Home
last modified time | relevance | path

Searched +full:oss +full:- +full:fuzz +full:- +full:project +full:- +full:name (Results 1 – 25 of 45) sorted by relevance

12

/third_party/skia/m133/fuzz/
DREADME.md8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable
9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also
13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the
14 `fuzz` executable.
17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing
18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-Fuzz will automatically
19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when
22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia)
23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that
25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally)
[all …]
/third_party/skia/fuzz/
DREADME.md8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable
9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also
13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the
14 `fuzz` executable.
17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing
18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-fuzz will automatically
19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when
22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia)
23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that
25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally)
[all …]
/third_party/pcre2/pcre2/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'pcre2'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'pcre2'
17 fuzz-seconds: 300
[all …]
/third_party/nghttp2/.github/workflows/
Dfuzz.yml1 name: CIFuzz
3 permissions: read-all
6 runs-on: ubuntu-latest
8 - name: LLVM workaround
10 # https://github.com/actions/runner-images/issues/9491#issuecomment-1989718917
12 # high-entropy ASLR in much newer kernels that GitHub runners are
15 - name: Build Fuzzers
16 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
18 oss-fuzz-project-name: 'nghttp2'
19 dry-run: false
[all …]
/third_party/python/Modules/_xxtestfuzz/
DREADME.rst1 Fuzz Tests for CPython
4 These fuzz tests are designed to be included in Google's `oss-fuzz`_ project.
6 oss-fuzz works against a library exposing a function of the form
9 some toy values -- no fuzzing occurs in Python's test suite.
11 oss-fuzz will regularly pull from CPython, discover all the tests in
12 ``fuzz_tests.txt``, and run them -- so adding a new test here means it will
13 automatically be run in oss-fuzz, while also being smoke-tested as part of
16 Adding a new fuzz test
17 ----------------------
19 Add the test name on a new line in ``fuzz_tests.txt``.
[all …]
/third_party/json/tests/
Dfuzzing.md1 # Fuzz testing
3 Each parser of the library (JSON, BJData, BSON, CBOR, MessagePack, and UBJSON) can be fuzz tested. …
19 rm -fr corpus_$FORMAT
21 …find json_test_data-$TEST_DATA_VERSION -size -5k -name "*.$FORMAT" -exec cp "{}" "corpus_$FORMAT" …
23 rm -fr json_test_data-$TEST_DATA_VERSION
31 To use libFuzzer, you need to pass `-fsanitize=fuzzer` as `FUZZER_ENGINE`. In the `tests` directory…
34 make fuzzers FUZZER_ENGINE="-fsanitize=fuzzer"
37 This creates a fuzz tester binary for each parser that supports these
42 Clang via Homebrew calling `brew install llvm` and add `CXX=$(brew --prefix llvm)/bin/clang` to the…
45 make fuzzers FUZZER_ENGINE="-fsanitize=fuzzer" CXX=$(brew --prefix llvm)/bin/clang
[all …]
/third_party/icu/docs/processes/
Dfuzzer_targets.md1 <!--
4 -->
9 This documents describes how to develop a [fuzzer](https://opensource.google.com/projects/oss-fuzz)
15 [`source/test/fuzzer/`](https://github.com/unicode-org/icu/tree/main/icu4c/source/test/fuzzer)
17 targets by the OSS-Fuzz system.
31 fuzzer-controlled data of size `size` bytes. Part or all of this data is then passed into the
35 [`collator_rulebased_fuzzer.cpp`](https://github.com/unicode-org/icu/blob/main/icu4c/source/test/fu…
74 ICU fuzzer targets are built and executed by the OSS-Fuzz project. On side of ICU they are compiled
79 [`Makefile.in`](https://github.com/unicode-org/icu/blob/main/icu4c/source/test/fuzzer/Makefile.in).
