Searched +full:oss +full:- +full:fuzz +full:- +full:project +full:- +full:name (Results 1 – 25 of 87) sorted by relevance
1234
/external/skia/fuzz/ |
D | README.md | 8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable 9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also 13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the 14 `fuzz` executable. 17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing 18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-Fuzz will automatically 19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when 22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia) 23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that 25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally) [all …]
|
/external/pigweed/pw_fuzzer/guides/ |
D | reproducing_oss_fuzz_bugs.rst | 1 .. _module-pw_fuzzer-guides-reproducing_oss_fuzz_bugs: 4 Using OSS-Fuzz 6 .. pigweed-module-subpage:: 7 :name: pw_fuzzer 9 .. TODO: b/281139237 - Update with better instructions for downstream projects. 11 Core Pigweed is integrated with `OSS-Fuzz`_, a continuous fuzzing infrastructure 16 ------------------------- 18 ------------------------- 20 Bugs produced by OSS-Fuzz can be found in its `Monorail instance`_. These bugs 31 :ref:`module-pw_fuzzer-guides`. [all …]
|
/external/flatbuffers/.github/workflows/ |
D | main.yml | 1 name: OSS-Fuzz 2 permissions: read-all 7 - master 9 - include/** 10 - src/** 11 - tests/**.cpp 12 - tests/**.h 15 runs-on: ubuntu-latest 17 - name: Build Fuzzers 19 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master [all …]
|
/external/libbpf/.github/workflows/ |
D | cifuzz.yml | 1 --- 2 # https://google.github.io/oss-fuzz/getting-started/continuous-integration/ 3 name: CIFuzz 7 - master 10 - master 13 runs-on: ubuntu-latest 16 fail-fast: false 20 - name: Build Fuzzers (${{ matrix.sanitizer }}) 22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 24 oss-fuzz-project-name: 'libbpf' [all …]
|
/external/capstone/.github/workflows/ |
D | fuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 10 oss-fuzz-project-name: 'capstone' 11 dry-run: false 12 - name: Run Fuzzers 13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 15 oss-fuzz-project-name: 'capstone' 16 fuzz-seconds: 600 [all …]
|
/external/brotli/.github/workflows/ |
D | fuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 10 oss-fuzz-project-name: 'brotli' 11 dry-run: false 12 - name: Run Fuzzers 13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 15 oss-fuzz-project-name: 'brotli' 16 fuzz-seconds: 600 [all …]
|
/external/pcre/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 11 oss-fuzz-project-name: 'pcre2' 12 dry-run: false 13 - name: Run Fuzzers 14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 16 oss-fuzz-project-name: 'pcre2' 17 fuzz-seconds: 300 [all …]
|
/external/gson/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 11 oss-fuzz-project-name: 'gson' 12 dry-run: false 14 - name: Run Fuzzers 15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 17 oss-fuzz-project-name: 'gson' 18 fuzz-seconds: 600 [all …]
|
/external/libusb/.github/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 11 oss-fuzz-project-name: 'libusb' 12 dry-run: false 14 - name: Run Fuzzers 15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 17 oss-fuzz-project-name: 'libusb' 18 fuzz-seconds: 600 [all …]
|
/external/harfbuzz_ng/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 9 runs-on: ubuntu-latest 11 - name: Build Fuzzers 13 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 15 oss-fuzz-project-name: 'harfbuzz' 16 dry-run: false 17 - name: Run Fuzzers 18 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 20 oss-fuzz-project-name: 'harfbuzz' 21 fuzz-seconds: 600 [all …]
|
/external/jsoup/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 11 oss-fuzz-project-name: 'jsoup' 12 dry-run: false 14 - name: Run Fuzzers 15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 17 oss-fuzz-project-name: 'jsoup' 18 fuzz-seconds: 600 [all …]
|
/external/libavc/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 10 - name: Build Fuzzers 12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 14 oss-fuzz-project-name: 'libavc' 16 - name: Run Fuzzers 17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 19 oss-fuzz-project-name: 'libavc' 21 fuzz-seconds: 600 22 - name: Upload Crash [all …]
|
/external/libultrahdr/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 10 - name: Build Fuzzers 12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 14 oss-fuzz-project-name: 'libultrahdr' 16 - name: Run Fuzzers 17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 19 oss-fuzz-project-name: 'libultrahdr' 21 fuzz-seconds: 600 22 - name: Upload Crash [all …]
|
/external/libxaac/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 10 - name: Build Fuzzers 12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 14 oss-fuzz-project-name: 'libxaac' 16 - name: Run Fuzzers 17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 19 oss-fuzz-project-name: 'libxaac' 21 fuzz-seconds: 600 22 - name: Upload Crash [all …]
