fuzzmain.c 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411
  1. #include "civetweb.h"
  2. #include <errno.h>
  3. #include <stdint.h>
  4. #include <stdlib.h>
  5. #include <string.h>
  6. #if defined(_WIN32)
  7. #error "Currently not supported"
  8. #else
  9. #include <unistd.h>
  10. #define test_sleep(x) (sleep(x))
  11. #include <arpa/inet.h>
  12. #include <netinet/in.h>
  13. #include <netinet/ip.h>
  14. #include <pthread.h>
  15. #include <sys/socket.h>
  16. #include <sys/types.h>
  17. typedef int SOCKET;
  18. #define closesocket(a) (close(a))
  19. #endif
  20. static uint64_t call_count = 0;
  21. static struct mg_context *ctx;
  22. static const char *OPTIONS[] = {"listening_ports",
  23. "8080,8443s",
  24. "document_root",
  25. "fuzztest/docroot",
  26. "ssl_certificate",
  27. "resources/cert/server.pem",
  28. NULL,
  29. NULL};
  30. static void
  31. init_civetweb(void)
  32. {
  33. struct mg_callbacks callbacks;
  34. memset(&callbacks, 0, sizeof(callbacks));
  35. ctx = mg_start(&callbacks, 0, OPTIONS);
  36. if (!ctx) {
  37. fprintf(stderr, "\nCivetWeb test server failed to start\n");
  38. abort();
  39. }
  40. /* Give server 5 seconds to start, before flooding with requests.
  41. * Don't know if this is required for fuzz-tests, but it was helpful
  42. * when testing starting/stopping the server multiple times in test
  43. * container environments. */
  44. test_sleep(5);
  45. }
  46. struct tcp_func_prm {
  47. SOCKET sock;
  48. };
  49. struct tRESPONSE {
  50. char data[4096];
  51. size_t size;
  52. } RESPONSE;
  53. static void *
  54. tcp_func(void *arg)
  55. {
  56. char req[1024 * 16];
  57. struct tcp_func_prm *ptcp_func_prm = (struct tcp_func_prm *)arg;
  58. SOCKET svr = ptcp_func_prm->sock;
  59. printf("Server ready, sock %i\n", svr);
  60. next_request : {
  61. struct sockaddr_in cliadr;
  62. socklen_t adrlen = sizeof(cliadr);
  63. int buf_filled = 0;
  64. int req_ready = 0;
  65. memset(&cliadr, 0, sizeof(cliadr));
  66. SOCKET cli = accept(svr, (struct sockaddr *)&cliadr, &adrlen);
  67. if (cli == -1) {
  68. int er = errno;
  69. fprintf(stderr, "Error: Accept failed [%s]\n", strerror(er));
  70. test_sleep(1);
  71. goto next_request;
  72. }
  73. /* Read request */
  74. do {
  75. int r = recv(cli, req + buf_filled, sizeof(req) - buf_filled - 1, 0);
  76. if (r > 0) {
  77. buf_filled += r;
  78. req[buf_filled] = 0;
  79. if (strstr(req, "\r\n\r\n") != NULL) {
  80. req_ready = 1;
  81. }
  82. } else {
  83. /* some error */
  84. int er = errno;
  85. fprintf(stderr, "Error: Recv failed [%s]\n", strerror(er));
  86. test_sleep(1);
  87. goto next_request;
  88. }
  89. } while (!req_ready);
  90. /* Request is complete here.
