From 47226f7cf1a69713ba111e016778639d4ad5eaa5 Mon Sep 17 00:00:00 2001 From: Ximon Eighteen <3304436+ximon18@users.noreply.github.com> Date: Thu, 14 Nov 2024 11:40:11 +0100 Subject: [PATCH 1/3] Initial fuzzing support, and failing fuzz test case. --- Cargo.lock | 41 ++- Cargo.toml | 10 +- fuzz-0.log | 64 ++++ fuzz-1.log | 64 ++++ fuzz-2.log | 64 ++++ fuzz-3.log | 64 ++++ fuzz-4.log | 64 ++++ fuzz-5.log | 64 ++++ fuzz-6.log | 64 ++++ fuzz-7.log | 64 ++++ fuzz/.gitignore | 4 + fuzz/Cargo.lock | 554 ++++++++++++++++++++++++++++++++ fuzz/Cargo.toml | 20 ++ fuzz/README.md | 13 + fuzz/fuzz_targets/nsec3-hash.rs | 9 + src/commands/nsec3hash.rs | 1 + 16 files changed, 1159 insertions(+), 5 deletions(-) create mode 100644 fuzz-0.log create mode 100644 fuzz-1.log create mode 100644 fuzz-2.log create mode 100644 fuzz-3.log create mode 100644 fuzz-4.log create mode 100644 fuzz-5.log create mode 100644 fuzz-6.log create mode 100644 fuzz-7.log create mode 100644 fuzz/.gitignore create mode 100644 fuzz/Cargo.lock create mode 100644 fuzz/Cargo.toml create mode 100644 fuzz/README.md create mode 100644 fuzz/fuzz_targets/nsec3-hash.rs diff --git a/Cargo.lock b/Cargo.lock index 979564c7..c35665a3 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -2,6 +2,12 @@ # It is not intended for manual editing. version = 3 +[[package]] +name = "allocator-api2" +version = "0.2.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "45862d1c77f2228b9e10bc609d5bc203d86ebc9b87ad8d5d5167a6c9abf739d9" + [[package]] name = "anstream" version = "0.6.18" @@ -51,6 +57,15 @@ dependencies = [ "windows-sys 0.59.0", ] +[[package]] +name = "arbitrary" +version = "1.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dde20b3d026af13f561bdd0f15edf01fc734f0dafcedbaf42bba506a9517f223" +dependencies = [ + "derive_arbitrary", +] + [[package]] name = "byteorder" version = "1.5.0" @@ -133,10 +148,22 @@ dependencies = [ "powerfmt", ] +[[package]] +name = "derive_arbitrary" +version = "1.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "30542c1ad912e0e3d22a1935c290e12e8a29d704a420177a31faad4a601a0800" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + [[package]] name = "dnst" version = "0.1.0" dependencies = [ + "arbitrary", "clap", "domain", "lexopt", @@ -147,10 +174,11 @@ dependencies = [ [[package]] name = "domain" version = "0.10.3" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "64008666d9f3b6a88a63cd28ad8f3a5a859b8037e11bfb680c1b24945ea1c28d" +source = "git+https://github.com/NLnetLabs/domain?branch=add-some-arbitrary-derives-for-fuzzing-support#a32cc33335586e738c1ea8315b7f3d869bbd4db3" dependencies = [ + "arbitrary", "bytes", + "hashbrown", "octseq", "rand", "time", @@ -167,6 +195,15 @@ dependencies = [ "wasi", ] +[[package]] +name = "hashbrown" +version = "0.14.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e5274423e17b7c9fc20b6e7e208532f9b19825d82dfd615708b70edd83df41f1" +dependencies = [ + "allocator-api2", +] + [[package]] name = "heck" version = "0.5.0" diff --git a/Cargo.toml b/Cargo.toml index 58116f9e..0d4642af 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -9,10 +9,14 @@ name = "ldns" path = "src/bin/ldns.rs" [dependencies] -clap = { version = "4", features = ["derive"] } -domain = "0.10.1" -lexopt = "0.3.0" +arbitrary = { version = "1", optional = true, features = ["derive"] } +clap = { version = "4", features = ["derive"] } +domain = { git = "https://github.com/NLnetLabs/domain", branch = "add-some-arbitrary-derives-for-fuzzing-support" } +lexopt = "0.3.0" # for implementation of nsec3 hash until domain has it stabilized octseq = { version = "0.5.1", features = ["std"] } ring = { version = "0.17" } + +[features] +arbitrary = [ "dep:arbitrary", "domain/arbitrary" ] \ No newline at end of file diff --git a/fuzz-0.log b/fuzz-0.log new file mode 100644 index 00000000..bf6c058e --- /dev/null +++ b/fuzz-0.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4286344904 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55d595f879e0, 0x55d595fadbb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55d595fadbb0,0x55d59620f8b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283393== ERROR: libFuzzer: deadly signal + #0 0x55d5955fb051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x55d595e0c92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x55d595dbbd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x55d595dbbd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7f0754b66dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7f0754bbf723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7f0754b66d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7f0754b4e941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x55d595e87689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x55d595e77c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x55d595db4ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x55d595e7c757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x55d595e7c757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x55d595e7c4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x55d595e7a048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x55d595e7c1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x55d595ec613f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x55d5956c68f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x55d5956c56e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x55d59563cb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x55d59563c539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x55d595dae2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x55d595dae2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x55d595db4ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x55d595db447b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x55d595db447b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x55d595db447b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x55d595dbc2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x55d595dc2e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x55d595dc3d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x55d595dc5117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x55d595ddaa22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x55d595df0df2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7f0754b50247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7f0754b5030a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x55d595553664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 2 InsertByte-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0xba,0xa,0x31, +\272\0121 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-d157ce53bcd9dc579f5d5a1747f548ec2c5bd3f9 +Base64: ugox +stat::number_of_executed_units: 4 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz-1.log b/fuzz-1.log new file mode 100644 index 00000000..8a936bd9 --- /dev/null +++ b/fuzz-1.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4285881018 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5636b92819e0, 0x5636b92a7bb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5636b92a7bb0,0x5636b95098b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283399== ERROR: libFuzzer: deadly signal + #0 0x5636b88f5051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x5636b910692a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x5636b90b5d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x5636b90b5d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7f3e780a8dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7f3e78101723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7f3e780a8d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7f3e78090941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x5636b9181689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x5636b9171c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x5636b90aece4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x5636b9176757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x5636b9176757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x5636b91764e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x5636b9174048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x5636b91761ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x5636b91c013f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x5636b89c08f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x5636b89bf6e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x5636b8936b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x5636b8936539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x5636b90a82ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x5636b90a82ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x5636b90aeef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x5636b90ae47b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x5636b90ae47b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x5636b90ae47b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x5636b90b62a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x5636b90bce5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x5636b90bdd3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x5636b90bf117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x5636b90d4a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x5636b90eadf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7f3e78092247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7f3e7809230a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x5636b884d664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 4 CopyPart-CrossOver-ChangeBit-CrossOver-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0xa,0x1a,0xa, +\012\032\012 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-2a6ad4009b0cc86353847bdfe98b39087046b082 +Base64: ChoK +stat::number_of_executed_units: 6 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz-2.log b/fuzz-2.log new file mode 100644 index 00000000..157f1584 --- /dev/null +++ b/fuzz-2.