fuzzing.rst 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305
  1. ========
  2. Fuzzing
  3. ========
  4. This document describes the virtual-device fuzzing infrastructure in QEMU and
  5. how to use it to implement additional fuzzers.
  6. Basics
  7. ------
  8. Fuzzing operates by passing inputs to an entry point/target function. The
  9. fuzzer tracks the code coverage triggered by the input. Based on these
  10. findings, the fuzzer mutates the input and repeats the fuzzing.
  11. To fuzz QEMU, we rely on libfuzzer. Unlike other fuzzers such as AFL, libfuzzer
  12. is an *in-process* fuzzer. For the developer, this means that it is their
  13. responsibility to ensure that state is reset between fuzzing-runs.
  14. Building the fuzzers
  15. --------------------
  16. To build the fuzzers, install a recent version of clang:
  17. Configure with (substitute the clang binaries with the version you installed).
  18. Here, enable-asan and enable-ubsan are optional but they allow us to reliably
  19. detect bugs such as out-of-bounds accesses, uses-after-free, double-frees
  20. etc.::
  21. CC=clang-8 CXX=clang++-8 /path/to/configure \
  22. --enable-fuzzing --enable-asan --enable-ubsan
  23. Fuzz targets are built similarly to system targets::
  24. make qemu-fuzz-i386
  25. This builds ``./qemu-fuzz-i386``
  26. The first option to this command is: ``--fuzz-target=FUZZ_NAME``
  27. To list all of the available fuzzers run ``qemu-fuzz-i386`` with no arguments.
  28. For example::
  29. ./qemu-fuzz-i386 --fuzz-target=virtio-scsi-fuzz
  30. Internally, libfuzzer parses all arguments that do not begin with ``"--"``.
  31. Information about these is available by passing ``-help=1``
  32. Now the only thing left to do is wait for the fuzzer to trigger potential
  33. crashes.
  34. Useful libFuzzer flags
  35. ----------------------
  36. As mentioned above, libFuzzer accepts some arguments. Passing ``-help=1`` will
  37. list the available arguments. In particular, these arguments might be helpful:
  38. * ``CORPUS_DIR/`` : Specify a directory as the last argument to libFuzzer.
  39. libFuzzer stores each "interesting" input in this corpus directory. The next
  40. time you run libFuzzer, it will read all of the inputs from the corpus, and
  41. continue fuzzing from there. You can also specify multiple directories.
  42. libFuzzer loads existing inputs from all specified directories, but will only
  43. write new ones to the first one specified.
  44. * ``-max_len=4096`` : specify the maximum byte-length of the inputs libFuzzer
  45. will generate.
  46. * ``-close_fd_mask={1,2,3}`` : close, stderr, or both. Useful for targets that
  47. trigger many debug/error messages, or create output on the serial console.
  48. * ``-jobs=4 -workers=4`` : These arguments configure libFuzzer to run 4 fuzzers in
  49. parallel (4 fuzzing jobs in 4 worker processes). Alternatively, with only
  50. ``-jobs=N``, libFuzzer automatically spawns a number of workers less than or equal
  51. to half the available CPU cores. Replace 4 with a number appropriate for your
  52. machine. Make sure to specify a ``CORPUS_DIR``, which will allow the parallel
  53. fuzzers to share information about the interesting inputs they find.
  54. * ``-use_value_profile=1`` : For each comparison operation, libFuzzer computes
  55. ``(caller_pc&4095) | (popcnt(Arg1 ^ Arg2) << 12)`` and places this in the
  56. coverage table. Useful for targets with "magic" constants. If Arg1 came from
  57. the fuzzer's input and Arg2 is a magic constant, then each time the Hamming
  58. distance between Arg1 and Arg2 decreases, libFuzzer adds the input to the
  59. corpus.
  60. * ``-shrink=1`` : Tries to make elements of the corpus "smaller". Might lead to
  61. better coverage performance, depending on the target.
  62. Note that libFuzzer's exact behavior will depend on the version of
  63. clang and libFuzzer used to build the device fuzzers.
  64. Generating Coverage Reports
  65. ---------------------------
  66. Code coverage is a crucial metric for evaluating a fuzzer's performance.
  67. libFuzzer's output provides a "cov: " column that provides a total number of
  68. unique blocks/edges covered. To examine coverage on a line-by-line basis we
  69. can use Clang coverage:
  70. 1. Configure libFuzzer to store a corpus of all interesting inputs (see
  71. CORPUS_DIR above)
  72. 2. ``./configure`` the QEMU build with ::
  73. --enable-fuzzing \
  74. --extra-cflags="-fprofile-instr-generate -fcoverage-mapping"
  75. 3. Re-run the fuzzer. Specify $CORPUS_DIR/* as an argument, telling libfuzzer
  76. to execute all of the inputs in $CORPUS_DIR and exit. Once the process
  77. exits, you should find a file, "default.profraw" in the working directory.
