| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/ |
| D | BUILD.bazel | 10 main_class = "com.code_intelligence.jazzer.Jazzer", 17 "//deploy:jazzer-api", 22 name = "jazzer", 23 out = "jazzer.jar", 26 "com/code_intelligence/jazzer/**", 28 "META-INF/MANIFEST.MF", 29 "win32-x86/**", 30 "win32-x86-64/**", 43 jars = [":jazzer"], 45 deps = ["//deploy:jazzer-api"], [all …]
|
| D | Jazzer.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 package com.code_intelligence.jazzer; 19 import static com.code_intelligence.jazzer.runtime.Constants.IS_ANDROID; 27 import com.code_intelligence.jazzer.android.AndroidRuntime; 28 import com.code_intelligence.jazzer.driver.Driver; 29 import com.code_intelligence.jazzer.utils.Log; 30 import com.code_intelligence.jazzer.utils.ZipUtils; 56 * The libFuzzer-compatible CLI entrypoint for Jazzer. 58 * <p>Arguments to Jazzer are passed as command-line arguments or {@code jazzer.*} system 59 * properties. For example, setting the property {@code jazzer.target_class} to [all …]
|
| /external/jazzer-api/deploy/ |
| D | BUILD.bazel | 26 name = "jazzer-api", 29 "-link", 35 pom_template = "//deploy:jazzer-api.pom", 37 runtime_deps = ["//src/main/java/com/code_intelligence/jazzer/api"], 41 name = "jazzer", 43 pom_template = "jazzer.pom", 44 # Do not generate an implicit javadocs target - the current target is based on the shaded deploy 46 tags = ["no-javadocs"], 49 "//src/main/java/com/code_intelligence/jazzer:jazzer_import", 54 name = "jazzer-docs", [all …]
|
| D | deploy.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 set -eu 27 [ -z "${MAVEN_USER+x}" ] && \ 29 [ -z "${MAVEN_PASSWORD+x}" ] && \ 31 [ -z "${JAZZER_JAR_PATH+x}" ] && \ 32 …fail "Set JAZZER_JAR_PATH to the absolute path of jazzer.jar obtained from the release GitHub Acti… 33 [ ! -f "${JAZZER_JAR_PATH}" ] && \ 38 # The Jazzer jar itself bundles native libraries for multiple architectures and thus can't be built 40 bazel build //deploy:jazzer-docs //deploy:jazzer-sources //deploy:jazzer-pom 42 JAZZER_DOCS_PATH=$PWD/$(bazel cquery --output=files //deploy:jazzer-docs) [all …]
|
| /external/jazzer-api/ |
| D | README.md | 2 …ttps://code-intelligence.com"><img src="https://www.code-intelligence.com/hubfs/Logos/CI%20Logos/J… 4 <h1>Jazzer</h1> 6 <a href="https://github.com/CodeIntelligenceTesting/jazzer/releases"> 7 … <img src="https://img.shields.io/github/v/release/CodeIntelligenceTesting/jazzer" alt="Releases"> 9 <a href="https://search.maven.org/search?q=g:com.code-intelligence%20a:jazzer"> 10 …<img src="https://img.shields.io/maven-central/v/com.code-intelligence/jazzer" alt="Maven Central"> 12 …<a href="https://github.com/CodeIntelligenceTesting/jazzer/actions/workflows/run-all-tests.yml?que… 13 …mg.shields.io/github/actions/workflow/status/CodeIntelligenceTesting/jazzer/run-all-tests.yml?bran… 15 <a href="https://github.com/CodeIntelligenceTesting/jazzer/blob/main/LICENSE"> 16 <img src="https://img.shields.io/github/license/CodeIntelligenceTesting/jazzer" alt="License"> [all …]
|
| D | CONTRIBUTING.md | 1 ## Building Jazzer from source 5 Jazzer has the following dependencies when being built from source: 9 * [Clang](https://clang.llvm.org/) 9.0+ (clang-cl on Windows) 11 * GCC (should work with `--repo_env=CC=gcc`, but is not tested) 15 The instructions below will assume that this binary is called `bazel` - Bazelisk is a thin wrapper … 19 Assuming the dependencies are installed, build Jazzer from source and run it as follows: 22 $ git clone https://github.com/CodeIntelligenceTesting/jazzer 23 $ cd jazzer 24 # Note the double dash used to pass <arguments> to Jazzer rather than Bazel. 25 $ bazel run //:jazzer -- <arguments> [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/runtime/ |
| D | BUILD.bazel | 7 # of the bootstrap class loader. They will be visible to all classes - care must 18 visibility = ["//src/main/java/com/code_intelligence/jazzer:__pkg__"], 27 # passed to the `deploy_env` attribute of the Jazzer `java_binary` to ensure that 32 visibility = ["//src/main/java/com/code_intelligence/jazzer:__pkg__"], 34 "//src/main/java/com/code_intelligence/jazzer/api:hooks", 35 "//src/main/java/com/code_intelligence/jazzer/utils:unsafe_provider", 50 "com/code_intelligence/jazzer/**", 52 "META-INF/MANIFEST.MF", 55 "//src/main/java/com/code_intelligence/jazzer/agent:__pkg__", 56 "//src/main/java/com/code_intelligence/jazzer/android:__pkg__", [all …]
|
