// Copyright 2020 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.

// Package fuzz provides common fuzzing functionality for tests built with // "go test" and for programs that use fuzzing functionality in the testing // package.
package fuzz import ( ) // CoordinateFuzzingOpts is a set of arguments for CoordinateFuzzing. // The zero value is valid for each field unless specified otherwise. type CoordinateFuzzingOpts struct { // Log is a writer for logging progress messages and warnings. // If nil, io.Discard will be used instead. Log io.Writer // Timeout is the amount of wall clock time to spend fuzzing after the corpus // has loaded. If zero, there will be no time limit. Timeout time.Duration // Limit is the number of random values to generate and test. If zero, // there will be no limit on the number of generated values. Limit int64 // MinimizeTimeout is the amount of wall clock time to spend minimizing // after discovering a crasher. If zero, there will be no time limit. If // MinimizeTimeout and MinimizeLimit are both zero, then minimization will // be disabled. MinimizeTimeout time.Duration // MinimizeLimit is the maximum number of calls to the fuzz function to be // made while minimizing after finding a crash. If zero, there will be no // limit. Calls to the fuzz function made when minimizing also count toward // Limit. If MinimizeTimeout and MinimizeLimit are both zero, then // minimization will be disabled. MinimizeLimit int64 // parallel is the number of worker processes to run in parallel. If zero, // CoordinateFuzzing will run GOMAXPROCS workers. Parallel int // Seed is a list of seed values added by the fuzz target with testing.F.Add // and in testdata. Seed []CorpusEntry // Types is the list of types which make up a corpus entry. // Types must be set and must match values in Seed. Types []reflect.Type // CorpusDir is a directory where files containing values that crash the // code being tested may be written. CorpusDir must be set. CorpusDir string // CacheDir is a directory containing additional "interesting" values. // The fuzzer may derive new values from these, and may write new values here. CacheDir string } // CoordinateFuzzing creates several worker processes and communicates with // them to test random inputs that could trigger crashes and expose bugs. // The worker processes run the same binary in the same directory with the // same environment variables as the coordinator process. Workers also run // with the same arguments as the coordinator, except with the -test.fuzzworker // flag prepended to the argument list. // // If a crash occurs, the function will return an error containing information // about the crash, which can be reported to the user. func ( context.Context, CoordinateFuzzingOpts) ( error) { if := .Err(); != nil { return } if .Log == nil { .Log = io.Discard } if .Parallel == 0 { .Parallel = runtime.GOMAXPROCS(0) } if .Limit > 0 && int64(.Parallel) > .Limit { // Don't start more workers than we need. .Parallel = int(.Limit) } , := newCoordinator() if != nil { return } if .Timeout > 0 { var func() , = context.WithTimeout(, .Timeout) defer () } // fuzzCtx is used to stop workers, for example, after finding a crasher. , := context.WithCancel() defer () := .Done() // stop is called when a worker encounters a fatal error. var error := false := func( error) { if shouldPrintDebugInfo() { , , , := runtime.Caller(1) if { .debugLogf("stop called at %s:%d. stopping: %t", , , ) } else { .debugLogf("stop called at unknown. stopping: %t", ) } } if == .Err() || isInterruptError() { // Suppress cancellation errors and terminations due to SIGINT. // The messages are not helpful since either the user triggered the error // (with ^C) or another more helpful message will be printed (a crasher). = nil } if != nil && ( == nil || == .Err()) { = } if { return } = true () = nil } // Ensure that any crash we find is written to the corpus, even if an error // or interruption occurs while minimizing it. := false defer func() { if .crashMinimizing == nil || { return } := writeToCorpus(&.crashMinimizing.entry, .CorpusDir) if != nil { = fmt.Errorf("%w\n%v", , ) return } if == nil { = &crashError{ path: .crashMinimizing.entry.Path, err: