mirror of https://github.com/google/oss-fuzz.git
[docs] Update the glossary page to depend on google/fuzzing repo + minor tweaks. (#2659)
* [docs] Update the glossary page to depend on google/fuzzing repo + minor tweaks. * fix a broken link
This commit is contained in:
parent
1d519ac1ea
commit
3a22d40996
102
docs/glossary.md
102
docs/glossary.md
|
@ -1,91 +1,55 @@
|
||||||
# Glossary
|
# Glossary
|
||||||
|
|
||||||
Naming things is hard, so this page tries to reduce confusion around fuzzing-related terminology.
|
For general fuzzing terms, see the [glossary] from [google/fuzzing] project,
|
||||||
|
|
||||||
## Corpus
|
[glossary]: https://github.com/google/fuzzing/blob/master/docs/glossary.md
|
||||||
Or **test corpus**, or **fuzzing corpus**.<BR>
|
[google/fuzzing]: https://github.com/google/fuzzing
|
||||||
A set of [test inputs](#test-input). In most contexts, it refers to a set of minimal test inputs that generate maximal code coverage.
|
|
||||||
|
|
||||||
## Cross-pollination
|
## OSS-Fuzz specific terms
|
||||||
The term is taken from botany, where one plant pollinates a plant of another variety.
|
|
||||||
In fuzzing, cross-pollination means using a corpus for one
|
|
||||||
[fuzz target](#fuzz-target) to expand a [corpus](#corpus) for another fuzz target.
|
|
||||||
For example, if there are two libraries that process the same common data
|
|
||||||
format, it is often benefitial to cross-pollinate their respective corpora.
|
|
||||||
|
|
||||||
## Fuzz Target
|
### ClusterFuzz
|
||||||
Or **Target Function**, or **Fuzzing Target Function**, or **Fuzzing Entry Point**.<BR>
|
|
||||||
A function to which we apply fuzzing. A [specific signature](http://libfuzzer.info#fuzz-target) is required for OSS-Fuzz.
|
|
||||||
Examples: [openssl](https://github.com/openssl/openssl/blob/master/fuzz/x509.c),
|
|
||||||
[re2](https://github.com/google/re2/blob/master/re2/fuzzing/re2_fuzzer.cc),
|
|
||||||
[SQLite](https://www.sqlite.org/src/artifact/ad79e867fb504338).
|
|
||||||
|
|
||||||
A fuzz target can be used to [reproduce bug reports](reproducing.md).
|
A scalable fuzzing infrastructure that is used for OSS-Fuzz backend.
|
||||||
It is recommended to use it for regression testing as well (see [ideal integration](ideal_integration.md)).
|
[ClusterFuzz] is also used to fuzz Chrome and many other projects. A quick
|
||||||
|
overview of ClusterFuzz user interface is available on this [page].
|
||||||
|
|
||||||
## Fuzzer
|
[page]: clusterfuzz.md
|
||||||
|
[ClusterFuzz]: https://github.com/google/clusterfuzz
|
||||||
|
|
||||||
The most overloaded term and used in a variety of contexts, which makes it bad.
|
### Fuzz Target
|
||||||
Sometimes, "Fuzzer" is referred to a [fuzz target](#fuzz-target),
|
|
||||||
a [fuzzing engine](#fuzzing-engine),
|
|
||||||
a [mutation engine](#mutation-engine),
|
|
||||||
a [test generator](#test-generator) or
|
|
||||||
a [fuzzer build](#job-type).
|
|
||||||
|
|
||||||
## Fuzzing Engine
|
In addition to its general definition, in OSS-Fuzz a fuzz target can be used to
|
||||||
|
[reproduce bug reports](reproducing.md). It is recommended to use it for
|
||||||
|
regression testing as well (see [ideal integration](ideal_integration.md)).
|
||||||
|
|
||||||
A tool that tries to find interesting inputs for a [fuzz target](#fuzz-target) by executing it.
|
### Job type
|
||||||
Examples: [libFuzzer](http://libfuzzer.info),
|
|
||||||
[AFL](lcamtuf.coredump.cx/afl/),
|
|
||||||
[honggfuzz](https://github.com/google/honggfuzz), etc
|
|
||||||
|
|
||||||
See related terms [Mutation Engine](#mutation-engine) and [Test Generator](#test-generator).
|
Or **Fuzzer Build**.
