|
|
--- |
|
|
layout: default |
|
|
title: Ideal integration |
|
|
parent: Advanced topics |
|
|
nav_order: 1 |
|
|
permalink: /advanced-topics/ideal-integration/ |
|
|
--- |
|
|
|
|
|
# Ideal integration with OSS-Fuzz |
|
|
{: .no_toc} |
|
|
|
|
|
OSS projects have different build and test systems. We can't expect them all to |
|
|
implement and maintain fuzz targets or integrate them with OSS-Fuzz in the same |
|
|
way. However, we do have recommendations. |
|
|
|
|
|
This page documents several features (starting from the easiest) that will make |
|
|
automated fuzzing simple and efficient, and will help you catch regressions |
|
|
early in the development cycle. This simple |
|
|
[example](https://github.com/google/oss-fuzz/tree/master/projects/example/my-api-repo) |
|
|
covers most of the items. |
|
|
|
|
|
- TOC |
|
|
{:toc} |
|
|
--- |
|
|
|
|
|
## Summary |
|
|
|
|
|
Every [fuzz target](https://llvm.org/docs/LibFuzzer.html#fuzz-target): |
|
|
* Is [maintained by code owners](#fuzz-target) in their RCS (Git, SVN, etc). |
|
|
* Is [built with the rest of the tests](#build-support) - no bit rot! |
|
|
* Has a [seed corpus](#seed-corpus) with good [code coverage](#coverage). |
|
|
* Has a [dictionary](#dictionary), if applicable. |
|
|
* Is [continuously tested on the seed corpus](#regression-testing) with |
|
|
[ASan/UBSan/MSan](https://github.com/google/sanitizers). |
|
|
* Is [fast and has no OOMs](#performance). |
|
|
|
|
|
## Fuzz Target |
|
|
|
|
|
The code of the [fuzz target(s)](https://llvm.org/docs/LibFuzzer.html#fuzz-target) should be |
|
|
part of the project's source code repository. All fuzz targets should be easily |
|
|
discoverable (reside in the same directory, follow the same naming pattern, |
|
|
etc.). |
|
|
|
|
|
This makes it easy to maintain the fuzzers and minimizes breakages that can |
|
|
arise as source code changes over time. |
|
|
|
|
|
Make sure to fuzz the target locally for a small period of time to ensure that |
|
|
it does not crash, hang, or run out of memory instantly. Also make sure that the fuzzer can |
|
|
make at least some progress. If you're having trouble, read about [what makes a good fuzz |
|
|
target](https://github.com/google/fuzzing/blob/master/docs/good-fuzz-target.md). |
|
|
|
|
|
The interface between the [fuzz target](https://llvm.org/docs/LibFuzzer.html#fuzz-target) |
|
|
and the fuzzing engines is C, so you can use either C or C++ to implement the |
|
|
fuzz target. Make sure to not return values other than **zero** [^1]. |
|
|
|
|
|
Examples: |
|
|
[boringssl](https://github.com/google/boringssl/tree/master/fuzz), |
|
|
[SQLite](https://www.sqlite.org/src/artifact/ad79e867fb504338), |
|
|
[s2n](https://github.com/awslabs/s2n/tree/master/tests/fuzz), |
|
|
[openssl](https://github.com/openssl/openssl/tree/master/fuzz), |
|
|
[FreeType](http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/tools/ftfuzzer), |
|
|
[re2](https://github.com/google/re2/tree/master/re2/fuzzing), |
|
|
[harfbuzz](https://github.com/behdad/harfbuzz/tree/master/test/fuzzing), |
|
|
[pcre2](https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_fuzzsupport.c?view=markup), |
|
|
[ffmpeg](https://github.com/FFmpeg/FFmpeg/blob/master/tools/target_dec_fuzzer.c). |
|
|
|
|
|
[^1]: While LibFuzzer uses a non-zero value as a signal to discard inputs other fuzzers in |
|
|
use by OSS-Fuzz do not necessarily support this behavior. (Discarding inputs can be used |
|
|
to stop a fuzzer from exploring further, which should only be used with good reason.) |
|
|
|
|
|
## Build support |
|
|
|
|
|
Many different build systems exist in the open-source world. The less OSS-Fuzz |
|
|
knows about them, the better it can scale. |
|
|
|
|
|
An ideal build integration for OSS-Fuzz looks like this: |
|
|
* For every fuzz target `foo` in the project, there is a build rule that |
|
|
builds `foo_fuzzer`, a binary that: |
|
|
* Contains the fuzzing entry point. |
|
|
* Contains (`LLVMFuzzerTestOneInput`) and all the code it depends on. |
|
|
* Uses the `main()` function from `$LIB_FUZZING_ENGINE` (env var [provided]({{ site.baseurl }}/getting-started/new-project-guide/) by OSS-Fuzz environment). |
|
|
* Since the build system supports changing the compiler and passing extra compiler |
|
|
flags, the build command for `foo_fuzzer` looks similar to this: |
|
|
|
|
|
```bash |
|
|
# Assume the following env vars are set: |
|
|
# CC, CXX, CFLAGS, CXXFLAGS, LIB_FUZZING_ENGINE |
|
|
$ make_or_whatever_other_command foo_fuzzer |
|
|
``` |
|
|
|
|
|
This minimizes OSS-Fuzz-specific configuration, making your fuzzing more robust. |