errors.New(.crashMinimizing.crasherMsg), } } }() // Start workers. // TODO(jayconrod): do we want to support fuzzing different binaries? := "" // same as self := os.Args[0] := append([]string{"-test.fuzzworker"}, os.Args[1:]...) := os.Environ() // same as self := make(chan error) := make([]*worker, .Parallel) for := range { var error [], = newWorker(, , , , ) if != nil { return } } for := range { := [] go func() { := .coordinate() if .Err() != nil || isInterruptError() { = nil } := .cleanup() if == nil { = } <- }() } // Main event loop. // Do not return until all workers have terminated. We avoid a deadlock by // receiving messages from workers even after ctx is canceled. := len() := time.NewTicker(3 * time.Second) defer .Stop() defer .logStats() .logStats() for { // If there is an execution limit, and we've reached it, stop. if .opts.Limit > 0 && .count >= .opts.Limit { (nil) } var chan fuzzInput , := .peekInput() if && .crashMinimizing == nil && ! { = .inputC } var chan fuzzMinimizeInput , := .peekMinimizeInput() if && ! { = .minimizeC } select { case <-: // Interrupted, canceled, or timed out. // stop sets doneC to nil, so we don't busy wait here. (.Err()) case := <-: // A worker terminated, possibly after encountering a fatal error. () -- if == 0 { return } case := <-.resultC: // Received response from worker. if { break } .updateStats() if .crasherMsg != "" { if .warmupRun() && .entry.IsSeed { := filepath.Base(.opts.CorpusDir) fmt.Fprintf(.opts.Log, "failure while testing seed corpus entry: %s/%s\n", , testName(.entry.Parent)) (errors.New(.crasherMsg)) break } if .canMinimize() && .canMinimize { if .crashMinimizing != nil { // This crash is not minimized, and another crash is being minimized. // Ignore this one and wait for the other one to finish. if shouldPrintDebugInfo() { .debugLogf("found unminimized crasher, skipping in favor of minimizable crasher") } break } // Found a crasher but haven't yet attempted to minimize it. // Send it back to a worker for minimization. Disable inputC so // other workers don't continue fuzzing. .crashMinimizing = & fmt.Fprintf(.opts.Log, "fuzz: minimizing %d-byte failing input file\n", len(.entry.Data)) .queueForMinimization(, nil) } else if ! { // Found a crasher that's either minimized or not minimizable. // Write to corpus and stop. := writeToCorpus(&.entry, .CorpusDir) if == nil { = true = &crashError{ path: .entry.Path, err: errors.New(.crasherMsg), } } if shouldPrintDebugInfo() { .debugLogf( "found crasher, id: %s, parent: %s, gen: %d, size: %d, exec time: %s", .entry.Path, .entry.Parent, .entry.Generation, len(.entry.Data), .entryDuration, ) } () } } else if .coverageData != nil { if .warmupRun() { if shouldPrintDebugInfo() { .debugLogf( "processed an initial input, id: %s, new bits: %d, size: %d, exec time: %s", .entry.Parent, countBits(diffCoverage(.coverageMask, .coverageData)), len(.entry.Data), .entryDuration, ) } .updateCoverage(.coverageData) .warmupInputLeft-- if .warmupInputLeft == 0 { fmt.Fprintf(.opts.Log, "fuzz: elapsed: %s, gathering baseline coverage: %d/%d completed, now fuzzing with %d workers\n", .elapsed(), .warmupInputCount, .warmupInputCount, .opts.Parallel) if shouldPrintDebugInfo() { .debugLogf( "finished processing input corpus, entries: %d, initial coverage bits: %d", len(.corpus.entries), countBits(.coverageMask), ) } } } else if := diffCoverage(.coverageMask, .coverageData); != nil { // Found a value that expanded coverage. // It's not a crasher, but we may want to add it to the on-disk // corpus and prioritize it for future fuzzing. // TODO(jayconrod, katiehockman): Prioritize fuzzing these // values which expanded coverage, perhaps based on the // number of new edges that this result expanded. // TODO(jayconrod, katiehockman): Don't write a value that's already // in the corpus. if .canMinimize() && .canMinimize && .crashMinimizing == nil { // Send back to workers to find a smaller value that preserves // at least one new coverage bit. .queueForMinimization(, ) } else { // Update the coordinator's coverage mask and save the value. := len(.entry.Data) , := .addCorpusEntries(true, .entry) if != nil { () break } if ! { if shouldPrintDebugInfo() { .debugLogf( "ignoring duplicate input which increased