Home
last modified time | relevance | path

Searched refs:fuzzer (Results 1 – 25 of 124) sorted by relevance

12345

/netbsd-src/external/apache2/llvm/dist/clang/tools/clang-fuzzer/
H A DREADME.txt1 This directory contains three utilities for fuzzing Clang: clang-fuzzer,
2 clang-objc-fuzzer, and clang-proto-fuzzer. All use libFuzzer to generate inputs
6 clang-fuzzer makes no attempt to generate valid C++ programs and is therefore
9 clang-objc-fuzzer is similar but for Objective-C: it makes no attempt to
12 clang-proto-fuzzer uses a protobuf class to describe a subset of the C++
15 clang-proto-fuzzer is better at stressing deeper layers of Clang and LLVM.
20 Building clang-fuzzer
29 Then build the clang-fuzzer target.
36 ninja clang-fuzzer
39 Running clang-fuzzer
[all …]
H A DCMakeLists.txt7 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=fuzzer")
8 set(CXX_FLAGS_NOFUZZ "${CXX_FLAGS_NOFUZZ} -fsanitize=fuzzer-no-link")
24 # clang-proto-fuzzer components.
58 # Build the fuzzer initialization library.
59 add_clang_subdirectory(fuzzer-initialize)
61 # Build the protobuf fuzzer
62 add_clang_executable(clang-proto-fuzzer
67 # Build the loop protobuf fuzzer
68 add_clang_executable(clang-loop-proto-fuzzer
73 # Build the llvm protobuf fuzzer
[all …]
H A DDockerfile1 #===- llvm/tools/clang/tools/clang-fuzzer ---------------------------------===//
8 # Produces an image that builds clang-proto-fuzzer
34 RUN cd build1 && ninja clang-fuzzer
35 RUN cd build1 && ninja clang-objc-fuzzer
36 RUN cd build1 && ninja clang-proto-fuzzer
40 RUN cd build1 && ninja clang-loop-proto-fuzzer
41 RUN cd build1 && ninja clang-llvm-proto-fuzzer
/netbsd-src/external/apache2/llvm/dist/llvm/docs/
H A DFuzzingLLVM.rst20 clang-fuzzer
23 A |generic fuzzer| that tries to compile textual input as C++ code. Some of the
24 bugs this fuzzer has reported are `on bugzilla`__ and `on OSS Fuzz's
28 __ https://bugs.chromium.org/p/oss-fuzz/issues/list?q=proj-llvm+clang-fuzzer
30 clang-proto-fuzzer
33 A |protobuf fuzzer| that compiles valid C++ programs generated from a protobuf
36 This fuzzer accepts clang command line options after `ignore_remaining_args=1`.
42 % bin/clang-proto-fuzzer <corpus-dir> -ignore_remaining_args=1 -O3
44 clang-format-fuzzer
47 A |generic fuzzer| that runs clang-format_ on C++ text fragments. Some of the
[all …]
H A DLibFuzzer.rst14 library via a specific fuzzing entrypoint (aka "target function"); the fuzzer
76 In order to build your fuzzer binary, use the `-fsanitize=fuzzer` flag during the
81 …clang -g -O1 -fsanitize=fuzzer mytarget.c # Builds the fuzz target w/o san…
82 …clang -g -O1 -fsanitize=fuzzer,address mytarget.c # Builds the fuzz target with AS…
83 …clang -g -O1 -fsanitize=fuzzer,signed-integer-overflow mytarget.c # Builds the fuzz target with a …
84 …clang -g -O1 -fsanitize=fuzzer,memory mytarget.c # Builds the fuzz target with MS…
87 Note that ``-fsanitize=fuzzer`` links in the libFuzzer's ``main()`` symbol.
93 clang -fsanitize=fuzzer-no-link mytarget.c
96 ``-fsanitize=fuzzer`` during the linking stage.
107 files. The fuzzer generates random mutations based around the sample inputs in
[all …]
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/fuzzer/
H A DFuzzerTracePC.cpp29 uint8_t __sancov_trace_pc_guard_8bit_counters[fuzzer::TracePC::kNumPCs];
32 uintptr_t __sancov_trace_pc_pcs[fuzzer::TracePC::kNumPCs];
37 namespace fuzzer { namespace
506 uintptr_t Idx = PC & (((uintptr_t)1 << fuzzer::TracePC::kTracePcBits) - 1); in __sanitizer_cov_trace_pc()
513 fuzzer::TPC.HandleInit(Start, Stop); in __sanitizer_cov_trace_pc_guard_init()
518 fuzzer::TPC.HandleInline8bitCountersInit(Start, Stop); in __sanitizer_cov_8bit_counters_init()
524 fuzzer::TPC.HandlePCsInit(pcs_beg, pcs_end); in __sanitizer_cov_pcs_init()
531 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir()
539 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp8()
550 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_const_cmp8()
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/fuzz/
H A DREADME.md15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage)
23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`.
26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
29 -fsanitize=fuzzer-no-link \
59 a `--with-fuzzer-include` option, which should be the parent directory of the
60 prebuilt fuzzer library. This is represented as `$PATH_TO_LIBFUZZER_DIR` below.
