crosvm/fuzz/Cargo.toml
Victor Hsieh bae88f4f65 fuse: extract FUSE as a crate from virtio/fs
The current crate still require some work to be really reusable as a
regular FUSE, i.e. with a new reader/writer against /dev/fuse. This
change intends to focus on creating the crate, without trying to find
the optimal interface, and still keep virtio/fs working.

BUG=b:168305155
TEST=./build_test
TEST=USE='asan fuzzer' emerge-hatch crosvm

Change-Id: I8b623c9262221113b720c10125a6770763f14dc8
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/2466484
Tested-by: Victor Hsieh <victorhsieh@chromium.org>
Tested-by: kokoro <noreply+kokoro@google.com>
Reviewed-by: Chirantan Ekbote <chirantan@chromium.org>
Commit-Queue: Victor Hsieh <victorhsieh@chromium.org>
2020-10-27 16:18:51 +00:00

50 lines
1,010 B
TOML

[package]
name = "crosvm-fuzz"
version = "0.0.1"
authors = ["The Chromium OS Authors"]
edition = "2018"
[dependencies]
cros_fuzz = "*"
data_model = { path = "../data_model" }
devices = { path = "../devices" }
disk = { path = "../disk" }
fuse = { path = "../fuse" }
kernel_loader = { path = "../kernel_loader" }
libc = "*"
rand = "0.6"
base = { path = "../base" }
tempfile = { path = "../tempfile" }
usb_util = { path = "../usb_util" }
vm_memory = { path = "../vm_memory" }
# Prevent this from interfering with workspaces
[workspace]
members = ["."]
[[bin]]
name = "crosvm_block_fuzzer"
path = "block_fuzzer.rs"
[[bin]]
name = "crosvm_fs_server_fuzzer"
path = "fs_server_fuzzer.rs"
[[bin]]
name = "crosvm_qcow_fuzzer"
path = "qcow_fuzzer.rs"
[[bin]]
name = "crosvm_usb_descriptor_fuzzer"
path = "usb_descriptor_fuzzer.rs"
[[bin]]
name = "crosvm_virtqueue_fuzzer"
path = "virtqueue_fuzzer.rs"
[[bin]]
name = "crosvm_zimage_fuzzer"
path = "zimage_fuzzer.rs"
[patch.crates-io]
base = { path = "../base" }