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4286407145 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55d4f7b139e0, 0x55d4f7b39bb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55d4f7b39bb0,0x55d4f7d9b8b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283397== ERROR: libFuzzer: deadly signal + #0 0x55d4f7187051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x55d4f799892a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x55d4f7947d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x55d4f7947d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7ff16d87adcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7ff16d8d3723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7ff16d87ad1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7ff16d862941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x55d4f7a13689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x55d4f7a03c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x55d4f7940ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x55d4f7a08757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x55d4f7a08757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x55d4f7a084e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x55d4f7a06048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x55d4f7a081ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x55d4f7a5213f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x55d4f72528f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x55d4f72516e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x55d4f71c8b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x55d4f71c8539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x55d4f793a2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x55d4f793a2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x55d4f7940ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x55d4f794047b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x55d4f794047b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x55d4f794047b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x55d4f79482a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x55d4f794ee5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x55d4f794fd3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x55d4f7951117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x55d4f7966a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x55d4f797cdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7ff16d864247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7ff16d86430a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x55d4f70df664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 2 CrossOver-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0x41,0xa,0xa, +A\012\012 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-a148f3e928c613bbefdd8738767e9292e69eeb5d +Base64: QQoK +stat::number_of_executed_units: 9 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz-3.log b/fuzz-3.log new file mode 100644 index 00000000..4ab16eba --- /dev/null +++ b/fuzz-3.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4286402812 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55f1920229e0, 0x55f192048bb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55f192048bb0,0x55f1922aa8b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283396== ERROR: libFuzzer: deadly signal + #0 0x55f191696051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x55f191ea792a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x55f191e56d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x55f191e56d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7ff4daa88dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7ff4daae1723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7ff4daa88d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7ff4daa70941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x55f191f22689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x55f191f12c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x55f191e4fce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x55f191f17757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x55f191f17757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x55f191f174e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x55f191f15048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x55f191f171ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x55f191f6113f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x55f1917618f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x55f1917606e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x55f1916d7b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x55f1916d7539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x55f191e492ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x55f191e492ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x55f191e4fef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x55f191e4f47b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x55f191e4f47b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x55f191e4f47b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x55f191e572a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x55f191e5de5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x55f191e5ed3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x55f191e60117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x55f191e75a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x55f191e8bdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7ff4daa72247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7ff4daa7230a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x55f1915ee664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 5 ChangeBinInt-ChangeBit-CrossOver-ShuffleBytes-CopyPart-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0xa,0x0,0xa,0x0, +\012\000\012\000 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-c2abd53443e87b1d4332b55de89f3f4c04d71253 +Base64: CgAKAA== +stat::number_of_executed_units: 17 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz-4.log b/fuzz-4.log new file mode 100644 index 00000000..993736b1 --- /dev/null +++ b/fuzz-4.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4285853224 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5651c02f69e0, 0x5651c031cbb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5651c031cbb0,0x5651c057e8b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283395== ERROR: libFuzzer: deadly signal + #0 0x5651bf96a051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x5651c017b92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x5651c012ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x5651c012ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7fd0ffbc5dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7fd0ffc1e723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7fd0ffbc5d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7fd0ffbad941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x5651c01f6689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x5651c01e6c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x5651c0123ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x5651c01eb757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x5651c01eb757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x5651c01eb4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x5651c01e9048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x5651c01eb1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x5651c023513f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x5651bfa358f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x5651bfa346e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x5651bf9abb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x5651bf9ab539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x5651c011d2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x5651c011d2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x5651c0123ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x5651c012347b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x5651c012347b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x5651c012347b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x5651c012b2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x5651c0131e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x5651c0132d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x5651c0134117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x5651c0149a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x5651c015fdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7fd0ffbaf247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7fd0ffbaf30a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x5651bf8c2664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 4 ChangeByte-ChangeByte-CrossOver-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0xbf,0xa,0x9d, +\277\012\235 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-9f719ad4a3507f90a3c39b6d04fc1fe87bb52684 +Base64: vwqd +stat::number_of_executed_units: 16 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz-5.log b/fuzz-5.log new file mode 100644 index 00000000..4ea0273d --- /dev/null +++ b/fuzz-5.