/* * Copyright (C) 2019 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define FUZZ_LOG_TAG "main" #include "binder.h" #include "binder_ndk.h" #include "hwbinder.h" #include "util.h" #include #include #include #include #include #include #include #include #include #include #include using android::fillRandomParcel; using android::sp; using android::base::HexString; void fillRandomParcel(::android::hardware::Parcel* p, FuzzedDataProvider&& provider) { // TODO: functionality to create random parcels for libhwbinder parcels std::vector input = provider.ConsumeRemainingBytes(); p->setData(input.data(), input.size()); } static void fillRandomParcel(NdkParcelAdapter* p, FuzzedDataProvider&& provider) { // fill underlying parcel using functions to fill random libbinder parcel fillRandomParcel(p->parcel(), std::move(provider)); } template void doTransactFuzz(const char* backend, const sp& binder, FuzzedDataProvider&& provider) { uint32_t code = provider.ConsumeIntegral(); uint32_t flag = provider.ConsumeIntegral(); FUZZ_LOG() << "backend: " << backend; P reply; P data; fillRandomParcel(&data, std::move(provider)); (void)binder->transact(code, data, &reply, flag); } template void doReadFuzz(const char* backend, const std::vector>& reads, FuzzedDataProvider&& provider) { // Allow some majority of the bytes to be dedicated to telling us what to // do. The fixed value added here represents that we want to test doing a // lot of 'instructions' even on really short parcels. size_t maxInstructions = 20 + (provider.remaining_bytes() * 2 / 3); // but don't always use that many instructions. We want to allow the fuzzer // to explore large parcels with few instructions if it wants to. std::vector instructions = provider.ConsumeBytes( provider.ConsumeIntegralInRange(0, maxInstructions)); P p; fillRandomParcel(&p, std::move(provider)); // since we are only using a byte to index CHECK(reads.size() <= 255) << reads.size(); FUZZ_LOG() << "backend: " << backend; FUZZ_LOG() << "input: " << HexString(p.data(), p.dataSize()); FUZZ_LOG() << "instructions: " << HexString(instructions.data(), instructions.size()); for (size_t i = 0; i + 1 < instructions.size(); i += 2) { uint8_t a = instructions[i]; uint8_t readIdx = a % reads.size(); uint8_t b = instructions[i + 1]; FUZZ_LOG() << "Instruction: " << (i / 2) + 1 << "/" << instructions.size() / 2 << " cmd: " << static_cast(a) << " (" << static_cast(readIdx) << ") arg: " << static_cast(b) << " size: " << p.dataSize() << " avail: " << p.dataAvail() << " pos: " << p.dataPosition() << " cap: " << p.dataCapacity(); reads[readIdx](p, b); } } void* NothingClass_onCreate(void* args) { return args; } void NothingClass_onDestroy(void* /*userData*/) {} binder_status_t NothingClass_onTransact(AIBinder*, transaction_code_t, const AParcel*, AParcel*) { return STATUS_UNKNOWN_ERROR; } static AIBinder_Class* kNothingClass = AIBinder_Class_define("nothing", NothingClass_onCreate, NothingClass_onDestroy, NothingClass_onTransact); extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { if (size <= 1) return 0; // no use // avoid timeouts, see b/142617274, b/142473153 if (size > 50000) return 0; FuzzedDataProvider provider = FuzzedDataProvider(data, size); const std::function fuzzBackend[] = { [](FuzzedDataProvider&& provider) { doTransactFuzz< ::android::hardware::Parcel>("hwbinder", sp<::android::hardware::BHwBinder>::make(), std::move(provider)); }, [](FuzzedDataProvider&& provider) { doTransactFuzz<::android::Parcel>("binder", sp<::android::BBinder>::make(), std::move(provider)); }, [](FuzzedDataProvider&& provider) { // fuzz from the libbinder layer since it's a superset of the // interface you get at the libbinder_ndk layer auto ndkBinder = ndk::SpAIBinder(AIBinder_new(kNothingClass, nullptr)); auto binder = AIBinder_toPlatformBinder(ndkBinder.get()); doTransactFuzz<::android::Parcel>("binder_ndk", binder, std::move(provider)); }, [](FuzzedDataProvider&& provider) { doReadFuzz<::android::hardware::Parcel>("hwbinder", HWBINDER_PARCEL_READ_FUNCTIONS, std::move(provider)); }, [](FuzzedDataProvider&& provider) { doReadFuzz<::android::Parcel>("binder", BINDER_PARCEL_READ_FUNCTIONS, std::move(provider)); }, [](FuzzedDataProvider&& provider) { doReadFuzz("binder_ndk", BINDER_NDK_PARCEL_READ_FUNCTIONS, std::move(provider)); }, }; provider.PickValueInArray(fuzzBackend)(std::move(provider)); return 0; }