1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121
|
/*
* Copyright (C) 2022 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <fuzzbinder/libbinder_driver.h>
#include <fuzzbinder/random_parcel.h>
#include <android-base/logging.h>
#include <binder/IPCThreadState.h>
#include <binder/ProcessState.h>
#include <private/android_filesystem_config.h>
using android::binder::unique_fd;
namespace android {
void fuzzService(const sp<IBinder>& binder, FuzzedDataProvider&& provider) {
fuzzService(std::vector<sp<IBinder>>{binder}, std::move(provider));
}
void fuzzService(const std::vector<sp<IBinder>>& binders, FuzzedDataProvider&& provider) {
RandomParcelOptions options{
.extraBinders = binders,
.extraFds = {},
};
// Reserved bytes so that we don't have to change fuzzers and seed corpus if
// we introduce anything new in fuzzService.
std::vector<uint8_t> reservedBytes = provider.ConsumeBytes<uint8_t>(8);
(void)reservedBytes;
// always refresh the calling identity, because we sometimes set it below, but also,
// the code we're fuzzing might reset it
IPCThreadState::self()->clearCallingIdentity();
// Always take so that a perturbation of just the one ConsumeBool byte will always
// take the same path, but with a different UID. Without this, the fuzzer needs to
// guess both the change in value and the shift at the same time.
int64_t maybeSetUid = provider.PickValueInArray<int64_t>(
{static_cast<int64_t>(AID_ROOT) << 32, static_cast<int64_t>(AID_SYSTEM) << 32,
provider.ConsumeIntegralInRange<int64_t>(static_cast<int64_t>(AID_ROOT) << 32,
static_cast<int64_t>(AID_USER) << 32),
provider.ConsumeIntegral<int64_t>()});
if (provider.ConsumeBool()) {
// set calling uid
IPCThreadState::self()->restoreCallingIdentity(maybeSetUid);
}
while (provider.remaining_bytes() > 0) {
// Most of the AIDL services will have small set of transaction codes.
// TODO(b/295942369) : Add remaining transact codes from IBinder.h
uint32_t code = provider.ConsumeBool() ? provider.ConsumeIntegral<uint32_t>()
: provider.ConsumeBool()
? provider.ConsumeIntegralInRange<uint32_t>(0, 100)
: provider.PickValueInArray<uint32_t>(
{IBinder::DUMP_TRANSACTION, IBinder::PING_TRANSACTION,
IBinder::SHELL_COMMAND_TRANSACTION, IBinder::INTERFACE_TRANSACTION,
IBinder::SYSPROPS_TRANSACTION, IBinder::EXTENSION_TRANSACTION,
IBinder::TWEET_TRANSACTION, IBinder::LIKE_TRANSACTION});
uint32_t flags = provider.ConsumeIntegral<uint32_t>();
Parcel data;
// for increased fuzz coverage
data.setEnforceNoDataAvail(false);
data.setServiceFuzzing();
sp<IBinder> target = options.extraBinders.at(
provider.ConsumeIntegralInRange<size_t>(0, options.extraBinders.size() - 1));
options.writeHeader = [&target](Parcel* p, FuzzedDataProvider& provider) {
// most code will be behind checks that the head of the Parcel
// is exactly this, so make it easier for fuzzers to reach this
if (provider.ConsumeBool()) {
p->writeInterfaceToken(target->getInterfaceDescriptor());
}
};
std::vector<uint8_t> subData = provider.ConsumeBytes<uint8_t>(
provider.ConsumeIntegralInRange<size_t>(0, provider.remaining_bytes()));
fillRandomParcel(&data, FuzzedDataProvider(subData.data(), subData.size()), &options);
Parcel reply;
// for increased fuzz coverage
reply.setEnforceNoDataAvail(false);
reply.setServiceFuzzing();
(void)target->transact(code, data, &reply, flags);
// feed back in binders and fds that are returned from the service, so that
// we can fuzz those binders, and use the fds and binders to feed back into
// the binders
auto retBinders = reply.debugReadAllStrongBinders();
options.extraBinders.insert(options.extraBinders.end(), retBinders.begin(),
retBinders.end());
auto retFds = reply.debugReadAllFileDescriptors();
for (size_t i = 0; i < retFds.size(); i++) {
options.extraFds.push_back(unique_fd(dup(retFds[i])));
}
}
// invariants
auto ps = ProcessState::selfOrNull();
if (ps) {
CHECK_EQ(0, ps->getThreadPoolMaxTotalThreadCount())
<< "Binder threadpool should not be started by fuzzer because coverage can only "
"cover in-process calls.";
}
}
} // namespace android
|