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4286513614 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55cc9e0b09e0, 0x55cc9e0d6bb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55cc9e0d6bb0,0x55cc9e3388b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283398== ERROR: libFuzzer: deadly signal + #0 0x55cc9d724051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x55cc9df3592a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x55cc9dee4d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x55cc9dee4d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7f42aaeecdcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7f42aaf45723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7f42aaeecd1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7f42aaed4941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x55cc9dfb0689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x55cc9dfa0c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x55cc9deddce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x55cc9dfa5757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x55cc9dfa5757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x55cc9dfa54e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x55cc9dfa3048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x55cc9dfa51ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x55cc9dfef13f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x55cc9d7ef8f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x55cc9d7ee6e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x55cc9d765b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x55cc9d765539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x55cc9ded72ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x55cc9ded72ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x55cc9deddef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x55cc9dedd47b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x55cc9dedd47b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x55cc9dedd47b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x55cc9dee52a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x55cc9deebe5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x55cc9deecd3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x55cc9deee117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x55cc9df03a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x55cc9df19df2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7f42aaed6247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7f42aaed630a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x55cc9d67c664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 3 ChangeByte-InsertByte-CopyPart-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0x25,0x25,0xf1, +%%\361 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-f0dbc044f861854b268a7630f06d6fd29dc54d7c +Base64: JSXx +stat::number_of_executed_units: 5 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz-6.log b/fuzz-6.log new file mode 100644 index 00000000..00002bf1 --- /dev/null +++ b/fuzz-6.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4286401685 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5607e86299e0, 0x5607e864fbb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5607e864fbb0,0x5607e88b18b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283394== ERROR: libFuzzer: deadly signal + #0 0x5607e7c9d051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x5607e84ae92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x5607e845dd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x5607e845dd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7f2245021dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7f224507a723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7f2245021d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7f2245009941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x5607e8529689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x5607e8519c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x5607e8456ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x5607e851e757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x5607e851e757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x5607e851e4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x5607e851c048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x5607e851e1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x5607e856813f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x5607e7d688f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x5607e7d676e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x5607e7cdeb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x5607e7cde539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x5607e84502ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x5607e84502ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x5607e8456ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x5607e845647b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x5607e845647b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x5607e845647b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x5607e845e2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x5607e8464e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x5607e8465d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x5607e8467117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x5607e847ca22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x5607e8492df2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7f224500b247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7f224500b30a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x5607e7bf5664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 5 ChangeByte-CrossOver-CrossOver-ChangeByte-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0x44,0x5d,0x7, +D]\007 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-4515dff406323f45557f02bd625d93a824962054 +Base64: RF0H +stat::number_of_executed_units: 27 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz-7.log b/fuzz-7.log new file mode 100644 index 00000000..65ef7902 --- /dev/null +++ b/fuzz-7.log @@ -0,0 +1,64 @@ +INFO: Running with entropic power schedule (0xFF, 100). +INFO: Seed: 4285853061 +INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5579c5e269e0, 0x5579c5e4cbb0), +INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5579c5e4cbb0,0x5579c60ae8b0), +INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash +INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes +INFO: A corpus is not provided, starting from an empty corpus +#2 INITED exec/s: 0 rss: 39Mb +WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? +This may also happen if the target rejected all inputs we tried so far +thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: +should not be called with an unsupported algorithm +note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace +==283400== ERROR: libFuzzer: deadly signal + #0 0x5579c549a051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 + #1 0x5579c5cab92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 + #2 0x5579c5c5ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 + #3 0x5579c5c5ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 + #4 0x7fef8d5b3dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #5 0x7fef8d60c723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #6 0x7fef8d5b3d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #7 0x7fef8d59b941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #8 0x5579c5d26689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 + #9 0x5579c5d16c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 + #10 0x5579c5c53ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 + #11 0x5579c5d1b757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 + #12 0x5579c5d1b757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 + #13 0x5579c5d1b4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 + #14 0x5579c5d19048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 + #15 0x5579c5d1b1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 + #16 0x5579c5d6513f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 + #17 0x5579c55658f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 + #18 0x5579c55646e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 + #19 0x5579c54dbb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 + #20 0x5579c54db539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 + #21 0x5579c5c4d2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 + #22 0x5579c5c4d2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 + #23 0x5579c5c53ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 + #24 0x5579c5c5347b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 + #25 0x5579c5c5347b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 + #26 0x5579c5c5347b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 + #27 0x5579c5c5b2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 + #28 0x5579c5c61e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 + #29 0x5579c5c62d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 + #30 0x5579c5c64117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 + #31 0x5579c5c79a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 + #32 0x5579c5c8fdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 + #33 0x7fef8d59d247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #34 0x7fef8d59d30a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) + #35 0x5579c53f2664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) + +NOTE: libFuzzer has rudimentary signal handlers. + Combine libFuzzer with AddressSanitizer or similar for better crash reports. +SUMMARY: libFuzzer: deadly signal +MS: 4 InsertByte-ChangeBinInt-ChangeBit-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc +0x29,0xa,0x14, +)\012\024 +artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-94ff8218e755278c5cc0c158489ca5bf2b7b212b +Base64: KQoU +stat::number_of_executed_units: 31 +stat::average_exec_per_sec: 0 +stat::new_units_added: 0 +stat::slowest_unit_time_sec: 0 +stat::peak_rss_mb: 41 diff --git a/fuzz/.gitignore b/fuzz/.gitignore new file mode 100644 index 00000000..1a45eee7 --- /dev/null +++ b/fuzz/.gitignore @@ -0,0 +1,4 @@ +target +corpus +artifacts +coverage diff --git a/fuzz/Cargo.lock b/fuzz/Cargo.lock new file mode 100644 index 00000000..772234f6 --- /dev/null +++ b/fuzz/Cargo.lock @@ -0,0 +1,554 @@ +# This file is automatically @generated by Cargo. +# It is not intended for manual editing. +version = 4 + +[[package]] +name = "allocator-api2" +version = "0.2.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c6cb57a04249c6480766f7f7cef5467412af1490f8d1e243141daddada3264f" + +[[package]] +name = "anstream" +version = "0.6.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8acc5369981196006228e28809f761875c0327210a891e941f4c683b3a99529b" +dependencies = [ + "anstyle", + "anstyle-parse", + "anstyle-query", + "anstyle-wincon", + "colorchoice", + "is_terminal_polyfill", + "utf8parse", +] + +[[package]] +name = "anstyle" +version = "1.0.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "55cc3b69f167a1ef2e161439aa98aed94e6028e5f9a59be9a6ffb47aef1651f9" + +[[package]] +name = "anstyle-parse" +version = "0.2.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3b2d16507662817a6a20a9ea92df6652ee4f94f914589377d69f3b21bc5798a9" +dependencies = [ + "utf8parse", +] + +[[package]] +name = "anstyle-query" +version = "1.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "79947af37f4177cfead1110013d678905c37501914fba0efea834c3fe9a8d60c" +dependencies = [ + "windows-sys 0.59.0", +] + +[[package]] +name = "anstyle-wincon" +version = "3.0.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2109dbce0e72be3ec00bed26e6a7479ca384ad226efdd66db8fa2e3a38c83125" +dependencies = [ + "anstyle", + "windows-sys 0.59.0", +] + +[[package]] +name = "arbitrary" +version = "1.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dde20b3d026af13f561bdd0f15edf01fc734f0dafcedbaf42bba506a9517f223" +dependencies = [ + "derive_arbitrary", +] + +[[package]] +name = "byteorder" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1fd0f2584146f6f2ef48085050886acf353beff7305ebd1ae69500e27c67f64b" + +[[package]] +name = "bytes" +version = "1.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ac0150caa2ae65ca5bd83f25c7de183dea78d4d366469f148435e2acfbad0da" + +[[package]] +name = "cc" +version = "1.1.36" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "baee610e9452a8f6f0a1b6194ec09ff9e2d85dea54432acdae41aa0761c95d70" +dependencies = [ + "jobserver", + "libc", + "shlex", +] + +[[package]] +name = "cfg-if" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "baf1de4339761588bc0619e3cbc0120ee582ebb74b53b4efbf79117bd2da40fd" + +[[package]] +name = "clap" +version = "4.5.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b97f376d85a664d5837dbae44bf546e6477a679ff6610010f17276f686d867e8" +dependencies = [ + "clap_builder", + "clap_derive", +] + +[[package]] +name = "clap_builder" +version = "4.5.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "19bc80abd44e4bed93ca373a0704ccbd1b710dc5749406201bb018272808dc54" +dependencies = [ + "anstream", + "anstyle", + "clap_lex", + "strsim", +] + +[[package]] +name = "clap_derive" +version = "4.5.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4ac6a0c7b1a9e9a5186361f67dfa1b88213572f427fb9ab038efb2bd8c582dab" +dependencies = [ + "heck", + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "clap_lex" +version = "0.7.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1462739cb27611015575c0c11df5df7601141071f07518d56fcc1be504cbec97" + +[[package]] +name = "colorchoice" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5b63caa9aa9397e2d9480a9b13673856c78d8ac123288526c37d7839f2a86990" + +[[package]] +name = "deranged" +version = "0.3.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b42b6fa04a440b495c8b04d0e71b707c585f83cb9cb28cf8cd0d976c315e31b4" +dependencies = [ + "powerfmt", +] + +[[package]] +name = "derive_arbitrary" +version = "1.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "30542c1ad912e0e3d22a1935c290e12e8a29d704a420177a31faad4a601a0800" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "dnst" +version = "0.1.0" +dependencies = [ + "arbitrary", + "clap", + "domain", + "lexopt", + "octseq", + "ring", +] + +[[package]] +name = "dnst-fuzz" +version = "0.0.0" +dependencies = [ + "arbitrary", + "dnst", + "libfuzzer-sys", +] + +[[package]] +name = "domain" +version = "0.10.3" +source = "git+https://github.com/NLnetLabs/domain?branch=add-some-arbitrary-derives-for-fuzzing-support#a32cc33335586e738c1ea8315b7f3d869bbd4db3" +dependencies = [ + "arbitrary", + "bytes", + "hashbrown", + "octseq", + "rand", + "time", +] + +[[package]] +name = "getrandom" +version = "0.2.15" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c4567c8db10ae91089c99af84c68c38da3ec2f087c3f82960bcdbf3656b6f4d7" +dependencies = [ + "cfg-if", + "libc", + "wasi", +] + +[[package]] +name = "hashbrown" +version = "0.14.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e5274423e17b7c9fc20b6e7e208532f9b19825d82dfd615708b70edd83df41f1" +dependencies = [ + "allocator-api2", +] + +[[package]] +name = "heck" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2304e00983f87ffb38b55b444b5e3b60a884b5d30c0fca7d82fe33449bbe55ea" + +[[package]] +name = "is_terminal_polyfill" +version = "1.70.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7943c866cc5cd64cbc25b2e01621d07fa8eb2a1a23160ee81ce38704e97b8ecf" + +[[package]] +name = "jobserver" +version = "0.1.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "48d1dbcbbeb6a7fec7e059840aa538bd62aaccf972c7346c4d9d2059312853d0" +dependencies = [ + "libc", +] + +[[package]] +name = "lexopt" +version = "0.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "baff4b617f7df3d896f97fe922b64817f6cd9a756bb81d40f8883f2f66dcb401" + +[[package]] +name = "libc" +version = "0.2.161" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e9489c2807c139ffd9c1794f4af0ebe86a828db53ecdc7fea2111d0fed085d1" + +[[package]] +name = "libfuzzer-sys" +version = "0.4.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a96cfd5557eb82f2b83fed4955246c988d331975a002961b07c81584d107e7f7" +dependencies = [ + "arbitrary", + "cc", + "once_cell", +] + +[[package]] +name = "num-conv" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "51d515d32fb182ee37cda2ccdcb92950d6a3c2893aa280e540671c2cd0f3b1d9" + +[[package]] +name = "octseq" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "126c3ca37c9c44cec575247f43a3e4374d8927684f129d2beeb0d2cef262fe12" +dependencies = [ + "bytes", +] + +[[package]] +name = "once_cell" +version = "1.20.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1261fe7e33c73b354eab43b1273a57c8f967d0391e80353e51f764ac02cf6775" + +[[package]] +name = "powerfmt" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "439ee305def115ba05938db6eb1644ff94165c5ab5e9420d1c1bcedbba909391" + +[[package]] +name = "ppv-lite86" +version = "0.2.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "77957b295656769bb8ad2b6a6b09d897d94f05c41b069aede1fcdaa675eaea04" +dependencies = [ + "zerocopy", +] + +[[package]] +name = "proc-macro2" +version = "1.0.89" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f139b0662de085916d1fb67d2b4169d1addddda1919e696f3252b740b629986e" +dependencies = [ + "unicode-ident", +] + +[[package]] +name = "quote" +version = "1.0.37" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b5b9d34b8991d19d98081b46eacdd8eb58c6f2b201139f7c5f643cc155a633af" +dependencies = [ + "proc-macro2", +] + +[[package]] +name = "rand" +version = "0.8.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "34af8d1a0e25924bc5b7c43c079c942339d8f0a8b57c39049bef581b46327404" +dependencies = [ + "libc", + "rand_chacha", + "rand_core", +] + +[[package]] +name = "rand_chacha" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e6c10a63a0fa32252be49d21e7709d4d4baf8d231c2dbce1eaa8141b9b127d88" +dependencies = [ + "ppv-lite86", + "rand_core", +] + +[[package]] +name = "rand_core" +version = "0.6.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ec0be4795e2f6a28069bec0b5ff3e2ac9bafc99e6a9a7dc3547996c5c816922c" +dependencies = [ + "getrandom", +] + +[[package]] +name = "ring" +version = "0.17.