Home
last modified time | relevance | path

Searched +full:fuzz +full:- +full:priority (Results 1 – 25 of 53) sorted by relevance

123

/external/oss-fuzz/infra/triage-party/
Doss-fuzz.yaml2 name: oss-fuzz
4 - https://github.com/google/oss-fuzz
7 - id: Fuzzing Issues
11 Status of issues across oss-fuzz repos
14 - fuzz-issue-updated-support
16 - fuzz-bugs
17 - fuzz-priority
19 - fuzz-many-reactions
20 - fuzz-many-commenters
21 - fuzz-issue-zombies
[all …]
/external/oss-fuzz/docs/advanced-topics/
Dbug_fixing_guidance.md1 ---
5 permalink: /advanced-topics/bug-fixing-guidance
6 ---
12 OSS-Fuzz.
14 - TOC
18 In general the severity of an issue reported by OSS-Fuzz must be determined
20 the fuzzers OSS-Fuzz makes an effort into determining the severity of the bug
26 These are the top priority of solving. A label is attached to these on
27 the OSS-Fuzz testcase page and you can also search up all of these on monorail
28 using the search pattern `-Bug=security`.
[all …]
/external/grpc-grpc/src/core/lib/config/
Dconfig_vars.yaml7 # http://www.apache.org/licenses/LICENSE-2.0
23 # Optionally, a force-load-on-access: true flag can be added to force checking
27 # Optionally, fuzz: true can be added to enable fuzzers to explore variations
28 # in this config var with their regular fuzzing work - or fuzz: FunctionName
29 … that the config space be explored, but FunctionName should be called to pre-format/validate the v…
32 - name: experiments
36 prefixed with a '-' to disable them.
39 fuzz: ValidateExperimentsStringForFuzzing
40 - name: client_channel_backup_poll_interval_ms
50 - name: dns_resolver
[all …]
/external/rust/crates/grpcio-sys/grpc/src/core/lib/config/
Dconfig_vars.yaml7 # http://www.apache.org/licenses/LICENSE-2.0
23 # Optionally, a force-load-on-access: true flag can be added to force checking
27 # Optionally, fuzz: true can be added to enable fuzzers to explore variations
28 # in this config var with their regular fuzzing work - or fuzz: FunctionName
29 … that the config space be explored, but FunctionName should be called to pre-format/validate the v…
32 - name: experiments
36 prefixed with a '-' to disable them.
38 fuzz: ValidateExperimentsStringForFuzzing
39 - name: client_channel_backup_poll_interval_ms
49 - name: dns_resolver
[all …]
/external/cronet/testing/libfuzzer/
DREADME.md1 # Fuzz testing in Chromium
3 [go/chrome-fuzzing](https://goto.google.com/chrome-fuzzing)
5 [Fuzzing] is a testing technique that feeds auto-generated inputs to a piece
8 [go/fuzzing-success](http://go/fuzzing-success)). You can learn more about the
9 benefits of fuzzing at [go/why-fuzz](http://go/why-fuzz).
11 This documentation covers the in-process guided fuzzing approach employed by
13 out-of-process fuzzers, please refer to the [Blackbox fuzzing] page in the
20 In Chromium, you can easily create and submit fuzz targets. The targets are
24 You should fuzz any code which absorbs inputs from untrusted sources, such
26 it's an especially good idea to fuzz it.
