fuzzmain.c 9.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429
  1. #include "civetweb.h"
  2. #include <errno.h>
  3. #include <stdint.h>
  4. #include <stdlib.h>
  5. #include <string.h>
  6. #if defined(_WIN32)
  7. #error "Currently not supported"
  8. #else
  9. #include <unistd.h>
  10. #define test_sleep(x) (sleep(x))
  11. #include <arpa/inet.h>
  12. #include <netinet/in.h>
  13. #include <netinet/ip.h>
  14. #include <pthread.h>
  15. #include <sys/socket.h>
  16. #include <sys/types.h>
  17. typedef int SOCKET;
  18. #define closesocket(a) (close(a))
  19. #endif
  20. /* Port configuration */
  21. unsigned short PORT_NUM_HTTP = 8000;
  22. #define PORT_STR_HTTPHTTPS "8081,8443s"
  23. #define TESTabort() {fprintf(stderr, "!!! aborting fuzz test in line %u !!!", __LINE__); system("netstat -tlpn"); abort();}
  24. static uint64_t call_count = 0;
  25. static struct mg_context *ctx;
  26. static const char *OPTIONS[] = {"listening_ports",
  27. PORT_STR_HTTPHTTPS,
  28. "document_root",
  29. "fuzztest/docroot",
  30. "ssl_certificate",
  31. "resources/cert/server.pem",
  32. NULL,
  33. NULL};
  34. static void
  35. init_civetweb(void)
  36. {
  37. struct mg_callbacks callbacks;
  38. memset(&callbacks, 0, sizeof(callbacks));
  39. ctx = mg_start(&callbacks, 0, OPTIONS);
  40. if (!ctx) {
  41. fprintf(stderr, "\nCivetWeb test server failed to start\n");
  42. TESTabort();
  43. }
  44. /* Give server 5 seconds to start, before flooding with requests.
  45. * Don't know if this is required for fuzz-tests, but it was helpful
  46. * when testing starting/stopping the server multiple times in test
  47. * container environments. */
  48. test_sleep(5);
  49. }
  50. struct tcp_func_prm {
  51. SOCKET sock;
  52. };
  53. struct tRESPONSE {
  54. char data[4096];
  55. size_t size;
  56. } RESPONSE;
  57. static void *
  58. tcp_func(void *arg)
  59. {
  60. char req[1024 * 16];
  61. struct tcp_func_prm *ptcp_func_prm = (struct tcp_func_prm *)arg;
  62. SOCKET svr = ptcp_func_prm->sock;
  63. printf("Server ready, sock %i\n", svr);
  64. next_request : {
  65. struct sockaddr_in cliadr;
  66. socklen_t adrlen = sizeof(cliadr);
  67. int buf_filled = 0;
  68. int req_ready = 0;
  69. memset(&cliadr, 0, sizeof(cliadr));
  70. SOCKET cli = accept(svr, (struct sockaddr *)&cliadr, &adrlen);
  71. if (cli == -1) {
  72. int er = errno;
  73. fprintf(stderr, "Error: Accept failed [%s]\n", strerror(er));
  74. test_sleep(1);
  75. goto next_request;
  76. }
  77. /* Read request */
  78. do {
  79. int r = recv(cli, req + buf_filled, sizeof(req) - buf_filled - 1, 0);
  80. if (r > 0) {
  81. buf_filled += r;
  82. req[buf_filled] = 0;
  83. if (strstr(req, "\r\n\r\n") != NULL) {
  84. req_ready = 1;
  85. }
  86. } else {
  87. /* some error */
  88. int er = errno;
  89. fprintf(stderr, "Error: Recv failed [%s]\n", strerror(er));
  90. test_sleep(1);
  91. goto next_request;
  92. }
  93. } while (!req_ready);
  94. /* Request is complete here.
