Jelmer Vernooij 8afbc69cb6 Fix formatting | 2 tygodni temu | |
---|---|---|
.. | ||
dictionaries | 6 miesięcy temu | |
fuzz-targets | 2 tygodni temu | |
oss-fuzz-scripts | 2 miesięcy temu | |
README.md | 6 miesięcy temu |
This directory contains files related to Dulwich's suite of fuzz tests that are executed daily on automated infrastructure provided by OSS-Fuzz. This document aims to provide necessary information for working with fuzzing in Dulwich.
The latest details regarding OSS-Fuzz test status, including build logs and coverage reports, is available on the Open Source Fuzzing Introspection website.
There are many ways to contribute to Dulwich's fuzzing efforts! Contributions are welcomed through issues, discussions, or pull requests on this repository.
Areas that are particularly appreciated include:
For everything else, such as expanding test coverage, optimizing test performance, or enhancing error detection capabilities, jump into the "Getting Started" section below.
[!TIP] New to fuzzing or unfamiliar with OSS-Fuzz?
These resources are an excellent place to start:
- OSS-Fuzz documentation - Continuous fuzzing service for open source software.
- Google/fuzzing - Tutorials, examples, discussions, research proposals, and other resources related to fuzzing.
- CNCF Fuzzing Handbook - A comprehensive guide for fuzzing open source software.
- Efficient Fuzzing Guide by The Chromium Project - Explores strategies to enhance the effectiveness of your fuzz tests, recommended for those looking to optimize their testing efforts.
Before contributing to fuzzing efforts, ensure Python and Docker are installed on your machine. Docker is required for running fuzzers in containers provided by OSS-Fuzz. Install Docker following the official guide if you do not already have it.
Review the fuzz-targets/
directory to familiarize yourself with how existing tests are implemented. See
the Files & Directories Overview for more details on the directory structure.
Start by reviewing the Atheris documentation and the section on Running Fuzzers Locally to begin writing or improving fuzz tests.
The fuzzing/
directory is organized into three key areas:
fuzz-targets/
)Contains Python files for each fuzz test.
Things to Know:
fuzz_<API Under Test>.py
, where <API Under Test>
indicates the
functionality targeted by the test.try
/except
block to avoid false
positives that halt the fuzzing engine.dictionaries/
)Provides hints to the fuzzing engine about inputs that might trigger unique code paths. Each fuzz target may have a
corresponding .dict
file. For information about dictionary syntax, refer to
the LibFuzzer documentation on the subject.
Things to Know:
oss-fuzz-scripts/
)Includes scripts for building and integrating fuzz targets with OSS-Fuzz:
container-environment-bootstrap.sh
- Sets up the execution environment. It is responsible for fetching default
dictionary entries and ensuring all required build dependencies are installed and up-to-date.build.sh
- Executed within the Docker container, this script builds fuzz targets with necessary instrumentation
and prepares seed corpora and dictionaries for use.Where to learn more:
This approach uses Docker images provided by OSS-Fuzz for building and running fuzz tests locally. It offers comprehensive features but requires a local clone of the OSS-Fuzz repository and sufficient disk space for Docker containers.
Clone the OSS-Fuzz repository and prepare the Docker environment:
git clone --depth 1 https://github.com/google/oss-fuzz.git oss-fuzz
cd oss-fuzz
python infra/helper.py build_image dulwich
python infra/helper.py build_fuzzers --sanitizer address dulwich
[!TIP] The
build_fuzzers
command above accepts a local file path pointing to your Dulwich repository clone as the last argument. This makes it easy to build fuzz targets you are developing locally in this repository without changing anything in the OSS-Fuzz repo! For example, if you have cloned this repository (or a fork of it) into:~/code/dulwich
Then running this command would build new or modified fuzz targets using the~/code/dulwich/fuzzing/fuzz-targets
directory:> python infra/helper.py build_fuzzers --sanitizer address dulwich ~/code/dulwich > ``` Verify the build of your fuzzers with the optional `check_build` command:
shell python infra/helper.py check_build dulwich
### Run a Fuzz Target Setting an environment variable for the fuzz target argument of the execution command makes it easier to quickly select a different target between runs:
shell
specify the fuzz target without the .py extension:
export FUZZ_TARGET=fuzz_configfile
Execute the desired fuzz target:
shell python infra/helper.py run_fuzzer dulwich $FUZZ_TARGET -- -max_total_time=60 -print_final_stats=1 ```
[!TIP] In the example above, the "
-- -max_total_time=60 -print_final_stats=1
" portion of the command is optional but quite useful.Every argument provided after "
--
" in the above command is passed to the fuzzing engine directly. In this case:
-max_total_time=60
tells the LibFuzzer to stop execution after 60 seconds have elapsed.-print_final_stats=1
tells the LibFuzzer to print a summary of useful metrics about the target run upon completion.But almost any LibFuzzer option listed in the documentation should work as well.
For detailed instructions on advanced features like reproducing OSS-Fuzz issues or using the Fuzz Introspector, refer to the official OSS-Fuzz documentation.