138 lines
5.0 KiB
C
138 lines
5.0 KiB
C
/*
|
|
* Copyright (c) Meta Platforms, Inc. and affiliates.
|
|
* All rights reserved.
|
|
*
|
|
* This source code is licensed under both the BSD-style license (found in the
|
|
* LICENSE file in the root directory of this source tree) and the GPLv2 (found
|
|
* in the COPYING file in the root directory of this source tree).
|
|
* You may select, at your option, one of the above-listed licenses.
|
|
*/
|
|
|
|
/**
|
|
* This fuzz target performs a zstd round-trip test (compress & decompress),
|
|
* compares the result with the original, and calls abort() on corruption.
|
|
*/
|
|
|
|
#include <stddef.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include "common/cpu.h"
|
|
#include "compress/hist.h"
|
|
#include "common/huf.h"
|
|
#include "fuzz_helpers.h"
|
|
#include "fuzz_data_producer.h"
|
|
#include "common/bits.h"
|
|
|
|
static size_t adjustTableLog(size_t tableLog, size_t maxSymbol)
|
|
{
|
|
size_t const alphabetSize = maxSymbol + 1;
|
|
size_t minTableLog = ZSTD_highbit32(alphabetSize) + 1;
|
|
if ((alphabetSize & (alphabetSize - 1)) != 0) {
|
|
++minTableLog;
|
|
}
|
|
assert(minTableLog <= 9);
|
|
if (tableLog < minTableLog)
|
|
return minTableLog;
|
|
else
|
|
return tableLog;
|
|
}
|
|
|
|
int LLVMFuzzerTestOneInput(const uint8_t *src, size_t size)
|
|
{
|
|
FUZZ_dataProducer_t *producer = FUZZ_dataProducer_create(src, size);
|
|
/* Select random parameters: #streams, X1 or X2 decoding, bmi2 */
|
|
int const streams = FUZZ_dataProducer_int32Range(producer, 0, 1);
|
|
int const symbols = FUZZ_dataProducer_int32Range(producer, 0, 1);
|
|
int const flags = 0
|
|
| (ZSTD_cpuid_bmi2(ZSTD_cpuid()) && FUZZ_dataProducer_int32Range(producer, 0, 1) ? HUF_flags_bmi2 : 0)
|
|
| (FUZZ_dataProducer_int32Range(producer, 0, 1) ? HUF_flags_optimalDepth : 0)
|
|
| (FUZZ_dataProducer_int32Range(producer, 0, 1) ? HUF_flags_preferRepeat : 0)
|
|
| (FUZZ_dataProducer_int32Range(producer, 0, 1) ? HUF_flags_suspectUncompressible : 0)
|
|
| (FUZZ_dataProducer_int32Range(producer, 0, 1) ? HUF_flags_disableAsm : 0)
|
|
| (FUZZ_dataProducer_int32Range(producer, 0, 1) ? HUF_flags_disableFast : 0);
|
|
/* Select a random cBufSize - it may be too small */
|
|
size_t const cBufSize = FUZZ_dataProducer_uint32Range(producer, 0, 4 * size);
|
|
/* Select a random tableLog - we'll adjust it up later */
|
|
size_t tableLog = FUZZ_dataProducer_uint32Range(producer, 1, 12);
|
|
size_t const kMaxSize = 256 * 1024;
|
|
size = FUZZ_dataProducer_remainingBytes(producer);
|
|
if (size > kMaxSize)
|
|
size = kMaxSize;
|
|
|
|
if (size <= 1) {
|
|
FUZZ_dataProducer_free(producer);
|
|
return 0;
|
|
}
|
|
|
|
uint32_t maxSymbol = 255;
|
|
|
|
U32 count[256];
|
|
size_t const mostFrequent = HIST_count(count, &maxSymbol, src, size);
|
|
FUZZ_ZASSERT(mostFrequent);
|
|
if (mostFrequent == size) {
|
|
/* RLE */
|
|
FUZZ_dataProducer_free(producer);
|
|
return 0;
|
|
|
|
}
|
|
FUZZ_ASSERT(maxSymbol <= 255);
|
|
tableLog = adjustTableLog(tableLog, maxSymbol);
|
|
|
|
size_t const wkspSize = HUF_WORKSPACE_SIZE;
|
|
void* wksp = FUZZ_malloc(wkspSize);
|
|
void* rBuf = FUZZ_malloc(size);
|
|
void* cBuf = FUZZ_malloc(cBufSize);
|
|
HUF_CElt* ct = (HUF_CElt*)FUZZ_malloc(HUF_CTABLE_SIZE(maxSymbol));
|
|
HUF_DTable* dt = (HUF_DTable*)FUZZ_malloc(HUF_DTABLE_SIZE(tableLog) * sizeof(HUF_DTable));
|
|
dt[0] = tableLog * 0x01000001;
|
|
|
|
tableLog = HUF_optimalTableLog(tableLog, size, maxSymbol, wksp, wkspSize, ct, count, flags);
|
|
FUZZ_ASSERT(tableLog <= 12);
|
|
tableLog = HUF_buildCTable_wksp(ct, count, maxSymbol, tableLog, wksp, wkspSize);
|
|
FUZZ_ZASSERT(tableLog);
|
|
size_t const tableSize = HUF_writeCTable_wksp(cBuf, cBufSize, ct, maxSymbol, tableLog, wksp, wkspSize);
|
|
if (ERR_isError(tableSize)) {
|
|
/* Errors on uncompressible data or cBufSize too small */
|
|
goto _out;
|
|
}
|
|
FUZZ_ZASSERT(tableSize);
|
|
if (symbols == 0) {
|
|
FUZZ_ZASSERT(HUF_readDTableX1_wksp(dt, cBuf, tableSize, wksp, wkspSize, flags));
|
|
} else {
|
|
size_t const ret = HUF_readDTableX2_wksp(dt, cBuf, tableSize, wksp, wkspSize, flags);
|
|
if (ERR_getErrorCode(ret) == ZSTD_error_tableLog_tooLarge) {
|
|
FUZZ_ZASSERT(HUF_readDTableX1_wksp(dt, cBuf, tableSize, wksp, wkspSize, flags));
|
|
} else {
|
|
FUZZ_ZASSERT(ret);
|
|
}
|
|
}
|
|
|
|
size_t cSize;
|
|
size_t rSize;
|
|
if (streams == 0) {
|
|
cSize = HUF_compress1X_usingCTable(cBuf, cBufSize, src, size, ct, flags);
|
|
FUZZ_ZASSERT(cSize);
|
|
if (cSize != 0)
|
|
rSize = HUF_decompress1X_usingDTable(rBuf, size, cBuf, cSize, dt, flags);
|
|
} else {
|
|
cSize = HUF_compress4X_usingCTable(cBuf, cBufSize, src, size, ct, flags);
|
|
FUZZ_ZASSERT(cSize);
|
|
if (cSize != 0)
|
|
rSize = HUF_decompress4X_usingDTable(rBuf, size, cBuf, cSize, dt, flags);
|
|
}
|
|
if (cSize != 0) {
|
|
FUZZ_ZASSERT(rSize);
|
|
FUZZ_ASSERT_MSG(rSize == size, "Incorrect regenerated size");
|
|
FUZZ_ASSERT_MSG(!FUZZ_memcmp(src, rBuf, size), "Corruption!");
|
|
}
|
|
_out:
|
|
free(rBuf);
|
|
free(cBuf);
|
|
free(ct);
|
|
free(dt);
|
|
free(wksp);
|
|
FUZZ_dataProducer_free(producer);
|
|
return 0;
|
|
}
|