| /external/oss-fuzz/projects/llvm/ |
| D | build.sh | 20 clang-fuzzer \ 21 clang-format-fuzzer \ 22 clang-objc-fuzzer \ 23 clangd-fuzzer \ 24 llvm-itanium-demangle-fuzzer \ 25 llvm-microsoft-demangle-fuzzer \ 26 llvm-dwarfdump-fuzzer \ 27 llvm-isel-fuzzer \ 28 llvm-special-case-list-fuzzer \ 29 llvm-opt-fuzzer \ [all …]
|
| /external/cronet/third_party/boringssl/src/fuzz/ |
| D | CMakeLists.txt | 1 macro(fuzzer name) macro 6 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer-no-link") 7 target_link_libraries(${name} Fuzzer) 9 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer") 19 fuzzer(arm_cpuinfo) 20 fuzzer(bn_div) 21 fuzzer(bn_mod_exp) 22 fuzzer(cert) 23 fuzzer(client ssl) 24 fuzzer(conf) [all …]
|
| /external/oss-fuzz/infra/cifuzz/test_data/ |
| D | msan_crash_fuzzer_bug_summary.txt | 3 #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-proje… 4 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 5 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 6 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 7 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 11 …fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecu… 15 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 16 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 17 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 18 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 [all …]
|
| D | msan_crash_fuzzer_output.txt | 10 #1 0x45a431 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-proje… 11 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 12 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 13 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 14 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 18 …fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::Fuzzer::ReadAndExecu… 22 …fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_… 23 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 24 #4 0x44a4bc in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /s… 25 #5 0x474432 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 [all …]
|
| D | example_crash_fuzzer_bug_summary.txt | 14 …#10 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-pro… 15 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 16 …#12 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/Fuzzer… 17 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 18 …14 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /… 19 #15 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10 27 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 28 …#3 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerL… 29 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 30 …#5 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /… [all …]
|
| D | example_crash_fuzzer_output.txt | 1 2020-02-05 17:50:20,470 - root - INFO - Fuzzer dex_fuzzer, detected error: INFO: Seed: 1337 38 …#10 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-pro… 39 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 40 …#12 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/Fuzzer… 41 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… 42 …14 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /… 43 #15 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10 51 …459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bo… 52 …#3 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerL… 53 … fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::Si… [all …]
|
| /external/oss-fuzz/projects/bignum-fuzzer/ |
| D | build.sh | 42 cd $SRC/bignum-fuzzer/modules/openssl 46 cd $SRC/bignum-fuzzer/modules/go 50 #cd $SRC/bignum-fuzzer/modules/rust 54 cd $SRC/bignum-fuzzer/modules/cpp_boost 58 cd $SRC/bignum-fuzzer/modules/libgmp 62 cd $SRC/bignum-fuzzer/modules/libmpdec 67 # Build OpenSSL/Go fuzzer 68 cd $SRC/bignum-fuzzer 73 # Copy OpenSSL/Go fuzzer to the designated location 74 cp $SRC/bignum-fuzzer/fuzzer $OUT/fuzzer_openssl_go_no_negative_num_len_1200_all_operations [all …]