  91. * Now send response */
  92. send(cli, RESPONSE.data, RESPONSE.size, MSG_NOSIGNAL);
  93. /* Close connection. */
  94. shutdown(cli, SHUT_RDWR);
  95. closesocket(cli);
  96. /* done */
  97. goto next_request;
  98. }
  99. free(arg);
  100. }
  101. static void
  102. init_tcp(void)
  103. {
  104. int r;
  105. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  106. if (sock == -1) {
  107. r = errno;
  108. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  109. abort();
  110. }
  111. struct sockaddr_in sin;
  112. memset(&sin, 0, sizeof(sin));
  113. sin.sin_family = AF_INET;
  114. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  115. sin.sin_port = htons(8080);
  116. r = bind(sock, (struct sockaddr *)&sin, sizeof(sin));
  117. if (r != 0) {
  118. r = errno;
  119. fprintf(stderr, "Error: Cannot bind [%s]\n", strerror(r));
  120. closesocket(sock);
  121. abort();
  122. }
  123. r = listen(sock, 128);
  124. if (r != 0) {
  125. r = errno;
  126. fprintf(stderr, "Error: Cannot listen [%s]\n", strerror(r));
  127. closesocket(sock);
  128. abort();
  129. }
  130. pthread_t thread_id;
  131. pthread_attr_t attr;
  132. int result;
  133. struct tcp_func_prm *thread_prm;
  134. thread_prm = (struct tcp_func_prm *)malloc(sizeof(struct tcp_func_prm));
  135. if (!thread_prm) {
  136. fprintf(stderr, "Error: Out of memory\n");
  137. closesocket(sock);
  138. abort();
  139. }
  140. thread_prm->sock = sock;
  141. (void)pthread_attr_init(&attr);
  142. (void)pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
  143. result = pthread_create(&thread_id, &attr, tcp_func, (void *)thread_prm);
  144. (void)pthread_attr_destroy(&attr);
  145. if (result != 0) {
  146. r = errno;
  147. fprintf(stderr, "Error: Cannot create thread [%s]\n", strerror(r));
  148. closesocket(sock);
  149. abort();
  150. }
  151. test_sleep(5);
  152. }
  153. static int
  154. test_http_request(const char *server,
  155. uint16_t port,
  156. int use_ssl,
  157. const char *uri)
  158. {
  159. /* Client var */
  160. struct mg_connection *client;
  161. char client_err_buf[256];
  162. char client_data_buf[4096];
  163. const struct mg_response_info *client_ri;
  164. int64_t data_read;
  165. int r;
  166. client = mg_connect_client(
  167. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  168. if ((client == NULL) || (0 != strcmp(client_err_buf, ""))) {
  169. fprintf(stderr,
  170. "%s connection to server [%s] port [%u] failed: [%s]\n",
  171. use_ssl ? "HTTPS" : "HTTP",
  172. server,
  173. port,
  174. client_err_buf);
  175. if (client) {
  176. mg_close_connection(client);
  177. }
  178. /* In heavy fuzz testing, sometimes we run out of available sockets.
  179. * Wait for some seconds, and retry. */
  180. test_sleep(5);
  181. /* retry once */
  182. client = mg_connect_client(
  183. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  184. if (!client) {
  185. fprintf(stderr, "Retry: error\n");
  186. return 1;
  187. }
  188. fprintf(stderr, "Retry: success\n");
  189. }
  190. mg_printf(client, "GET %s HTTP/1.0\r\n\r\n", uri);
  191. r = mg_get_response(client, client_err_buf, sizeof(client_err_buf), 10000);
  192. if ((r < 0) || (0 != strcmp(client_err_buf, ""))) {
  193. mg_close_connection(client);
  194. return 1;
  195. }
  196. client_ri = mg_get_response_info(client);
  197. if (client_ri == NULL) {
  198. mg_close_connection(client);
  199. return 1;
  200. }
  201. data_read = 0;
  202. while (data_read < client_ri->content_length) {
  203. /* store the first sizeof(client_data_buf) bytes
  204. * of the HTTP response. */
  205. r = mg_read(client,
  206. client_data_buf + data_read,
  207. sizeof(client_data_buf) - (size_t)data_read);
  208. if (r > 0) {
  209. data_read += r;
  210. }
  211. /* buffer filled? */
  212. if (sizeof(client_data_buf) == (size_t)data_read) {
  213. /* ignore the rest */
  214. while (r > 0) {
  215. char trash[1024];