coverage, id: %s", .entry.Path, ) } break } .updateCoverage() .inputQueue.enqueue(.entry) .interestingCount++ if shouldPrintDebugInfo() { .debugLogf( "new interesting input, id: %s, parent: %s, gen: %d, new bits: %d, total bits: %d, size: %d, exec time: %s", .entry.Path, .entry.Parent, .entry.Generation, countBits(), countBits(.coverageMask), , .entryDuration, ) } } } else { if shouldPrintDebugInfo() { .debugLogf( "worker reported interesting input that doesn't expand coverage, id: %s, parent: %s, canMinimize: %t", .entry.Path, .entry.Parent, .canMinimize, ) } } } else if .warmupRun() { // No error or coverage data was reported for this input during // warmup, so continue processing results. .warmupInputLeft-- if .warmupInputLeft == 0 { fmt.Fprintf(.opts.Log, "fuzz: elapsed: %s, testing seed corpus: %d/%d completed, now fuzzing with %d workers\n", .elapsed(), .warmupInputCount, .warmupInputCount, .opts.Parallel) if shouldPrintDebugInfo() { .debugLogf( "finished testing-only phase, entries: %d", len(.corpus.entries), ) } } } case <- : // Sent the next input to a worker. .sentInput() case <- : // Sent the next input for minimization to a worker. .sentMinimizeInput() case <-.C: .logStats() } } // TODO(jayconrod,katiehockman): if a crasher can't be written to the corpus, // write to the cache instead. } // crashError wraps a crasher written to the seed corpus. It saves the name // of the file where the input causing the crasher was saved. The testing // framework uses this to report a command to re-run that specific input. type crashError struct { path string err error } func ( *crashError) () string { return .err.Error() } func ( *crashError) () error { return .err } func ( *crashError) () string { return .path } type corpus struct { entries []CorpusEntry hashes map[[sha256.Size]byte]bool } // addCorpusEntries adds entries to the corpus, and optionally writes the entries // to the cache directory. If an entry is already in the corpus it is skipped. If // all of the entries are unique, addCorpusEntries returns true and a nil error, // if at least one of the entries was a duplicate, it returns false and a nil error. func ( *coordinator) ( bool, ...CorpusEntry) (bool, error) { := true for , := range { , := corpusEntryData() if != nil { return false, } := sha256.Sum256() if .corpus.hashes[] { = false continue } if { if := writeToCorpus(&, .opts.CacheDir); != nil { return false, } // For entries written to disk, we don't hold onto the bytes, // since the corpus would consume a significant amount of // memory. .Data = nil } .corpus.hashes[] = true .corpus.entries = append(.corpus.entries, ) } return , nil } // CorpusEntry represents an individual input for fuzzing. // // We must use an equivalent type in the testing and testing/internal/testdeps // packages, but testing can't import this package directly, and we don't want // to export this type from testing. Instead, we use the same struct type and // use a type alias (not a defined type) for convenience. type CorpusEntry = struct { Parent string // Path is the path of the corpus file, if the entry was loaded from disk. // For other entries, including seed values provided by f.Add, Path is the // name of the test, e.g. seed#0 or its hash. Path string // Data is the raw input data. Data should only be populated for seed // values. For on-disk corpus files, Data will be nil, as it will be loaded // from disk using Path. Data []byte // Values is the unmarshaled values from a corpus file. Values []any Generation int // IsSeed indicates whether this entry is part of the seed corpus. IsSeed bool } // corpusEntryData returns the raw input bytes, either from the data struct // field, or from disk. func corpusEntryData( CorpusEntry) ([]byte, error) { if .Data != nil { return .Data, nil } return os.ReadFile(.Path) } type fuzzInput struct { // entry is the value to test initially. The worker will randomly mutate // values from this starting point. entry CorpusEntry // timeout is the time to spend fuzzing variations of this input, // not including starting or cleaning up. timeout time.Duration // limit is the maximum number of calls to the fuzz function the worker may // make. The worker may make fewer calls, for example, if it