Home
last modified time | relevance | path

Searched refs:fuzz (Results 1 – 25 of 47) sorted by relevance

12

/openbmc/libpldm/docs/
H A Dfuzzing.md5 `tests/fuzz/fd-fuzz.cpp` exercises the FD responder implementation. It can run
8 Each fuzz corpus input is split into two parts. The first 1024 bytes is a
13 The remainder of the fuzz input is taken as an stream of `length:data` PLDM
18 From the top level libpldm directory, run `./tests/fuzz/fuzz-build.py`. That
19 will produce several build variants required for different fuzz engines/stages.
30 …e honggfuzz -i corpusdir --linux_perf_branch --dict tests/fuzz/fd.dict -- ./bhf/tests/fuzz/fd-fuzz
44 totally fresh start, copy in `tests/fuzz/fd-fuzz-input1.dat`, a sample
52 afl-fuzz -i fuzzrun/hf11/ -o fuzzrun/out12single ./bfuzz/tests/fuzz/fd-fuzz
61fuzz/fd-fuzz -i workdir/out5/m_fd-fuzz/queue -o workdir/out6 -c bcmplog/tests/fuzz/fd-fuzz -s bfuz…
64 Kill it with `aflr kill fuzz`.
[all …]
/openbmc/libmctp/docs/
H A Dfuzzing.md5 From the top level libmctp directory, run `./tests/fuzz/fuzz-build.py`. That
6 will produce several build variants required for different fuzz engines/stages.
17 nice honggfuzz -T -i corpusdir --linux_perf_branch -- ./bhf/tests/fuzz/i2c-fuzz
37 afl-fuzz -i fuzzrun/hf11/ -o fuzzrun/out12single ./bfuzz/tests/fuzz/i2c-fuzz
46fuzz/i2c-fuzz -i workdir/out5/m_i2c-fuzz/queue -o workdir/out6 -c bcmplog/tests/fuzz/i2c-fuzz -s b…
49 Kill it with `aflr kill fuzz`.
58 `tests/fuzz/fuzz-coverage.py`.
70 ./tests/fuzz/fuzz-coverage.py fuzzrun/corpus bnoopt/tests/fuzz/i2c-fuzz . bnoopt/ coverage-output
75 When the fuzz run encounters a crash, the testcase can be run against the built
79 ./bnoopt/tests/fuzz/i2c-fuzz < crashing.bin
/openbmc/qemu/scripts/oss-fuzz/
H A Dbuild.sh70 if ! make "-j$(nproc)" qemu-fuzz-i386; then
77 for i in $(ldd ./qemu-fuzz-i386 | cut -f3 -d' '); do
80 rm qemu-fuzz-i386
87 make "-j$(nproc)" qemu-fuzz-i386 V=1
92 rm -rf $DEST_DIR/qemu-bundle/opt/qemu-oss-fuzz/bin
93 rm -rf $DEST_DIR/qemu-bundle/opt/qemu-oss-fuzz/libexec
96 targets=$(./qemu-fuzz-i386 | grep generic-fuzz | awk '$1 ~ /\*/ {print $2}')
H A Dinstrumentation-filter-template12 src:*/tests/qtest/fuzz/fuzz.c
/openbmc/qemu/docs/devel/testing/
H A Dfuzzing.rst15 To fuzz QEMU, we rely on libfuzzer. Unlike other fuzzers such as AFL, libfuzzer
33 make qemu-fuzz-i386
35 This builds ``./qemu-fuzz-i386``
37 The first option to this command is: ``--fuzz-target=FUZZ_NAME``
38 To list all of the available fuzzers run ``qemu-fuzz-i386`` with no arguments.
42 ./qemu-fuzz-i386 --fuzz-target=virtio-scsi-fuzz
110 llvm-cov show ./path/to/qemu-fuzz-i386 -instr-profile=default.profdata \
117 Fuzzers are kept in ``tests/qtest/fuzz/`` and should be added to
118 ``tests/qtest/fuzz/meson.build``
122 1. Create a new source file. For example ``tests/qtest/fuzz/foo-device-fuzz.c``.
[all …]
/openbmc/openbmc/poky/meta/recipes-connectivity/avahi/files/
H A DCVE-2023-38470-2.patch10 …#0 0x47208c in __interceptor_strlen (out/fuzz-domain+0x47208c) (BuildId: 731b20c1eef22c2104e75a649…
16 fuzz-domain: fuzz/fuzz-domain.c:38: int LLVMFuzzerTestOneInput(const uint8_t *, size_t): Assertion …
18 …#0 0x501175 in __sanitizer_print_stack_trace (/home/vagrant/avahi/out/fuzz-domain+0x501175) (Build…
19 …#1 0x45ad2c in fuzzer::PrintStackTrace() (/home/vagrant/avahi/out/fuzz-domain+0x45ad2c) (BuildId: …
