From ec9a99146e035ad327afb8c1f63e50b9da055c12 Mon Sep 17 00:00:00 2001 From: Daniel Verkamp Date: Thu, 28 May 2020 15:54:36 -0700 Subject: fuzz: update virtqueue fuzzer for new VolatileSlice API BUG=chromium:1087578 TEST=emerge-amd64-generic crosvm Change-Id: Ia206abf03f95ca92f5944fb8efc23d3f8355e292 Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/crosvm/+/2220731 Tested-by: Daniel Verkamp Tested-by: kokoro Auto-Submit: Daniel Verkamp Reviewed-by: Manoj Gupta Reviewed-by: Dylan Reid Commit-Queue: Manoj Gupta Commit-Queue: Dylan Reid --- fuzz/virtqueue_fuzzer.rs | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/fuzz/virtqueue_fuzzer.rs b/fuzz/virtqueue_fuzzer.rs index dc746d4..70ad330 100644 --- a/fuzz/virtqueue_fuzzer.rs +++ b/fuzz/virtqueue_fuzzer.rs @@ -8,7 +8,6 @@ use std::mem::size_of; use cros_fuzz::fuzz_target; use cros_fuzz::rand::FuzzRng; -use data_model::VolatileMemory; use devices::virtio::{DescriptorChain, Queue}; use rand::{Rng, RngCore}; use sys_util::{GuestAddress, GuestMemory}; @@ -71,7 +70,9 @@ fuzz_target!(|data: &[u8]| { } // First zero out all of the memory. - let vs = mem.get_slice(0, MEM_SIZE).unwrap(); + let vs = mem + .get_slice_at_addr(GuestAddress(0), MEM_SIZE as usize) + .unwrap(); vs.write_bytes(0); // Fill in the descriptor table. -- cgit 1.4.1