blob: da09fc223b53d639f8edc37ec7a092065fc271bd [file] [log] [blame]
Tri Vo77e0ca02016-12-05 10:08:59 -08001/*
2 * Copyright 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Ji Won Shin81ce4462018-07-01 14:02:10 -070017#include "FuzzerInternal.h"
Tri Vo77e0ca02016-12-05 10:08:59 -080018#include "ProtoFuzzerMutator.h"
19
Tri Vo77e0ca02016-12-05 10:08:59 -080020#include "test/vts/proto/ComponentSpecificationMessage.pb.h"
21
Ji Won Shin81ce4462018-07-01 14:02:10 -070022#include <signal.h>
Tri Vo77e0ca02016-12-05 10:08:59 -080023#include <unistd.h>
24
Tri Voc8bfd0d2017-07-24 15:31:46 -070025#include <cstdlib>
Tri Vo77e0ca02016-12-05 10:08:59 -080026#include <iostream>
27#include <memory>
28#include <string>
29#include <vector>
30
Tri Vo77e0ca02016-12-05 10:08:59 -080031using std::cout;
32using std::endl;
33using std::make_unique;
Tri Vo826a2012017-01-05 12:21:25 -080034using std::string;
Tri Vo77e0ca02016-12-05 10:08:59 -080035using std::unique_ptr;
36using std::vector;
37
Ji Won Shin81ce4462018-07-01 14:02:10 -070038// Executed when fuzzer raises SIGABRT signal. This function calls
39// the signal handler from the libfuzzer library.
40extern "C" void sig_handler(int signo) {
41 if (signo == SIGABRT) {
42 cerr << "SIGABRT noticed, please refer to device logcat for the root cause."
43 << endl;
44 fuzzer::Fuzzer::StaticCrashSignalCallback();
45 exit(1);
46 }
47}
48
Tri Vo77e0ca02016-12-05 10:08:59 -080049namespace android {
50namespace vts {
Tri Vo70c1ab62017-03-15 09:19:10 -070051namespace fuzzer {
Tri Vo77e0ca02016-12-05 10:08:59 -080052
Tri Vo3eed1362019-11-26 10:12:20 -080053#ifdef STATIC_TARGET_FQ_NAME
54// Returns parameters used for static fuzzer executables.
55extern ProtoFuzzerParams ExtractProtoFuzzerStaticParams(int argc, char **argv);
56#endif
57
Tri Vo16eed232017-03-08 08:52:15 -080058// 64-bit random number generator.
Tri Vo624961d2017-07-24 10:30:41 -070059static unique_ptr<Random> random;
Tri Vo9f5fd852017-05-20 12:32:26 -070060// Parameters that were passed in to fuzzer.
Tri Vo16eed232017-03-08 08:52:15 -080061static ProtoFuzzerParams params;
Tri Vo16eed232017-03-08 08:52:15 -080062// Used to mutate inputs to hal driver.
Tri Vo77e0ca02016-12-05 10:08:59 -080063static unique_ptr<ProtoFuzzerMutator> mutator;
Tri Vo9f5fd852017-05-20 12:32:26 -070064// Used to exercise HIDL HAL's API.
65static unique_ptr<ProtoFuzzerRunner> runner;
Tri Vo77e0ca02016-12-05 10:08:59 -080066
Tri Vof4037d42017-03-31 17:28:25 -070067static ProtoFuzzerMutatorConfig mutator_config{
Tri Voced79542017-01-26 15:01:09 -080068 // Heuristic: values close to 0 are likely to be meaningful scalar input
69 // values.
70 [](Random &rand) {
71 size_t dice_roll = rand(10);
72 if (dice_roll < 3) {
73 // With probability of 30% return an integer in range [0, 10).
74 return rand(10);
75 } else if (dice_roll >= 3 && dice_roll < 6) {
76 // With probability of 30% return an integer in range [0, 100).
77 return rand(100);
78 } else if (dice_roll >= 6 && dice_roll < 9) {
79 // With probability of 30% return an integer in range [0, 100).