  78. 4. Execute these commands to generate a detailed HTML coverage-report::
  79. llvm-profdata merge -output=default.profdata default.profraw
  80. llvm-cov show ./path/to/qemu-fuzz-i386 -instr-profile=default.profdata \
  81. --format html -output-dir=/path/to/output/report
  82. Adding a new fuzzer
  83. -------------------
  84. Coverage over virtual devices can be improved by adding additional fuzzers.
  85. Fuzzers are kept in ``tests/qtest/fuzz/`` and should be added to
  86. ``tests/qtest/fuzz/meson.build``
  87. Fuzzers can rely on both qtest and libqos to communicate with virtual devices.
  88. 1. Create a new source file. For example ``tests/qtest/fuzz/foo-device-fuzz.c``.
  89. 2. Write the fuzzing code using the libqtest/libqos API. See existing fuzzers
  90. for reference.
  91. 3. Add the fuzzer to ``tests/qtest/fuzz/meson.build``.
  92. Fuzzers can be more-or-less thought of as special qtest programs which can
  93. modify the qtest commands and/or qtest command arguments based on inputs
  94. provided by libfuzzer. Libfuzzer passes a byte array and length. Commonly the
  95. fuzzer loops over the byte-array interpreting it as a list of qtest commands,
  96. addresses, or values.
  97. The Generic Fuzzer
  98. ------------------
  99. Writing a fuzz target can be a lot of effort (especially if a device driver has
  100. not be built-out within libqos). Many devices can be fuzzed to some degree,
  101. without any device-specific code, using the generic-fuzz target.
  102. The generic-fuzz target is capable of fuzzing devices over their PIO, MMIO,
  103. and DMA input-spaces. To apply the generic-fuzz to a device, we need to define
  104. two env-variables, at minimum:
  105. * ``QEMU_FUZZ_ARGS=`` is the set of QEMU arguments used to configure a machine, with
  106. the device attached. For example, if we want to fuzz the virtio-net device
  107. attached to a pc-i440fx machine, we can specify::
  108. QEMU_FUZZ_ARGS="-M pc -nodefaults -netdev user,id=user0 \
  109. -device virtio-net,netdev=user0"
  110. * ``QEMU_FUZZ_OBJECTS=`` is a set of space-delimited strings used to identify
  111. the MemoryRegions that will be fuzzed. These strings are compared against
  112. MemoryRegion names and MemoryRegion owner names, to decide whether each
  113. MemoryRegion should be fuzzed. These strings support globbing. For the
  114. virtio-net example, we could use one of ::
  115. QEMU_FUZZ_OBJECTS='virtio-net'
  116. QEMU_FUZZ_OBJECTS='virtio*'
  117. QEMU_FUZZ_OBJECTS='virtio* pcspk' # Fuzz the virtio devices and the speaker
  118. QEMU_FUZZ_OBJECTS='*' # Fuzz the whole machine``
  119. The ``"info mtree"`` and ``"info qom-tree"`` monitor commands can be especially
  120. useful for identifying the ``MemoryRegion`` and ``Object`` names used for
  121. matching.
  122. As a generic rule-of-thumb, the more ``MemoryRegions``/Devices we match, the
  123. greater the input-space, and the smaller the probability of finding crashing
  124. inputs for individual devices. As such, it is usually a good idea to limit the
  125. fuzzer to only a few ``MemoryRegions``.
  126. To ensure that these env variables have been configured correctly, we can use::
  127. ./qemu-fuzz-i386 --fuzz-target=generic-fuzz -runs=0
  128. The output should contain a complete list of matched MemoryRegions.
  129. OSS-Fuzz
  130. --------
  131. QEMU is continuously fuzzed on `OSS-Fuzz
  132. <https://github.com/google/oss-fuzz>`_. By default, the OSS-Fuzz build
  133. will try to fuzz every fuzz-target. Since the generic-fuzz target
  134. requires additional information provided in environment variables, we
  135. pre-define some generic-fuzz configs in
  136. ``tests/qtest/fuzz/generic_fuzz_configs.h``. Each config must specify:
  137. - ``.name``: To identify the fuzzer config
  138. - ``.args`` OR ``.argfunc``: A string or pointer to a function returning a
  139. string. These strings are used to specify the ``QEMU_FUZZ_ARGS``
  140. environment variable. ``argfunc`` is useful when the config relies on e.g.
  141. a dynamically created temp directory, or a free tcp/udp port.
  142. - ``.objects``: A string that specifies the ``QEMU_FUZZ_OBJECTS`` environment
  143. variable.
  144. To fuzz additional devices/device configuration on OSS-Fuzz, send patches for
  145. either a new device-specific fuzzer or a new generic-fuzz config.
