Max Moroz | 0266b68 | 2019-07-29 17:30:30 | [diff] [blame] | 1 | # Getting started with fuzzing in Chromium |
aizatsky | a6f8629 | 2016-03-18 00:22:24 | [diff] [blame] | 2 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 3 | This document walks through how to get started adding fuzz tests to Chromium. |
| 4 | |
| 5 | It guides you how to use our latest fuzzing technology, called [FuzzTest]. This |
| 6 | replaces earlier technology called [libfuzzer]. See the section at the end |
| 7 | for reasons why you might sometimes still want to use libfuzzer. |
aizatsky | a6f8629 | 2016-03-18 00:22:24 | [diff] [blame] | 8 | |
Max Moroz | 0266b68 | 2019-07-29 17:30:30 | [diff] [blame] | 9 | [TOC] |
aizatsky | a6f8629 | 2016-03-18 00:22:24 | [diff] [blame] | 10 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 11 | ## What to fuzz |
aizatsky | a6f8629 | 2016-03-18 00:22:24 | [diff] [blame] | 12 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 13 | You should fuzz any function which takes input from any |
| 14 | untrusted source, such as the internet. If the code parses, decodes, or |
| 15 | otherwise manipulates that input, it definitely should be fuzzed! |
aizatsky | a6f8629 | 2016-03-18 00:22:24 | [diff] [blame] | 16 | |
Adrian Taylor | e3fbcd46 | 2024-02-27 11:18:28 | [diff] [blame] | 17 | To decide how best to fuzz it, you should decide which of these two situations |
| 18 | best matches your input: |
| 19 | |
| 20 | * *Binary data*: the input is a single buffer of contiguous bytes, for example |
| 21 | an image or some binary format which your code decodes. |
| 22 | * *Function arguments*: the input is multiple different chunks of data, for |
| 23 | example the arguments to a function. |
| 24 | |
| 25 | In the latter case, go ahead and read this guide - it will show you how to use |
| 26 | our latest fuzzing technology, FuzzTest. |
| 27 | |
| 28 | If however your input more closely matches the former description - just a |
| 29 | single binary blob of data - then instead use our older fuzzing technology |
| 30 | [libfuzzer] - click that link for a separate getting started guide. (libfuzzer |
| 31 | will work a little better in these cases because if the fuzzer finds a problem, |
| 32 | the test case will exactly match the binary format.) |
| 33 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 34 | ## How to fuzz |
mmoroz | db4e66a1 | 2016-11-04 22:14:24 | [diff] [blame] | 35 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 36 | 1. Find your existing unit test target. Create a new similar target |
| 37 | alongside. (In the future, you'll be able to add them right into your |
| 38 | unit test code directly.) |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 39 | 2. Add a gn target definition a lot like a normal unit test, but with |
Adrian Taylor | a20bc5a | 2024-01-29 23:22:26 | [diff] [blame] | 40 | `fuzztests = [ list-of-fuzztests ]`. See below for details. Create a `.cc` file. |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 41 | 3. In the unit tests code, `#include "third_party/fuzztest/src/fuzztest/fuzztest.h"` |
| 42 | 4. Add a `FUZZ_TEST` macro, which might be as simple as `FUZZ_TEST(MyApiTest, ExistingFunctionWhichTakesUntrustedInput)` |
| 43 | (though you may wish to structure things differently, see below) |
| 44 | 5. Run the unit tests and ensure they pass. |
| 45 | 6. Land the CL. |
Bo Majewski | 3bd1cb8 | 2023-06-13 05:30:12 | [diff] [blame] | 46 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 47 | That's it! |
Bo Majewski | 3bd1cb8 | 2023-06-13 05:30:12 | [diff] [blame] | 48 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 49 | This fuzzer will be built automatically, using various [sanitizers], and run |
