xref: /qemu/tests/qtest/fuzz/fuzz.h (revision 1527c6b6fa6c6775523287e33f78b41afc7ba46c)
15f6fd09aSAlexander Bulekov /*
25f6fd09aSAlexander Bulekov  * fuzzing driver
35f6fd09aSAlexander Bulekov  *
45f6fd09aSAlexander Bulekov  * Copyright Red Hat Inc., 2019
55f6fd09aSAlexander Bulekov  *
65f6fd09aSAlexander Bulekov  * Authors:
75f6fd09aSAlexander Bulekov  *  Alexander Bulekov   <alxndr@bu.edu>
85f6fd09aSAlexander Bulekov  *
95f6fd09aSAlexander Bulekov  * This work is licensed under the terms of the GNU GPL, version 2 or later.
105f6fd09aSAlexander Bulekov  * See the COPYING file in the top-level directory.
115f6fd09aSAlexander Bulekov  *
125f6fd09aSAlexander Bulekov  */
135f6fd09aSAlexander Bulekov 
1452581c71SMarkus Armbruster #ifndef QTEST_FUZZ_H
1552581c71SMarkus Armbruster #define QTEST_FUZZ_H
165f6fd09aSAlexander Bulekov 
175f6fd09aSAlexander Bulekov #include "qemu/units.h"
185f6fd09aSAlexander Bulekov #include "qapi/error.h"
195f6fd09aSAlexander Bulekov 
20907b5105SMarc-André Lureau #include "tests/qtest/libqtest.h"
215f6fd09aSAlexander Bulekov 
225f6fd09aSAlexander Bulekov /**
235f6fd09aSAlexander Bulekov  * A libfuzzer fuzzing target
245f6fd09aSAlexander Bulekov  *
255f6fd09aSAlexander Bulekov  * The QEMU fuzzing binary is built with all available targets, each
265f6fd09aSAlexander Bulekov  * with a unique @name that can be specified on the command-line to
275f6fd09aSAlexander Bulekov  * select which target should run.
285f6fd09aSAlexander Bulekov  *
295f6fd09aSAlexander Bulekov  * A target must implement ->fuzz() to process a random input.  If QEMU
305f6fd09aSAlexander Bulekov  * crashes in ->fuzz() then libfuzzer will record a failure.
315f6fd09aSAlexander Bulekov  *
325f6fd09aSAlexander Bulekov  * Fuzzing targets are registered with fuzz_add_target():
335f6fd09aSAlexander Bulekov  *
345f6fd09aSAlexander Bulekov  *   static const FuzzTarget fuzz_target = {
355f6fd09aSAlexander Bulekov  *       .name = "my-device-fifo",
365f6fd09aSAlexander Bulekov  *       .description = "Fuzz the FIFO buffer registers of my-device",
375f6fd09aSAlexander Bulekov  *       ...
385f6fd09aSAlexander Bulekov  *   };
395f6fd09aSAlexander Bulekov  *
405f6fd09aSAlexander Bulekov  *   static void register_fuzz_target(void)
415f6fd09aSAlexander Bulekov  *   {
425f6fd09aSAlexander Bulekov  *       fuzz_add_target(&fuzz_target);
435f6fd09aSAlexander Bulekov  *   }
445f6fd09aSAlexander Bulekov  *   fuzz_target_init(register_fuzz_target);
455f6fd09aSAlexander Bulekov  */
465f6fd09aSAlexander Bulekov typedef struct FuzzTarget {
475f6fd09aSAlexander Bulekov     const char *name;         /* target identifier (passed to --fuzz-target=)*/
485f6fd09aSAlexander Bulekov     const char *description;  /* help text */
495f6fd09aSAlexander Bulekov 
505f6fd09aSAlexander Bulekov 
515f6fd09aSAlexander Bulekov     /*
52*c2646d49SPhilippe Mathieu-Daudé      * Returns the arguments that are passed to qemu/system init(). Freed by
53f5ec79f5SAlexander Bulekov      * the caller.
545f6fd09aSAlexander Bulekov      */
55f5ec79f5SAlexander Bulekov     GString *(*get_init_cmdline)(struct FuzzTarget *);
565f6fd09aSAlexander Bulekov 
575f6fd09aSAlexander Bulekov     /*
58*c2646d49SPhilippe Mathieu-Daudé      * will run once, prior to running qemu/system init.
595f6fd09aSAlexander Bulekov      * eg: set up shared-memory for communication with the child-process
605f6fd09aSAlexander Bulekov      * Can be NULL
615f6fd09aSAlexander Bulekov      */
625f6fd09aSAlexander Bulekov     void(*pre_vm_init)(void);
635f6fd09aSAlexander Bulekov 
645f6fd09aSAlexander Bulekov     /*
655f6fd09aSAlexander Bulekov      * will run once, after QEMU has been initialized, prior to the fuzz-loop.
