blob: 3b9d2368d367cdfd69fa028bd18d4c74f5504904 [file] [log] [blame]
// Copyright 2019 The Pigweed Authors
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
// use this file except in compliance with the License. You may obtain a copy of
// the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
// License for the specific language governing permissions and limitations under
// the License.
#include <cstddef>
#include <cstdint>
#include <cstring>
#include <vector>
#include "fuzz.h"
#include "pw_fuzzer/asan_interface.h"
#include "pw_fuzzer/fuzzed_data_provider.h"
#include "pw_protobuf/encoder.h"
#include "pw_span/span.h"
namespace pw::protobuf::fuzz {
namespace {
// TODO: b/235289495 - Move this to pw_fuzzer/fuzzed_data_provider.h
// Uses the given |provider| to pick and return a number between 0 and the
// maximum numbers of T that can be generated from the remaining input data.
template <typename T>
size_t ConsumeSize(FuzzedDataProvider& provider) {
size_t max = provider.remaining_bytes() / sizeof(T);
return provider.ConsumeIntegralInRange<size_t>(0, max);
}
// Uses the given |provider| to generate several instances of T, store them in
// |data|, and then return a span to them. It is the caller's responsbility
// to ensure |data| remains in scope as long as the returned span.
template <typename T>
span<const T> ConsumeSpan(FuzzedDataProvider& provider, std::vector<T>* data) {
size_t num = ConsumeSize<T>(provider);
size_t off = data->size();
if (num == 0) {
return span<const T>();
}
data->reserve(off + num);
for (size_t i = 0; i < num; ++i) {
if constexpr (std::is_floating_point<T>::value) {
data->push_back(provider.ConsumeFloatingPoint<T>());
} else {
data->push_back(provider.ConsumeIntegral<T>());
}
}
return span(&((*data)[off]), num);
}
// Uses the given |provider| to generate a string, store it in |data|, and
// return a C-style representation. It is the caller's responsbility to
// ensure |data| remains in scope as long as the returned char*.
const char* ConsumeString(FuzzedDataProvider& provider,
std::vector<std::string>* data) {
size_t off = data->size();
// OSS-Fuzz's clang doesn't have the zero-parameter version of
// ConsumeRandomLengthString yet.
size_t max_length = std::numeric_limits<size_t>::max();
data->push_back(provider.ConsumeRandomLengthString(max_length));
return (*data)[off].c_str();
}
// Uses the given |provider| to generate non-arithmetic bytes, store them in
// |data|, and return a span to them. It is the caller's responsbility to
// ensure |data| remains in scope as long as the returned span.
span<const std::byte> ConsumeBytes(FuzzedDataProvider& provider,
std::vector<std::byte>* data) {
size_t num = ConsumeSize<std::byte>(provider);
auto added = provider.ConsumeBytes<std::byte>(num);
size_t off = data->size();
num = added.size();
data->insert(data->end(), added.begin(), added.end());
// It's possible nothing was added, and the vector was empty to begin with.
if (data->empty()) {
return span<const std::byte>();
}
return span(&((*data)[off]), num);
}
void RecursiveFuzzedEncode(FuzzedDataProvider& provider,
StreamEncoder& encoder,
uint32_t depth = 0) {
constexpr size_t kMaxDepth = 256;
if (depth > kMaxDepth) {
return;
}
// Storage for generated spans
std::vector<uint32_t> u32s;
std::vector<uint64_t> u64s;
std::vector<int32_t> s32s;
std::vector<int64_t> s64s;
std::vector<float> floats;
std::vector<double> doubles;
std::vector<std::string> strings;
std::vector<std::byte> bytes;
// Consume the fuzzing input, using it to generate a sequence of fields to
// encode. Both the uint32_t field IDs and the fields values are generated.
// Don't try to detect errors, ensures pushes and pops are balanced, or
// otherwise hold the interface correctly. Instead, fuzz the widest possbile
// set of inputs to the encoder to ensure it doesn't misbehave.
