1/* 2 * Copyright (c) 2024 Huawei Device Co., Ltd. 3 * Licensed under the Apache License, Version 2.0 (the "License"); 4 * you may not use this file except in compliance with the License. 5 * You may obtain a copy of the License at 6 * 7 * http://www.apache.org/licenses/LICENSE-2.0 8 * 9 * Unless required by applicable law or agreed to in writing, software 10 * distributed under the License is distributed on an "AS IS" BASIS, 11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 * See the License for the specific language governing permissions and 13 * limitations under the License. 14 */ 15 16#include "abilityautostartupserviceb_fuzzer.h" 17 18#include <cstddef> 19#include <cstdint> 20 21#define private public 22#define protected public 23#include "ability_auto_startup_service.h" 24#undef protected 25#undef private 26 27#include "ability_record.h" 28#include "auto_startup_callback_proxy.h" 29 30using namespace OHOS::AAFwk; 31using namespace OHOS::AppExecFwk; 32using namespace OHOS::AbilityRuntime; 33 34namespace OHOS { 35namespace { 36constexpr int INPUT_ZERO = 0; 37constexpr int INPUT_ONE = 1; 38constexpr int INPUT_THREE = 3; 39constexpr size_t FOO_MAX_LEN = 1024; 40constexpr size_t U32_AT_SIZE = 4; 41constexpr uint8_t ENABLE = 2; 42constexpr size_t OFFSET_ZERO = 24; 43constexpr size_t OFFSET_ONE = 16; 44constexpr size_t OFFSET_TWO = 8; 45} 46 47uint32_t GetU32Data(const char* ptr) 48{ 49 // convert fuzz input data to an integer 50 return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[ENABLE] << OFFSET_TWO) | 51 ptr[INPUT_THREE]; 52} 53 54sptr<Token> GetFuzzAbilityToken() 55{ 56 sptr<Token> token = nullptr; 57 AbilityRequest abilityRequest; 58 abilityRequest.appInfo.bundleName = "com.example.fuzzTest"; 59 abilityRequest.abilityInfo.name = "MainAbility"; 60 abilityRequest.abilityInfo.type = AbilityType::DATA; 61 std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest); 62 if (abilityRecord) { 63 token = abilityRecord->GetToken(); 64 } 65 return token; 66} 67 68void AbilityStartupServiceFuzztest1(bool boolParam, std::string &stringParam, int32_t int32Param) 69{ 70 std::shared_ptr<AbilityAutoStartupService> service = std::make_shared<AbilityAutoStartupService>(); 71 service->SetDeathRecipient(nullptr, nullptr); 72 sptr<Token> token1 = GetFuzzAbilityToken(); 73 service->SetDeathRecipient(token1, nullptr); // add deathrecipient 74 sptr<IRemoteObject::DeathRecipient> client = 75 new (std::nothrow) AbilityAutoStartupService::ClientDeathRecipient(std::weak_ptr(service)); 76 service->SetDeathRecipient(token1, client); // add deathrecipient 77 service->SetDeathRecipient(token1, client); // duplicate add deathrecipient 78 sptr<Token> token2 = GetFuzzAbilityToken(); 79 service->RegisterAutoStartupSystemCallback(token1); 80 service->CleanResource(nullptr); // branch nullptr token 81 service->CleanResource(token1); // branch clean exists token 82 service->CleanResource(token2); // branch clean not exists token 83 84 client->OnRemoteDied(nullptr); // branch 85 client->OnRemoteDied(token1); // branch 86 87 service->GetSelfApplicationBundleName(); 88 service->CheckSelfApplication(stringParam); 89 AppExecFwk::BundleInfo bundleInfo; 90 service->GetBundleInfo(stringParam, bundleInfo, int32Param, int32Param, int32Param); // branch 91 AutoStartupInfo info; 92 service->GetAbilityData(info, boolParam, stringParam, stringParam, int32Param); // branch 93 AppExecFwk::AbilityInfo abilityInfo; 94 service->GetAbilityTypeName(abilityInfo); // branch 95 abilityInfo.type == AppExecFwk::AbilityType::PAGE; 96 service->GetAbilityTypeName(abilityInfo); // branch 97 AppExecFwk::ExtensionAbilityInfo extensionInfo; 98 service->GetExtensionTypeName(extensionInfo); 99 extensionInfo.type == AppExecFwk::ExtensionAbilityType::SERVICE; 100 service->GetExtensionTypeName(extensionInfo); 101 service->GetBundleMgrClient(); 102 service->CheckPermissionForSystem(); 103 service->CheckPermissionForSelf(stringParam); 104 service->GetAbilityInfo(info, stringParam, stringParam, int32Param); 105 service->SetApplicationAutoStartupByEDM(info, boolParam); 106 service->CancelApplicationAutoStartupByEDM(info, boolParam); 107 service->InnerApplicationAutoStartupByEDM(info, boolParam, boolParam); 108 service->CheckPermissionForEDM(); 109} 110 111bool DoSomethingInterestingWithMyAPI(const char* data, size_t size) 112{ 113 bool boolParam = *data % ENABLE; 114 std::string stringParam(data, size); 115 int32_t int32Param = static_cast<int32_t>(GetU32Data(data)); 116 AbilityStartupServiceFuzztest1(boolParam, stringParam, int32Param); 117 return true; 118} 119} 120 121/* Fuzzer entry point */ 122extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) 123{ 124 /* Run your code on data */ 125 if (data == nullptr) { 126 return 0; 127 } 128 129 /* Validate the length of size */ 130 if (size < OHOS::U32_AT_SIZE || size > OHOS::FOO_MAX_LEN) { 131 return 0; 132 } 133 134 char* ch = (char*)malloc(size + 1); 135 if (ch == nullptr) { 136 std::cout << "malloc failed." << std::endl; 137 return 0; 138 } 139 140 (void)memset_s(ch, size + 1, 0x00, size + 1); 141 if (memcpy_s(ch, size, data, size) != EOK) { 142 std::cout << "copy failed." << std::endl; 143 free(ch); 144 ch = nullptr; 145 return 0; 146 } 147 148 OHOS::DoSomethingInterestingWithMyAPI(ch, size); 149 free(ch); 150 ch = nullptr; 151 return 0; 152} 153 154