86 Any fuzzer seed data for a fuzzer target goes into a file with name `<fuzzer_target>_seed_corpus.tx…
[all …]
/third_party/skia/m133/site/docs/dev/gardening/
Dgpu.md2 ---
6 ---
18 <a name="what_is_a_gpu_gardener"></a>
20 ----------------------------
24-related bugs from clients in various bug trackers. This means triaging and assigning bugs that ha…
37 <a name="tracking"></a>
39 --------------------------
45 <a name="view_current_upcoming_rotations"></a>
47 -----------------------------------
53 <a name="how_to_swap"></a>
[all …]
/third_party/skia/m133/third_party/externals/harfbuzz/
DREADME.md1 …thub.com/harfbuzz/harfbuzz/workflows/linux-ci/badge.svg)](https://github.com/harfbuzz/harfbuzz/wor…
3 [![OSS-Fuzz Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/harfbuzz.svg)](https:…
5 [![Codacy Badge](https://app.codacy.com/project/badge/Grade/89c872f5ce1c42af802602bfcd15d90a)](http…
7 …![Packaging status](https://repology.org/badge/tiny-repos/harfbuzz.svg)](https://repology.org/proj…
19 [![xkcd-derived image](xkcd.png)](https://xkcd.com/2347/)
35 `hb-view.exe`, `hb-shape.exe`, and all dependencies.
67 pull-requests.
71 <!--See past and upcoming [HarfBuzz Hackfests](https://freedesktop.org/wiki/Software/HarfBuzz/Hackf…
73 ## Name section in HarfBuzz
77 "glib" (also a nod to the GNOME project where HarfBuzz originates from).
[all …]
/third_party/nghttp2/
DOAT.xml1 <?xml version="1.0" encoding="UTF-8"?>
2 <!-- Copyright (c) 2021 Huawei Device Co., Ltd.
8 http://www.apache.org/licenses/LICENSE-2.0
16 …s is the configuration file template for OpenHarmony OSS Audit Tool, please copy it to your projec…
17 …All configurations in this file will be merged to OAT-Default.xml, if you have any questions or co…
20 …1.If the project don't have "LICENSE" in root dir, please define all the license files in this pro…
23 …1. policy: If the OAT-Default.xml policies do not meet your requirements, please add policies here.
24 …2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilt…
25 …<policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPol…
32 … file exists in the specified path(projectroot means the root dir of the project), supported file …
[all …]
/third_party/skia/third_party/externals/freetype/docs/oldlogs/
DChangeLog.281 2017-09-16 Werner Lemberg <wl@gnu.org>
7 Tag sources with `VER-2-8-1'.
24 builds/wince/vc2005-ce/freetype.vcproj,
25 builds/wince/vc2005-ce/index.html,
26 builds/wince/vc2008-ce/freetype.vcproj,
27 builds/wince/vc2008-ce/index.html: s/2.8/2.8.1/, s/28/281/.
34 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp>
38 __builtin_shuffle() was introduced in gcc-4.7. The lowest
41 * src/sfnt/pngshim.c (premultiply_data): Fix cpp-macro to
45 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp>
[all …]
DChangeLog.2101 2021-07-18 Werner Lemberg <wl@gnu.org>
7 Tag sources with `VER-2-11-0'.
15 builds/wince/vc2005-ce/index.html,
16 builds/wince/vc2008-ce/index.html, docs/freetype-config.1:
26 * builds/toplevel.mk (dist): Ignore more git-related files.
28 2021-07-17 David Turner <david@freetype.org>
32 The code assumed that if `__SSE2__` is defined, then 64-bit integer
37 64-bit integer types are not available.
41 2021-07-16 Alex Richardson <Alexander.Richardson@cl.cam.ac.uk>
45 * tests/issue-1063/main.c (main): I am building with a build
[all …]
DChangeLog.291 2018-05-01 Werner Lemberg <wl@gnu.org>
7 Tag sources with `VER-2-9-1'.
24 builds/wince/vc2005-ce/freetype.vcproj,
25 builds/wince/vc2005-ce/index.html,
26 builds/wince/vc2008-ce/freetype.vcproj,
27 builds/wince/vc2008-ce/index.html: s/2.9/2.9.1/, s/29/291/.
36 2018-04-26 Werner Lemberg <wl@gnu.org>
44 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=8003
49 2018-04-24 Ben Wagner <bungeman@google.com>
56 2018-04-22 Werner Lemberg <wl@gnu.org>
[all …]
DChangeLog.271 2016-12-30 Werner Lemberg <wl@gnu.org>
7 Tag sources with `VER-2-7-1'.
23 builds/wince/vc2005-ce/freetype.vcproj,
24 builds/wince/vc2005-ce/index.html,
25 builds/wince/vc2008-ce/freetype.vcproj,
26 builds/wince/vc2008-ce/index.html: s/2.7/2.7.1/, s/27/271/.
