Home
last modified time | relevance | path

Searched refs:OSS (Results 1 – 25 of 149) sorted by relevance

123456

/external/oss-fuzz/
DREADME.md1 # OSS-Fuzz: Continuous Fuzzing for Open Source Software
16 OSS-Fuzz aims to make common open source software more secure and stable by
32 Currently, OSS-Fuzz supports C/C++, Rust, Go, Python and Java/JVM code. Other languages
33 supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 and i386
39 ![OSS-Fuzz process diagram](docs/images/process.png)
42 Read our [detailed documentation] to learn how to use OSS-Fuzz.
47 As of January 2021, OSS-Fuzz has found over [25,000] bugs in [375] open source
54 * 2016-12-01 - [Announcing OSS-Fuzz: Continuous fuzzing for open source software]
55 * 2017-05-08 - [OSS-Fuzz: Five months later, and rewarding projects]
56 * 2018-11-06 - [A New Chapter for OSS-Fuzz]
[all …]
DMETADATA1 name: "OSS-Fuzz"
2 description: "OSS-Fuzz: Continuous Fuzzing for Open Source Software"
/external/oss-fuzz/docs/oss-fuzz/
Darchitecture.md6 parent: OSS-Fuzz
10 ![OSS-Fuzz architecture diagram]({{ site.baseurl }}/images/process.png?raw=true)
18 1. The project is [accepted to OSS-Fuzz]({{ site.baseurl }}/getting-started/accepting-new-projects/…
19 1. The OSS-Fuzz [builder](jenkins.io) builds the project from the committed configs.
20 1. The builder uploads the fuzz targets to the OSS-Fuzz GCS bucket.
23 bug, it reports the issue automatically to the OSS-Fuzz
28 1. The project developer fixes the bug upstream and credits OSS-Fuzz for the
29 discovery (the commit message should contain the string **'Credit to OSS-Fuzz'**).
/external/oss-fuzz/docs/getting-started/new-project-guide/
Dbazel.md20 build system with OSS-Fuzz is very similar to the general
35 test artifacts in the OSS-Fuzz format. Each `//path/to:fuzz_test` fuzz test
38 in the OSS-Fuzz environment variables, and (b) generates an archive containing
40 OSS-Fuzz provides a standard tool to automatically process these targets,
48 `rules_fuzzing` library with OSS-Fuzz. You can also see a complete example in the
52 The structure of the project directory in the OSS-Fuzz repository does not
60 Since the OSS-Fuzz target builds the fuzz test using the instrumentation and
61 engine specified in the OSS-Fuzz environment variables, all the engine and
67 There is no need to install Bazel in your Docker image. The OSS-Fuzz builder
78 which fuzz tests to build, (2) building their OSS-Fuzz package targets in the
[all …]
Drust_lang.md17 The process of integrating a project written in Rust with OSS-Fuzz is very
24 Rust integration with OSS-Fuzz is expected to use [`cargo
27 correct libFuzzer on OSS-Fuzz itself. Note that using `cargo fuzz` also makes it
38 compiled and run on OSS-Fuzz.
41 the scripts below to integrate into OSS-Fuzz.
64 The OSS-Fuzz builder image has the latest nightly release of Rust as well as
93 automatically integrated into OSS-Fuzz:
Dpython_lang.md18 The process of integrating a project written in Python with OSS-Fuzz is very
25 Python fuzzing in OSS-Fuzz depends on
27 `atheris` package, and dependencies are pre-installed on the OSS-Fuzz base
82 # over time on the OSS-Fuzz bots, we use pyinstaller to create a standalone
84 # required to keep fuzzers working properly in OSS-Fuzz.
89 # test case reproduction. Since this helper script is what OSS-Fuzz will
127 To use Hypothesis in OSS-Fuzz, install it in your Dockerfile with
135 or run with OSS-Fuzz as a fuzz harness.
