mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2024-11-28 17:44:10 +00:00
97dff044f8
Updates are made to source and documentation. This more accurately represents the currently supported platforms of Android/Linux and Windows, without unexpectedly including other unix-like operating systems. Command to reproduce: $ find . -type f -not -path '*/\.git/*' | xargs -I {} sed -i 's/cfg(unix)/cfg(any(target_os = "android", target_os = "linux"))/g' {} $ cargo fmt md files manually updated to fix line lengths. Renaming `unix` modules to `linux` will be done in a later CL. Test: ./tools/dev_container ./tools/presubmit Bug: b/298269162 Change-Id: I42c1bf0abf80b9a0df25551613910293217c7295 Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/4909059 Commit-Queue: Cody Schuffelen <schuffelen@google.com> Reviewed-by: Frederick Mayle <fmayle@google.com> Reviewed-by: Daniel Verkamp <dverkamp@chromium.org> Reviewed-by: Noah Gold <nkgold@google.com>
60 lines
1.7 KiB
Rust
60 lines
1.7 KiB
Rust
// Copyright 2019 The ChromiumOS Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#![cfg(not(test))]
|
|
#![no_main]
|
|
|
|
#[cfg(any(target_os = "android", target_os = "linux"))]
|
|
mod fuzzer {
|
|
use std::convert::TryInto;
|
|
|
|
use crosvm_fuzz::fuzz_target;
|
|
use devices::virtio::create_descriptor_chain;
|
|
use devices::virtio::DescriptorType;
|
|
use fuse::fuzzing::fuzz_server;
|
|
use vm_memory::GuestAddress;
|
|
use vm_memory::GuestMemory;
|
|
|
|
const MEM_SIZE: u64 = 256 * 1024 * 1024;
|
|
const BUFFER_ADDR: GuestAddress = GuestAddress(0x100);
|
|
|
|
thread_local! {
|
|
static GUEST_MEM: GuestMemory = GuestMemory::new(&[(GuestAddress(0), MEM_SIZE)]).unwrap();
|
|
}
|
|
|
|
fuzz_target!(|data| {
|
|
use DescriptorType::*;
|
|
|
|
GUEST_MEM.with(|mem| {
|
|
mem.write_all_at_addr(data, BUFFER_ADDR).unwrap();
|
|
|
|
// We need a valid descriptor chain, but it's not part of what is being fuzzed here.
|
|
// So skip fuzzing if the chain is invalid.
|
|
if let Ok(mut chain) = create_descriptor_chain(
|
|
mem,
|
|
GuestAddress(0),
|
|
BUFFER_ADDR,
|
|
vec![
|
|
(Readable, data.len().try_into().unwrap()),
|
|
(
|
|
Writable,
|
|
(MEM_SIZE as u32)
|
|
.saturating_sub(data.len().try_into().unwrap())
|
|
.saturating_sub(0x100),
|
|
),
|
|
],
|
|
0,
|
|
) {
|
|
fuzz_server(&mut chain.reader, &mut chain.writer);
|
|
}
|
|
});
|
|
});
|
|
}
|
|
|
|
#[cfg(not(unix))]
|
|
mod fuzzer {
|
|
use crosvm_fuzz::fuzz_target;
|
|
|
|
fuzz_target!(|_data| {});
|
|
}
|