1/* 2 * Copyright (c) 2024 Huawei Device Co., Ltd. 3 * Licensed under the Apache License, Version 2.0 (the "License"); 4 * you may not use this file except in compliance with the License. 5 * You may obtain a copy of the License at 6 * 7 * http://www.apache.org/licenses/LICENSE-2.0 8 * 9 * Unless required by applicable law or agreed to in writing, software 10 * distributed under the License is distributed on an "AS IS" BASIS, 11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 * See the License for the specific language governing permissions and 13 * limitations under the License. 14 */ 15 16#include "abilitydebugdeal_fuzzer.h" 17 18#include <cstddef> 19#include <cstdint> 20 21#define private public 22#include "ability_debug_deal.h" 23#undef private 24#include "ability_record.h" 25#include "ability_debug_response_stub.h" 26#include "securec.h" 27 28using namespace OHOS::AAFwk; 29using namespace OHOS::AppExecFwk; 30 31namespace OHOS { 32namespace { 33constexpr int INPUT_ZERO = 0; 34constexpr int INPUT_ONE = 1; 35constexpr int INPUT_THREE = 3; 36constexpr size_t FOO_MAX_LEN = 1024; 37constexpr uint8_t ENABLE = 2; 38constexpr size_t U32_AT_SIZE = 4; 39constexpr size_t OFFSET_ZERO = 24; 40constexpr size_t OFFSET_ONE = 16; 41constexpr size_t OFFSET_TWO = 8; 42} 43 44uint32_t GetU32Data(const char* ptr) 45{ 46 // convert fuzz input data to an integer 47 return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[ENABLE] << OFFSET_TWO) | 48 ptr[INPUT_THREE]; 49} 50 51std::shared_ptr<AbilityRecord> GetFuzzAbilityRecord() 52{ 53 sptr<Token> token = nullptr; 54 AbilityRequest abilityRequest; 55 abilityRequest.appInfo.bundleName = "com.example.fuzzTest"; 56 abilityRequest.abilityInfo.name = "MainAbility"; 57 abilityRequest.abilityInfo.type = AbilityType::DATA; 58 std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest); 59 if (!abilityRecord) { 60 return nullptr; 61 } 62 return abilityRecord; 63} 64 65sptr<Token> GetFuzzAbilityToken() 66{ 67 sptr<Token> token = nullptr; 68 std::shared_ptr<AbilityRecord> abilityRecord = GetFuzzAbilityRecord(); 69 if (abilityRecord) { 70 token = abilityRecord->GetToken(); 71 } 72 return token; 73} 74 75bool DoSomethingInterestingWithMyAPI(const char* data, size_t size) 76{ 77 bool boolParam = *data % ENABLE; 78 sptr<IRemoteObject> token = GetFuzzAbilityToken(); 79 std::vector<sptr<IRemoteObject>> tokens; 80 std::weak_ptr<AbilityDebugDeal> deal; 81 auto abilityDebugDeal = std::make_shared<AbilityDebugDeal>(); 82 abilityDebugDeal->OnAbilitysDebugStarted(tokens); 83 abilityDebugDeal->OnAbilitysDebugStoped(tokens); 84 abilityDebugDeal->OnAbilitysAssertDebugChange(tokens, boolParam); 85 abilityDebugDeal->RegisterAbilityDebugResponse(); 86 87 auto abilityDebugResponse = std::make_shared<AbilityDebugResponse>(deal); 88 abilityDebugResponse->OnAbilitysDebugStarted(tokens); 89 abilityDebugResponse->OnAbilitysDebugStoped(tokens); 90 abilityDebugResponse->OnAbilitysAssertDebugChange(tokens, boolParam); 91 92 return true; 93} 94} 95 96/* Fuzzer entry point */ 97extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) 98{ 99 /* Run your code on data */ 100 if (data == nullptr) { 101 std::cout << "invalid data" << std::endl; 102 return 0; 103 } 104 105 /* Validate the length of size */ 106 if (size > OHOS::FOO_MAX_LEN || size < OHOS::U32_AT_SIZE) { 107 return 0; 108 } 109 110 char* ch = (char*)malloc(size + 1); 111 if (ch == nullptr) { 112 std::cout << "malloc failed." << std::endl; 113 return 0; 114 } 115 116 (void)memset_s(ch, size + 1, 0x00, size + 1); 117 if (memcpy_s(ch, size + 1, data, size) != EOK) { 118 std::cout << "copy failed." << std::endl; 119 free(ch); 120 ch = nullptr; 121 return 0; 122 } 123 124 OHOS::DoSomethingInterestingWithMyAPI(ch, size); 125 free(ch); 126 ch = nullptr; 127 return 0; 128} 129 130