80 return rand(1000);
81 }
82 if (rand(10) == 0) {
83 // With probability of 1% return 0xffffffffffffffff.
84 return 0xffffffffffffffff;
85 }
86 // With probability 9% result is uniformly random.
87 return rand.Rand();
88 },
89 // Odds of an enum being treated like a scalar are 1:1000.
90 {1, 1000}};
91
Tri Voc8bfd0d2017-07-24 15:31:46 -070092// Executed when fuzzer process exits. We use this to print out useful
93// information about the state of the fuzzer.
94static void AtExit() {
95 // Print currently opened interfaces.
96 cerr << "Currently opened interfaces: " << endl;
97 for (const auto &iface_desc : runner->GetOpenedIfaces()) {
98 cerr << iface_desc.first << endl;
99 }
Tri Vof657d672017-07-26 16:13:02 -0700100 cerr << endl;
101 cerr << runner->GetStats().StatsString();
Tri Voc8bfd0d2017-07-24 15:31:46 -0700102}
103
Tri Vo77e0ca02016-12-05 10:08:59 -0800104extern "C" int LLVMFuzzerInitialize(int *argc, char ***argv) {
Tri Vo3eed1362019-11-26 10:12:20 -0800105#ifdef STATIC_TARGET_FQ_NAME
106 params = ExtractProtoFuzzerStaticParams(*argc, *argv);
107#else
Tri Vo16eed232017-03-08 08:52:15 -0800108 params = ExtractProtoFuzzerParams(*argc, *argv);
Tri Vo3eed1362019-11-26 10:12:20 -0800109#endif
110
Tri Vo624961d2017-07-24 10:30:41 -0700111 cerr << params.DebugString() << endl;
112
113 random = make_unique<Random>(params.seed_);
Tri Vo826a2012017-01-05 12:21:25 -0800114 mutator = make_unique<ProtoFuzzerMutator>(
Tri Vo624961d2017-07-24 10:30:41 -0700115 *random.get(), ExtractPredefinedTypes(params.comp_specs_),
116 mutator_config);
Tri Vo87cb3792019-11-25 15:32:32 -0800117 runner = make_unique<ProtoFuzzerRunner>(params.comp_specs_,
118 params.target_fq_name_.version());
Tri Vo9f5fd852017-05-20 12:32:26 -0700119
Tri Vo87cb3792019-11-25 15:32:32 -0800120 runner->Init(params.target_fq_name_.name(), params.binder_mode_);
Tri Voc8bfd0d2017-07-24 15:31:46 -0700121 // Register atexit handler after all static objects' initialization.
122 std::atexit(AtExit);
Ji Won Shin81ce4462018-07-01 14:02:10 -0700123 // Register signal handler for SIGABRT.
124 signal(SIGABRT, sig_handler);
125
Tri Vo77e0ca02016-12-05 10:08:59 -0800126 return 0;
127}
128
129extern "C" size_t LLVMFuzzerCustomMutator(uint8_t *data, size_t size,
130 size_t max_size, unsigned int seed) {
Tri Vo9f5fd852017-05-20 12:32:26 -0700131 ExecSpec exec_spec{};
Tri Vod0229fb2017-08-10 17:27:49 -0700132 // An Execution is randomly generated if:
133 // 1. It can't be serialized from the given buffer OR
134 // 2. The runner has opened interfaces that have not been touched.
135 // Otherwise, the Execution is mutated.
