1 /*
2  * Copyright (c) 2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "abilitymgrdisposedruleinterceptor_fuzzer.h"
17 
18 #include <cstddef>
19 #include <cstdint>
20 
21 #include "ability_record.h"
22 #include "securec.h"
23 
24 #define private public
25 #include "disposed_rule_interceptor.h"
26 #undef private
27 
28 using namespace OHOS::AAFwk;
29 using namespace OHOS::AppExecFwk;
30 
31 #define DISABLE_FUZZ
32 namespace OHOS {
33 namespace {
34 constexpr int INPUT_ZERO = 0;
35 constexpr int INPUT_ONE = 1;
36 constexpr int INPUT_TWO = 2;
37 constexpr int INPUT_THREE = 3;
38 constexpr size_t FOO_MAX_LEN = 1024;
39 constexpr size_t U32_AT_SIZE = 4;
40 constexpr size_t OFFSET_ZERO = 24;
41 constexpr size_t OFFSET_ONE = 16;
42 constexpr size_t OFFSET_TWO = 8;
43 constexpr uint8_t ENABLE = 2;
44 }
45 
GetU32Data(const char* ptr)46 uint32_t GetU32Data(const char* ptr)
47 {
48     // convert fuzz input data to an integer
49     return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[INPUT_TWO] << OFFSET_TWO) |
50         ptr[INPUT_THREE];
51 }
52 
GetFuzzAbilityToken()53 sptr<Token> GetFuzzAbilityToken()
54 {
55     sptr<Token> token = nullptr;
56     AbilityRequest abilityRequest;
57     abilityRequest.appInfo.bundleName = "com.example.fuzzTest";
58     abilityRequest.abilityInfo.name = "MainAbility";
59     abilityRequest.abilityInfo.type = AbilityType::DATA;
60     std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest);
61     if (abilityRecord) {
62         token = abilityRecord->GetToken();
63     }
64     return token;
65 }
66 
DoSomethingInterestingWithMyAPI(const char* data, size_t size)67 bool DoSomethingInterestingWithMyAPI(const char* data, size_t size)
68 {
69     std::shared_ptr<DisposedRuleInterceptor> executer = std::make_shared<DisposedRuleInterceptor>();
70     Want want;
71     AppExecFwk::DisposedRule disposedRule;
72     std::string stringParam(data, size);
73     int requestCode = static_cast<int>(GetU32Data(data));
74     int32_t userId = static_cast<int32_t>(GetU32Data(data));
75     bool isWithUI = *data % ENABLE;
76     sptr<IRemoteObject> token = GetFuzzAbilityToken();
77     auto shouldBlockFunc = []() { return false; };
78     AbilityInterceptorParam param = AbilityInterceptorParam(want, requestCode, userId, isWithUI, token,
79         shouldBlockFunc);
80     const std::shared_ptr<AppExecFwk::AbilityInfo> abilityInfo;
81     int32_t bundleType = static_cast<int32_t>(GetU32Data(data));
82 
83     executer-> DoProcess(param);
84     executer-> CheckControl(want, userId, disposedRule, 0);
85     executer-> CheckDisposedRule(want, disposedRule);
86     executer-> StartNonBlockRule(want, disposedRule);
87     executer-> GetAppMgr();
88     executer-> UnregisterObserver(stringParam);
89     executer-> CreateModalUIExtension(want, token);
90     executer-> SetInterceptInfo(want, disposedRule);
91 
92     return true;
93 }
94 }
95 
96 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)97 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
98 {
99     /* Run your code on data */
100     if (data == nullptr) {
101         return 0;
102     }
103 
104     /* Validate the length of size */
105     if (size < OHOS::U32_AT_SIZE || size > OHOS::FOO_MAX_LEN) {
106         return 0;
107     }
108 
109     char* ch = (char*)malloc(size + 1);
110     if (ch == nullptr) {
111         std::cout << "malloc failed." << std::endl;
112         return 0;
113     }
114 
115     (void)memset_s(ch, size + 1, 0x00, size + 1);
116     if (memcpy_s(ch, size + 1, data, size) != EOK) {
117         std::cout << "copy failed." << std::endl;
118         free(ch);
119         ch = nullptr;
120         return 0;
121     }
122 
123 #ifndef DISABLE_FUZZ
124     OHOS::DoSomethingInterestingWithMyAPI(ch, size);
125 #endif
126     free(ch);
127     ch = nullptr;
128     return 0;
129 }
130 
131