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c17fa4cb658e3583423e915b9f3acc01cceaee1860e33d59ebae66adc3a2dc0d" +dependencies = [ + "cc", + "cfg-if", + "getrandom", + "libc", + "spin", + "untrusted", + "windows-sys 0.52.0", +] + +[[package]] +name = "serde" +version = "1.0.214" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f55c3193aca71c12ad7890f1785d2b73e1b9f63a0bbc353c08ef26fe03fc56b5" +dependencies = [ + "serde_derive", +] + +[[package]] +name = "serde_derive" +version = "1.0.214" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "de523f781f095e28fa605cdce0f8307e451cc0fd14e2eb4cd2e98a355b147766" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "shlex" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0fda2ff0d084019ba4d7c6f371c95d8fd75ce3524c3cb8fb653a3023f6323e64" + +[[package]] +name = "spin" +version = "0.9.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6980e8d7511241f8acf4aebddbb1ff938df5eebe98691418c4468d0b72a96a67" + +[[package]] +name = "strsim" +version = "0.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7da8b5736845d9f2fcb837ea5d9e2628564b3b043a70948a3f0b778838c5fb4f" + +[[package]] +name = "syn" +version = "2.0.87" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "25aa4ce346d03a6dcd68dd8b4010bcb74e54e62c90c573f394c46eae99aba32d" +dependencies = [ + "proc-macro2", + "quote", + "unicode-ident", +] + +[[package]] +name = "time" +version = "0.3.36" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5dfd88e563464686c916c7e46e623e520ddc6d79fa6641390f2e3fa86e83e885" +dependencies = [ + "deranged", + "num-conv", + "powerfmt", + "serde", + "time-core", +] + +[[package]] +name = "time-core" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ef927ca75afb808a4d64dd374f00a2adf8d0fcff8e7b184af886c3c87ec4a3f3" + +[[package]] +name = "unicode-ident" +version = "1.0.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e91b56cd4cadaeb79bbf1a5645f6b4f8dc5bde8834ad5894a8db35fda9efa1fe" + +[[package]] +name = "untrusted" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8ecb6da28b8a351d773b68d5825ac39017e680750f980f3a1a85cd8dd28a47c1" + +[[package]] +name = "utf8parse" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "06abde3611657adf66d383f00b093d7faecc7fa57071cce2578660c9f1010821" + +[[package]] +name = "wasi" +version = "0.11.0+wasi-snapshot-preview1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9c8d87e72b64a3b4db28d11ce29237c246188f4f51057d65a7eab63b7987e423" + +[[package]] +name = "windows-sys" +version = "0.52.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "282be5f36a8ce781fad8c8ae18fa3f9beff57ec1b52cb3de0789201425d9a33d" +dependencies = [ + "windows-targets", +] + +[[package]] +name = "windows-sys" +version = "0.59.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e38bc4d79ed67fd075bcc251a1c39b32a1776bbe92e5bef1f0bf1f8c531853b" +dependencies = [ + "windows-targets", +] + +[[package]] +name = "windows-targets" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9b724f72796e036ab90c1021d4780d4d3d648aca59e491e6b98e725b84e99973" +dependencies = [ + "windows_aarch64_gnullvm", + "windows_aarch64_msvc", + "windows_i686_gnu", + "windows_i686_gnullvm", + "windows_i686_msvc", + "windows_x86_64_gnu", + "windows_x86_64_gnullvm", + "windows_x86_64_msvc", +] + +[[package]] +name = "windows_aarch64_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "32a4622180e7a0ec044bb555404c800bc9fd9ec262ec147edd5989ccd0c02cd3" + +[[package]] +name = "windows_aarch64_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09ec2a7bb152e2252b53fa7803150007879548bc709c039df7627cabbd05d469" + +[[package]] +name = "windows_i686_gnu" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e9b5ad5ab802e97eb8e295ac6720e509ee4c243f69d781394014ebfe8bbfa0b" + +[[package]] +name = "windows_i686_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0eee52d38c090b3caa76c563b86c3a4bd71ef1a819287c19d586d7334ae8ed66" + +[[package]] +name = "windows_i686_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "240948bc05c5e7c6dabba28bf89d89ffce3e303022809e73deaefe4f6ec56c66" + +[[package]] +name = "windows_x86_64_gnu" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "147a5c80aabfbf0c7d901cb5895d1de30ef2907eb21fbbab29ca94c5b08b1a78" + +[[package]] +name = "windows_x86_64_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "24d5b23dc417412679681396f2b49f3de8c1473deb516bd34410872eff51ed0d" + +[[package]] +name = "windows_x86_64_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "589f6da84c646204747d1270a2a5661ea66ed1cced2631d546fdfb155959f9ec" + +[[package]] +name = "zerocopy" +version = "0.7.35" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1b9b4fd18abc82b8136838da5d50bae7bdea537c574d8dc1a34ed098d6c166f0" +dependencies = [ + "byteorder", + "zerocopy-derive", +] + +[[package]] +name = "zerocopy-derive" +version = "0.7.35" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fa4f8080344d4671fb4e831a13ad1e68092748387dfc4f55e356242fae12ce3e" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] diff --git a/fuzz/Cargo.toml b/fuzz/Cargo.toml new file mode 100644 index 00000000..7bb1bcf6 --- /dev/null +++ b/fuzz/Cargo.toml @@ -0,0 +1,20 @@ +[package] +name = "dnst-fuzz" +version = "0.0.0" +publish = false +edition = "2021" + +[package.metadata] +cargo-fuzz = true + +[dependencies] +arbitrary = "1.4.1" +libfuzzer-sys = "0.4" +dnst = { path = "..", features = ["arbitrary"] } + +[[bin]] +name = "nsec3-hash" +path = "fuzz_targets/nsec3-hash.rs" +test = false +doc = false +bench = false diff --git a/fuzz/README.md b/fuzz/README.md new file mode 100644 index 00000000..4c27916b --- /dev/null +++ b/fuzz/README.md @@ -0,0 +1,13 @@ +`dnst` fuzz testing with cargo-fuzz and libfuzzer + +# tl;dr + +For example, fuzz test the nsec3-hash subcommand for 10 minutes using 8 concurrent jobs: + +``` +cargo +nightly fuzz run nsec3-hash -- -jobs=8 -max_total_time=600 -print_final_stats=1 +``` + +# Further reading + +https://rust-fuzz.github.io/book/introduction.html \ No newline at end of file diff --git a/fuzz/fuzz_targets/nsec3-hash.rs b/fuzz/fuzz_targets/nsec3-hash.rs new file mode 100644 index 00000000..81bfb4b4 --- /dev/null +++ b/fuzz/fuzz_targets/nsec3-hash.rs @@ -0,0 +1,9 @@ +#![no_main] + +use libfuzzer_sys::fuzz_target; + +use dnst::commands::nsec3hash::Nsec3Hash; + +fuzz_target!(|cmd: Nsec3Hash| { + let _ = cmd.execute(); +}); diff --git a/src/commands/nsec3hash.rs b/src/commands/nsec3hash.rs index b673d504..4f55e8fd 100644 --- a/src/commands/nsec3hash.rs +++ b/src/commands/nsec3hash.rs @@ -14,6 +14,7 @@ use std::str::FromStr; use super::{parse_os, parse_os_with, LdnsCommand}; #[derive(Clone, Debug, clap::Args)] +#[cfg_attr(feature = "arbitrary", derive(arbitrary::Arbitrary))] pub struct Nsec3Hash { /// The hashing algorithm to use #[arg( From aec136e270dcddf16131f9db74e47cc0a21b0036 Mon Sep 17 00:00:00 2001 From: Ximon Eighteen <3304436+ximon18@users.noreply.github.com> Date: Thu, 14 Nov 2024 11:52:14 +0100 Subject: [PATCH 2/3] Remove accidentally committed fuzz log files. --- fuzz-0.log | 64 ------------------------------------------------------ fuzz-1.log | 64 ------------------------------------------------------ fuzz-2.log | 64 ------------------------------------------------------ fuzz-3.log | 64 ------------------------------------------------------ fuzz-4.log | 64 ------------------------------------------------------ fuzz-5.log | 64 ------------------------------------------------------ fuzz-6.log | 64 ------------------------------------------------------ fuzz-7.log | 64 ------------------------------------------------------ 8 files changed, 512 deletions(-) delete mode 100644 fuzz-0.log delete mode 100644 fuzz-1.log delete mode 100644 fuzz-2.log delete mode 100644 fuzz-3.log delete mode 100644 fuzz-4.log delete mode 100644 fuzz-5.log delete mode 100644 fuzz-6.log delete mode 100644 fuzz-7.log diff --git a/fuzz-0.log b/fuzz-0.log deleted file mode 100644 index bf6c058e..00000000 --- a/fuzz-0.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4286344904 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55d595f879e0, 0x55d595fadbb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55d595fadbb0,0x55d59620f8b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283393== ERROR: libFuzzer: deadly signal - #0 0x55d5955fb051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x55d595e0c92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x55d595dbbd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x55d595dbbd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7f0754b66dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7f0754bbf723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7f0754b66d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7f0754b4e941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x55d595e87689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x55d595e77c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x55d595db4ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x55d595e7c757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x55d595e7c757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x55d595e7c4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x55d595e7a048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x55d595e7c1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x55d595ec613f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x55d5956c68f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x55d5956c56e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x55d59563cb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x55d59563c539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x55d595dae2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x55d595dae2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x55d595db4ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x55d595db447b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x55d595db447b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x55d595db447b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x55d595dbc2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x55d595dc2e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x55d595dc3d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x55d595dc5117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x55d595ddaa22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x55d595df0df2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7f0754b50247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7f0754b5030a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x55d595553664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 