finds an // error early. If limit is zero, there is no limit on calls to the // fuzz function. limit int64 // warmup indicates whether this is a warmup input before fuzzing begins. If // true, the input should not be fuzzed. warmup bool // coverageData reflects the coordinator's current coverageMask. coverageData []byte } type fuzzResult struct { // entry is an interesting value or a crasher. entry CorpusEntry // crasherMsg is an error message from a crash. It's "" if no crash was found. crasherMsg string // canMinimize is true if the worker should attempt to minimize this result. // It may be false because an attempt has already been made. canMinimize bool // coverageData is set if the worker found new coverage. coverageData []byte // limit is the number of values the coordinator asked the worker // to test. 0 if there was no limit. limit int64 // count is the number of values the worker actually tested. count int64 // totalDuration is the time the worker spent testing inputs. totalDuration time.Duration // entryDuration is the time the worker spent execution an interesting result entryDuration time.Duration } type fuzzMinimizeInput struct { // entry is an interesting value or crasher to minimize. entry CorpusEntry // crasherMsg is an error message from a crash. It's "" if no crash was found. // If set, the worker will attempt to find a smaller input that also produces // an error, though not necessarily the same error. crasherMsg string // limit is the maximum number of calls to the fuzz function the worker may // make. The worker may make fewer calls, for example, if it can't reproduce // an error. If limit is zero, there is no limit on calls to the fuzz function. limit int64 // timeout is the time to spend minimizing this input. // A zero timeout means no limit. timeout time.Duration // keepCoverage is a set of coverage bits that entry found that were not in // the coordinator's combined set. When minimizing, the worker should find an // input that preserves at least one of these bits. keepCoverage is nil for // crashing inputs. keepCoverage []byte } // coordinator holds channels that workers can use to communicate with // the coordinator. type coordinator struct { opts CoordinateFuzzingOpts // startTime is the time we started the workers after loading the corpus. // Used for logging. startTime time.Time // inputC is sent values to fuzz by the coordinator. Any worker may receive // values from this channel. Workers send results to resultC. inputC chan fuzzInput // minimizeC is sent values to minimize by the coordinator. Any worker may // receive values from this channel. Workers send results to resultC. minimizeC chan fuzzMinimizeInput // resultC is sent results of fuzzing by workers. The coordinator // receives these. Multiple types of messages are allowed. resultC chan fuzzResult // count is the number of values fuzzed so far. count int64 // countLastLog is the number of values fuzzed when the output was last // logged. countLastLog int64 // timeLastLog is the time at which the output was last logged. timeLastLog time.Time // interestingCount is the number of unique interesting values which have // been found this execution. interestingCount int // warmupInputCount is the count of all entries in the corpus which will // need to be received from workers to run once during warmup, but not fuzz. // This could be for coverage data, or only for the purposes of verifying // that the seed corpus doesn't have any crashers. See warmupRun. warmupInputCount int // warmupInputLeft is the number of entries in the corpus which still need // to be received from workers to run once during warmup, but not fuzz. // See warmupInputLeft. warmupInputLeft int // duration is the time spent fuzzing inside workers, not counting time // starting up or tearing down. duration time.Duration // countWaiting is the number of fuzzing executions the coordinator is // waiting on workers to complete. countWaiting int64 // corpus is a set of interesting values, including the seed corpus and // generated values that workers reported as interesting. corpus corpus // minimizationAllowed is true if one or more of the types of fuzz // function's parameters can be minimized. minimizationAllowed bool // inputQueue is a queue of inputs that workers should try fuzzing. This is // initially populated from the seed corpus and cached inputs. More inputs // may be added as new coverage is discovered. inputQueue queue // minimizeQueue is a queue of inputs that caused errors or exposed new // coverage. Workers should attempt to find smaller inputs that do the // same thing. minimizeQueue queue // crashMinimizing is the crash that is currently being minimized. crashMinimizing *fuzzResult // coverageMask aggregates coverage that was found for all inputs in the // corpus. Each byte represents a single basic execution block. Each set bit // within the byte indicates that an input has triggered that block at least // 1 << n times, where n is the position of the bit in the byte. For example, a // value of 12 indicates that separate inputs have triggered this block // between 4-7 times and 8-15 times. coverageMask []byte } func newCoordinator( CoordinateFuzzingOpts) (*coordinator, error) { // Make sure all the seed corpus has marshaled data. for := range .Seed { if .Seed[].Data == nil && .Seed[].Values != nil { .Seed[].Data = marshalCorpusFile(.Seed[].Values...) } } := &coordinator{ opts: , startTime: time.Now(), inputC: make(chan fuzzInput), minimizeC: make(chan fuzzMinimizeInput), resultC: make(chan fuzzResult), timeLastLog: time.Now(), corpus: corpus{hashes: make(map[[sha256.Size]byte]bool)}, } if := .readCache(); != nil { return nil, } if .MinimizeLimit > 0 || .MinimizeTimeout > 0 { for , := range .Types { if isMinimizable() { .minimizationAllowed = true break } } } := len(coverage()) if == 0 { fmt.Fprintf(.opts.Log, "warning: the test binary was not built with coverage instrumentation, so fuzzing will run without coverage guidance and may be inefficient\n") // Even though a coverage-only run won't occur, we should still run all // of the seed corpus to make sure there are no existing failures before // we start fuzzing. .warmupInputCount = len(.opts.Seed) for , := range .opts.Seed { .inputQueue.enqueue() } } else { .warmupInputCount = len(.corpus.entries) for , := range .corpus.entries { .inputQueue.enqueue() } // Set c.coverageMask to a clean []byte full of zeros. .coverageMask = make([]byte, ) } .warmupInputLeft = .warmupInputCount if len(.corpus.entries) == 0 { fmt.Fprintf(.opts.Log, "warning: starting with empty corpus\n") var []any for , := range .Types { = append(, zeroValue()) } := marshalCorpusFile(...) := sha256.Sum256() := fmt.Sprintf("%x", [:4]) .addCorpusEntries(false, CorpusEntry{Path: , Data: }) } return , nil } func ( *coordinator) ( fuzzResult) { .count += .count .countWaiting -= .limit .duration += .totalDuration } func ( *coordinator) () { := time.Now() if .warmupRun() { := .warmupInputCount - .warmupInputLeft if coverageEnabled { fmt.Fprintf(.opts.Log, "fuzz: elapsed: %s, gathering baseline coverage: %d/%d completed\n", .elapsed(), , .warmupInputCount) } else { fmt.Fprintf(.opts.Log, "fuzz: elapsed: %s, testing seed corpus: %d/%d completed\n", .elapsed(), , .warmupInputCount) } } else if .crashMinimizing != nil { fmt.Fprintf(.opts.Log, "fuzz: elapsed: %s, minimizing\n", .elapsed()) } else { := float64(.count-.countLastLog) / .Sub(.timeLastLog).Seconds() if coverageEnabled { := .warmupInputCount + .interestingCount fmt.Fprintf(.opts.Log, "fuzz: elapsed: %s, execs: %d (%.0f/sec), new interesting: %d (total: %d)\n", .elapsed(), .count, , .interestingCount, ) } else { fmt.Fprintf(.opts.Log, "fuzz: elapsed: %s, execs: %d (%.0f/sec)\n", .elapsed(), .count, ) } } .countLastLog = .count .timeLastLog = } // peekInput returns the next value that should be sent to workers. // If the number of executions is limited, the returned value includes // a limit for one worker. If there are no executions left, peekInput returns // a zero value and false. // // peekInput doesn't actually remove the input from the queue. The caller // must call sentInput after sending the input. // // If the input queue is empty and the coverage/testing-only run has completed, // queue refills it from the corpus. func ( *coordinator) () (fuzzInput, bool) { if .opts.Limit > 0 && .count+.countWaiting >= .opts.Limit { // Already making the maximum number of calls to the fuzz function. // Don't send more inputs right now. return fuzzInput{}, false } if .inputQueue.len == 0 { if .warmupRun() { // Wait for coverage/testing-only run to finish before sending more // inputs. return fuzzInput{}, false } .refillInputQueue() } , := .inputQueue.peek() if ! { panic("input queue empty after refill") } := fuzzInput{ entry: .