mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2025-02-06 02:25:23 +00:00
fuzz: update to use new cros fuzzing
There is now infrastructure for running fuzzers in cros, use it. Change-Id: I53ec9e195b7062fdcc38b5186c1f3194031037f3 Signed-off-by: Dylan Reid <dgreid@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/1521667 Tested-by: kokoro <noreply+kokoro@google.com> Reviewed-by: Chirantan Ekbote <chirantan@chromium.org>
This commit is contained in:
parent
db4721d870
commit
3a42190cc4
4 changed files with 38 additions and 29 deletions
|
@ -1,19 +1,11 @@
|
||||||
[package]
|
[package]
|
||||||
name = "crosvm-fuzz"
|
name = "crosvm-fuzz"
|
||||||
version = "0.0.1"
|
version = "0.0.1"
|
||||||
authors = ["Automatically generated"]
|
authors = ["The Chromium OS Authors"]
|
||||||
publish = false
|
|
||||||
|
|
||||||
[package.metadata]
|
|
||||||
cargo-fuzz = true
|
|
||||||
|
|
||||||
[dependencies.kernel_loader]
|
|
||||||
path = "../kernel_loader"
|
|
||||||
[dependencies.libfuzzer-sys]
|
|
||||||
git = "https://github.com/rust-fuzz/libfuzzer-sys.git"
|
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libc = "*"
|
libc = "*"
|
||||||
|
kernel_loader = { path = "../kernel_loader" }
|
||||||
sys_util = { path = "../sys_util" }
|
sys_util = { path = "../sys_util" }
|
||||||
|
|
||||||
# Prevent this from interfering with workspaces
|
# Prevent this from interfering with workspaces
|
||||||
|
@ -21,5 +13,5 @@ sys_util = { path = "../sys_util" }
|
||||||
members = ["."]
|
members = ["."]
|
||||||
|
|
||||||
[[bin]]
|
[[bin]]
|
||||||
name = "fuzz_zimage"
|
name = "crosvm_zimage_fuzzer"
|
||||||
path = "fuzzers/fuzz_zimage.rs"
|
path = "zimage_fuzzer.rs"
|
||||||
|
|
1
fuzz/OWNERS
Normal file
1
fuzz/OWNERS
Normal file
|
@ -0,0 +1 @@
|
||||||
|
dgreid@chromium.org
|
|
@ -1,17 +0,0 @@
|
||||||
#![no_main]
|
|
||||||
#[macro_use]
|
|
||||||
extern crate libfuzzer_sys;
|
|
||||||
extern crate kernel_loader;
|
|
||||||
extern crate libc;
|
|
||||||
extern crate sys_util;
|
|
||||||
|
|
||||||
use sys_util::{GuestAddress, GuestMemory};
|
|
||||||
|
|
||||||
use std::io::Cursor;
|
|
||||||
|
|
||||||
fuzz_target!(|data: &[u8]| {
|
|
||||||
// fuzzed code goes here
|
|
||||||
let mut kimage = Cursor::new(data);
|
|
||||||
let mem = GuestMemory::new(&[(GuestAddress(0), data.len() + 0x1000)]).unwrap();
|
|
||||||
let _ = kernel_loader::load_kernel(&mem, GuestAddress(0), &mut kimage);
|
|
||||||
});
|
|
33
fuzz/zimage_fuzzer.rs
Normal file
33
fuzz/zimage_fuzzer.rs
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
// Copyright 2019 The Chromium OS Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style license that can be
|
||||||
|
// found in the LICENSE file.
|
||||||
|
|
||||||
|
#![no_main]
|
||||||
|
extern crate kernel_loader;
|
||||||
|
extern crate libc;
|
||||||
|
extern crate sys_util;
|
||||||
|
|
||||||
|
use sys_util::{GuestAddress, GuestMemory};
|
||||||
|
|
||||||
|
use std::io::Cursor;
|
||||||
|
use std::panic;
|
||||||
|
use std::process;
|
||||||
|
use std::slice;
|
||||||
|
|
||||||
|
#[export_name = "LLVMFuzzerTestOneInput"]
|
||||||
|
pub fn test_one_input(data: *const u8, size: usize) -> i32 {
|
||||||
|
// We cannot unwind past ffi boundaries.
|
||||||
|
panic::catch_unwind(|| {
|
||||||
|
// Safe because the libfuzzer runtime will guarantee that `data` is at least
|
||||||
|
// `size` bytes long and that it will be valid for the lifetime of this
|
||||||
|
// function.
|
||||||
|
let bytes = unsafe { slice::from_raw_parts(data, size) };
|
||||||
|
let mut kimage = Cursor::new(bytes);
|
||||||
|
let mem = GuestMemory::new(&[(GuestAddress(0), bytes.len() as u64 + 0x1000)]).unwrap();
|
||||||
|
let _ = kernel_loader::load_kernel(&mem, GuestAddress(0), &mut kimage);
|
||||||
|
})
|
||||||
|
.err()
|
||||||
|
.map(|_| process::abort());
|
||||||
|
|
||||||
|
0
|
||||||
|
}
|
Loading…
Reference in a new issue