2 InsertByte-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0xba,0xa,0x31, -\272\0121 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-d157ce53bcd9dc579f5d5a1747f548ec2c5bd3f9 -Base64: ugox -stat::number_of_executed_units: 4 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 diff --git a/fuzz-1.log b/fuzz-1.log deleted file mode 100644 index 8a936bd9..00000000 --- a/fuzz-1.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4285881018 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5636b92819e0, 0x5636b92a7bb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5636b92a7bb0,0x5636b95098b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283399== ERROR: libFuzzer: deadly signal - #0 0x5636b88f5051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x5636b910692a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x5636b90b5d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x5636b90b5d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7f3e780a8dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7f3e78101723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7f3e780a8d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7f3e78090941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x5636b9181689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x5636b9171c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x5636b90aece4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x5636b9176757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x5636b9176757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x5636b91764e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x5636b9174048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x5636b91761ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x5636b91c013f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x5636b89c08f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x5636b89bf6e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x5636b8936b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x5636b8936539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x5636b90a82ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x5636b90a82ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x5636b90aeef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x5636b90ae47b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x5636b90ae47b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x5636b90ae47b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x5636b90b62a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x5636b90bce5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x5636b90bdd3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x5636b90bf117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x5636b90d4a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x5636b90eadf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7f3e78092247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7f3e7809230a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x5636b884d664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 4 CopyPart-CrossOver-ChangeBit-CrossOver-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0xa,0x1a,0xa, -\012\032\012 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-2a6ad4009b0cc86353847bdfe98b39087046b082 -Base64: ChoK -stat::number_of_executed_units: 6 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 diff --git a/fuzz-2.log b/fuzz-2.log deleted file mode 100644 index 157f1584..00000000 --- a/fuzz-2.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4286407145 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55d4f7b139e0, 0x55d4f7b39bb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55d4f7b39bb0,0x55d4f7d9b8b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283397== ERROR: libFuzzer: deadly signal - #0 0x55d4f7187051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x55d4f799892a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x55d4f7947d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x55d4f7947d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7ff16d87adcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7ff16d8d3723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7ff16d87ad1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7ff16d862941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x55d4f7a13689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x55d4f7a03c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x55d4f7940ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x55d4f7a08757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x55d4f7a08757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x55d4f7a084e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x55d4f7a06048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x55d4f7a081ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x55d4f7a5213f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x55d4f72528f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x55d4f72516e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x55d4f71c8b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x55d4f71c8539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x55d4f793a2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x55d4f793a2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x55d4f7940ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x55d4f794047b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x55d4f794047b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x55d4f794047b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x55d4f79482a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x55d4f794ee5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x55d4f794fd3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x55d4f7951117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x55d4f7966a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x55d4f797cdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7ff16d864247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7ff16d86430a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x55d4f70df664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 2 CrossOver-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0x41,0xa,0xa, -A\012\012 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-a148f3e928c613bbefdd8738767e9292e69eeb5d -Base64: QQoK -stat::number_of_executed_units: 9 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 diff --git a/fuzz-3.log b/fuzz-3.log deleted file mode 100644 index 4ab16eba..00000000 --- a/fuzz-3.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4286402812 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55f1920229e0, 0x55f192048bb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55f192048bb0,0x55f1922aa8b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283396== ERROR: libFuzzer: deadly signal - #0 0x55f191696051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x55f191ea792a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x55f191e56d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x55f191e56d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7ff4daa88dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7ff4daae1723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7ff4daa88d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7ff4daa70941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x55f191f22689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x55f191f12c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x55f191e4fce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x55f191f17757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x55f191f17757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x55f191f174e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x55f191f15048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x55f191f171ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x55f191f6113f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x55f1917618f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x55f1917606e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x55f1916d7b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x55f1916d7539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x55f191e492ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x55f191e492ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x55f191e4fef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x55f191e4f47b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x55f191e4f47b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x55f191e4f47b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x55f191e572a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x55f191e5de5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x55f191e5ed3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x55f191e60117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x55f191e75a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x55f191e8bdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7ff4daa72247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7ff4daa7230a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x55f1915ee664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 