| 50 | on our distributed fuzzing infrastructure [ClusterFuzz]. If it finds bugs, |
| 51 | they'll be reported back to you. |
Bo Majewski | 3bd1cb8 | 2023-06-13 05:30:12 | [diff] [blame] | 52 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 53 | More detail in all the following sections. |
| 54 | |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 55 | ## Creating a new `FUZZ_TEST` target |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 56 | |
aizatsky | a6f8629 | 2016-03-18 00:22:24 | [diff] [blame] | 57 | ``` |
Adrian Taylor | 598c72c | 2023-11-02 09:10:54 | [diff] [blame] | 58 | import("//testing/test.gni") |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 59 | |
Adrian Taylor | 714aaa4 | 2024-03-11 13:32:16 | [diff] [blame^] | 60 | test("hypothetical_fuzztests") { |
| 61 | sources = [ "hypothetical_fuzztests.cc" ] |
aizatsky | a6f8629 | 2016-03-18 00:22:24 | [diff] [blame] | 62 | |
Adrian Taylor | 714aaa4 | 2024-03-11 13:32:16 | [diff] [blame^] | 63 | fuzztests = ['MyApiTest.MyApiCanSuccessfullyParseAnyString'] |
Juan Jose Lopez Jaimez | c43c7c1 | 2022-07-26 22:33:05 | [diff] [blame] | 64 | |
Adrian Taylor | 714aaa4 | 2024-03-11 13:32:16 | [diff] [blame^] | 65 | deps = [ |
| 66 | ":hypothetical_component", |
| 67 | "//third_party/fuzztest:fuzztest_gtest_main", |
| 68 | ] |
Max Moroz | eae4cef | 2018-11-06 00:26:28 | [diff] [blame] | 69 | } |
robert.bradford | 160c598 | 2016-08-30 17:04:30 | [diff] [blame] | 70 | ``` |
| 71 | |
Hubert Chao | 839f32aa | 2024-01-18 19:37:05 | [diff] [blame] | 72 | You may also need to add `third_party/fuzztest` to your DEPS file. |
| 73 | |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 74 | ## Adding `FUZZ_TEST` support to a target |
| 75 | |
| 76 | *** note |
| 77 | **Note:** Currently, you must create a **new** unit test target. |
| 78 | While the FuzzTest framework supports mixed unit and fuzz tests, |
| 79 | we don't yet support this option in Chromium. |
| 80 | *** |
| 81 | |
| 82 | In the near future we'll support adding `FUZZ_TEST`s alongside existing |
Adrian Taylor | a20bc5a | 2024-01-29 23:22:26 | [diff] [blame] | 83 | unit tests, even in the same .cc file. |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 84 | |
| 85 | ``` |
| 86 | if (is_linux) { |
| 87 | test("existing_unit_tests") { |
| 88 | sources = [ "existing_unit_tests.cc" ] # add FUZZ_TESTs here |
| 89 | |
Adrian Taylor | a20bc5a | 2024-01-29 23:22:26 | [diff] [blame] | 90 | fuzztests = ['MyApiTest.ApiWorksAlways'] |
| 91 | # Add this! |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 92 | |
| 93 | deps = [ |
| 94 | ":existing_component", |
| 95 | # Other stuff |
| 96 | ] |
| 97 | } |
| 98 | } |
| 99 | ``` |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 100 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 101 | This will: |
| 102 | * add a dependency on the appropriate fuzztest libraries; |
| 103 | * cause the target to be built on all our [fuzzer builders] |
| 104 | * construct metadata so that [ClusterFuzz] knows how to run the resulting |
| 105 | binary. |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 106 | |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 107 | This relies on something, somewhere, calling `base::LaunchUnitTests` within |
| 108 | your executable to initialize FuzzTest. This should be the case already. |
| 109 | |
Adrian Taylor | f4c9616 | 2023-10-30 09:25:41 | [diff] [blame] | 110 | (If you have other code targets, such as `source_set`s, contributing to your |
| 111 | unit test target they may need to explicitly depend upon `//third_party/fuzztest` |
| 112 | too.) |
| 113 | |
Adrian Taylor | 82c71d0 | 2023-10-30 19:13:43 | [diff] [blame] | 114 | *** note |
