| /openbmc/libpldm/docs/ |
| H A D | fuzzing.md | 5 `tests/fuzz/fd-fuzz.cpp` exercises the FD responder implementation. It can run 8 Each fuzz corpus input is split into two parts. The first 1024 bytes is a 13 The remainder of the fuzz input is taken as an stream of `length:data` PLDM 18 From the top level libpldm directory, run `./tests/fuzz/fuzz-build.py`. That 19 will produce several build variants required for different fuzz engines/stages. 30 …e honggfuzz -i corpusdir --linux_perf_branch --dict tests/fuzz/fd.dict -- ./bhf/tests/fuzz/fd-fuzz 44 totally fresh start, copy in `tests/fuzz/fd-fuzz-input1.dat`, a sample 52 afl-fuzz -i fuzzrun/hf11/ -o fuzzrun/out12single ./bfuzz/tests/fuzz/fd-fuzz 61 …fuzz/fd-fuzz -i workdir/out5/m_fd-fuzz/queue -o workdir/out6 -c bcmplog/tests/fuzz/fd-fuzz -s bfuz… 64 Kill it with `aflr kill fuzz`. [all …]
|
| /openbmc/libmctp/docs/ |
| H A D | fuzzing.md | 5 From the top level libmctp directory, run `./tests/fuzz/fuzz-build.py`. That 6 will produce several build variants required for different fuzz engines/stages. 17 nice honggfuzz -T -i corpusdir --linux_perf_branch -- ./bhf/tests/fuzz/i2c-fuzz 37 afl-fuzz -i fuzzrun/hf11/ -o fuzzrun/out12single ./bfuzz/tests/fuzz/i2c-fuzz 46 …fuzz/i2c-fuzz -i workdir/out5/m_i2c-fuzz/queue -o workdir/out6 -c bcmplog/tests/fuzz/i2c-fuzz -s b… 49 Kill it with `aflr kill fuzz`. 58 `tests/fuzz/fuzz-coverage.py`. 70 ./tests/fuzz/fuzz-coverage.py fuzzrun/corpus bnoopt/tests/fuzz/i2c-fuzz . bnoopt/ coverage-output 75 When the fuzz run encounters a crash, the testcase can be run against the built 79 ./bnoopt/tests/fuzz/i2c-fuzz < crashing.bin
|
| /openbmc/qemu/scripts/oss-fuzz/ |
| H A D | build.sh | 70 if ! make "-j$(nproc)" qemu-fuzz-i386; then 77 for i in $(ldd ./qemu-fuzz-i386 | cut -f3 -d' '); do 80 rm qemu-fuzz-i386 87 make "-j$(nproc)" qemu-fuzz-i386 V=1 92 rm -rf $DEST_DIR/qemu-bundle/opt/qemu-oss-fuzz/bin 93 rm -rf $DEST_DIR/qemu-bundle/opt/qemu-oss-fuzz/libexec 96 targets=$(./qemu-fuzz-i386 | grep generic-fuzz | awk '$1 ~ /\*/ {print $2}')
|
| H A D | instrumentation-filter-template | 12 src:*/tests/qtest/fuzz/fuzz.c
|
| /openbmc/qemu/docs/devel/testing/ |
| H A D | fuzzing.rst | 15 To fuzz QEMU, we rely on libfuzzer. Unlike other fuzzers such as AFL, libfuzzer 33 make qemu-fuzz-i386 35 This builds ``./qemu-fuzz-i386`` 37 The first option to this command is: ``--fuzz-target=FUZZ_NAME`` 38 To list all of the available fuzzers run ``qemu-fuzz-i386`` with no arguments. 42 ./qemu-fuzz-i386 --fuzz-target=virtio-scsi-fuzz 110 llvm-cov show ./path/to/qemu-fuzz-i386 -instr-profile=default.profdata \ 117 Fuzzers are kept in ``tests/qtest/fuzz/`` and should be added to 118 ``tests/qtest/fuzz/meson.build`` 122 1. Create a new source file. For example ``tests/qtest/fuzz/foo-device-fuzz.c``. [all …]
|
| /openbmc/openbmc/poky/meta/recipes-connectivity/avahi/files/ |
| H A D | CVE-2023-38470-2.patch | 10 …#0 0x47208c in __interceptor_strlen (out/fuzz-domain+0x47208c) (BuildId: 731b20c1eef22c2104e75a649… 16 fuzz-domain: fuzz/fuzz-domain.c:38: int LLVMFuzzerTestOneInput(const uint8_t *, size_t): Assertion … 18 …#0 0x501175 in __sanitizer_print_stack_trace (/home/vagrant/avahi/out/fuzz-domain+0x501175) (Build… 19 …#1 0x45ad2c in fuzzer::PrintStackTrace() (/home/vagrant/avahi/out/fuzz-domain+0x45ad2c) (BuildId: … 20 …#2 0x43fc07 in fuzzer::Fuzzer::CrashCallback() (/home/vagrant/avahi/out/fuzz-domain+0x43fc07) (Bui… 27 #9 0x5344a4 in LLVMFuzzerTestOneInput /home/vagrant/avahi/fuzz/fuzz-domain.c:38:9
