xref: /qemu/tests/qtest/fuzz/fuzz.h (revision f5ec79f5e0a3a307fc2a11b3ba8066a2d0a90233)
15f6fd09aSAlexander Bulekov /*
25f6fd09aSAlexander Bulekov  * fuzzing driver
35f6fd09aSAlexander Bulekov  *
45f6fd09aSAlexander Bulekov  * Copyright Red Hat Inc., 2019
55f6fd09aSAlexander Bulekov  *
65f6fd09aSAlexander Bulekov  * Authors:
75f6fd09aSAlexander Bulekov  *  Alexander Bulekov   <alxndr@bu.edu>
85f6fd09aSAlexander Bulekov  *
95f6fd09aSAlexander Bulekov  * This work is licensed under the terms of the GNU GPL, version 2 or later.
105f6fd09aSAlexander Bulekov  * See the COPYING file in the top-level directory.
115f6fd09aSAlexander Bulekov  *
125f6fd09aSAlexander Bulekov  */
135f6fd09aSAlexander Bulekov 
145f6fd09aSAlexander Bulekov #ifndef FUZZER_H_
155f6fd09aSAlexander Bulekov #define FUZZER_H_
165f6fd09aSAlexander Bulekov 
175f6fd09aSAlexander Bulekov #include "qemu/osdep.h"
185f6fd09aSAlexander Bulekov #include "qemu/units.h"
195f6fd09aSAlexander Bulekov #include "qapi/error.h"
205f6fd09aSAlexander Bulekov 
215f6fd09aSAlexander Bulekov #include "tests/qtest/libqtest.h"
225f6fd09aSAlexander Bulekov 
235f6fd09aSAlexander Bulekov /**
245f6fd09aSAlexander Bulekov  * A libfuzzer fuzzing target
255f6fd09aSAlexander Bulekov  *
265f6fd09aSAlexander Bulekov  * The QEMU fuzzing binary is built with all available targets, each
275f6fd09aSAlexander Bulekov  * with a unique @name that can be specified on the command-line to
285f6fd09aSAlexander Bulekov  * select which target should run.
295f6fd09aSAlexander Bulekov  *
305f6fd09aSAlexander Bulekov  * A target must implement ->fuzz() to process a random input.  If QEMU
315f6fd09aSAlexander Bulekov  * crashes in ->fuzz() then libfuzzer will record a failure.
325f6fd09aSAlexander Bulekov  *
335f6fd09aSAlexander Bulekov  * Fuzzing targets are registered with fuzz_add_target():
345f6fd09aSAlexander Bulekov  *
355f6fd09aSAlexander Bulekov  *   static const FuzzTarget fuzz_target = {
365f6fd09aSAlexander Bulekov  *       .name = "my-device-fifo",
375f6fd09aSAlexander Bulekov  *       .description = "Fuzz the FIFO buffer registers of my-device",
385f6fd09aSAlexander Bulekov  *       ...
395f6fd09aSAlexander Bulekov  *   };
405f6fd09aSAlexander Bulekov  *
415f6fd09aSAlexander Bulekov  *   static void register_fuzz_target(void)
425f6fd09aSAlexander Bulekov  *   {
435f6fd09aSAlexander Bulekov  *       fuzz_add_target(&fuzz_target);
445f6fd09aSAlexander Bulekov  *   }
455f6fd09aSAlexander Bulekov  *   fuzz_target_init(register_fuzz_target);
465f6fd09aSAlexander Bulekov  */
475f6fd09aSAlexander Bulekov typedef struct FuzzTarget {
485f6fd09aSAlexander Bulekov     const char *name;         /* target identifier (passed to --fuzz-target=)*/
495f6fd09aSAlexander Bulekov     const char *description;  /* help text */
505f6fd09aSAlexander Bulekov 
515f6fd09aSAlexander Bulekov 
525f6fd09aSAlexander Bulekov     /*
53*f5ec79f5SAlexander Bulekov      * Returns the arguments that are passed to qemu/softmmu init(). Freed by
54*f5ec79f5SAlexander Bulekov      * the caller.
555f6fd09aSAlexander Bulekov      */
56*f5ec79f5SAlexander Bulekov     GString *(*get_init_cmdline)(struct FuzzTarget *);
575f6fd09aSAlexander Bulekov 
585f6fd09aSAlexander Bulekov     /*
595f6fd09aSAlexander Bulekov      * will run once, prior to running qemu/softmmu init.
605f6fd09aSAlexander Bulekov      * eg: set up shared-memory for communication with the child-process
615f6fd09aSAlexander Bulekov      * Can be NULL
625f6fd09aSAlexander Bulekov      */
635f6fd09aSAlexander Bulekov     void(*pre_vm_init)(void);
645f6fd09aSAlexander Bulekov 
655f6fd09aSAlexander Bulekov     /*
665f6fd09aSAlexander Bulekov      * will run once, after QEMU has been initialized, prior to the fuzz-loop.
675f6fd09aSAlexander Bulekov      * eg: detect the memory map
685f6fd09aSAlexander Bulekov      * Can be NULL
695f6fd09aSAlexander Bulekov      */
705f6fd09aSAlexander Bulekov     void(*pre_fuzz)(QTestState *);
715f6fd09aSAlexander Bulekov 
725f6fd09aSAlexander Bulekov     /*
735f6fd09aSAlexander Bulekov      * accepts and executes an input from libfuzzer. this is repeatedly
745f6fd09aSAlexander Bulekov      * executed during the fuzzing loop. Its should handle setup, input
755f6fd09aSAlexander Bulekov      * execution and cleanup.
765f6fd09aSAlexander Bulekov      * Cannot be NULL
775f6fd09aSAlexander Bulekov      */
785f6fd09aSAlexander Bulekov     void(*fuzz)(QTestState *, const unsigned char *, size_t);
795f6fd09aSAlexander Bulekov 
805f6fd09aSAlexander Bulekov } FuzzTarget;
815f6fd09aSAlexander Bulekov 
825f6fd09aSAlexander Bulekov void flush_events(QTestState *);
835f6fd09aSAlexander Bulekov void reboot(QTestState *);
845f6fd09aSAlexander Bulekov 
85d92e1b6dSAlexander Bulekov /* Use the QTest ASCII protocol or call address_space API directly?*/
86d92e1b6dSAlexander Bulekov void fuzz_qtest_set_serialize(bool option);
87d92e1b6dSAlexander Bulekov 
885f6fd09aSAlexander Bulekov /*
895f6fd09aSAlexander Bulekov  * makes a copy of *target and adds it to the target-list.
905f6fd09aSAlexander Bulekov  * i.e. fine to set up target on the caller's stack
915f6fd09aSAlexander Bulekov  */
925f6fd09aSAlexander Bulekov void fuzz_add_target(const FuzzTarget *target);
935f6fd09aSAlexander Bulekov 
945f6fd09aSAlexander Bulekov int LLVMFuzzerTestOneInput(const unsigned char *Data, size_t Size);
955f6fd09aSAlexander Bulekov int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp);
965f6fd09aSAlexander Bulekov 
975f6fd09aSAlexander Bulekov #endif
985f6fd09aSAlexander Bulekov 
99