blob: 78606ccd911a96a0a015d09b9a00aee39beace7d [file] [log] [blame]
Steven Moreland46e0da72019-09-05 15:52:02 -07001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16#define FUZZ_LOG_TAG "main"
17
18#include "binder.h"
Steven Moreland28f81422019-10-03 10:40:59 -070019#include "binder_ndk.h"
Steven Moreland46e0da72019-09-05 15:52:02 -070020#include "hwbinder.h"
21#include "util.h"
22
Steven Moreland139514d2020-12-08 01:12:26 +000023#include <iostream>
24
Steven Moreland46e0da72019-09-05 15:52:02 -070025#include <android-base/logging.h>
Steven Moreland362e4da2020-10-16 19:49:39 +000026#include <fuzzbinder/random_parcel.h>
Steven Moreland842b5932020-10-08 00:23:35 +000027#include <fuzzer/FuzzedDataProvider.h>
Steven Moreland46e0da72019-09-05 15:52:02 -070028
29#include <cstdlib>
30#include <ctime>
Steven Moreland139514d2020-12-08 01:12:26 +000031#include <sys/resource.h>
32#include <sys/time.h>
Steven Moreland46e0da72019-09-05 15:52:02 -070033
Steven Moreland5e561af2020-10-08 02:16:03 +000034using android::fillRandomParcel;
35
36void fillRandomParcel(::android::hardware::Parcel* p, FuzzedDataProvider&& provider) {
Steven Moreland362e4da2020-10-16 19:49:39 +000037 // TODO: functionality to create random parcels for libhwbinder parcels
Steven Moreland5e561af2020-10-08 02:16:03 +000038 std::vector<uint8_t> input = provider.ConsumeRemainingBytes<uint8_t>();
39 p->setData(input.data(), input.size());
40}
Steven Moreland362e4da2020-10-16 19:49:39 +000041static void fillRandomParcel(NdkParcelAdapter* p, FuzzedDataProvider&& provider) {
42 // fill underlying parcel using functions to fill random libbinder parcel
43 fillRandomParcel(p->parcel(), std::move(provider));
44}
Steven Moreland5e561af2020-10-08 02:16:03 +000045
Steven Moreland46e0da72019-09-05 15:52:02 -070046template <typename P>
Steven Moreland842b5932020-10-08 00:23:35 +000047void doFuzz(const char* backend, const std::vector<ParcelRead<P>>& reads,
Steven Moreland5e561af2020-10-08 02:16:03 +000048 FuzzedDataProvider&& provider) {
Steven Moreland842b5932020-10-08 00:23:35 +000049 // Allow some majority of the bytes to be dedicated to telling us what to
50 // do. The fixed value added here represents that we want to test doing a
51 // lot of 'instructions' even on really short parcels.
Steven Moreland5e561af2020-10-08 02:16:03 +000052 size_t maxInstructions = 20 + (provider.remaining_bytes() * 2 / 3);
Steven Moreland842b5932020-10-08 00:23:35 +000053 // but don't always use that many instructions. We want to allow the fuzzer
54 // to explore large parcels with few instructions if it wants to.
