Blame SOURCES/0253-tests-add-a-fuzzer-for-dev_kmsg_record.patch

ddca0b
From e7e70f575840cd021f6429f264911ae0cbff9741 Mon Sep 17 00:00:00 2001
ddca0b
From: Evgeny Vereshchagin <evvers@ya.ru>
ddca0b
Date: Thu, 15 Nov 2018 17:52:57 +0100
ddca0b
Subject: [PATCH] tests: add a fuzzer for dev_kmsg_record
ddca0b
ddca0b
(cherry picked from commit 8857fb9beb9dcb95a6ce1be14dc94c4dc4cd3ea3)
ddca0b
ddca0b
Resolves: #1764560
ddca0b
---
ddca0b
 src/fuzz/fuzz-journald-kmsg.c                 | 29 +++++++++++++++++++
ddca0b
 src/fuzz/meson.build                          |  5 ++++
ddca0b
 src/journal/journald-kmsg.c                   |  2 +-
ddca0b
 src/journal/journald-kmsg.h                   |  2 ++
ddca0b
 test/fuzz/fuzz-journald-kmsg/basic            |  1 +
ddca0b
 test/fuzz/fuzz-journald-kmsg/dev-null         |  2 ++
ddca0b
 test/fuzz/fuzz-journald-kmsg/loopback         |  2 ++
ddca0b
 .../fuzz-journald-kmsg/subsystem-loopback     |  2 ++
ddca0b
 8 files changed, 44 insertions(+), 1 deletion(-)
ddca0b
 create mode 100644 src/fuzz/fuzz-journald-kmsg.c
ddca0b
 create mode 100644 test/fuzz/fuzz-journald-kmsg/basic
ddca0b
 create mode 100644 test/fuzz/fuzz-journald-kmsg/dev-null
ddca0b
 create mode 100644 test/fuzz/fuzz-journald-kmsg/loopback
ddca0b
 create mode 100644 test/fuzz/fuzz-journald-kmsg/subsystem-loopback
ddca0b
ddca0b
diff --git a/src/fuzz/fuzz-journald-kmsg.c b/src/fuzz/fuzz-journald-kmsg.c
ddca0b
new file mode 100644
ddca0b
index 0000000000..5d99d244b5
ddca0b
--- /dev/null
ddca0b
+++ b/src/fuzz/fuzz-journald-kmsg.c
ddca0b
@@ -0,0 +1,29 @@
ddca0b
+/* SPDX-License-Identifier: LGPL-2.1+ */
ddca0b
+
ddca0b
+#include "fuzz.h"
ddca0b
+#include "journald-kmsg.h"
ddca0b
+
ddca0b
+int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
ddca0b
+        Server s = {};
ddca0b
+        _cleanup_free_ char *buffer = NULL;
ddca0b
+
ddca0b
+        if (size == 0)
ddca0b
+                return 0;
ddca0b
+
ddca0b
+        s = (Server) {
ddca0b
+                .native_fd = -1,
ddca0b
+                .stdout_fd = -1,
ddca0b
+                .dev_kmsg_fd = -1,
ddca0b
+                .audit_fd = -1,
ddca0b
+                .hostname_fd = -1,
ddca0b
+                .notify_fd = -1,
ddca0b
+                .storage = STORAGE_NONE,
ddca0b
+        };
ddca0b
+        assert_se(sd_event_default(&s.event) >= 0);
ddca0b
+        buffer = memdup(data, size);
ddca0b
+        assert_se(buffer);
ddca0b
+        dev_kmsg_record(&s, buffer, size);
ddca0b
+        server_done(&s);
ddca0b
+
ddca0b
+        return 0;
ddca0b
+}
ddca0b
diff --git a/src/fuzz/meson.build b/src/fuzz/meson.build
ddca0b
index 1f8631bcc0..0520e448a9 100644
ddca0b
--- a/src/fuzz/meson.build
ddca0b
+++ b/src/fuzz/meson.build
ddca0b
@@ -33,6 +33,11 @@ fuzzers += [
ddca0b
           libshared],
ddca0b
          [libmount]],
ddca0b
 
ddca0b
+        [['src/fuzz/fuzz-journald-kmsg.c'],
ddca0b
+         [libjournal_core,
ddca0b
+          libshared],
ddca0b
+         [libselinux]],
ddca0b
+
ddca0b
         [['src/fuzz/fuzz-journald-native.c',
ddca0b
           'src/fuzz/fuzz-journald.c'],
ddca0b
          [libjournal_core,
ddca0b
diff --git a/src/journal/journald-kmsg.c b/src/journal/journald-kmsg.c
ddca0b
index 7644bebfc8..0cdf1c4794 100644
ddca0b
--- a/src/journal/journald-kmsg.c
ddca0b
+++ b/src/journal/journald-kmsg.c
ddca0b
@@ -93,7 +93,7 @@ static bool is_us(const char *identifier, const char *pid) {
ddca0b
                streq(identifier, program_invocation_short_name);
ddca0b
 }
ddca0b
 
ddca0b
-static void dev_kmsg_record(Server *s, char *p, size_t l) {
ddca0b
+void dev_kmsg_record(Server *s, char *p, size_t l) {
ddca0b
 
ddca0b
         _cleanup_free_ char *message = NULL, *syslog_priority = NULL, *syslog_pid = NULL, *syslog_facility = NULL, *syslog_identifier = NULL, *source_time = NULL, *identifier = NULL, *pid = NULL;
ddca0b
         struct iovec iovec[N_IOVEC_META_FIELDS + 7 + N_IOVEC_KERNEL_FIELDS + 2 + N_IOVEC_UDEV_FIELDS];
ddca0b
diff --git a/src/journal/journald-kmsg.h b/src/journal/journald-kmsg.h
ddca0b
index bff24ac310..2326bc8c93 100644
ddca0b
--- a/src/journal/journald-kmsg.h
ddca0b
+++ b/src/journal/journald-kmsg.h
ddca0b
@@ -9,3 +9,5 @@ int server_flush_dev_kmsg(Server *s);
ddca0b
 void server_forward_kmsg(Server *s, int priority, const char *identifier, const char *message, const struct ucred *ucred);
ddca0b
 
ddca0b
 int server_open_kernel_seqnum(Server *s);
ddca0b
+
ddca0b
+void dev_kmsg_record(Server *s, char *p, size_t l);
ddca0b
diff --git a/test/fuzz/fuzz-journald-kmsg/basic b/test/fuzz/fuzz-journald-kmsg/basic
ddca0b
new file mode 100644
ddca0b
index 0000000000..1299cd0869
ddca0b
--- /dev/null
ddca0b
+++ b/test/fuzz/fuzz-journald-kmsg/basic
ddca0b
@@ -0,0 +1 @@
ddca0b
+29,456,292891883,-;systemd[1]: Reexecuting.
ddca0b
diff --git a/test/fuzz/fuzz-journald-kmsg/dev-null b/test/fuzz/fuzz-journald-kmsg/dev-null
ddca0b
new file mode 100644
ddca0b
index 0000000000..de039588b5
ddca0b
--- /dev/null
ddca0b
+++ b/test/fuzz/fuzz-journald-kmsg/dev-null
ddca0b
@@ -0,0 +1,2 @@
ddca0b
+12,460,1322026586,-;hey
ddca0b
+ DEVICE=c1:3
ddca0b
diff --git a/test/fuzz/fuzz-journald-kmsg/loopback b/test/fuzz/fuzz-journald-kmsg/loopback
ddca0b
new file mode 100644
ddca0b
index 0000000000..ca320177b7
ddca0b
--- /dev/null
ddca0b
+++ b/test/fuzz/fuzz-journald-kmsg/loopback
ddca0b
@@ -0,0 +1,2 @@
ddca0b
+12,460,1322026586,-;hey
ddca0b
+ DEVICE=n1
ddca0b
diff --git a/test/fuzz/fuzz-journald-kmsg/subsystem-loopback b/test/fuzz/fuzz-journald-kmsg/subsystem-loopback
ddca0b
new file mode 100644
ddca0b
index 0000000000..af9c0d91e5
ddca0b
--- /dev/null
ddca0b
+++ b/test/fuzz/fuzz-journald-kmsg/subsystem-loopback
ddca0b
@@ -0,0 +1,2 @@
ddca0b
+12,460,1322026586,-;hey
ddca0b
+ DEVICE=+net:lo