|
| /openbmc/qemu/tests/docker/ |
| H A D | test-fuzz | 20 mkdir build-oss-fuzz 21 export LSAN_OPTIONS=suppressions=scripts/oss-fuzz/lsan_suppressions.txt 22 env CC="clang" CXX="clang++" CFLAGS="-fsanitize=address" ./scripts/oss-fuzz/build.sh 24 for fuzzer in $(find ./build-oss-fuzz/DEST_DIR/ -executable -type f | grep -v slirp); do
|
| /openbmc/libpldm/tests/fuzz/ |
| H A D | meson.build | 2 'fd-fuzz', 3 'fd-fuzz.cpp',
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/uutils-coreutils/uutils-coreutils/ |
| H A D | 0002-Bump-onig-from-6.4.0-to-6.5.1.patch | 11 fuzz/Cargo.lock | 22 ++++++++-------------- 58 diff --git a/fuzz/Cargo.lock b/fuzz/Cargo.lock 60 --- a/fuzz/Cargo.lock 61 +++ b/fuzz/Cargo.lock
|
| /openbmc/libmctp/tests/fuzz/ |
| H A D | meson.build | 3 'i2c-fuzz', 4 'i2c-fuzz.c',
|
| /openbmc/libcper/ |
| H A D | meson.options | 2 'fuzz', 5 description: 'Build fuzz targets',
|
| /openbmc/qemu/tests/qtest/fuzz/ |
| H A D | i440fx_fuzz.c | 164 .fuzz = i440fx_fuzz_qtest}); in register_pci_fuzz_targets() 176 .fuzz = i440fx_fuzz_qos,}, in register_pci_fuzz_targets()
|
| H A D | fuzz.h | 77 void(*fuzz)(QTestState *, const unsigned char *, size_t); member
|
| H A D | meson.build | 5 specific_fuzz_ss.add(files('fuzz.c', 'qos_fuzz.c',
|
| /openbmc/libmctp/tests/ |
| H A D | meson.build | 27 subdir('fuzz') subdir
|
| /openbmc/qemu/tests/image-fuzzer/qcow2/ |
| H A D | layout.py | 21 from . import fuzz 468 def fuzz(self, fields_to_fuzz=None): member in Image 489 field.value = getattr(fuzz, field.name)(field.value) 495 field.value = getattr(fuzz, 501 field.value = getattr(fuzz, field.name)(field.value) 610 image.fuzz(fields_to_fuzz)
|
| /openbmc/qemu/include/standard-headers/linux/ |
| H A D | virtio_input.h | 45 uint32_t fuzz; member
|
| /openbmc/u-boot/arch/arm/dts/ |
| H A D | am3517-som.dtsi | 138 touchscreen-fuzz-x = <4>; 139 touchscreen-fuzz-y = <7>; 140 touchscreen-fuzz-pressure = <2>;
|
| H A D | logicpd-som-lv.dtsi | 119 touchscreen-fuzz-x = <4>; 120 touchscreen-fuzz-y = <7>; 121 touchscreen-fuzz-pressure = <2>;
|
| H A D | logicpd-torpedo-baseboard.dtsi | 338 touchscreen-fuzz-x = <4>; 339 touchscreen-fuzz-y = <7>; 340 touchscreen-fuzz-pressure = <2>;
|
| /openbmc/libcper/tests/ |
| H A D | meson.build | 29 if (cc.get_id() == 'clang') and get_option('fuzz').allowed() and not is_darwin
|
| /openbmc/qemu/tests/qtest/ |
| H A D | meson.build | 88 (config_all_devices.has_key('CONFIG_E1000E_PCI_EXPRESS') ? ['fuzz-e1000e-test'] : []) + \ 89 (config_all_devices.has_key('CONFIG_MEGASAS_SCSI_PCI') ? ['fuzz-megasas-test'] : []) + \ 90 (config_all_devices.has_key('CONFIG_LSI_SCSI_PCI') ? ['fuzz-lsi53c895a-test'] : []) + \ 91 (config_all_devices.has_key('CONFIG_VIRTIO_SCSI') ? ['fuzz-virtio-scsi-test'] : []) + \ 94 (config_all_devices.has_key('CONFIG_SB16') ? ['fuzz-sb16-test'] : []) + \ 95 (config_all_devices.has_key('CONFIG_SDHCI_PCI') ? ['fuzz-sdcard-test'] : []) + \ 259 …(config_all_devices.has_key('CONFIG_XLNX_ZYNQMP_ARM') ? ['xlnx-can-test', 'fuzz-xlnx-dp-test'] : […
|
| /openbmc/libpldm/tests/ |
| H A D | meson.build | 36 subdir('fuzz') subdir
|
| /openbmc/qemu/hw/input/ |
| H A D | virtio-input-host.c | 91 config.u.abs.fuzz = cpu_to_le32(absinfo.fuzz); in virtio_input_abs_config()
|
| /openbmc/openbmc/poky/meta/recipes-bsp/grub/files/ |
| H A D | CVE-2024-45778_CVE-2024-45779.patch | 6 The BFS is not fuzz-clean. Don't allow it to be loaded under lockdown.
|