/art/tools/dexfuzz/src/dexfuzz/fuzzers/ |
FuzzerSingle.java | 25 public abstract class FuzzerSingle extends Fuzzer {
|
FuzzerMultiple.java | 26 public abstract class FuzzerMultiple extends Fuzzer {
|
Fuzzer.java | 58 public abstract class Fuzzer { 82 protected Fuzzer(BaseListener listener) { 95 * Call this after fuzzer execution to print out timing results. 191 * Called from each Fuzzer subclass that we can instantiate. Parses the program, fuzzes it, 227 Log.errorAndQuit("Your Fuzzer subclass called execute() "
|
/external/llvm/lib/Fuzzer/ |
FuzzerLoop.cpp | 1 //===- FuzzerLoop.cpp - Fuzzer's main loop --------------------------------===// 9 // Fuzzer's main loop. 34 namespace fuzzer { namespace 37 thread_local bool Fuzzer::IsMyThread; 52 // Only one Fuzzer per process. 53 static Fuzzer *F; 68 static void Prepare(const FuzzingOptions &Options, Fuzzer::Coverage *C) { 77 static bool RecordMax(const FuzzingOptions &Options, Fuzzer::Coverage *C) { 146 Fuzzer::Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options [all...] |
FuzzerUtil.cpp | 28 namespace fuzzer { namespace 76 Fuzzer::StaticAlarmCallback(); 80 Fuzzer::StaticCrashSignalCallback(); 84 Fuzzer::StaticInterruptCallback(); 297 } // namespace fuzzer
|
FuzzerDriver.cpp | 28 namespace fuzzer { namespace 214 fuzzer::CopyFileToErr(Log); 238 static void RssThread(Fuzzer *F, size_t RssLimitMb) { 247 static void StartRssThread(Fuzzer *F, size_t RssLimitMb) { 253 int RunOneTest(Fuzzer *F, const char *InputFilePath) { 270 using namespace fuzzer; 351 Fuzzer F(Callback, MD, Options); 429 } // namespace fuzzer
|
FuzzerTraceState.cpp | 1 //===- FuzzerTraceState.cpp - Trace-based fuzzer mutator ------------------===// 24 // The fuzzer can work only with the traces, or with both traces and DFSan. 38 // * lib/Fuzzer/Fuzzer*.cpp is compiled w/o any instrumentation. 43 // * At the Fuzzer startup we assign a unique DFSan label 44 // to every byte of the input string (Fuzzer::CurrentUnitData) so that 51 // Instead of using ifdefs and thus requiring a separate build of lib/Fuzzer 64 cd $LLVM/lib/Fuzzer/ 65 clang -fPIC -c -g -O2 -std=c++11 Fuzzer*.cpp 68 test/SimpleCmpTest.cpp Fuzzer*. 95 namespace fuzzer { namespace [all...] |
FuzzerInternal.h | 1 //===- FuzzerInternal.h - Internal header for the Fuzzer --------*- C++ -* ===// 9 // Define the main class fuzzer::Fuzzer and most functions. 43 namespace fuzzer { namespace 321 // Temporary dictionary modified by the fuzzer itself, 324 // Persistent dictionary modified by the fuzzer, consists of 336 class Fuzzer { 367 Fuzzer(UserCallback CB, MutationDispatcher &MD, FuzzingOptions Options); 491 }; // namespace fuzzer
|
/art/tools/dexfuzz/src/dexfuzz/ |
DexFuzz.java | 19 import dexfuzz.fuzzers.Fuzzer; 88 // Create the Fuzzer that uses a particular strategy for fuzzing. 89 Fuzzer fuzzer = null; local 91 fuzzer = new FuzzerMultipleExecute(multipleListener); 93 fuzzer = new FuzzerMultipleNoExecute(multipleListener); 95 fuzzer = new FuzzerSingleExecute(multipleListener); 97 fuzzer = new FuzzerSingleNoExecute(multipleListener); 99 Log.errorAndQuit("Invalid options provided, desired fuzzer unknown."); 104 // Actually run the Fuzzer [all...] |
