/* * Copyright (C) 2020 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include namespace android { static constexpr size_t kMaxBufferSize = 10000; static constexpr size_t kMaxDealerSize = 1024 * 512; static constexpr size_t kMaxAllocSize = 1024; // Fuzzer entry point. extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { if (size > kMaxBufferSize) { return 0; } FuzzedDataProvider fdp(data, size); size_t dSize = fdp.ConsumeIntegralInRange(0, kMaxDealerSize); std::string name = fdp.ConsumeRandomLengthString(fdp.remaining_bytes()); uint32_t flags = fdp.ConsumeIntegral(); sp dealer = new MemoryDealer(dSize, name.c_str(), flags); // This is used to track offsets that have been freed already to avoid an expected fatal log. std::unordered_set free_list; while (fdp.remaining_bytes() > 0) { fdp.PickValueInArray>({ [&]() -> void { dealer->getAllocationAlignment(); }, [&]() -> void { dealer->getMemoryHeap(); }, [&]() -> void { size_t offset = fdp.ConsumeIntegral(); // Offset has already been freed, so return instead. if (free_list.find(offset) != free_list.end()) return; dealer->deallocate(offset); free_list.insert(offset); }, [&]() -> void { std::string randString = fdp.ConsumeRandomLengthString(fdp.remaining_bytes()); dealer->dump(randString.c_str()); }, [&]() -> void { size_t allocSize = fdp.ConsumeIntegralInRange(0, kMaxAllocSize); sp allocated = dealer->allocate(allocSize); // If the allocation was successful, try to write to it if (allocated != nullptr && allocated->unsecurePointer() != nullptr) { memset(allocated->unsecurePointer(), 1, allocated->size()); // Clear the address from freelist since it has been allocated over again. free_list.erase(allocated->offset()); } }, })(); } return 0; } } // namespace android