qemu-e2k/tests/qtest/fuzz
Alexander Bulekov 25d309fb0d fuzz: configure a sparse-mem device, by default
The generic-fuzzer often provides randomized DMA addresses to
virtual-devices. For a 64-bit address-space, the chance of these
randomized addresses coinciding with RAM regions, is fairly small. Even
though the fuzzer's instrumentation eventually finds valid addresses,
this can take some-time, and slows-down fuzzing progress (especially,
when multiple DMA buffers are involved). To work around this, create
"fake" sparse-memory that spans all of the 64-bit address-space. Adjust
the DMA call-back to populate this sparse memory, correspondingly

Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
Reviewed-by: Darren Kenny <darren.kenny@oracle.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-03-16 14:30:30 -04:00
..
fork_fuzz.c
fork_fuzz.h
fork_fuzz.ld fuzz: Make fork_fuzz.ld compatible with LLVM's LLD 2020-11-10 08:51:30 +01:00
fuzz.c fuzz: log the arguments used to initialize QEMU 2021-02-08 14:43:54 +01:00
fuzz.h Clean up includes 2020-12-10 17:16:44 +01:00
generic_fuzz_configs.h fuzz: add a am53c974 generic-fuzzer config 2021-03-16 14:30:30 -04:00
generic_fuzz.c fuzz: configure a sparse-mem device, by default 2021-03-16 14:30:30 -04:00
i440fx_fuzz.c
meson.build fuzz: add virtio-blk fuzz target 2020-11-10 08:51:30 +01:00
qos_fuzz.c tests/qtest: Fix potential NULL pointer dereference in qos_build_main_args() 2020-11-03 10:15:43 -05:00
qos_fuzz.h
qtest_wrappers.c
virtio_blk_fuzz.c fuzz: add virtio-blk fuzz target 2020-11-10 08:51:30 +01:00
virtio_net_fuzz.c
virtio_scsi_fuzz.c