2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-22 10:10:06 +00:00
bind/fuzz/main.c
Ondřej Surý f5c204ac3e
Move the library init and shutdown to executables
Instead of relying on unreliable order of execution of the library
constructors and destructors, move them to individual binaries.  The
advantage is that the execution time and order will remain constant and
will not depend on the dynamic load dependency solver.

This requires more work, but that was mitigated by a simple requirement,
any executable using libisc and libdns, must include <isc/lib.h> and
<dns/lib.h> respectively (in this particular order).  In turn, these two
headers must not be included from within any library as they contain
inlined functions marked with constructor/destructor attributes.
2025-02-22 16:19:00 +01:00

169 lines
3.2 KiB
C

/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
#include <errno.h>
#include <fcntl.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/stat.h>
#include <unistd.h>
#include <isc/lib.h>
#include <dns/lib.h>
#include "fuzz.h"
#ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
#include <dirent.h>
static void
test_one_file(const char *filename) {
int fd;
struct stat st;
char *data;
ssize_t n;
if ((fd = open(filename, O_RDONLY)) == -1) {
fprintf(stderr, "Failed to open %s: %s\n", filename,
strerror(errno));
return;
}
if (fstat(fd, &st) != 0) {
fprintf(stderr, "Failed to stat %s: %s\n", filename,
strerror(errno));
goto closefd;
}
data = malloc(st.st_size);
n = read(fd, data, st.st_size);
if (n == st.st_size) {
printf("testing %zd bytes from %s\n", n, filename);
fflush(stdout);
LLVMFuzzerTestOneInput((const uint8_t *)data, n);
fflush(stderr);
} else {
if (n < 0) {
fprintf(stderr,
"Failed to read %zd bytes from %s: %s\n",
(ssize_t)st.st_size, filename, strerror(errno));
} else {
fprintf(stderr,
"Failed to read %zd bytes from %s, got %zd\n",
(ssize_t)st.st_size, filename, n);
}
}
free(data);
closefd:
close(fd);
}
static void
test_all_from(const char *dirname) {
DIR *dirp;
struct dirent *dp;
dirp = opendir(dirname);
if (dirp == NULL) {
return;
}
while ((dp = readdir(dirp)) != NULL) {
char filename[strlen(dirname) + strlen(dp->d_name) + 2];
if (dp->d_name[0] == '.') {
continue;
}
snprintf(filename, sizeof(filename), "%s/%s", dirname,
dp->d_name);
test_one_file(filename);
}
closedir(dirp);
}
int
main(int argc, char **argv) {
int ret;
char corpusdir[PATH_MAX];
const char *target = strrchr(argv[0], '/');
ret = LLVMFuzzerInitialize(&argc, &argv);
if (ret != 0) {
fprintf(stderr, "LLVMFuzzerInitialize failure: %d\n", ret);
return 1;
}
if (argv[1] != NULL && strcmp(argv[1], "-d") == 0) {
debug = true;
argv++;
argc--;
}
if (argv[1] != NULL) {
while (argv[1] != NULL) {
test_one_file(argv[1]);
argv++;
argc--;
}
POST(argc);
return 0;
}
target = (target != NULL) ? target + 1 : argv[0];
if (strncmp(target, "lt-", 3) == 0) {
target += 3;
}
snprintf(corpusdir, sizeof(corpusdir), FUZZDIR "/%s.in", target);
test_all_from(corpusdir);
return 0;
}
#elif __AFL_COMPILER
int
main(int argc, char **argv) {
int ret;
unsigned char buf[64 * 1024];
LLVMFuzzerInitialize(&argc, &argv);
if (ret != 0) {
fprintf(stderr, "LLVMFuzzerInitialize failure: %d\n", ret);
return 1;
}
#ifdef __AFL_LOOP
while (__AFL_LOOP(10000)) { /* only works with afl-clang-fast */
#else /* ifdef __AFL_LOOP */
{
#endif /* ifdef __AFL_LOOP */
ret = fread(buf, 1, sizeof(buf), stdin);
if (ret < 0) {
return 0;
}
LLVMFuzzerTestOneInput(buf, ret);
}
return 0;
}
#endif /* FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION */