15f6fd09aSAlexander Bulekov /* 25f6fd09aSAlexander Bulekov * fuzzing driver 35f6fd09aSAlexander Bulekov * 45f6fd09aSAlexander Bulekov * Copyright Red Hat Inc., 2019 55f6fd09aSAlexander Bulekov * 65f6fd09aSAlexander Bulekov * Authors: 75f6fd09aSAlexander Bulekov * Alexander Bulekov <alxndr@bu.edu> 85f6fd09aSAlexander Bulekov * 95f6fd09aSAlexander Bulekov * This work is licensed under the terms of the GNU GPL, version 2 or later. 105f6fd09aSAlexander Bulekov * See the COPYING file in the top-level directory. 115f6fd09aSAlexander Bulekov * 125f6fd09aSAlexander Bulekov */ 135f6fd09aSAlexander Bulekov 145f6fd09aSAlexander Bulekov #ifndef FUZZER_H_ 155f6fd09aSAlexander Bulekov #define FUZZER_H_ 165f6fd09aSAlexander Bulekov 175f6fd09aSAlexander Bulekov #include "qemu/osdep.h" 185f6fd09aSAlexander Bulekov #include "qemu/units.h" 195f6fd09aSAlexander Bulekov #include "qapi/error.h" 205f6fd09aSAlexander Bulekov 215f6fd09aSAlexander Bulekov #include "tests/qtest/libqtest.h" 225f6fd09aSAlexander Bulekov 235f6fd09aSAlexander Bulekov /** 245f6fd09aSAlexander Bulekov * A libfuzzer fuzzing target 255f6fd09aSAlexander Bulekov * 265f6fd09aSAlexander Bulekov * The QEMU fuzzing binary is built with all available targets, each 275f6fd09aSAlexander Bulekov * with a unique @name that can be specified on the command-line to 285f6fd09aSAlexander Bulekov * select which target should run. 295f6fd09aSAlexander Bulekov * 305f6fd09aSAlexander Bulekov * A target must implement ->fuzz() to process a random input. If QEMU 315f6fd09aSAlexander Bulekov * crashes in ->fuzz() then libfuzzer will record a failure. 325f6fd09aSAlexander Bulekov * 335f6fd09aSAlexander Bulekov * Fuzzing targets are registered with fuzz_add_target(): 345f6fd09aSAlexander Bulekov * 355f6fd09aSAlexander Bulekov * static const FuzzTarget fuzz_target = { 365f6fd09aSAlexander Bulekov * .name = "my-device-fifo", 375f6fd09aSAlexander Bulekov * .description = "Fuzz the FIFO buffer registers of my-device", 385f6fd09aSAlexander Bulekov * ... 395f6fd09aSAlexander Bulekov * }; 405f6fd09aSAlexander Bulekov * 415f6fd09aSAlexander Bulekov * static void register_fuzz_target(void) 425f6fd09aSAlexander Bulekov * { 435f6fd09aSAlexander Bulekov * fuzz_add_target(&fuzz_target); 445f6fd09aSAlexander Bulekov * } 455f6fd09aSAlexander Bulekov * fuzz_target_init(register_fuzz_target); 465f6fd09aSAlexander Bulekov */ 475f6fd09aSAlexander Bulekov typedef struct FuzzTarget { 485f6fd09aSAlexander Bulekov const char *name; /* target identifier (passed to --fuzz-target=)*/ 495f6fd09aSAlexander Bulekov const char *description; /* help text */ 505f6fd09aSAlexander Bulekov 515f6fd09aSAlexander Bulekov 525f6fd09aSAlexander Bulekov /* 53*f5ec79f5SAlexander Bulekov * Returns the arguments that are passed to qemu/softmmu init(). Freed by 54*f5ec79f5SAlexander Bulekov * the caller. 555f6fd09aSAlexander Bulekov */ 56*f5ec79f5SAlexander Bulekov GString *(*get_init_cmdline)(struct FuzzTarget *); 575f6fd09aSAlexander Bulekov 585f6fd09aSAlexander Bulekov /* 595f6fd09aSAlexander Bulekov * will run once, prior to running qemu/softmmu init. 605f6fd09aSAlexander Bulekov * eg: set up shared-memory for communication with the child-process 615f6fd09aSAlexander Bulekov * Can be NULL 625f6fd09aSAlexander Bulekov */ 635f6fd09aSAlexander Bulekov void(*pre_vm_init)(void); 645f6fd09aSAlexander Bulekov 655f6fd09aSAlexander Bulekov /* 665f6fd09aSAlexander Bulekov * will run once, after QEMU has been initialized, prior to the fuzz-loop. 675f6fd09aSAlexander Bulekov * eg: detect the memory map 685f6fd09aSAlexander Bulekov * Can be NULL 695f6fd09aSAlexander Bulekov */ 705f6fd09aSAlexander Bulekov void(*pre_fuzz)(QTestState *); 715f6fd09aSAlexander Bulekov 725f6fd09aSAlexander Bulekov /* 735f6fd09aSAlexander Bulekov * accepts and executes an input from libfuzzer. this is repeatedly 745f6fd09aSAlexander Bulekov * executed during the fuzzing loop. Its should handle setup, input 755f6fd09aSAlexander Bulekov * execution and cleanup. 765f6fd09aSAlexander Bulekov * Cannot be NULL 775f6fd09aSAlexander Bulekov */ 785f6fd09aSAlexander Bulekov void(*fuzz)(QTestState *, const unsigned char *, size_t); 795f6fd09aSAlexander Bulekov 805f6fd09aSAlexander Bulekov } FuzzTarget; 815f6fd09aSAlexander Bulekov 825f6fd09aSAlexander Bulekov void flush_events(QTestState *); 835f6fd09aSAlexander Bulekov void reboot(QTestState *); 845f6fd09aSAlexander Bulekov 85d92e1b6dSAlexander Bulekov /* Use the QTest ASCII protocol or call address_space API directly?*/ 86d92e1b6dSAlexander Bulekov void fuzz_qtest_set_serialize(bool option); 87d92e1b6dSAlexander Bulekov 885f6fd09aSAlexander Bulekov /* 895f6fd09aSAlexander Bulekov * makes a copy of *target and adds it to the target-list. 905f6fd09aSAlexander Bulekov * i.e. fine to set up target on the caller's stack 915f6fd09aSAlexander Bulekov */ 925f6fd09aSAlexander Bulekov void fuzz_add_target(const FuzzTarget *target); 935f6fd09aSAlexander Bulekov 945f6fd09aSAlexander Bulekov int LLVMFuzzerTestOneInput(const unsigned char *Data, size_t Size); 955f6fd09aSAlexander Bulekov int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp); 965f6fd09aSAlexander Bulekov 975f6fd09aSAlexander Bulekov #endif 985f6fd09aSAlexander Bulekov 99