1 /*
2 * Copyright (c) 2024 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "abilitymgrinsightintentexecutemanager_fuzzer.h"
17
18 #include <cstddef>
19 #include <cstdint>
20
21 #define private public
22 #include "insight_intent_execute_manager.h"
23 #include "insight_intent_execute_param.h"
24 #undef private
25
26 #include "securec.h"
27 #include "ability_record.h"
28
29 using namespace OHOS::AAFwk;
30 using namespace OHOS::AppExecFwk;
31
32 namespace OHOS {
33 namespace {
34 constexpr int INPUT_ZERO = 0;
35 constexpr int INPUT_ONE = 1;
36 constexpr int INPUT_TWO = 2;
37 constexpr int INPUT_THREE = 3;
38 constexpr size_t FOO_MAX_LEN = 1024;
39 constexpr size_t U32_AT_SIZE = 4;
40 constexpr size_t OFFSET_ZERO = 24;
41 constexpr size_t OFFSET_ONE = 16;
42 constexpr size_t OFFSET_TWO = 8;
43 constexpr uint8_t ENABLE = 2;
44 }
GetU32Data(const char * ptr)45 uint32_t GetU32Data(const char* ptr)
46 {
47 // convert fuzz input data to an integer
48 return (ptr[INPUT_ZERO] << OFFSET_ZERO) | (ptr[INPUT_ONE] << OFFSET_ONE) | (ptr[INPUT_TWO] << OFFSET_TWO) |
49 ptr[INPUT_THREE];
50 }
51
GetFuzzAbilityToken()52 sptr<Token> GetFuzzAbilityToken()
53 {
54 sptr<Token> token = nullptr;
55 AbilityRequest abilityRequest;
56 abilityRequest.appInfo.bundleName = "com.example.fuzzTest";
57 abilityRequest.abilityInfo.name = "MainAbility";
58 abilityRequest.abilityInfo.type = AbilityType::DATA;
59 std::shared_ptr<AbilityRecord> abilityRecord = AbilityRecord::CreateAbilityRecord(abilityRequest);
60 if (abilityRecord) {
61 token = abilityRecord->GetToken();
62 }
63 return token;
64 }
65
DoSomethingInterestingWithMyAPI(const char * data,size_t size)66 bool DoSomethingInterestingWithMyAPI(const char* data, size_t size)
67 {
68 std::shared_ptr<InsightIntentExecuteConnection> infos = std::make_shared<InsightIntentExecuteConnection>();
69 AppExecFwk::ElementName element;
70 sptr<IRemoteObject> remoteObject;
71 int resultCod = static_cast<int>(GetU32Data(data));
72 infos->OnAbilityConnectDone(element, remoteObject, resultCod);
73 infos->OnAbilityDisconnectDone(element, resultCod);
74 uint64_t intentId = static_cast<uint64_t>(GetU32Data(data));
75
76 InsightIntentExecuteRecipient Rinfos(intentId);
77 wptr<IRemoteObject> remote;
78 Rinfos.OnRemoteDied(remote);
79 sptr<IRemoteObject> callerToken = GetFuzzAbilityToken();
80
81 std::shared_ptr<InsightIntentExecuteManager> Minfos = std::make_shared<InsightIntentExecuteManager>();
82 std::shared_ptr<AppExecFwk::InsightIntentExecuteParam> paramPtr;
83 uint64_t key = static_cast<uint64_t>(GetU32Data(data));
84 Minfos->CheckAndUpdateParam(key, callerToken, paramPtr);
85 Want want;
86 ExecuteMode executeMode = UI_ABILITY_FOREGROUND;
87 Minfos->CheckAndUpdateWant(want, executeMode);
88 executeMode = UI_ABILITY_BACKGROUND;
89 Minfos->CheckAndUpdateWant(want, executeMode);
90 executeMode = UI_EXTENSION_ABILITY;
91 Minfos->CheckAndUpdateWant(want, executeMode);
92 executeMode = SERVICE_EXTENSION_ABILITY;
93 Minfos->CheckAndUpdateWant(want, executeMode);
94
95 Minfos->RemoveExecuteIntent(intentId);
96 int32_t resultCode = static_cast<int32_t>(GetU32Data(data));
97 InsightIntentExecuteResult result;
98 Minfos->ExecuteIntentDone(intentId, resultCode, result);
99 Minfos->RemoteDied(intentId);
100 std::string jsonStr(data, size);
101 Minfos->GetBundleName(intentId, jsonStr);
102 Minfos->AddRecord(key, callerToken, jsonStr, intentId);
103 Minfos->GenerateWant(paramPtr, want);
104 Minfos->IsValidCall(want);
105 Minfos->CheckCallerPermission();
106 return true;
107 }
108 }
109
110 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)111 extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
112 {
113 /* Run your code on data */
114 if (data == nullptr) {
115 std::cout << "invalid data" << std::endl;
116 return 0;
117 }
118
119 /* Validate the length of size */
120 if (size > OHOS::FOO_MAX_LEN || size < OHOS::U32_AT_SIZE) {
121 return 0;
122 }
123
124 char* ch = static_cast<char*>(malloc(size + 1));
125 if (ch == nullptr) {
126 std::cout << "malloc failed." << std::endl;
127 return 0;
128 }
129
130 (void)memset_s(ch, size + 1, 0x00, size + 1);
131 if (memcpy_s(ch, size + 1, data, size) != EOK) {
132 std::cout << "copy failed." << std::endl;
133 free(ch);
134 ch = nullptr;
135 return 0;
136 }
137
138 OHOS::DoSomethingInterestingWithMyAPI(ch, size);
139 free(ch);
140 ch = nullptr;
141 return 0;
142 }
143
144