Lines Matching +full:ninja +full:- +full:build
5 --------
10 --------------------
12 …build configuration that has the address sanitizer and sanitizer coverage enabled. In addition to …
16 -DLLVM_USE_SANITIZER='Address' \
17 -DLLVM_USE_SANITIZE_COVERAGE=On \
18 -DCLANG_ENABLE_PROTO_FUZZER=ON
20 …zzer's sanitizer coverage is available here: `<https://llvm.org/docs/LibFuzzer.html#fuzzer-usage>`_
22 If you want to debug LLDB itself when you find a bug using the fuzzers, use the CMake option ``-DCM…
24 To build a fuzzer, run the desired ninja command for the fuzzer(s) you want to build:
28 $ ninja lldb-target-fuzzer
29 $ ninja lldb-commandinterpreter-fuzzer
30 $ ninja lldb-expression-fuzzer
32 Once built, the binaries for the fuzzers will exist in the ``bin`` directory of your build folder.
35 ----------------------
37 …integrate the LLDB fuzzers into the `OSS Fuzz <https://github.com/google/oss-fuzz>`_ project for c…
40 -------------------
42 … fuzzers locally, you can run the binaries that were generated with ninja from the build directory:
46 $ ./bin/lldb-target-fuzzer
47 $ ./bin/lldb-commandinterpreter-fuzzer
48 $ ./bin/lldb-expression-fuzzer
52 … to use a ninja target that will both build the fuzzers and then run them immediately after. These…
54 To run the custom ninja targets, run the command for your desired fuzzer:
58 $ ninja fuzz-lldb-target
59 $ ninja fuzz-lldb-commandinterpreter
60 $ ninja fuzz-lldb-expression
63 ----------------------------------
65 …to a file in the build directory. When running the fuzzer binaries directly this input is stored i…
67 …ninja targets shown above, the inputs will be stored in ``fuzzer-artifacts/<fuzzer name>-artifacts…
69 …otten the input, you can pass the individual input to the fuzzer binary as a command-line argument: