 37 …data/region_set_path_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/region_se… 39 …textblob_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/textblob_… 41 …ata/path_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/path_dese… 43 RUN wget -O $SRC/skia_data/image_decode_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/… 45 …nimated_image_decode_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/animated_… 47 …a/api_draw_functions_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_draw_… 49 RUN wget -O $SRC/skia_data/api_gradients_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer… 51 …ata/api_image_filter_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_image… 53 …ata/api_path_measure_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_path_… [all …]
|
/external/rust/crates/libfuzzer-sys/libfuzzer/ |
D | FuzzerTracePC.cpp | 30 namespace fuzzer { namespace 433 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard() 442 fuzzer::WarnAboutDeprecatedInstrumentation("-fsanitize-coverage=trace-pc"); in __sanitizer_cov_trace_pc() 447 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard_init() 453 fuzzer::TPC.HandleInline8bitCountersInit(Start, Stop); in __sanitizer_cov_8bit_counters_init() 459 fuzzer::TPC.HandlePCsInit(pcs_beg, pcs_end); in __sanitizer_cov_pcs_init() 466 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir() 474 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp8() 485 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_const_cmp8() 493 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp4() [all …]
|
/external/llvm-project/compiler-rt/lib/fuzzer/ |
D | FuzzerTracePC.cpp | 30 namespace fuzzer { namespace 433 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard() 442 fuzzer::WarnAboutDeprecatedInstrumentation("-fsanitize-coverage=trace-pc"); in __sanitizer_cov_trace_pc() 447 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard_init() 453 fuzzer::TPC.HandleInline8bitCountersInit(Start, Stop); in __sanitizer_cov_8bit_counters_init() 459 fuzzer::TPC.HandlePCsInit(pcs_beg, pcs_end); in __sanitizer_cov_pcs_init() 466 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir() 474 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp8() 485 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_const_cmp8() 493 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp4() [all …]
|
/external/oss-fuzz/projects/libxml2/ |
D | build.sh | 39 for fuzzer in html regexp schema uri xml xpath; do 40 make $fuzzer.o 43 $fuzzer.o fuzz.o \ 44 -o $OUT/$fuzzer \ 48 [ -e seed/$fuzzer ] || make seed/$fuzzer.stamp 49 zip -j $OUT/${fuzzer}_seed_corpus.zip seed/$fuzzer/*
|
/external/oss-fuzz/projects/libidn/ |
D | build.sh | 31 for fuzzer in *_fuzzer; do 32 cp -p "${fuzzer}" "$OUT" 34 if [ -f "$SRC/${fuzzer}_seed_corpus.zip" ]; then 35 cp "$SRC/${fuzzer}_seed_corpus.zip" "$OUT/" 38 if [ -d "${fuzzer}.in/" ]; then 39 zip -rj "$OUT/${fuzzer}_seed_corpus.zip" "${fuzzer}.in/"
|
/external/oss-fuzz/projects/php/ |
D | build.sh | 37 --enable-fuzzer \ 47 sapi/cli/php sapi/fuzzer/generate_all.php 50 cp sapi/fuzzer/dict/unserialize $OUT/php-fuzz-unserialize.dict 51 cp sapi/fuzzer/dict/parser $OUT/php-fuzz-parser.dict 52 cp sapi/fuzzer/json.dict $OUT/php-fuzz-json.dict 62 cp sapi/fuzzer/$fuzzerName $OUT/ 65 for fuzzerName in `ls sapi/fuzzer/corpus`; do 66 zip -j $OUT/php-fuzz-${fuzzerName}_seed_corpus.zip sapi/fuzzer/corpus/${fuzzerName}/*
|
/external/oss-fuzz/projects/icu/ |
D | build.sh | 36 $CXX $CXXFLAGS -std=c++11 -c $SRC/icu/icu4c/source/test/fuzzer/locale_util.cpp \ 37 -I$SRC/icu4c/source/test/fuzzer 39 FUZZER_PATH=$SRC/icu/icu4c/source/test/fuzzer 43 for fuzzer in $FUZZERS; do 44 file=${fuzzer:${#FUZZER_PATH}+1} 46 $fuzzer -o $OUT/${file/.cpp/} locale_util.o \ 52 CORPUS=$SRC/icu/icu4c/source/test/fuzzer/*_fuzzer_seed_corpus.txt 58 cp $SRC/icu/icu4c/source/test/fuzzer/*.dict $OUT/
|
/external/oss-fuzz/infra/base-images/base-builder/ |
D | compile_go_fuzzer | 20 fuzzer=$3 48 echo "s=$fuzzed_repo"="$abspath_repo"= > $OUT/$fuzzer.gocovpath 49 go test -run Test${function}Corpus -v $tags -coverpkg $fuzzed_repo/... -c -o $OUT/$fuzzer $path 52 echo "Running go-fuzz $tags -func $function -o $fuzzer.a $path" 53 go-fuzz $tags -func $function -o $fuzzer.a $path 56 $CXX $CXXFLAGS $LIB_FUZZING_ENGINE $fuzzer.a -o $OUT/$fuzzer
|