Ji Won Shin6738e6e2018-07-19 11:39:23 -0700136 if (!FromArray(data, size, &exec_spec) || runner->UntouchedIfaces()) {
137 exec_spec =
138 mutator->RandomGen(runner->GetOpenedIfaces(), params.exec_size_);
139 } else {
140 mutator->Mutate(runner->GetOpenedIfaces(), &exec_spec);
141 }
Ji Won Shinbee71612018-07-02 22:48:19 -0700142
Ji Won Shina77c4ab2018-07-26 21:50:31 -0700143 if (static_cast<size_t>(exec_spec.ByteSize()) > max_size) {
Ji Won Shinbee71612018-07-02 22:48:19 -0700144 cerr << "execution specification message exceeded maximum size." << endl;
Ji Won Shin6738e6e2018-07-19 11:39:23 -0700145 cerr << max_size << endl;
Ji Won Shina77c4ab2018-07-26 21:50:31 -0700146 cerr << static_cast<size_t>(exec_spec.ByteSize()) << endl;
Ji Won Shinbee71612018-07-02 22:48:19 -0700147 std::abort();
Tri Vo77e0ca02016-12-05 10:08:59 -0800148 }
Ji Won Shina77c4ab2018-07-26 21:50:31 -0700149 return ToArray(data, max_size, &exec_spec);
Tri Vo77e0ca02016-12-05 10:08:59 -0800150}
151
Ji Won Shina77c4ab2018-07-26 21:50:31 -0700152extern "C" size_t LLVMFuzzerCustomCrossOver(const uint8_t *data1, size_t size1,
153 const uint8_t *data2, size_t size2,
154 uint8_t *out, size_t max_out_size,
155 unsigned int seed) {
156 ExecSpec exec_spec1{};
Tri Vo07664de2020-01-08 10:45:35 -0800157 if (!FromArray(data1, size1, &exec_spec1)) {
158 cerr << "Message 1 was invalid." << endl;
159 exec_spec1 =
160 mutator->RandomGen(runner->GetOpenedIfaces(), params.exec_size_);
161 }
Ji Won Shina77c4ab2018-07-26 21:50:31 -0700162
163 ExecSpec exec_spec2{};
Tri Vo07664de2020-01-08 10:45:35 -0800164 if (!FromArray(data2, size2, &exec_spec2)) {
165 cerr << "Message 2 was invalid." << endl;
166 exec_spec2 =
167 mutator->RandomGen(runner->GetOpenedIfaces(), params.exec_size_);
Ji Won Shina77c4ab2018-07-26 21:50:31 -0700168 }
169
170 ExecSpec exec_spec_out{};
171 for (int i = 0; i < static_cast<int>(params.exec_size_); i++) {
172 FuncCall temp;
173 int dice = rand() % 2;
174 if (dice == 0) {
175 temp = exec_spec1.function_call(i);
176 } else {
177 temp = exec_spec2.function_call(i);
178 }
179 exec_spec_out.add_function_call()->CopyFrom(temp);
180 }
181
182 if (static_cast<size_t>(exec_spec_out.ByteSize()) > max_out_size) {
183 cerr << "execution specification message exceeded maximum size." << endl;
184 cerr << max_out_size << endl;
185 cerr << static_cast<size_t>(exec_spec_out.ByteSize()) << endl;
186 std::abort();
187 }
188 return ToArray(out, max_out_size, &exec_spec_out);
Tri Vo77e0ca02016-12-05 10:08:59 -0800189}
190
191extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
Tri Vodfe95ea2017-06-07 17:52:10 -0700192 ExecSpec exec_spec{};
193 if (!FromArray(data, size, &exec_spec)) {
194 cerr << "Failed to deserialize an ExecSpec." << endl;
Tri Vo07664de2020-01-08 10:45:35 -0800195 // Don't generate an ExecSpec here so that libFuzzer knows that the provided
196 // buffer doesn't provide any coverage.
Tri Vo77e0ca02016-12-05 10:08:59 -0800197 return 0;
198 }
Tri Vo9f5fd852017-05-20 12:32:26 -0700199 runner->Execute(exec_spec);
Tri Vo77e0ca02016-12-05 10:08:59 -0800200 return 0;
201}
202
Tri Vo70c1ab62017-03-15 09:19:10 -0700203} // namespace fuzzer
Tri Vo77e0ca02016-12-05 10:08:59 -0800204} // namespace vts
205} // namespace android