crosvm/fuzz/zimage_fuzzer.rs
Dylan Reid b38bde9bd1 fuzz: Comply with new guest memory requirement for page alignment
When the input's length is not page aligned, round it up. This allows
the fuzzer to provide more random inputs without causing the `unwrap`
call to trigger false positives when creating guest memory.

BUG=chromium:972172
TEST=run fuzz case from the bug

Change-Id: Iaf8f2ba943f38b90e168301dbb8c15dee5ee45c8
Signed-off-by: Dylan Reid <dgreid@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/1659626
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
Tested-by: kokoro <noreply+kokoro@google.com>
2019-06-21 21:12:39 +00:00

43 lines
1.5 KiB
Rust

// Copyright 2019 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#![no_main]
use sys_util::{round_up_to_page_size, GuestAddress, GuestMemory, SharedMemory};
use std::fs::File;
use std::io::Write;
use std::panic;
use std::process;
use std::slice;
fn make_elf_bin(elf_bytes: &[u8]) -> File {
let mut shm = SharedMemory::new(None).expect("failed to create shared memory");
shm.set_size(elf_bytes.len() as u64)
.expect("failed to set shared memory size");
shm.write_all(elf_bytes)
.expect("failed to write elf to shared memoy");
shm.into()
}
#[export_name = "LLVMFuzzerTestOneInput"]
pub fn test_one_input(data: *const u8, size: usize) -> i32 {
// We cannot unwind past ffi boundaries.
panic::catch_unwind(|| {
// Safe because the libfuzzer runtime will guarantee that `data` is at least
// `size` bytes long and that it will be valid for the lifetime of this
// function.
let bytes = unsafe { slice::from_raw_parts(data, size) };
let mut kimage = make_elf_bin(bytes);
// `GuestMemory` only accepts page aligned segments.
let len = round_up_to_page_size(bytes.len()) as u64;
let mem = GuestMemory::new(&[(GuestAddress(0), len)]).unwrap();
let _ = kernel_loader::load_kernel(&mem, GuestAddress(0), &mut kimage);
})
.err()
.map(|_| process::abort());
0
}