[all …]
/external/angle/third_party/spirv-tools/src/source/fuzz/
Dtransformation_add_constant_composite.cpp7 // http://www.apache.org/licenses/LICENSE-2.0
15 #include "source/fuzz/transformation_add_constant_composite.h"
19 #include "source/fuzz/fuzzer_util.h"
22 namespace fuzz { namespace
25 spvtools::fuzz::protobufs::TransformationAddConstantComposite message) in TransformationAddConstantComposite()
47 ir_context->get_def_use_mgr()->GetDef(message_.type_id()); in IsApplicable()
52 // whether the given type really defines a composite and - in the case of a in IsApplicable()
53 // struct - whether its decorations are OK. in IsApplicable()
55 switch (composite_type_instruction->opcode()) { in IsApplicable()
62 composite_type_instruction->GetSingleWordInOperand(0)); in IsApplicable()
[all …]
/external/deqp-deps/SPIRV-Tools/source/fuzz/
Dtransformation_add_constant_composite.cpp7 // http://www.apache.org/licenses/LICENSE-2.0
15 #include "source/fuzz/transformation_add_constant_composite.h"
19 #include "source/fuzz/fuzzer_util.h"
22 namespace fuzz { namespace
25 spvtools::fuzz::protobufs::TransformationAddConstantComposite message) in TransformationAddConstantComposite()
47 ir_context->get_def_use_mgr()->GetDef(message_.type_id()); in IsApplicable()
52 // whether the given type really defines a composite and - in the case of a in IsApplicable()
53 // struct - whether its decorations are OK. in IsApplicable()
55 switch (composite_type_instruction->opcode()) { in IsApplicable()
62 composite_type_instruction->GetSingleWordInOperand(0)); in IsApplicable()
[all …]
/external/swiftshader/third_party/SPIRV-Tools/source/fuzz/
Dtransformation_add_constant_composite.cpp7 // http://www.apache.org/licenses/LICENSE-2.0
15 #include "source/fuzz/transformation_add_constant_composite.h"
19 #include "source/fuzz/fuzzer_util.h"
22 namespace fuzz { namespace
25 spvtools::fuzz::protobufs::TransformationAddConstantComposite message) in TransformationAddConstantComposite()
47 ir_context->get_def_use_mgr()->GetDef(message_.type_id()); in IsApplicable()
52 // whether the given type really defines a composite and - in the case of a in IsApplicable()
53 // struct - whether its decorations are OK. in IsApplicable()
55 switch (composite_type_instruction->opcode()) { in IsApplicable()
62 composite_type_instruction->GetSingleWordInOperand(0)); in IsApplicable()
[all …]
/external/openthread/tests/unit/
Dtest_spinel_buffer.cpp43 // This module implements unit-test for Spinel::Buffer class.
73 kNumPrios = 2, // Number of priority levels.
88 for (uint8_t priority = 0; priority < kNumPrios; priority++) in ClearTagHistory() local
90 sTagHistoryHead[priority] = sTagHistoryTail[priority]; in ClearTagHistory()
94 void AddTagToHistory(Spinel::Buffer::FrameTag aTag, Spinel::Buffer::Priority aPriority) in AddTagToHistory()
96 uint8_t priority = static_cast<uint8_t>(aPriority); in AddTagToHistory() local
98 sTagHistoryArray[priority][sTagHistoryTail[priority]] = aTag; in AddTagToHistory()
100 if (++sTagHistoryTail[priority] == kTagArraySize) in AddTagToHistory()
102 sTagHistoryTail[priority] = 0; in AddTagToHistory()
105 VerifyOrQuit(sTagHistoryTail[priority] != sTagHistoryHead[priority], in AddTagToHistory()
[all …]
/external/AFLplusplus/docs/
Denv_variables.md14 Starting with AFL++ 3.0, there is only one compiler: afl-cc.
18 - Pass the --afl-MODE command-line option to the compiler. Only this option
19 accepts further AFL-specific command-line options.
20 - Use a symlink to afl-cc: afl-clang, afl-clang++, afl-clang-fast,
21 afl-clang-fast++, afl-clang-lto, afl-clang-lto++, afl-g++, afl-g++-fast,
22 afl-gcc, afl-gcc-fast. This option does not accept AFL-specific command-line
24 - Use the `AFL_CC_COMPILER` environment variable with `MODE`. To select
27 - `GCC` (afl-gcc/afl-g++)
28 - `GCC_PLUGIN` (afl-g*-fast)
29 - `LLVM` (afl-clang-fast*)
[all …]
/external/e2fsprogs/doc/RelNotes/
Dv1.46.6.txt7 ---------------
12 Debugfs no longer prints a scary message when debugfs -c (which enables
30 -----
32 Pre-v6.2 Linux kernels had long-standing bug in how the extended
33 attribute hash was calculated when there were non-ASCII characters in
42 Avoid triggering udev in dumpe2fs and "resize2fs -P" for file systems
43 with MMP enabled by opening the device read-only when reading the MMP
69 sure its exit status is non-zero if there is some failure.