| /external/jazzer-api/src/test/java/com/code_intelligence/jazzer/instrumentor/ |
| D | BUILD.bazel | 22 "//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor", 24 test_class = "com.code_intelligence.jazzer.instrumentor.TraceDataFlowInstrumentationTest", 27 "@com_github_jetbrains_kotlin//:kotlin-test", 42 "//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor", 44 test_class = "com.code_intelligence.jazzer.instrumentor.CoverageInstrumentationTest", 47 "//src/main/java/com/code_intelligence/jazzer/runtime:coverage_map", 48 "@com_github_jetbrains_kotlin//:kotlin-test", 60 "//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor", 62 test_class = "com.code_intelligence.jazzer.instrumentor.DescriptorUtilsTest", 64 "@com_github_jetbrains_kotlin//:kotlin-test", [all …]
|
| /external/jazzer-api/examples/junit-spring-web/ |
| D | build-and-run-tests.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 # Development-only. This script builds the example project against the local version of Jazzer, 19 set -e 24 # Update jazzer version used for building this project in the pom.xml 25 JAZZER_VERSION=$(grep -oP '(?<=JAZZER_VERSION = ")[^"]*' ../../maven.bzl) 26 # Find line with "<artifactId>jazzer-junit</artifactId>" and replace the version in the next line 27 sed -i "/<artifactId>jazzer-junit<\/artifactId>/ {n;s/<version>.*<\/version>/<version>$JAZZER_VERSI… 29 # Add locally-built Jazzer to the Maven repository 30 ./mvnw install:install-file -Dfile=../../bazel-bin/deploy/jazzer-junit-project.jar -DpomFile=../../… 31 ./mvnw install:install-file -Dfile=../../bazel-bin/deploy/jazzer-project.jar -DpomFile=../../… [all …]
|
| /external/jazzer-api/sanitizers/src/test/java/com/example/ |
| D | BUILD.bazel | 10 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh", 22 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh", 34 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh", 50 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh"], 65 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical"], 75 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical"], 87 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical", 104 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueCritical", 117 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow"], 127 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow"], [all …]
|
| D | DisabledHooksTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 17 import com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh; 53 System.clearProperty("jazzer.disabled_hooks"); in resetDisabledHooksProperty() 74 "jazzer.disabled_hooks", "com.code_intelligence.jazzer.sanitizers.ReflectiveCall"); in disableReflectiveCallSanitizer() 81 "jazzer.disabled_hooks", "com.code_intelligence.jazzer.sanitizers.Deserialization"); in disableDeserializationSanitizer() 87 System.setProperty("jazzer.disabled_hooks", in disableExpressionLanguageSanitizer() 88 "com.code_intelligence.jazzer.sanitizers.ExpressionLanguageInjection"); in disableExpressionLanguageSanitizer() 95 "jazzer.disabled_hooks", "com.code_intelligence.jazzer.sanitizers.ReflectiveCall"); in disableReflectiveCallAndEnableDeserialization() 102 System.setProperty("jazzer.disabled_hooks", in disableAllSanitizers() 103 "com.code_intelligence.jazzer.sanitizers.ReflectiveCall," in disableAllSanitizers() [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/driver/ |
| D | Driver.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 package com.code_intelligence.jazzer.driver; 19 import static com.code_intelligence.jazzer.runtime.Constants.IS_ANDROID; 22 import com.code_intelligence.jazzer.agent.AgentInstaller; 23 import com.code_intelligence.jazzer.driver.junit.JUnitRunner; 24 import com.code_intelligence.jazzer.utils.Log; 37 if (!System.getProperty("jazzer.autofuzz", "").isEmpty()) { in start() 38 Log.error("--autofuzz is not supported for Android"); in start() 41 if (!System.getProperty("jazzer.coverage_report", "").isEmpty()) { in start() 42 Log.warn("--coverage_report is not supported for Android and has been disabled"); in start() [all …]
|
| /external/jazzer-api/src/test/java/com/code_intelligence/jazzer/driver/ |