5 ChangeBinInt-ChangeBit-CrossOver-ShuffleBytes-CopyPart-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0xa,0x0,0xa,0x0, -\012\000\012\000 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-c2abd53443e87b1d4332b55de89f3f4c04d71253 -Base64: CgAKAA== -stat::number_of_executed_units: 17 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 diff --git a/fuzz-4.log b/fuzz-4.log deleted file mode 100644 index 993736b1..00000000 --- a/fuzz-4.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4285853224 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5651c02f69e0, 0x5651c031cbb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5651c031cbb0,0x5651c057e8b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283395== ERROR: libFuzzer: deadly signal - #0 0x5651bf96a051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x5651c017b92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x5651c012ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x5651c012ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7fd0ffbc5dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7fd0ffc1e723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7fd0ffbc5d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7fd0ffbad941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x5651c01f6689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x5651c01e6c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x5651c0123ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x5651c01eb757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x5651c01eb757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x5651c01eb4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x5651c01e9048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x5651c01eb1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x5651c023513f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x5651bfa358f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x5651bfa346e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x5651bf9abb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x5651bf9ab539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x5651c011d2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x5651c011d2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x5651c0123ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x5651c012347b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x5651c012347b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x5651c012347b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x5651c012b2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x5651c0131e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x5651c0132d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x5651c0134117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x5651c0149a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x5651c015fdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7fd0ffbaf247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7fd0ffbaf30a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x5651bf8c2664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 4 ChangeByte-ChangeByte-CrossOver-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0xbf,0xa,0x9d, -\277\012\235 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-9f719ad4a3507f90a3c39b6d04fc1fe87bb52684 -Base64: vwqd -stat::number_of_executed_units: 16 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 diff --git a/fuzz-5.log b/fuzz-5.log deleted file mode 100644 index 4ea0273d..00000000 --- a/fuzz-5.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4286513614 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x55cc9e0b09e0, 0x55cc9e0d6bb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x55cc9e0d6bb0,0x55cc9e3388b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283398== ERROR: libFuzzer: deadly signal - #0 0x55cc9d724051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x55cc9df3592a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x55cc9dee4d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x55cc9dee4d65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7f42aaeecdcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7f42aaf45723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7f42aaeecd1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7f42aaed4941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x55cc9dfb0689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x55cc9dfa0c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x55cc9deddce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x55cc9dfa5757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x55cc9dfa5757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x55cc9dfa54e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x55cc9dfa3048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x55cc9dfa51ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x55cc9dfef13f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x55cc9d7ef8f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x55cc9d7ee6e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x55cc9d765b7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x55cc9d765539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x55cc9ded72ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x55cc9ded72ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x55cc9deddef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x55cc9dedd47b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x55cc9dedd47b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x55cc9dedd47b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x55cc9dee52a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x55cc9deebe5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x55cc9deecd3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x55cc9deee117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x55cc9df03a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x55cc9df19df2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7f42aaed6247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7f42aaed630a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x55cc9d67c664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 3 ChangeByte-InsertByte-CopyPart-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0x25,0x25,0xf1, -%%\361 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-f0dbc044f861854b268a7630f06d6fd29dc54d7c -Base64: JSXx -stat::number_of_executed_units: 5 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 diff --git a/fuzz-6.log b/fuzz-6.log deleted file mode 100644 index 00002bf1..00000000 --- a/fuzz-6.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4286401685 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5607e86299e0, 0x5607e864fbb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5607e864fbb0,0x5607e88b18b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283394== ERROR: libFuzzer: deadly signal - #0 0x5607e7c9d051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x5607e84ae92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x5607e845dd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x5607e845dd65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7f2245021dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7f224507a723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7f2245021d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7f2245009941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x5607e8529689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x5607e8519c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x5607e8456ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x5607e851e757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x5607e851e757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x5607e851e4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x5607e851c048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x5607e851e1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x5607e856813f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x5607e7d688f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x5607e7d676e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x5607e7cdeb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x5607e7cde539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x5607e84502ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x5607e84502ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x5607e8456ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x5607e845647b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x5607e845647b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x5607e845647b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x5607e845e2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x5607e8464e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x5607e8465d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x5607e8467117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x5607e847ca22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x5607e8492df2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7f224500b247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7f224500b30a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x5607e7bf5664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 