blob: e6a7c36287f6d5e837b122b534bf3959dc3978f1 [file] [log] [blame]
// Copyright 2023 The Centipede Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// A simple fuzz target that contains bugs detectable by different sanitizers.
// For now, asan and msan.
#include <unistd.h>
#include <cstdint>
#include <cstdio>
#include <cstdlib>
#include <cstring>
[[maybe_unused]] static volatile void *sink;
[[maybe_unused]] static volatile void *ptr_sink;
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
if (size != 3) return 0; // Make bugs easy to discover.
// "uaf" => heap-use-after-free
if (data[0] == 'u' && data[1] == 'a' && data[2] == 'f') {
int *x = new int;
fprintf(stderr, "uaf %p\n", x);
sink = x;
delete x;
*x = 0;
}
// Allocate 4Gb of RAM if the input is 'oom'.
// sanitizer_test provokes OOM by feeding 'oom' input here,
// and checks its output format matches with the expectation of clusterfuzz.
if (data[0] == 'o' && data[1] == 'o' && data[2] == 'm') {
size_t oom_allocation_size = 1ULL << 32;
void *ptr = malloc(oom_allocation_size);
memset(ptr, 42, oom_allocation_size);
ptr_sink = ptr;
}
// 'slo' => Sleep for 10 seconds to provoke timeout.
if (data[0] == 's' && data[1] == 'l' && data[2] == 'o') {
sleep(10);
}
return 0;
}