blob: f5e3af51e36c4ceef0992e2eaf4f8f650adb57e7 [file] [log] [blame]
/*
* Copyright (C) 2020 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <binder/MemoryDealer.h>
#include <commonFuzzHelpers.h>
#include <fuzzer/FuzzedDataProvider.h>
#include <string>
#include <unordered_set>
namespace android {
static constexpr size_t kMaxBufferSize = 10000;
static constexpr size_t kMaxDealerSize = 1024 * 512;
static constexpr size_t kMaxAllocSize = 1024;
// Fuzzer entry point.
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
if (size > kMaxBufferSize) {
return 0;
}
FuzzedDataProvider fdp(data, size);
size_t dSize = fdp.ConsumeIntegralInRange<size_t>(0, kMaxDealerSize);
std::string name = fdp.ConsumeRandomLengthString(fdp.remaining_bytes());
uint32_t flags = fdp.ConsumeIntegral<uint32_t>();
sp<MemoryDealer> dealer = new MemoryDealer(dSize, name.c_str(), flags);
// This is used to track offsets that have been freed already to avoid an expected fatal log.
std::unordered_set<size_t> free_list;
while (fdp.remaining_bytes() > 0) {
fdp.PickValueInArray<std::function<void()>>({
[&]() -> void { dealer->getAllocationAlignment(); },
[&]() -> void { dealer->getMemoryHeap(); },
[&]() -> void {
std::string randString = fdp.ConsumeRandomLengthString(fdp.remaining_bytes());
dealer->dump(randString.c_str());
},
[&]() -> void {
size_t allocSize = fdp.ConsumeIntegralInRange<size_t>(0, kMaxAllocSize);
sp<IMemory> allocated = dealer->allocate(allocSize);
// If the allocation was successful, try to write to it
if (allocated != nullptr && allocated->unsecurePointer() != nullptr) {
memset(allocated->unsecurePointer(), 1, allocated->size());
// Clear the address from freelist since it has been allocated over again.
free_list.erase(allocated->offset());
}
},
})();
}
return 0;
}
} // namespace android