33 2016-12-30 Werner Lemberg <wl@gnu.org>
40 2016-12-30 Werner Lemberg <wl@gnu.org>
50 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=353
58 2016-12-29 Werner Lemberg <wl@gnu.org>
[all …]
/third_party/cares/
DREADME.md1 # [![c-ares logo](https://c-ares.org/art/c-ares-logo.svg)](https://c-ares.org/)
3 …![Build Status](https://api.cirrus-ci.com/github/c-ares/c-ares.svg?branch=main)](https://cirrus-ci…
4 …tus/aevgc5914tm72pvs/branch/main?svg=true)](https://ci.appveyor.com/project/c-ares/c-ares/branch/m…
5 …us](https://coveralls.io/repos/github/c-ares/c-ares/badge.svg?branch=main)](https://coveralls.io/g…
7 …tps://oss-fuzz-build-logs.storage.googleapis.com/badges/c-ares.svg)](https://bugs.chromium.org/p/o…
8 …ud.io/api/project_badges/measure?project=c-ares_c-ares&metric=bugs)](https://sonarcloud.io/summary…
9 …Scan Status](https://scan.coverity.com/projects/c-ares/badge.svg)](https://scan.coverity.com/proje…
11 - [Overview](#overview)
12 - [Code](#code)
13 - [Communication](#communication)
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/FuzzMutate/
DFuzzerCLI.h1 //===-- FuzzerCLI.h - Common logic for CLIs of fuzzers ----------*- C++ -*-===//
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 // Common logic needed to implement LLVM's fuzz targets' CLIs - including LLVM
10 // concepts like cl::opt and libFuzzer concepts like -ignore_remaining_args=1.
12 //===----------------------------------------------------------------------===//
23 /// Parse cl::opts from a fuzz target commandline.
25 /// This handles all arguments after -ignore_remaining_args=1 as cl::opts.
28 /// Handle backend options that are encoded in the executable name.
[all …]
/third_party/libbpf/
DOAT.xml1 <?xml version="1.0" encoding="UTF-8"?>
2 <!-- Copyright (c) 2021 Huawei Device Co., Ltd.
8 http://www.apache.org/licenses/LICENSE-2.0
16 …s is the configuration file template for OpenHarmony OSS Audit Tool, please copy it to your projec…
17 …All configurations in this file will be merged to OAT-Default.xml, if you have any questions or co…
20 …1.If the project don't have "LICENSE" in root dir, please define all the license files in this pro…
23 …1. policy: If the OAT-Default.xml policies do not meet your requirements, please add policies here.
24 …2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilt…
25 …<policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPol…
32 … file exists in the specified path(projectroot means the root dir of the project), supported file …
[all …]
DREADME.md2 …<source media="(prefers-color-scheme: dark)" srcset="assets/libbpf-logo-sideways-darkbg.png" width…
3 <img src="assets/libbpf-logo-sideways.png" width="40%">
10 [![OSS-Fuzz Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/libbpf.svg)](https://
19 Libbpf *authoritative source code* is developed as part of [bpf-next Linux source
20 tree](https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next) under
22 libbpf changes should be sent to [BPF mailing list](http://vger.kernel.org/vger-lists.html#bpf),
23 please don't open PRs here unless you are changing Github-specific parts of libbpf
24 (e.g., Github-specific Makefile).
32 Please check out [libbpf-bootstrap](https://github.com/libbpf/libbpf-bootstrap)
33 and [the companion blog post](https://nakryiko.com/posts/libbpf-bootstrap/) for
[all …]
/third_party/skia/m133/third_party/externals/libwebp/
DNEWS1 - 4/12/2024: version 1.4.0
4 - libwebpmux: WebPAnimEncoderSetChunk, WebPAnimEncoderGetChunk,
6 - libsharpyuv: SharpYuvOptionsInit, SharpYuvConvertWithOptions
7 - extras: SharpYuvEstimate420Risk
11 -DWEBP_ENABLE_NODISCARD=1
12 * improvements and corrections in webp-container-spec.txt and
13 webp-lossless-bitstream-spec.txt (#611)
16 - 9/13/2023: version 1.3.2
18 * security fix for lossless decoder (chromium: #1479274, CVE-2023-4863)
20 - 6/23/2023: version 1.3.1
[all …]
/third_party/skia/m133/third_party/externals/expat/expat/
DChanges14 !! - <blink>fixing a complex non-public security issue</blink>, !!
15 !! - teaming up on researching and fixing future security reports and !!
16 !! ClusterFuzz findings with few-days-max response times in communication !!
19 !! - implementing and auto-testing XML 1.0r5 support !!
