1/* 2 * Copyright (c) 2024 Huawei Device Co., Ltd. 3 * Licensed under the Apache License, Version 2.0 (the "License"); 4 * you may not use this file except in compliance with the License. 5 * You may obtain a copy of the License at 6 * 7 * http://www.apache.org/licenses/LICENSE-2.0 8 * 9 * Unless required by applicable law or agreed to in writing, software 10 * distributed under the License is distributed on an "AS IS" BASIS, 11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 * See the License for the specific language governing permissions and 13 * limitations under the License. 14 */ 15 16#include "abilitymgrabilitymanagerstub_fuzzer.h" 17 18#include <cstddef> 19#include <cstdint> 20 21#define private public 22#include "ability_manager_service.h" 23#undef private 24 25#include "securec.h" 26#include "ability_record.h" 27 28using namespace OHOS::AAFwk; 29using namespace OHOS::AppExecFwk; 30 31namespace OHOS { 32namespace { 33constexpr int INPUT_ZERO = 0; 34constexpr int INPUT_ONE = 1; 35constexpr int INPUT_TWO = 2; 36constexpr int INPUT_THREE = 3; 37constexpr size_t FOO_MAX_LEN = 1024; 38constexpr size_t U32_AT_SIZE = 4; 39constexpr size_t OFFSET_ZERO = 24; 40constexpr size_t OFFSET_ONE = 16; 41constexpr size_t OFFSET_TWO = 8; 42constexpr uint8_t ENABLE = 2; 43} 44const std::u16string ABILITYMGR_INTERFACE_TOKEN = u"ohos.aafwk.AbilityManager"; 45uint32_t GetU32Data(const char* ptr) 46{ 47 // convert fuzz input data to an integer 48 return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[INPUT_TWO] << OFFSET_TWO) | 49 ptr[INPUT_THREE]; 50} 51 52sptr<Token> GetFuzzAbilityToken() 53{ 54 sptr<Token> token = nullptr; 55 AbilityRequest abilityRequest; 56 abilityRequest.appInfo.bundleName = "com.example.fuzzTest"; 57 abilityRequest.abilityInfo.name = "MainAbility"; 58 abilityRequest.abilityInfo.type = AbilityType::DATA; 59 std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest); 60 if (abilityRecord) { 61 token = abilityRecord->GetToken(); 62 } 63 return token; 64} 65 66bool DoSomethingInterestingWithMyAPI(const char* data, size_t size) 67{ 68 uint32_t codeOne = static_cast<uint32_t>(AbilityManagerInterfaceCode::GET_PENDING_WANT_TYPE); 69 MessageParcel parcel; 70 parcel.WriteInterfaceToken(ABILITYMGR_INTERFACE_TOKEN); 71 parcel.WriteBuffer(data, size); 72 parcel.RewindRead(0); 73 MessageParcel reply; 74 MessageOption option; 75 std::shared_ptr<AbilityManagerService> abmsOne = std::make_shared<AbilityManagerService>(); 76 abmsOne->OnRemoteRequest(codeOne, parcel, reply, option); 77 78 uint32_t codeTwo = static_cast<uint32_t>(AbilityManagerInterfaceCode::START_UI_EXTENSION_ABILITY); 79 MessageParcel parcels; 80 parcels.WriteInterfaceToken(ABILITYMGR_INTERFACE_TOKEN); 81 parcels.WriteBuffer(data, size); 82 parcels.RewindRead(0); 83 std::shared_ptr<AbilityManagerService> abmsTwo = std::make_shared<AbilityManagerService>(); 84 abmsTwo->OnRemoteRequest(codeTwo, parcels, reply, option); 85 return true; 86} 87} 88 89/* Fuzzer entry point */ 90extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) 91{ 92 /* Run your code on data */ 93 if (data == nullptr) { 94 std::cout << "invalid data" << std::endl; 95 return 0; 96 } 97 98 /* Validate the length of size */ 99 if (size > OHOS::FOO_MAX_LEN || size < OHOS::U32_AT_SIZE) { 100 return 0; 101 } 102 103 char* ch = (char*)malloc(size + 1); 104 if (ch == nullptr) { 105 std::cout << "malloc failed." << std::endl; 106 return 0; 107 } 108 109 (void)memset_s(ch, size + 1, 0x00, size + 1); 110 if (memcpy_s(ch, size + 1, data, size) != EOK) { 111 std::cout << "copy failed." << std::endl; 112 free(ch); 113 ch = nullptr; 114 return 0; 115 } 116 117 OHOS::DoSomethingInterestingWithMyAPI(ch, size); 118 free(ch); 119 ch = nullptr; 120 return 0; 121} 122 123