/external/llvm/lib/Fuzzer/ |
D | FuzzerLoop.cpp | 37 thread_local bool Fuzzer::IsMyThread; 53 static Fuzzer *F; 68 static void Prepare(const FuzzingOptions &Options, Fuzzer::Coverage *C) { in Prepare() 77 static bool RecordMax(const FuzzingOptions &Options, Fuzzer::Coverage *C) { in RecordMax() 146 Fuzzer::Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options) in Fuzzer() function in fuzzer::Fuzzer 158 void Fuzzer::LazyAllocateCurrentUnitData() { in LazyAllocateCurrentUnitData() 163 void Fuzzer::SetDeathCallback() { in SetDeathCallback() 168 void Fuzzer::StaticDeathCallback() { in StaticDeathCallback() 173 void Fuzzer::DumpCurrentUnit(const char *Prefix) { in DumpCurrentUnit() 185 void Fuzzer::DeathCallback() { in DeathCallback() [all …]
|
D | FuzzerUtil.cpp | 76 Fuzzer::StaticAlarmCallback(); in AlarmHandler() 80 Fuzzer::StaticCrashSignalCallback(); in CrashHandler() 84 Fuzzer::StaticInterruptCallback(); in InterruptHandler()
|
D | FuzzerTraceState.cpp | 178 const Fuzzer *F) in TraceState() 292 const Fuzzer *F; 479 void Fuzzer::StartTraceRecording() { in StartTraceRecording() 484 void Fuzzer::StopTraceRecording() { in StopTraceRecording() 489 void Fuzzer::AssignTaintLabels(uint8_t *Data, size_t Size) { in AssignTaintLabels() 497 void Fuzzer::InitializeTraceState() { in InitializeTraceState()
|
D | FuzzerDriver.cpp | 238 static void RssThread(Fuzzer *F, size_t RssLimitMb) { in RssThread() 247 static void StartRssThread(Fuzzer *F, size_t RssLimitMb) { in StartRssThread() 253 int RunOneTest(Fuzzer *F, const char *InputFilePath) { in RunOneTest() 351 Fuzzer F(Callback, MD, Options); in FuzzerDriver()
|
D | FuzzerInternal.h | 336 class Fuzzer { 367 Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options);
|
/external/v8/tools/testrunner/testproc/ |
D | fuzzer.py | 34 class Fuzzer(object): class 172 class ScavengeFuzzer(Fuzzer): 188 class MarkingFuzzer(Fuzzer): 204 class GcIntervalFuzzer(Fuzzer): 214 class CompactionFuzzer(Fuzzer): 220 class ThreadPoolSizeFuzzer(Fuzzer): 226 class InterruptBudgetFuzzer(Fuzzer): 255 class DeoptFuzzer(Fuzzer):
|
/external/syzkaller/syz-fuzzer/ |
D | fuzzer.go | 29 type Fuzzer struct { struct 209 fuzzer := &Fuzzer{ 244 func (fuzzer *Fuzzer) pollLoop() { argument 283 func (fuzzer *Fuzzer) poll(needCandidates bool, stats map[string]uint64) bool { argument 321 func (fuzzer *Fuzzer) sendInputToManager(inp rpctype.RPCInput) { argument 331 func (fuzzer *Fuzzer) addInputFromAnotherFuzzer(inp rpctype.RPCInput) { argument 341 func (fuzzer *Fuzzer) addInputToCorpus(p *prog.Prog, sign signal.Signal, sig hash.Sig) { argument 357 func (fuzzer *Fuzzer) corpusSnapshot() []*prog.Prog { argument 363 func (fuzzer *Fuzzer) addMaxSignal(sign signal.Signal) { argument 372 func (fuzzer *Fuzzer) grabNewSignal() signal.Signal { argument [all …]
|
D | proc.go | 31 fuzzer *Fuzzer 41 func newProc(fuzzer *Fuzzer, pid int) (*Proc, error) { argument
|
/external/grpc-grpc/templates/tools/dockerfile/test/fuzzer/ |
D | Dockerfile.template | 26 RUN clang++ -c -g -O2 -std=c++11 llvm/lib/Fuzzer/*.cpp -IFuzzer 27 RUN ar ruv libFuzzer.a Fuzzer*.o 29 RUN rm -f Fuzzer*.o
