]>
git.ipfire.org Git - thirdparty/systemd.git/blob - src/fuzz/fuzz-udev-rules.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
15 #include "string-util.h"
17 #include "udev-rules.h"
19 static struct fakefs
{
21 bool ignore_mount_error
;
24 { "/sys", false, false },
25 { "/dev", false, false },
26 { "/run", false, false },
27 { "/etc", false, false },
28 { UDEVLIBEXECDIR
"/rules.d", true, false },
31 static int setup_mount_namespace(void) {
32 static thread_local
bool is_namespaced
= false;
37 if (unshare(CLONE_NEWNS
) < 0)
38 return log_error_errno(errno
, "Failed to call unshare(): %m");
40 if (mount(NULL
, "/", NULL
, MS_SLAVE
|MS_REC
, NULL
) < 0)
41 return log_error_errno(errno
, "Failed to mount / as private: %m");
48 static int setup_fake_filesystems(const char *runtime_dir
) {
49 for (unsigned i
= 0; i
< ELEMENTSOF(fakefss
); i
++) {
50 if (mount(runtime_dir
, fakefss
[i
].target
, NULL
, MS_BIND
, NULL
) < 0) {
51 log_full_errno(fakefss
[i
].ignore_mount_error
? LOG_DEBUG
: LOG_ERR
, errno
, "Failed to mount %s: %m", fakefss
[i
].target
);
52 if (!fakefss
[i
].ignore_mount_error
)
55 fakefss
[i
].is_mounted
= true;
61 static int cleanup_fake_filesystems(const char *runtime_dir
) {
62 for (unsigned i
= 0; i
< ELEMENTSOF(fakefss
); i
++) {
63 if (!fakefss
[i
].is_mounted
)
66 if (umount(fakefss
[i
].target
) < 0) {
67 log_full_errno(fakefss
[i
].ignore_mount_error
? LOG_DEBUG
: LOG_ERR
, errno
, "Failed to umount %s: %m", fakefss
[i
].target
);
68 if (!fakefss
[i
].ignore_mount_error
)
71 fakefss
[i
].is_mounted
= false;
76 int LLVMFuzzerTestOneInput(const uint8_t *data
, size_t size
) {
77 _cleanup_(udev_rules_freep
) UdevRules
*rules
= NULL
;
78 _cleanup_(rm_rf_physical_and_freep
) char *runtime_dir
= NULL
;
81 (void) setup_mount_namespace();
83 assert_se(runtime_dir
= setup_fake_runtime_dir());
85 if (setup_fake_filesystems(runtime_dir
) < 0) {
86 #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
87 return EXIT_TEST_SKIP
;
91 if (!getenv("SYSTEMD_LOG_LEVEL")) {
92 log_set_max_level_realm(LOG_REALM_UDEV
, LOG_CRIT
);
93 log_set_max_level_realm(LOG_REALM_SYSTEMD
, LOG_CRIT
);
96 assert_se(mkdir_p("/etc/udev/rules.d", 0755) >= 0);
97 f
= fopen("/etc/udev/rules.d/fuzz.rules", "we");
100 assert_se(fwrite(data
, size
, 1, f
) == 1);
101 assert_se(fclose(f
) == 0);
103 assert_se(udev_rules_new(&rules
, RESOLVE_NAME_EARLY
) == 0);
105 assert_se(cleanup_fake_filesystems(runtime_dir
) >= 0);