-
Notifications
You must be signed in to change notification settings - Fork 279
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support tests that accepts complex inputs #65
Comments
Related to |
I guess there would also be the problem of getting the initial corpus in to the format that gofuzz expects. Would it be useful to have a function that generates the initial corpus? For example, you would define |
I don't think requiring the use of |
Yes, probably. I don't know what is the right solution yet. |
@dgryski iirc there's a fair bit of overhead in setting up a gob stream since it must also encode / decode the type information. If go-fuzz stays with the model of one file (and thus one gob stream) per input in the corpus that overhead could add up. On the other hand textual representations like JSON have the problem of needing to encode binary data with base64 or other textual encoding, that's not ideal either... |
I wonder if it would be possible to look at the random values |
@tv42 I don't get the idea. Please elaborate. |
@dvyukov So testing/quick is based on this idea of generating a random complex value, and feeding it either to a
Now, instead of a fetching these random values from Now imagine each
Does this clarify what I was thinking about? |
@tv42 I see what you mean now.
So I would prefer to make go-fuzz aware of the input structure. |
In issue 86 I was talking about QuickCheck. |
Yes, it does. With the goal of increasing code coverage with the generated inputs. |
Yes see thats great on its own :) |
Can you briefly describe the idea of shrinking and parallel API calls here? |
I think John Hughes does it best, but I'll try. Shrinking is done when a bug is found. At the moment Fuzz is normally used to test a user specified sequence of API calls. The idea is that you should be able to build a super simple inefficient one process model which describes your system. This model is your testing properties. |
go-fuzz does this for crashes and also for inputs in corpus. I.e. when it discovers an input that gives new code coverage, it minimizes the input to minimal form that still gives the same new code coverage.
This is possible to some degree today: func Fuzz(data []byte) int {
api_init()
if data[0]%2 == 0 {
api_call1()
api_call2()
} else {
api_call2()
api_call1()
}
api_fini()
} I am not sure what would be a better API for this that go-fuzz can provide. |
Ok wow that is quite impressive you not only shrink to the same error type, but also the same code coverage. Complex inputs would definitely help, but I think a little more is required. Lets think about fuzzing a proper memcache service or something like that and imagine that each test starts with a clean memcache.
As my model I might use a simple interface on a map[key][]value I want my ideal fuzzing program to call these methods in random orders with random values and even in parallel and check them against my model. |
How can such look like (of how does it look in QuickCheck)? I am working on something similar for syscalls (an input is a sequence of random syscalls with their arguments), but is quite specialized system. I am not sure how to generalize it. |
I am far from a QuickCheck expert, I have only used it once or twice in haskell. |
SmartCheck: Automatic and Efficient Counterexample Reduction and Generalization Amd the Haskell implementation: https://github.com/leepike/SmartCheck |
Excellent paper and nice reference to John Hughes at the end. |
And a property-based testing implementation in C, which might be easier to take ideas from than the functional-based side of things. https://github.com/silentbicycle/theft I'm getting more and more convinced that go-fuzz is the wrong kind of place for this sort of logic. |
I found the oopsla paper quite hard to understand. I saw some random path finding use types which was very interesting, but then it, unfortunately, started loosing me. If I understand the gofuzz instrumentation logic correctly, I think it should be able to generate random inputs in a more sophisticated manner, than just plain random. Why do you think it is not a good fit? |
FWIW, go-fuzz already does input shrinking (it is called minimization throughout the code). |
I am sorry, but I didn't believe you. It sounded too good to be true.
go-fuzz finds one crasher in a million runs and guess what its the byte 42 or ascii * Then I tried to enforce some length
And I again only got one crasher, yeah.
