diff options
author | Dylan Reid <dgreid@chromium.org> | 2018-01-04 10:28:32 -0800 |
---|---|---|
committer | chrome-bot <chrome-bot@chromium.org> | 2018-01-12 22:37:48 -0800 |
commit | 2b2a7d4d7667a974022a17b6a23d7bc00470be01 (patch) | |
tree | f31a898425eae69782f097bce3229f297ee773fc /fuzz | |
parent | ee2f1fe7708e1ec164c5da2483c26830e9c69373 (diff) | |
download | crosvm-2b2a7d4d7667a974022a17b6a23d7bc00470be01.tar crosvm-2b2a7d4d7667a974022a17b6a23d7bc00470be01.tar.gz crosvm-2b2a7d4d7667a974022a17b6a23d7bc00470be01.tar.bz2 crosvm-2b2a7d4d7667a974022a17b6a23d7bc00470be01.tar.lz crosvm-2b2a7d4d7667a974022a17b6a23d7bc00470be01.tar.xz crosvm-2b2a7d4d7667a974022a17b6a23d7bc00470be01.tar.zst crosvm-2b2a7d4d7667a974022a17b6a23d7bc00470be01.zip |
Add kernel_loader fuzzing
Add a top level fuzz directory. Other fuzz tests will be added here in subsequent commits. For now fuzzing must be run manually. Soon there will be a way to extract the fuzz artifacts and upload them to cluster fuzz. Change-Id: Iddfb55af78af6f412927b2221f22acb882069d36 Signed-off-by: Dylan Reid <dgreid@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/850851 Reviewed-by: Zach Reizner <zachr@chromium.org>
Diffstat (limited to 'fuzz')
-rw-r--r-- | fuzz/.gitignore | 3 | ||||
-rw-r--r-- | fuzz/Cargo.toml | 25 | ||||
-rw-r--r-- | fuzz/fuzzers/fuzz_zimage.rs | 15 |
3 files changed, 43 insertions, 0 deletions
diff --git a/fuzz/.gitignore b/fuzz/.gitignore new file mode 100644 index 0000000..a092511 --- /dev/null +++ b/fuzz/.gitignore @@ -0,0 +1,3 @@ +target +corpus +artifacts diff --git a/fuzz/Cargo.toml b/fuzz/Cargo.toml new file mode 100644 index 0000000..91c4bcb --- /dev/null +++ b/fuzz/Cargo.toml @@ -0,0 +1,25 @@ +[package] +name = "crosvm-fuzz" +version = "0.0.1" +authors = ["Automatically generated"] +publish = false + +[package.metadata] +cargo-fuzz = true + +[dependencies.kernel_loader] +path = "../kernel_loader" +[dependencies.libfuzzer-sys] +git = "https://github.com/rust-fuzz/libfuzzer-sys.git" + +[dependencies] +libc = "*" +sys_util = { path = "../sys_util" } + +# Prevent this from interfering with workspaces +[workspace] +members = ["."] + +[[bin]] +name = "fuzz_zimage" +path = "fuzzers/fuzz_zimage.rs" diff --git a/fuzz/fuzzers/fuzz_zimage.rs b/fuzz/fuzzers/fuzz_zimage.rs new file mode 100644 index 0000000..1ff75e3 --- /dev/null +++ b/fuzz/fuzzers/fuzz_zimage.rs @@ -0,0 +1,15 @@ +#![no_main] +#[macro_use] extern crate libfuzzer_sys; +extern crate kernel_loader; +extern crate libc; +extern crate sys_util; + +use sys_util::{GuestAddress, GuestMemory}; + +use std::io::Cursor; + +fuzz_target!(|data: &[u8]| { // fuzzed code goes here + let mut kimage = Cursor::new(data); + let mem = GuestMemory::new(&[(GuestAddress(0), data.len() + 0x1000)]).unwrap(); + let _ = kernel_loader::load_kernel(&mem, GuestAddress(0), &mut kimage); +}); |