74 Add additional bullet-proofing for very badly corrupted file systems.
76 bugs. (Addresses CVE-2022-1304)
[all …]
/external/webrtc/test/fuzzers/
Daudio_processing_configs_fuzzer.cc4 * Use of this source code is governed by a BSD-style license
32 "WebRTC-Audio-Agc2ForceExtraSaturationMargin",
33 "WebRTC-Audio-Agc2ForceInitialSaturationMargin",
34 "WebRTC-Aec3MinErleDuringOnsetsKillSwitch",
35 "WebRTC-Aec3ShortHeadroomKillSwitch",
43 bool use_ts = fuzz_data->ReadOrDefaultValue(true); in CreateApm()
44 bool use_red = fuzz_data->ReadOrDefaultValue(true); in CreateApm()
45 bool use_hpf = fuzz_data->ReadOrDefaultValue(true); in CreateApm()
46 bool use_aec3 = fuzz_data->ReadOrDefaultValue(true); in CreateApm()
47 bool use_aec = fuzz_data->ReadOrDefaultValue(true); in CreateApm()
[all …]
/external/tcpdump/tests/
DTESTLIST1 # The options -# and -n are useless in TESTLIST. They are already set
6 # We cannot rely on, for example, "print-x.out" and
7 # "print-X.out" being different files - we might be running
8 # this on a case-insensitive file system, e.g. a Windows
9 # file system or a case-insensitive HFS+ file system on
12 # Therefore, for "X" and "XX", we have "print-capX.out"
13 # and "print-capXX.out".
15 print-x print-flags.pcap print-x.out -x
16 print-xx print-flags.pcap print-xx.out -xx
17 print-X print-flags.pcap print-capX.out -X
[all …]
/external/freetype/docs/oldlogs/
DChangeLog.281 2017-09-16 Werner Lemberg <wl@gnu.org>
7 Tag sources with `VER-2-8-1'.
24 builds/wince/vc2005-ce/freetype.vcproj,
25 builds/wince/vc2005-ce/index.html,
26 builds/wince/vc2008-ce/freetype.vcproj,
27 builds/wince/vc2008-ce/index.html: s/2.8/2.8.1/, s/28/281/.
34 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp>
38 __builtin_shuffle() was introduced in gcc-4.7. The lowest
41 * src/sfnt/pngshim.c (premultiply_data): Fix cpp-macro to
45 2017-09-13 suzuki toshiya <mpsuzuki@hiroshima-u.ac.jp>
[all …]
/external/grpc-grpc/test/core/transport/chttp2/
Dhpack_sync_fuzzer.cc7 // http://www.apache.org/licenses/LICENSE-2.0
85 // Not an interesting case to fuzz in FuzzOneInput()
88 if (absl::EndsWith(header.literal_inc_idx().value(), "-bin")) { in FuzzOneInput()
99 if (absl::EndsWith(header.literal_not_idx().value(), "-bin")) { in FuzzOneInput()
121 ResourceQuota::Default()->memory_quota()->CreateMemoryAllocator( in FuzzOneInput()
122 "test-allocator"); in FuzzOneInput()
128 HPackParser::Priority::None, in FuzzOneInput()
133 encode_output.c_slice_at(i), i == (encode_output.Count() - 1), in FuzzOneInput()
148 const auto parser_size = parser.hpack_table()->test_only_table_size(); in FuzzOneInput()
150 const auto parser_elems = parser.hpack_table()->num_entries(); in FuzzOneInput()
/external/webrtc/infra/config/
Dconfig.star4 # Use of this source code is governed by a BSD-style license that can be
7 # https://chromium.googlesource.com/infra/luci/luci-go/+/main/lucicfg/doc/
14 WEBRTC_GERRIT = "https://webrtc-review.googlesource.com/src"
15 WEBRTC_TROOPER_EMAIL = "webrtc-troopers-robots@google.com"
17 DEFAULT_CPU = "x86-64"
51 "metrics_project": "chromium-reclient-metrics",
74 "luci-analysis.cfg",
75 "commit-queue.cfg",
76 "cr-buildbucket.cfg",
