Home
last modified time | relevance | path

Searched +full:oss +full:- +full:fuzz +full:- +full:project +full:- +full:name (Results 1 – 25 of 87) sorted by relevance

1234

/external/skia/fuzz/
DREADME.md8 These fuzzers are packaged in two different ways (see //BUILD.gn). There is a `fuzz` executable
9 that contains all fuzzers and is a convenient way to reproduce fuzzer-reported bugs. There are also
13 See [../site/dev/testing/fuzz.md] for more information on building and running fuzzers using the
14 `fuzz` executable.
17 We fuzz Skia using [OSS-Fuzz](https://github.com/google/oss-fuzz), which in turn uses fuzzing
18 engines such as libfuzzer, afl-fuzz, hong-fuzz, and others to fuzz Skia. OSS-Fuzz will automatically
19 [file and close bugs](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=label:Proj-skia) when
22 There is a [Skia folder](https://github.com/google/oss-fuzz/tree/master/projects/skia)
23 in the OSS-Fuzz repo that we make changes to when we want to add/remove/change the fuzzers that
25 [This](https://google.github.io/oss-fuzz/getting-started/new-project-guide/#testing-locally)
[all …]
/external/pigweed/pw_fuzzer/guides/
Dreproducing_oss_fuzz_bugs.rst1 .. _module-pw_fuzzer-guides-reproducing_oss_fuzz_bugs:
4 Using OSS-Fuzz
6 .. pigweed-module-subpage::
7 :name: pw_fuzzer
9 .. TODO: b/281139237 - Update with better instructions for downstream projects.
11 Core Pigweed is integrated with `OSS-Fuzz`_, a continuous fuzzing infrastructure
16 -------------------------
18 -------------------------
20 Bugs produced by OSS-Fuzz can be found in its `Monorail instance`_. These bugs
31 :ref:`module-pw_fuzzer-guides`.
[all …]
/external/flatbuffers/.github/workflows/
Dmain.yml1 name: OSS-Fuzz
2 permissions: read-all
7 - master
9 - include/**
10 - src/**
11 - tests/**.cpp
12 - tests/**.h
15 runs-on: ubuntu-latest
17 - name: Build Fuzzers
19 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
[all …]
/external/libbpf/.github/workflows/
Dcifuzz.yml1 ---
2 # https://google.github.io/oss-fuzz/getting-started/continuous-integration/
3 name: CIFuzz
7 - master
10 - master
13 runs-on: ubuntu-latest
16 fail-fast: false
20 - name: Build Fuzzers (${{ matrix.sanitizer }})
22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
24 oss-fuzz-project-name: 'libbpf'
[all …]
/external/capstone/.github/workflows/
Dfuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'capstone'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'capstone'
16 fuzz-seconds: 600
[all …]
/external/brotli/.github/workflows/
Dfuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'brotli'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'brotli'
16 fuzz-seconds: 600
[all …]
/external/pcre/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'pcre2'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'pcre2'
17 fuzz-seconds: 300
[all …]
/external/gson/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'gson'
12 dry-run: false
14 - name: Run Fuzzers
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
17 oss-fuzz-project-name: 'gson'
18 fuzz-seconds: 600
[all …]
/external/libusb/.github/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'libusb'
12 dry-run: false
14 - name: Run Fuzzers
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
17 oss-fuzz-project-name: 'libusb'
18 fuzz-seconds: 600
[all …]
/external/harfbuzz_ng/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
9 runs-on: ubuntu-latest
11 - name: Build Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
15 oss-fuzz-project-name: 'harfbuzz'
16 dry-run: false
17 - name: Run Fuzzers
18 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
20 oss-fuzz-project-name: 'harfbuzz'
21 fuzz-seconds: 600
[all …]
/external/jsoup/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'jsoup'
12 dry-run: false
14 - name: Run Fuzzers
15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
17 oss-fuzz-project-name: 'jsoup'
18 fuzz-seconds: 600
[all …]
/external/libavc/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libavc'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libavc'
21 fuzz-seconds: 600
22 - name: Upload Crash
[all …]
/external/libultrahdr/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libultrahdr'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libultrahdr'
21 fuzz-seconds: 600
22 - name: Upload Crash
[all …]
/external/libxaac/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libxaac'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libxaac'
21 fuzz-seconds: 600
22 - name: Upload Crash
[all …]
