• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2022 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "apprunningmanager_fuzzer.h"
17 
18 #include <cstddef>
19 #include <cstdint>
20 
21 #define private public
22 #include "app_running_manager.h"
23 #undef private
24 
25 #include "ability_record.h"
26 #include "parcel.h"
27 #include "securec.h"
28 
29 using namespace OHOS::AAFwk;
30 using namespace OHOS::AppExecFwk;
31 
32 namespace OHOS {
33 namespace {
34 constexpr size_t FOO_MAX_LEN = 1024;
35 constexpr size_t U32_AT_SIZE = 4;
36 constexpr uint8_t ENABLE = 2;
37 }
GetU32Data(const char * ptr)38 uint32_t GetU32Data(const char* ptr)
39 {
40     return (ptr[0] << 24) | (ptr[1] << 16) | (ptr[2] << 8) | ptr[3];
41 }
42 
GetFuzzAbilityToken()43 sptr<Token> GetFuzzAbilityToken()
44 {
45     sptr<Token> token = nullptr;
46 
47     AbilityRequest abilityRequest;
48     abilityRequest.appInfo.bundleName = "com.example.fuzzTest";
49     abilityRequest.abilityInfo.name = "MainAbility";
50     abilityRequest.abilityInfo.type = AbilityType::DATA;
51     std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest);
52     if (abilityRecord) {
53         token = abilityRecord->GetToken();
54     }
55 
56     return token;
57 }
58 
DoSomethingInterestingWithMyAPI(const char * data,size_t size)59 bool DoSomethingInterestingWithMyAPI(const char* data, size_t size)
60 {
61     AppRunningManager* apprunningmanager = new AppRunningManager();
62     if (!apprunningmanager) {
63         return false;
64     }
65     std::shared_ptr<ApplicationInfo> appInfo = std::make_shared<ApplicationInfo>();
66     std::string processName(data, size);
67     BundleInfo bundleInfo;
68     apprunningmanager->CreateAppRunningRecord(appInfo, processName, bundleInfo);
69 
70     std::string appName(data, size);
71     int uid = static_cast<int>(GetU32Data(data));
72     apprunningmanager->CheckAppRunningRecordIsExist(appName, processName, uid, bundleInfo);
73 
74     pid_t pid = static_cast<pid_t>(GetU32Data(data));
75     apprunningmanager->GetAppRunningRecordByPid(pid);
76 
77     sptr<IRemoteObject> abilityToken = GetFuzzAbilityToken();
78     apprunningmanager->GetAppRunningRecordByAbilityToken(abilityToken);
79 
80     std::string bundleName(data, size);
81     std::list<pid_t> pids;
82     apprunningmanager->ProcessExitByBundleName(bundleName, pids);
83 
84     int32_t userId = static_cast<int32_t>(GetU32Data(data));
85     apprunningmanager->GetPidsByUserId(userId, pids);
86 
87     apprunningmanager->ProcessExitByBundleNameAndUid(bundleName, uid, pids);
88     apprunningmanager->ProcessExitByPid(pid);
89 
90     wptr<IRemoteObject> remote = nullptr;
91     apprunningmanager->OnRemoteDied(remote);
92     apprunningmanager->GetAppRunningRecordMap();
93 
94     int32_t recordId = static_cast<int32_t>(GetU32Data(data));
95     apprunningmanager->RemoveAppRunningRecordById(recordId);
96     apprunningmanager->ClearAppRunningRecordMap();
97 
98     int64_t eventId = static_cast<int64_t>(GetU32Data(data));
99     apprunningmanager->HandleTerminateTimeOut(eventId);
100     apprunningmanager->GetTerminatingAppRunningRecord(abilityToken);
101     apprunningmanager->GetAbilityRunningRecord(eventId);
102     apprunningmanager->GetAppRunningRecord(eventId);
103 
104     sptr<IRemoteObject> token = nullptr;
105     apprunningmanager->HandleAbilityAttachTimeOut(token);
106     apprunningmanager->PrepareTerminate(token);
107 
108     std::shared_ptr<AppMgrServiceInner> appMgrServiceInner = nullptr;
109     bool clearMissionFlag = *data % ENABLE;
110     apprunningmanager->TerminateAbility(token, clearMissionFlag, appMgrServiceInner);
111 
112     RunningProcessInfo info;
113     apprunningmanager->GetRunningProcessInfoByToken(token, info);
114 
115     std::vector<AppStateData> list;
116     apprunningmanager->GetForegroundApplications(list);
117     apprunningmanager->HandleAddAbilityStageTimeOut(eventId);
118     apprunningmanager->HandleStartSpecifiedAbilityTimeOut(eventId);
119 
120     Configuration config;
121     apprunningmanager->UpdateConfiguration(config);
122 
123     int32_t level = static_cast<int32_t>(GetU32Data(data));
124     apprunningmanager->NotifyMemoryLevel(level);
125     apprunningmanager->GetAppRunningRecordByRenderPid(pid);
126     apprunningmanager->OnRemoteRenderDied(remote);
127     apprunningmanager->GetAppRunningStateByBundleName(bundleName);
128 
129     sptr<IQuickFixCallback> callback = nullptr;
130     apprunningmanager->NotifyLoadRepairPatch(bundleName, callback);
131     apprunningmanager->NotifyHotReloadPage(bundleName, callback);
132     apprunningmanager->NotifyUnLoadRepairPatch(bundleName, callback);
133 
134     std::shared_ptr<ApplicationInfo> infoPtr = std::make_shared<ApplicationInfo>();
135     AppRunningRecord apprunningrecord(infoPtr, recordId, processName);
136     apprunningmanager->IsApplicationFirstForeground(apprunningrecord);
137     apprunningmanager->IsApplicationBackground(bundleName);
138     apprunningmanager->IsApplicationFirstFocused(apprunningrecord);
139     apprunningmanager->IsApplicationUnfocused(bundleName);
140 
141     return apprunningmanager->IsApplicationUnfocused(bundleName);
142 }
143 }
144 
145 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)146 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
147 {
148     /* Run your code on data */
149     if (data == nullptr) {
150         std::cout << "invalid data" << std::endl;
151         return 0;
152     }
153 
154     /* Validate the length of size */
155     if (size > OHOS::FOO_MAX_LEN || size < OHOS::U32_AT_SIZE) {
156         return 0;
157     }
158 
159     char* ch = (char *)malloc(size + 1);
160     if (ch == nullptr) {
161         std::cout << "malloc failed." << std::endl;
162         return 0;
163     }
164 
165     (void)memset_s(ch, size + 1, 0x00, size + 1);
166     if (memcpy_s(ch, size, data, size) != EOK) {
167         std::cout << "copy failed." << std::endl;
168         free(ch);
169         ch = nullptr;
170         return 0;
171     }
172 
173     OHOS::DoSomethingInterestingWithMyAPI(ch, size);
174     free(ch);
175     ch = nullptr;
176     return 0;
177 }
178