From 8f0161aaa69b63209b9afc112d6ad33327416dc8 Mon Sep 17 00:00:00 2001 From: Kevin Lubick Date: Wed, 15 Mar 2017 10:30:33 -0400 Subject: Update coverage script to cover new Canvas Fuzzers BUG=skia: NOTRY=true Change-Id: I8efd0da6c7f21ee2309be3c257f85950356a64bf Reviewed-on: https://skia-review.googlesource.com/9696 Reviewed-by: Kevin Lubick Commit-Queue: Kevin Lubick --- fuzz/coverage | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'fuzz/coverage') diff --git a/fuzz/coverage b/fuzz/coverage index e9ac001b62..87ba5bea37 100755 --- a/fuzz/coverage +++ b/fuzz/coverage @@ -13,7 +13,7 @@ if [ -z "$1" ]; then $0 ~/afl-out where afl-out is the directory containing all the output of the afl-fuzzers. You can typically ssh into skia-fuzzer-be-1 and skia-fuzzer-be-2 and run - tar -czf afl-out.tar.gz /mnt/ssd0/fuzzes/afl-out/* + tar -czf afl-out.tar.gz /mnt/ssd0/fuzzes/afl-out/*/fuzzer0/queue and extract it locally to get the directories needed to assess coverage. EOM @@ -44,15 +44,15 @@ ninja -C "$BUILD" "$EXECUTABLE" GCOV="$(realpath tools/gcov_shim)" -# # Generate a zero-baseline so files not covered by $EXECUTABLE $@ will -# # still show up in the report. This reads the .gcno files that are -# # created at compile time. +# Generate a zero-baseline so files not covered by $EXECUTABLE $@ will +# still show up in the report. This reads the .gcno files that are +# created at compile time. lcov -q --gcov-tool="$GCOV" -c -b "$BUILD" -d "$BUILD" -o "$DIR"/baseline -i # Running the binary generates the real coverage information, the .gcda files. -QUEUES=("$1/api_parse_path/fuzzer0/queue/*" "$1/color_deserialize/fuzzer0/queue/*" "$1/color_icc/fuzzer0/queue/*" "$1/skcodec_scale/fuzzer0/queue/*" "$1/skcodec_mode/fuzzer0/queue/*" "$1/api_draw_functions/fuzzer0/queue/*" "$1/api_gradient/fuzzer0/queue/*" "$1/api_image_filter/fuzzer0/queue/*" "$1/api_pathop/fuzzer0/queue/*" "$1/sksl2glsl/fuzzer0/queue/*") +QUEUES=("$1/api_parse_path/fuzzer0/queue/*" "$1/color_deserialize/fuzzer0/queue/*" "$1/color_icc/fuzzer0/queue/*" "$1/skcodec_scale/fuzzer0/queue/*" "$1/skcodec_mode/fuzzer0/queue/*" "$1/api_draw_functions/fuzzer0/queue/*" "$1/api_gradient/fuzzer0/queue/*" "$1/api_image_filter/fuzzer0/queue/*" "$1/api_pathop/fuzzer0/queue/*" "$1/sksl2glsl/fuzzer0/queue/*" "$1/null_canvas/fuzzer0/queue/*" "$1/pdf_canvas/fuzzer0/queue/*" "$1/n32_canvas/fuzzer0/queue/*") -ARGS=("-n ParsePath" "-t color_deserialize" "-t icc" "-t image_scale" "-t image_mode" "-n DrawFunctions" "-n Gradients" "-n SerializedImageFilter" "-n Pathop" "-t sksl2glsl") +ARGS=("-n ParsePath" "-t color_deserialize" "-t icc" "-t image_scale" "-t image_mode" "-n DrawFunctions" "-n Gradients" "-n SerializedImageFilter" "-n Pathop" "-t sksl2glsl" "-n NullCanvas" "-n PDFCanvas" "-n RasterN32Canvas") # We can't simply pass the directories to the fuzzers because some of the fuzzes will # crash or assert, which would kill the call to fuzz prematurely. Instead we run them -- cgit v1.2.3