mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2024-11-29 03:00:19 +00:00
ee723d5204
This eliminates the boilerplate for catching panics and creating a Rust slice from the fuzzer input data. BUG=None TEST=`USE='asan fuzzer' emerge-nami crosvm` Change-Id: I49666a344b02e3333ad6823bfa7dace08b66b290 Signed-off-by: Daniel Verkamp <dverkamp@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/1879495 Reviewed-by: Dylan Reid <dgreid@chromium.org>
28 lines
890 B
Rust
28 lines
890 B
Rust
// Copyright 2019 The Chromium OS Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#![no_main]
|
|
|
|
use cros_fuzz::fuzz_target;
|
|
use sys_util::{GuestAddress, GuestMemory, SharedMemory};
|
|
|
|
use std::fs::File;
|
|
use std::io::Write;
|
|
|
|
const MEM_SIZE: u64 = 256 * 1024 * 1024;
|
|
|
|
fn make_elf_bin(elf_bytes: &[u8]) -> File {
|
|
let mut shm = SharedMemory::anon().expect("failed to create shared memory");
|
|
shm.set_size(elf_bytes.len() as u64)
|
|
.expect("failed to set shared memory size");
|
|
shm.write_all(elf_bytes)
|
|
.expect("failed to write elf to shared memoy");
|
|
shm.into()
|
|
}
|
|
|
|
fuzz_target!(|bytes| {
|
|
let mut kimage = make_elf_bin(bytes);
|
|
let mem = GuestMemory::new(&[(GuestAddress(0), MEM_SIZE)]).unwrap();
|
|
let _ = kernel_loader::load_kernel(&mem, GuestAddress(0), &mut kimage);
|
|
});
|