From patchwork Thu Nov 14 22:46:50 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Volodymyr Babchuk X-Patchwork-Id: 13875702 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 43921D6A254 for ; Thu, 14 Nov 2024 22:47:36 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.836832.1252735 (Exim 4.92) (envelope-from ) id 1tBicB-0007V1-UG; Thu, 14 Nov 2024 22:47:03 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 836832.1252735; Thu, 14 Nov 2024 22:47:03 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tBicB-0007Uu-Re; Thu, 14 Nov 2024 22:47:03 +0000 Received: by outflank-mailman (input) for mailman id 836832; Thu, 14 Nov 2024 22:47:02 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tBicA-0007UM-CX for xen-devel@lists.xenproject.org; Thu, 14 Nov 2024 22:47:02 +0000 Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on20622.outbound.protection.outlook.com [2a01:111:f403:2613::622]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 5a5c7b69-a2da-11ef-a0c7-8be0dac302b0; Thu, 14 Nov 2024 23:46:57 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by PA4PR03MB7229.eurprd03.prod.outlook.com (2603:10a6:102:10a::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8158.19; Thu, 14 Nov 2024 22:46:50 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%7]) with mapi id 15.20.8158.013; Thu, 14 Nov 2024 22:46:50 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 5a5c7b69-a2da-11ef-a0c7-8be0dac302b0 X-Custom-Connection: eyJyZW1vdGVpcCI6IjJhMDE6MTExOmY0MDM6MjYxMzo6NjIyIiwiaGVsbyI6IkVVUjA1LVZJMS1vYmUub3V0Ym91bmQucHJvdGVjdGlvbi5vdXRsb29rLmNvbSJ9 X-Custom-Transaction: eyJpZCI6IjVhNWM3YjY5LWEyZGEtMTFlZi1hMGM3LThiZTBkYWMzMDJiMCIsInRzIjoxNzMxNjI0NDE3LjYzNDMzMSwic2VuZGVyIjoidm9sb2R5bXlyX2JhYmNodWtAZXBhbS5jb20iLCJyZWNpcGllbnQiOiJ4ZW4tZGV2ZWxAbGlzdHMueGVucHJvamVjdC5vcmcifQ== ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=xSQtBbpTqAGAmtB4Ivx0TNTxu+G0QxYQg3CFqTXORYC6Cp4QTkILF/SoBENaFTwehArZ+K0RQW7Jsb7Ry8Y4E4H66ngojRW+O+ZSn/CsQkuA5bkhLxRegx+BvSJas9yFY4pk/txv0no0KxRRKQQBJsCtlFLsOcFTCJzP/k/GarAYUiH42QxO1TU2rwfQ8KILDRBvPYapgRd7rFDl6k1j/Gg0gSE/RiC6t9V1FpClwlCaazHdWnLrIewvZ1dWI01tilwMQCGUjDio2U9pddfR7TpuWhGo4ie82TBDuLTNBsZbXeCA/gfSrVrjAR0Ak/WoraPSxNVCw5LlFiSzJPtGsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bTwGWWosyBVRXFNlaD+HeGa7HUKQ1syR0zon0uY8oeo=; b=Ixx325zaT43h2eIMlBvhgOxgLi5WJyZ5KRAGA2S0ty/2UDpfqOGQvNNE9AjzsOmnI4TuWrwX/iazVGfDvo+2PEqi/8QdHsCzwFgIkEGCdedaDysH4ktY/+OOZhwS6gbHB8eND8HkOXaz5LbtXctvvxsgpn/VLgr8K4zMwyZafVvlkkIa8kLCN7afkQdx55GUdgX2Pfo6Rn2yTMGW0r8pzlnV181x/bITur/RCpiG4uj/X4dsYQe/nnurKVPeEuUid1fAtEemepLiyBkeYuI+e+OsnFnq8C/T+KlRz1VYel1DCKHk/RRQDJ5pgMJwsL8R1QtiFdfHUamBcOhQZpwh+Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bTwGWWosyBVRXFNlaD+HeGa7HUKQ1syR0zon0uY8oeo=; b=nOFWCgGT//SA3TFTM0lRhakYLvukFke9PrMtkUiO4PhmCTYtYrUFhR7Z71CTVW1VzN8rU/gAyvhfGCzolCCzmny4ELoGc5YILaks68PDliJPi5c6VeOYdd9tnzdgtiCwPLqpU0FSMMNZoW4axXS8C8XG/dC8dc1Q6Jm2r/yzZudiWcL4P6DRqCG22TYc2IlVcOWzbFnrqzL0pH7GSJoDTyy3DO0RiJsq1728lIb+Z2IJFcgr07V5vXakVIB3sKawzwqrwKr83wA0yJt85hyP1KCQxkFBHhKPRJcegjpiEDbf4CVc57ZGdRIHFKcaXA7dDmfpyET75S7EcGYIuDqbig== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Andrew