77 "luci-logdog.cfg",
[all …]
/external/AFLplusplus/instrumentation/
Dafl-llvm-common.cc20 #include "afl-llvm-common.h"
33 if (!BB->getName().empty()) { in getBBName()
35 name = strdup(BB->getName().str().c_str()); in getBBName()
45 BB->printAsOperand(OS, false); in getBBName()
57 // fuzzing campaign installations, e.g. oss-fuzz in isIgnoreFunction()
94 if (F->getName().startswith(ignoreListFunc)) { return true; } in isIgnoreFunction()
106 // that are part of user-written C++ functions like the ones including in isIgnoreFunction()
108 // mangled name of the user-written function in isIgnoreFunction()
111 // hexcoder: F->getName().contains() not avaiilable in llvm 3.8.0 in isIgnoreFunction()
112 if (StringRef::npos != F->getName().find(ignoreListFunc)) { return true; } in isIgnoreFunction()
[all …]
/external/AFLplusplus/src/
Dafl-fuzz.c2 american fuzzy lop++ - fuzzer code
3 --------------------------------
7 Now maintained by Marc Heuse <mh@mh-sec.de>,
12 Copyright 2019-2024 AFLplusplus Project. All rights reserved.
18 https://www.apache.org/licenses/LICENSE-2.0
26 #include "afl-fuzz.h"
50 s32 i, pid1 = 0, pid2 = 0, pgrp = -1; in at_exit()
124 "\n%s [ options ] -- /path/to/fuzzed_app [ ... ]\n\n" in usage()
127 " -i dir - input directory with test cases (or '-' to resume, " in usage()
130 " -o dir - output directory for fuzzer findings\n\n" in usage()
[all …]
/external/expat/expat/
DChanges12 !! in a timely manner or at all (loosely ordered by descending priority): !!
14 !! - <blink>fixing a complex non-public security issue</blink>, !!
15 !! - teaming up on researching and fixing future security reports and !!
16 !! ClusterFuzz findings with few-days-max response times in communication !!
19 !! - implementing and auto-testing XML 1.0r5 support !!
21 !! - smart ideas on fixing the Autotools CMake files generation issue !!
23 !! - the Windows binaries topic (needs requirements engineering first), !!
24 !! - pushing migration from `int` to `size_t` further !!
25 !! including edge-cases test coverage (needs discussion before anything). !!
27 !! For details, please reach out via e-mail to sebastian@pipping.org so we !!
[all …]
/external/oss-fuzz/projects/dnsmasq/
Dfuzz_header.h5 http://www.apache.org/licenses/LICENSE-2.0
24 // during a fuzz run.
52 *size -= STR_SIZE; in get_null_terminated()
67 *size -= to_get; in gb_get_random_data()
93 *size-=1; in get_short()
102 *size -= 4; in get_int()
125 return -1; in fuzz_ioctl()
136 return -1; in fuzz_ioctl()
140 ifr->ifr_name[i] = (char)*syscall_data; in fuzz_ioctl()
142 syscall_size -= 1; in fuzz_ioctl()
[all …]
/external/toybox/android/linux/generated/
Dhelp.h1-libc on a nommu system, you'll need to say \"y\" here\nunless you used the patch in the mcm-build…
9 … even when it has a built-in version of that command. This requires\n toybox symlinks to be …
13 #define HELP_toybox_zhelp "Compress help with gzip -9, deflating when displayed. This makes the\nbi…
15 …t --help argument in all commands, even ones with a NULL\noptstring. (Use TOYFLAG_NOHELP to disabl…
23 #define HELP_toybox_libcrypto "Use faster hash functions out of external -lcrypto library."
