target_id
stringlengths 16
51
| project
stringclasses 15
values | level
stringclasses 5
values | target_file
stringclasses 27
values | target_line
int64 34
10.6k
| url
stringclasses 15
values | commit
stringclasses 15
values | patch
stringlengths 306
929
| dockerfile
stringclasses 15
values | fuzzing_harness
stringclasses 15
values | build_script
stringclasses 15
values | harness_name
stringclasses 4
values | realistic_context
stringlengths 302k
464k
| realistic_call_paths
stringlengths 2
19.1k
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
lark-parser::lark:lark.py:365
|
lark-parser
|
easy
|
lark/lark.py
| 365
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/lark.py b/lark/lark.py\nindex 0bec71b..755a277 100644\n--- a/lark/lark.py\n+++ b/(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
lark-parser::lark:lark.py:376
|
lark-parser
|
easy
|
lark/lark.py
| 376
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/lark.py b/lark/lark.py\nindex 0bec71b..7b7eaeb 100644\n--- a/lark/lark.py\n+++ b/(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
lark-parser::lark:lark.py:395
|
lark-parser
|
easy
|
lark/lark.py
| 395
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/lark.py b/lark/lark.py\nindex 0bec71b..b62a2f2 100644\n--- a/lark/lark.py\n+++ b/(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
lark-parser::lark:lark.py:471
|
lark-parser
|
easy
|
lark/lark.py
| 471
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/lark.py b/lark/lark.py\nindex 0bec71b..756597d 100644\n--- a/lark/lark.py\n+++ b/(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
lark-parser::lark:lexer.py:348
|
lark-parser
|
easy
|
lark/lexer.py
| 348
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/lexer.py b/lark/lexer.py\nindex 9061d60..4b997a8 100644\n--- a/lark/lexer.py\n+++(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:common.py]\nfrom copy import deepcopy\nimport sys\nfrom types import ModuleT(...TRUNCATED)
|
[]
|
lark-parser::lark:lexer.py:381
|
lark-parser
|
easy
|
lark/lexer.py
| 381
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/lexer.py b/lark/lexer.py\nindex 9061d60..cf0f009 100644\n--- a/lark/lexer.py\n+++(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:common.py]\nfrom copy import deepcopy\nimport sys\nfrom types import ModuleT(...TRUNCATED)
|
[]
|
lark-parser::lark:load_grammar.py:518
|
lark-parser
|
easy
|
lark/load_grammar.py
| 518
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..8f9fc1c 100644\n--- a/lark(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
lark-parser::lark:load_grammar.py:707
|
lark-parser
|
easy
|
lark/load_grammar.py
| 707
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..f165226 100644\n--- a/lark(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
lark-parser::lark:load_grammar.py:788
|
lark-parser
|
easy
|
lark/load_grammar.py
| 788
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..410f090 100644\n--- a/lark(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
lark-parser::lark:load_grammar.py:806
|
lark-parser
|
easy
|
lark/load_grammar.py
| 806
|
https://github.com/lark-parser/lark
|
24f19a35f376b9320d53f4d987793fb8b1765f37
| "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..fb66464 100644\n--- a/lark(...TRUNCATED)
| "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED)
| "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED)
| "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED)
|
instrumented_fuzzer.py
| "<code>\n[start of lark:parsers:lalr_analysis.py]\n\"\"\"This module builds a LALR(1) transition-tab(...TRUNCATED)
| "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED)
|
End of preview. Expand
in Data Studio
Dataset Summary
dfuzzBench is a dataset tests systems' ability to generate directed inputs to reach a specific target line in the codebase automatically.
TODO: Details of the dataset
Dataset Structure
project: (str) - The name of the project.
level: (str) - The level of difficulty to reach the target based on the first hit time of several traditional undirected fuzzers.
target_file: (str) - The file path where the target line is located.
target_line: (int) - The line number of the target line in the target file.
url: (str) - The url of the project Github repository.
commit: (str) - The commit hash of the repository when we performed the target line selection.
patch: (str) - The patch which adds a print statement "HIT TARGET!" at the target line to indicate the target is reached and exit.
dockerfile: (str) - The Dockerfile of evaluation environment.
fuzzing_harness: (str) - The fuzzing harness, used by Oss-Fuzz.
build_script: (str) - The build script to install required dependencies for fuzzing campaigns.
realistic_context: (list) - The source code of programs retrieved with realistic retrieval.
realistic_call_paths: (list) - The valid call paths from fuzzing harness to the target function retrieved from static call graph.
- Downloads last month
- 478