a73f3ba91f
Add a fuzzer to test the vring handling code against unexpected mutations from the virtio device. After building the sandbox with CONFIG_FUZZ=y, the fuzzer can be invoked with by: UBOOT_SB_FUZZ_TEST=fuzz_vring ./u-boot This fuzzer finds unvalidated inputs in the vring driver that allow a buggy or malicious device to make the driver chase wild pointers. Signed-off-by: Andrew Scull <ascull@google.com>
9 lines
205 B
Makefile
9 lines
205 B
Makefile
# SPDX-License-Identifier: GPL-2.0+
|
|
#
|
|
# Copyright (c) 2022 Google, Inc.
|
|
# Written by Andrew Scull <ascull@google.com>
|
|
#
|
|
|
|
obj-$(CONFIG_$(SPL_)CMDLINE) += cmd_fuzz.o
|
|
obj-$(CONFIG_VIRTIO_SANDBOX) += virtio.o
|