|
| /external/rust/crates/quiche/deps/boringssl/src/fuzz/ |
| D | CMakeLists.txt | 5 macro(fuzzer name) macro 10 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer-no-link") 11 target_link_libraries(${name} Fuzzer) 13 set_target_properties(${name} PROPERTIES LINK_FLAGS "-fsanitize=fuzzer") 17 fuzzer(arm_cpuinfo) 18 fuzzer(bn_mod_exp) 19 fuzzer(bn_div) 20 fuzzer(privkey) 21 fuzzer(cert) 22 fuzzer(spki) [all …]
|
| /external/boringssl/src/ssl/test/runner/ |
| D | fuzzer_mode.json | 3 "BadCBCPadding*": "Fuzzer mode has no CBC padding.", 5 "*BadFinished*": "Fuzzer mode ignores Finished checks.", 6 "TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.", 8 "DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.", 9 "TLSFatalBadPackets": "Fuzzer mode has no bad packets.", 10 "*-BadRecord*": "Fuzzer mode has no bad packets.", 12 "BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.", 14 …"TrailingMessageData-TLS13-ServerHello-*": "Fuzzer mode will not read the peer's alert as a MAC er… 15 …"UnexpectedUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MA… 16 …"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC e… [all …]
|
| /external/cronet/third_party/boringssl/src/ssl/test/runner/ |
| D | fuzzer_mode.json | 3 "BadCBCPadding*": "Fuzzer mode has no CBC padding.", 5 "*BadFinished*": "Fuzzer mode ignores Finished checks.", 6 "TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.", 8 "DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.", 9 "TLSFatalBadPackets": "Fuzzer mode has no bad packets.", 10 "*-BadRecord*": "Fuzzer mode has no bad packets.", 12 "BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.", 14 …"TrailingMessageData-TLS13-ServerHello-*": "Fuzzer mode will not read the peer's alert as a MAC er… 15 …"UnexpectedUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MA… 16 …"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC e… [all …]
|
| /external/oss-fuzz/infra/base-images/base-runner/ |
| D | bad_build_check | 68 local FUZZER=$1 69 local FUZZER_NAME=$(basename $FUZZER) 75 $FUZZER -seed=1337 -runs=$MIN_NUMBER_OF_RUNS &>$FUZZER_OUTPUT 78 echo "BAD BUILD: $FUZZER does not seem to have coverage instrumentation." 90 echo "BAD BUILD: $FUZZER seems to have only partial coverage instrumentation." 96 echo "BAD BUILD: fuzzing $FUZZER with afl-fuzz failed." 104 echo "BAD BUILD: fuzzing $FUZZER with honggfuzz failed." 109 $FUZZER &> $FUZZER_OUTPUT 113 echo "BAD BUILD: $FUZZER does not seem to be properly built in 'dataflow' config." 126 local FUZZER=$1 [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/api/ |
| D | FuzzedDataProvider.java | 24 * A convenience wrapper turning the raw fuzzer input bytes into Java primitive types. 27 * returned values depending deterministically on the fuzzer input for the current run. 31 * Consumes a {@code boolean} from the fuzzer input. 38 * Consumes a {@code boolean} array from the fuzzer input. 39 * <p>The array will usually have length {@code length}, but might be shorter if the fuzzer input 48 * Consumes a {@code byte} from the fuzzer input. 55 * Consumes a {@code byte} between {@code min} and {@code max} from the fuzzer input. 64 * Consumes a {@code byte} array from the fuzzer input. 65 * <p>The array will usually have length {@code length}, but might be shorter if the fuzzer input 74 * Consumes the remaining fuzzer input as a {@code byte} array. [all …]
|
| /external/harfbuzz_ng/test/fuzzing/ |
| D | Makefile.am | 19 # EXTRA_DIST hb-repacker-fuzzer.cc 23 hb-repacker-fuzzer.cc \ 24 run-shape-fuzzer-tests.py \ 25 run-subset-fuzzer-tests.py \ 26 run-draw-fuzzer-tests.py \ 27 run-repacker-fuzzer-tests.py \ 35 hb-shape-fuzzer \ 36 hb-subset-fuzzer \ 37 hb-set-fuzzer \ 38 hb-draw-fuzzer \ [all …]