  216. r = mg_read(client, trash, sizeof(trash));
  217. }
  218. break;
  219. }
  220. }
  221. /* Nothing left to read */
  222. r = mg_read(client, client_data_buf, sizeof(client_data_buf));
  223. if (r != 0) {
  224. mg_close_connection(client);
  225. return 1;
  226. }
  227. mg_close_connection(client);
  228. return 0;
  229. }
  230. static int
  231. LLVMFuzzerTestOneInput_URI(const uint8_t *data, size_t size)
  232. {
  233. static char URI[1024 * 64]; /* static, to avoid stack overflow */
  234. if (call_count == 0) {
  235. memset(URI, 0, sizeof(URI));
  236. init_civetweb();
  237. }
  238. call_count++;
  239. if (size < sizeof(URI)) {
  240. memcpy(URI, data, size);
  241. URI[size] = 0;
  242. } else {
  243. return 1;
  244. }
  245. printf("URI: %s\n", URI);
  246. return test_http_request("127.0.0.1", 8080, 0, URI);
  247. }
  248. static int
  249. LLVMFuzzerTestOneInput_REQUEST(const uint8_t *data, size_t size)
  250. {
  251. if (call_count == 0) {
  252. init_civetweb();
  253. }
  254. call_count++;
  255. int r;
  256. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  257. if (sock == -1) {
  258. r = errno;
  259. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  260. return 1;
  261. }
  262. struct sockaddr_in sin;
  263. memset(&sin, 0, sizeof(sin));
  264. sin.sin_family = AF_INET;
  265. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  266. sin.sin_port = htons(8080);
  267. r = connect(sock, (struct sockaddr *)&sin, sizeof(sin));
  268. if (r != 0) {
  269. r = errno;
  270. fprintf(stderr, "Error: Cannot connect [%s]\n", strerror(r));
  271. closesocket(sock);
  272. return 1;
  273. }
  274. char trash[1024];
  275. r = send(sock, data, size, 0);
  276. if (r != size) {
  277. fprintf(stderr, "Warning: %i bytes sent (TODO: Repeat)\n", r);
  278. }
  279. int data_read = 0;
  280. while ((r = recv(sock, trash, sizeof(trash), 0)) > 0) {
  281. data_read += r;
  282. };
  283. shutdown(sock, SHUT_RDWR);
  284. closesocket(sock);
  285. static int max_data_read = 0;
  286. if (data_read > max_data_read) {
  287. max_data_read = data_read;
  288. printf("GOT data: %i\n", data_read);
  289. }
  290. }
  291. static int
  292. LLVMFuzzerTestOneInput_RESPONSE(const uint8_t *data, size_t size)
  293. {
  294. if (call_count == 0) {
  295. init_tcp();
  296. }
  297. call_count++;
  298. if (size > sizeof(RESPONSE.data)) {
  299. return 1;
  300. }
  301. memcpy(RESPONSE.data, data, size);
  302. RESPONSE.size = size;
  303. char errbuf[256];
  304. struct mg_connection *conn =
  305. mg_connect_client("127.0.0.1", 8080, 0, errbuf, sizeof(errbuf));
  306. if (!conn) {
  307. printf("Connect error: %s\n", errbuf);
  308. test_sleep(1);
  309. return 1;
  310. }
  311. mg_printf(conn, "GET / HTTP/1.0\r\n\r\n");
  312. int r = mg_get_response(conn, errbuf, sizeof(errbuf), 1000);
  313. const struct mg_response_info *ri = mg_get_response_info(conn);
  314. mg_close_connection(conn);
  315. return 0;
  316. }
  317. int
  318. LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
  319. {
  320. #if defined(TEST_FUZZ1)
  321. /* fuzz target 1: different URI for HTTP/1 server */
  322. return LLVMFuzzerTestOneInput_URI(data, size);
  323. #elif defined(TEST_FUZZ2)
  324. /* fuzz target 2: different requests for HTTP/1 server */
  325. return LLVMFuzzerTestOneInput_REQUEST(data, size);
  326. #elif defined(TEST_FUZZ3)
  327. /* fuzz target 3: different responses for HTTP/1 client */
  328. return LLVMFuzzerTestOneInput_RESPONSE(data, size);
  329. #elif defined(TEST_FUZZ4)
  330. /* fuzz target 4: different requests for HTTP/2 server */
  331. #error "Only useful in HTTP/2 feature branch"
  332. #elif defined(TEST_FUZZ5)
  333. /* fuzz target 5: calling an internal server test function,
  334. * bypassing network sockets */
  335. #error "Not implemented yet"
  336. #else
  337. /* planned targets */
  338. #error "Unknown fuzz target"
  339. #endif
  340. }