[docs] Update the glossary page to depend on google/fuzzing repo + minor tweaks. (#2659)

* [docs] Update the glossary page to depend on google/fuzzing repo + minor tweaks.

* fix a broken link
This commit is contained in:
Max Moroz 2019-08-06 08:18:46 -07:00 committed by GitHub
parent 1d519ac1ea
commit 3a22d40996
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 33 additions and 69 deletions

View File

@ -1,91 +1,55 @@
# Glossary # Glossary
Naming things is hard, so this page tries to reduce confusion around fuzzing-related terminology. For general fuzzing terms, see the [glossary] from [google/fuzzing] project,
## Corpus [glossary]: https://github.com/google/fuzzing/blob/master/docs/glossary.md
Or **test corpus**, or **fuzzing corpus**.<BR> [google/fuzzing]: https://github.com/google/fuzzing
A set of [test inputs](#test-input). In most contexts, it refers to a set of minimal test inputs that generate maximal code coverage.
## Cross-pollination ## OSS-Fuzz specific terms
The term is taken from botany, where one plant pollinates a plant of another variety.
In fuzzing, cross-pollination means using a corpus for one
[fuzz target](#fuzz-target) to expand a [corpus](#corpus) for another fuzz target.
For example, if there are two libraries that process the same common data
format, it is often benefitial to cross-pollinate their respective corpora.
## Fuzz Target ### ClusterFuzz
Or **Target Function**, or **Fuzzing Target Function**, or **Fuzzing Entry Point**.<BR>
A function to which we apply fuzzing. A [specific signature](http://libfuzzer.info#fuzz-target) is required for OSS-Fuzz.
Examples: [openssl](https://github.com/openssl/openssl/blob/master/fuzz/x509.c),
[re2](https://github.com/google/re2/blob/master/re2/fuzzing/re2_fuzzer.cc),
[SQLite](https://www.sqlite.org/src/artifact/ad79e867fb504338).
A fuzz target can be used to [reproduce bug reports](reproducing.md). A scalable fuzzing infrastructure that is used for OSS-Fuzz backend.
It is recommended to use it for regression testing as well (see [ideal integration](ideal_integration.md)). [ClusterFuzz] is also used to fuzz Chrome and many other projects. A quick
overview of ClusterFuzz user interface is available on this [page].
## Fuzzer [page]: clusterfuzz.md
[ClusterFuzz]: https://github.com/google/clusterfuzz
The most overloaded term and used in a variety of contexts, which makes it bad. ### Fuzz Target
Sometimes, "Fuzzer" is referred to a [fuzz target](#fuzz-target),
a [fuzzing engine](#fuzzing-engine),
a [mutation engine](#mutation-engine),
a [test generator](#test-generator) or
a [fuzzer build](#job-type).
## Fuzzing Engine In addition to its general definition, in OSS-Fuzz a fuzz target can be used to
[reproduce bug reports](reproducing.md). It is recommended to use it for
regression testing as well (see [ideal integration](ideal_integration.md)).
A tool that tries to find interesting inputs for a [fuzz target](#fuzz-target) by executing it. ### Job type
Examples: [libFuzzer](http://libfuzzer.info),
[AFL](lcamtuf.coredump.cx/afl/),
[honggfuzz](https://github.com/google/honggfuzz), etc
See related terms [Mutation Engine](#mutation-engine) and [Test Generator](#test-generator). Or **Fuzzer Build**.
## Job type This refers to a build that contains all the [fuzz targets] for a given
[project](#project), is run with a specific [fuzzing engine], in a specific
build mode (e.g. with enabled/disabled assertions), and optionally combined
with a [sanitizer].
Or **Fuzzer Build**.<BR> For example, we have a "libfuzzer_asan_sqlite" job type, indicating a build of
A [ClusterFuzz](clusterfuzz.md)-specific term. all sqlite3 [fuzz targets] using [libFuzzer](http://libfuzzer.info) and
This refers to a build that contains all the [fuzz targets](#fuzz-target) for a given [project](#project), is run [ASan](http://clang.llvm.org/docs/AddressSanitizer.html).
with a specific [fuzzing engine](#fuzzing-engine), in a specific build mode (e.g. with enabled/disabled assertions),
and optionally combined with a [sanitizer](#sanitizer).
For example, we have a "libfuzzer_asan_sqlite" job type, indicating a build of all sqlite3 [fuzz targets](#fuzz-target) using ### Project
[libFuzzer](http://libfuzzer.info) and [ASan](http://clang.llvm.org/docs/AddressSanitizer.html).
## Mutation Engine
A tool that takes a set of testcases as input and creates their mutated versions.
It is just a generator and does not feed the mutations to [fuzz target](#fuzz-target).
Example: [radamsa](https://github.com/aoh/radamsa) (a generic test mutator).
## Project
A project is an open source software project that is integrated with OSS-Fuzz. A project is an open source software project that is integrated with OSS-Fuzz.
Each project has a single set of configuration files Each project has a single set of configuration files
(example: [expat](https://github.com/google/oss-fuzz/tree/master/projects/expat)) and (example: [expat](https://github.com/google/oss-fuzz/tree/master/projects/expat))
may have one or more [fuzz targets](#fuzz-target) and may have one or more [fuzz targets]
(example: [openssl](https://github.com/openssl/openssl/blob/master/fuzz/)). (example: [openssl](https://github.com/openssl/openssl/blob/master/fuzz/)).
## Reproducer ### Reproducer
Or a **testcase**.<BR>
A [test input](#test-input) that causes a specific bug to reproduce.
## [Sanitizer](https://github.com/google/sanitizers) Or a **testcase**.
A [dynamic testing](https://en.wikipedia.org/wiki/Dynamic_testing) tool that can detect bugs during program execution.
Examples:
[ASan](http://clang.llvm.org/docs/AddressSanitizer.html),
[DFSan](http://clang.llvm.org/docs/DataFlowSanitizer.html),
[LSan](http://clang.llvm.org/docs/LeakSanitizer.html),
[MSan](http://clang.llvm.org/docs/MemorySanitizer.html),
[TSan](http://clang.llvm.org/docs/ThreadSanitizer.html),
[UBSan](http://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html).
## Test Generator A [test input] that causes a specific bug to reproduce.
A tool that generates testcases from scratch according to some rules or grammar.
Examples:
[csmith](https://embed.cs.utah.edu/csmith/) (a test generator for C language),
[cross_fuzz](http://lcamtuf.coredump.cx/cross_fuzz/) (a cross-document DOM binding test generator).
## Test Input [fuzz targets]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target
A sequence of bytes that is used as input to a [fuzz target](#fuzz-target). [fuzzing engine]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzzing-engine
Typically, a test input is stored in a separate file. [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer
[test input]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#test-input