|
| /external/deqp-deps/SPIRV-Tools/source/fuzz/ |
| D | fuzzer.h | 37 // running a number of randomized fuzzer passes. 38 class Fuzzer { 40 // Possible statuses that can result from running the fuzzer. 58 Fuzzer(std::unique_ptr<opt::IRContext> ir_context, 69 Fuzzer(const Fuzzer&) = delete; 70 Fuzzer(Fuzzer&&) = delete; 71 Fuzzer& operator=(const Fuzzer&) = delete; 72 Fuzzer& operator=(Fuzzer&&) = delete; 74 ~Fuzzer(); 76 // Transforms |ir_context_| by running a number of randomized fuzzer passes. [all …]
|
| /external/angle/third_party/spirv-tools/src/source/fuzz/ |
| D | fuzzer.h | 37 // running a number of randomized fuzzer passes. 38 class Fuzzer { 40 // Possible statuses that can result from running the fuzzer. 58 Fuzzer(std::unique_ptr<opt::IRContext> ir_context, 69 Fuzzer(const Fuzzer&) = delete; 70 Fuzzer(Fuzzer&&) = delete; 71 Fuzzer& operator=(const Fuzzer&) = delete; 72 Fuzzer& operator=(Fuzzer&&) = delete; 74 ~Fuzzer(); 76 // Transforms |ir_context_| by running a number of randomized fuzzer passes. [all …]
|
| /external/swiftshader/third_party/SPIRV-Tools/source/fuzz/ |
| D | fuzzer.h | 37 // running a number of randomized fuzzer passes. 38 class Fuzzer { 40 // Possible statuses that can result from running the fuzzer. 58 Fuzzer(std::unique_ptr<opt::IRContext> ir_context, 69 Fuzzer(const Fuzzer&) = delete; 70 Fuzzer(Fuzzer&&) = delete; 71 Fuzzer& operator=(const Fuzzer&) = delete; 72 Fuzzer& operator=(Fuzzer&&) = delete; 74 ~Fuzzer(); 76 // Transforms |ir_context_| by running a number of randomized fuzzer passes. [all …]
|
| /external/selinux/scripts/ |
| D | oss-fuzz.sh | 12 # mode. To run secilc-fuzzer against a test case (named, say, CRASH) triggering an issue 16 # $ ./out/secilc-fuzzer CRASH 18 # To run the fuzzer against the corpus OSS-Fuzz has accumulated so far it should be 19 # downloaded, unpacked and passed to the fuzzer: 21 …m/selinux-backup.clusterfuzz-external.appspot.com/corpus/libFuzzer/selinux_secilc-fuzzer/public.zip 23 # $ ./out/secilc-fuzzer CORPUS/ 32 …es-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER -fsanitize=fuzzer-no-link" 43 export LIB_FUZZING_ENGINE=${LIB_FUZZING_ENGINE:--fsanitize=fuzzer} 52 ## secilc fuzzer ## 57 $CC $CFLAGS -c -o secilc-fuzzer.o libsepol/fuzz/secilc-fuzzer.c [all …]
|
| /external/oss-fuzz/projects/libwebp/ |
| D | build.sh | 55 for fuzzer in "${webp_c_fuzzers[@]}"; do 56 $CC $CFLAGS -Isrc -I. tests/fuzzer/${fuzzer}.c -c -o tests/fuzzer/${fuzzer}.o 58 tests/fuzzer/${fuzzer}.o -o $OUT/${fuzzer} \ 62 for fuzzer in "${webp_cxx_fuzzers[@]}"; do 64 tests/fuzzer/${fuzzer}.cc -o $OUT/${fuzzer} \ 68 for fuzzer in "${webp_c_fuzzers[@]}" "${webp_cxx_fuzzers[@]}"; do 69 cp fuzz_seed_corpus.zip $OUT/${fuzzer}_seed_corpus.zip 70 cp tests/fuzzer/fuzz.dict $OUT/${fuzzer}.dict
|
| /external/oss-fuzz/projects/skia/ |
| D | Dockerfile | 35 …e_filter_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/image_fil… 37 …data/region_set_path_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/region_se… 39 …textblob_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/textblob_… 41 …ata/path_deserialize_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/path_dese… 43 RUN wget -O $SRC/skia_data/image_decode_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/… 45 …nimated_image_decode_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/animated_… 47 …a/api_draw_functions_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_draw_… 49 RUN wget -O $SRC/skia_data/api_gradients_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer… 51 …ata/api_image_filter_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_image… 53 …ata/api_path_measure_seed_corpus.zip https://storage.googleapis.com/skia-fuzzer/oss-fuzz/api_path_… [all …]
|
| /external/openthread/tests/fuzz/ |