(CorpusEntry), timeout: workerFuzzDuration, warmup: .warmupRun(), } if .coverageMask != nil { .coverageData = bytes.Clone(.coverageMask) } if .warmup { // No fuzzing will occur, but it should count toward the limit set by // -fuzztime. .limit = 1 return , true } if .opts.Limit > 0 { .limit = .opts.Limit / int64(.opts.Parallel) if .opts.Limit%int64(.opts.Parallel) > 0 { .limit++ } := .opts.Limit - .count - .countWaiting if .limit > { .limit = } } return , true } // sentInput updates internal counters after an input is sent to c.inputC. func ( *coordinator) ( fuzzInput) { .inputQueue.dequeue() .countWaiting += .limit } // refillInputQueue refills the input queue from the corpus after it becomes // empty. func ( *coordinator) () { for , := range .corpus.entries { .inputQueue.enqueue() } } // queueForMinimization creates a fuzzMinimizeInput from result and adds it // to the minimization queue to be sent to workers. func ( *coordinator) ( fuzzResult, []byte) { if shouldPrintDebugInfo() { .debugLogf( "queueing input for minimization, id: %s, parent: %s, keepCoverage: %t, crasher: %t", .entry.Path, .entry.Parent, != nil, .crasherMsg != "", ) } if .crasherMsg != "" { .minimizeQueue.clear() } := fuzzMinimizeInput{ entry: .entry, crasherMsg: .crasherMsg, keepCoverage: , } .minimizeQueue.enqueue() } // peekMinimizeInput returns the next input that should be sent to workers for // minimization. func ( *coordinator) () (fuzzMinimizeInput, bool) { if !.canMinimize() { // Already making the maximum number of calls to the fuzz function. // Don't send more inputs right now. return fuzzMinimizeInput{}, false } , := .minimizeQueue.peek() if ! { return fuzzMinimizeInput{}, false } := .(fuzzMinimizeInput) if .opts.MinimizeTimeout > 0 { .timeout = .opts.MinimizeTimeout } if .opts.MinimizeLimit > 0 { .limit = .opts.MinimizeLimit } else if .opts.Limit > 0 { if .crasherMsg != "" { .limit = .opts.Limit } else { .limit = .opts.Limit / int64(.opts.Parallel) if .opts.Limit%int64(.opts.Parallel) > 0 { .limit++ } } } if .opts.Limit > 0 { := .opts.Limit - .count - .countWaiting if .limit > { .limit = } } return , true } // sentMinimizeInput removes an input from the minimization queue after it's // sent to minimizeC. func ( *coordinator) ( fuzzMinimizeInput) { .minimizeQueue.dequeue() .countWaiting += .limit } // warmupRun returns true while the coordinator is running inputs without // mutating them as a warmup before fuzzing. This could be to gather baseline // coverage data for entries in the corpus, or to test all of the seed corpus // for errors before fuzzing begins. // // The coordinator doesn't store coverage data in the cache with each input // because that data would be invalid when counter offsets in the test binary // change. // // When gathering coverage, the coordinator sends each entry to a worker to // gather coverage for that entry only, without fuzzing or minimizing. This // phase ends when all workers have finished, and the coordinator has a combined // coverage map. func ( *coordinator) () bool { return .warmupInputLeft > 0 } // updateCoverage sets bits in c.coverageMask that are set in newCoverage. // updateCoverage returns the number of newly set bits. See the comment on // coverageMask for the format. func ( *coordinator) ( []byte) int { if len() != len(.coverageMask) { panic(fmt.Sprintf("number of coverage counters changed at runtime: %d, expected %d", len(), len(.coverageMask))) } := 0 for := range { := [] &^ .coverageMask[] += bits.OnesCount8() .coverageMask[] |= [] } return } // canMinimize returns whether the coordinator should attempt to find smaller // inputs that reproduce a crash or new coverage. func ( *coordinator) () bool { return .minimizationAllowed && (.opts.Limit == 0 || .count+.countWaiting < .opts.Limit) } func ( *coordinator) () time.Duration { return time.Since(.startTime).Round(1 * time.Second) } // readCache creates a combined corpus from seed values and values in the cache // (in GOCACHE/fuzz). // // TODO(fuzzing): need a mechanism that can remove values that // aren't useful anymore, for example, because they have the wrong type. func ( *coordinator) () error { if , := .addCorpusEntries(false, .opts.Seed...); != nil { return } , := ReadCorpus(.opts.CacheDir, .opts.Types) if != nil { if , := .