diff --git a/projects/gvisor/Dockerfile b/projects/gvisor/Dockerfile new file mode 100644 index 000000000..598664ee2 --- /dev/null +++ b/projects/gvisor/Dockerfile @@ -0,0 +1,21 @@ +# Copyright 2021 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +FROM gcr.io/oss-fuzz-base/base-builder-go +RUN git clone --depth 1 --branch go https://github.com/google/gvisor +COPY build.sh state_fuzzer.go $SRC/ +ENV GVISOR_ROOT $SRC/gvisor +WORKDIR $GVISOR_ROOT diff --git a/projects/gvisor/build.sh b/projects/gvisor/build.sh new file mode 100644 index 000000000..7a1ee279a --- /dev/null +++ b/projects/gvisor/build.sh @@ -0,0 +1,19 @@ +#!/bin/bash -eu +# Copyright 2021 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +mv $SRC/state_fuzzer.go $GVISOR_ROOT/ +compile_go_fuzzer gvisor.dev/gvisor FuzzStateLoad state_load_fuzz diff --git a/projects/gvisor/project.yaml b/projects/gvisor/project.yaml new file mode 100644 index 000000000..b44a8adc2 --- /dev/null +++ b/projects/gvisor/project.yaml @@ -0,0 +1,11 @@ +homepage: "https://github.com/google/gvisor" +main_repo: "https://github.com/google/gvisor" +primary_contact: "krakauer@google.com" +auto_ccs : + - "gvisor-dev@googlegroups.com" + - "adam@adalogics.com" +language: go +fuzzing_engines: + - libfuzzer +sanitizers: + - address diff --git a/projects/gvisor/state_fuzzer.go b/projects/gvisor/state_fuzzer.go new file mode 100644 index 000000000..b44f07a50 --- /dev/null +++ b/projects/gvisor/state_fuzzer.go @@ -0,0 +1,30 @@ +// Copyright 2021 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. +// + +package fuzzing + +import ( + "bytes" + "context" + "gvisor.dev/gvisor/pkg/buffer" + "gvisor.dev/gvisor/pkg/state" +) + +func FuzzStateLoad(data []byte) int { + ctx := context.Background() + var toLoad *buffer.View + _, _ = state.Load(ctx, bytes.NewReader(data), toLoad) + return 1 +}