5 ChangeByte-CrossOver-CrossOver-ChangeByte-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0x44,0x5d,0x7, -D]\007 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-4515dff406323f45557f02bd625d93a824962054 -Base64: RF0H -stat::number_of_executed_units: 27 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 diff --git a/fuzz-7.log b/fuzz-7.log deleted file mode 100644 index 65ef7902..00000000 --- a/fuzz-7.log +++ /dev/null @@ -1,64 +0,0 @@ -INFO: Running with entropic power schedule (0xFF, 100). -INFO: Seed: 4285853061 -INFO: Loaded 1 modules (156112 inline 8-bit counters): 156112 [0x5579c5e269e0, 0x5579c5e4cbb0), -INFO: Loaded 1 PC tables (156112 PCs): 156112 [0x5579c5e4cbb0,0x5579c60ae8b0), -INFO: 0 files found in /data/home/ximon/src/dnst/fuzz/corpus/nsec3-hash -INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes -INFO: A corpus is not provided, starting from an empty corpus -#2 INITED exec/s: 0 rss: 39Mb -WARNING: no interesting inputs were found so far. Is the code instrumented for coverage? -This may also happen if the target rejected all inputs we tried so far -thread '' panicked at /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9: -should not be called with an unsupported algorithm -note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace -==283400== ERROR: libFuzzer: deadly signal - #0 0x5579c549a051 in __sanitizer_print_stack_trace /rustc/llvm/src/llvm-project/compiler-rt/lib/asan/asan_stack.cpp:87:3 - #1 0x5579c5cab92a in fuzzer::PrintStackTrace() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerUtil.cpp:210:38 - #2 0x5579c5c5ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:233:18 - #3 0x5579c5c5ad65 in fuzzer::Fuzzer::CrashCallback() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:228:6 - #4 0x7fef8d5b3dcf (/lib64/libc.so.6+0x19dcf) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #5 0x7fef8d60c723 in __pthread_kill_implementation (/lib64/libc.so.6+0x72723) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #6 0x7fef8d5b3d1d in gsignal (/lib64/libc.so.6+0x19d1d) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #7 0x7fef8d59b941 in abort (/lib64/libc.so.6+0x1941) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #8 0x5579c5d26689 in std::sys::pal::unix::abort_internal::hdaf86772a1cef655 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/pal/unix/mod.rs:373:14 - #9 0x5579c5d16c29 in std::process::abort::he3497009690de696 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/process.rs:2374:5 - #10 0x5579c5c53ce4 in libfuzzer_sys::initialize::_$u7b$$u7b$closure$u7d$$u7d$::hf2894e1cc730e6f2 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:91:9 - #11 0x5579c5d1b757 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h064387ca800e4443 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/alloc/src/boxed.rs:1981:9 - #12 0x5579c5d1b757 in std::panicking::rust_panic_with_hook::h0d54adfe474bcf89 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:809:13 - #13 0x5579c5d1b4e5 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h2299ba4f19c41831 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:667:13 - #14 0x5579c5d19048 in std::sys::backtrace::__rust_end_short_backtrace::h0b6f5a727883f447 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/sys/backtrace.rs:170:18 - #15 0x5579c5d1b1ab in rust_begin_unwind /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/std/src/panicking.rs:665:5 - #16 0x5579c5d6513f in core::panicking::panic_fmt::hde3e02c671c994c5 /rustc/bc5cf994db9fb46712cefd89f78ad7fc51f184a2/library/core/src/panicking.rs:75:14 - #17 0x5579c55658f7 in dnst::commands::nsec3hash::nsec3_hash::h8b11d0394bef53a1 /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:163:9 - #18 0x5579c55646e0 in dnst::commands::nsec3hash::Nsec3Hash::execute::he84a19f04233b56c /data/home/ximon/src/dnst/src/commands/nsec3hash.rs:133:20 - #19 0x5579c54dbb7e in nsec3_hash::_::__libfuzzer_sys_run::h53e0b4b2540b58df /data/home/ximon/src/dnst/fuzz/fuzz_targets/nsec3-hash.rs:8:13 - #20 0x5579c54db539 in rust_fuzzer_test_input /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:297:60 - #21 0x5579c5c4d2ff in libfuzzer_sys::test_input_wrap::_$u7b$$u7b$closure$u7d$$u7d$::h6ab9c5fe8a493588 /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:61:9 - #22 0x5579c5c4d2ff in std::panicking::try::do_call::hbdfc007927b474d2 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:557:40 - #23 0x5579c5c53ef8 in __rust_try libfuzzer_sys.44345fc2b3749988-cgu.0 - #24 0x5579c5c5347b in std::panicking::try::hcef786c653e1a6b4 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panicking.rs:520:19 - #25 0x5579c5c5347b in std::panic::catch_unwind::ha012cdd8408087c3 /home/ximon/.rustup/toolchains/nightly-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/std/src/panic.rs:358:14 - #26 0x5579c5c5347b in LLVMFuzzerTestOneInput /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/src/lib.rs:59:22 - #27 0x5579c5c5b2a9 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:612:15 - #28 0x5579c5c61e5f in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:514:22 - #29 0x5579c5c62d3a in fuzzer::Fuzzer::MutateAndTestOne() /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:758:25 - #30 0x5579c5c64117 in fuzzer::Fuzzer::Loop(std::vector>&) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerLoop.cpp:903:21 - #31 0x5579c5c79a22 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerDriver.cpp:912:10 - #32 0x5579c5c8fdf2 in main /home/ximon/.cargo/registry/src/index.crates.io-6f17d22bba15001f/libfuzzer-sys-0.4.7/libfuzzer/FuzzerMain.cpp:20:30 - #33 0x7fef8d59d247 in __libc_start_call_main (/lib64/libc.so.6+0x3247) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #34 0x7fef8d59d30a in __libc_start_main@GLIBC_2.2.5 (/lib64/libc.so.6+0x330a) (BuildId: 948d229348b56bdcf4e0a96d5ccd8fb175f617f0) - #35 0x5579c53f2664 in _start (/data/home/ximon/src/dnst/fuzz/target/x86_64-unknown-linux-gnu/release/nsec3-hash+0x631664) (BuildId: f20ddf594e7103f54a22fc263a633decb4717dac) - -NOTE: libFuzzer has rudimentary signal handlers. - Combine libFuzzer with AddressSanitizer or similar for better crash reports. -SUMMARY: libFuzzer: deadly signal -MS: 4 InsertByte-ChangeBinInt-ChangeBit-InsertByte-; base unit: adc83b19e793491b1c6ea0fd8b46cd9f32e592fc -0x29,0xa,0x14, -)\012\024 -artifact_prefix='/data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/'; Test unit written to /data/home/ximon/src/dnst/fuzz/artifacts/nsec3-hash/crash-94ff8218e755278c5cc0c158489ca5bf2b7b212b -Base64: KQoU -stat::number_of_executed_units: 31 -stat::average_exec_per_sec: 0 -stat::new_units_added: 0 -stat::slowest_unit_time_sec: 0 -stat::peak_rss_mb: 41 From f65bf721ca74d04b085ebeebdd332a57f284f152 Mon Sep 17 00:00:00 2001 From: Ximon Eighteen <3304436+ximon18@users.noreply.github.com> Date: Thu, 14 Nov 2024 15:45:38 +0100 Subject: [PATCH 3/3] Switch to `main` branch of `domain` now that fuzzing support has been merged. --- Cargo.lock | 2 +- Cargo.toml | 2 +- fuzz/Cargo.lock | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/Cargo.lock b/Cargo.lock index c35665a3..70fef692 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -174,7 +174,7 @@ dependencies = [ [[package]] name = "domain" version = "0.10.3" -source = "git+https://github.com/NLnetLabs/domain?branch=add-some-arbitrary-derives-for-fuzzing-support#a32cc33335586e738c1ea8315b7f3d869bbd4db3" +source = "git+https://github.com/NLnetLabs/domain#8f6e44385a927ab1225ea06ee4e2cdc594ef48b6" dependencies = [ "arbitrary", "bytes", diff --git a/Cargo.toml b/Cargo.toml index 0d4642af..ae176580 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -11,7 +11,7 @@ path = "src/bin/ldns.rs" [dependencies] arbitrary = { version = "1", optional = true, features = ["derive"] } clap = { version = "4", features = ["derive"] } -domain = { git = "https://github.com/NLnetLabs/domain", branch = "add-some-arbitrary-derives-for-fuzzing-support" } +domain = { git = "https://github.com/NLnetLabs/domain" } lexopt = "0.3.0" # for implementation of nsec3 hash until domain has it stabilized diff --git a/fuzz/Cargo.lock b/fuzz/Cargo.lock index 772234f6..d6fb01ec 100644 --- a/fuzz/Cargo.lock +++ b/fuzz/Cargo.lock @@ -185,7 +185,7 @@ dependencies = [ [[package]] name = "domain" version = "0.10.3" -source = "git+https://github.com/NLnetLabs/domain?branch=add-some-arbitrary-derives-for-fuzzing-support#a32cc33335586e738c1ea8315b7f3d869bbd4db3" +source = "git+https://github.com/NLnetLabs/domain#8f6e44385a927ab1225ea06ee4e2cdc594ef48b6" dependencies = [ "arbitrary", "bytes",