| D | BUILD.bazel | 4 jvm_flags = ["-ea"], 7 "//src/main/java/com/code_intelligence/jazzer/agent:agent_installer", 8 "//src/main/java/com/code_intelligence/jazzer/api", 9 "//src/main/java/com/code_intelligence/jazzer/api:hooks", 10 "//src/main/java/com/code_intelligence/jazzer/driver:fuzz_target_finder", 11 "//src/main/java/com/code_intelligence/jazzer/driver:fuzz_target_holder", 12 "//src/main/java/com/code_intelligence/jazzer/driver:fuzz_target_runner", 13 "//src/main/java/com/code_intelligence/jazzer/runtime:coverage_map", 14 "//src/main/java/com/code_intelligence/jazzer/utils:unsafe_provider", 23 "//src/main/java/com/code_intelligence/jazzer/api", [all …]
|
| /external/jazzer-api/src/test/java/com/code_intelligence/jazzer/junit/ |
| D | BUILD.bazel | 4 name = "test-method", 6 visibility = ["//src/test/java/com/code_intelligence/jazzer/junit:__pkg__"], 17 "//src/main/java/com/code_intelligence/jazzer/junit:utils", 28 test_class = "com.code_intelligence.jazzer.junit.RegressionTestTest", 34 "//src/main/java/com/code_intelligence/jazzer/api:hooks", 52 test_class = "com.code_intelligence.jazzer.junit.FuzzingWithCrashTest", 58 "//src/main/java/com/code_intelligence/jazzer/api:hooks", 59 "//src/test/java/com/code_intelligence/jazzer/junit:test-method", 83 test_class = "com.code_intelligence.jazzer.junit.FuzzingWithoutCrashTest", 89 "//src/main/java/com/code_intelligence/jazzer/api:hooks", [all …]
|
| /external/jazzer-api/tests/ |
| D | BUILD.bazel | 12 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow"], 14 # Additionally verify that Jazzer-Fuzz-Target-Class is picked up if --target_class isn't set. 15 deploy_manifest_lines = ["Jazzer-Fuzz-Target-Class: com.example.LongStringFuzzer"], 27 "--autofuzz=org.apache.commons.imaging.formats.jpeg.JpegImageParser::getBufferedImage", 28 "--autofuzz_ignore=java.lang.NullPointerException", 39 deploy_manifest_lines = ["Jazzer-Hook-Classes: com.example.HookDependenciesFuzzerHooks"], 40 deps = ["//src/main/java/com/code_intelligence/jazzer/api:hooks"], 47 "com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow", 49 env = {"JAVA_OPTS": "-Xverify:all"}, 61 "--autofuzz=java.util.regex.Pattern::compile", [all …]
|
| /external/jazzer-api/examples/junit/src/test/java/com/example/ |
| D | BUILD.bazel | 9 "//src/test/java/com/code_intelligence/jazzer/junit:__pkg__", 12 "//deploy:jazzer", 13 "//deploy:jazzer-api", 14 "//deploy:jazzer-junit", 26 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueMedium"], 28 "-runs=0", 38 "//src/main/java/com/code_intelligence/jazzer/junit:fuzz_test", 48 "-runs=0", 58 "//src/main/java/com/code_intelligence/jazzer/junit:fuzz_test", 68 "-runs=0", [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/mutation/mutator/collection/ |
| D | MapMutatorFactory.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 package com.code_intelligence.jazzer.mutation.mutator.collection; 19 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.CrossOverAct… 20 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.crossOverChu… 21 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.insertChunk; 22 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.overwriteChu… 23 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.MutationActio… 24 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.deleteRandomC… 25 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.growBy; 26 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.insertRandomC… [all …]
|
| D | ListMutatorFactory.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 package com.code_intelligence.jazzer.mutation.mutator.collection; 19 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.CrossOverAct… 20 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.crossOverChu… 21 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.insertChunk; 22 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkCrossOvers.overwriteChu… 23 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.MutationActio… 24 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.deleteRandomC… 25 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.insertRandomC… 26 import static com.code_intelligence.jazzer.mutation.mutator.collection.ChunkMutations.mutateRandomC… [all …]
|
| /external/jazzer-api/docs/ |
| D | advanced.md | 3 * [Passing JVM arguments](#passing-jvm-arguments) 4 * [Coverage instrumentation](#coverage-instrumentation) 5 * [Trace instrumentation](#trace-instrumentation) 6 * [Value profile](#value-profile) 7 * [Custom hooks](#custom-hooks) 8 * [Suppressing stack traces](#suppressing-stack-traces) 9 * [Export coverage information](#export-coverage-information) 10 * [Native libraries](#native-libraries) 11 * [Fuzzing mutators](#fuzzing-mutators) 13 <!-- Created by https://github.com/ekalinin/github-markdown-toc --> [all …]
