fuzzmain.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456
  1. #include "civetweb.h"
  2. #include <errno.h>
  3. #include <stdint.h>
  4. #include <stdlib.h>
  5. #include <string.h>
  6. #if defined(_WIN32)
  7. #error "Currently not supported"
  8. #else
  9. #include <unistd.h>
  10. #define test_sleep(x) (sleep(x))
  11. #include <arpa/inet.h>
  12. #include <netinet/in.h>
  13. #include <netinet/ip.h>
  14. #include <pthread.h>
  15. #include <sys/socket.h>
  16. #include <sys/types.h>
  17. typedef int SOCKET;
  18. #define closesocket(a) (close(a))
  19. #endif
  20. /* Port configuration */
  21. unsigned short PORT_NUM_HTTP = 0; /* set dynamically */
  22. #define TESTabort() \
  23. { \
  24. fprintf(stderr, "!!! aborting fuzz test in line %u !!!", __LINE__); \
  25. abort(); \
  26. }
  27. static uint64_t call_count = 0;
  28. static struct mg_context *ctx;
  29. static const char *OPTIONS[] = {"listening_ports",
  30. "0", /* port: auto */
  31. "document_root",
  32. "fuzztest/docroot",
  33. NULL,
  34. NULL};
  35. static void
  36. init_civetweb(void)
  37. {
  38. struct mg_callbacks callbacks;
  39. struct mg_server_port ports[8];
  40. memset(&callbacks, 0, sizeof(callbacks));
  41. memset(&ports, 0, sizeof(ports));
  42. ctx = mg_start(&callbacks, 0, OPTIONS);
  43. if (!ctx) {
  44. fprintf(stderr, "\nCivetWeb test server failed to start\n");
  45. TESTabort();
  46. }
  47. int ret = mg_get_server_ports(ctx, 8, ports);
  48. if (ret != 1) {
  49. fprintf(stderr,
  50. "\nCivetWeb test server: cannot determine port number\n");
  51. TESTabort();
  52. }
  53. if (ports[0].is_ssl != 0) {
  54. fprintf(stderr,
  55. "\nCivetWeb fuzz test works on HTTP, not HTTPS.\n"
  56. "TLS librarys should be fuzzed separately.\n");
  57. TESTabort();
  58. }
  59. PORT_NUM_HTTP = ports[0].port;
  60. printf("CivetWeb server running on port %i\n", (int)PORT_NUM_HTTP);
  61. /* Give server 5 seconds to start, before flooding with requests.
  62. * Don't know if this is required for fuzz-tests, but it was helpful
  63. * when testing starting/stopping the server multiple times in test
  64. * container environments. */
  65. test_sleep(5);
  66. }
  67. struct tcp_func_prm {
  68. SOCKET sock;
  69. };
  70. struct tRESPONSE {
  71. char data[4096];
  72. size_t size;
  73. } RESPONSE;
  74. static void *
  75. tcp_func(void *arg)
  76. {
  77. char req[1024 * 16];
  78. SOCKET svr = (SOCKET)(-1);
  79. /* Get thread parameters and free arg */
  80. {
  81. struct tcp_func_prm *ptcp_func_prm = (struct tcp_func_prm *)arg;
  82. svr = ptcp_func_prm->sock;
  83. free(arg);
  84. }
  85. printf("MOCK server ready, sock %i\n", svr);
  86. next_request : {
  87. struct sockaddr_in cliadr;
  88. socklen_t adrlen = sizeof(cliadr);
  89. int buf_filled = 0;
  90. int req_ready = 0;
  91. memset(&cliadr, 0, sizeof(cliadr));
  92. SOCKET cli = accept(svr, (struct sockaddr *)&cliadr, &adrlen);
  93. if (cli == -1) {
  94. int er = errno;
  95. fprintf(stderr, "Error: Accept failed [%s]\n", strerror(er));
  96. test_sleep(1);
  97. goto next_request;
  98. }
  99. /* Read request */
  100. do {
  101. int r = recv(cli, req + buf_filled, sizeof(req) - buf_filled - 1, 0);
  102. if (r > 0) {
  103. buf_filled += r;
  104. req[buf_filled] = 0;
  105. if (strstr(req, "\r\n\r\n") != NULL) {
  106. req_ready = 1;
  107. }
  108. } else {
  109. /* some error */
  110. int er = errno;
  111. fprintf(stderr, "Error: Recv failed [%s]\n", strerror(er));
  112. test_sleep(1);
  113. goto next_request;
  114. }
  115. } while (!req_ready);
  116. /* Request is complete here.
