This CL is created as a best effort to migrate test targets to the new android ownership model. If you find incorrect or unnecessary attribution in this CL, please create a separate CL to fix that. For more details please refer to the link below, <add g3 doc link> Bug: 304529413 Test: N/A Change-Id: I204c137da43a021bcebe316759d1aadaec99fe2a
ODK Fuzzing
Objective
- Run fuzzing on ODK and KDO serialize and deserialize APIs using google supported fuzzer engines to find security vulnerabilities. Any issues found by clusterfuzz will be reported to odk fuzz buganizer.
Run fuzz target on local machine
-
In order to run fuzz target locally and see code coverage, save binary input to be tested against fuzz target into a temporary corpus directory and execute following commands
$ blaze build --config=asan-fuzzer //your:target $ blaze-bin/your/target FULL_CORPUS_DIR