  146. Build details:
  147. - The Dockerfile that sets up the environment for building QEMU's
  148. fuzzers on OSS-Fuzz can be fund in the OSS-Fuzz repository
  149. __(https://github.com/google/oss-fuzz/blob/master/projects/qemu/Dockerfile)
  150. - The script responsible for building the fuzzers can be found in the
  151. QEMU source tree at ``scripts/oss-fuzz/build.sh``
  152. Building Crash Reproducers
  153. -----------------------------------------
  154. When we find a crash, we should try to create an independent reproducer, that
  155. can be used on a non-fuzzer build of QEMU. This filters out any potential
  156. false-positives, and improves the debugging experience for developers.
  157. Here are the steps for building a reproducer for a crash found by the
  158. generic-fuzz target.
  159. - Ensure the crash reproduces::
  160. qemu-fuzz-i386 --fuzz-target... ./crash-...
  161. - Gather the QTest output for the crash::
  162. QEMU_FUZZ_TIMEOUT=0 QTEST_LOG=1 FUZZ_SERIALIZE_QTEST=1 \
  163. qemu-fuzz-i386 --fuzz-target... ./crash-... &> /tmp/trace
  164. - Reorder and clean-up the resulting trace::
  165. scripts/oss-fuzz/reorder_fuzzer_qtest_trace.py /tmp/trace > /tmp/reproducer
  166. - Get the arguments needed to start qemu, and provide a path to qemu::
  167. less /tmp/trace # The args should be logged at the top of this file
  168. export QEMU_ARGS="-machine ..."
  169. export QEMU_PATH="path/to/qemu-system"
  170. - Ensure the crash reproduces in qemu-system::
  171. $QEMU_PATH $QEMU_ARGS -qtest stdio < /tmp/reproducer
  172. - From the crash output, obtain some string that identifies the crash. This
  173. can be a line in the stack-trace, for example::
  174. export CRASH_TOKEN="hw/usb/hcd-xhci.c:1865"
  175. - Minimize the reproducer::
  176. scripts/oss-fuzz/minimize_qtest_trace.py -M1 -M2 \
  177. /tmp/reproducer /tmp/reproducer-minimized
  178. - Confirm that the minimized reproducer still crashes::
  179. $QEMU_PATH $QEMU_ARGS -qtest stdio < /tmp/reproducer-minimized
  180. - Create a one-liner reproducer that can be sent over email::
  181. ./scripts/oss-fuzz/output_reproducer.py -bash /tmp/reproducer-minimized
  182. - Output the C source code for a test case that will reproduce the bug::
  183. ./scripts/oss-fuzz/output_reproducer.py -owner "John Smith <john@smith.com>"\
  184. -name "test_function_name" /tmp/reproducer-minimized
  185. - Report the bug and send a patch with the C reproducer upstream
  186. Implementation Details / Fuzzer Lifecycle
  187. -----------------------------------------
  188. The fuzzer has two entrypoints that libfuzzer calls. libfuzzer provides it's
  189. own ``main()``, which performs some setup, and calls the entrypoints:
  190. ``LLVMFuzzerInitialize``: called prior to fuzzing. Used to initialize all of the
  191. necessary state
  192. ``LLVMFuzzerTestOneInput``: called for each fuzzing run. Processes the input and
  193. resets the state at the end of each run.
  194. In more detail:
  195. ``LLVMFuzzerInitialize`` parses the arguments to the fuzzer (must start with two
  196. dashes, so they are ignored by libfuzzer ``main()``). Currently, the arguments
  197. select the fuzz target. Then, the qtest client is initialized. If the target
  198. requires qos, qgraph is set up and the QOM/LIBQOS modules are initialized.
  199. Then the QGraph is walked and the QEMU cmd_line is determined and saved.
  200. After this, the ``vl.c:main`` is called to set up the guest. There are
  201. target-specific hooks that can be called before and after main, for
  202. additional setup(e.g. PCI setup, or VM snapshotting).
  203. ``LLVMFuzzerTestOneInput``: Uses qtest/qos functions to act based on the fuzz
  204. input. It is also responsible for manually calling ``main_loop_wait`` to ensure
  205. that bottom halves are executed and any cleanup required before the next input.
  206. Since the same process is reused for many fuzzing runs, QEMU state needs to
  207. be reset at the end of each run. For example, this can be done by rebooting the
  208. VM, after each run.
  209. - *Pros*: Straightforward and fast for simple fuzz targets.
  210. - *Cons*: Depending on the device, does not reset all device state. If the
  211. device requires some initialization prior to being ready for fuzzing (common
  212. for QOS-based targets), this initialization needs to be done after each
  213. reboot.
  214. - *Example target*: ``i440fx-qtest-reboot-fuzz``