crosvm/fuzz/fs_server_fuzzer.rs
Dylan Reid ec058d6c46 vm_memory: A crate to hold vm-specific memory objects
Move GuestAddress and GuestMemory to a new crate for VM memory. This
will make separating sys_util and crosvm independent making it easier
to use sys_util functions outside of crosvm.

Change-Id: I12e14948ea85754dfa6267b3a3fb32b77ef6796e
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/2311251
Auto-Submit: Dylan Reid <dgreid@chromium.org>
Commit-Queue: Dylan Reid <dgreid@chromium.org>
Tested-by: Dylan Reid <dgreid@chromium.org>
Reviewed-by: Zach Reizner <zachr@chromium.org>
2020-07-24 21:42:34 +00:00

48 lines
1.4 KiB
Rust

// Copyright 2019 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#![no_main]
use std::convert::TryInto;
use cros_fuzz::fuzz_target;
use devices::virtio::fs::fuzzing::fuzz_server;
use devices::virtio::{create_descriptor_chain, DescriptorType, Reader, Writer};
use vm_memory::{GuestAddress, GuestMemory};
const MEM_SIZE: u64 = 256 * 1024 * 1024;
const BUFFER_ADDR: GuestAddress = GuestAddress(0x100);
thread_local! {
static GUEST_MEM: GuestMemory = GuestMemory::new(&[(GuestAddress(0), MEM_SIZE)]).unwrap();
}
fuzz_target!(|data| {
use DescriptorType::*;
GUEST_MEM.with(|mem| {
mem.write_all_at_addr(data, BUFFER_ADDR).unwrap();
let chain = create_descriptor_chain(
mem,
GuestAddress(0),
BUFFER_ADDR,
vec![
(Readable, data.len().try_into().unwrap()),
(
Writable,
(MEM_SIZE as u32)
.saturating_sub(data.len().try_into().unwrap())
.saturating_sub(0x100),
),
],
0,
)
.unwrap();
let r = Reader::new(mem, chain.clone()).unwrap();
let w = Writer::new(mem, chain).unwrap();
fuzz_server(r, w);
});
});