I think the bytes could have been less complicated, for example
Or even
So there is definitely some shrinking and the shrinking seems to find the shortest example, but not necessarily the simplest example. |
I think the current minimization is good enough. Minimization is generally NP-hard, because there can be arbitrary dependencies between bytes and length. So to do complete minimization one would need to try all possible byte sequences. |
theft does not try all combinations, but rather has some strategies for shrinking. Cool stuff @ ascii 0
returns the following crasher
I think this works pretty well, since 48 is ascii 0. |
@tv42 about your comment about a random generator being something that generates bytes |
https://github.com/mschoch/smat is a library that essentially converts the Doesn't seem to touch upon the part of creating complex data structures. |
Interesting I don't see that it passes fuzz This somewhat related to what we do in syzkaller for system calls: Namely, we have descriptions of calls along the lines of:
And from that we can generate/mutate random sequences of calls with random arguments:
We don't have states per se besides constructors, i.e. there is no way to create an instance of fd resource other than calling open(). We could probably do destructors as well, but we don't at the moment. Wonder if it's possible to figure out such description for Go types based solely on conventions. E.g. a resource is create by MakeFoo/NewFoo functions, and then if there is Close then it's a terminator, and any other methods can be called in arbitrary order between constructor and terminator. |
@dvyukov mschoch/smat#2 looks like the right issue for passing fuzz data []byte to actions. And yes smat seems a bit too simplistic currently, but still, it's interesting to see these ideas pop up. |
A minimal implementation of this might be to add a helper function to turn the |
FWIW, I've implemented a property testing library for Go called rapid, which supports both automatic shrinking and stateful state machine based tests (which look like this). Like popular Hypothesis library, it is based internally on a stream of random data with lightweight structure on top (nested spans with free-form labels). Despite being really simple, this data structure is sufficient for quite good automatic shrinking (or mutation, which is quite similar), without shrinker/mutator having to know anything about kind of data that was generated. As I've argued in golang/go#19109 (comment), #218 (comment) and #218 (comment), I'd very much prefer go-fuzz to provide an interface like that instead of implementing higher-level data generation directly, which would quite heavily limit the ability to construct stateful property-based tests on top of go-fuzz. |
@flyingmutant what exactly do you mean by "stateful state machine based tests"? Is it calling a sequence of methods on an object? If yes, then this works with upfront data too. Namely, the input data is an array, where each element represents one method invocation, and contains method ID and the arguments. The additional constraints can be expressed as field tags, for example:
As noted before, unknown structure of inputs data does not play well with mutation and some other aspects of fuzzing. Also to make fuzzing a standard technique used by majority of developers rather then a handful of security researchers, we need to make it really easy to use. Like absolutely easy. On any small complication we lose half of potential users. Security researchers are willing to send lots of time on each fuzzer, craft the data, analyze coverage, add some knobs to the code, comments out code that is hard to fuzz, collect corpuses, etc. The goal here is not require any of this. |
By "stateful state machine based tests" I mean calling a sequence of methods on an object, where set of valid methods and arguments can depend on the current state of the object. How do you generate method N+1 with valid arguments upfront in this case, without executing the N methods before? And without this "stateful" part it is really hard to test most real world systems conveniently or efficiently. Regarding your points about ease of use I 100% agree. The API I've chosen for specifying generators in rapid might very well be too verbose (although I don't think emphasizing the number 82 does justice to it), and I am definitely not promoting it here. However, please consider that most modern property-based testing libraries have moved away from type-based (or metadata-based) generation, since it turned out to be non-ergonomic, even in static type-rich languages like Haskell (here is an article on this topic). The main point I am trying to argue is that testing of most stateful systems requires ability to get new random data on as-needed basis without specifying any kind of fixed schema upfront. May I suggest the queue test from rapid as a simple "stateful" test example, so that we can see if we can improve upon its ergonomic with the "upfront" design? |
Just randomly and then rely on feedback and mutations.
|
There are several counter-arguments to this.
|
If I understand the question correctly, then checking if the property should hold for the current input data, and if yes, checking if it actually holds. If that property was expressed with generators somehow, then it should be check-able with imperative code too (the opposite may not always be true).
