15f6fd09aSAlexander Bulekov /* 25f6fd09aSAlexander Bulekov * fuzzing driver 35f6fd09aSAlexander Bulekov * 45f6fd09aSAlexander Bulekov * Copyright Red Hat Inc., 2019 55f6fd09aSAlexander Bulekov * 65f6fd09aSAlexander Bulekov * Authors: 75f6fd09aSAlexander Bulekov * Alexander Bulekov <alxndr@bu.edu> 85f6fd09aSAlexander Bulekov * 95f6fd09aSAlexander Bulekov * This work is licensed under the terms of the GNU GPL, version 2 or later. 105f6fd09aSAlexander Bulekov * See the COPYING file in the top-level directory. 115f6fd09aSAlexander Bulekov * 125f6fd09aSAlexander Bulekov */ 135f6fd09aSAlexander Bulekov 1452581c71SMarkus Armbruster #ifndef QTEST_FUZZ_H 1552581c71SMarkus Armbruster #define QTEST_FUZZ_H 165f6fd09aSAlexander Bulekov 175f6fd09aSAlexander Bulekov #include "qemu/units.h" 185f6fd09aSAlexander Bulekov #include "qapi/error.h" 195f6fd09aSAlexander Bulekov 20907b5105SMarc-André Lureau #include "tests/qtest/libqtest.h" 215f6fd09aSAlexander Bulekov 225f6fd09aSAlexander Bulekov /** 235f6fd09aSAlexander Bulekov * A libfuzzer fuzzing target 245f6fd09aSAlexander Bulekov * 255f6fd09aSAlexander Bulekov * The QEMU fuzzing binary is built with all available targets, each 265f6fd09aSAlexander Bulekov * with a unique @name that can be specified on the command-line to 275f6fd09aSAlexander Bulekov * select which target should run. 285f6fd09aSAlexander Bulekov * 295f6fd09aSAlexander Bulekov * A target must implement ->fuzz() to process a random input. If QEMU 305f6fd09aSAlexander Bulekov * crashes in ->fuzz() then libfuzzer will record a failure. 315f6fd09aSAlexander Bulekov * 325f6fd09aSAlexander Bulekov * Fuzzing targets are registered with fuzz_add_target(): 335f6fd09aSAlexander Bulekov * 345f6fd09aSAlexander Bulekov * static const FuzzTarget fuzz_target = { 355f6fd09aSAlexander Bulekov * .name = "my-device-fifo", 365f6fd09aSAlexander Bulekov * .description = "Fuzz the FIFO buffer registers of my-device", 375f6fd09aSAlexander Bulekov * ... 385f6fd09aSAlexander Bulekov * }; 395f6fd09aSAlexander Bulekov * 405f6fd09aSAlexander Bulekov * static void register_fuzz_target(void) 415f6fd09aSAlexander Bulekov * { 425f6fd09aSAlexander Bulekov * fuzz_add_target(&fuzz_target); 435f6fd09aSAlexander Bulekov * } 445f6fd09aSAlexander Bulekov * fuzz_target_init(register_fuzz_target); 455f6fd09aSAlexander Bulekov */ 465f6fd09aSAlexander Bulekov typedef struct FuzzTarget { 475f6fd09aSAlexander Bulekov const char *name; /* target identifier (passed to --fuzz-target=)*/ 485f6fd09aSAlexander Bulekov const char *description; /* help text */ 495f6fd09aSAlexander Bulekov 505f6fd09aSAlexander Bulekov 515f6fd09aSAlexander Bulekov /* 52*c2646d49SPhilippe Mathieu-Daudé * Returns the arguments that are passed to qemu/system init(). Freed by 53f5ec79f5SAlexander Bulekov * the caller. 545f6fd09aSAlexander Bulekov */ 55f5ec79f5SAlexander Bulekov GString *(*get_init_cmdline)(struct FuzzTarget *); 565f6fd09aSAlexander Bulekov 575f6fd09aSAlexander Bulekov /* 58*c2646d49SPhilippe Mathieu-Daudé * will run once, prior to running qemu/system init. 595f6fd09aSAlexander Bulekov * eg: set up shared-memory for communication with the child-process 605f6fd09aSAlexander Bulekov * Can be NULL 615f6fd09aSAlexander Bulekov */ 625f6fd09aSAlexander Bulekov void(*pre_vm_init)(void); 635f6fd09aSAlexander Bulekov 645f6fd09aSAlexander Bulekov /* 655f6fd09aSAlexander Bulekov * will run once, after QEMU has been initialized, prior to the fuzz-loop. 665f6fd09aSAlexander Bulekov * eg: detect the memory map 675f6fd09aSAlexander Bulekov * Can be NULL 685f6fd09aSAlexander Bulekov */ 695f6fd09aSAlexander Bulekov void(*pre_fuzz)(QTestState *); 705f6fd09aSAlexander Bulekov 715f6fd09aSAlexander Bulekov /* 725f6fd09aSAlexander Bulekov * accepts and executes an input from libfuzzer. this is repeatedly 735f6fd09aSAlexander Bulekov * executed during the fuzzing loop. Its should handle setup, input 745f6fd09aSAlexander Bulekov * execution and cleanup. 