/* * Copyright (C) 2019 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define FUZZ_LOG_TAG "main" #include "binder.h" #include "binder_ndk.h" #include "hwbinder.h" #include "util.h" #include #include #include #include #include #include #include #include #include #include #include using android::fillRandomParcel; using android::RandomParcelOptions; using android::sp; using android::base::HexString; void fillRandomParcel(::android::hardware::Parcel* p, FuzzedDataProvider&& provider, RandomParcelOptions* options) { // TODO: functionality to create random parcels for libhwbinder parcels (void)options; std::vector input = provider.ConsumeRemainingBytes(); p->setData(input.data(), input.size()); } static void fillRandomParcel(NdkParcelAdapter* p, FuzzedDataProvider&& provider, RandomParcelOptions* options) { // fill underlying parcel using functions to fill random libbinder parcel fillRandomParcel(p->parcel(), std::move(provider), options); } template void doTransactFuzz(const char* backend, const sp& binder, FuzzedDataProvider&& provider) { uint32_t code = provider.ConsumeIntegral(); uint32_t flag = provider.ConsumeIntegral(); FUZZ_LOG() << "backend: " << backend; RandomParcelOptions options; P reply; P data; fillRandomParcel(&data, std::move(provider), &options); (void)binder->transact(code, data, &reply, flag); } template void doReadFuzz(const char* backend, const std::vector>& reads, FuzzedDataProvider&& provider) { // Allow some majority of the bytes to be dedicated to telling us what to // do. The fixed value added here represents that we want to test doing a // lot of 'instructions' even on really short parcels. size_t maxInstructions = 20 + (provider.remaining_bytes() * 2 / 3); // but don't always use that many instructions. We want to allow the fuzzer // to explore large parcels with few instructions if it wants to. std::vector instructions = provider.ConsumeBytes( provider.ConsumeIntegralInRange(0, maxInstructions)); RandomParcelOptions options; P p; fillRandomParcel(&p, std::move(provider), &options); // since we are only using a byte to index CHECK(reads.size() <= 255) << reads.size(); FUZZ_LOG() << "backend: " << backend; FUZZ_LOG() << "input: " << HexString(p.data(), p.dataSize()); FUZZ_LOG() << "instructions: " << HexString(instructions.data(), instructions.size()); FuzzedDataProvider instructionsProvider(instructions.data(), instructions.size()); while (instructionsProvider.remaining_bytes() > 0) { uint8_t idx = instructionsProvider.ConsumeIntegralInRange(0, reads.size() - 1); FUZZ_LOG() << "Instruction " << idx << " avail: " << p.dataAvail() << " pos: " << p.dataPosition() << " cap: " << p.dataCapacity(); reads[idx](p, instructionsProvider); } } // Append two random parcels. template void doAppendFuzz(const char* backend, FuzzedDataProvider&& provider) { int32_t start = provider.ConsumeIntegral(); int32_t len = provider.ConsumeIntegral(); std::vector bytes = provider.ConsumeBytes( provider.ConsumeIntegralInRange(0, provider.remaining_bytes())); // same options so that FDs and binders could be shared in both Parcels RandomParcelOptions options; P p0, p1; fillRandomParcel(&p0, FuzzedDataProvider(bytes.data(), bytes.size()), &options); fillRandomParcel(&p1, std::move(provider), &options); FUZZ_LOG() << "backend: " << backend; FUZZ_LOG() << "start: " << start << " len: " << len; p0.appendFrom(&p1, start, len); } void* NothingClass_onCreate(void* args) { return args; } void NothingClass_onDestroy(void* /*userData*/) {} binder_status_t NothingClass_onTransact(AIBinder*, transaction_code_t, const AParcel*, AParcel*) { return STATUS_UNKNOWN_ERROR; } static AIBinder_Class* kNothingClass = AIBinder_Class_define("nothing", NothingClass_onCreate, NothingClass_onDestroy, NothingClass_onTransact); extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { if (size <= 1) return 0; // no use // avoid timeouts, see b/142617274, b/142473153 if (size > 50000) return 0; FuzzedDataProvider provider = FuzzedDataProvider(data, size); const std::function fuzzBackend[] = { [](FuzzedDataProvider&& provider) { doTransactFuzz< ::android::hardware::Parcel>("hwbinder", sp<::android::hardware::BHwBinder>::make(), std::move(provider)); }, [](FuzzedDataProvider&& provider) { doTransactFuzz<::android::Parcel>("binder", sp<::android::BBinder>::make(), std::move(provider)); }, [](FuzzedDataProvider&& provider) { // fuzz from the libbinder layer since it's a superset of the // interface you get at the libbinder_ndk layer auto ndkBinder = ndk::SpAIBinder(AIBinder_new(kNothingClass, nullptr)); auto binder = AIBinder_toPlatformBinder(ndkBinder.get()); doTransactFuzz<::android::Parcel>("binder_ndk", binder, std::move(provider)); }, [](FuzzedDataProvider&& provider) { doReadFuzz<::android::hardware::Parcel>("hwbinder", HWBINDER_PARCEL_READ_FUNCTIONS, std::move(provider)); }, [](FuzzedDataProvider&& provider) { doReadFuzz<::android::Parcel>("binder", BINDER_PARCEL_READ_FUNCTIONS, std::move(provider)); }, [](FuzzedDataProvider&& provider) { doReadFuzz("binder_ndk", BINDER_NDK_PARCEL_READ_FUNCTIONS, std::move(provider)); }, [](FuzzedDataProvider&& provider) { doAppendFuzz<::android::Parcel>("binder", std::move(provider)); }, [](FuzzedDataProvider&& provider) { doAppendFuzz("binder_ndk", std::move(provider)); }, }; provider.PickValueInArray(fuzzBackend)(std::move(provider)); return 0; }