fuzzmain.c 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419
  1. #include "civetweb.h"
  2. #include <errno.h>
  3. #include <stdint.h>
  4. #include <stdlib.h>
  5. #include <string.h>
  6. #if defined(_WIN32)
  7. #error "Currently not supported"
  8. #else
  9. #include <unistd.h>
  10. #define test_sleep(x) (sleep(x))
  11. #include <arpa/inet.h>
  12. #include <netinet/in.h>
  13. #include <netinet/ip.h>
  14. #include <pthread.h>
  15. #include <sys/socket.h>
  16. #include <sys/types.h>
  17. typedef int SOCKET;
  18. #define closesocket(a) (close(a))
  19. #endif
  20. /* Port configuration */
  21. #define PORT_NUM_HTTP 8081
  22. #define PORT_STR_HTTPHTTPS "8081,8443s"
  23. #define TESTabort() {fprintf(stderr, "!!! aborting fuzz test in line %u !!!", __LINE__); abort();}
  24. static uint64_t call_count = 0;
  25. static struct mg_context *ctx;
  26. static const char *OPTIONS[] = {"listening_ports",
  27. PORT_STR_HTTPHTTPS,
  28. "document_root",
  29. "fuzztest/docroot",
  30. "ssl_certificate",
  31. "resources/cert/server.pem",
  32. NULL,
  33. NULL};
  34. static void
  35. init_civetweb(void)
  36. {
  37. struct mg_callbacks callbacks;
  38. memset(&callbacks, 0, sizeof(callbacks));
  39. ctx = mg_start(&callbacks, 0, OPTIONS);
  40. if (!ctx) {
  41. fprintf(stderr, "\nCivetWeb test server failed to start\n");
  42. TESTabort();
  43. }
  44. /* Give server 5 seconds to start, before flooding with requests.
  45. * Don't know if this is required for fuzz-tests, but it was helpful
  46. * when testing starting/stopping the server multiple times in test
  47. * container environments. */
  48. test_sleep(5);
  49. }
  50. struct tcp_func_prm {
  51. SOCKET sock;
  52. };
  53. struct tRESPONSE {
  54. char data[4096];
  55. size_t size;
  56. } RESPONSE;
  57. static void *
  58. tcp_func(void *arg)
  59. {
  60. char req[1024 * 16];
  61. struct tcp_func_prm *ptcp_func_prm = (struct tcp_func_prm *)arg;
  62. SOCKET svr = ptcp_func_prm->sock;
  63. printf("Server ready, sock %i\n", svr);
  64. next_request : {
  65. struct sockaddr_in cliadr;
  66. socklen_t adrlen = sizeof(cliadr);
  67. int buf_filled = 0;
  68. int req_ready = 0;
  69. memset(&cliadr, 0, sizeof(cliadr));
  70. SOCKET cli = accept(svr, (struct sockaddr *)&cliadr, &adrlen);
  71. if (cli == -1) {
  72. int er = errno;
  73. fprintf(stderr, "Error: Accept failed [%s]\n", strerror(er));
  74. test_sleep(1);
  75. goto next_request;
  76. }
  77. /* Read request */
  78. do {
  79. int r = recv(cli, req + buf_filled, sizeof(req) - buf_filled - 1, 0);
  80. if (r > 0) {
  81. buf_filled += r;
  82. req[buf_filled] = 0;
  83. if (strstr(req, "\r\n\r\n") != NULL) {
  84. req_ready = 1;
  85. }
  86. } else {
  87. /* some error */
  88. int er = errno;
  89. fprintf(stderr, "Error: Recv failed [%s]\n", strerror(er));
  90. test_sleep(1);
  91. goto next_request;
  92. }
  93. } while (!req_ready);
  94. /* Request is complete here.