  117. * Now send response */
  118. send(cli, RESPONSE.data, RESPONSE.size, MSG_NOSIGNAL);
  119. /* Close connection. */
  120. shutdown(cli, SHUT_RDWR);
  121. closesocket(cli);
  122. /* done */
  123. goto next_request;
  124. }
  125. }
  126. static void
  127. init_tcp(void)
  128. {
  129. int r;
  130. int bind_success = 0;
  131. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  132. if (sock == -1) {
  133. r = errno;
  134. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  135. TESTabort();
  136. }
  137. for (PORT_NUM_HTTP = 1024; PORT_NUM_HTTP != 0; PORT_NUM_HTTP++) {
  138. struct sockaddr_in sin;
  139. memset(&sin, 0, sizeof(sin));
  140. sin.sin_family = AF_INET;
  141. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  142. sin.sin_port = htons(PORT_NUM_HTTP);
  143. r = bind(sock, (struct sockaddr *)&sin, sizeof(sin));
  144. if (r == 0) {
  145. bind_success = 1;
  146. break;
  147. }
  148. r = errno;
  149. fprintf(stderr, "Warning: Cannot bind [%s]\n", strerror(r));
  150. }
  151. if (!bind_success) {
  152. fprintf(stderr, "Error: Cannot bind to any port\n");
  153. closesocket(sock);
  154. TESTabort();
  155. }
  156. printf("MOCK server running on port %i\n", (int)PORT_NUM_HTTP);
  157. r = listen(sock, 128);
  158. if (r != 0) {
  159. r = errno;
  160. fprintf(stderr, "Error: Cannot listen [%s]\n", strerror(r));
  161. closesocket(sock);
  162. TESTabort();
  163. }
  164. pthread_t thread_id;
  165. pthread_attr_t attr;
  166. int result;
  167. struct tcp_func_prm *thread_prm;
  168. thread_prm = (struct tcp_func_prm *)malloc(sizeof(struct tcp_func_prm));
  169. if (!thread_prm) {
  170. fprintf(stderr, "Error: Out of memory\n");
  171. closesocket(sock);
  172. TESTabort();
  173. }
  174. thread_prm->sock = sock;
  175. (void)pthread_attr_init(&attr);
  176. (void)pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
  177. result = pthread_create(&thread_id, &attr, tcp_func, (void *)thread_prm);
  178. (void)pthread_attr_destroy(&attr);
  179. if (result != 0) {
  180. r = errno;
  181. fprintf(stderr, "Error: Cannot create thread [%s]\n", strerror(r));
  182. closesocket(sock);
  183. TESTabort();
  184. }
  185. test_sleep(5);
  186. }
  187. static int
  188. test_http_request(const char *server,
  189. uint16_t port,
  190. int use_ssl,
  191. const char *uri)
  192. {
  193. /* Client var */
  194. struct mg_connection *client;
  195. char client_err_buf[256];
  196. char client_data_buf[4096];
  197. const struct mg_response_info *client_ri;
  198. int64_t data_read;
  199. int r;
  200. client = mg_connect_client(
  201. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  202. if ((client == NULL) || (0 != strcmp(client_err_buf, ""))) {
  203. fprintf(stderr,
  204. "%s connection to server [%s] port [%u] failed: [%s]\n",
  205. use_ssl ? "HTTPS" : "HTTP",
  206. server,
  207. port,
  208. client_err_buf);
  209. if (client) {
  210. mg_close_connection(client);
  211. }
  212. /* In heavy fuzz testing, sometimes we run out of available sockets.
  213. * Wait for some seconds, and retry. */
  214. test_sleep(5);
  215. /* retry once */
  216. client = mg_connect_client(
  217. server, port, use_ssl, client_err_buf, sizeof(client_err_buf));
  218. if (!client) {
  219. fprintf(stderr, "Retry: error\n");
  220. return 1;
  221. }
  222. fprintf(stderr, "Retry: success\n");
  223. }
  224. mg_printf(client, "GET %s HTTP/1.0\r\n\r\n", uri);
  225. r = mg_get_response(client, client_err_buf, sizeof(client_err_buf), 10000);
  226. if ((r < 0) || (0 != strcmp(client_err_buf, ""))) {
  227. mg_close_connection(client);
  228. return 1;
  229. }
  230. client_ri = mg_get_response_info(client);
  231. if (client_ri == NULL) {
  232. mg_close_connection(client);
  233. return 1;
  234. }
  235. data_read = 0;
  236. while (data_read < client_ri->content_length) {
  237. /* store the first sizeof(client_data_buf) bytes
  238. * of the HTTP response. */
  239. r = mg_read(client,
  240. client_data_buf + data_read,
  241. sizeof(client_data_buf) - (size_t)data_read);
  242. if (r > 0) {
  243. data_read += r;
  244. }
  245. /* buffer filled? */
  246. if (sizeof(client_data_buf) == (size_t)data_read) {