  95. * Now send response */
  96. send(cli, RESPONSE.data, RESPONSE.size, MSG_NOSIGNAL);
  97. /* Close connection. */
  98. shutdown(cli, SHUT_RDWR);
  99. closesocket(cli);
  100. /* done */
  101. goto next_request;
  102. }
  103. free(arg);
  104. }
  105. static void
  106. init_tcp(void)
  107. {
  108. int r;
  109. int bind_success = 0;
  110. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  111. if (sock == -1) {
  112. r = errno;
  113. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  114. TESTabort();
  115. }
  116. for (PORT_NUM_HTTP = 1024; PORT_NUM_HTTP != 0; PORT_NUM_HTTP++) {
  117. struct sockaddr_in sin;
  118. memset(&sin, 0, sizeof(sin));
  119. sin.sin_family = AF_INET;
  120. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  121. sin.sin_port = htons(PORT_NUM_HTTP);
  122. r = bind(sock, (struct sockaddr *)&sin, sizeof(sin));
  123. if (r == 0) {
  124. bind_success = 1;
  125. break;
  126. }
  127. r = errno;
  128. fprintf(stderr, "Warning: Cannot bind [%s]\n", strerror(r));
  129. }
  130. if (!bind_success) {
  131. fprintf(stderr, "Error: Cannot bind to any port\n");
  132. closesocket(sock);
  133. TESTabort();
  134. }
  135. r = listen(sock, 128);
  136. if (r != 0) {
  137. r = errno;
  138. fprintf(stderr, "Error: Cannot listen [%s]\n", strerror(r));
  139. closesocket(sock);
  140. TESTabort();
  141. }
  142. pthread_t thread_id;
  143. pthread_attr_t attr;
  144. int result;
  145. struct tcp_func_prm *thread_prm;
  146. thread_prm = (struct tcp_func_prm *)malloc(sizeof(struct tcp_func_prm));
  147. if (!thread_prm) {
  148. fprintf(stderr, "Error: Out of memory\n");
  149. closesocket(sock);
  150. TESTabort();
  151. }
  152. thread_prm->sock = sock;
  153. (void)pthread_attr_init(&attr);
  154. (void)pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
  155. result = pthread_create(&thread_id, &attr, tcp_func, (void *)thread_prm);
  156. (void)pthread_attr_destroy(&attr);
  157. if (result != 0) {
  158. r = errno;
  159. fprintf(stderr, "Error: Cannot create thread [%s]\n", strerror(r));
  160. closesocket(sock);
  161. TESTabort();
  162. }
  163. test_sleep(5);
  164. }
  165. static int
  166. test_http_request(const char *server,
  167. uint16_t port,
  168. int use_ssl,
  169. const char *uri)
  170. {
  171. /* Client var */
  172. struct mg_connection *client;
  173. char client_err_buf[256];
  174. char client_data_buf[4096];
  175. const struct mg_response_info *client_ri;
  176. int64_t data_read;
  177. int r;
  178. client = mg_connect_client(
  179. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  180. if ((client == NULL) || (0 != strcmp(client_err_buf, ""))) {
  181. fprintf(stderr,
  182. "%s connection to server [%s] port [%u] failed: [%s]\n",
  183. use_ssl ? "HTTPS" : "HTTP",
  184. server,
  185. port,
  186. client_err_buf);
  187. if (client) {
  188. mg_close_connection(client);
  189. }
  190. /* In heavy fuzz testing, sometimes we run out of available sockets.
  191. * Wait for some seconds, and retry. */
  192. test_sleep(5);
  193. /* retry once */
  194. client = mg_connect_client(
  195. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  196. if (!client) {
  197. fprintf(stderr, "Retry: error\n");
  198. return 1;
  199. }
  200. fprintf(stderr, "Retry: success\n");
  201. }
  202. mg_printf(client, "GET %s HTTP/1.0\r\n\r\n", uri);
  203. r = mg_get_response(client, client_err_buf, sizeof(client_err_buf), 10000);
  204. if ((r < 0) || (0 != strcmp(client_err_buf, ""))) {
  205. mg_close_connection(client);
  206. return 1;
  207. }
  208. client_ri = mg_get_response_info(client);
  209. if (client_ri == NULL) {
  210. mg_close_connection(client);
  211. return 1;
  212. }
  213. data_read = 0;
  214. while (data_read < client_ri->content_length) {
  215. /* store the first sizeof(client_data_buf) bytes
  216. * of the HTTP response. */
  217. r = mg_read(client,
  218. client_data_buf + data_read,
  219. sizeof(client_data_buf) - (size_t)data_read);
  220. if (r > 0) {
  221. data_read += r;
  222. }
  223. /* buffer filled? */
  224. if (sizeof(client_data_buf) == (size_t)data_read) {