Some hits may be possible, see:
What is the problem with shrinking? I did minimization for both interesting inputs and crashers in multiple engines without composition-based generators and without any problems. |
I'd say these points are mostly about efficiency, which is especially important when testing something slow like an HTTP API. Efficient generation and shrinking allow to use lightweight fuzzing as part of the normal interactive |
I don't question that all else being equal faster is better. |
Thanks a lot for the example, it looks simple indeed. Let's say we introduce a new method |
We need to figure it out yet. There should be some way to represent something like a C union. Most likely it should be based on interface{}, but then the question is how to associate set of options suitable for that interface. I don't know what's the best way to do it yet. |
So the idea is to simply have something like |
yes
yes
there are several options:
If we use generator functions with constraints and have e.g. IntRange(5, 10). The question it should strictly obey they the range or treat it as a hint only? If it produces only values in [5,10], then it removes the concerns of how to deal with invalid data (we generate only valid data). But it limits testing: developer by definition does not know where the bugs are! Or they would fix them already. So if we treat the range only as hint to find unexpected bugs, the we have all the same concerns and options for handling of invalid data. |
From a property-based testing standpoint, we start from properties, with different ones holding for inputs satisfying the preconditions and arbitrary inputs. So we should have 2 tests with different strict constraints:
For fuzzing-based approach, while explicit generators are not required, [5, 10] constraint should still appear in the test: func FuzzFoo(f *fuzz.F, i int) {
a := foo(i)
if i >= 5 && i <= 10 {
if a >= bar(i) {
f.Fail()
}
}
} So on the one hand we have the convenience of constraints being figured automatically from the code, and on the other being explicit about properties and inputs brings major efficiency advantages (and potentially better separation of concerns). IMHO having lightweight fuzzing available as part of the regular Is there a chance that |
A big part of the point of fuzzing, from the security perspective, is to feed the code invalid inputs and see what happens. From that point of view, it shouldn't. If that int pretends to be an argument from an RPC call, then it really should explore all possible values. The disconnect we're seeing here is people thinking of "testing an API called by other parts of my app" vs "testing an untrusted input mechanism". |
I don't know. Somebody needs to sketch an actual proposal and the proposed interface. Note that the proposed approach can also do good testing in short time provided that there is already a preaccumulated corpus. So if one did a more prolonged testing session (which I would say is required anyway) and persisted the corpus somewhere, later it's possible to do regression testing with maximum coverage quickly. |
(Modern) fuzzing has appeared in the context of security and because of that it used to operate with []byte just because that's what is an external input (from disk/network), also some of them tend to assume that the user has desire to spend lots of time on the fuzzer, tune knobs, precollect corpus, etc. This is significantly different from testing. Testing that is done during development, by a developer, testing of any code, not just the one that accepts solely []byte. I think bridging this gap and bringing fuzzing to developers for API testing is the next big advancement in software quality. From this point it's important to provide an easy way to generate structured, typed inputs rather than just []byte. The API does not necessary use completely untrusted inputs, but the inputs do not necessary come from a single call site that we trust completely either. It's somewhere in between, let's say we want to make it "robust" and high-quality. Like a regexp library or a compiler. |
Here is a small but realistic example (in Python) of fuzz-based (or property-based) approach being introduced as an upgrade of the usual example-based test. Notice that the software being tested does not have to belong to some special "robust" and high-quality category. Rather, fuzz-based tests should be applicable almost everywhere regular example-based tests are, and with only a small increase in test complexity give a lot more confidence in software quality. |
Good overview of structure aware fuzzing approaches (on top of libFuzzer): https://github.com/google/fuzzer-test-suite/blob/master/tutorial/structure-aware-fuzzing.md |
@thepudds did you implement this in fzgo? I have some memories that somebody implemented this somewhere already... |
Hi @dvyukov 👋 Yes, I support this in https://github.com/thepudds/fzgo Rich signatures like FuzzRegexp(re string, input []byte, posix bool) are supported, as well as the classic Fuzz(data []byte) int form used by go-fuzz. Public members of structs in a signature are also mutated recursively. (And I have a private branch that also handles a dozen or so common interfaces like io.Reader). The underlying smarts for the actual fuzzing engine remain go-fuzz. (On mobile, so just a quick note). |
Currently go-fuzz mutates and supplies to a test a byte slice, however there are cases when a test needs more complex, structured input. For example, a regexp test could accept 3 strings (regexp, replacement string and input for replacement). Or a BLAS test could accept 2 matrices of floats. It is possible to manually convert the byte slice into any necessary structure (e.g. by json unmarshal), but is tedious for complex inputs, gives unnecessary coverage, in some cases can render some inputs inputs (e.g. if it does not json unmarshal successfully) and makes mutations suboptimal.
We could allow the test function to accept several arguments of arbitrary types:
and go-fuzz will supply all these arguments. If necessary go-fuzz-build can help by extracting types and generating some thunks.
Besides being very handy, it will also allow go-fuzz to do more efficient mutations (mutate each argument independently, or replace one of the arguments by the corresponding argument in another input).
I think that internally go-fuzz could use some very simple serialization format to represent such inputs (json, or maybe something simpler) to store them in files and communicate with the test process.
The text was updated successfully, but these errors were encountered: