Adding AIDL Service fuzzer for update engine service
Test: m update_engine_service_fuzzer && adb sync data && adb shell /data/fuzz/x86_64/update_engine_service_fuzzer/update_engine_service_fuzzer
Bug: 232439428
Change-Id: I1e38cb752e25029f91d5294615efbfb8230012d7
diff --git a/Android.bp b/Android.bp
index efcd4db..144dd30 100644
--- a/Android.bp
+++ b/Android.bp
@@ -1342,3 +1342,28 @@
"unsquashfs",
],
}
+
+cc_fuzz {
+ name: "update_engine_service_fuzzer",
+ defaults: [
+ "ue_defaults",
+ "libupdate_engine_android_exports",
+ "service_fuzzer_defaults",
+ "fuzzer_disable_leaks",
+ ],
+ static_libs: [
+ "libupdate_engine_android",
+ "libgflags",
+ ],
+ srcs: [
+ "fuzzers/update_engine_service_fuzzer.cpp",
+ "aosp/metrics_reporter_android.cc",
+ ],
+ fuzz_config: {
+ triage_assignee: "waghpawan@google.com",
+ cc: [
+ "elsk@google.com",
+ "zhangkelvin@google.com",
+ ]
+ },
+}
diff --git a/fuzzers/update_engine_service_fuzzer.cpp b/fuzzers/update_engine_service_fuzzer.cpp
new file mode 100644
index 0000000..f9c28cb
--- /dev/null
+++ b/fuzzers/update_engine_service_fuzzer.cpp
@@ -0,0 +1,42 @@
+/*
+ * Copyright (C) 2023 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <fuzzbinder/libbinder_driver.h>
+
+#include "update_engine/aosp/daemon_android.h"
+#include "update_engine/aosp/daemon_state_android.h"
+
+using chromeos_update_engine::BinderUpdateEngineAndroidService;
+using chromeos_update_engine::BinderUpdateEngineAndroidStableService;
+using chromeos_update_engine::DaemonStateAndroid;
+
+using android::fuzzService;
+using android::sp;
+
+extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
+ auto daemonStateAndroid = std::make_unique<DaemonStateAndroid>();
+ daemonStateAndroid->Initialize();
+
+ auto binderService = sp<BinderUpdateEngineAndroidService>::make(
+ daemonStateAndroid->service_delegate());
+ auto stableBinderService = sp<BinderUpdateEngineAndroidStableService>::make(
+ daemonStateAndroid->service_delegate());
+ // TODO(b/287253479) - Add seed corpus/dicts for this fuzzer which has valid
+ // urls
+ fuzzService({binderService, stableBinderService},
+ FuzzedDataProvider(data, size));
+ return 0;
+}