27 #define HELP_toybox_selinux "Include SELinux options in commands such as ls, and add\nSELinux-speci…
33--long | --help | --version | [COMMAND] [ARGUMENTS...]]\n\nWith no arguments, \"toybox\" shows ava…
41-D] [-F] [-R] [-n] [-v] FILE...\n\nRestores the default security contexts for the given files.\n\n
43-p PRI] [-t TAG] [MESSAGE...]\n\nLogs message (or stdin) to logcat.\n\n-p Use the given priority i…
49 #define HELP_skeleton_alias "usage: skeleton_alias [-dq] [-b NUMBER]\n\nExample of a second command…
[all …]
/external/toybox/android/mac/generated/
Dhelp.h1-libc on a nommu system, you'll need to say \"y\" here\nunless you used the patch in the mcm-build…
9 … even when it has a built-in version of that command. This requires\n toybox symlinks to be …
13 #define HELP_toybox_zhelp "Compress help with gzip -9, deflating when displayed. This makes the\nbi…
15 …t --help argument in all commands, even ones with a NULL\noptstring. (Use TOYFLAG_NOHELP to disabl…
23 #define HELP_toybox_libcrypto "Use faster hash functions out of external -lcrypto library."
27 #define HELP_toybox_selinux "Include SELinux options in commands such as ls, and add\nSELinux-speci…
33--long | --help | --version | [COMMAND] [ARGUMENTS...]]\n\nWith no arguments, \"toybox\" shows ava…
41-D] [-F] [-R] [-n] [-v] FILE...\n\nRestores the default security contexts for the given files.\n\n
43-p PRI] [-t TAG] [MESSAGE...]\n\nLogs message (or stdin) to logcat.\n\n-p Use the given priority i…
49 #define HELP_skeleton_alias "usage: skeleton_alias [-dq] [-b NUMBER]\n\nExample of a second command…
[all …]
/external/toybox/android/device/generated/
Dhelp.h1-libc on a nommu system, you'll need to say \"y\" here\nunless you used the patch in the mcm-build…
9 … even when it has a built-in version of that command. This requires\n toybox symlinks to be …
13 #define HELP_toybox_zhelp "Compress help with gzip -9, deflating when displayed. This makes the\nbi…
15 …t --help argument in all commands, even ones with a NULL\noptstring. (Use TOYFLAG_NOHELP to disabl…
23 #define HELP_toybox_libcrypto "Use faster hash functions out of external -lcrypto library."
27 #define HELP_toybox_selinux "Include SELinux options in commands such as ls, and add\nSELinux-speci…
33--long | --help | --version | [COMMAND] [ARGUMENTS...]]\n\nWith no arguments, \"toybox\" shows ava…
41-D] [-F] [-R] [-n] [-v] FILE...\n\nRestores the default security contexts for the given files.\n\n
43-p PRI] [-t TAG] [MESSAGE...]\n\nLogs message (or stdin) to logcat.\n\n-p Use the given priority i…
49 #define HELP_skeleton_alias "usage: skeleton_alias [-dq] [-b NUMBER]\n\nExample of a second command…
[all …]
/external/snakeyaml/src/changes/
Dchanges.xml2 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
3 …apache.org/changes/1.0.0 http://maven.apache.org/plugins/maven-changes-plugin/xsd/changes-1.0.0.xs…
8 <release version="1.32" date="2022-09-12" description="Maintenance">
18 …: https://stackoverflow.com/questions/49712148/maven-plugin-for-auto-formatting-code-to-match-goog…
19 … Format: https://raw.githubusercontent.com/google/styleguide/gh-pages/eclipse-java-google-style.xml
20 Activation: ./mvnw clean install site -Preformat
23 … Support unescaped unicode characters for double-quoted scalars (thanks to Florian Waltenberger)
26 <release version="1.31" date="2022-08-27" description="Maintenance">
31 Fix false positive CVE-2020-13936 (thanks to Gaétan Collaud)
38 to avoid possible attack when RE takes too many resources (detected by OSS-Fuzz)
[all …]
/external/grpc-grpc/doc/
Dinterop-test-descriptions.md6 and the [gRPC over HTTP/2 v2 protocol](./PROTOCOL-HTTP2.md).
9 ------
12 provided the test case it is expected to run as a command-line parameter. Names
16 * --server_host=HOSTNAME
18 * --server_host_override=HOSTNAME
20 :authority header. If unspecified, the value of --server_host will be
22 * --server_port=PORT
24 * --test_case=TESTCASE
26 * --use_tls=BOOLEAN
28 * --use_test_ca=BOOLEAN
[all …]

123