|
||||||
|
|
||||||
## Job type
|
This refers to a build that contains all the [fuzz targets] for a given
|
||||||
|
[project](#project), is run with a specific [fuzzing engine], in a specific
|
||||||
|
build mode (e.g. with enabled/disabled assertions), and optionally combined
|
||||||
|
with a [sanitizer].
|
||||||
|
|
||||||
Or **Fuzzer Build**.<BR>
|
For example, we have a "libfuzzer_asan_sqlite" job type, indicating a build of
|
||||||
A [ClusterFuzz](clusterfuzz.md)-specific term.
|
all sqlite3 [fuzz targets] using [libFuzzer](http://libfuzzer.info) and
|
||||||
This refers to a build that contains all the [fuzz targets](#fuzz-target) for a given [project](#project), is run
|
[ASan](http://clang.llvm.org/docs/AddressSanitizer.html).
|
||||||
with a specific [fuzzing engine](#fuzzing-engine), in a specific build mode (e.g. with enabled/disabled assertions),
|
|
||||||
and optionally combined with a [sanitizer](#sanitizer).
|
|
||||||
|
|
||||||
For example, we have a "libfuzzer_asan_sqlite" job type, indicating a build of all sqlite3 [fuzz targets](#fuzz-target) using
|
### Project
|
||||||
[libFuzzer](http://libfuzzer.info) and [ASan](http://clang.llvm.org/docs/AddressSanitizer.html).
|
|
||||||
|
|
||||||
|
|
||||||
## Mutation Engine
|
|
||||||
A tool that takes a set of testcases as input and creates their mutated versions.
|
|
||||||
It is just a generator and does not feed the mutations to [fuzz target](#fuzz-target).
|
|
||||||
Example: [radamsa](https://github.com/aoh/radamsa) (a generic test mutator).
|
|
||||||
|
|
||||||
## Project
|
|
||||||
|
|
||||||
A project is an open source software project that is integrated with OSS-Fuzz.
|
A project is an open source software project that is integrated with OSS-Fuzz.
|
||||||
Each project has a single set of configuration files
|
Each project has a single set of configuration files
|
||||||
(example: [expat](https://github.com/google/oss-fuzz/tree/master/projects/expat)) and
|
(example: [expat](https://github.com/google/oss-fuzz/tree/master/projects/expat))
|
||||||
may have one or more [fuzz targets](#fuzz-target)
|
and may have one or more [fuzz targets]
|
||||||
(example: [openssl](https://github.com/openssl/openssl/blob/master/fuzz/)).
|
(example: [openssl](https://github.com/openssl/openssl/blob/master/fuzz/)).
|
||||||
|
|
||||||
## Reproducer
|
### Reproducer
|
||||||
Or a **testcase**.<BR>
|
|
||||||
A [test input](#test-input) that causes a specific bug to reproduce.
|
|
||||||
|
|
||||||
## [Sanitizer](https://github.com/google/sanitizers)
|
Or a **testcase**.
|
||||||
A [dynamic testing](https://en.wikipedia.org/wiki/Dynamic_testing) tool that can detect bugs during program execution.
|
|
||||||
Examples:
|
|
||||||
[ASan](http://clang.llvm.org/docs/AddressSanitizer.html),
|
|
||||||
[DFSan](http://clang.llvm.org/docs/DataFlowSanitizer.html),
|
|
||||||
[LSan](http://clang.llvm.org/docs/LeakSanitizer.html),
|
|
||||||
[MSan](http://clang.llvm.org/docs/MemorySanitizer.html),
|
|
||||||
[TSan](http://clang.llvm.org/docs/ThreadSanitizer.html),
|
|
||||||
[UBSan](http://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html).
|
|
||||||
|
|
||||||
## Test Generator
|
A [test input] that causes a specific bug to reproduce.
|
||||||
A tool that generates testcases from scratch according to some rules or grammar.
|
|
||||||
Examples:
|
|
||||||
[csmith](https://embed.cs.utah.edu/csmith/) (a test generator for C language),
|
|
||||||
[cross_fuzz](http://lcamtuf.coredump.cx/cross_fuzz/) (a cross-document DOM binding test generator).
|
|
||||||
|
|
||||||
## Test Input
|
[fuzz targets]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target
|
||||||
A sequence of bytes that is used as input to a [fuzz target](#fuzz-target).
|
[fuzzing engine]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzzing-engine
|
||||||
Typically, a test input is stored in a separate file.
|
[sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer
|
||||||
|
[test input]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#test-input
|
||||||
|
|
Loading…
Reference in New Issue