Home
last modified time | relevance | path

Searched +full:prs +full:- +full:fuzz (Results 1 – 18 of 18) sorted by relevance

/external/oss-fuzz/infra/triage-party/
Doss-fuzz.yaml2 name: oss-fuzz
4 - https://github.com/google/oss-fuzz
7 - id: Fuzzing Issues
11 Status of issues across oss-fuzz repos
14 - fuzz-issue-updated-support
16 - fuzz-bugs
17 - fuzz-priority
19 - fuzz-many-reactions
20 - fuzz-many-commenters
21 - fuzz-issue-zombies
[all …]
/external/jazzer-api/
DREADME.md2 …<a href="https://code-intelligence.com"><img src="https://www.code-intelligence.com/hubfs/Logos/CI…
5 <p>Fuzz Testing for the JVM</p>
9 <a href="https://search.maven.org/search?q=g:com.code-intelligence%20a:jazzer">
10 …<img src="https://img.shields.io/maven-central/v/com.code-intelligence/jazzer" alt="Maven Central">
12 …<a href="https://github.com/CodeIntelligenceTesting/jazzer/actions/workflows/run-all-tests.yml?que…
13 …ields.io/github/actions/workflow/status/CodeIntelligenceTesting/jazzer/run-all-tests.yml?branch=ma…
19 <img src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg" alt="PRs welcome" />
24 <a href="https://www.code-intelligence.com/" target="_blank">Website</a>
26 <a href="https://www.code-intelligence.com/blog" target="_blank">Blog</a>
31 Jazzer is a coverage-guided, in-process fuzzer for the JVM platform developed by [Code Intelligence…
[all …]
/external/skia/fuzz/
DREADME.md8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable
9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also
13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the
14 `fuzz` executable.
17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing
18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-Fuzz will automatically
19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when
22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia)
23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that
25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally)
[all …]
/external/libbpf/
DREADME.md2 …<source media="(prefers-color-scheme: dark)" srcset="assets/libbpf-logo-sideways-darkbg.png" width…
3 <img src="assets/libbpf-logo-sideways.png" width="40%">
10 [![OSS-Fuzz Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/libbpf.svg)](https://…
19 Libbpf *authoritative source code* is developed as part of [bpf-next Linux source
20 tree](https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next) under
22 libbpf changes should be sent to [BPF mailing list](http://vger.kernel.org/vger-lists.html#bpf),
23 please don't open PRs here unless you are changing Github-specific parts of libbpf
24 (e.g., Github-specific Makefile).
32 Please check out [libbpf-bootstrap](https://github.com/libbpf/libbpf-bootstrap)
33 and [the companion blog post](https://nakryiko.com/posts/libbpf-bootstrap/) for
[all …]
/external/rust/crates/base64/
DREADME.md3-base64/tree/master.svg?style=shield)](https://circleci.com/gh/marshallpierce/rust-base64/tree/mas…
5 <a href="https://www.jetbrains.com/?from=rust-base64"><img src="/icon_CLion.svg" height="40px"/></a>
23 Remove non-base64 characters from your input before decoding.
25 If you have a `Vec` of base64, [retain](https://doc.rust-lang.org/std/vec/struct.Vec.html#method.re…
30 - Use [iter_read](https://crates.io/crates/iter-read) together with `Read`'s `bytes()` to filter ou…
31 - Implement `Read` with a `read()` impl that delegates to your actual `Read`, and then drops any by…
33 ### I need to line-wrap base64, e.g. for MIME/PEM.
35 [line-wrap](https://crates.io/crates/line-wrap) does just that.
44 There are two opportunities for non-canonical encoding (and thus, detection of the same during deco…
53 The `=` pad bytes, on the other hand, are entirely a self-own by the Base64 standard. They do not a…
[all …]
/external/lz4/.github/workflows/
DREADME.md5 ## USAN, ASAN (`lz4-ubsan-x64`, `lz4-ubsan-x86`, `lz4-asan-x64`)
7 For now, `lz4-ubsan-*` ignores the exit code of `make usan` and `make usan32`.
10 We'll fully enable it when we ensure `make usan` is ready for all commits and PRs.
15 ## C Compilers (`lz4-c-compilers`)
17 - Our test doesn't use `gcc-4.5` due to installation issue of its package. (`apt-get install gcc-4…
19 - Currently, the following 32bit executable tests fail with all versions of `clang`.
20 - `CC=clang-X CFLAGS='-O3' make V=1 -C tests clean test-lz4c32`
21 - `CC=clang-X CFLAGS='-O3 -mx32' make V=1 -C tests clean test-lz4c32`
22 - See [#991](https://github.com/lz4/lz4/issues/991) for details.