Cooper , Jan Beulich , Julien Grall , Stefano Stabellini , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Dario Faggioli , Juergen Gross , George Dunlap Subject: [RFC PATCH] xen: add libafl-qemu fuzzer support Thread-Topic: [RFC PATCH] xen: add libafl-qemu fuzzer support Thread-Index: AQHbNucXRmUX3Y7lRUGcS7d55ZSXhw== Date: Thu, 14 Nov 2024 22:46:50 +0000 Message-ID: <20241114224636.1942089-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.0 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|PA4PR03MB7229:EE_ x-ms-office365-filtering-correlation-id: a0f35f86-832c-4ca5-2784-08dd04fe3a33 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|7416014|376014|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?vF4Bfu/xQGcIHVx88aQEO49b1c?= =?iso-8859-1?q?3Tzg56RR0v3r/jWF4WZr6IXStVHtceCXMDv3nMsx0khl2QRMQDl/xu8lKTMn?= =?iso-8859-1?q?LkC0C4ZosRubp76QF5ksLnU8Xxv9zxsN32E1AIv6GKyTpjIShuo2RCbl5TY0?= =?iso-8859-1?q?CU8mXlb/J5pQbDojOgjXYw9wZ7343DU68grw7PLcWhYb+cDjG2f5rnbWZyRz?= =?iso-8859-1?q?ulbNVlEQ5e6IxLqaYDMigLc5Y6f4wSk1B9hK8JQArZtqx3a8nhukJFuqYxh8?= =?iso-8859-1?q?Hd4d+hDE40DusD9EoiUy31g+aOWj4k+qlYPhbe7C3wJMBdVf1NoS4aY624oy?= =?iso-8859-1?q?VVQ9wlPxYOu801WCSa2yR0kDmjHpm79JRQFgRYhA4ALBxs8QoObnrtTNmjZl?= =?iso-8859-1?q?+XgtSYGL324YWbwiumO6YwDlf/C1DyQ/UCqR98UZVbih6HkdkJeejFF/o74w?= =?iso-8859-1?q?NBeTcSEVBYKocO2uo/9rVe1go6/PwHGtYRe7vtgIJhsp4E7bW7Q9xe6Sfzk9?= =?iso-8859-1?q?R9anBEDflk4KZiyyIA4JYqCjkVY1e0TzRPvj0VWGpxPbBkkN91c4NuK7Y70c?= =?iso-8859-1?q?+cxiZ9pY38upk69XwWNtPOTnp83ESRjCFsmPgwgO6f0QOWMiS7bTIfAMln8M?= =?iso-8859-1?q?X5LCogXh/fq96V26TRe9pPyQEBzDc3NQ0TJov9PBzuG6SUuhazj8ogGuAZwf?= =?iso-8859-1?q?ptaJptdALhC1KEAdQy1AVMoS6LhSc/QoWDuzHnh5Ad76UK1vJ/66jqRNMbJC?= =?iso-8859-1?q?515R9g81Ve4AirXuV/Hdy9sAHHA6kjycV2w5QmBSZI1Wx87lZ9qNWVBWCmL9?= =?iso-8859-1?q?R26vEnz/R63LuvPmtMObCQo/q0iCYJgKBlAR/E8AsSr9ngvdIfvsHnp/NvPf?= =?iso-8859-1?q?JuCGZTRaEv8289sFAip9BI49uABllQxRXp8sCVPZbheGLoIV8cQU9SgXt66K?= =?iso-8859-1?q?GT3PR/cyMjja/qMIkINyfm3l/Xbu/ii0RrKcxDPBv8ewDhQqCZSmEz0/WWWR?= =?iso-8859-1?q?0E7tmSYtXmarVfsC3ucMN5r6f8gmvf157V8vhglEk4Cs8HBiYhqpQgPT/dO7?= =?iso-8859-1?q?4JR1KcLbNxFaVGcisK0krf2IxEyblWNibd3K8UqJn4EhmP6PVx9EdJFiCL5G?= =?iso-8859-1?q?lPHuSgHyE2zCcNg1UcHWYbEVIBVZYNa28XXGqpO31/DqsZPQG151tC/txetR?= =?iso-8859-1?q?Z+KkqmmxiamMiESfw8e/0+ve0FM7qGHRAav9uk6lwwQsOdAaJc5X8gdF6OJ0?= =?iso-8859-1?q?Dz046AFODPCL+QsdJVCIyJ4Z9o+1nZGSE0xhbR/fOcEQQCby4lrWgdP6z8IC?