/netbsd-src/external/apache2/llvm/dist/clang/tools/clang-fuzzer/ |
H A D | README.txt | 1 This directory contains three utilities for fuzzing Clang: clang-fuzzer, 2 clang-objc-fuzzer, and clang-proto-fuzzer. All use libFuzzer to generate inputs 6 clang-fuzzer makes no attempt to generate valid C++ programs and is therefore 9 clang-objc-fuzzer is similar but for Objective-C: it makes no attempt to 12 clang-proto-fuzzer uses a protobuf class to describe a subset of the C++ 15 clang-proto-fuzzer is better at stressing deeper layers of Clang and LLVM. 20 Building clang-fuzzer 29 Then build the clang-fuzzer target. 36 ninja clang-fuzzer 39 Running clang-fuzzer [all …]
|
H A D | CMakeLists.txt | 7 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=fuzzer") 8 set(CXX_FLAGS_NOFUZZ "${CXX_FLAGS_NOFUZZ} -fsanitize=fuzzer-no-link") 24 # clang-proto-fuzzer components. 58 # Build the fuzzer initialization library. 59 add_clang_subdirectory(fuzzer-initialize) 61 # Build the protobuf fuzzer 62 add_clang_executable(clang-proto-fuzzer 67 # Build the loop protobuf fuzzer 68 add_clang_executable(clang-loop-proto-fuzzer 73 # Build the llvm protobuf fuzzer [all …]
|
H A D | Dockerfile | 1 #===- llvm/tools/clang/tools/clang-fuzzer ---------------------------------===// 8 # Produces an image that builds clang-proto-fuzzer 34 RUN cd build1 && ninja clang-fuzzer 35 RUN cd build1 && ninja clang-objc-fuzzer 36 RUN cd build1 && ninja clang-proto-fuzzer 40 RUN cd build1 && ninja clang-loop-proto-fuzzer 41 RUN cd build1 && ninja clang-llvm-proto-fuzzer
|
/netbsd-src/external/apache2/llvm/dist/llvm/docs/ |
H A D | FuzzingLLVM.rst | 20 clang-fuzzer 23 A |generic fuzzer| that tries to compile textual input as C++ code. Some of the 24 bugs this fuzzer has reported are `on bugzilla`__ and `on OSS Fuzz's 28 __ https://bugs.chromium.org/p/oss-fuzz/issues/list?q=proj-llvm+clang-fuzzer 30 clang-proto-fuzzer 33 A |protobuf fuzzer| that compiles valid C++ programs generated from a protobuf 36 This fuzzer accepts clang command line options after `ignore_remaining_args=1`. 42 % bin/clang-proto-fuzzer <corpus-dir> -ignore_remaining_args=1 -O3 44 clang-format-fuzzer 47 A |generic fuzzer| that runs clang-format_ on C++ text fragments. Some of the [all …]
|
H A D | LibFuzzer.rst | 14 library via a specific fuzzing entrypoint (aka "target function"); the fuzzer 76 In order to build your fuzzer binary, use the `-fsanitize=fuzzer` flag during the 81 …clang -g -O1 -fsanitize=fuzzer mytarget.c # Builds the fuzz target w/o san… 82 …clang -g -O1 -fsanitize=fuzzer,address mytarget.c # Builds the fuzz target with AS… 83 …clang -g -O1 -fsanitize=fuzzer,signed-integer-overflow mytarget.c # Builds the fuzz target with a … 84 …clang -g -O1 -fsanitize=fuzzer,memory mytarget.c # Builds the fuzz target with MS… 87 Note that ``-fsanitize=fuzzer`` links in the libFuzzer's ``main()`` symbol. 93 clang -fsanitize=fuzzer-no-link mytarget.c 96 ``-fsanitize=fuzzer`` during the linking stage. 107 files. The fuzzer generates random mutations based around the sample inputs in [all …]
|
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/fuzzer/ |
H A D | FuzzerTracePC.cpp | 29 uint8_t __sancov_trace_pc_guard_8bit_counters[fuzzer::TracePC::kNumPCs]; 32 uintptr_t __sancov_trace_pc_pcs[fuzzer::TracePC::kNumPCs]; 37 namespace fuzzer { namespace 506 uintptr_t Idx = PC & (((uintptr_t)1 << fuzzer::TracePC::kTracePcBits) - 1); in __sanitizer_cov_trace_pc() 513 fuzzer::TPC.HandleInit(Start, Stop); in __sanitizer_cov_trace_pc_guard_init() 518 fuzzer::TPC.HandleInline8bitCountersInit(Start, Stop); in __sanitizer_cov_8bit_counters_init() 524 fuzzer::TPC.HandlePCsInit(pcs_beg, pcs_end); in __sanitizer_cov_pcs_init() 531 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir() 539 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp8() 550 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_const_cmp8() [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/fuzz/ |
H A D | README.md | 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 29 -fsanitize=fuzzer-no-link \ 59 a `--with-fuzzer-include` option, which should be the parent directory of the 60 prebuilt fuzzer library. This is represented as `$PATH_TO_LIBFUZZER_DIR` below. 63 --with-fuzzer-include=$PATH_TO_LIBFUZZER_DIR \ 64 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 67 -fsanitize=fuzzer-no-link \ 100 If a fuzzer generates a reproducible error, you can reproduce the problem using [all …]