24 - Currently, the following 32bit executable tests fail with `gcc-11`
[all …]
/external/AFLplusplus/docs/
DFAQ.md9 …<summary id="what-is-the-difference-between-afl-and-aflplusplus">What is the difference between AF…
11 AFL++ is a superior fork to Google's AFL - more speed, more and better
18 however, it is only accepting PRs from the community and is not developing
24 fixes and enhancements. Then from various AFL spin-offs - mostly academic
25 research - features were integrated. This already resulted in a much advanced
33 [Fuzzbench Report](https://www.fuzzbench.com/reports/2020-08-03/index.html).
37 …<summary id="is-afl-a-whitebox-graybox-or-blackbox-fuzzer">Is AFL++ a whitebox, graybox, or blackb…
41 binary-only or source code fuzzing, or something completely different.
44 …[The Fuzzing Book](https://www.fuzzingbook.org/html/GreyboxFuzzer.html#AFL:-An-Effective-Greybox-F…
50 <summary id="where-can-i-find-tutorials">Where can I find tutorials?</summary><p>
[all …]
DChangelog.md7 - afl-fuzz:
8 - default power schedule is now EXPLORE, due a fix in fast schedules
10 - fixed minor issues in the mutation engine, thanks to @futhewo for
12 - better deterministic fuzzing is now available, benchmarks have shown
13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR!
14 - afl-cc:
15 - large rewrite by @SonicStark which fixes a few corner cases, thanks!
16 - LTO mode now requires llvm 12+
17 - workaround for ASAN with gcc_plugin mode
18 - instrumentation:
[all …]
/external/AFLplusplus/
DREADME.md14 * Marc "van Hauser" Heuse <mh@mh-sec.de>
17 * Heiko "hexcoder-" Eissfeldt <heiko.eissfeldt@hexco.de>
23 AFL++ is a superior fork to Google's AFL - more speed, more and better
27 terms of the Apache-2.0 License. See the [LICENSE](LICENSE) for details.
40 `dev` - depending on your risk appetite. Also take a look at the list of
47 `afl-clang-fast` with `AFL_LLVM_CMPLOG=1`. You can find the `aflplusplus`
58 docker run -ti -v /location/of/your/target:/src aflplusplus/aflplusplus
68 To build AFL++ yourself - *which we recommend* - continue at
74 [common sense risks of fuzzing](docs/fuzzing_in_depth.md#0-common-sense-risks).*
81 * Binary-only targets:
[all …]
DChangelog.md7 - afl-fuzz:
8 - default power schedule is now EXPLORE, due a fix in fast schedules
10 - fixed minor issues in the mutation engine, thanks to @futhewo for
12 - better deterministic fuzzing is now available, benchmarks have shown
13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR!
14 - afl-cc:
15 - large rewrite by @SonicStark which fixes a few corner cases, thanks!
16 - LTO mode now requires llvm 12+
17 - workaround for ASAN with gcc_plugin mode
18 - instrumentation:
[all …]
/external/bc/src/
Dvm.c4 * SPDX-License-Identifier: BSD-2-Clause
6 * Copyright (c) 2018-2023 Gavin D. Howard and contributors.
98 bc_file_puts(&vm->ferr, bc_flush_none, "Longjmp: ");
99 bc_file_puts(&vm->ferr, bc_flush_none, f);
100 bc_file_putchar(&vm->ferr, bc_flush_none, '\n');
101 bc_file_flush(&vm->ferr, bc_flush_none);
105 assert(vm->jmp_bufs.len - (size_t) vm->sig_pop);
108 if (vm->jmp_bufs.len == 0) abort();
109 if (vm->sig_pop) bc_vec_pop(&vm->jmp_bufs);
110 else vm->sig_pop = 1;
[all …]
/external/rust/crates/textwrap/
DCHANGELOG.md6 ## Version 0.16.0 (2022-10-23)
16 paths to `fill` and `wrap`. This makes the functions 10-25 times
29 ## Version 0.15.1 (2022-09-15)
34 ## Version 0.15.0 (2022-02-27)
71 nearly performance neutral (a 1-2% regression).
76 documentation for short last-line penalty more precise.
83 * [#423](https://github.com/mgeisler/textwrap/pull/423): Add fuzz
86 `wrap_optimal_fit` penalties to non-negative numbers.
88 `debug-words` example.
92 ## Version 0.14.2 (2021-06-27)
[all …]
/external/bc/
Dconfigure.sh3 # SPDX-License-Identifier: BSD-2-Clause
5 # Copyright (c) 2018-2023 Gavin D. Howard and contributors.