|
/external/llvm/lib/Fuzzer/test/ |
D | CMakeLists.txt | 27 # Enable the coverage instrumentation (it is disabled for the Fuzzer lib). 52 "${CMAKE_BINARY_DIR}/lib/Fuzzer/test" 121 "${CMAKE_BINARY_DIR}/lib/Fuzzer/test" 188 add_lit_testsuite(check-fuzzer "Running Fuzzer tests"
|
D | FuzzerUnittest.cpp | 21 TEST(Fuzzer, CrossOver) { in TEST() argument 80 TEST(Fuzzer, Hash) { in TEST() argument 435 Fuzzer Fuzz(LLVMFuzzerTestOneInput, MD, {}); in TEST()
|
/external/grpc-grpc/tools/dockerfile/test/fuzzer/ |
D | Dockerfile | 116 RUN clang++ -c -g -O2 -std=c++11 llvm/lib/Fuzzer/*.cpp -IFuzzer 117 RUN ar ruv libFuzzer.a Fuzzer*.o 119 RUN rm -f Fuzzer*.o
|
/external/llvm/tools/llvm-mc-fuzzer/ |
D | CMakeLists.txt | 3 ${CMAKE_CURRENT_SOURCE_DIR}/../../lib/Fuzzer)
|
/external/llvm/lib/ |
D | CMakeLists.txt | 21 add_subdirectory(Fuzzer)
|
/external/llvm/docs/ |
D | LibFuzzer.rst | 83 svn co http://llvm.org/svn/llvm-project/llvm/trunk/lib/Fuzzer 85 # git clone https://chromium.googlesource.com/chromium/llvm-project/llvm/lib/Fuzzer 86 clang++ -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer 87 ar ruv libFuzzer.a Fuzzer*.o 511 svn co http://llvm.org/svn/llvm-project/llvm/trunk/lib/Fuzzer 512 clang -c -g -O2 -std=c++11 Fuzzer/*.cpp -IFuzzer 549 openssl-1.0.1f/libssl.a openssl-1.0.1f/libcrypto.a Fuzzer*.o 603 Fuzzer-friendly build mode 647 see an example `here <https://github.com/llvm-mirror/llvm/blob/master/lib/Fuzzer/afl/afl_driver.cpp… 819 Q. When this Fuzzer is not a good solution for a problem? [all …]
|
/external/compiler-rt/lib/dfsan/ |
D | done_abilist.txt | 264 # lib/Fuzzer 305 # Don't add extra parameters to the Fuzzer callback.
|
/external/syzkaller/syz-manager/ |
D | manager.go | 80 fuzzers map[string]*Fuzzer 107 type Fuzzer struct { struct 179 fuzzers: make(map[string]*Fuzzer), 894 f := &Fuzzer{
|
/external/boringssl/src/ |
D | FUZZING.md | 50 ## Fuzzer mode
|
D | CMakeLists.txt | 575 add_library(Fuzzer STATIC ${LIBFUZZER_SOURCES}) target 578 …set_target_properties(Fuzzer PROPERTIES COMPILE_FLAGS "-Wno-shadow -Wno-format-nonliteral -Wno-mis…
|
/external/compiler-rt/lib/tsan/tests/unit/ |
D | tsan_clock_test.cc | 419 TEST(Clock, Fuzzer) { in TEST() argument
|
/external/swiftshader/third_party/llvm-7.0/llvm/docs/ |
D | LibFuzzer.rst | 71 Fuzzer Usage 503 Fuzzer-friendly build mode 674 Q. So, what exactly this Fuzzer is good for? 677 This Fuzzer might be a good choice for testing libraries that have relatively
|
D | FuzzingLLVM.rst | 132 compatible with all of libFuzzer's features. Fuzzer arguments must be passed
|
/external/lz4/ |
D | NEWS | 125 Fixed : Fuzzer + frametest compatibility with NetBSD (issue #48, reported by Thomas Klausner)
|
/external/pcre/dist2/ |
D | configure.ac | 471 echo "** ERROR: Fuzzer support requires the 8-bit library" 1040 Fuzzer support ..................... : ${enable_fuzz_support}
|
/external/clang/docs/ |
D | SanitizerCoverage.rst | 413 <http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Fuzzer/README.txt?view=markup>`_.
|