Home
last modified time | relevance | path

Searched refs:fuzzer (Results 1 – 25 of 104) sorted by relevance

12345

/openbsd-src/gnu/llvm/clang/tools/clang-fuzzer/
H A DREADME.txt1 This directory contains three utilities for fuzzing Clang: clang-fuzzer,
2 clang-objc-fuzzer, and clang-proto-fuzzer. All use libFuzzer to generate inputs
6 clang-fuzzer makes no attempt to generate valid C++ programs and is therefore
9 clang-objc-fuzzer is similar but for Objective-C: it makes no attempt to
12 clang-proto-fuzzer uses a protobuf class to describe a subset of the C++
15 clang-proto-fuzzer is better at stressing deeper layers of Clang and LLVM.
20 Building clang-fuzzer
29 Then build the clang-fuzzer target.
36 ninja clang-fuzzer
39 Running clang-fuzzer
[all …]
H A DCMakeLists.txt7 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=fuzzer")
8 set(CXX_FLAGS_NOFUZZ "${CXX_FLAGS_NOFUZZ} -fsanitize=fuzzer-no-link")
24 # clang-proto-fuzzer components.
58 # Build the fuzzer initialization library.
59 add_clang_subdirectory(fuzzer-initialize)
61 # Build the protobuf fuzzer
62 add_clang_executable(clang-proto-fuzzer
67 # Build the loop protobuf fuzzer
68 add_clang_executable(clang-loop-proto-fuzzer
73 # Build the llvm protobuf fuzzer
[all …]
H A DDockerfile1 #===- llvm/tools/clang/tools/clang-fuzzer ---------------------------------===//
8 # Produces an image that builds clang-proto-fuzzer
34 RUN cd build1 && ninja clang-fuzzer
35 RUN cd build1 && ninja clang-objc-fuzzer
36 RUN cd build1 && ninja clang-proto-fuzzer
40 RUN cd build1 && ninja clang-loop-proto-fuzzer
41 RUN cd build1 && ninja clang-llvm-proto-fuzzer
/openbsd-src/gnu/llvm/llvm/docs/
H A DFuzzingLLVM.rst20 clang-fuzzer
23 A |generic fuzzer| that tries to compile textual input as C++ code. Some of the
24 bugs this fuzzer has reported are `on bugzilla`__ and `on OSS Fuzz's
28 __ https://bugs.chromium.org/p/oss-fuzz/issues/list?q=proj-llvm+clang-fuzzer
30 clang-proto-fuzzer
33 A |protobuf fuzzer| that compiles valid C++ programs generated from a protobuf
36 This fuzzer accepts clang command line options after `ignore_remaining_args=1`.
42 % bin/clang-proto-fuzzer <corpus-dir> -ignore_remaining_args=1 -O3
44 clang-format-fuzzer
47 A |generic fuzzer| that runs clang-format_ on C++ text fragments. Some of the
[all …]
H A DLibFuzzer.rst14 library via a specific fuzzing entrypoint (aka "target function"); the fuzzer
81 In order to build your fuzzer binary, use the `-fsanitize=fuzzer` flag during the
86 …clang -g -O1 -fsanitize=fuzzer mytarget.c # Builds the fuzz target w/o san…
87 …clang -g -O1 -fsanitize=fuzzer,address mytarget.c # Builds the fuzz target with AS…
88 …clang -g -O1 -fsanitize=fuzzer,signed-integer-overflow mytarget.c # Builds the fuzz target with a …
89 …clang -g -O1 -fsanitize=fuzzer,memory mytarget.c # Builds the fuzz target with MS…
92 Note that ``-fsanitize=fuzzer`` links in the libFuzzer's ``main()`` symbol.
98 clang -fsanitize=fuzzer-no-link mytarget.c
101 ``-fsanitize=fuzzer`` during the linking stage.
112 files. The fuzzer generates random mutations based around the sample inputs in
[all …]
/openbsd-src/gnu/llvm/lldb/tools/lldb-fuzzer/lldb-commandinterpreter-fuzzer/
H A DCMakeLists.txt5 add_llvm_fuzzer(lldb-commandinterpreter-fuzzer
7 lldb-commandinterpreter-fuzzer.cpp
10 if(TARGET lldb-commandinterpreter-fuzzer)
11 target_include_directories(lldb-commandinterpreter-fuzzer PRIVATE ..)
