|
| 1 | +#include <stdint.h> |
| 2 | +#include <stdlib.h> |
| 3 | +#include <string.h> |
| 4 | +#include "cmark-gfm.h" |
| 5 | +#include "cmark-gfm-core-extensions.h" |
| 6 | +#include <sys/types.h> |
| 7 | +#include <sys/stat.h> |
| 8 | +#include <fcntl.h> |
| 9 | +#include <unistd.h> |
| 10 | + |
| 11 | +const char *extension_names[] = { |
| 12 | + "autolink", |
| 13 | + "strikethrough", |
| 14 | + "table", |
| 15 | + "tagfilter", |
| 16 | + NULL, |
| 17 | +}; |
| 18 | + |
| 19 | +int LLVMFuzzerInitialize(int *argc, char ***argv) { |
| 20 | + cmark_init_standard_node_flags(); |
| 21 | + cmark_gfm_core_extensions_ensure_registered(); |
| 22 | + return 0; |
| 23 | +} |
| 24 | + |
| 25 | +int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { |
| 26 | + struct __attribute__((packed)) { |
| 27 | + int options; |
| 28 | + int width; |
| 29 | + uint8_t splitpoint; |
| 30 | + uint8_t repeatlen; |
| 31 | + } fuzz_config; |
| 32 | + |
| 33 | + if (size >= sizeof(fuzz_config)) { |
| 34 | + /* The beginning of `data` is treated as fuzzer configuration */ |
| 35 | + memcpy(&fuzz_config, data, sizeof(fuzz_config)); |
| 36 | + |
| 37 | + /* Test options that are used by GitHub. */ |
| 38 | + fuzz_config.options = CMARK_OPT_UNSAFE | CMARK_OPT_FOOTNOTES | CMARK_OPT_GITHUB_PRE_LANG | CMARK_OPT_HARDBREAKS; |
| 39 | + |
| 40 | + /* Remainder of input is the markdown */ |
| 41 | + const char *markdown0 = (const char *)(data + sizeof(fuzz_config)); |
| 42 | + const size_t markdown_size0 = size - sizeof(fuzz_config); |
| 43 | + char markdown[0x80000]; |
| 44 | + if (markdown_size0 <= sizeof(markdown)) { |
| 45 | + size_t markdown_size = 0; |
| 46 | + if (fuzz_config.splitpoint <= markdown_size0 && 0 < fuzz_config.repeatlen && |
| 47 | + fuzz_config.repeatlen <= markdown_size0 - fuzz_config.splitpoint) { |
| 48 | + const size_t size_after_splitpoint = markdown_size0 - fuzz_config.splitpoint - fuzz_config.repeatlen; |
| 49 | + memcpy(&markdown[markdown_size], &markdown0[0], fuzz_config.splitpoint); |
| 50 | + markdown_size += fuzz_config.splitpoint; |
| 51 | + |
| 52 | + while (markdown_size + fuzz_config.repeatlen + size_after_splitpoint <= sizeof(markdown)) { |
| 53 | + memcpy(&markdown[markdown_size], &markdown0[fuzz_config.splitpoint], |
| 54 | + fuzz_config.repeatlen); |
| 55 | + markdown_size += fuzz_config.repeatlen; |
| 56 | + } |
| 57 | + memcpy(&markdown[markdown_size], &markdown0[fuzz_config.splitpoint + fuzz_config.repeatlen], |
| 58 | + size_after_splitpoint); |
| 59 | + markdown_size += size_after_splitpoint; |
| 60 | + } else { |
| 61 | + markdown_size = markdown_size0; |
| 62 | + memcpy(markdown, markdown0, markdown_size); |
| 63 | + } |
| 64 | + |
| 65 | + cmark_parser *parser = cmark_parser_new(fuzz_config.options); |
| 66 | + |
| 67 | + for (const char **it = extension_names; *it; ++it) { |
| 68 | + const char *extension_name = *it; |
| 69 | + cmark_syntax_extension *syntax_extension = cmark_find_syntax_extension(extension_name); |
| 70 | + if (!syntax_extension) { |
| 71 | + fprintf(stderr, "%s is not a valid syntax extension\n", extension_name); |
| 72 | + abort(); |
| 73 | + } |
| 74 | + cmark_parser_attach_syntax_extension(parser, syntax_extension); |
| 75 | + } |
| 76 | + |
| 77 | + cmark_parser_feed(parser, markdown, markdown_size); |
| 78 | + cmark_node *doc = cmark_parser_finish(parser); |
| 79 | + |
| 80 | + free(cmark_render_html(doc, fuzz_config.options, NULL)); |
| 81 | + |
| 82 | + cmark_node_free(doc); |
| 83 | + cmark_parser_free(parser); |
| 84 | + } |
| 85 | + } |
| 86 | + return 0; |
| 87 | +} |
0 commit comments