1 /*
2  * Copyright (C) 2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *    http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "gethighestseclevel_fuzzer.h"
17 
18 #include <cstddef>
19 #include <cstdint>
20 
21 #include "file_ex.h"
22 #include "securec.h"
23 #include "parameter.h"
24 #include "nativetoken_kit.h"
25 #include "token_setproc.h"
26 #include "accesstoken_kit.h"
27 
28 #include "dev_slinfo_mgr.h"
29 
30 namespace OHOS {
31 static bool g_isForcingFuzz2 = false;
32 
NativeTokenGetFuzz2(void)33 static void NativeTokenGetFuzz2(void)
34 {
35     uint64_t tokenId2;
36     const char **permsFuzz2 = new const char *[1];
37     permsFuzz2[0] = "ohos.permission.DISTRIBUTED_DATASYNC";
38     NativeTokenInfoParams infoInstanceFuzz1 = {
39         .dcapsNum = 0,
40         .permsNum = 1,
41         .aclsNum = 0,
42         .dcaps = nullptr,
43         .perms = permsFuzz2,
44         .acls = nullptr,
45         .aplStr = "system_basic",
46     };
47 
48     infoInstanceFuzz1.processName = "DevSLMgrTest";
49     tokenId2 = GetAccessTokenId(&infoInstanceFuzz1);
50     SetSelfTokenID(tokenId2);
51     OHOS::Security::AccessToken::AccessTokenKit::ReloadNativeTokenInfo();
52     delete[] permsFuzz2;
53 }
54 
BeginFuzzCase2(void)55 static void BeginFuzzCase2(void)
56 {
57     std::string isEnforcing;
58     OHOS::LoadStringFromFile("/sys/fs/selinux/enforce", isEnforcing);
59     if (isEnforcing.compare("1") == 0) {
60         g_isForcingFuzz2 = true;
61         OHOS::SaveStringToFile("/sys/fs/selinux/enforce", "0");
62     }
63     NativeTokenGetFuzz2();
64 }
65 
EndFuzzCase2(void)66 static void EndFuzzCase2(void)
67 {
68     if (g_isForcingFuzz2) {
69         OHOS::SaveStringToFile("/sys/fs/selinux/enforce", "1");
70     }
71 }
72 
GetLocalUdidFuzz2(DEVSLQueryParams * queryParams)73 static int32_t GetLocalUdidFuzz2(DEVSLQueryParams *queryParams)
74 {
75     char udid[MAX_UDID_LENGTH + 1] = {0};
76     int32_t ret = GetDevUdid(udid, MAX_UDID_LENGTH + 1);
77     if (ret != DEVSL_SUCCESS) {
78         return DEVSL_ERROR;
79     }
80 
81     (void)memcpy_s(queryParams->udid, MAX_UDID_LENGTH, udid, MAX_UDID_LENGTH);
82     queryParams->udidLen = MAX_UDID_LENGTH;
83     return ret;
84 }
85 
FuzzDoGetHighestSecLevel(const uint8_t * data,size_t size)86 void FuzzDoGetHighestSecLevel(const uint8_t *data, size_t size)
87 {
88     if (data == nullptr || size <= MAX_UDID_LENGTH) {
89         return;
90     }
91 
92     uint32_t levelInfo = 0;
93     DEVSLQueryParams queryParams;
94     (void)memset_s(&queryParams, sizeof(DEVSLQueryParams), 0, sizeof(DEVSLQueryParams));
95     queryParams.udidLen = MAX_UDID_LENGTH;
96     (void)memcpy_s(queryParams.udid, MAX_UDID_LENGTH, data, MAX_UDID_LENGTH);
97     BeginFuzzCase2();
98     (void)DATASL_OnStart();
99     (void)DATASL_GetHighestSecLevel(&queryParams, &levelInfo);
100     (void)DATASL_GetHighestSecLevel(nullptr, &levelInfo);
101     (void)DATASL_GetHighestSecLevel(&queryParams, nullptr);
102 
103     (void)GetLocalUdidFuzz2(&queryParams);
104 
105     (void)DATASL_GetHighestSecLevel(&queryParams, &levelInfo);
106     DATASL_OnStop();
107     EndFuzzCase2();
108 }
109 }
110 
111 /* Fuzzer entry point */
LLVMFuzzerTestOneInput(const uint8_t * data,size_t size)112 extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
113 {
114     /* Run your code on data */
115     OHOS::FuzzDoGetHighestSecLevel(data, size);
116     return 0;
117 }