12 target_link_libraries(lldb-commandinterpreter-fuzzer
17 # A directory in the build directory is created to hold the fuzzer's
19 # target. When the fuzzer exits the input artifact that caused it to exit
22 add_custom_command(TARGET lldb-commandinterpreter-fuzzer PRE_BUILD
23 …COMMAND ${CMAKE_COMMAND} -E make_directory ${CMAKE_BINARY_DIR}/fuzzer-artifacts/commandinterpreter…
27 COMMENT "Running the LLDB command interpreter fuzzer..."
[all …]
/openbsd-src/gnu/llvm/lldb/tools/lldb-fuzzer/lldb-target-fuzzer/
H A DCMakeLists.txt5 add_llvm_fuzzer(lldb-target-fuzzer
7 lldb-target-fuzzer.cpp
10 if(TARGET lldb-target-fuzzer)
11 target_include_directories(lldb-target-fuzzer PRIVATE ..)
12 target_link_libraries(lldb-target-fuzzer
18 add_custom_command(TARGET lldb-target-fuzzer PRE_BUILD
19 COMMAND ${CMAKE_COMMAND} -E make_directory ${CMAKE_BINARY_DIR}/fuzzer-artifacts/target-artifacts
23 COMMENT "Running the LLDB target fuzzer..."
24 WORKING_DIRECTORY ${CMAKE_BINARY_DIR}/fuzzer-artifacts/target-artifacts
25 COMMAND $<TARGET_FILE:lldb-target-fuzzer> -artifact_prefix=target-
/openbsd-src/gnu/llvm/lldb/tools/lldb-fuzzer/lldb-expression-fuzzer/
H A DCMakeLists.txt6 add_llvm_fuzzer(lldb-expression-fuzzer
8 lldb-expression-fuzzer.cpp
11 if(TARGET lldb-expression-fuzzer)
12 target_include_directories(lldb-expression-fuzzer PRIVATE ..)
16 include_directories(${CMAKE_CURRENT_BINARY_DIR}/../../../../clang/tools/clang-fuzzer PRIVATE ..)
17 include_directories(${CMAKE_CURRENT_SOURCE_DIR}/../../../../clang/tools/clang-fuzzer)
31 target_link_libraries(lldb-expression-fuzzer
41 add_custom_command(TARGET lldb-expression-fuzzer PRE_BUILD
42 …COMMAND ${CMAKE_COMMAND} -E make_directory ${CMAKE_BINARY_DIR}/fuzzer-artifacts/expression-artifac…
49 …# Create a directory for storing the fuzzer's artifacts and run the fuzzer with arguments that will
[all …]
/openbsd-src/gnu/llvm/lldb/docs/resources/
H A Dfuzzing.rst20 …zzer's sanitizer coverage is available here: `<https://llvm.org/docs/LibFuzzer.html#fuzzer-usage>`_
24 To build a fuzzer, run the desired ninja command for the fuzzer(s) you want to build:
28 $ ninja lldb-target-fuzzer
29 $ ninja lldb-commandinterpreter-fuzzer
30 $ ninja lldb-expression-fuzzer
46 $ ./bin/lldb-target-fuzzer
47 $ ./bin/lldb-commandinterpreter-fuzzer
48 $ ./bin/lldb-expression-fuzzer
50 This will run the fuzzer binaries directly, and you can use the `libFuzzer options <https://llvm.or…
52fuzzer with command-line arguments that provide better fuzzing for the components being tested. Ru…
[all …]
/openbsd-src/gnu/llvm/compiler-rt/lib/fuzzer/
H A DFuzzerTracePC.cpp30 namespace fuzzer { namespace
445 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard()
454 fuzzer::WarnAboutDeprecatedInstrumentation("-fsanitize-coverage=trace-pc"); in __sanitizer_cov_trace_pc()
459 fuzzer::WarnAboutDeprecatedInstrumentation( in __sanitizer_cov_trace_pc_guard_init()
465 fuzzer::TPC.HandleInline8bitCountersInit(Start, Stop); in __sanitizer_cov_8bit_counters_init()
471 fuzzer::TPC.HandlePCsInit(pcs_beg, pcs_end); in __sanitizer_cov_pcs_init()
478 fuzzer::TPC.HandleCallerCallee(PC, Callee); in __sanitizer_cov_trace_pc_indir()
486 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp8()
497 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_const_cmp8()
505 fuzzer::TPC.HandleCmp(PC, Arg1, Arg2); in __sanitizer_cov_trace_cmp4()
[all …]
H A DCMakeLists.txt90 add_compiler_rt_component(fuzzer)
114 add_compiler_rt_runtime(clang_rt.fuzzer
120 PARENT_TARGET fuzzer)
128 PARENT_TARGET fuzzer)
136 PARENT_TARGET fuzzer)
176 partially_link_libcxx(fuzzer ${LIBCXX_${arch}_PREFIX} ${arch})
/openbsd-src/gnu/llvm/llvm/utils/gn/build/
H A Dfuzzer.gni12 # fuzzer("llvm-opt-fuzzer") {
15 # sources = [ "llvm-opt-fuzzer.cpp" ]
23 # If true, pass -fsanitize=fuzzer to the compiler for fuzzer() targets.
