Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(282)

Side by Side Diff: testing/libfuzzer/fuzzers/BUILD.gn

Issue 1867833002: [libfuzzer] store custom options in .GN build target instead of a separate file. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Update reference.md of libFuzzer & CF documentation. Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright 2015 The Chromium Authors. All rights reserved. 1 # Copyright 2015 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 # Individual libfuzzer tests that didn't find their home yet. 5 # Individual libfuzzer tests that didn't find their home yet.
6 6
7 import("//build/config/features.gni") 7 import("//build/config/features.gni")
8 import("//media/media_options.gni") 8 import("//media/media_options.gni")
9 import("//testing/libfuzzer/fuzzer_test.gni") 9 import("//testing/libfuzzer/fuzzer_test.gni")
10 10
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after
51 51
52 if (proprietary_codecs) { 52 if (proprietary_codecs) {
53 fuzzer_test("mp4_box_reader_fuzzer") { 53 fuzzer_test("mp4_box_reader_fuzzer") {
54 sources = [ 54 sources = [
55 "mp4_box_reader_fuzzer.cc", 55 "mp4_box_reader_fuzzer.cc",
56 ] 56 ]
57 deps = [ 57 deps = [
58 "//base", 58 "//base",
59 "//media", 59 "//media",
60 ] 60 ]
61 libfuzzer_options = "mp4_box_reader_fuzzer.options" 61 libfuzzer_options = [ "max_len=500" ]
62 dict = "dicts/mp4.dict" 62 dict = "dicts/mp4.dict"
63 } 63 }
64 } 64 }
65 65
66 if (enable_mse_mpeg2ts_stream_parser) { 66 if (enable_mse_mpeg2ts_stream_parser) {
67 fuzzer_test("es_parser_adts_fuzzer") { 67 fuzzer_test("es_parser_adts_fuzzer") {
68 sources = [ 68 sources = [
69 "es_parser_adts_fuzzer.cc", 69 "es_parser_adts_fuzzer.cc",
70 ] 70 ]
71 deps = [ 71 deps = [
(...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after
212 } 212 }
213 213
214 fuzzer_test("icu_uregex_open_fuzzer") { 214 fuzzer_test("icu_uregex_open_fuzzer") {
215 sources = [ 215 sources = [
216 "icu_uregex_open_fuzzer.cc", 216 "icu_uregex_open_fuzzer.cc",
217 ] 217 ]
218 deps = [ 218 deps = [
219 "//third_party/icu", 219 "//third_party/icu",
220 ] 220 ]
221 dict = "dicts/icu_regex.dict" 221 dict = "dicts/icu_regex.dict"
222 libfuzzer_options = "icu_uregex_open_fuzzer.options" 222 libfuzzer_options = [ "max_len=128" ]
223 } 223 }
224 224
225 fuzzer_test("v8_script_parser_fuzzer") { 225 fuzzer_test("v8_script_parser_fuzzer") {
226 sources = [] 226 sources = []
227 deps = [ 227 deps = [
228 "//v8:parser_fuzzer", 228 "//v8:parser_fuzzer",
229 ] 229 ]
230 dict = "dicts/js.dict" 230 dict = "dicts/js.dict"
231 } 231 }
232 232
233 fuzzer_test("v8_json_parser_fuzzer") { 233 fuzzer_test("v8_json_parser_fuzzer") {
234 sources = [] 234 sources = []
235 deps = [ 235 deps = [
236 "//v8:json_fuzzer", 236 "//v8:json_fuzzer",
237 ] 237 ]
238 dict = "dicts/json.dict" 238 dict = "dicts/json.dict"
239 } 239 }
240 240
241 fuzzer_test("v8_regexp_parser_fuzzer") { 241 fuzzer_test("v8_regexp_parser_fuzzer") {
242 sources = [] 242 sources = []
243 deps = [ 243 deps = [
244 "//v8:regexp_fuzzer", 244 "//v8:regexp_fuzzer",
245 ] 245 ]
246 dict = "dicts/regexp.dict" 246 dict = "dicts/regexp.dict"
247 libfuzzer_options = "v8_regexp_parser_fuzzer.options" 247 libfuzzer_options = [ "max_len=1024" ]
248 } 248 }
249 249
250 fuzzer_test("v8_wasm_fuzzer") { 250 fuzzer_test("v8_wasm_fuzzer") {
251 sources = [] 251 sources = []
252 deps = [ 252 deps = [
253 "//v8:wasm_fuzzer", 253 "//v8:wasm_fuzzer",
254 ] 254 ]
255 dict = "dicts/v8_wasm.dict" 255 dict = "dicts/v8_wasm.dict"
256 libfuzzer_options = "v8_wasm_fuzzer.options" 256 libfuzzer_options = [ "max_len=500" ]
257 } 257 }
258 258
259 fuzzer_test("v8_wasm_asmjs_fuzzer") { 259 fuzzer_test("v8_wasm_asmjs_fuzzer") {
260 sources = [] 260 sources = []
261 deps = [ 261 deps = [
262 "//v8:wasm_asmjs_fuzzer", 262 "//v8:wasm_asmjs_fuzzer",
263 ] 263 ]
264 } 264 }
265 265
266 fuzzer_test("third_party_re2_fuzzer") { 266 fuzzer_test("third_party_re2_fuzzer") {
267 sources = [ 267 sources = [
268 "re2_fuzzer.cc", 268 "re2_fuzzer.cc",
269 ] 269 ]
270 deps = [ 270 deps = [
271 "//third_party/re2:re2", 271 "//third_party/re2:re2",
272 ] 272 ]
273 libfuzzer_options = "re2_fuzzer.options" 273 libfuzzer_options = [ "max_len=32" ]
274 } 274 }
275 275
276 fuzzer_test("libxml_xml_regexp_compile_fuzzer") { 276 fuzzer_test("libxml_xml_regexp_compile_fuzzer") {
277 sources = [ 277 sources = [
278 "libxml_xml_regexp_compile_fuzzer.cc", 278 "libxml_xml_regexp_compile_fuzzer.cc",
279 ] 279 ]
280 deps = [ 280 deps = [
281 "//third_party/libxml", 281 "//third_party/libxml",
282 ] 282 ]
283 libfuzzer_options = "libxml_xml_regexp_compile_fuzzer.options" 283 libfuzzer_options = [ "max_len=32" ]
284 additional_configs = [ "//testing/libfuzzer:no_clusterfuzz" ] 284 additional_configs = [ "//testing/libfuzzer:no_clusterfuzz" ]
285 } 285 }
OLDNEW
« no previous file with comments | « testing/libfuzzer/fuzzer_test.gni ('k') | testing/libfuzzer/fuzzers/icu_uregex_open_fuzzer.options » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698