blob: 621e3f7f9c2edaead367f9edf47532ab819b288e [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <stddef.h>
#include <stdint.h>
#include <vector>
#include "base/bind.h"
#include "base/callback_helpers.h"
#include "third_party/libpng/png.h"
void* limited_malloc(png_structp, png_alloc_size_t size) {
// libpng may allocate large amounts of memory that the fuzzer reports as
// an error. In order to silence these errors, make libpng fail when trying
// to allocate a large amount.
// This number is chosen to match the default png_user_chunk_malloc_max.
if (size > 8000000)
return nullptr;
return malloc(size);
void default_free(png_structp, png_voidp ptr) {
return free(ptr);
static const int kPngHeaderSize = 8;
// Entry point for LibFuzzer.
// Roughly follows the libpng book example:
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
if (size < kPngHeaderSize) {
return 0;
std::vector<unsigned char> v(data, data + size);
if (png_sig_cmp(, 0, kPngHeaderSize)) {
// not a PNG.
return 0;
png_structp png_ptr = png_create_read_struct
(PNG_LIBPNG_VER_STRING, nullptr, nullptr, nullptr);
// To avoid OOM with MSan ( These values are recommended as
// safe settings by
png_set_user_limits(png_ptr, 65535, 65535);
// Not all potential OOM are due to images with large widths and heights.
// Use a custom allocator that fails for large allocations.
png_set_mem_fn(png_ptr, nullptr, limited_malloc, default_free);
png_set_crc_action(png_ptr, PNG_CRC_QUIET_USE, PNG_CRC_QUIET_USE);
png_infop info_ptr = png_create_info_struct(png_ptr);
base::ScopedClosureRunner struct_deleter(base::Bind(
&png_destroy_read_struct, &png_ptr, &info_ptr, nullptr));
if (setjmp(png_jmpbuf(png_ptr))) {
return 0;
png_set_progressive_read_fn(png_ptr, nullptr, nullptr, nullptr, nullptr);
png_process_data(png_ptr, info_ptr, const_cast<uint8_t*>(data), size);
return 0;