755f6fd09aSAlexander Bulekov * Cannot be NULL 765f6fd09aSAlexander Bulekov */ 775f6fd09aSAlexander Bulekov void(*fuzz)(QTestState *, const unsigned char *, size_t); 785f6fd09aSAlexander Bulekov 79f81cb729SAlexander Bulekov /* 80f81cb729SAlexander Bulekov * The fuzzer can specify a "Custom Crossover" function for combining two 81f81cb729SAlexander Bulekov * inputs from the corpus. This function is sometimes called by libfuzzer 82f81cb729SAlexander Bulekov * when mutating inputs. 83f81cb729SAlexander Bulekov * 84f81cb729SAlexander Bulekov * data1: location of first input 85f81cb729SAlexander Bulekov * size1: length of first input 86f81cb729SAlexander Bulekov * data1: location of second input 87f81cb729SAlexander Bulekov * size1: length of second input 88f81cb729SAlexander Bulekov * out: where to place the resulting, mutated input 89f81cb729SAlexander Bulekov * max_out_size: the maximum length of the input that can be placed in out 90f81cb729SAlexander Bulekov * seed: the seed that should be used to make mutations deterministic, when 91f81cb729SAlexander Bulekov * needed 92f81cb729SAlexander Bulekov * 93f81cb729SAlexander Bulekov * See libfuzzer's LLVMFuzzerCustomCrossOver API for more info. 94f81cb729SAlexander Bulekov * 95f81cb729SAlexander Bulekov * Can be NULL 96f81cb729SAlexander Bulekov */ 97f81cb729SAlexander Bulekov size_t(*crossover)(const uint8_t *data1, size_t size1, 98f81cb729SAlexander Bulekov const uint8_t *data2, size_t size2, 99f81cb729SAlexander Bulekov uint8_t *out, size_t max_out_size, 100f81cb729SAlexander Bulekov unsigned int seed); 101f81cb729SAlexander Bulekov 10282849bcfSAlexander Bulekov void *opaque; 1035f6fd09aSAlexander Bulekov } FuzzTarget; 1045f6fd09aSAlexander Bulekov 1055f6fd09aSAlexander Bulekov void flush_events(QTestState *); 1068d1e76b3SAlexander Bulekov void fuzz_reset(QTestState *); 1075f6fd09aSAlexander Bulekov 108d92e1b6dSAlexander Bulekov /* Use the QTest ASCII protocol or call address_space API directly?*/ 109d92e1b6dSAlexander Bulekov void fuzz_qtest_set_serialize(bool option); 110d92e1b6dSAlexander Bulekov 1115f6fd09aSAlexander Bulekov /* 1125f6fd09aSAlexander Bulekov * makes a copy of *target and adds it to the target-list. 1135f6fd09aSAlexander Bulekov * i.e. fine to set up target on the caller's stack 1145f6fd09aSAlexander Bulekov */ 1155f6fd09aSAlexander Bulekov void fuzz_add_target(const FuzzTarget *target); 1165f6fd09aSAlexander Bulekov 117f81cb729SAlexander Bulekov size_t LLVMFuzzerCustomCrossOver(const uint8_t *data1, size_t size1, 118f81cb729SAlexander Bulekov const uint8_t *data2, size_t size2, 119f81cb729SAlexander Bulekov uint8_t *out, size_t max_out_size, 120f81cb729SAlexander Bulekov unsigned int seed); 1215f6fd09aSAlexander Bulekov int LLVMFuzzerTestOneInput(const unsigned char *Data, size_t Size); 1225f6fd09aSAlexander Bulekov int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp); 1235f6fd09aSAlexander Bulekov 1245f6fd09aSAlexander Bulekov #endif 125