HomeSort by relevance Sort by last modified time
    Searched refs:Fuzzer (Results 1 - 18 of 18) sorted by null

  /art/tools/dexfuzz/src/dexfuzz/fuzzers/
FuzzerSingle.java 25 public abstract class FuzzerSingle extends Fuzzer {
FuzzerMultiple.java 26 public abstract class FuzzerMultiple extends Fuzzer {
Fuzzer.java 58 public abstract class Fuzzer {
82 protected Fuzzer(BaseListener listener) {
95 * Call this after fuzzer execution to print out timing results.
191 * Called from each Fuzzer subclass that we can instantiate. Parses the program, fuzzes it,
227 Log.errorAndQuit("Your Fuzzer subclass called execute() "
  /external/llvm/lib/Fuzzer/
FuzzerLoop.cpp 1 //===- FuzzerLoop.cpp - Fuzzer's main loop --------------------------------===//
9 // Fuzzer's main loop.
34 namespace fuzzer { namespace
37 thread_local bool Fuzzer::IsMyThread;
52 // Only one Fuzzer per process.
53 static Fuzzer *F;
68 static void Prepare(const FuzzingOptions &Options, Fuzzer::Coverage *C) {
77 static bool RecordMax(const FuzzingOptions &Options, Fuzzer::Coverage *C) {
146 Fuzzer::Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options
    [all...]
FuzzerUtil.cpp 28 namespace fuzzer { namespace
76 Fuzzer::StaticAlarmCallback();
80 Fuzzer::StaticCrashSignalCallback();
84 Fuzzer::StaticInterruptCallback();
297 } // namespace fuzzer
FuzzerDriver.cpp 28 namespace fuzzer { namespace
214 fuzzer::CopyFileToErr(Log);
238 static void RssThread(Fuzzer *F, size_t RssLimitMb) {
247 static void StartRssThread(Fuzzer *F, size_t RssLimitMb) {
253 int RunOneTest(Fuzzer *F, const char *InputFilePath) {
270 using namespace fuzzer;
351 Fuzzer F(Callback, MD, Options);
429 } // namespace fuzzer
FuzzerTraceState.cpp 1 //===- FuzzerTraceState.cpp - Trace-based fuzzer mutator ------------------===//
24 // The fuzzer can work only with the traces, or with both traces and DFSan.
38 // * lib/Fuzzer/Fuzzer*.cpp is compiled w/o any instrumentation.
43 // * At the Fuzzer startup we assign a unique DFSan label
44 // to every byte of the input string (Fuzzer::CurrentUnitData) so that
51 // Instead of using ifdefs and thus requiring a separate build of lib/Fuzzer
64 cd $LLVM/lib/Fuzzer/
65 clang -fPIC -c -g -O2 -std=c++11 Fuzzer*.cpp
68 test/SimpleCmpTest.cpp Fuzzer*.
95 namespace fuzzer { namespace
    [all...]
FuzzerInternal.h 1 //===- FuzzerInternal.h - Internal header for the Fuzzer --------*- C++ -* ===//
9 // Define the main class fuzzer::Fuzzer and most functions.
43 namespace fuzzer { namespace
321 // Temporary dictionary modified by the fuzzer itself,
324 // Persistent dictionary modified by the fuzzer, consists of
336 class Fuzzer {
367 Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options);
491 }; // namespace fuzzer
  /art/tools/dexfuzz/src/dexfuzz/
DexFuzz.java 19 import dexfuzz.fuzzers.Fuzzer;
88 // Create the Fuzzer that uses a particular strategy for fuzzing.
89 Fuzzer fuzzer = null; local
91 fuzzer = new FuzzerMultipleExecute(multipleListener);
93 fuzzer = new FuzzerMultipleNoExecute(multipleListener);
95 fuzzer = new FuzzerSingleExecute(multipleListener);
97 fuzzer = new FuzzerSingleNoExecute(multipleListener);
99 Log.errorAndQuit("Invalid options provided, desired fuzzer unknown.");
104 // Actually run the Fuzzer
    [all...]