|
|
|
|
|
There is no point in hardcoding the exact compiler flags in the build system |
|
|
because they a) may change and b) depend on the fuzzing engine and sanitizer |
|
|
being used. |
|
|
|
|
|
## Seed Corpus |
|
|
|
|
|
The *seed corpus* is a set of test inputs, stored as individual files, provided |
|
|
to the fuzz target as a starting point (to "seed" the mutations). The quality of |
|
|
the seed corpus has a huge impact on fuzzing efficiency; the higher the quality, |
|
|
the easier it is for the fuzzer to discover new code paths. The ideal corpus is |
|
|
a minimal set of inputs that provides maximal code coverage. |
|
|
|
|
|
For better OSS-Fuzz integration, the seed corpus should be available in |
|
|
revision control (it can be the same as or different from the source code). It |
|
|
should be regularly extended with the inputs that (used to) trigger bugs and/or |
|
|
touch new parts of the code. |
|
|
|
|
|
Examples: |
|
|
[boringssl](https://github.com/google/boringssl/tree/master/fuzz), |
|
|
[openssl](https://github.com/openssl/openssl/tree/master/fuzz), |
|
|
[nss](https://github.com/mozilla/nss-fuzzing-corpus) (corpus in a separate repo). |
|
|
|
|
|
## Dictionary |
|
|
|
|
|
For some input types, a simple dictionary of tokens used by the input language |
|
|
can have a dramatic impact on fuzzing efficiency. For example, when fuzzing an |
|
|
XML parser, a dictionary of XML tokens is helpful. AFL++ has a |
|
|
[collection](https://github.com/AFLplusplus/AFLplusplus/tree/master/dictionaries) |
|
|
of dictionaries for popular data formats. Ideally, a dictionary should be |
|
|
maintained alongside the fuzz target, and it must use [correct |
|
|
syntax](https://llvm.org/docs/LibFuzzer.html#dictionaries). |
|
|
|
|
|
## Coverage |
|
|
|
|
|
For a fuzz target to be useful, it must have good coverage in the code that it |
|
|
is testing. You can view the coverage for your fuzz targets by looking at the |
|
|
[fuzzer stats]({{ site.baseurl }}/further-reading/clusterfuzz#fuzzer-stats) |
|
|
dashboard on ClusterFuzz, as well as [coverage reports]({{ site.baseurl |
|
|
}}/further-reading/clusterfuzz#coverage-reports). |
|
|
|
|
|
To generate an aggregated code coverage report for your project, please see the |
|
|
[code coverage]({{ site.baseurl }}/advanced-topics/code-coverage) page. |
|
|
|
|
|
Coverage can often be improved by adding dictionaries, more inputs for seed |
|
|
corpora, and fixing timeouts/out-of-memory bugs in your targets. |
|
|
|
|
|
## Regression Testing |
|
|
|
|
|
Fuzz targets should be regularly tested (not necessarily fuzzed!) as a part of |
|
|
the project's regression testing process. One way to do so is to link the fuzz |
|
|
target with a simple standalone driver |
|
|
([example](https://github.com/llvm-mirror/compiler-rt/tree/master/lib/fuzzer/standalone)) |
|
|
that runs the provided inputs, then use this driver with the seed corpus created |
|
|
in previous step. We recommend you use |
|
|
[sanitizers](https://github.com/google/sanitizers) during regression testing. |
|
|
|
|
|
Examples: [SQLite](https://www.sqlite.org/src/artifact/d9f1a6f43e7bab45), |
|
|
[openssl](https://github.com/openssl/openssl/blob/master/fuzz/test-corpus.c). |
|
|
|
|
|
## Performance |
|
|
|
|
|
Fuzz targets should perform well, because high memory usage and/or slow |
|
|
execution speed can slow the down the growth of coverage and finding of new |
|
|
bugs. ClusterFuzz provides a [performance analyzer]({{ site.baseurl |
|
|
}}/further-reading/clusterfuzz/#performance-analyzer) for each fuzz target that |
|
|
shows problems that are impacting performance. |
|
|
|
|
|
## Not a project member? |
|
|
|
|
|
If you are a member of the project you want to fuzz, most of the steps above are |
|
|
simple. However in some cases, someone outside the project team may want to fuzz |
|
|
the code, and the project maintainers are not interested in helping. |
|
|
|
|
|
In such cases, we can host the fuzz targets, dictionaries, etc. in OSS-Fuzz's |
|
|
repository and mention them in the Dockerfile. It's not ideal, because the fuzz |
|
|
targets will not be continuously tested, so may quickly bitrot. |
|
|
|
|
|
Examples: [libxml2](https://github.com/google/oss-fuzz/tree/master/projects/libxml2), |
|
|
[c-ares](https://github.com/google/oss-fuzz/tree/master/projects/c-ares), [expat](https://github.com/google/oss-fuzz/tree/master/projects/expat). |
|
|
|
|
|
If you are not a project maintainer, we may not be able to CC you to security |
|
|
bugs found by OSS-Fuzz. |
|
|
|