mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2024-11-25 05:03:05 +00:00
ee723d5204
This eliminates the boilerplate for catching panics and creating a Rust slice from the fuzzer input data. BUG=None TEST=`USE='asan fuzzer' emerge-nami crosvm` Change-Id: I49666a344b02e3333ad6823bfa7dace08b66b290 Signed-off-by: Daniel Verkamp <dverkamp@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/1879495 Reviewed-by: Dylan Reid <dgreid@chromium.org>
40 lines
1.3 KiB
Rust
40 lines
1.3 KiB
Rust
// Copyright 2019 The Chromium OS Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#![no_main]
|
|
|
|
use cros_fuzz::fuzz_target;
|
|
use qcow::QcowFile;
|
|
use sys_util::SharedMemory;
|
|
|
|
use std::fs::File;
|
|
use std::io::{Cursor, Read, Seek, SeekFrom, Write};
|
|
use std::mem::size_of;
|
|
|
|
// Take the first 64 bits of data as an address and the next 64 bits as data to
|
|
// store there. The rest of the data is used as a qcow image.
|
|
fuzz_target!(|bytes| {
|
|
if bytes.len() < 16 {
|
|
// Need an address and data, each are 8 bytes.
|
|
return;
|
|
}
|
|
let mut disk_image = Cursor::new(bytes);
|
|
let addr = read_u64(&mut disk_image);
|
|
let value = read_u64(&mut disk_image);
|
|
let shm = SharedMemory::anon().unwrap();
|
|
let mut disk_file: File = shm.into();
|
|
disk_file.write_all(&bytes[16..]).unwrap();
|
|
disk_file.seek(SeekFrom::Start(0)).unwrap();
|
|
if let Ok(mut qcow) = QcowFile::from(disk_file) {
|
|
if qcow.seek(SeekFrom::Start(addr)).is_ok() {
|
|
let _ = qcow.write_all(&value.to_le_bytes());
|
|
}
|
|
}
|
|
});
|
|
|
|
fn read_u64<T: Read>(readable: &mut T) -> u64 {
|
|
let mut buf = [0u8; size_of::<u64>()];
|
|
readable.read_exact(&mut buf[..]).unwrap();
|
|
u64::from_le_bytes(buf)
|
|
}
|