  /external/v8/tools/testrunner/testproc/
fuzzer.py 12 def __init__(self, probability, analyzer, fuzzer):
15 probability: of choosing this fuzzer (0; 10]
17 fuzzer: instance of Fuzzer class
23 self.fuzzer = fuzzer
34 class Fuzzer(object):
41 corresponding analyzer to this fuzzer or the analysis phase is disabled
57 super(FuzzerProc, self).__init__('Fuzzer')
66 # Fuzzer is optimized to not store the result
    [all...]
  /external/syzkaller/syz-fuzzer/
fuzzer.go 29 type Fuzzer struct {
108 log.Logf(0, "fuzzer started")
131 log.Logf(0, "SYZ-FUZZER: PREEMPTED")
209 fuzzer := &Fuzzer{
223 for i := 0; fuzzer.poll(i == 0, nil); i++ {
229 prios := target.CalculatePriorities(fuzzer.corpus)
230 fuzzer.choiceTable = target.BuildChoiceTable(prios, calls)
233 proc, err := newProc(fuzzer, pid)
237 fuzzer.procs = append(fuzzer.procs, proc
    [all...]
proc.go 31 fuzzer *Fuzzer
41 func newProc(fuzzer *Fuzzer, pid int) (*Proc, error) {
42 env, err := ipc.MakeEnv(fuzzer.config, pid)
47 execOptsNoCollide := *fuzzer.execOpts
54 fuzzer: fuzzer,
58 execOpts: fuzzer.execOpts,
68 if proc.fuzzer.config.Flags&ipc.FlagSignal == 0
    [all...]
  /external/llvm/lib/Fuzzer/test/
FuzzerUnittest.cpp 13 using namespace fuzzer;
21 TEST(Fuzzer, CrossOver) {
23 fuzzer::EF = t.get();
80 TEST(Fuzzer, Hash) {
82 fuzzer::Unit U(A, A + sizeof(A));
83 EXPECT_EQ("a9993e364706816aba3e25717850c26c9cd0d89d", fuzzer::Hash(U));
85 EXPECT_EQ("81fe8bfe87576c3ecb22426f8e57847382917acf", fuzzer::Hash(U));
93 fuzzer::EF = t.get();
129 fuzzer::EF = t.get();
165 fuzzer::EF = t.get()
    [all...]
  /external/syzkaller/prog/
hints.go 11 // 1. Fuzzer launches a program (we call it a hint seed) and collects all
15 // 3. For every such match the fuzzer mutates the program by
17 // 4. If a valid program is obtained, then fuzzer launches it and
  /external/syzkaller/syz-manager/
manager.go 80 fuzzers map[string]*Fuzzer
107 type Fuzzer struct {
144 // and start syz-fuzzer there.
179 fuzzers: make(map[string]*Fuzzer),
281 log.Logf(0, "you are supposed to start syz-fuzzer manually as:")
282 log.Logf(0, "syz-fuzzer -manager=manager.ip:%v [other flags as necessary]", mgr.port)
511 // This solves the following problem. A fuzzer can crash while triaging candidates,
514 // Shuffling should alleviate deterministically losing the same inputs on fuzzer crashing.
555 // Run the fuzzer binary.
564 return nil, fmt.Errorf("failed to run fuzzer: %v", err
    [all...]
  /external/compiler-rt/lib/tsan/tests/unit/
tsan_clock_test.cc 419 TEST(Clock, Fuzzer) {
  /external/syzkaller/vm/qemu/
qemu.go 408 if base == "syz-fuzzer" || base == "syz-execprog" {
440 (bin == "syz-fuzzer" || bin == "syz-execprog") {
442 // Fuzzer and execprog are on host (we did not copy them), so we will run them as is,
  /external/pcre/dist2/
configure     [all...]

Completed in 7037 milliseconds