20 …#2 0x43fc07 in fuzzer::Fuzzer::CrashCallback() (/home/vagrant/avahi/out/fuzz-domain+0x43fc07) (Bui…
27 #9 0x5344a4 in LLVMFuzzerTestOneInput /home/vagrant/avahi/fuzz/fuzz-domain.c:38:9
/openbmc/qemu/tests/docker/
H A Dtest-fuzz20 mkdir build-oss-fuzz
21 export LSAN_OPTIONS=suppressions=scripts/oss-fuzz/lsan_suppressions.txt
22 env CC="clang" CXX="clang++" CFLAGS="-fsanitize=address" ./scripts/oss-fuzz/build.sh
24 for fuzzer in $(find ./build-oss-fuzz/DEST_DIR/ -executable -type f | grep -v slirp); do
/openbmc/libpldm/tests/fuzz/
H A Dmeson.build2 'fd-fuzz',
3 'fd-fuzz.cpp',
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/uutils-coreutils/uutils-coreutils/
H A D0002-Bump-onig-from-6.4.0-to-6.5.1.patch11 fuzz/Cargo.lock | 22 ++++++++--------------
58 diff --git a/fuzz/Cargo.lock b/fuzz/Cargo.lock
60 --- a/fuzz/Cargo.lock
61 +++ b/fuzz/Cargo.lock
/openbmc/libmctp/tests/fuzz/
H A Dmeson.build3 'i2c-fuzz',
4 'i2c-fuzz.c',
/openbmc/libcper/
H A Dmeson.options2 'fuzz',
5 description: 'Build fuzz targets',
/openbmc/qemu/tests/qtest/fuzz/
H A Di440fx_fuzz.c164 .fuzz = i440fx_fuzz_qtest}); in register_pci_fuzz_targets()
176 .fuzz = i440fx_fuzz_qos,}, in register_pci_fuzz_targets()
H A Dfuzz.h77 void(*fuzz)(QTestState *, const unsigned char *, size_t); member
H A Dmeson.build5 specific_fuzz_ss.add(files('fuzz.c', 'qos_fuzz.c',
/openbmc/libmctp/tests/
H A Dmeson.build27 subdir('fuzz') subdir
/openbmc/qemu/tests/image-fuzzer/qcow2/
H A Dlayout.py21 from . import fuzz
468 def fuzz(self, fields_to_fuzz=None): member in Image
489 field.value = getattr(fuzz, field.name)(field.value)
495 field.value = getattr(fuzz,
501 field.value = getattr(fuzz, field.name)(field.value)
610 image.fuzz(fields_to_fuzz)
/openbmc/qemu/include/standard-headers/linux/
H A Dvirtio_input.h45 uint32_t fuzz; member
/openbmc/u-boot/arch/arm/dts/
H A Dam3517-som.dtsi138 touchscreen-fuzz-x = <4>;
139 touchscreen-fuzz-y = <7>;
140 touchscreen-fuzz-pressure = <2>;
H A Dlogicpd-som-lv.dtsi119 touchscreen-fuzz-x = <4>;
120 touchscreen-fuzz-y = <7>;
121 touchscreen-fuzz-pressure = <2>;
H A Dlogicpd-torpedo-baseboard.dtsi338 touchscreen-fuzz-x = <4>;
339 touchscreen-fuzz-y = <7>;
340 touchscreen-fuzz-pressure = <2>;
/openbmc/libcper/tests/
H A Dmeson.build29 if (cc.get_id() == 'clang') and get_option('fuzz').allowed() and not is_darwin
/openbmc/qemu/tests/qtest/
H A Dmeson.build88 (config_all_devices.has_key('CONFIG_E1000E_PCI_EXPRESS') ? ['fuzz-e1000e-test'] : []) + \
89 (config_all_devices.has_key('CONFIG_MEGASAS_SCSI_PCI') ? ['fuzz-megasas-test'] : []) + \
90 (config_all_devices.has_key('CONFIG_LSI_SCSI_PCI') ? ['fuzz-lsi53c895a-test'] : []) + \
91 (config_all_devices.has_key('CONFIG_VIRTIO_SCSI') ? ['fuzz-virtio-scsi-test'] : []) + \
94 (config_all_devices.has_key('CONFIG_SB16') ? ['fuzz-sb16-test'] : []) + \
95 (config_all_devices.has_key('CONFIG_SDHCI_PCI') ? ['fuzz-sdcard-test'] : []) + \
259 …(config_all_devices.has_key('CONFIG_XLNX_ZYNQMP_ARM') ? ['xlnx-can-test', 'fuzz-xlnx-dp-test'] : […
/openbmc/libpldm/tests/
H A Dmeson.build36 subdir('fuzz') subdir
/openbmc/qemu/hw/input/
H A Dvirtio-input-host.c91 config.u.abs.fuzz = cpu_to_le32(absinfo.fuzz); in virtio_input_abs_config()
/openbmc/openbmc/poky/meta/recipes-bsp/grub/files/
H A DCVE-2024-45778_CVE-2024-45779.patch6 The BFS is not fuzz-clean. Don't allow it to be loaded under lockdown.

12