Dgo_lang.md17 The process of integrating a project written in Go with OSS-Fuzz is very similar
24 OSS-Fuzz supports **go-fuzz** in the
37 The structure of the project directory in OSS-Fuzz repository doesn't differ for
62 The OSS-Fuzz builder image has the latest stable release of Golang installed. In
/external/oss-fuzz/docs/
Dindex.md3 title: OSS-Fuzz
10 # OSS-Fuzz
25 OSS-Fuzz aims to make common open source software more secure and stable by
41 Currently, OSS-Fuzz supports C/C++, Rust, Go, Python and Java/JVM code. Other
42 languages supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64
49 This documentation describes how to use OSS-Fuzz service for your open source
59 As of January 2021, OSS-Fuzz has found over [25,000] bugs in [375] open source
Dfaq.md51 `projects/<your_project>` directory in the OSS-Fuzz repository. Note that we do
55 ## My project is not open source. Can I use OSS-Fuzz?
57 You cannot use OSS-Fuzz, but you can use [ClusterFuzz] which OSS-Fuzz is based
61 OSS-Fuzz is a production instance of ClusterFuzz, plus the code living in
62 [OSS-Fuzz repository]: build scripts, `project.yaml` files with contacts, etc.
64 [OSS-Fuzz repository]: https://github.com/google/oss-fuzz
66 …ssue tracker](https://bugs.chromium.org/p/oss-fuzz/issues/list) for reporting bugs in OSS projects?
68 Security access control is important for the kind of issues that OSS-Fuzz detects.
131 is maintained in OSS-Fuzz, you can search for contacts in the respective
186 ## Does OSS-Fuzz support AFL or honggfuzz?
[all …]
/external/oss-fuzz/docs/getting-started/
Dintegration_rewards.md12 is successfully integrated with OSS-Fuzz. Please see the details in our blog post
15 Rewards are based on the quality of integration with OSS-Fuzz, which is evaluated using
19 * Regression testing in the upstream repository using fuzz targets and OSS-Fuzz corpora.
24 For each of the points above, the OSS-Fuzz rewards panel first sets up a cap of up to $5,000.
Dcontinuous_integration.md11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets
26 * If the crash does not occur on older OSS-Fuzz builds. Because if it does occur
30 If your project supports [OSS-Fuzz's code coverage]({{ site.baseurl }}/advanced-topics/code-coverag…
35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes
40 1. Your project must be integrated with OSS-Fuzz.
49 file over from the OSS-Fuzz repository to the `workflows` directory.
50 …ain.yml` from `example` to the name of your OSS-Fuzz project. It is **very important** that you us…
51 …in the [`projects`](https://github.com/google/oss-fuzz/tree/master/projects) directory of OSS-Fuzz.
113 limit for broken fuzz targets than OSS-Fuzz's check_build. Most users should
202 You can checkout CIFuzz configs for OSS-Fuzz projects. Example -
[all …]
/external/tensorflow/tensorflow/lite/micro/examples/person_detection/
DBUILD28 "no_oss", # TODO(b/174680668): Exclude from OSS.
43 "no_oss", # TODO(b/174680668): Exclude from OSS.
54 "no_oss", # TODO(b/174680668): Exclude from OSS.
131 "no_oss", # TODO(b/174680668): Exclude from OSS.
/external/llvm-project/llvm/lib/Support/
DLockFileManager.cpp228 raw_string_ostream OSS(S); in LockFileManager() local
229 OSS << LockFileName.str() << " to " << UniqueLockFileName.str(); in LockFileManager()
230 setError(EC, OSS.str()); in LockFileManager()
273 raw_string_ostream OSS(Str); in getErrorMessage() local
275 OSS << ": " << ErrCodeMsg; in getErrorMessage()
276 return OSS.str(); in getErrorMessage()
/external/swiftshader/third_party/llvm-10.0/llvm/lib/Support/
DLockFileManager.cpp228 raw_string_ostream OSS(S); in LockFileManager() local
229 OSS << LockFileName.str() << " to " << UniqueLockFileName.str(); in LockFileManager()
230 setError(EC, OSS.str()); in LockFileManager()
273 raw_string_ostream OSS(Str); in getErrorMessage() local
275 OSS << ": " << ErrCodeMsg; in getErrorMessage()
276 return OSS.str(); in getErrorMessage()
/external/llvm/lib/Support/
DLockFileManager.cpp216 raw_string_ostream OSS(S); in LockFileManager() local
217 OSS << LockFileName.str() << " to " << UniqueLockFileName.str(); in LockFileManager()
218 setError(EC, OSS.str()); in LockFileManager()
261 raw_string_ostream OSS(Str); in getErrorMessage() local
263 OSS << ": " << Error->message(); in getErrorMessage()
264 OSS.flush(); in getErrorMessage()
/external/python/cpython2/Doc/library/
Dossaudiodev.rst2 :mod:`ossaudiodev` --- Access to OSS-compatible audio devices
7 :synopsis: Access to OSS-compatible audio devices.
