xref: /qemu/tests/qtest/fuzz/fuzz.h (revision 82849bcf30b5a1dfac6c1d7642a243c2f7bd6a6f)
15f6fd09aSAlexander Bulekov /*
25f6fd09aSAlexander Bulekov  * fuzzing driver
35f6fd09aSAlexander Bulekov  *
45f6fd09aSAlexander Bulekov  * Copyright Red Hat Inc., 2019
55f6fd09aSAlexander Bulekov  *
65f6fd09aSAlexander Bulekov  * Authors:
75f6fd09aSAlexander Bulekov  *  Alexander Bulekov   <alxndr@bu.edu>
85f6fd09aSAlexander Bulekov  *
95f6fd09aSAlexander Bulekov  * This work is licensed under the terms of the GNU GPL, version 2 or later.
105f6fd09aSAlexander Bulekov  * See the COPYING file in the top-level directory.
115f6fd09aSAlexander Bulekov  *
125f6fd09aSAlexander Bulekov  */
135f6fd09aSAlexander Bulekov 
145f6fd09aSAlexander Bulekov #ifndef FUZZER_H_
155f6fd09aSAlexander Bulekov #define FUZZER_H_
165f6fd09aSAlexander Bulekov 
175f6fd09aSAlexander Bulekov #include "qemu/osdep.h"
185f6fd09aSAlexander Bulekov #include "qemu/units.h"
195f6fd09aSAlexander Bulekov #include "qapi/error.h"
205f6fd09aSAlexander Bulekov 
21a2ce7dbdSPaolo Bonzini #include "tests/qtest/libqos/libqtest.h"
225f6fd09aSAlexander Bulekov 
235f6fd09aSAlexander Bulekov /**
245f6fd09aSAlexander Bulekov  * A libfuzzer fuzzing target
255f6fd09aSAlexander Bulekov  *
265f6fd09aSAlexander Bulekov  * The QEMU fuzzing binary is built with all available targets, each
275f6fd09aSAlexander Bulekov  * with a unique @name that can be specified on the command-line to
285f6fd09aSAlexander Bulekov  * select which target should run.
295f6fd09aSAlexander Bulekov  *
305f6fd09aSAlexander Bulekov  * A target must implement ->fuzz() to process a random input.  If QEMU
315f6fd09aSAlexander Bulekov  * crashes in ->fuzz() then libfuzzer will record a failure.
325f6fd09aSAlexander Bulekov  *
335f6fd09aSAlexander Bulekov  * Fuzzing targets are registered with fuzz_add_target():
345f6fd09aSAlexander Bulekov  *
355f6fd09aSAlexander Bulekov  *   static const FuzzTarget fuzz_target = {
365f6fd09aSAlexander Bulekov  *       .name = "my-device-fifo",
375f6fd09aSAlexander Bulekov  *       .description = "Fuzz the FIFO buffer registers of my-device",
385f6fd09aSAlexander Bulekov  *       ...
395f6fd09aSAlexander Bulekov  *   };
405f6fd09aSAlexander Bulekov  *
415f6fd09aSAlexander Bulekov  *   static void register_fuzz_target(void)
425f6fd09aSAlexander Bulekov  *   {
435f6fd09aSAlexander Bulekov  *       fuzz_add_target(&fuzz_target);
445f6fd09aSAlexander Bulekov  *   }
455f6fd09aSAlexander Bulekov  *   fuzz_target_init(register_fuzz_target);
465f6fd09aSAlexander Bulekov  */
475f6fd09aSAlexander Bulekov typedef struct FuzzTarget {
485f6fd09aSAlexander Bulekov     const char *name;         /* target identifier (passed to --fuzz-target=)*/
495f6fd09aSAlexander Bulekov     const char *description;  /* help text */
505f6fd09aSAlexander Bulekov 
515f6fd09aSAlexander Bulekov 
525f6fd09aSAlexander Bulekov     /*
53f5ec79f5SAlexander Bulekov      * Returns the arguments that are passed to qemu/softmmu init(). Freed by
54f5ec79f5SAlexander Bulekov      * the caller.
555f6fd09aSAlexander Bulekov      */
56f5ec79f5SAlexander Bulekov     GString *(*get_init_cmdline)(struct FuzzTarget *);
575f6fd09aSAlexander Bulekov 
585f6fd09aSAlexander Bulekov     /*
595f6fd09aSAlexander Bulekov      * will run once, prior to running qemu/softmmu init.
605f6fd09aSAlexander Bulekov      * eg: set up shared-memory for communication with the child-process
615f6fd09aSAlexander Bulekov      * Can be NULL
625f6fd09aSAlexander Bulekov      */
635f6fd09aSAlexander Bulekov     void(*pre_vm_init)(void);
645f6fd09aSAlexander Bulekov 
655f6fd09aSAlexander Bulekov     /*
665f6fd09aSAlexander Bulekov      * will run once, after QEMU has been initialized, prior to the fuzz-loop.