21 !! - smart ideas on fixing the Autotools CMake files generation issue !!
23 !! - the Windows binaries topic (needs requirements engineering first), !!
24 !! - pushing migration from `int` to `size_t` further !!
25 !! including edge-cases test coverage (needs discussion before anything). !!
27 !! For details, please reach out via e-mail to sebastian@pipping.org so we !!
30 !! THANK YOU! Sebastian Pipping -- Berlin, 2024-03-09 !!
[all …]
/third_party/skia/third_party/externals/expat/expat/
DChanges7 #616 #649 #650 CVE-2022-43680 -- Fix heap use-after-free after overeager
9 XML_ExternalEntityParserCreate in out-of-memory situations
13 #629 #640 CVE-2022-40674 -- Heap use-after-free vulnerability in
17 #531 #534 CVE-2021-45960 -- Fix issues with left shifts by >=29 places
27 (which needs argument "-n" when running xmlwf).
32 GCC Farm Project
47 #551 CVE-2022-23990 -- Fix unsigned integer overflow in function
52 #34 #466 #484 CVE-2013-0340/CWE-776 -- Protect against billion laughs attacks
53 (denial-of-service; flavors targeting CPU time or RAM or both,
61 - A new error code XML_ERROR_AMPLIFICATION_LIMIT_BREACH to
[all …]
/third_party/curl/docs/
DHISTORY.md1 <!--
4 SPDX-License-Identifier: curl
5 -->
12 currency-exchange calculations available to Internet Relay Chat (IRC)
17 ----
22 Daniel extended this existing command-line open-source tool. After a few minor
25 new maintainer of the project.
28 ----
36 download support was added, the name of the project was changed and urlget 2.0
37 was released in August 1997. The http-only days were already passed.
[all …]
/third_party/json/
DREADME.md3 …ts/status/1acb366xfyg3qybk/branch/develop?svg=true)](https://ci.appveyor.com/project/nlohmann/json)
8 …tps://scan.coverity.com/projects/5550/badge.svg)](https://scan.coverity.com/projects/nlohmann-json)
9 [![Codacy Badge](https://app.codacy.com/project/badge/Grade/e0d1a9d5d6fd46fcb655c4cb930bb3e8)](http…
10 [![Cirrus CI](https://api.cirrus-ci.com/github/nlohmann/json.svg)](https://cirrus-ci.com/github/nlo…
11 …g Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/json.svg)](https://bugs.chromi…
12 [![Try online](https://img.shields.io/badge/try-online-blue.svg)](https://wandbox.org/permlink/1mp1…
13 [![Documentation](https://img.shields.io/badge/docs-mkdocs-blue.svg)](https://json.nlohmann.me)
14 [![GitHub license](https://img.shields.io/badge/license-MIT-blue.svg)](https://raw.githubuserconten…
16 [![Vcpkg Version](https://img.shields.io/vcpkg/v/nlohmann-json)](https://vcpkg.link/ports/nlohmann-
17 …ging status](https://repology.org/badge/tiny-repos/nlohmann-json.svg)](https://repology.org/projec…
[all …]
/third_party/skia/third_party/externals/tint/
DCMakeLists.txt7 # http://www.apache.org/licenses/LICENSE-2.0
17 project(tint)
29 # TINT_IS_SUBPROJECT is 1 if added via add_subdirectory() from another project.
44 # option_if_not_defined(name description default)
46 # option(name description default)
47 # If a variable is not already defined with the given name, otherwise the
50 function (option_if_not_defined name description default)
51 if(NOT DEFINED ${name})
52 option(${name} ${description} ${default})
56 # set_if_not_defined(name value description)
[all …]
/third_party/spirv-tools/
DCMakeLists.txt1 # Copyright (c) 2015-2023 The Khronos Group Inc.
7 # http://www.apache.org/licenses/LICENSE-2.0
17 project(spirv-tools)
19 # Avoid a bug in CMake 3.22.1. By default it will set -std=c++11 for
20 # targets in test/*, when those tests need -std=c++17.
21 # https://github.com/KhronosGroup/SPIRV-Tools/issues/5340
32 set(SPIRV_TOOLS "SPIRV-Tools")
43 …message(FATAL_ERROR "SPIRV-Tools requires C++17 or later, but is configured for C++${CMAKE_CXX_STA…
52 add_definitions(-DSPIRV_LINUX)
55 add_definitions(-DSPIRV_EMSCRIPTEN)
[all …]

12