12 This module allows you to access the OSS (Open Sound System) audio interface.
13 OSS is available for a wide range of open-source and commercial Unices, and is
18 use ALSA, you'll have to make sure its OSS compatibility layer
25 > Likewise, googling shows OpenBSD also uses OSS/Free -- the commercial
26 > OSS installation manual tells you to remove references to OSS/Free from the
32 > * This is an OSS (Linux) audio emulator.
48 the official documentation for the OSS C API
50 The module defines a large number of constants supplied by the OSS device
[all …]
/external/python/cpython3/Doc/library/
Dossaudiodev.rst1 :mod:`ossaudiodev` --- Access to OSS-compatible audio devices
6 :synopsis: Access to OSS-compatible audio devices.
10 This module allows you to access the OSS (Open Sound System) audio interface.
11 OSS is available for a wide range of open-source and commercial Unices, and is
16 use ALSA, you'll have to make sure its OSS compatibility layer
23 > Likewise, googling shows OpenBSD also uses OSS/Free -- the commercial
24 > OSS installation manual tells you to remove references to OSS/Free from the
30 > * This is an OSS (Linux) audio emulator.
50 the official documentation for the OSS C API
52 The module defines a large number of constants supplied by the OSS device
[all …]
/external/oss-fuzz/docs/advanced-topics/
Dideal_integration.md9 # Ideal integration with OSS-Fuzz
12 OSS projects have different build and test systems. We can't expect them all to
13 implement and maintain fuzz targets or integrate them with OSS-Fuzz in the same
69 Many different build systems exist in the open-source world. The less OSS-Fuzz
72 An ideal build integration for OSS-Fuzz looks like this:
77 …env var [provided]({{ site.baseurl }}/getting-started/new-project-guide/) by OSS-Fuzz environment).
87 This minimizes OSS-Fuzz-specific configuration, making your fuzzing more robust.
101 For better OSS-Fuzz integration, the seed corpus should be available in
162 In such cases, we can host the fuzz targets, dictionaries, etc. in OSS-Fuzz's
170 bugs found by OSS-Fuzz.
/external/tensorflow/tensorflow/compiler/xla/
Dxla.bzl4 # Note: we don't currently define a proto library target for Python in OSS.
9 # Note: we don't currently define any special targets for Python GRPC in OSS.
/external/tensorflow/tensorflow/lite/micro/examples/image_recognition_experimental/
DBUILD20 "no_oss", # TODO(b/174680668): Exclude from OSS.
28 "no_oss", # TODO(b/174680668): Exclude from OSS.
/external/oss-fuzz/docs/reference/
Duseful_links.md26 * 2016-12-01 - Announcing OSS-Fuzz: Continuous fuzzing for open source software
30 * 2017-05-08 - OSS-Fuzz: Five months later, and rewarding projects
34 * 2018-11-06 - A New Chapter for OSS-Fuzz
Dglossary.md20 ## OSS-Fuzz specific terms
24 A scalable fuzzing infrastructure that is used for OSS-Fuzz backend.
35 in OSS-Fuzz a fuzz target can be used to
55 A project is an open source software project that is integrated with OSS-Fuzz.
/external/tensorflow/tensorflow/security/fuzzing/
DBUILD153 tags = ["notap"], # Run in OSS only.
159 tags = ["notap"], # Run in OSS only.
166 tags = ["notap"], # Run in OSS only.
/external/llvm-project/llvm/test/CodeGen/X86/
Dpr46004.ll5 ; OSS Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22357
23 ; OSS Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22723
/external/tpm2-tss/doc/
Dfuzzing.md64 ## OSS Fuzz
66 OSS fuzz integration can be found under the
68 project in OSS Fuzz.

123456