|
/external/libmpeg2/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 10 - name: Build Fuzzers 12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 14 oss-fuzz-project-name: 'libmpeg2' 16 - name: Run Fuzzers 17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 19 oss-fuzz-project-name: 'libmpeg2' 21 fuzz-seconds: 600 22 - name: Upload Crash [all …]
|
/external/libhevc/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 5 runs-on: ubuntu-latest 10 - name: Build Fuzzers 12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 14 oss-fuzz-project-name: 'libhevc' 16 - name: Run Fuzzers 17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 19 oss-fuzz-project-name: 'libhevc' 21 fuzz-seconds: 600 22 - name: Upload Crash [all …]
|
/external/fmtlib/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 9 runs-on: ubuntu-latest 11 - name: Build fuzzers 13 …uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@92182553173581f871130c71c71b17f003d47b0a … 15 oss-fuzz-project-name: 'fmt' 16 dry-run: false 18 - name: Run fuzzers 19 …uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@92182553173581f871130c71c71b17f003d47b0a # … 21 oss-fuzz-project-name: 'fmt' 22 fuzz-seconds: 300 [all …]
|
/external/scapy/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 12 runs-on: ubuntu-latest 15 group: ${{ github.workflow }}-${{ github.ref }} 16 cancel-in-progress: true 19 - name: Build Fuzzers 21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 23 oss-fuzz-project-name: 'scapy' 25 dry-run: false 26 allowed-broken-targets-percentage: 0 27 - name: Run Fuzzers [all …]
|
/external/python/cpython3/Modules/_xxtestfuzz/ |
D | README.rst | 1 Fuzz Tests for CPython 4 These fuzz tests are designed to be included in Google's `oss-fuzz`_ project. 6 oss-fuzz works against a library exposing a function of the form 9 some toy values -- no fuzzing occurs in Python's test suite. 11 oss-fuzz will regularly pull from CPython, discover all the tests in 12 ``fuzz_tests.txt``, and run them -- so adding a new test here means it will 13 automatically be run in oss-fuzz, while also being smoke-tested as part of 19 Adding a new fuzz test 20 ---------------------- 22 Add the test name on a new line in ``fuzz_tests.txt``. [all …]
|
/external/flac/.github/workflows/ |
D | cifuzz.yml | 1 name: CIFuzz 6 - master 7 - 1.3.x 10 runs-on: ubuntu-latest 12 fail-fast: false 16 - name: Build Fuzzers (${{ matrix.sanitizer }}) 18 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 20 oss-fuzz-project-name: 'flac' 23 - name: Run Fuzzers (${{ matrix.sanitizer }}) 24 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master [all …]
|
/external/selinux/.github/workflows/ |
D | cifuzz.yml | 1 --- 2 name: CIFuzz 6 - master 9 - master 12 runs-on: ubuntu-latest 15 fail-fast: false 19 - name: Build Fuzzers (${{ matrix.sanitizer }}) 21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 23 oss-fuzz-project-name: 'selinux' 24 dry-run: false [all …]
|
/external/jazzer-api/docs/ |
D | findings.md | 5 …r is used to fuzz JVM projects in OSS-Fuzz, further findings are listed [on the OSS-Fuzz issue tra… 11 | Project … 12 …--------------------------------------------------------------------------------------------------… 13 …62a941) | [CVE-2022-41853](https://nvd.nist.gov/vuln/detail/CVE-2022-41853) | [OSS-F… 14 …-h4h5-3hr4-j3g2) | [CV… 15 …-01-18) … 16 …-01-18) … 17 …-wrvw-hg22-4m67) | [CV… 18 …-m72m-mhq2-9p6c) … 19 …-compress](https://commons.apache.org/proper/commons-compress/) … [all …]
|
/external/openthread/.github/workflows/ |
D | fuzz.yml | 12 # 3. Neither the name of the copyright holder nor the 29 name: CIFuzz 34 - 'main' 37 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 38 cancel-in-progress: true 40 permissions: # added using https://github.com/step-security/secure-workflows 45 runs-on: ubuntu-24.04 47 - name: Harden Runner 48 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 50 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs [all …]
|
/external/zstd/.github/workflows/ |
D | dev-long-tests.yml | 1 name: dev-long-tests 5 group: long-${{ github.ref }} 6 cancel-in-progress: true 12 permissions: read-all 15 make-all: 16 runs-on: ubuntu-latest 18 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # tag=v4.1.1 19 - name: make all 23 make-test: 24 runs-on: ubuntu-latest [all …]
|
/external/pigweed/pw_toolchain/host_clang/ |
D | toolchains.gni | 7 # https://www.apache.org/licenses/LICENSE-2.0 28 # For example, the static analysis toolchains that run `clang-tidy` instead 41 # Indicates if this build is a part of OSS-Fuzz, which needs to be able to 43 # should only be used for OSS-Fuzz. 59 # TODO: b/234888755 - amend toolchain declaration process to 70 # OSS-Fuzz uses -stdlib=libc++, which isn't included in the CIPD-provided 81 name = "host_clang_debug" 94 name = "host_clang_speed_optimized" 107 name = "host_clang_size_optimized" 119 fuzz = { [all …]
|
1234