/external/v8/tools/testrunner/testproc/ |
fuzzer.py | 12 def __init__(self, probability, analyzer, fuzzer): 15 probability: of choosing this fuzzer (0; 10] 17 fuzzer: instance of Fuzzer class 23 self.fuzzer = fuzzer 34 class Fuzzer(object): 41 corresponding analyzer to this fuzzer or the analysis phase is disabled 57 super(FuzzerProc, self).__init__('Fuzzer') 66 # Fuzzer is optimized to not store the result [all...] |
/external/syzkaller/syz-fuzzer/ |
fuzzer.go | 29 type Fuzzer struct { 108 log.Logf(0, "fuzzer started") 131 log.Logf(0, "SYZ-FUZZER: PREEMPTED") 209 fuzzer := &Fuzzer{ 223 for i := 0; fuzzer.poll(i == 0, nil); i++ { 229 prios := target.CalculatePriorities(fuzzer.corpus) 230 fuzzer.choiceTable = target.BuildChoiceTable(prios, calls) 233 proc, err := newProc(fuzzer, pid) 237 fuzzer.procs = append(fuzzer.procs, proc [all...] |
proc.go | 31 fuzzer *Fuzzer 41 func newProc(fuzzer *Fuzzer, pid int) (*Proc, error) { 42 env, err := ipc.MakeEnv(fuzzer.config, pid) 47 execOptsNoCollide := *fuzzer.execOpts 54 fuzzer: fuzzer, 58 execOpts: fuzzer.execOpts, 68 if proc.fuzzer.config.Flags&ipc.FlagSignal == 0 [all...] |
/external/llvm/lib/Fuzzer/test/ |
FuzzerUnittest.cpp | 13 using namespace fuzzer; 21 TEST(Fuzzer, CrossOver) { 23 fuzzer::EF = t.get(); 80 TEST(Fuzzer, Hash) { 82 fuzzer::Unit U(A, A + sizeof(A)); 83 EXPECT_EQ("a9993e364706816aba3e25717850c26c9cd0d89d", fuzzer::Hash(U)); 85 EXPECT_EQ("81fe8bfe87576c3ecb22426f8e57847382917acf", fuzzer::Hash(U)); 93 fuzzer::EF = t.get(); 129 fuzzer::EF = t.get(); 165 fuzzer::EF = t.get() [all...] |
/external/syzkaller/prog/ |
hints.go | 11 // 1. Fuzzer launches a program (we call it a hint seed) and collects all 15 // 3. For every such match the fuzzer mutates the program by 17 // 4. If a valid program is obtained, then fuzzer launches it and
|
/external/syzkaller/syz-manager/ |
manager.go | 80 fuzzers map[string]*Fuzzer 107 type Fuzzer struct { 144 // and start syz-fuzzer there. 179 fuzzers: make(map[string]*Fuzzer), 281 log.Logf(0, "you are supposed to start syz-fuzzer manually as:") 282 log.Logf(0, "syz-fuzzer -manager=manager.ip:%v [other flags as necessary]", mgr.port) 511 // This solves the following problem. A fuzzer can crash while triaging candidates, 514 // Shuffling should alleviate deterministically losing the same inputs on fuzzer crashing. 555 // Run the fuzzer binary. 564 return nil, fmt.Errorf("failed to run fuzzer: %v", err [all...] |
/external/compiler-rt/lib/tsan/tests/unit/ |
tsan_clock_test.cc | 419 TEST(Clock, Fuzzer) {
|
/external/syzkaller/vm/qemu/ |
qemu.go | 408 if base == "syz-fuzzer" || base == "syz-execprog" { 440 (bin == "syz-fuzzer" || bin == "syz-execprog") { 442 // Fuzzer and execprog are on host (we did not copy them), so we will run them as is,
|
/external/pcre/dist2/ |
configure | [all...] |