1/* 2 * Copyright (c) 2024 Huawei Device Co., Ltd. 3 * Licensed under the Apache License, Version 2.0 (the "License"); 4 * you may not use this file except in compliance with the License. 5 * You may obtain a copy of the License at 6 * 7 * http://www.apache.org/licenses/LICENSE-2.0 8 * 9 * Unless required by applicable law or agreed to in writing, software 10 * distributed under the License is distributed on an "AS IS" BASIS, 11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 * See the License for the specific language governing permissions and 13 * limitations under the License. 14 */ 15 16#include "abilitymgrinsightintentexecutemanager_fuzzer.h" 17 18#include <cstddef> 19#include <cstdint> 20 21#define private public 22#include "insight_intent_execute_manager.h" 23#include "insight_intent_execute_param.h" 24#undef private 25 26#include "securec.h" 27#include "ability_record.h" 28 29using namespace OHOS::AAFwk; 30using namespace OHOS::AppExecFwk; 31 32namespace OHOS { 33namespace { 34constexpr int INPUT_ZERO = 0; 35constexpr int INPUT_ONE = 1; 36constexpr int INPUT_TWO = 2; 37constexpr int INPUT_THREE = 3; 38constexpr size_t FOO_MAX_LEN = 1024; 39constexpr size_t U32_AT_SIZE = 4; 40constexpr size_t OFFSET_ZERO = 24; 41constexpr size_t OFFSET_ONE = 16; 42constexpr size_t OFFSET_TWO = 8; 43constexpr uint8_t ENABLE = 2; 44} 45uint32_t GetU32Data(const char* ptr) 46{ 47 // convert fuzz input data to an integer 48 return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[INPUT_TWO] << OFFSET_TWO) | 49 ptr[INPUT_THREE]; 50} 51 52sptr<Token> GetFuzzAbilityToken() 53{ 54 sptr<Token> token = nullptr; 55 AbilityRequest abilityRequest; 56 abilityRequest.appInfo.bundleName = "com.example.fuzzTest"; 57 abilityRequest.abilityInfo.name = "MainAbility"; 58 abilityRequest.abilityInfo.type = AbilityType::DATA; 59 std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest); 60 if (abilityRecord) { 61 token = abilityRecord->GetToken(); 62 } 63 return token; 64} 65 66bool DoSomethingInterestingWithMyAPI(const char* data, size_t size) 67{ 68 std::shared_ptr<InsightIntentExecuteConnection> infos = std::make_shared<InsightIntentExecuteConnection>(); 69 AppExecFwk::ElementName element; 70 sptr<IRemoteObject> remoteObject; 71 int resultCod = static_cast<int>(GetU32Data(data)); 72 infos->OnAbilityConnectDone(element, remoteObject, resultCod); 73 infos->OnAbilityDisconnectDone(element, resultCod); 74 uint64_t intentId = static_cast<uint64_t>(GetU32Data(data)); 75 76 InsightIntentExecuteRecipient Rinfos(intentId); 77 wptr<IRemoteObject> remote; 78 Rinfos.OnRemoteDied(remote); 79 sptr<IRemoteObject> callerToken = GetFuzzAbilityToken(); 80 81 std::shared_ptr<InsightIntentExecuteManager> Minfos = std::make_shared<InsightIntentExecuteManager>(); 82 std::shared_ptr<AppExecFwk::InsightIntentExecuteParam> paramPtr; 83 uint64_t key = static_cast<uint64_t>(GetU32Data(data)); 84 Minfos->CheckAndUpdateParam(key, callerToken, paramPtr); 85 Want want; 86 ExecuteMode executeMode = UI_ABILITY_FOREGROUND; 87 Minfos->CheckAndUpdateWant(want, executeMode); 88 executeMode = UI_ABILITY_BACKGROUND; 89 Minfos->CheckAndUpdateWant(want, executeMode); 90 executeMode = UI_EXTENSION_ABILITY; 91 Minfos->CheckAndUpdateWant(want, executeMode); 92 executeMode = SERVICE_EXTENSION_ABILITY; 93 Minfos->CheckAndUpdateWant(want, executeMode); 94 95 Minfos->RemoveExecuteIntent(intentId); 96 int32_t resultCode = static_cast<int32_t>(GetU32Data(data)); 97 InsightIntentExecuteResult result; 98 Minfos->ExecuteIntentDone(intentId, resultCode, result); 99 Minfos->RemoteDied(intentId); 100 std::string jsonStr(data, size); 101 Minfos->GetBundleName(intentId, jsonStr); 102 Minfos->AddRecord(key, callerToken, jsonStr, intentId); 103 Minfos->GenerateWant(paramPtr, want); 104 Minfos->IsValidCall(want); 105 Minfos->CheckCallerPermission(); 106 return true; 107} 108} 109 110/* Fuzzer entry point */ 111extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) 112{ 113 /* Run your code on data */ 114 if (data == nullptr) { 115 std::cout << "invalid data" << std::endl; 116 return 0; 117 } 118 119 /* Validate the length of size */ 120 if (size > OHOS::FOO_MAX_LEN || size < OHOS::U32_AT_SIZE) { 121 return 0; 122 } 123 124 char* ch = (char*)malloc(size + 1); 125 if (ch == nullptr) { 126 std::cout << "malloc failed." << std::endl; 127 return 0; 128 } 129 130 (void)memset_s(ch, size + 1, 0x00, size + 1); 131 if (memcpy_s(ch, size + 1, data, size) != EOK) { 132 std::cout << "copy failed." << std::endl; 133 free(ch); 134 ch = nullptr; 135 return 0; 136 } 137 138 OHOS::DoSomethingInterestingWithMyAPI(ch, size); 139 free(ch); 140 ch = nullptr; 141 return 0; 142} 143 144