diff options
Diffstat (limited to 'vcl')
-rw-r--r-- | vcl/Executable_rtf2pdffuzzer.mk | 50 | ||||
-rw-r--r-- | vcl/Module_vcl.mk | 1 | ||||
-rw-r--r-- | vcl/workben/fftester.cxx | 10 | ||||
-rw-r--r-- | vcl/workben/rtf2pdffuzzer.cxx | 62 | ||||
-rw-r--r-- | vcl/workben/rtf2pdffuzzer.options | 3 |
5 files changed, 126 insertions, 0 deletions
diff --git a/vcl/Executable_rtf2pdffuzzer.mk b/vcl/Executable_rtf2pdffuzzer.mk new file mode 100644 index 000000000000..78efef1748f4 --- /dev/null +++ b/vcl/Executable_rtf2pdffuzzer.mk @@ -0,0 +1,50 @@ +# -*- Mode: makefile-gmake; tab-width: 4; indent-tabs-mode: t -*- +# +# +# This file is part of the LibreOffice project. +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +# + +include $(SRCDIR)/vcl/commonfuzzer.mk + +$(eval $(call gb_Executable_Executable,rtf2pdffuzzer)) + +$(eval $(call gb_Executable_use_api,rtf2pdffuzzer,\ + offapi \ + udkapi \ +)) + +$(eval $(call gb_Executable_use_externals,rtf2pdffuzzer,\ + $(fuzzer_externals) \ + epubgen \ + revenge \ +)) + +$(eval $(call gb_Executable_set_include,rtf2pdffuzzer,\ + $$(INCLUDE) \ + -I$(SRCDIR)/vcl/inc \ +)) + +$(eval $(call gb_Executable_use_libraries,rtf2pdffuzzer,\ + $(fuzzer_writer_libraries) \ + $(fuzzer_core_libraries) \ + pdffilter \ +)) + +$(eval $(call gb_Executable_use_static_libraries,rtf2pdffuzzer,\ + $(fuzzer_statics) \ + fuzzer_writer \ +)) + +$(eval $(call gb_Executable_add_exception_objects,rtf2pdffuzzer,\ + vcl/workben/rtf2pdffuzzer \ +)) + +$(eval $(call gb_Executable_add_libs,rtf2pdffuzzer,\ + $(LIB_FUZZING_ENGINE) \ +)) + +# vim: set noet sw=4 ts=4: diff --git a/vcl/Module_vcl.mk b/vcl/Module_vcl.mk index c0a624acdc95..a79262b1c757 100644 --- a/vcl/Module_vcl.mk +++ b/vcl/Module_vcl.mk @@ -183,6 +183,7 @@ $(eval $(call gb_Module_add_targets,vcl,\ Executable_olefuzzer \ Executable_pptfuzzer \ Executable_rtffuzzer \ + Executable_rtf2pdffuzzer \ Executable_cgmfuzzer \ Executable_ww2fuzzer \ Executable_ww6fuzzer \ diff --git a/vcl/workben/fftester.cxx b/vcl/workben/fftester.cxx index e086e2e22e79..75d511b1278f 100644 --- a/vcl/workben/fftester.cxx +++ b/vcl/workben/fftester.cxx @@ -332,6 +332,16 @@ SAL_IMPLEMENT_MAIN_WITH_ARGS(argc, argv) SvFileStream aFileStream(out, StreamMode::READ); ret = static_cast<int>((*pfnImport)(aFileStream)); } + else if (strcmp(argv[2], "rtf2pdf") == 0) + { + static FFilterCall pfnImport(nullptr); + if (!pfnImport) + { + pfnImport = load(u"libmswordlo.so", "TestPDFExportRTF"); + } + SvFileStream aFileStream(out, StreamMode::READ); + ret = static_cast<int>((*pfnImport)(aFileStream)); + } else if (strcmp(argv[2], "fods2xls") == 0) { static FFilterCall pfnImport(nullptr); diff --git a/vcl/workben/rtf2pdffuzzer.cxx b/vcl/workben/rtf2pdffuzzer.cxx new file mode 100644 index 000000000000..9a5a6c5361c8 --- /dev/null +++ b/vcl/workben/rtf2pdffuzzer.cxx @@ -0,0 +1,62 @@ +/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ +/* + * This file is part of the LibreOffice project. + * + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. + */ + +#include <tools/stream.hxx> +#include <vcl/FilterConfigItem.hxx> +#include <com/sun/star/awt/XToolkit.hpp> +#include <com/sun/star/ucb/XContentProvider.hpp> +#include <com/sun/star/ucb/XUniversalContentBroker.hpp> +#include <libxml/parser.h> +#include "commonfuzzer.hxx" + +extern "C" bool TestPDFExportRTF(SvStream& rStream); + +static void silent_error_func(void*, const char* /*format*/, ...) {} + +extern "C" int LLVMFuzzerInitialize(int* argc, char*** argv) +{ + if (__lsan_disable) + __lsan_disable(); + + CommonInitialize(argc, argv); + + // initialise unconfigured UCB: + css::uno::Reference<css::ucb::XUniversalContentBroker> xUcb( + comphelper::getProcessServiceFactory()->createInstance( + "com.sun.star.ucb.UniversalContentBroker"), + css::uno::UNO_QUERY_THROW); + css::uno::Sequence<css::uno::Any> aArgs{ css::uno::Any(OUString("NoConfig")) }; + css::uno::Reference<css::ucb::XContentProvider> xFileProvider( + comphelper::getProcessServiceFactory()->createInstanceWithArguments( + "com.sun.star.ucb.FileContentProvider", aArgs), + css::uno::UNO_QUERY_THROW); + xUcb->registerContentProvider(xFileProvider, "file", true); + + // create and hold a reference to XToolkit here to avoid the lsan warning about its leak + // due to getting created in the unusual case of no vcl main loop + static css::uno::Reference<css::awt::XToolkit> xTk( + comphelper::getProcessServiceFactory()->createInstance("com.sun.star.awt.Toolkit"), + css::uno::UNO_QUERY_THROW); + + if (__lsan_enable) + __lsan_enable(); + + return 0; +} + +extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) +{ + SvMemoryStream aStream(const_cast<uint8_t*>(data), size, StreamMode::READ); + bool bRTFLoaded = TestPDFExportRTF(aStream); + // if the rtf didn't load then reject so that input will not be added to the corpus + // we're not interested in input that doesn't go on to exercise the pdf export + return bRTFLoaded ? 0 : -1; +} + +/* vim:set shiftwidth=4 softtabstop=4 expandtab: */ diff --git a/vcl/workben/rtf2pdffuzzer.options b/vcl/workben/rtf2pdffuzzer.options new file mode 100644 index 000000000000..0a8e8c36b319 --- /dev/null +++ b/vcl/workben/rtf2pdffuzzer.options @@ -0,0 +1,3 @@ +[libfuzzer] +max_len = 512 +dict = rtf.dict |