42 if [ $# -gt 0 ]; then
53 printf ' %s -h\n' "$script"
54 printf ' %s --help\n' "$script"
55 …printf ' %s [-a|-bD|-dB|-c] [-CeEfgGHilmMNPrtTvz] [-O OPT_LEVEL] [-k KARATSUBA_LEN]\\\n' "$scri…
56 printf ' [-s SETTING] [-S SETTING] [-p TYPE]\n'
58 printf ' [--library|--bc-only --disable-dc|--dc-only --disable-bc|--coverage] \\\n'
59 printf ' [--force --debug --disable-extra-math --disable-generated-tests] \\\n'
60 printf ' [--disable-history --disable-man-pages --disable-nls --disable-strip] \\\n'
[all …]
Dconfigure3 # SPDX-License-Identifier: BSD-2-Clause
5 # Copyright (c) 2018-2023 Gavin D. Howard and contributors.
42 if [ $# -gt 0 ]; then
53 printf ' %s -h\n' "$script"
54 printf ' %s --help\n' "$script"
55 …printf ' %s [-a|-bD|-dB|-c] [-CeEfgGHilmMNPrtTvz] [-O OPT_LEVEL] [-k KARATSUBA_LEN]\\\n' "$scri…
56 printf ' [-s SETTING] [-S SETTING] [-p TYPE]\n'
58 printf ' [--library|--bc-only --disable-dc|--dc-only --disable-bc|--coverage] \\\n'
59 printf ' [--force --debug --disable-extra-math --disable-generated-tests] \\\n'
60 printf ' [--disable-history --disable-man-pages --disable-nls --disable-strip] \\\n'
[all …]
/external/python/cpython3/Misc/NEWS.d/
D3.7.0a1.rst2 .. date: 2017-09-05-15-26-30
4 .. release date: 2017-09-19
13 .. date: 2017-08-23-17-02-55
17 Add fuzz tests for float(str), int(str), unicode(str); for oss-fuzz.
22 .. date: 2017-08-16-16-35-59
49 vulnerabilities including: CVE-2017-9233 (External entity infinite loop
50 DoS), CVE-2016-9063 (Integer overflow, re-fix), CVE-2016-0718 (Fix
51 regression bugs from 2.2.0's fix to CVE-2016-0718) and CVE-2012-0876
52 (Counter hash flooding with SipHash). Note: the CVE-2016-5300 (Use
53 os-specific entropy sources like getrandom) doesn't impact Python, since Python
[all …]
/external/cldr/tools/cldr-code/src/main/resources/org/unicode/cldr/util/data/transforms/
Dinternal_raw_IPA-old.txt1803 ad-lib ædlˈɪb
3726 aide-de-camp ˌeddɪkˈæmp
5495 alpha-fetoprotein ˌælfəfˌitoprˈotin, ˌælfəfˌitoprˈotˈiɪn
7542 anglo-saxon ˈæŋglosˌæksən
8282 anti-lewisite ˌæntilˈuɪsˌaɪt
9550 aquifer %21020 ˈækwəfər, ˈɑkwə-
9555 aquilegia %7773 -lˈiʤə, ˌækwəlˈiʤiə
9559 aquiline %15023 -lɪn, ˈækwəlˌaɪn
9629 aragonite %11075 ərˈægənˌaɪt, ˈærəgə-
9645 aram %8777 ær-, ˈeræm, ˈɛrəm
[all …]
/external/bcc/libbpf-tools/powerpc/
Dvmlinux_600.h1855 PERF_EVENT_STATE_DEAD = -4,
1856 PERF_EVENT_STATE_EXIT = -3,
1857 PERF_EVENT_STATE_ERROR = -2,
1858 PERF_EVENT_STATE_OFF = -1,
4951 RPM_INVALID = -1,
5843 CGROUP_BPF_ATTACH_TYPE_INVALID = -1,
6479 perf_invalid_context = -1,
12497 __NETDEV_TX_MIN = -2147483648,
14220 CPUHP_INVALID = -1,
15146 WORK_STRUCT_WQ_DATA_MASK = -256LL,
[all …]
Dvmlinux.h1855 PERF_EVENT_STATE_DEAD = -4,
1856 PERF_EVENT_STATE_EXIT = -3,
1857 PERF_EVENT_STATE_ERROR = -2,
1858 PERF_EVENT_STATE_OFF = -1,
4951 RPM_INVALID = -1,
5843 CGROUP_BPF_ATTACH_TYPE_INVALID = -1,
6479 perf_invalid_context = -1,
12497 __NETDEV_TX_MIN = -2147483648,
14220 CPUHP_INVALID = -1,
15146 WORK_STRUCT_WQ_DATA_MASK = -256LL,
[all …]