| D | CMakeLists.txt | 52 add_executable(ot-cli-received-fuzzer 57 target_compile_options(ot-cli-received-fuzzer 62 target_include_directories(ot-cli-received-fuzzer 67 target_link_libraries(ot-cli-received-fuzzer 73 add_executable(ot-ip6-send-fuzzer 78 target_compile_options(ot-ip6-send-fuzzer 83 target_include_directories(ot-ip6-send-fuzzer 88 target_link_libraries(ot-ip6-send-fuzzer 93 add_executable(ot-radio-receive-done-fuzzer 98 target_compile_options(ot-radio-receive-done-fuzzer [all …]
|
| /external/skia/fuzz/ |
| D | README.md | 3 randomly, focusing on specific APIs). For example, we have a codec fuzzer which takes a mutated 4 png/jpeg or similar file and attempts to turn it into an `SkImage`. We also have a canvas fuzzer 9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also 10 single fuzzer executables containing exactly one fuzzer, which are convenient to build with 28 When enabling a fuzzer in OSS-Fuzz, we typically need to follow these steps: 29 1. *Add a seed corpus to `gs://skia-fuzzer/oss-fuzz/` (in the 30 …[skia-public project](https://console.cloud.google.com/storage/browser/skia-fuzzer?project=skia-pu… 37 to build the desired fuzzer target and move it into $OUT. If there is a seed corpus, move 38 it into $OUT and make sure it is the same name as the fuzzer executable with `_seed_corpus.zip` 53 <https://oss-fuzz.com/fuzzer-stats> is useful to see metrics on how our fuzzers are running. It [all …]
|
| /external/pigweed/pw_allocator/ |
| D | fuzzing.cc | 23 return fuzzer::InRange<size_t>(0, max_size); in ArbitrarySize() 27 return fuzzer::Map( in ArbitraryAlignment() 29 fuzzer::Arbitrary<size_t>()); in ArbitraryAlignment() 32 auto ArbitraryIndex() { return fuzzer::Arbitrary<size_t>(); } in ArbitraryIndex() 34 fuzzer::Domain<AllocationRequest> ArbitraryAllocationRequest(size_t max_size) { in ArbitraryAllocationRequest() 36 return fuzzer::StructOf<AllocationRequest>(fuzzer::Just(size), in ArbitraryAllocationRequest() 39 return fuzzer::FlatMap(from_size, ArbitrarySize(max_size)); in ArbitraryAllocationRequest() 42 fuzzer::Domain<DeallocationRequest> ArbitraryDeallocationRequest() { in ArbitraryDeallocationRequest() 43 return fuzzer::StructOf<DeallocationRequest>(ArbitraryIndex()); in ArbitraryDeallocationRequest() 46 fuzzer::Domain<ReallocationRequest> ArbitraryReallocationRequest( in ArbitraryReallocationRequest() [all …]
|
| /external/libsrtp2/fuzzer/ |
| D | Makefile.in | 1 # Makefile for libSRTP fuzzer 22 all : srtp-fuzzer 26 fuzzer.o: fuzzer.c fuzzer.h testmem.h 27 $(COMPILE) fuzzer.c -c -o fuzzer.o 30 srtp-fuzzer: fuzzer.o mt19937.o testmem.o 31 …$(COMPILECXX) -L. -L.. fuzzer.o mt19937.o testmem.o $(LIBFUZZER) $(CRYPTOLIB) $(LIBS) -o srtp-fuzz… 34 rm -rf srtp-fuzzer *.o
|
| /external/libxml2/fuzz/ |
| D | Makefile.am | 49 # XML fuzzer 57 xml_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer 67 # DTD validation fuzzer 75 valid_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer 85 # XInclude fuzzer 93 xinclude_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer 103 # HTML fuzzer 111 html_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer 121 # Reader fuzzer 129 reader_LDFLAGS = $(AM_LDFLAGS) -fsanitize=fuzzer [all …]
|
| /external/llvm/lib/Fuzzer/ |
| D | FuzzerLoop.cpp | 1 //===- FuzzerLoop.cpp - Fuzzer's main loop --------------------------------===// 9 // Fuzzer's main loop. 34 namespace fuzzer { namespace 37 thread_local bool Fuzzer::IsMyThread; 52 // Only one Fuzzer per process. 53 static Fuzzer *F; 68 static void Prepare(const FuzzingOptions &Options, Fuzzer::Coverage *C) { in Prepare() 77 static bool RecordMax(const FuzzingOptions &Options, Fuzzer::Coverage *C) { in RecordMax() 146 Fuzzer::Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options) in Fuzzer() function in fuzzer::Fuzzer 158 void Fuzzer::LazyAllocateCurrentUnitData() { in LazyAllocateCurrentUnitData() [all …]
|