target_id stringlengths 16 51 | project stringclasses 15
values | level stringclasses 5
values | target_file stringclasses 29
values | target_line int64 34 10.6k | url stringclasses 15
values | commit stringclasses 15
values | patch stringlengths 306 1.06k | dockerfile stringclasses 15
values | fuzzing_harness stringclasses 15
values | build_script stringclasses 15
values | harness_name stringclasses 4
values | realistic_context stringlengths 302k 468k | realistic_call_paths stringlengths 2 19.1k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
lark-parser::lark:load_grammar.py:1167 | lark-parser | medium | lark/load_grammar.py | 1,167 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..00c578e 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
lark-parser::lark:load_grammar.py:1170 | lark-parser | medium | lark/load_grammar.py | 1,170 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..cc790bf 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
lark-parser::lark:load_grammar.py:658 | lark-parser | medium | lark/load_grammar.py | 658 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..7704449 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of tests:test_python_grammar.py]\nimport inspect\nimport textwrap\nfrom unittest imp(...TRUNCATED) | [] |
lark-parser::lark:load_grammar.py:661 | lark-parser | medium | lark/load_grammar.py | 661 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..cc61ca2 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of tests:test_python_grammar.py]\nimport inspect\nimport textwrap\nfrom unittest imp(...TRUNCATED) | [] |
lark-parser::lark:load_grammar.py:785 | lark-parser | medium | lark/load_grammar.py | 785 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..bab9854 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
lark-parser::lark:load_grammar.py:778 | lark-parser | medium | lark/load_grammar.py | 778 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..8dc4912 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
lark-parser::lark:load_grammar.py:788 | lark-parser | medium | lark/load_grammar.py | 788 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..410f090 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
lark-parser::lark:load_grammar.py:1169 | lark-parser | medium | lark/load_grammar.py | 1,169 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..a703af8 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
lark-parser::lark:load_grammar.py:780 | lark-parser | medium | lark/load_grammar.py | 780 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..0d14c7f 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
lark-parser::lark:load_grammar.py:777 | lark-parser | medium | lark/load_grammar.py | 777 | https://github.com/lark-parser/lark | 24f19a35f376b9320d53f4d987793fb8b1765f37 | "diff --git a/lark/load_grammar.py b/lark/load_grammar.py\nindex 362a845..3d01888 100644\n--- a/lark(...TRUNCATED) | "# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");(...TRUNCATED) | "#!/usr/bin/python3\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.(...TRUNCATED) | "#!/bin/bash -eu\n# Copyright 2023 Google LLC\n#\n# Licensed under the Apache License, Version 2.0 ((...TRUNCATED) | instrumented_fuzzer.py | "<code>\n[start of lark:parsers:lalr_interactive_parser.py]\n# This module provides a LALR interacti(...TRUNCATED) | "[\n [\n {\n \"file\": \"instrumented_fuzzer.py\",\n \"function\": \"TestOneInput\"\n (...TRUNCATED) |
End of preview. Expand in Data Studio
Dataset Summary
dfuzzBench is a dataset tests systems' ability to generate directed inputs to reach a specific target line in the codebase automatically.
TODO: Details of the dataset
Dataset Structure
project: (str) - The name of the project.
level: (str) - The level of difficulty to reach the target based on the first hit time of several traditional undirected fuzzers.
target_file: (str) - The file path where the target line is located.
target_line: (int) - The line number of the target line in the target file.
url: (str) - The url of the project Github repository.
commit: (str) - The commit hash of the repository when we performed the target line selection.
patch: (str) - The patch which adds a print statement "HIT TARGET!" at the target line to indicate the target is reached and exit.
dockerfile: (str) - The Dockerfile of evaluation environment.
fuzzing_harness: (str) - The fuzzing harness, used by Oss-Fuzz.
build_script: (str) - The build script to install required dependencies for fuzzing campaigns.
realistic_context: (list) - The source code of programs retrieved with realistic retrieval.
realistic_call_paths: (list) - The valid call paths from fuzzing harness to the target function retrieved from static call graph.
- Downloads last month
- 15