Steven Moreland5e561af2020-10-08 02:16:03 +000055 std::vector<uint8_t> instructions = provider.ConsumeBytes<uint8_t>(
56 provider.ConsumeIntegralInRange<size_t>(0, maxInstructions));
Steven Moreland46e0da72019-09-05 15:52:02 -070057
58 P p;
Steven Moreland5e561af2020-10-08 02:16:03 +000059 fillRandomParcel(&p, std::move(provider));
Steven Moreland46e0da72019-09-05 15:52:02 -070060
Steven Moreland7eac78a2019-10-11 18:46:24 -070061 // since we are only using a byte to index
62 CHECK(reads.size() <= 255) << reads.size();
63
Steven Moreland842b5932020-10-08 00:23:35 +000064 FUZZ_LOG() << "backend: " << backend;
Steven Moreland5e561af2020-10-08 02:16:03 +000065 FUZZ_LOG() << "input: " << hexString(p.data(), p.dataSize());
Steven Moreland842b5932020-10-08 00:23:35 +000066 FUZZ_LOG() << "instructions: " << hexString(instructions);
67
68 for (size_t i = 0; i + 1 < instructions.size(); i += 2) {
Steven Moreland46e0da72019-09-05 15:52:02 -070069 uint8_t a = instructions[i];
Steven Morelanddc449dc2019-10-10 10:06:58 -070070 uint8_t readIdx = a % reads.size();
71
Steven Moreland46e0da72019-09-05 15:52:02 -070072 uint8_t b = instructions[i + 1];
73
Steven Morelanddc449dc2019-10-10 10:06:58 -070074 FUZZ_LOG() << "Instruction: " << (i / 2) + 1 << "/" << instructions.size() / 2
75 << " cmd: " << static_cast<size_t>(a) << " (" << static_cast<size_t>(readIdx)
76 << ") arg: " << static_cast<size_t>(b) << " size: " << p.dataSize()
77 << " avail: " << p.dataAvail() << " pos: " << p.dataPosition()
78 << " cap: " << p.dataCapacity();
Steven Moreland46e0da72019-09-05 15:52:02 -070079
Steven Morelanddc449dc2019-10-10 10:06:58 -070080 reads[readIdx](p, b);
Steven Moreland46e0da72019-09-05 15:52:02 -070081 }
82}
83
Steven Moreland139514d2020-12-08 01:12:26 +000084size_t getHardMemoryLimit() {
85 struct rlimit limit;
86 CHECK(0 == getrlimit(RLIMIT_AS, &limit)) << errno;
87 return limit.rlim_max;
88}
89
90void setMemoryLimit(size_t cur, size_t max) {
91 const struct rlimit kLimit = {
92 .rlim_cur = cur,
93 .rlim_max = max,
94 };
95 CHECK(0 == setrlimit(RLIMIT_AS, &kLimit)) << errno;
96}
97
Steven Moreland46e0da72019-09-05 15:52:02 -070098extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
Steven Moreland139514d2020-12-08 01:12:26 +000099 static constexpr size_t kMemLimit = 1 * 1024 * 1024;
100 size_t hardLimit = getHardMemoryLimit();
101 setMemoryLimit(std::min(kMemLimit, hardLimit), hardLimit);
102
Steven Moreland46e0da72019-09-05 15:52:02 -0700103 if (size <= 1) return 0; // no use
Steven Moreland98947412019-10-15 10:36:05 -0700104
105 // avoid timeouts, see b/142617274, b/142473153
106 if (size > 50000) return 0;
107
Steven Moreland842b5932020-10-08 00:23:35 +0000108 FuzzedDataProvider provider = FuzzedDataProvider(data, size);
Steven Moreland46e0da72019-09-05 15:52:02 -0700109
Steven Moreland5e561af2020-10-08 02:16:03 +0000110 const std::function<void(FuzzedDataProvider &&)> fuzzBackend[3] = {
111 [](FuzzedDataProvider&& provider) {
Steven Moreland842b5932020-10-08 00:23:35 +0000112 doFuzz<::android::hardware::Parcel>("hwbinder", HWBINDER_PARCEL_READ_FUNCTIONS,
Steven Moreland5e561af2020-10-08 02:16:03 +0000113 std::move(provider));
Steven Moreland842b5932020-10-08 00:23:35 +0000114 },
Steven Moreland5e561af2020-10-08 02:16:03 +0000115 [](FuzzedDataProvider&& provider) {
116 doFuzz<::android::Parcel>("binder", BINDER_PARCEL_READ_FUNCTIONS,
117 std::move(provider));
Steven Moreland842b5932020-10-08 00:23:35 +0000118 },
Steven Moreland5e561af2020-10-08 02:16:03 +0000119 [](FuzzedDataProvider&& provider) {
120 doFuzz<NdkParcelAdapter>("binder_ndk", BINDER_NDK_PARCEL_READ_FUNCTIONS,
121 std::move(provider));
Steven Moreland842b5932020-10-08 00:23:35 +0000122 },
123 };
Steven Moreland46e0da72019-09-05 15:52:02 -0700124
Steven Moreland5e561af2020-10-08 02:16:03 +0000125 provider.PickValueInArray(fuzzBackend)(std::move(provider));
Steven Moreland46e0da72019-09-05 15:52:02 -0700126
Steven Moreland139514d2020-12-08 01:12:26 +0000127 setMemoryLimit(hardLimit, hardLimit);
128
Steven Moreland46e0da72019-09-05 15:52:02 -0700129 return 0;
130}