|
| /external/jazzer-api/src/test/java/com/code_intelligence/jazzer/mutation/mutator/proto/ |
| D | MessageMutatorTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 package com.code_intelligence.jazzer.mutation.mutator.proto; 19 import static com.code_intelligence.jazzer.mutation.support.TestSupport.mockPseudoRandom; 22 import com.code_intelligence.jazzer.mutation.annotation.NotNull; 23 import com.code_intelligence.jazzer.mutation.api.ChainedMutatorFactory; 24 import com.code_intelligence.jazzer.mutation.api.MutatorFactory; 25 import com.code_intelligence.jazzer.mutation.api.SerializingMutator; 26 import com.code_intelligence.jazzer.mutation.mutator.collection.CollectionMutators; 27 import com.code_intelligence.jazzer.mutation.mutator.lang.LangMutators; 28 import com.code_intelligence.jazzer.mutation.support.TestSupport.MockPseudoRandom; [all …]
|
| /external/jazzer-api/src/main/native/com/code_intelligence/jazzer/driver/ |
| D | BUILD.bazel | 9 "//src/main/java/com/code_intelligence/jazzer/driver:__pkg__", 10 "//src/main/java/com/code_intelligence/jazzer/junit:__pkg__", 11 "//src/main/java/com/code_intelligence/jazzer/runtime:__pkg__", 26 visibility = ["//src/test/native/com/code_intelligence/jazzer/driver/mocks:__pkg__"], 41 visibility = ["//src/main/java/com/code_intelligence/jazzer/android:__pkg__"], 43 "//src/main/java/com/code_intelligence/jazzer/android:android_runtime.hdrs", 51 deps = ["//src/main/java/com/code_intelligence/jazzer/runtime:coverage_map.hdrs"], 62 "//conditions:default": ["-ldl"], 66 "//src/main/java/com/code_intelligence/jazzer/runtime:fuzz_target_runner_natives.hdrs", 79 "//src/main/java/com/code_intelligence/jazzer/driver:fuzzed_data_provider_impl.hdrs", [all …]
|
| /external/jazzer-api/examples/ |
| D | BUILD.bazel | 11 "--autofuzz=com.google.json.JsonSanitizer::sanitize", 21 allowed_findings = ["com.code_intelligence.jazzer.api.FuzzerSecurityIssueMedium"], 32 …# Comment out the next line to keep the ExampleFuzzer running indefinitely - without the hook, it … 34 deploy_manifest_lines = ["Jazzer-Hook-Classes: com.example.ExampleFuzzerHooks"], 35 deps = ["//src/main/java/com/code_intelligence/jazzer/api:hooks"], 49 "//deploy:jazzer-api", 59 "--asan", 61 # The shell launcher generated by Jazzer is killed in CI, even with codesigning disabled on the 63 tags = ["no-macos-x86_64-jdk8"], 78 "--ubsan", [all …]
|
| /external/jazzer-api/.github/workflows/ |
| D | release.yml | 8 runs-on: ${{ matrix.os }} 12 - os: ubuntu-20.04 14 - os: macos-11 16 - os: windows-2019 20 - uses: actions/checkout@v3 22 - name: Set up JDK 23 uses: actions/setup-java@v3 26 java-version: 8 28 - name: Set Build Buddy config 32 - name: Append build settings to .bazelrc [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/junit/ |
| D | AgentConfigurator.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 15 package com.code_intelligence.jazzer.junit; 17 import static com.code_intelligence.jazzer.junit.Utils.getClassPathBasedInstrumentationFilter; 18 import static com.code_intelligence.jazzer.junit.Utils.getLegacyInstrumentationFilter; 35 System.setProperty("jazzer.internal.conditional_hooks", "true"); in forRegressionTest() 37 System.setProperty("jazzer.instrumentation_excludes", "**"); in forRegressionTest() 38 extensionContext.getConfigurationParameter("jazzer.instrument") in forRegressionTest() 40 -> System.setProperty( in forRegressionTest() 41 "jazzer.custom_hook_includes", String.join(File.pathSeparator, s.split(",")))); in forRegressionTest() 52 executionRequest.getConfigurationParameter("jazzer.instrument") in forFuzzing() [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/mutation/mutator/proto/ |
| D | BuilderMutatorFactory.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 package com.code_intelligence.jazzer.mutation.mutator.proto; 19 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.assemble; 20 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.combine; 21 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.fixedValue; 22 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateIndices; 23 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateProperty; 24 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateSumInPlace; 25 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateThenMapToIm… 26 import static com.code_intelligence.jazzer.mutation.combinator.MutatorCombinators.mutateViaView; [all …]
|