Searched full:fuzz (Results 1 – 14 of 14) sorted by relevance
/Zephyr-Core-3.5.0/arch/posix/ |
D | Kconfig | 26 bool "Build fuzz test target" 41 int "OS interrupt via which to deliver fuzz cases" 44 When using libfuzzer, new fuzz cases are delivered to Zephyr 49 int "Ticks to allow for fuzz case processing" 52 Fuzz interrupts are delivered, from the perspective of the
|
/Zephyr-Core-3.5.0/samples/subsys/debug/fuzz/ |
D | sample.yaml | 3 name: fuzz 5 sample.debug.fuzz:
|
D | README.rst | 7 This is a simple example of fuzz test integration with Zephyr apps 27 $ west build -t run -b native_posix_64 samples/subsys/debug/fuzz 52 …NEW_FUNC[1/6]: 0x55cbe3339c45 in check1 /home/andy/z/zephyr/samples/subsys/debug/fuzz/src/main.c:43 62 …NEW_FUNC[1/1]: 0x55cbe3339ff7 in check6 /home/andy/z/zephyr/samples/subsys/debug/fuzz/src/main.c:48 73 #0 0x55cbe333a09d in check6 /home/andy/z/zephyr/samples/subsys/debug/fuzz/src/main.c:48:1
|
D | CMakeLists.txt | 6 project(fuzz) project
|
/Zephyr-Core-3.5.0/samples/subsys/debug/fuzz/src/ |
D | main.c | 8 /* Fuzz testing is coverage-based, so we want to hide a failure case 51 /* Fuzz input received from LLVM via "interrupt" */ 59 /* We could call check0() to execute the fuzz case here, but in fuzz_isr() 76 /* Execute the fuzz case we got from LLVM and passed in main()
|
/Zephyr-Core-3.5.0/tests/net/socket/select/src/ |
D | main.c | 29 #define FUZZ 60 macro 100 * preempt the thread. That's why we add FUZZ to the expected in ZTEST_USER() 103 zassert_true(tstamp <= FUZZ, ""); in ZTEST_USER() 117 zassert_true(tstamp >= TIMEOUT_MS && tstamp <= TIMEOUT_MS + FUZZ, ""); in ZTEST_USER() 132 zassert_true(tstamp <= FUZZ, ""); in ZTEST_USER() 148 zassert_true(k_uptime_get_32() - tstamp <= FUZZ, ""); in ZTEST_USER() 162 zassert_true(k_uptime_get_32() - tstamp <= FUZZ, ""); in ZTEST_USER()
|
/Zephyr-Core-3.5.0/tests/net/socket/poll/src/ |
D | main.c | 30 #define FUZZ 10 macro 69 zassert_true(k_uptime_get_32() - tstamp <= FUZZ, ""); in ZTEST() 84 zassert_true(tstamp >= 30U && tstamp <= 30 + FUZZ * 2, "tstamp %d", in ZTEST() 96 zassert_true(tstamp <= FUZZ, ""); in ZTEST() 113 zassert_true(k_uptime_get_32() - tstamp <= FUZZ, ""); in ZTEST() 169 zassert_true(k_uptime_get_32() - tstamp <= FUZZ, ""); in ZTEST()
|
/Zephyr-Core-3.5.0/scripts/native_simulator/common/src/ |
D | main.c | 109 * Note that this main() is not used when building fuzz cases, 111 * and calls the "OS" through a per-case fuzz test entry point. 144 /* Provide the fuzz data to the embedded OS as an interrupt, with in LLVMFuzzerTestOneInput()
|
/Zephyr-Core-3.5.0/boards/posix/native_posix/ |
D | main.c | 107 * Not used when building fuzz cases, as libfuzzer has its own main() 108 * and calls the "OS" through a per-case fuzz test entry point. 142 /* Provide the fuzz data to Zephyr as an interrupt, with in LLVMFuzzerTestOneInput()
|
/Zephyr-Core-3.5.0/tests/kernel/fifo/fifo_api/src/ |
D | test_fifo_cancel.c | 44 /* 80 includes generous fuzz factor as k_sleep() will add an extra in tfifo_thread_thread()
|
/Zephyr-Core-3.5.0/kernel/ |
D | thread.c | 478 const size_t fuzz = random_val % CONFIG_STACK_POINTER_RANDOM; in random_offset() local 480 if (unlikely(fuzz * 2 > stack_size)) { in random_offset() 484 return fuzz; in random_offset()
|
/Zephyr-Core-3.5.0/doc/releases/ |
D | release-notes-2.3.rst | 729 …- [net][net.socket.select][imx-rt series] test fails (k_uptime_get_32() - tstamp <= FUZZ is false)
|
D | release-notes-2.4.rst | 1477 …- [net][net.socket.select][imx-rt series] test fails (k_uptime_get_32() - tstamp <= FUZZ is false)
|
D | release-notes-2.7.rst | 1530 * :github:`36896` - tests: net: select: still failing occasionally due to FUZZ
|