  95. * Now send response */
  96. send(cli, RESPONSE.data, RESPONSE.size, MSG_NOSIGNAL);
  97. /* Close connection. */
  98. shutdown(cli, SHUT_RDWR);
  99. closesocket(cli);
  100. /* done */
  101. goto next_request;
  102. }
  103. free(arg);
  104. }
  105. static void
  106. init_tcp(void)
  107. {
  108. int r;
  109. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  110. if (sock == -1) {
  111. r = errno;
  112. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  113. TESTabort();
  114. }
  115. struct sockaddr_in sin;
  116. memset(&sin, 0, sizeof(sin));
  117. sin.sin_family = AF_INET;
  118. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  119. sin.sin_port = htons(PORT_NUM_HTTP);
  120. r = bind(sock, (struct sockaddr *)&sin, sizeof(sin));
  121. if (r != 0) {
  122. r = errno;
  123. fprintf(stderr, "Error: Cannot bind [%s]\n", strerror(r));
  124. closesocket(sock);
  125. TESTabort();
  126. }
  127. r = listen(sock, 128);
  128. if (r != 0) {
  129. r = errno;
  130. fprintf(stderr, "Error: Cannot listen [%s]\n", strerror(r));
  131. closesocket(sock);
  132. TESTabort();
  133. }
  134. pthread_t thread_id;
  135. pthread_attr_t attr;
  136. int result;
  137. struct tcp_func_prm *thread_prm;
  138. thread_prm = (struct tcp_func_prm *)malloc(sizeof(struct tcp_func_prm));
  139. if (!thread_prm) {
  140. fprintf(stderr, "Error: Out of memory\n");
  141. closesocket(sock);
  142. TESTabort();
  143. }
  144. thread_prm->sock = sock;
  145. (void)pthread_attr_init(&attr);
  146. (void)pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
  147. result = pthread_create(&thread_id, &attr, tcp_func, (void *)thread_prm);
  148. (void)pthread_attr_destroy(&attr);
  149. if (result != 0) {
  150. r = errno;
  151. fprintf(stderr, "Error: Cannot create thread [%s]\n", strerror(r));
  152. closesocket(sock);
  153. TESTabort();
  154. }
  155. test_sleep(5);
  156. }
  157. static int
  158. test_http_request(const char *server,
  159. uint16_t port,
  160. int use_ssl,
  161. const char *uri)
  162. {
  163. /* Client var */
  164. struct mg_connection *client;
  165. char client_err_buf[256];
  166. char client_data_buf[4096];
  167. const struct mg_response_info *client_ri;
  168. int64_t data_read;
  169. int r;
  170. client = mg_connect_client(
  171. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  172. if ((client == NULL) || (0 != strcmp(client_err_buf, ""))) {
  173. fprintf(stderr,
  174. "%s connection to server [%s] port [%u] failed: [%s]\n",
  175. use_ssl ? "HTTPS" : "HTTP",
  176. server,
  177. port,
  178. client_err_buf);
  179. if (client) {
  180. mg_close_connection(client);
  181. }
  182. /* In heavy fuzz testing, sometimes we run out of available sockets.
  183. * Wait for some seconds, and retry. */
  184. test_sleep(5);
  185. /* retry once */
  186. client = mg_connect_client(
  187. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  188. if (!client) {
  189. fprintf(stderr, "Retry: error\n");
  190. return 1;
  191. }
  192. fprintf(stderr, "Retry: success\n");
  193. }
  194. mg_printf(client, "GET %s HTTP/1.0\r\n\r\n", uri);
  195. r = mg_get_response(client, client_err_buf, sizeof(client_err_buf), 10000);
  196. if ((r < 0) || (0 != strcmp(client_err_buf, ""))) {
  197. mg_close_connection(client);
  198. return 1;
  199. }
  200. client_ri = mg_get_response_info(client);
  201. if (client_ri == NULL) {
  202. mg_close_connection(client);
  203. return 1;
  204. }
  205. data_read = 0;
  206. while (data_read < client_ri->content_length) {
  207. /* store the first sizeof(client_data_buf) bytes
  208. * of the HTTP response. */
  209. r = mg_read(client,
  210. client_data_buf + data_read,
  211. sizeof(client_data_buf) - (size_t)data_read);
  212. if (r > 0) {
  213. data_read += r;
  214. }
  215. /* buffer filled? */
  216. if (sizeof(client_data_buf) == (size_t)data_read) {
  217. /* ignore the rest */
  218. while (r > 0) {
  219. char trash[1024];
  220. r = mg_read(client, trash, sizeof(trash));