675f6fd09aSAlexander Bulekov      * eg: detect the memory map
685f6fd09aSAlexander Bulekov      * Can be NULL
695f6fd09aSAlexander Bulekov      */
705f6fd09aSAlexander Bulekov     void(*pre_fuzz)(QTestState *);
715f6fd09aSAlexander Bulekov 
725f6fd09aSAlexander Bulekov     /*
735f6fd09aSAlexander Bulekov      * accepts and executes an input from libfuzzer. this is repeatedly
745f6fd09aSAlexander Bulekov      * executed during the fuzzing loop. Its should handle setup, input
755f6fd09aSAlexander Bulekov      * execution and cleanup.
765f6fd09aSAlexander Bulekov      * Cannot be NULL
775f6fd09aSAlexander Bulekov      */
785f6fd09aSAlexander Bulekov     void(*fuzz)(QTestState *, const unsigned char *, size_t);
795f6fd09aSAlexander Bulekov 
80f81cb729SAlexander Bulekov     /*
81f81cb729SAlexander Bulekov      * The fuzzer can specify a "Custom Crossover" function for combining two
82f81cb729SAlexander Bulekov      * inputs from the corpus. This function is sometimes called by libfuzzer
83f81cb729SAlexander Bulekov      * when mutating inputs.
84f81cb729SAlexander Bulekov      *
85f81cb729SAlexander Bulekov      * data1: location of first input
86f81cb729SAlexander Bulekov      * size1: length of first input
87f81cb729SAlexander Bulekov      * data1: location of second input
88f81cb729SAlexander Bulekov      * size1: length of second input
89f81cb729SAlexander Bulekov      * out: where to place the resulting, mutated input
90f81cb729SAlexander Bulekov      * max_out_size: the maximum length of the input that can be placed in out
91f81cb729SAlexander Bulekov      * seed: the seed that should be used to make mutations deterministic, when
92f81cb729SAlexander Bulekov      *       needed
93f81cb729SAlexander Bulekov      *
94f81cb729SAlexander Bulekov      * See libfuzzer's LLVMFuzzerCustomCrossOver API for more info.
95f81cb729SAlexander Bulekov      *
96f81cb729SAlexander Bulekov      * Can be NULL
97f81cb729SAlexander Bulekov      */
98f81cb729SAlexander Bulekov     size_t(*crossover)(const uint8_t *data1, size_t size1,
99f81cb729SAlexander Bulekov                        const uint8_t *data2, size_t size2,
100f81cb729SAlexander Bulekov                        uint8_t *out, size_t max_out_size,
101f81cb729SAlexander Bulekov                        unsigned int seed);
102f81cb729SAlexander Bulekov 
103*82849bcfSAlexander Bulekov     void *opaque;
1045f6fd09aSAlexander Bulekov } FuzzTarget;
1055f6fd09aSAlexander Bulekov 
1065f6fd09aSAlexander Bulekov void flush_events(QTestState *);
1075f6fd09aSAlexander Bulekov void reboot(QTestState *);
1085f6fd09aSAlexander Bulekov 
109d92e1b6dSAlexander Bulekov /* Use the QTest ASCII protocol or call address_space API directly?*/
110d92e1b6dSAlexander Bulekov void fuzz_qtest_set_serialize(bool option);
111d92e1b6dSAlexander Bulekov 
1125f6fd09aSAlexander Bulekov /*
1135f6fd09aSAlexander Bulekov  * makes a copy of *target and adds it to the target-list.
1145f6fd09aSAlexander Bulekov  * i.e. fine to set up target on the caller's stack
1155f6fd09aSAlexander Bulekov  */
1165f6fd09aSAlexander Bulekov void fuzz_add_target(const FuzzTarget *target);
1175f6fd09aSAlexander Bulekov 
118f81cb729SAlexander Bulekov size_t LLVMFuzzerCustomCrossOver(const uint8_t *data1, size_t size1,
119f81cb729SAlexander Bulekov                                  const uint8_t *data2, size_t size2,
120f81cb729SAlexander Bulekov                                  uint8_t *out, size_t max_out_size,
121f81cb729SAlexander Bulekov                                  unsigned int seed);
1225f6fd09aSAlexander Bulekov int LLVMFuzzerTestOneInput(const unsigned char *Data, size_t Size);
1235f6fd09aSAlexander Bulekov int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp);
1245f6fd09aSAlexander Bulekov 
1255f6fd09aSAlexander Bulekov #endif
1265f6fd09aSAlexander Bulekov 
127