| 115 | **Note:** Again, this is not yet supported! |
| 116 | *** |
| 117 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 118 | ## Adding `FUZZ_TEST`s in the code |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 119 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 120 | First, `#include "third_party/fuzztest/src/fuzztest/fuzztest.h"`. |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 121 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 122 | Then, it's normal to create a function named after the thing you're trying to |
| 123 | prove, with assertions to prove it. |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 124 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 125 | For instance, |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 126 | |
| 127 | ``` |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 128 | void MyApiCanSuccessfullyParseAnyString(std::string input) { |
| 129 | bool success = MyApi(input); |
| 130 | EXPECT_TRUE(success); |
| 131 | } |
| 132 | ``` |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 133 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 134 | Then, declare the `FUZZ_TEST` macro: |
Max Moroz | 9b37075 | 2018-03-20 22:05:32 | [diff] [blame] | 135 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 136 | ``` |
| 137 | FUZZ_TEST(MyApiTest, MyApiCanSuccessfullyParseAnyString); |
| 138 | ``` |
| 139 | |
| 140 | Our fuzzing infrastructure will generate all possible strings and prove it works. |
| 141 | Obviously, that takes infinite time, so instead our fuzzing infrastructure will |
| 142 | carefully craft strings to explore more and more branches within `MyApi`, |
| 143 | mutating the input according to code coverage, so there's a good chance bugs |
| 144 | will be found quickly. |
| 145 | |
| 146 | Fuzzing should always be alongside traditional unit testing - never rely on it |
| 147 | to find all the bugs! It should be a backstop to prevent unexpected security |
| 148 | flaws sneaking past your regular testing. |
| 149 | |
| 150 | In more complex cases, you'll need to tell FuzzTest about the expected domains |
| 151 | of valid input. For example: |
| 152 | |
| 153 | ``` |
| 154 | void MyApiAlwaysSucceedsOnPositiveIntegers(int i) { |
| 155 | bool success = MyApi(i); |
| 156 | EXPECT_TRUE(success); |
| 157 | } |
| 158 | FUZZ_TEST(MyApiTest, MyApiAlwaysSucceedsOnPositiveIntegers) |
| 159 | .WithDomains(/*i:*/fuzztest::Positive<int>()); |
| 160 | ``` |
| 161 | |
| 162 | See the [FuzzTest reference] for all your options here. |
| 163 | |
| 164 | ## Running this locally |
| 165 | |
| 166 | Simply build and run your unit tests as normal. `FUZZ_TEST`s are supported only |
| 167 | on some platforms. If you're on such a platform, you'll see your fuzz test |
| 168 | run for one second: |
| 169 | |
| 170 | ``` |
| 171 | [==========] Running 1 test from 1 test suite. |
| 172 | [----------] Global test environment set-up. |
| 173 | [----------] 1 test from ScaleFuzz |
| 174 | [ RUN ] ApiTest.MyApiCanSuccessfullyParseAnyString |
| 175 | [ OK ] ApiTest.MyApiCanSuccessfullyParseAnyString (1000 ms) |
| 176 | [----------] 1 test from ScaleFuzz (1000 ms total) |
| 177 | |
| 178 | [----------] Global test environment tear-down |
| 179 | [==========] 1 test from 1 test suite ran. (1000 ms total) |
| 180 | [ PASSED ] 1 test. |
| 181 | ``` |
| 182 | |
| 183 | On other platforms, the test will be ignored. |
| 184 | |
Hubert Chao | 839f32aa | 2024-01-18 19:37:05 | [diff] [blame] | 185 | If you want to try actually fuzzing with FuzzTest, modify your gn arguments to |
| 186 | contain: |
| 187 | |
| 188 | ``` |
| 189 | enable_fuzztest_fuzz=true |
| 190 | is_component_build=false |
| 191 | ``` |