  221. }
  222. break;
  223. }
  224. }
  225. /* Nothing left to read */
  226. r = mg_read(client, client_data_buf, sizeof(client_data_buf));
  227. if (r != 0) {
  228. mg_close_connection(client);
  229. return 1;
  230. }
  231. mg_close_connection(client);
  232. return 0;
  233. }
  234. static int
  235. LLVMFuzzerTestOneInput_URI(const uint8_t *data, size_t size)
  236. {
  237. static char URI[1024 * 64]; /* static, to avoid stack overflow */
  238. if (call_count == 0) {
  239. memset(URI, 0, sizeof(URI));
  240. init_civetweb();
  241. }
  242. call_count++;
  243. if (size < sizeof(URI)) {
  244. memcpy(URI, data, size);
  245. URI[size] = 0;
  246. } else {
  247. return 1;
  248. }
  249. return test_http_request("127.0.0.1", PORT_NUM_HTTP, 0, URI);
  250. }
  251. static int
  252. LLVMFuzzerTestOneInput_REQUEST(const uint8_t *data, size_t size)
  253. {
  254. if (call_count == 0) {
  255. init_civetweb();
  256. }
  257. call_count++;
  258. int r;
  259. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  260. if (sock == -1) {
  261. r = errno;
  262. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  263. return 1;
  264. }
  265. struct sockaddr_in sin;
  266. memset(&sin, 0, sizeof(sin));
  267. sin.sin_family = AF_INET;
  268. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  269. sin.sin_port = htons(PORT_NUM_HTTP);
  270. r = connect(sock, (struct sockaddr *)&sin, sizeof(sin));
  271. if (r != 0) {
  272. r = errno;
  273. fprintf(stderr, "Error: Cannot connect [%s]\n", strerror(r));
  274. closesocket(sock);
  275. return 1;
  276. }
  277. char trash[1024];
  278. r = send(sock, data, size, 0);
  279. if (r != size) {
  280. fprintf(stderr, "Warning: %i bytes sent (TODO: Repeat)\n", r);
  281. }
  282. int data_read = 0;
  283. while ((r = recv(sock, trash, sizeof(trash), 0)) > 0) {
  284. data_read += r;
  285. };
  286. shutdown(sock, SHUT_RDWR);
  287. closesocket(sock);
  288. static int max_data_read = 0;
  289. if (data_read > max_data_read) {
  290. max_data_read = data_read;
  291. printf("GOT data: %i\n", data_read);
  292. }
  293. }
  294. static int
  295. LLVMFuzzerTestOneInput_RESPONSE(const uint8_t *data, size_t size)
  296. {
  297. if (call_count == 0) {
  298. init_tcp();
  299. }
  300. call_count++;
  301. if (size > sizeof(RESPONSE.data)) {
  302. return 1;
  303. }
  304. memcpy(RESPONSE.data, data, size);
  305. RESPONSE.size = size;
  306. char errbuf[256];
  307. struct mg_connection *conn =
  308. mg_connect_client("127.0.0.1", PORT_NUM_HTTP, 0, errbuf, sizeof(errbuf));
  309. if (!conn) {
  310. printf("Connect error: %s\n", errbuf);
  311. test_sleep(1);
  312. return 1;
  313. }
  314. mg_printf(conn, "GET / HTTP/1.0\r\n\r\n");
  315. int r = mg_get_response(conn, errbuf, sizeof(errbuf), 1000);
  316. const struct mg_response_info *ri = mg_get_response_info(conn);
  317. mg_close_connection(conn);
  318. return 0;
  319. }
  320. /* MAIN for fuzztest */
  321. int
  322. LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
  323. {
  324. #if defined(TEST_FUZZ1)
  325. /* fuzz target 1: different URI for HTTP/1 server */
  326. return LLVMFuzzerTestOneInput_URI(data, size);
  327. #elif defined(TEST_FUZZ2)
  328. /* fuzz target 2: different requests for HTTP/1 server */
  329. return LLVMFuzzerTestOneInput_REQUEST(data, size);
  330. #elif defined(TEST_FUZZ3)
  331. /* fuzz target 3: different responses for HTTP/1 client */
  332. return LLVMFuzzerTestOneInput_RESPONSE(data, size);
  333. #elif defined(TEST_FUZZ4)
  334. #error "Only useful in HTTP/2 feature branch"
  335. /* fuzz target 4: different requests for HTTP/2 server */
  336. return LLVMFuzzerTestOneInput_REQUEST_HTTP2(data, size);
  337. #elif defined(TEST_FUZZ5)
  338. /* fuzz target 5: calling an internal server test function,
  339. * bypassing network sockets */
  340. return LLVMFuzzerTestOneInput_process_new_connection(data, size);
  341. #else
  342. /* planned targets */
  343. #error "Unknown fuzz target"
  344. #endif
  345. }