mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2025-02-06 02:25:23 +00:00
b38bde9bd1
When the input's length is not page aligned, round it up. This allows the fuzzer to provide more random inputs without causing the `unwrap` call to trigger false positives when creating guest memory. BUG=chromium:972172 TEST=run fuzz case from the bug Change-Id: Iaf8f2ba943f38b90e168301dbb8c15dee5ee45c8 Signed-off-by: Dylan Reid <dgreid@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/1659626 Reviewed-by: Daniel Verkamp <dverkamp@chromium.org> Tested-by: kokoro <noreply+kokoro@google.com>
42 lines
1.5 KiB
Rust
42 lines
1.5 KiB
Rust
// Copyright 2019 The Chromium OS Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#![no_main]
|
|
|
|
use sys_util::{round_up_to_page_size, GuestAddress, GuestMemory, SharedMemory};
|
|
|
|
use std::fs::File;
|
|
use std::io::Write;
|
|
use std::panic;
|
|
use std::process;
|
|
use std::slice;
|
|
|
|
fn make_elf_bin(elf_bytes: &[u8]) -> File {
|
|
let mut shm = SharedMemory::new(None).expect("failed to create shared memory");
|
|
shm.set_size(elf_bytes.len() as u64)
|
|
.expect("failed to set shared memory size");
|
|
shm.write_all(elf_bytes)
|
|
.expect("failed to write elf to shared memoy");
|
|
shm.into()
|
|
}
|
|
|
|
#[export_name = "LLVMFuzzerTestOneInput"]
|
|
pub fn test_one_input(data: *const u8, size: usize) -> i32 {
|
|
// We cannot unwind past ffi boundaries.
|
|
panic::catch_unwind(|| {
|
|
// Safe because the libfuzzer runtime will guarantee that `data` is at least
|
|
// `size` bytes long and that it will be valid for the lifetime of this
|
|
// function.
|
|
let bytes = unsafe { slice::from_raw_parts(data, size) };
|
|
let mut kimage = make_elf_bin(bytes);
|
|
// `GuestMemory` only accepts page aligned segments.
|
|
let len = round_up_to_page_size(bytes.len()) as u64;
|
|
let mem = GuestMemory::new(&[(GuestAddress(0), len)]).unwrap();
|
|
let _ = kernel_loader::load_kernel(&mem, GuestAddress(0), &mut kimage);
|
|
})
|
|
.err()
|
|
.map(|_| process::abort());
|
|
|
|
0
|
|
}
|