| /* |
| * Copyright (C) 2023 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <fuzzbinder/libbinder_driver.h> |
| |
| #include "update_engine/aosp/daemon_android.h" |
| #include "update_engine/aosp/daemon_state_android.h" |
| |
| using chromeos_update_engine::BinderUpdateEngineAndroidService; |
| using chromeos_update_engine::BinderUpdateEngineAndroidStableService; |
| using chromeos_update_engine::DaemonStateAndroid; |
| |
| using android::fuzzService; |
| using android::sp; |
| |
| extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) { |
| auto daemonStateAndroid = std::make_unique<DaemonStateAndroid>(); |
| daemonStateAndroid->Initialize(); |
| |
| auto binderService = sp<BinderUpdateEngineAndroidService>::make( |
| daemonStateAndroid->service_delegate()); |
| auto stableBinderService = sp<BinderUpdateEngineAndroidStableService>::make( |
| daemonStateAndroid->service_delegate()); |
| // TODO(b/287253479) - Add seed corpus/dicts for this fuzzer which has valid |
| // urls |
| fuzzService({binderService, stableBinderService}, |
| FuzzedDataProvider(data, size)); |
| return 0; |
| } |