1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
base / apple / mach_port_rendezvous_fuzzer.cc [blame]
// Copyright 2019 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/apple/mach_port_rendezvous.h"
#include "base/apple/mach_logging.h"
#include "base/logging.h"
#include "base/synchronization/lock.h"
#include "testing/libfuzzer/fuzzers/mach/mach_message_converter.h"
#include "testing/libfuzzer/proto/lpm_interface.h"
namespace base {
struct MachPortRendezvousFuzzer {
MachPortRendezvousFuzzer() {
logging::SetMinLogLevel(logging::LOGGING_FATAL);
mach_port_t port =
base::MachPortRendezvousServerMac::GetInstance()->server_port_.get();
kern_return_t kr = mach_port_insert_right(mach_task_self(), port, port,
MACH_MSG_TYPE_MAKE_SEND);
MACH_CHECK(kr == KERN_SUCCESS, kr) << "mach_port_insert_right";
server_send_right.reset(port);
}
void ClearClientData() EXCLUSIVE_LOCKS_REQUIRED(
base::MachPortRendezvousServerMac::GetInstance()->GetLock()) {
base::MachPortRendezvousServerMac::GetInstance()
->ClearClientDataForTesting();
}
base::apple::ScopedMachSendRight server_send_right;
};
} // namespace base
DEFINE_BINARY_PROTO_FUZZER(const mach_fuzzer::MachMessage& message) {
static base::MachPortRendezvousFuzzer environment;
{
base::AutoLock lock(
base::MachPortRendezvousServerMac::GetInstance()->GetLock());
environment.ClearClientData();
base::MachPortRendezvousServerMac::GetInstance()->RegisterPortsForPid(
getpid(), {std::make_pair(0xbadbeef, base::MachRendezvousPort{
mach_task_self(),
MACH_MSG_TYPE_COPY_SEND})});
}
SendMessage(environment.server_send_right.get(), message);
}