/external/libmpeg2/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libmpeg2'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libmpeg2'
21 fuzz-seconds: 600
22 - name: Upload Crash
[all …]
/external/libhevc/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
5 runs-on: ubuntu-latest
10 - name: Build Fuzzers
12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
14 oss-fuzz-project-name: 'libhevc'
16 - name: Run Fuzzers
17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
19 oss-fuzz-project-name: 'libhevc'
21 fuzz-seconds: 600
22 - name: Upload Crash
[all …]
/external/fmtlib/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
9 runs-on: ubuntu-latest
11 - name: Build fuzzers
13 …uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@92182553173581f871130c71c71b17f003d47b0a …
15 oss-fuzz-project-name: 'fmt'
16 dry-run: false
18 - name: Run fuzzers
19 …uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@92182553173581f871130c71c71b17f003d47b0a # …
21 oss-fuzz-project-name: 'fmt'
22 fuzz-seconds: 300
[all …]
/external/scapy/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
12 runs-on: ubuntu-latest
15 group: ${{ github.workflow }}-${{ github.ref }}
16 cancel-in-progress: true
19 - name: Build Fuzzers
21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
23 oss-fuzz-project-name: 'scapy'
25 dry-run: false
26 allowed-broken-targets-percentage: 0
27 - name: Run Fuzzers
[all …]
/external/python/cpython3/Modules/_xxtestfuzz/
DREADME.rst1 Fuzz Tests for CPython
4 These fuzz tests are designed to be included in Google's `oss-fuzz`_ project.
6 oss-fuzz works against a library exposing a function of the form
9 some toy values -- no fuzzing occurs in Python's test suite.
11 oss-fuzz will regularly pull from CPython, discover all the tests in
12 ``fuzz_tests.txt``, and run them -- so adding a new test here means it will
13 automatically be run in oss-fuzz, while also being smoke-tested as part of
19 Adding a new fuzz test
20 ----------------------
22 Add the test name on a new line in ``fuzz_tests.txt``.
[all …]
/external/flac/.github/workflows/
Dcifuzz.yml1 name: CIFuzz
6 - master
7 - 1.3.x
10 runs-on: ubuntu-latest
12 fail-fast: false
16 - name: Build Fuzzers (${{ matrix.sanitizer }})
18 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
20 oss-fuzz-project-name: 'flac'
23 - name: Run Fuzzers (${{ matrix.sanitizer }})
24 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
[all …]
/external/selinux/.github/workflows/
Dcifuzz.yml1 ---
2 name: CIFuzz
6 - master
9 - master
12 runs-on: ubuntu-latest
15 fail-fast: false
19 - name: Build Fuzzers (${{ matrix.sanitizer }})
21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
23 oss-fuzz-project-name: 'selinux'
24 dry-run: false
[all …]
/external/jazzer-api/docs/
Dfindings.md5 …r is used to fuzz JVM projects in OSS-Fuzz, further findings are listed [on the OSS-Fuzz issue tra…
11 | Project
12--------------------------------------------------------------------------------------------------…
13 …62a941) | [CVE-2022-41853](https://nvd.nist.gov/vuln/detail/CVE-2022-41853) | [OSS-F…
14-h4h5-3hr4-j3g2) | [CV…
15-01-18) …
16-01-18) …
17-wrvw-hg22-4m67) | [CV…
18-m72m-mhq2-9p6c) …
19-compress](https://commons.apache.org/proper/commons-compress/) …
[all …]
/external/openthread/.github/workflows/
Dfuzz.yml12 # 3. Neither the name of the copyright holder nor the
29 name: CIFuzz
34 - 'main'
37 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
38 cancel-in-progress: true
40 permissions: # added using https://github.com/step-security/secure-workflows
45 runs-on: ubuntu-24.04
47 - name: Harden Runner
48 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
50 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
[all …]
/external/zstd/.github/workflows/
Ddev-long-tests.yml1 name: dev-long-tests
5 group: long-${{ github.ref }}
6 cancel-in-progress: true
12 permissions: read-all
15 make-all:
16 runs-on: ubuntu-latest
18 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # tag=v4.1.1
19 - name: make all
23 make-test:
24 runs-on: ubuntu-latest
[all …]
/external/pigweed/pw_toolchain/host_clang/
Dtoolchains.gni7 # https://www.apache.org/licenses/LICENSE-2.0
28 # For example, the static analysis toolchains that run `clang-tidy` instead
41 # Indicates if this build is a part of OSS-Fuzz, which needs to be able to
43 # should only be used for OSS-Fuzz.
59 # TODO: b/234888755 - amend toolchain declaration process to
70 # OSS-Fuzz uses -stdlib=libc++, which isn't included in the CIPD-provided
81 name = "host_clang_debug"
94 name = "host_clang_speed_optimized"
107 name = "host_clang_size_optimized"
119 fuzz = {
[all …]

1234