• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "abilitymgrdisposedruleinterceptor_fuzzer.h"
17 
18 #include <cstddef>
19 #include <cstdint>
20 
21 #include "ability_record.h"
22 #include "securec.h"
23 
24 #define private public
25 #include "disposed_rule_interceptor.h"
26 #undef private
27 
28 using namespace OHOS::AAFwk;
29 using namespace OHOS::AppExecFwk;
30 
31 #define DISABLE_FUZZ
32 namespace OHOS {
33 namespace {
34 constexpr int INPUT_ZERO = 0;
35 constexpr int INPUT_ONE = 1;
36 constexpr int INPUT_TWO = 2;
37 constexpr int INPUT_THREE = 3;
38 constexpr size_t U32_AT_SIZE = 4;
39 constexpr size_t OFFSET_ZERO = 24;
40 constexpr size_t OFFSET_ONE = 16;
41 constexpr size_t OFFSET_TWO = 8;
42 constexpr uint8_t ENABLE = 2;
43 }
44 
GetU32Data(const char * ptr)45 uint32_t GetU32Data(const char* ptr)
46 {
47     // convert fuzz input data to an integer
48     return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[INPUT_TWO] << OFFSET_TWO) |
49         ptr[INPUT_THREE];
50 }
51 
GetFuzzAbilityToken()52 sptr<Token> GetFuzzAbilityToken()
53 {
54     sptr<Token> token = nullptr;
55     AbilityRequest abilityRequest;
56     abilityRequest.appInfo.bundleName = "com.example.fuzzTest";
57     abilityRequest.abilityInfo.name = "MainAbility";
58     abilityRequest.abilityInfo.type = AbilityType::DATA;
59     std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest);
60     if (abilityRecord) {
61         token = abilityRecord->GetToken();
62     }
63     return token;
64 }
65 
DoSomethingInterestingWithMyAPI(const char * data,size_t size)66 bool DoSomethingInterestingWithMyAPI(const char* data, size_t size)
67 {
68     std::shared_ptr<DisposedRuleInterceptor> executer = std::make_shared<DisposedRuleInterceptor>();
69     Want want;
70     AppExecFwk::DisposedRule disposedRule;
71     std::string stringParam(data, size);
72     int requestCode = static_cast<int>(GetU32Data(data));
73     int32_t userId = static_cast<int32_t>(GetU32Data(data));
74     bool isWithUI = *data % ENABLE;
75     sptr<IRemoteObject> token = GetFuzzAbilityToken();
76     auto shouldBlockFunc = []() { return false; };
77     AbilityInterceptorParam param = AbilityInterceptorParam(want, requestCode, userId, isWithUI, token,
78         shouldBlockFunc);
79     const std::shared_ptr<AppExecFwk::AbilityInfo> abilityInfo;
80     int32_t bundleType = static_cast<int32_t>(GetU32Data(data));
81 
82     executer-> DoProcess(param);
83     executer-> CheckControl(want, userId, disposedRule, 0);
84     executer-> CheckDisposedRule(want, disposedRule);
85     executer-> StartNonBlockRule(want, disposedRule);
86     executer-> GetAppMgr();
87     executer-> UnregisterObserver(stringParam);
88     executer-> CreateModalUIExtension(want, token);
89     executer-> SetInterceptInfo(want, disposedRule);
90 
91     return true;
92 }
93 }
94 
95 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)96 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
97 {
98     /* Run your code on data */
99     if (data == nullptr) {
100         return 0;
101     }
102 
103     /* Validate the length of size */
104     if (size < OHOS::U32_AT_SIZE) {
105         return 0;
106     }
107 
108     char* ch = static_cast<char*>(malloc(size + 1));
109     if (ch == nullptr) {
110         std::cout << "malloc failed." << std::endl;
111         return 0;
112     }
113 
114     (void)memset_s(ch, size + 1, 0x00, size + 1);
115     if (memcpy_s(ch, size + 1, data, size) != EOK) {
116         std::cout << "copy failed." << std::endl;
117         free(ch);
118         ch = nullptr;
119         return 0;
120     }
121 
122 #ifndef DISABLE_FUZZ
123     OHOS::DoSomethingInterestingWithMyAPI(ch, size);
124 #endif
125     free(ch);
126     ch = nullptr;
127     return 0;
128 }
129 
130