while (provider.remaining_bytes() != 0) {
switch (provider.ConsumeEnum<FieldType>()) {
case kUint32:
encoder
.WriteUint32(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<uint32_t>())
.IgnoreError();
break;
case kPackedUint32:
encoder
.WritePackedUint32(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<uint32_t>(provider, &u32s))
.IgnoreError();
break;
case kUint64:
encoder
.WriteUint64(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<uint64_t>())
.IgnoreError();
break;
case kPackedUint64:
encoder
.WritePackedUint64(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<uint64_t>(provider, &u64s))
.IgnoreError();
break;
case kInt32:
encoder
.WriteInt32(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<int32_t>())
.IgnoreError();
break;
case kPackedInt32:
encoder
.WritePackedInt32(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<int32_t>(provider, &s32s))
.IgnoreError();
break;
case kInt64:
encoder
.WriteInt64(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<int64_t>())
.IgnoreError();
break;
case kPackedInt64:
encoder
.WritePackedInt64(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<int64_t>(provider, &s64s))
.IgnoreError();
break;
case kSint32:
encoder
.WriteSint32(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<int32_t>())
.IgnoreError();
break;
case kPackedSint32:
encoder
.WritePackedSint32(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<int32_t>(provider, &s32s))
.IgnoreError();
break;
case kSint64:
encoder
.WriteSint64(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<int64_t>())
.IgnoreError();
break;
case kPackedSint64:
encoder
.WritePackedSint64(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<int64_t>(provider, &s64s))
.IgnoreError();
break;
case kBool:
encoder
.WriteBool(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeBool())
.IgnoreError();
break;
case kFixed32:
encoder
.WriteFixed32(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<uint32_t>())
.IgnoreError();
break;
case kPackedFixed32:
encoder
.WritePackedFixed32(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<uint32_t>(provider, &u32s))
.IgnoreError();
break;
case kFixed64:
encoder
.WriteFixed64(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<uint64_t>())
.IgnoreError();
break;
case kPackedFixed64:
encoder
.WritePackedFixed64(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<uint64_t>(provider, &u64s))
.IgnoreError();
break;
case kSfixed32:
encoder
.WriteSfixed32(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<int32_t>())
.IgnoreError();
break;
case kPackedSfixed32:
encoder
.WritePackedSfixed32(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<int32_t>(provider, &s32s))
.IgnoreError();
break;
case kSfixed64:
encoder
.WriteSfixed64(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeIntegral<int64_t>())
.IgnoreError();
break;
case kPackedSfixed64:
encoder
.WritePackedSfixed64(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<int64_t>(provider, &s64s))
.IgnoreError();
break;
case kFloat:
encoder
.WriteFloat(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeFloatingPoint<float>())
.IgnoreError();
break;
case kPackedFloat:
encoder
.WritePackedFloat(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<float>(provider, &floats))
.IgnoreError();
break;
case kDouble:
encoder
.WriteDouble(provider.ConsumeIntegral<uint32_t>(),
provider.ConsumeFloatingPoint<double>())
.IgnoreError();
break;
case kPackedDouble:
encoder
.WritePackedDouble(provider.ConsumeIntegral<uint32_t>(),
ConsumeSpan<double>(provider, &doubles))
.IgnoreError();
break;
case kBytes:
encoder
.WriteBytes(provider.ConsumeIntegral<uint32_t>(),
ConsumeBytes(provider, &bytes))
.IgnoreError();
break;
case kString:
encoder
.WriteString(provider.ConsumeIntegral<uint32_t>(),
ConsumeString(provider, &strings))
.IgnoreError();
break;
case kPush: {
// Special "field". The marks the start of a nested message.
StreamEncoder nested_encoder =
encoder.GetNestedEncoder(provider.ConsumeIntegral<uint32_t>());
RecursiveFuzzedEncode(provider, nested_encoder, depth + 1);
break;
}
case kPop:
if (depth > 0) {
// Special "field". The marks the end of a nested message.
return;
}
}
}
}
void TestOneInput(FuzzedDataProvider& provider) {
static std::byte buffer[65536];
// Pick a subset of the buffer that the fuzzer is allowed to use, and poison
// the rest.
size_t unpoisoned_length =
provider.ConsumeIntegralInRange<size_t>(0, sizeof(buffer));
ByteSpan unpoisoned(buffer, unpoisoned_length);
void* poisoned = &buffer[unpoisoned_length];
size_t poisoned_length = sizeof(buffer) - unpoisoned_length;
ASAN_POISON_MEMORY_REGION(poisoned, poisoned_length);
pw::protobuf::MemoryEncoder encoder(unpoisoned);
RecursiveFuzzedEncode(provider, encoder);
// Don't forget to unpoison for the next iteration!
ASAN_UNPOISON_MEMORY_REGION(poisoned, poisoned_length);
}
} // namespace
} // namespace pw::protobuf::fuzz
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
FuzzedDataProvider provider(data, size);
pw::protobuf::fuzz::TestOneInput(provider);
return 0;
}