471aa385b3
* Enforce smaller maximum values for parameters * Adjust parameters to the source size The memory usage is reduced by about 5x, which makes the fuzzers run at least twice as fast, even more so with ASAN/MSAN enabled.
96 lines
2.7 KiB
C
96 lines
2.7 KiB
C
/*
|
|
* Copyright (c) 2016-present, Facebook, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This source code is licensed under both the BSD-style license (found in the
|
|
* LICENSE file in the root directory of this source tree) and the GPLv2 (found
|
|
* in the COPYING file in the root directory of this source tree).
|
|
*/
|
|
|
|
/**
|
|
* This fuzz target performs a zstd round-trip test (compress & decompress),
|
|
* compares the result with the original, and calls abort() on corruption.
|
|
*/
|
|
|
|
#define ZSTD_STATIC_LINKING_ONLY
|
|
|
|
#include <stddef.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include "fuzz_helpers.h"
|
|
#include "zstd_helpers.h"
|
|
|
|
static const int kMaxClevel = 19;
|
|
|
|
static ZSTD_CCtx *cctx = NULL;
|
|
static ZSTD_DCtx *dctx = NULL;
|
|
static void* cBuf = NULL;
|
|
static void* rBuf = NULL;
|
|
static size_t bufSize = 0;
|
|
static uint32_t seed;
|
|
|
|
static size_t roundTripTest(void *result, size_t resultCapacity,
|
|
void *compressed, size_t compressedCapacity,
|
|
const void *src, size_t srcSize)
|
|
{
|
|
size_t cSize;
|
|
if (FUZZ_rand(&seed) & 1) {
|
|
ZSTD_inBuffer in = {src, srcSize, 0};
|
|
ZSTD_outBuffer out = {compressed, compressedCapacity, 0};
|
|
size_t err;
|
|
|
|
ZSTD_CCtx_reset(cctx);
|
|
FUZZ_setRandomParameters(cctx, srcSize, &seed);
|
|
err = ZSTD_compress_generic(cctx, &out, &in, ZSTD_e_end);
|
|
FUZZ_ZASSERT(err);
|
|
FUZZ_ASSERT(err == 0);
|
|
cSize = out.pos;
|
|
} else {
|
|
int const cLevel = FUZZ_rand(&seed) % kMaxClevel;
|
|
cSize = ZSTD_compressCCtx(
|
|
cctx, compressed, compressedCapacity, src, srcSize, cLevel);
|
|
}
|
|
FUZZ_ZASSERT(cSize);
|
|
return ZSTD_decompressDCtx(dctx, result, resultCapacity, compressed, cSize);
|
|
}
|
|
|
|
int LLVMFuzzerTestOneInput(const uint8_t *src, size_t size)
|
|
{
|
|
size_t neededBufSize;
|
|
|
|
seed = FUZZ_seed(&src, &size);
|
|
neededBufSize = ZSTD_compressBound(size);
|
|
|
|
/* Allocate all buffers and contexts if not already allocated */
|
|
if (neededBufSize > bufSize) {
|
|
free(cBuf);
|
|
free(rBuf);
|
|
cBuf = malloc(neededBufSize);
|
|
rBuf = malloc(neededBufSize);
|
|
bufSize = neededBufSize;
|
|
FUZZ_ASSERT(cBuf && rBuf);
|
|
}
|
|
if (!cctx) {
|
|
cctx = ZSTD_createCCtx();
|
|
FUZZ_ASSERT(cctx);
|
|
}
|
|
if (!dctx) {
|
|
dctx = ZSTD_createDCtx();
|
|
FUZZ_ASSERT(dctx);
|
|
}
|
|
|
|
{
|
|
size_t const result =
|
|
roundTripTest(rBuf, neededBufSize, cBuf, neededBufSize, src, size);
|
|
FUZZ_ZASSERT(result);
|
|
FUZZ_ASSERT_MSG(result == size, "Incorrect regenerated size");
|
|
FUZZ_ASSERT_MSG(!memcmp(src, rBuf, size), "Corruption!");
|
|
}
|
|
#ifndef STATEFUL_FUZZING
|
|
ZSTD_freeCCtx(cctx); cctx = NULL;
|
|
ZSTD_freeDCtx(dctx); dctx = NULL;
|
|
#endif
|
|
return 0;
|
|
}
|