diff options
Diffstat (limited to 'libs/binder/tests/unit_fuzzers/MemoryDealerFuzz.cpp')
-rw-r--r-- | libs/binder/tests/unit_fuzzers/MemoryDealerFuzz.cpp | 77 |
1 files changed, 77 insertions, 0 deletions
diff --git a/libs/binder/tests/unit_fuzzers/MemoryDealerFuzz.cpp b/libs/binder/tests/unit_fuzzers/MemoryDealerFuzz.cpp new file mode 100644 index 0000000000..f9dda8c558 --- /dev/null +++ b/libs/binder/tests/unit_fuzzers/MemoryDealerFuzz.cpp @@ -0,0 +1,77 @@ +/* + * Copyright (C) 2020 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include <binder/MemoryDealer.h> +#include <commonFuzzHelpers.h> +#include <fuzzer/FuzzedDataProvider.h> +#include <string> +#include <unordered_set> + +namespace android { + +static constexpr size_t kMaxBufferSize = 10000; +static constexpr size_t kMaxDealerSize = 1024 * 512; +static constexpr size_t kMaxAllocSize = 1024; + +// Fuzzer entry point. +extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { + if (size > kMaxBufferSize) { + return 0; + } + + FuzzedDataProvider fdp(data, size); + size_t dSize = fdp.ConsumeIntegralInRange<size_t>(0, kMaxDealerSize); + std::string name = fdp.ConsumeRandomLengthString(fdp.remaining_bytes()); + uint32_t flags = fdp.ConsumeIntegral<uint32_t>(); + sp<MemoryDealer> dealer = new MemoryDealer(dSize, name.c_str(), flags); + + // This is used to track offsets that have been freed already to avoid an expected fatal log. + std::unordered_set<size_t> free_list; + + while (fdp.remaining_bytes() > 0) { + fdp.PickValueInArray<std::function<void()>>({ + [&]() -> void { dealer->getAllocationAlignment(); }, + [&]() -> void { dealer->getMemoryHeap(); }, + [&]() -> void { + size_t offset = fdp.ConsumeIntegral<size_t>(); + + // Offset has already been freed, so return instead. + if (free_list.find(offset) != free_list.end()) return; + + dealer->deallocate(offset); + free_list.insert(offset); + }, + [&]() -> void { + std::string randString = fdp.ConsumeRandomLengthString(fdp.remaining_bytes()); + dealer->dump(randString.c_str()); + }, + [&]() -> void { + size_t allocSize = fdp.ConsumeIntegralInRange<size_t>(0, kMaxAllocSize); + sp<IMemory> allocated = dealer->allocate(allocSize); + // If the allocation was successful, try to write to it + if (allocated != nullptr && allocated->unsecurePointer() != nullptr) { + memset(allocated->unsecurePointer(), 1, allocated->size()); + + // Clear the address from freelist since it has been allocated over again. + free_list.erase(allocated->offset()); + } + }, + })(); + } + + return 0; +} +} // namespace android |