Home
last modified time | relevance | path

Searched +full:oss +full:- +full:fuzz +full:- +full:project +full:- +full:name (Results 1 – 25 of 102) sorted by relevance

12345

/external/oss-fuzz/docs/getting-started/
Dcontinuous_integration.md1 ---
6 permalink: /getting-started/continuous-integration/
7 ---
11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets
18 CIFuzz builds your project's fuzzers from the source at a particular
26 * The crash does not occur on older OSS-Fuzz builds. (If the crash does occur
30 If your project supports [OSS-Fuzz's code coverage]({{ site.baseurl }}/advanced-topics/code-coverag…
33 among all fuzzers in the project.
35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes
40 1. Your project must be integrated with OSS-Fuzz.
[all …]
Dnew_project_guide.md1 ---
3 title: Setting up a new project
7 permalink: /getting-started/new-project-guide/
8 ---
10 # Setting up a new project
13 - TOC
15 ---
19 Before you can start setting up your new project for fuzzing, you must do the following:
21 - [Integrate]({{ site.baseurl }}/advanced-topics/ideal-integration/) one or more [fuzz targets]({{ …
22 with the project you want to fuzz.
[all …]
/external/oss-fuzz/infra/build/functions/test_data/
Dexpected_build_steps.json5 "https://github.com/google/oss-fuzz.git",
6 "--depth",
9 "name": "gcr.io/cloud-builders/git" string
12 "name": "gcr.io/cloud-builders/docker", string
15 "-t",
16 "gcr.io/oss-fuzz/test-project",
19 "dir": "oss-fuzz/projects/test-project"
22 "name": "gcr.io/oss-fuzz/test-project", string
25 "-c",
35 "name": "gcr.io/oss-fuzz/test-project", string
[all …]
Dexpected_coverage_build_steps.json5 "https://github.com/google/oss-fuzz.git",
6 "--depth",
9 "name": "gcr.io/cloud-builders/git" string
12 "name": "gcr.io/cloud-builders/docker", string
15 "-t",
16 "gcr.io/oss-fuzz/test-project",
19 "dir": "oss-fuzz/projects/test-project"
22 "name": "gcr.io/oss-fuzz/test-project", string
25 "-c",
35 "name": "gcr.io/oss-fuzz/test-project", string
[all …]
/external/oss-fuzz/docs/getting-started/new-project-guide/
Dgo_lang.md1 ---
3 title: Integrating a Go project
4 parent: Setting up a new project
7 permalink: /getting-started/new-project-guide/go-lang/
8 ---
10 # Integrating a Go project
13 - TOC
15 ---
17 The process of integrating a project written in Go with OSS-Fuzz is very similar
19 [Setting up a new project]({{ site.baseurl }}/getting-started/new-project-guide/)
[all …]
Dpython_lang.md1 ---
3 title: Integrating a Python project
4 parent: Setting up a new project
7 permalink: /getting-started/new-project-guide/python-lang/
8 ---
10 # Integrating a Python project
13 - TOC
15 ---
18 The process of integrating a project written in Python with OSS-Fuzz is very
20 [Setting up a new project]({{ site.baseurl }}/getting-started/new-project-guide/)
[all …]
Djvm_lang.md1 ---
3 title: Integrating a Java/JVM project
4 parent: Setting up a new project
7 permalink: /getting-started/new-project-guide/jvm-lang/
8 ---
10 # Integrating a Java/JVM project
13 - TOC
15 ---
17 The process of integrating a project written in Java or any other language
18 running on the Java Virtual Machine (JVM) with OSS-Fuzz is very similar to the
[all …]
Dswift.md1 ---
3 title: Integrating a Swift project
4 parent: Setting up a new project
7 permalink: /getting-started/new-project-guide/swift/
8 ---
10 # Integrating a Swift project
13 - TOC
15 ---
17 The process of integrating a project written in Swift with OSS-Fuzz is very similar
19 [Setting up a new project]({{ site.baseurl }}/getting-started/new-project-guide/)
[all …]
/external/skia/fuzz/
DREADME.md8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable
9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also
13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the
14 `fuzz` executable.
17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing
18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-fuzz will automatically
19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when
22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia)
23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that
25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally)
[all …]
/external/oss-fuzz/infra/build/functions/
Dbuild_lib.py7 # http://www.apache.org/licenses/LICENSE-2.0
38 CORPUS_BACKUP_URL = ('/{project}-backup.clusterfuzz-external.appspot.com/'
52 EngineInfo(upload_bucket='clusterfuzz-builds',
56 EngineInfo(upload_bucket='clusterfuzz-builds-afl',
60 EngineInfo(upload_bucket='clusterfuzz-builds-honggfuzz',
64 EngineInfo(upload_bucket='clusterfuzz-builds-dataflow',
68 EngineInfo(upload_bucket='clusterfuzz-builds-no-engine',
79 def get_targets_list_url(bucket, project, sanitizer): argument
82 url = GCS_UPLOAD_URL_FORMAT.format(bucket, project, filename)
91 bucket += '-' + architecture
[all …]
/external/oss-fuzz/infra/
Dhelper.py8 # http://www.apache.org/licenses/LICENSE-2.0
17 """Helper script for OSS-Fuzz users. Can do common tasks like building
38 BASE_RUNNER_IMAGE = 'gcr.io/oss-fuzz-base/base-runner'
42 'gcr.io/oss-fuzz-base/base-image',
43 'gcr.io/oss-fuzz-base/base-clang',
44 'gcr.io/oss-fuzz-base/base-builder',
46 'gcr.io/oss-fuzz-base/base-runner-debug',
48 'go': ['gcr.io/oss-fuzz-base/base-builder-go'],
49 'jvm': ['gcr.io/oss-fuzz-base/base-builder-jvm'],
50 'python': ['gcr.io/oss-fuzz-base/base-builder-python'],
[all …]