665f6fd09aSAlexander Bulekov      * eg: detect the memory map
675f6fd09aSAlexander Bulekov      * Can be NULL
685f6fd09aSAlexander Bulekov      */
695f6fd09aSAlexander Bulekov     void(*pre_fuzz)(QTestState *);
705f6fd09aSAlexander Bulekov 
715f6fd09aSAlexander Bulekov     /*
725f6fd09aSAlexander Bulekov      * accepts and executes an input from libfuzzer. this is repeatedly
735f6fd09aSAlexander Bulekov      * executed during the fuzzing loop. Its should handle setup, input
745f6fd09aSAlexander Bulekov      * execution and cleanup.
755f6fd09aSAlexander Bulekov      * Cannot be NULL
765f6fd09aSAlexander Bulekov      */
775f6fd09aSAlexander Bulekov     void(*fuzz)(QTestState *, const unsigned char *, size_t);
785f6fd09aSAlexander Bulekov 
79f81cb729SAlexander Bulekov     /*
80f81cb729SAlexander Bulekov      * The fuzzer can specify a "Custom Crossover" function for combining two
81f81cb729SAlexander Bulekov      * inputs from the corpus. This function is sometimes called by libfuzzer
82f81cb729SAlexander Bulekov      * when mutating inputs.
83f81cb729SAlexander Bulekov      *
84f81cb729SAlexander Bulekov      * data1: location of first input
85f81cb729SAlexander Bulekov      * size1: length of first input
86f81cb729SAlexander Bulekov      * data1: location of second input
87f81cb729SAlexander Bulekov      * size1: length of second input
88f81cb729SAlexander Bulekov      * out: where to place the resulting, mutated input
89f81cb729SAlexander Bulekov      * max_out_size: the maximum length of the input that can be placed in out
90f81cb729SAlexander Bulekov      * seed: the seed that should be used to make mutations deterministic, when
91f81cb729SAlexander Bulekov      *       needed
92f81cb729SAlexander Bulekov      *
93f81cb729SAlexander Bulekov      * See libfuzzer's LLVMFuzzerCustomCrossOver API for more info.
94f81cb729SAlexander Bulekov      *
95f81cb729SAlexander Bulekov      * Can be NULL
96f81cb729SAlexander Bulekov      */
97f81cb729SAlexander Bulekov     size_t(*crossover)(const uint8_t *data1, size_t size1,
98f81cb729SAlexander Bulekov                        const uint8_t *data2, size_t size2,
99f81cb729SAlexander Bulekov                        uint8_t *out, size_t max_out_size,
100f81cb729SAlexander Bulekov                        unsigned int seed);
101f81cb729SAlexander Bulekov 
10282849bcfSAlexander Bulekov     void *opaque;
1035f6fd09aSAlexander Bulekov } FuzzTarget;
1045f6fd09aSAlexander Bulekov 
1055f6fd09aSAlexander Bulekov void flush_events(QTestState *);
1068d1e76b3SAlexander Bulekov void fuzz_reset(QTestState *);
1075f6fd09aSAlexander Bulekov 
108d92e1b6dSAlexander Bulekov /* Use the QTest ASCII protocol or call address_space API directly?*/
109d92e1b6dSAlexander Bulekov void fuzz_qtest_set_serialize(bool option);
110d92e1b6dSAlexander Bulekov 
1115f6fd09aSAlexander Bulekov /*
1125f6fd09aSAlexander Bulekov  * makes a copy of *target and adds it to the target-list.
1135f6fd09aSAlexander Bulekov  * i.e. fine to set up target on the caller's stack
1145f6fd09aSAlexander Bulekov  */
1155f6fd09aSAlexander Bulekov void fuzz_add_target(const FuzzTarget *target);
1165f6fd09aSAlexander Bulekov 
117f81cb729SAlexander Bulekov size_t LLVMFuzzerCustomCrossOver(const uint8_t *data1, size_t size1,
118f81cb729SAlexander Bulekov                                  const uint8_t *data2, size_t size2,
119f81cb729SAlexander Bulekov                                  uint8_t *out, size_t max_out_size,
120f81cb729SAlexander Bulekov                                  unsigned int seed);
1215f6fd09aSAlexander Bulekov int LLVMFuzzerTestOneInput(const unsigned char *Data, size_t Size);
1225f6fd09aSAlexander Bulekov int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp);
1235f6fd09aSAlexander Bulekov 
1245f6fd09aSAlexander Bulekov #endif
125