| 192 | |
| 193 | You can then run your unit test with the extra command line argument `--fuzz=`, |
| 194 | optionally specifying a test name. You'll see lots of output as it explores your |
| 195 | code: |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 196 | |
| 197 | ``` |
| 198 | [*] Corpus size: 1 | Edges covered: 73 | Fuzzing time: 1.60482ms | Total runs: 1.00e+00 | Runs/secs: 623 | Max stack usage: 0 |
| 199 | [*] Corpus size: 2 | Edges covered: 103 | Fuzzing time: 1.844ms | Total runs: 2.00e+00 | Runs/secs: 1084 | Max stack usage: 0 |
| 200 | [*] Corpus size: 3 | Edges covered: 111 | Fuzzing time: 2.747931ms | Total runs: 3.00e+00 | Runs/secs: 1091 | Max stack usage: 0 |
| 201 | [*] Corpus size: 4 | Edges covered: 135 | Fuzzing time: 2.92305ms | Total runs: 4.00e+00 | Runs/secs: 1368 | Max stack usage: 0 |
| 202 | [*] Corpus size: 5 | Edges covered: 173 | Fuzzing time: 3.35237ms | Total runs: 5.00e+00 | Runs/secs: 1491 | Max stack usage: 0 |
| 203 | [*] Corpus size: 6 | Edges covered: 178 | Fuzzing time: 4.15666ms | Total runs: 6.00e+00 | Runs/secs: 1443 | Max stack usage: 0 |
| 204 | ``` |
| 205 | |
| 206 | ("Edges covered") is how many different code blocks have been explored (that is, |
| 207 | sections between branches). Over time, you'll see it explore more and more until |
| 208 | it runs out of new edges to explore. |
| 209 | |
| 210 | ## Landing the CL |
| 211 | |
| 212 | Nothing special is required here! |
| 213 | |
| 214 | After a day or two, we should see [ClusterFuzz] starting to run your new fuzzer, |
| 215 | and it should be visible on [ClusterFuzz Fuzzer Stats]. Look for fuzzers starting |
| 216 | with `centipede_` and your test target's name. |
| 217 | |
Adrian Taylor | 598c72c | 2023-11-02 09:10:54 | [diff] [blame] | 218 | *** note |
| 219 | **Note:** This is all very new, and ClusterFuzz isn't reliably spotting these |
| 220 | new fuzztests yet. We're working on it! |
| 221 | *** |
| 222 | |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 223 | Thanks very much for doing your part in making Chromium more secure! |
| 224 | |
| 225 | ## Unusual cases |
| 226 | |
| 227 | There are some situations where FuzzTests may not work. For example: |
| 228 | |
| 229 | * You need to run on platforms not currently supported by FuzzTest |
| 230 | * You need more structured input |
| 231 | * You need to mutate the input in a more precise way |
Adrian Taylor | e3fbcd46 | 2024-02-27 11:18:28 | [diff] [blame] | 232 | * Your fuzzer input is a single binary blob |
Adrian Taylor | 6a886ec6 | 2023-10-25 23:45:27 | [diff] [blame] | 233 | |
| 234 | In these cases, you may be best off creating a standalone fuzzer using our |
| 235 | older fuzzing technology, [libfuzzer]. There are further options beyond |
| 236 | that, e.g. uploading "black box" fuzzers to ClusterFuzz, or even running |
| 237 | fuzzers outside of ClusterFuzz which then upload results to ClusterFuzz |
| 238 | for triage and diagnosis. To explore any of those options, please discuss |
| 239 | with the fuzzing team (email security@chromium.org if you're outside Google). |
| 240 | |
| 241 | |
| 242 | [FuzzTest]: https://github.com/google/fuzztest#how-do-i-use-it |
| 243 | [libfuzzer]: getting_started_with_libfuzzer.md |
| 244 | [`test` template]: https://source.chromium.org/chromium/chromium/src/+/main:testing/test.gni?q=test.gni |
| 245 | [fuzzer builders]: https://ci.chromium.org/p/chromium/g/chromium.fuzz/console |
| 246 | [ClusterFuzz]: https://clusterfuzz.com/ |
| 247 | [FuzzTest reference]: https://github.com/google/fuzztest#how-do-i-use-it |
| 248 | [ClusterFuzz Fuzzer Stats]: https://clusterfuzz.com/fuzzer-stats/by-fuzzer/fuzzer/libFuzzer/job/libfuzzer_chrome_asan |