(*MalformedCorpusError); ! { // It's okay if some files in the cache directory are malformed and // are not included in the corpus, but fail if it's an I/O error. return } // TODO(jayconrod,katiehockman): consider printing some kind of warning // indicating the number of files which were skipped because they are // malformed. } if , := .addCorpusEntries(false, ...); != nil { return } return nil } // MalformedCorpusError is an error found while reading the corpus from the // filesystem. All of the errors are stored in the errs list. The testing // framework uses this to report malformed files in testdata. type MalformedCorpusError struct { errs []error } func ( *MalformedCorpusError) () string { var []string for , := range .errs { = append(, .Error()) } return strings.Join(, "\n") } // ReadCorpus reads the corpus from the provided dir. The returned corpus // entries are guaranteed to match the given types. Any malformed files will // be saved in a MalformedCorpusError and returned, along with the most recent // error. func ( string, []reflect.Type) ([]CorpusEntry, error) { , := os.ReadDir() if os.IsNotExist() { return nil, nil // No corpus to read } else if != nil { return nil, fmt.Errorf("reading seed corpus from testdata: %v", ) } var []CorpusEntry var []error for , := range { // TODO(jayconrod,katiehockman): determine when a file is a fuzzing input // based on its name. We should only read files created by writeToCorpus. // If we read ALL files, we won't be able to change the file format by // changing the extension. We also won't be able to add files like // README.txt explaining why the directory exists. if .IsDir() { continue } := filepath.Join(, .Name()) , := os.ReadFile() if != nil { return nil, fmt.Errorf("failed to read corpus file: %v", ) } var []any , = readCorpusData(, ) if != nil { = append(, fmt.Errorf("%q: %v", , )) continue } = append(, CorpusEntry{Path: , Values: }) } if len() > 0 { return , &MalformedCorpusError{errs: } } return , nil } func readCorpusData( []byte, []reflect.Type) ([]any, error) { , := unmarshalCorpusFile() if != nil { return nil, fmt.Errorf("unmarshal: %v", ) } if = CheckCorpus(, ); != nil { return nil, } return , nil } // CheckCorpus verifies that the types in vals match the expected types // provided. func ( []any, []reflect.Type) error { if len() != len() { return fmt.Errorf("wrong number of values in corpus entry: %d, want %d", len(), len()) } := make([]reflect.Type, len()) for , := range { [] = reflect.TypeOf() } for := range { if [] != [] { return fmt.Errorf("mismatched types in corpus entry: %v, want %v", , ) } } return nil } // writeToCorpus atomically writes the given bytes to a new file in testdata. If // the directory does not exist, it will create one. If the file already exists, // writeToCorpus will not rewrite it. writeToCorpus sets entry.Path to the new // file that was just written or an error if it failed. func writeToCorpus( *CorpusEntry, string) ( error) { := fmt.Sprintf("%x", sha256.Sum256(.Data))[:16] .Path = filepath.Join(, ) if := os.MkdirAll(, 0777); != nil { return } if := os.WriteFile(.Path, .Data, 0666); != nil { os.Remove(.Path) // remove partially written file return } return nil } func testName( string) string { return filepath.Base() } func zeroValue( reflect.Type) any { for , := range zeroVals { if reflect.TypeOf() == { return } } panic(fmt.Sprintf("unsupported type: %v", )) } var zeroVals []any = []any{ []byte(""), string(""), false, byte(0), rune(0), float32(0), float64(0), int(0), int8(0), int16(0), int32(0), int64(0), uint(0), uint8(0), uint16(0), uint32(0), uint64(0), } var debugInfo = godebug.New("#fuzzdebug").Value() == "1" func shouldPrintDebugInfo() bool { return debugInfo } func ( *coordinator) ( string, ...any) { := time.Now().Format("2006-01-02 15:04:05.999999999") fmt.Fprintf(.opts.Log, +" DEBUG "++"\n", ...) }