From 36dfed94765be431157c9f44071ed7f597c5523d Mon Sep 17 00:00:00 2001 From: David Drysdale Date: Thu, 11 Jan 2024 10:00:48 +0000 Subject: [PATCH] Secretkeeper: add Trusty fuzzers Bug: 306364873 Test: initial short run of fuzzers on device, with aosp/2737933 reverted Change-Id: I00ac6ab2678697d69a71aa3615c580c210772f20 --- trusty/secretkeeper/Android.bp | 54 ++++++++++++++++++++++++++++++++++ 1 file changed, 54 insertions(+) diff --git a/trusty/secretkeeper/Android.bp b/trusty/secretkeeper/Android.bp index 84db8c222..f6b740a17 100644 --- a/trusty/secretkeeper/Android.bp +++ b/trusty/secretkeeper/Android.bp @@ -40,3 +40,57 @@ rust_binary { ], prefer_rlib: true, } + +cc_defaults { + name: "trusty_secretkeeper_fuzz_defaults", + srcs: [":trusty_tipc_fuzzer"], + fuzz_config: { + cc: [ + "alanstokes@google.com", + "drysdale@google.com", + "shikhapanwar@google.com", + ], + componentid: 867125, + // TODO: add Secretkeeper hotlist + // hotlists: [""], + }, +} + +cc_fuzz { + name: "trusty_secretkeeper_sk_fuzzer", + defaults: [ + "trusty_fuzzer_defaults", + "trusty_secretkeeper_fuzz_defaults", + ], + cflags: [ + "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper\"", + "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"", + "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"", + ], +} + +cc_fuzz { + name: "trusty_secretkeeper_ag_fuzzer", + defaults: [ + "trusty_fuzzer_defaults", + "trusty_secretkeeper_fuzz_defaults", + ], + cflags: [ + "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper.authgraph\"", + "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"", + "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"", + ], +} + +cc_fuzz { + name: "trusty_secretkeeper_bl_fuzzer", + defaults: [ + "trusty_fuzzer_defaults", + "trusty_secretkeeper_fuzz_defaults", + ], + cflags: [ + "-DTRUSTY_APP_PORT=\"com.android.trusty.secretkeeper.bootloader\"", + "-DTRUSTY_APP_UUID=\"4582bf12-1f7d-4830-9be5-36e6bd91c2c6\"", + "-DTRUSTY_APP_FILENAME=\"secretkeeper_app.syms.elf\"", + ], +}