Home
last modified time | relevance | path

Searched +full:fuzz +full:- +full:seconds (Results 1 – 25 of 115) sorted by relevance

12345

/external/AFLplusplus/test/
Dtest-qemu-mode.sh3 . ./test-pre.sh
6 test -z "$AFL_CC" && {
16 test -e ../afl-qemu-trace && {
17 cc -pie -fPIE -o test-instr ../test-instr.c
18 cc -o test-compcov test-compcov.c
19 test -e test-instr -a -e test-compcov && {
21 mkdir -p in
23 $ECHO "$GREY[*] running afl-fuzz for qemu_mode, this will take approx 10 seconds"
25 ../afl-fuzz -m ${MEM_LIMIT} -V07 -Q -i in -o out -- ./test-instr >>errors 2>&1
27 test -n "$( ls out/default/queue/id:000002* 2>/dev/null )" && {
[all …]
Dtest-unicorn-mode.sh3 . ./test-pre.sh
6 test -d ../unicorn_mode/unicornafl -a -e ../unicorn_mode/unicornafl/Makefile && {
7 …test -e ../unicorn_mode/samples/python_simple/simple_target.bin -a -e ../unicorn_mode/samples/comp…
13 PYTHONS="`command -v python3` `command -v python` `command -v python2`"
17 if $PYTHON -c "import setuptools" ; then
28 … echo "[-] Error: Python setup-tools not found. Run 'sudo apt-get install python-setuptools'."
36 … $ECHO "$GREY[*] running afl-fuzz for unicorn_mode (persistent), this will take approx 25 seconds"
37 …AFL_DEBUG_CHILD=1 ../../../afl-fuzz -m none -V15 -U -i sample_inputs -o out -d -- ./harness @@ >>e…
38 test -n "$( ls out/default/queue/id:000002* 2>/dev/null )" && {
39 $ECHO "$GREEN[+] afl-fuzz is working correctly with unicorn_mode (persistent)"
[all …]
Dtest-frida-mode.sh3 . ./test-pre.sh
6 test -z "$AFL_CC" && {
16 test -e ../afl-frida-trace.so && {
17 cc -no-pie -o test-instr ../test-instr.c
18 cc -o test-compcov test-compcov.c
19 test -e test-instr -a -e test-compcov && {
21 mkdir -p in
23 $ECHO "$GREY[*] running afl-fuzz for frida_mode, this will take approx 10 seconds"
25 …AFL_DEBUG=1 AFL_FRIDA_VERBOSE=1 ../afl-fuzz -m ${MEM_LIMIT} -V07 -O -i in -o out -- ./test-instr >…
27 test -n "$( ls out/default/queue/id:000002* 2>/dev/null )" && {
[all …]
Dtest-custom-mutators.sh3 . ./test-pre.sh
8 test -e test-custom-mutator.c -a -e ${CUSTOM_MUTATOR_PATH}/example.c -a -e ${CUSTOM_MUTATOR_PATH}/e…
11 test -e ../afl-clang-fast && {
12 ../afl-clang-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
14 test -e ../afl-gcc-fast && {
15 ../afl-gcc-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
17 ../afl-gcc -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&1
21 test -e ../afl-clang-fast && {
22 ../afl-clang-fast -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&1
24 test -e ../afl-gcc-fast && {
[all …]
Dtest-performance.sh7 test -z "$FILE" && FILE=.afl_performance
9 test -e $FILE || {
11 echo Press ENTER to continue or CONTROL-C to abort
15 test -e ./test-performance.sh || { echo Error: this script must be run from the directory in which …
37 test -e /usr/local/bin/opt && {
40 # on MacOS X we prefer afl-clang over afl-gcc, because
41 # afl-gcc does not work there
42 test `uname -s` = 'Darwin' -o `uname -s` = 'FreeBSD' && {
43 AFL_GCC=afl-clang
46 AFL_GCC=afl-gcc
[all …]
/external/flatbuffers/.github/workflows/
Dmain.yml1 name: OSS-Fuzz
2 permissions: read-all
7 - master
9 - include/**
10 - src/**
11 - tests/**.cpp
12 - tests/**.h
15 runs-on: ubuntu-latest
17 - name: Build Fuzzers
19 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
[all …]
/external/capstone/.github/workflows/
Dfuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'capstone'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'capstone'
16 fuzz-seconds: 600
17 dry-run: false
[all …]
/external/brotli/.github/workflows/
Dfuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'brotli'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'brotli'
16 fuzz-seconds: 600
17 dry-run: false
[all …]
/external/pcre/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'pcre2'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'pcre2'
17 fuzz-seconds: 300
18 dry-run: false
[all …]
/external/gson/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'gson'
12 dry-run: false
14 - name: Run Fuzzers
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
17 oss-fuzz-project-name: 'gson'
18 fuzz-seconds: 600
19 dry-run: false
[all …]
/external/libusb/.github/
Dcifuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'libusb'
12 dry-run: false
14 - name: Run Fuzzers
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
17 oss-fuzz-project-name: 'libusb'
18 fuzz-seconds: 600
19 dry-run: false
[all …]
/external/harfbuzz_ng/.github/workflows/
Dcifuzz.yml9 runs-on: ubuntu-latest
11 - name: Build Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
15 oss-fuzz-project-name: 'harfbuzz'
16 dry-run: false
17 - name: Run Fuzzers
18 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