28 template("fuzzer") {
46 cflags += [ "-fsanitize=fuzzer" ]
47 ldflags += [ "-fsanitize=fuzzer" ]
/openbsd-src/gnu/llvm/compiler-rt/tools/gwp_asan/
H A DCMakeLists.txt1 # Build the stack trace compressor fuzzer. This will require Clang >= 6.0.0, as
2 # -fsanitize=fuzzer-no-link was not a valid command line flag prior to this.
11 stack_trace_compressor_fuzzer PRIVATE -fsanitize=fuzzer-no-link)
13 stack_trace_compressor_fuzzer PROPERTIES LINK_FLAGS -fsanitize=fuzzer)
24 options_parser_fuzzer PRIVATE -fsanitize=fuzzer-no-link)
26 options_parser_fuzzer PROPERTIES LINK_FLAGS -fsanitize=fuzzer)
/openbsd-src/gnu/llvm/llvm/utils/gn/secondary/llvm/tools/llvm-isel-fuzzer/
H A DBUILD.gn1 import("//llvm/utils/gn/build/fuzzer.gni")
3 fuzzer("llvm-isel-fuzzer") {
22 sources = [ "llvm-isel-fuzzer.cpp" ]
/openbsd-src/gnu/llvm/llvm/utils/gn/secondary/llvm/tools/llvm-opt-fuzzer/
H A DBUILD.gn1 import("//llvm/utils/gn/build/fuzzer.gni")
3 fuzzer("llvm-opt-fuzzer") {
29 sources = [ "llvm-opt-fuzzer.cpp" ]
/openbsd-src/gnu/llvm/lldb/tools/lldb-fuzzer/
H A DCMakeLists.txt1 add_subdirectory(lldb-commandinterpreter-fuzzer)
2 add_subdirectory(lldb-expression-fuzzer)
3 add_subdirectory(lldb-target-fuzzer)
/openbsd-src/gnu/llvm/clang/tools/clang-format/fuzzer/
H A DCMakeLists.txt4 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=fuzzer")
7 add_clang_executable(clang-format-fuzzer
12 target_link_libraries(clang-format-fuzzer
/openbsd-src/gnu/llvm/llvm/tools/llvm-dis-fuzzer/
H A DCMakeLists.txt4 add_llvm_fuzzer(llvm-dis-fuzzer
5 llvm-dis-fuzzer.cpp
/openbsd-src/gnu/llvm/llvm/tools/vfabi-demangle-fuzzer/
H A DCMakeLists.txt7 add_llvm_fuzzer(vfabi-demangler-fuzzer
8 vfabi-demangler-fuzzer.cpp
/openbsd-src/gnu/llvm/llvm/tools/llvm-as-fuzzer/
H A DCMakeLists.txt7 add_llvm_fuzzer(llvm-as-fuzzer
8 llvm-as-fuzzer.cpp
/openbsd-src/gnu/llvm/llvm/tools/llvm-dwarfdump/fuzzer/
H A DCMakeLists.txt7 add_llvm_fuzzer(llvm-dwarfdump-fuzzer
9 llvm-dwarfdump-fuzzer.cpp
/openbsd-src/gnu/llvm/llvm/tools/llvm-yaml-parser-fuzzer/
H A DCMakeLists.txt6 add_llvm_fuzzer(llvm-yaml-parser-fuzzer
7 yaml-parser-fuzzer.cpp
/openbsd-src/gnu/llvm/llvm/tools/llvm-microsoft-demangle-fuzzer/
H A DCMakeLists.txt7 add_llvm_fuzzer(llvm-microsoft-demangle-fuzzer
8 llvm-microsoft-demangle-fuzzer.cpp
/openbsd-src/gnu/llvm/llvm/tools/llvm-dlang-demangle-fuzzer/
H A DCMakeLists.txt7 add_llvm_fuzzer(llvm-dlang-demangle-fuzzer
8 llvm-dlang-demangle-fuzzer.cpp
/openbsd-src/gnu/llvm/llvm/tools/llvm-yaml-numeric-parser-fuzzer/
H A DCMakeLists.txt6 add_llvm_fuzzer(llvm-yaml-numeric-parser-fuzzer
7 yaml-numeric-parser-fuzzer.cpp

12345