Dbuild_specified_commit.py7 # http://www.apache.org/licenses/LICENSE-2.0
16 This module is allows each of the OSS Fuzz projects fuzzers to be built
45 """Repo of base-builder images."""
60 return self.digests[index - 1]
62 logging.error('Failed to find suitable base-builder.')
106 """Replace the base-builder digest in a Dockerfile."""
113 line = 'FROM gcr.io/oss-fuzz-base/base-builder@' + digest + '\n'
124 image_name = 'gcr.io/oss-fuzz/' + project_name
130 '-v',
134 '-r',
[all …]
/external/oss-fuzz/infra/cifuzz/actions/build_fuzzers/
Daction.yml2 name: 'build-fuzzers'
3 description: "Builds an OSS-Fuzz project's fuzzers."
5 oss-fuzz-project-name:
6 description: 'Name of the corresponding OSS-Fuzz project.'
9 description: 'Programming language project is written in.'
12 dry-run:
15 allowed-broken-targets-percentage:
21 project-src-path:
22 description: "The path to the project's source code checkout."
24 bad-build-check:
[all …]
/external/oss-fuzz/infra/cifuzz/actions/run_fuzzers/
Daction.yml2 name: 'run-fuzzers'
3 description: 'Runs fuzz target binaries for a specified length of time.'
5 oss-fuzz-project-name:
6 description: 'The OSS-Fuzz project name.'
9 description: 'Programming language project is written in.'
12 fuzz-seconds:
16 dry-run:
22 run-fuzzers-mode:
26 "batch" is for non-interactive fuzzing of an entire project.
30 github-token:
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/.github/workflows/
Dfuzz.yml1 name: CI Fuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'zlib-ng'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'zlib-ng'
16 fuzz-seconds: 600
[all …]
/external/libbpf/.github/workflows/
Dcifuzz.yml1 ---
2 # https://google.github.io/oss-fuzz/getting-started/continuous-integration/
3 name: CIFuzz
7 - master
10 - master
13 runs-on: ubuntu-latest
16 fail-fast: false
20 - name: Build Fuzzers (${{ matrix.sanitizer }})
22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
24 oss-fuzz-project-name: 'libbpf'
[all …]
/external/brotli/.github/workflows/
Dfuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'brotli'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'brotli'
16 fuzz-seconds: 600
[all …]
/external/capstone/.github/workflows/
Dfuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'capstone'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'capstone'
16 fuzz-seconds: 600
[all …]
/external/oss-fuzz/infra/cifuzz/
Dclusterfuzz_deployment.py7 # http://www.apache.org/licenses/LICENSE-2.0
29 # pylint: disable=wrong-import-position,import-error
46 A path to where the OSS-Fuzz build was stored, or None if it wasn't.
58 A path to where the OSS-Fuzz build was stored, or None if it wasn't.
66 …orpus(self, target_name, corpus_dir, replace=False): # pylint: disable=no-self-use,unused-argument
75 """Returns the project coverage object for the project."""
125 except Exception as err: # pylint: disable=broad-except
139 except Exception as err: # pylint: disable=broad-except
144 def _get_build_name(self, name): argument
145 return f'{self.config.sanitizer}-{name}'
[all …]
Dexample_main.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'example'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'example'
17 fuzz-seconds: 600
[all …]
Dget_coverage.py7 # http://www.apache.org/licenses/LICENSE-2.0
14 """Module for determining coverage of fuzz targets."""
22 # pylint: disable=wrong-import-position,import-error
26 # The path to get OSS-Fuzz project's latest report json file.`
27 OSS_FUZZ_LATEST_COVERAGE_INFO_PATH = 'oss-fuzz-coverage/latest_report_info/'
30 # pylint: disable=too-few-public-methods
32 """Exceptions for project coverage."""
36 """Gets coverage data for a project."""
42 """Returns a list of source files covered by the specific fuzz target.
45 target: The name of the fuzz target whose coverage is requested.
[all …]
Dcontinuous_integration.py7 # http://www.apache.org/licenses/LICENSE-2.0
21 # pylint: disable=wrong-import-position,import-error
31 # pylint: disable=too-few-public-methods
44 'git', 'symbolic-ref', 'refs/remotes/origin/HEAD',
76 fuzz."""
92 """Returns the command for building the project that is run inside the
93 project builder container."""
98 """Returns the command to build the project inside the project builder
105 |host_repo_path| and build the project inside the project builder
110 command = (f'cd / && rm -rf {rm_path} && cp -r {host_repo_path} '
[all …]
/external/harfbuzz_ng/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'harfbuzz'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'harfbuzz'
17 fuzz-seconds: 600
[all …]
/external/oss-fuzz/docs/clusterfuzzlite/
Dbuild_integration.md1 ---
7 permalink: /clusterfuzzlite/build-integration/
8 ---
12 - TOC
14 ---
18 [libFuzzer targets]({{ site.baseurl }}/reference/glossary/#fuzz-target) on
21 We re-use the [OSS-Fuzz](https://github.com/google/oss-fuzz) toolchain to make
27 Before you can start setting up your new project for fuzzing, you must do the following:
28 - [Integrate]({{ site.baseurl }}/advanced-topics/ideal-integration/) one or more [fuzz targets]({{ …
29 with the project you want to fuzz. For examples, see TODO.
[all …]
/external/selinux/.github/workflows/
Dcifuzz.yml1 ---
2 name: CIFuzz
6 - master
9 - master
12 runs-on: ubuntu-latest
15 fail-fast: false
19 - name: Build Fuzzers (${{ matrix.sanitizer }})
21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
23 oss-fuzz-project-name: 'selinux'
24 dry-run: false
[all …]

12345