  247. /* ignore the rest */
  248. while (r > 0) {
  249. char trash[1024];
  250. r = mg_read(client, trash, sizeof(trash));
  251. }
  252. break;
  253. }
  254. }
  255. /* Nothing left to read */
  256. r = mg_read(client, client_data_buf, sizeof(client_data_buf));
  257. if (r != 0) {
  258. mg_close_connection(client);
  259. return 1;
  260. }
  261. mg_close_connection(client);
  262. return 0;
  263. }
  264. static int
  265. LLVMFuzzerTestOneInput_URI(const uint8_t *data, size_t size)
  266. {
  267. static char URI[1024 * 64]; /* static, to avoid stack overflow */
  268. if (call_count == 0) {
  269. memset(URI, 0, sizeof(URI));
  270. init_civetweb();
  271. }
  272. call_count++;
  273. if (size < sizeof(URI)) {
  274. memcpy(URI, data, size);
  275. URI[size] = 0;
  276. } else {
  277. return 1;
  278. }
  279. return test_http_request("127.0.0.1", PORT_NUM_HTTP, 0, URI);
  280. }
  281. static int
  282. LLVMFuzzerTestOneInput_REQUEST(const uint8_t *data, size_t size)
  283. {
  284. if (call_count == 0) {
  285. init_civetweb();
  286. }
  287. call_count++;
  288. int r;
  289. SOCKET sock = socket(AF_INET, SOCK_STREAM, 6);
  290. if (sock == -1) {
  291. r = errno;
  292. fprintf(stderr, "Error: Cannot create socket [%s]\n", strerror(r));
  293. return 1;
  294. }
  295. struct sockaddr_in sin;
  296. memset(&sin, 0, sizeof(sin));
  297. sin.sin_family = AF_INET;
  298. sin.sin_addr.s_addr = inet_addr("127.0.0.1");
  299. sin.sin_port = htons(PORT_NUM_HTTP);
  300. r = connect(sock, (struct sockaddr *)&sin, sizeof(sin));
  301. if (r != 0) {
  302. r = errno;
  303. fprintf(stderr, "Error: Cannot connect [%s]\n", strerror(r));
  304. closesocket(sock);
  305. return 1;
  306. }
  307. char trash[1024];
  308. r = send(sock, data, size, 0);
  309. if (r != size) {
  310. fprintf(stderr, "Warning: %i bytes sent (TODO: Repeat)\n", r);
  311. }
  312. int data_read = 0;
  313. while ((r = recv(sock, trash, sizeof(trash), 0)) > 0) {
  314. data_read += r;
  315. };
  316. shutdown(sock, SHUT_RDWR);
  317. closesocket(sock);
  318. static int max_data_read = 0;
  319. if (data_read > max_data_read) {
  320. max_data_read = data_read;
  321. printf("GOT data: %i\n", data_read);
  322. }
  323. }
  324. static int
  325. LLVMFuzzerTestOneInput_RESPONSE(const uint8_t *data, size_t size)
  326. {
  327. if (call_count == 0) {
  328. init_tcp();
  329. }
  330. call_count++;
  331. if (size > sizeof(RESPONSE.data)) {
  332. return 1;
  333. }
  334. memcpy(RESPONSE.data, data, size);
  335. RESPONSE.size = size;
  336. char errbuf[256];
  337. struct mg_connection *conn = mg_connect_client(
  338. "127.0.0.1", PORT_NUM_HTTP, 0, errbuf, sizeof(errbuf));
  339. if (!conn) {
  340. printf("Connect error: %s\n", errbuf);
  341. test_sleep(1);
  342. return 1;
  343. }
  344. mg_printf(conn, "GET / HTTP/1.0\r\n\r\n");
  345. int r = mg_get_response(conn, errbuf, sizeof(errbuf), 1000);
  346. const struct mg_response_info *ri = mg_get_response_info(conn);
  347. mg_close_connection(conn);
  348. return 0;
  349. }
  350. /* MAIN for fuzztest */
  351. int
  352. LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
  353. {
  354. #if defined(TEST_FUZZ1)
  355. /* fuzz target 1: different URI for HTTP/1 server */
  356. return LLVMFuzzerTestOneInput_URI(data, size);
  357. #elif defined(TEST_FUZZ2)
  358. /* fuzz target 2: different requests for HTTP/1 server */
  359. return LLVMFuzzerTestOneInput_REQUEST(data, size);
  360. #elif defined(TEST_FUZZ3)
  361. /* fuzz target 3: different responses for HTTP/1 client */
  362. return LLVMFuzzerTestOneInput_RESPONSE(data, size);
  363. #elif defined(TEST_FUZZ4)
  364. #error "Only useful in HTTP/2 feature branch"
  365. /* fuzz target 4: different requests for HTTP/2 server */
  366. return LLVMFuzzerTestOneInput_REQUEST_HTTP2(data, size);
  367. #elif defined(TEST_FUZZ5)
  368. /* fuzz target 5: calling an internal server test function,
  369. * bypassing network sockets */
  370. return LLVMFuzzerTestOneInput_process_new_connection(data, size);
  371. #else
  372. /* planned targets */
  373. #error "Unknown fuzz target"
  374. #endif
  375. }