  225. /* ignore the rest */
  226. while (r > 0) {
  227. char trash[1024];
  228. r = mg_read(client, trash, sizeof(trash));
  229. }
  230. break;
  231. }
  232. }
  233. /* Nothing left to read */
  234. r = mg_read(client, client_data_buf, sizeof(client_data_buf));
  235. if (r != 0) {
  236. mg_close_connection(client);
  237. return 1;
  238. }
  239. mg_close_connection(client);
  240. return 0;
  241. }
  242. static int
  243. LLVMFuzzerTestOneInput_URI(const uint8_t *data, size_t size)
  244. {
  245. static char URI[1024 * 64]; /* static, to avoid stack overflow */
  246. if (call_count == 0) {
  247. memset(URI, 0, sizeof(URI));
  248. init_civetweb();
  249. }
  250. call_count++;
  251. if (size < sizeof(URI)) {
  252. memcpy(URI, data, size);
  253. URI[size] = 0;
  254. } else {
  255. return 1;
  256. }
  257. return test_http_request("127.0.0.1", PORT_NUM_HTTP, 0, URI);
  258. }
  259. static int
  260. LLVMFuzzerTestOneInput_REQUEST(const uint8_t *data, size_t size)
  261. {
  262. if (call_count == 0) {
  263. init_civetweb();
  264. }
  265. call_count++;
  266. int r;
  267. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  268. if (sock == -1) {
  269. r = errno;
  270. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  271. return 1;
  272. }
  273. struct sockaddr_in sin;
  274. memset(&sin, 0, sizeof(sin));
  275. sin.sin_family = AF_INET;
  276. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  277. sin.sin_port = htons(PORT_NUM_HTTP);
  278. r = connect(sock, (struct sockaddr *)&sin, sizeof(sin));
  279. if (r != 0) {
  280. r = errno;
  281. fprintf(stderr, "Error: Cannot connect [%s]\n", strerror(r));
  282. closesocket(sock);
  283. return 1;
  284. }
  285. char trash[1024];
  286. r = send(sock, data, size, 0);
  287. if (r != size) {
  288. fprintf(stderr, "Warning: %i bytes sent (TODO: Repeat)\n", r);
  289. }
  290. int data_read = 0;
  291. while ((r = recv(sock, trash, sizeof(trash), 0)) > 0) {
  292. data_read += r;
  293. };
  294. shutdown(sock, SHUT_RDWR);
  295. closesocket(sock);
  296. static int max_data_read = 0;
  297. if (data_read > max_data_read) {
  298. max_data_read = data_read;
  299. printf("GOT data: %i\n", data_read);
  300. }
  301. }
  302. static int
  303. LLVMFuzzerTestOneInput_RESPONSE(const uint8_t *data, size_t size)
  304. {
  305. if (call_count == 0) {
  306. init_tcp();
  307. }
  308. call_count++;
  309. if (size > sizeof(RESPONSE.data)) {
  310. return 1;
  311. }
  312. memcpy(RESPONSE.data, data, size);
  313. RESPONSE.size = size;
  314. char errbuf[256];
  315. struct mg_connection *conn =
  316. mg_connect_client("127.0.0.1", PORT_NUM_HTTP, 0, errbuf, sizeof(errbuf));
  317. if (!conn) {
  318. printf("Connect error: %s\n", errbuf);
  319. test_sleep(1);
  320. return 1;
  321. }
  322. mg_printf(conn, "GET / HTTP/1.0\r\n\r\n");
  323. int r = mg_get_response(conn, errbuf, sizeof(errbuf), 1000);
  324. const struct mg_response_info *ri = mg_get_response_info(conn);
  325. mg_close_connection(conn);
  326. return 0;
  327. }
  328. /* MAIN for fuzztest */
  329. int
  330. LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
  331. {
  332. #if defined(TEST_FUZZ1)
  333. /* fuzz target 1: different URI for HTTP/1 server */
  334. return LLVMFuzzerTestOneInput_URI(data, size);
  335. #elif defined(TEST_FUZZ2)
  336. /* fuzz target 2: different requests for HTTP/1 server */
  337. return LLVMFuzzerTestOneInput_REQUEST(data, size);
  338. #elif defined(TEST_FUZZ3)
  339. /* fuzz target 3: different responses for HTTP/1 client */
  340. return LLVMFuzzerTestOneInput_RESPONSE(data, size);
  341. #elif defined(TEST_FUZZ4)
  342. #error "Only useful in HTTP/2 feature branch"
  343. /* fuzz target 4: different requests for HTTP/2 server */
  344. return LLVMFuzzerTestOneInput_REQUEST_HTTP2(data, size);
  345. #elif defined(TEST_FUZZ5)
  346. /* fuzz target 5: calling an internal server test function,
  347. * bypassing network sockets */
  348. return LLVMFuzzerTestOneInput_process_new_connection(data, size);
  349. #else
  350. /* planned targets */
  351. #error "Unknown fuzz target"
  352. #endif
  353. }