blob: 6762abf12fdebdb7e3c294b485f3d72e0a32e518 [file] [log] [blame]
/*
* Copyright (C) 2023 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <fuzzbinder/libbinder_driver.h>
#include <binderwrapper/binder_wrapper.h>
#include "update_engine/aosp/daemon_android.h"
#include "update_engine/aosp/daemon_state_android.h"
using chromeos_update_engine::BinderUpdateEngineAndroidService;
using chromeos_update_engine::BinderUpdateEngineAndroidStableService;
using chromeos_update_engine::DaemonStateAndroid;
using android::fuzzService;
using android::sp;
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
android::BinderWrapper::Create();
brillo::BaseMessageLoop message_loop_;
message_loop_.SetAsCurrent();
auto daemonStateAndroid = std::make_unique<DaemonStateAndroid>();
daemonStateAndroid->Initialize();
auto binderService = sp<BinderUpdateEngineAndroidService>::make(
daemonStateAndroid->service_delegate());
auto stableBinderService = sp<BinderUpdateEngineAndroidStableService>::make(
daemonStateAndroid->service_delegate());
// TODO(b/287253479) - Add seed corpus/dicts for this fuzzer which has valid
// urls
fuzzService({binderService, stableBinderService},
FuzzedDataProvider(data, size));
android::BinderWrapper::Destroy();
return 0;
}