63 --with-fuzzer-include=$PATH_TO_LIBFUZZER_DIR \
64 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
67 -fsanitize=fuzzer-no-link \
100 If a fuzzer generates a reproducible error, you can reproduce the problem using
[all …]
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/build/
H A Dfuzzer.gni12 # fuzzer("llvm-opt-fuzzer") {
15 # sources = [ "llvm-opt-fuzzer.cpp" ]
23 # If true, pass -fsanitize=fuzzer to the compiler for fuzzer() targets.
28 template("fuzzer") {
43 cflags += [ "-fsanitize=fuzzer" ]
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/
H A D99-test_fuzz_ct.t15 my $fuzzer = "ct";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
H A D99-test_fuzz_cms.t15 my $fuzzer = "cms";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
H A D99-test_fuzz_cmp.t15 my $fuzzer = "cmp";
16 setup("test_fuzz_${fuzzer}");
18 plan skip_all => "This test requires $fuzzer support"
19 if disabled($fuzzer);
25 fuzz_ok($fuzzer);
H A D99-test_fuzz_asn1parse.t15 my $fuzzer = "asn1parse";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_asn1.t15 my $fuzzer = "asn1";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_conf.t15 my $fuzzer = "conf";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_crl.t15 my $fuzzer = "crl";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
H A D99-test_fuzz_bndiv.t15 my $fuzzer = "bndiv";
16 setup("test_fuzz_${fuzzer}");
22 fuzz_ok($fuzzer);
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/secondary/llvm/tools/llvm-isel-fuzzer/
H A DBUILD.gn1 import("//llvm/utils/gn/build/fuzzer.gni")
3 fuzzer("llvm-isel-fuzzer") {
21 sources = [ "llvm-isel-fuzzer.cpp" ]
/netbsd-src/crypto/external/bsd/openssl.old/dist/fuzz/
H A DREADME.md30 $ svn co https://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/fuzzer Fuzzer
39 --with-fuzzer-include=../../svn-work/Fuzzer \
40 --with-fuzzer-lib=../../svn-work/Fuzzer/libFuzzer.a \
81 If a fuzzer generates a reproducible error, you can reproduce the problem using
82 the fuzz/*-test binaries and the file generated by the fuzzer. They binaries
86 be useful to show you when the problem happens. For the client and server fuzzer
97 The client and server fuzzer normally generate random numbers as part of the TLS
104 server fuzzer will use predictable numbers instead of the random numbers. This
109 numbers that were generated. For instance the client fuzzer will always generate
128 - A default config, plus options needed to generate the fuzzer.
/netbsd-src/tests/usr.bin/c++/
H A Dt_fuzzer_oom.sh76 c++ -fsanitize=fuzzer -o test test.cc
93 c++ -fsanitize=fuzzer -static -o test -pg test.cc
119 c++ -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.cc
120 c++ -o test test.cc -fsanitize=fuzzer -L. -ltest
143 c++ -fsanitize=fuzzer -o test -fpie -pie test.cc
H A Dt_fuzzer_timeout.sh75 c++ -fsanitize=fuzzer -o test test.cc
91 c++ -fsanitize=fuzzer -static -o test -pg test.cc
116 c++ -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.cc
117 c++ -o test test.cc -fsanitize=fuzzer -L. -ltest
139 c++ -fsanitize=fuzzer -o test -fpie -pie test.cc
H A Dt_fuzzer_simple.sh80 c++ -fsanitize=fuzzer -o test test.cc
101 c++ -fsanitize=fuzzer -static -o test -pg test.cc
131 c++ -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.cc
132 c++ -o test test.cc -fsanitize=fuzzer -L. -ltest
159 c++ -fsanitize=fuzzer -o test -fpie -pie test.cc
/netbsd-src/tests/usr.bin/cc/
H A Dt_fuzzer_simple.sh80 cc -fsanitize=fuzzer -o test test.c
101 cc -fsanitize=fuzzer -static -o test -pg test.c
131 cc -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.c
132 cc -o test test.c -fsanitize=fuzzer -L. -ltest
159 cc -fsanitize=fuzzer -o test -fpie -pie test.c
H A Dt_fuzzer_timeout.sh75 cc -fsanitize=fuzzer -o test test.c
91 cc -fsanitize=fuzzer -static -o test -pg test.c
116 cc -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.c
117 cc -o test test.c -fsanitize=fuzzer -L. -ltest
139 cc -fsanitize=fuzzer -o test -fpie -pie test.c
H A Dt_fuzzer_oom.sh76 cc -fsanitize=fuzzer -o test test.c
93 cc -fsanitize=fuzzer -static -o test -pg test.c
119 cc -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.c
120 cc -o test test.c -fsanitize=fuzzer -L. -ltest
143 cc -fsanitize=fuzzer -o test -fpie -pie test.c
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/secondary/llvm/tools/llvm-opt-fuzzer/
H A DBUILD.gn1 import("//llvm/utils/gn/build/fuzzer.gni")
3 fuzzer("llvm-opt-fuzzer") {
28 sources = [ "llvm-opt-fuzzer.cpp" ]

12345