20 oss-fuzz-project-name: 'harfbuzz'
21 fuzz-seconds: 600
22 dry-run: false
[all …]
/external/jsoup/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'jsoup'
12 dry-run: false
14 - name: Run Fuzzers
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
17 oss-fuzz-project-name: 'jsoup'
18 fuzz-seconds: 600
19 dry-run: false
[all …]
/external/libavc/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libavc'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libavc'
21 fuzz-seconds: 600
22 - name: Upload Crash
23 uses: actions/upload-artifact@v3
/external/libultrahdr/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libultrahdr'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libultrahdr'
21 fuzz-seconds: 600
22 - name: Upload Crash
23 uses: actions/upload-artifact@v3
/external/libxaac/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libxaac'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libxaac'
21 fuzz-seconds: 600
22 - name: Upload Crash
23 uses: actions/upload-artifact@v3
/external/libmpeg2/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libmpeg2'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libmpeg2'
21 fuzz-seconds: 600
22 - name: Upload Crash
23 uses: actions/upload-artifact@v3
/external/libhevc/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libhevc'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libhevc'
21 fuzz-seconds: 600
22 - name: Upload Crash
23 uses: actions/upload-artifact@v3
/external/fmtlib/.github/workflows/
Dcifuzz.yml9 runs-on: ubuntu-latest
11 - name: Build fuzzers
13 …uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@92182553173581f871130c71c71b17f003d47b0a …
15 oss-fuzz-project-name: 'fmt'
16 dry-run: false
18 - name: Run fuzzers
19 …uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@92182553173581f871130c71c71b17f003d47b0a # …
21 oss-fuzz-project-name: 'fmt'
22 fuzz-seconds: 300
23 dry-run: false
[all …]
/external/libbpf/.github/workflows/
Dcifuzz.yml1 ---
2 # https://google.github.io/oss-fuzz/getting-started/continuous-integration/
7 - master
10 - master
13 runs-on: ubuntu-latest
16 fail-fast: false
20 - name: Build Fuzzers (${{ matrix.sanitizer }})
22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
24 oss-fuzz-project-name: 'libbpf'
25 dry-run: false
[all …]
/external/scapy/.github/workflows/
Dcifuzz.yml12 runs-on: ubuntu-latest
15 group: ${{ github.workflow }}-${{ github.ref }}
16 cancel-in-progress: true
19 - name: Build Fuzzers
21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
23 oss-fuzz-project-name: 'scapy'
25 dry-run: false
26 allowed-broken-targets-percentage: 0
27 - name: Run Fuzzers
28 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
[all …]
/external/flac/.github/workflows/
Dcifuzz.yml6 - master
7 - 1.3.x
10 runs-on: ubuntu-latest
12 fail-fast: false
16 - name: Build Fuzzers (${{ matrix.sanitizer }})
18 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
20 oss-fuzz-project-name: 'flac'
23 - name: Run Fuzzers (${{ matrix.sanitizer }})
24 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
26 oss-fuzz-project-name: 'flac'
[all …]
/external/selinux/.github/workflows/
Dcifuzz.yml1 ---
6 - master
9 - master
12 runs-on: ubuntu-latest
15 fail-fast: false
19 - name: Build Fuzzers (${{ matrix.sanitizer }})
21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
23 oss-fuzz-project-name: 'selinux'
24 dry-run: false
25 allowed-broken-targets-percentage: 0
[all …]
/external/AFLplusplus/
Dafl-whatsup3 # american fuzzy lop++ - status check tool
4 # ----------------------------------------
9 # Copyright 2019-2024 AFLplusplus Project. All rights reserved.
15 # https://www.apache.org/licenses/LICENSE-2.0
17 # This tool summarizes the status of any locally-running synchronized
18 # instances of afl-fuzz.
21 test "$1" = "-h" -o "$1" = "-hh" && {
22 echo "$0 status check tool for afl-fuzz by Michal Zalewski"
24 echo "Usage: $0 [-s] [-d] afl_output_directory"
27 echo " -d - include dead fuzzer stats"
[all …]
/external/cronet/stable/testing/libfuzzer/
Dfuzzing_browsertests.md11 to fuzz a larger, more complex set of Chromium code, we usually need an entire
12 browser process environment around us. The browser process takes seconds to
15 We now have an experimental 'in process fuzz test' framework which attempts to:
17 * Execute lots of fuzz cases in that pre-existing browser.
18 This _may_ amortize the start up cost sufficiently to make such coverage-guided
22 # Writing an in process fuzz case
26 must override the `Fuzz` method. You'll find that your base class inherits
32 # Running such an in process fuzz case
41 `my_fuzzer /tmp/corpus -rss_limit_mb=81920`
45 out-of-process co-ordinator.
[all …]

12345