These fuzz tests are designed to be included in Google's oss-fuzz project.
oss-fuzz works against a library exposing a function of the form
int LLVMFuzzerTestOneInput(const uint8_t* data, size_t length)
. We provide
that library (fuzzer.c
), and include a _fuzz
module for testing with
some toy values -- no fuzzing occurs in Python's test suite.
oss-fuzz will regularly pull from CPython, discover all the tests in
fuzz_tests.txt
, and run them -- so adding a new test here means it will
automatically be run in oss-fuzz, while also being smoke-tested as part of
CPython's test suite.
Add the test name on a new line in fuzz_tests.txt
.
In fuzzer.c
, add a function to be run:
int $test_name (const char* data, size_t size) { ... return 0; }
And invoke it from LLVMFuzzerTestOneInput
:
#if _Py_FUZZ_YES(fuzz_builtin_float) rv |= _run_fuzz(data, size, fuzz_builtin_float); #endif
LLVMFuzzerTestOneInput
will run in oss-fuzz, with each test in
fuzz_tests.txt
run separately.
Libraries written in C that might handle untrusted data are worthwhile. The more complex the logic (e.g. parsing), the more likely this is to be a useful fuzz test. See the existing examples for reference, and refer to the oss-fuzz docs.