aboutsummaryrefslogtreecommitdiffhomepage
path: root/fuzz/coverage
diff options
context:
space:
mode:
authorGravatar Kevin Lubick <kjlubick@google.com>2017-03-15 10:30:33 -0400
committerGravatar Skia Commit-Bot <skia-commit-bot@chromium.org>2017-03-15 14:32:59 +0000
commit8f0161aaa69b63209b9afc112d6ad33327416dc8 (patch)
tree38415de2c173f9e944f571aea1c35a8d64120ae2 /fuzz/coverage
parent462c4bd6ebd79100f4cf2242859ba3385979f51b (diff)
Update coverage script to cover new Canvas Fuzzers
BUG=skia: NOTRY=true Change-Id: I8efd0da6c7f21ee2309be3c257f85950356a64bf Reviewed-on: https://skia-review.googlesource.com/9696 Reviewed-by: Kevin Lubick <kjlubick@google.com> Commit-Queue: Kevin Lubick <kjlubick@google.com>
Diffstat (limited to 'fuzz/coverage')
-rwxr-xr-xfuzz/coverage12
1 files changed, 6 insertions, 6 deletions
diff --git a/fuzz/coverage b/fuzz/coverage
index e9ac001b62..87ba5bea37 100755
--- a/fuzz/coverage
+++ b/fuzz/coverage
@@ -13,7 +13,7 @@ if [ -z "$1" ]; then
$0 ~/afl-out
where afl-out is the directory containing all the output of the afl-fuzzers.
You can typically ssh into skia-fuzzer-be-1 and skia-fuzzer-be-2 and run
- tar -czf afl-out.tar.gz /mnt/ssd0/fuzzes/afl-out/*
+ tar -czf afl-out.tar.gz /mnt/ssd0/fuzzes/afl-out/*/fuzzer0/queue
and extract it locally to get the directories needed to assess coverage.
EOM
@@ -44,15 +44,15 @@ ninja -C "$BUILD" "$EXECUTABLE"
GCOV="$(realpath tools/gcov_shim)"
-# # Generate a zero-baseline so files not covered by $EXECUTABLE $@ will
-# # still show up in the report. This reads the .gcno files that are
-# # created at compile time.
+# Generate a zero-baseline so files not covered by $EXECUTABLE $@ will
+# still show up in the report. This reads the .gcno files that are
+# created at compile time.
lcov -q --gcov-tool="$GCOV" -c -b "$BUILD" -d "$BUILD" -o "$DIR"/baseline -i
# Running the binary generates the real coverage information, the .gcda files.
-QUEUES=("$1/api_parse_path/fuzzer0/queue/*" "$1/color_deserialize/fuzzer0/queue/*" "$1/color_icc/fuzzer0/queue/*" "$1/skcodec_scale/fuzzer0/queue/*" "$1/skcodec_mode/fuzzer0/queue/*" "$1/api_draw_functions/fuzzer0/queue/*" "$1/api_gradient/fuzzer0/queue/*" "$1/api_image_filter/fuzzer0/queue/*" "$1/api_pathop/fuzzer0/queue/*" "$1/sksl2glsl/fuzzer0/queue/*")
+QUEUES=("$1/api_parse_path/fuzzer0/queue/*" "$1/color_deserialize/fuzzer0/queue/*" "$1/color_icc/fuzzer0/queue/*" "$1/skcodec_scale/fuzzer0/queue/*" "$1/skcodec_mode/fuzzer0/queue/*" "$1/api_draw_functions/fuzzer0/queue/*" "$1/api_gradient/fuzzer0/queue/*" "$1/api_image_filter/fuzzer0/queue/*" "$1/api_pathop/fuzzer0/queue/*" "$1/sksl2glsl/fuzzer0/queue/*" "$1/null_canvas/fuzzer0/queue/*" "$1/pdf_canvas/fuzzer0/queue/*" "$1/n32_canvas/fuzzer0/queue/*")
-ARGS=("-n ParsePath" "-t color_deserialize" "-t icc" "-t image_scale" "-t image_mode" "-n DrawFunctions" "-n Gradients" "-n SerializedImageFilter" "-n Pathop" "-t sksl2glsl")
+ARGS=("-n ParsePath" "-t color_deserialize" "-t icc" "-t image_scale" "-t image_mode" "-n DrawFunctions" "-n Gradients" "-n SerializedImageFilter" "-n Pathop" "-t sksl2glsl" "-n NullCanvas" "-n PDFCanvas" "-n RasterN32Canvas")
# We can't simply pass the directories to the fuzzers because some of the fuzzes will
# crash or assert, which would kill the call to fuzz prematurely. Instead we run them