diff options
author | Dylan Katz <dylan.katz@leviathansecurity.com> | 2020-07-02 11:51:44 -0700 |
---|---|---|
committer | Dylan Katz <dylan.katz@leviathansecurity.com> | 2020-08-07 15:36:39 -0700 |
commit | 7168f2726eccdc00210ba59563a4ed3b821cca9d (patch) | |
tree | 9c034a8d80f52039582a5cc1a06d5e2fe511e0c5 /libutils/CallStack_fuzz.cpp | |
parent | c8e4154d899847a32f0fb7bbf999c39c7cb0dba7 (diff) |
Add second batch of fuzzers for libutils
This adds fuzzers for:
- CallStack
- Looper
- LruCache
- Printer
- ProcessCallStack
- PropertyMap
- RWLock
- RefBase
- StopWatch.
Test: Ran each fuzzer for 10 minutes. Rough coverage est. (likely far below actual value): 10.97%
Signed-off-by: Dylan Katz <dylan.katz@leviathansecurity.com>
Change-Id: I2f9f35c18b13338c282fb7f9c3ea4099ecb2c56f
Diffstat (limited to 'libutils/CallStack_fuzz.cpp')
-rw-r--r-- | libutils/CallStack_fuzz.cpp | 50 |
1 files changed, 50 insertions, 0 deletions
diff --git a/libutils/CallStack_fuzz.cpp b/libutils/CallStack_fuzz.cpp new file mode 100644 index 000000000..e89b5b7ca --- /dev/null +++ b/libutils/CallStack_fuzz.cpp @@ -0,0 +1,50 @@ +/* + * Copyright 2020 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include <memory.h> + +#include "fuzzer/FuzzedDataProvider.h" +#include "utils/CallStack.h" + +static constexpr int MAX_STRING_SIZE = 500; +static constexpr int MAX_IGNORE_DEPTH = 200; + +extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { + FuzzedDataProvider dataProvider(data, size); + size_t ignoreDepth = dataProvider.ConsumeIntegralInRange<size_t>(0, MAX_IGNORE_DEPTH); + int logPriority = dataProvider.ConsumeIntegral<int>(); + pid_t tid = dataProvider.ConsumeIntegral<pid_t>(); + std::string logTag = dataProvider.ConsumeRandomLengthString(MAX_STRING_SIZE); + std::string prefix = dataProvider.ConsumeRandomLengthString(MAX_STRING_SIZE); + + const char* logTagChars = logTag.c_str(); + const char* prefixChars = prefix.c_str(); + + android::CallStack::CallStackUPtr callStack = android::CallStack::getCurrent(ignoreDepth); + android::CallStack* callstackPtr = callStack.get(); + android::CallStack::logStack(logTagChars, callstackPtr, + static_cast<android_LogPriority>(logPriority)); + android::CallStack::stackToString(prefixChars); + + callstackPtr->log(logTagChars, static_cast<android_LogPriority>(logPriority), prefixChars); + callstackPtr->clear(); + callstackPtr->getCurrent(ignoreDepth); + callstackPtr->log(logTagChars, static_cast<android_LogPriority>(logPriority), prefixChars); + callstackPtr->update(ignoreDepth, tid); + callstackPtr->log(logTagChars, static_cast<android_LogPriority>(logPriority), prefixChars); + + return 0; +} |