|
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/build/ |
H A D | fuzzer.gni | 12 # fuzzer("llvm-opt-fuzzer") { 15 # sources = [ "llvm-opt-fuzzer.cpp" ] 23 # If true, pass -fsanitize=fuzzer to the compiler for fuzzer() targets. 28 template("fuzzer") { 43 cflags += [ "-fsanitize=fuzzer" ]
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 99-test_fuzz_ct.t | 15 my $fuzzer = "ct"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
H A D | 99-test_fuzz_cms.t | 15 my $fuzzer = "cms"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
H A D | 99-test_fuzz_cmp.t | 15 my $fuzzer = "cmp"; 16 setup("test_fuzz_${fuzzer}"); 18 plan skip_all => "This test requires $fuzzer support" 19 if disabled($fuzzer); 25 fuzz_ok($fuzzer);
|
H A D | 99-test_fuzz_asn1parse.t | 15 my $fuzzer = "asn1parse"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
H A D | 99-test_fuzz_asn1.t | 15 my $fuzzer = "asn1"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
H A D | 99-test_fuzz_conf.t | 15 my $fuzzer = "conf"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
H A D | 99-test_fuzz_crl.t | 15 my $fuzzer = "crl"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
H A D | 99-test_fuzz_bndiv.t | 15 my $fuzzer = "bndiv"; 16 setup("test_fuzz_${fuzzer}"); 22 fuzz_ok($fuzzer);
|
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/secondary/llvm/tools/llvm-isel-fuzzer/ |
H A D | BUILD.gn | 1 import("//llvm/utils/gn/build/fuzzer.gni") 3 fuzzer("llvm-isel-fuzzer") { 21 sources = [ "llvm-isel-fuzzer.cpp" ]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/fuzz/ |
H A D | README.md | 30 $ svn co https://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/fuzzer Fuzzer 39 --with-fuzzer-include=../../svn-work/Fuzzer \ 40 --with-fuzzer-lib=../../svn-work/Fuzzer/libFuzzer.a \ 81 If a fuzzer generates a reproducible error, you can reproduce the problem using 82 the fuzz/*-test binaries and the file generated by the fuzzer. They binaries 86 be useful to show you when the problem happens. For the client and server fuzzer 97 The client and server fuzzer normally generate random numbers as part of the TLS 104 server fuzzer will use predictable numbers instead of the random numbers. This 109 numbers that were generated. For instance the client fuzzer will always generate 128 - A default config, plus options needed to generate the fuzzer.
|
/netbsd-src/tests/usr.bin/c++/ |
H A D | t_fuzzer_oom.sh | 76 c++ -fsanitize=fuzzer -o test test.cc 93 c++ -fsanitize=fuzzer -static -o test -pg test.cc 119 c++ -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.cc 120 c++ -o test test.cc -fsanitize=fuzzer -L. -ltest 143 c++ -fsanitize=fuzzer -o test -fpie -pie test.cc
|
H A D | t_fuzzer_timeout.sh | 75 c++ -fsanitize=fuzzer -o test test.cc 91 c++ -fsanitize=fuzzer -static -o test -pg test.cc 116 c++ -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.cc 117 c++ -o test test.cc -fsanitize=fuzzer -L. -ltest 139 c++ -fsanitize=fuzzer -o test -fpie -pie test.cc
|
H A D | t_fuzzer_simple.sh | 80 c++ -fsanitize=fuzzer -o test test.cc 101 c++ -fsanitize=fuzzer -static -o test -pg test.cc 131 c++ -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.cc 132 c++ -o test test.cc -fsanitize=fuzzer -L. -ltest 159 c++ -fsanitize=fuzzer -o test -fpie -pie test.cc
|
/netbsd-src/tests/usr.bin/cc/ |
H A D | t_fuzzer_simple.sh | 80 cc -fsanitize=fuzzer -o test test.c 101 cc -fsanitize=fuzzer -static -o test -pg test.c 131 cc -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.c 132 cc -o test test.c -fsanitize=fuzzer -L. -ltest 159 cc -fsanitize=fuzzer -o test -fpie -pie test.c
|
H A D | t_fuzzer_timeout.sh | 75 cc -fsanitize=fuzzer -o test test.c 91 cc -fsanitize=fuzzer -static -o test -pg test.c 116 cc -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.c 117 cc -o test test.c -fsanitize=fuzzer -L. -ltest 139 cc -fsanitize=fuzzer -o test -fpie -pie test.c
|
H A D | t_fuzzer_oom.sh | 76 cc -fsanitize=fuzzer -o test test.c 93 cc -fsanitize=fuzzer -static -o test -pg test.c 119 cc -fsanitize=fuzzer -fPIC -shared -o libtest.so pic.c 120 cc -o test test.c -fsanitize=fuzzer -L. -ltest 143 cc -fsanitize=fuzzer -o test -fpie -pie test.c
|
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/secondary/llvm/tools/llvm-opt-fuzzer/ |
H A D | BUILD.gn | 1 import("//llvm/utils/gn/build/fuzzer.gni") 3 fuzzer("llvm-opt-fuzzer") { 28 sources = [ "llvm-opt-fuzzer.cpp" ]
|