= =?iso-8859-1?q?HzIFQxIqlt1ie+jurO5KWSV6Mwf49IulerKGxWwJadH5qNT/Tba4naSc3l6Q?= =?iso-8859-1?q?y/vOOZobOt/yRAJN68XQ=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(7416014)(376014)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?RTCUa1MgGDPPihwADD7M4RJ?= =?iso-8859-1?q?h0KQzqCZ+DglcIS8OZpLu3BPMQAxteCzYgxhKJipFVEz8+xZEiTV8qzcLkxM?= =?iso-8859-1?q?RL/vVdIuAPtukZ4POS3qhbWU43GQcJ3m/7o2jk/yd7XDjzWwNwJjWXkywFe7?= =?iso-8859-1?q?mVhShnWBSP+dAjTKuaujcXyul1p9zJuXH+FFQoVsVe4IPZcx+Tejt39JYaha?= =?iso-8859-1?q?AU1+kgGkkIYJTYODwHwley5Vfogfis4j/Z+vxw/DzcITytbbHfhPVA7GOCYZ?= =?iso-8859-1?q?HLNRnC3wbV62zKaivcCU8D5DoEt1poZM1BRV7M+oWLgKWC28qBd2g6YASqae?= =?iso-8859-1?q?u0EMh8tmlTUnpXi7OvXlguLiVY+AYMaU4b70AEI1Naio345ekEFz+2H5lJje?= =?iso-8859-1?q?pgTyVYkCI74efH0mh2XC7v+aKdU9oBA44OR6OGv+wiBlqmjYVjrzEX85s+Ot?= =?iso-8859-1?q?zs+R1cPIZGOT4Y2As1fV3Xl8l2xRMAoSaDCewaWwhrykE5dusVqAGseZTysW?= =?iso-8859-1?q?SOpnB6lKheqnZnV8NcnphABUH/x4gq6A9RD50sYXEYIASjfj1PlrPBCV8HPq?= =?iso-8859-1?q?Jz/oVM7ZMWNFynkYAlayFT46y5L69miT5qbGryg1Zj72lGI41+V13CIIEf+M?= =?iso-8859-1?q?XoYE5KooztL+870jlNcb47XLJblUruzwTLLZbny8OnvMEbLmmknRQayW/H4n?= =?iso-8859-1?q?ZOJ2krJ75w7B1E/dsM/Ie0m/b1ZLiuT97I3rByWzQrnb69QtLzlPQjriNFmw?= =?iso-8859-1?q?86SAHhxxqwibhUApRoyRspn0JkDAOfwIxCC5CZoLI/OqGWu6AaGR7EcKUb39?= =?iso-8859-1?q?UKH926woi7DfD+LEDp6UpEb1Z05r546QYQYRyeIn9oFO0OUDPLZd5/JT79kJ?= =?iso-8859-1?q?rcxsWm5v9zV2770NcR9QaV3Ob7gzCXK8Ht2M63r2p9Cz159ewkDziKY7ZzE5?= =?iso-8859-1?q?04q4cY7Yas8Sy7c7b9Pq4jJx5ysEgaPqRz0zPTF1xeAkJV6lYvYdQqAN5H/5?= =?iso-8859-1?q?XCqcNxGQiMbRevgsRwO4+mol31d20A9H0O36/h8HUDZdncIR3pGUKPfeanXq?= =?iso-8859-1?q?d+Def2/CSz6/fYsfAK25eXnHZ34gSeh/pOpjQMN6kOM9onYkVduDn2tMMoKg?= =?iso-8859-1?q?70+68W2C9B4tDXlsyllxi/LlruYgnPjsl2uzwSxTZRbKagNoMnFAXutmmXVY?= =?iso-8859-1?q?PMJTpbyYTNNDbef+HE6RZ9QsLIDEzj/KeOOLIMc9r77BGS1BJjQ1BFrHw7BD?= =?iso-8859-1?q?PAEMLHiI6oo83jtJlVkj5VPeEhahobV2NsUGGyS8kxx3GE40wMzBMFru/Udl?= =?iso-8859-1?q?TG0fIMhUjLxoWBi5PeVS3rjcdvO1uMfoLcCSaUBhgJ4VAAQf5+oMq5IOeIQa?= =?iso-8859-1?q?1LWh9nJ/1+RAy3mGnHkgS2SheGHJjReBaM2OczgQjWdocuggnnTUkMMx2kTF?= =?iso-8859-1?q?UsccMKGDexifKT8oFOrOrsx9KjnEcgka1FBuGyhXEhPuU0k/PIYQHlgUtBvE?= =?iso-8859-1?q?7FDjkT8iJpaDat9fnsDwB2CCXyfIsE1GuDK2y1NAqBTr/XvnCEoGOdA45JdW?= =?iso-8859-1?q?Ix/OhhW2rEkc8cCj5GivAtaKGZNQOpx4ROM1iAv6Ry/iUhqWqADVmdKLf80H?= =?iso-8859-1?q?P9OeyVPvE+UffV49o1aODNLRKSoa+GLx28jKoiQ=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a0f35f86-832c-4ca5-2784-08dd04fe3a33 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Nov 2024 22:46:50.0515 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: c+a3RDThjm0oDx77uPlkpPupc35oWjKvU/Yh15kwENsIteh9gEEUsc6PaivD2auh4Y+bW/B4eEydnfF/WlEnem9+J3UBO3bGtf6ZnXtZcDA= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR03MB7229 LibAFL, which is a part of AFL++ project is a instrument that allows us to perform fuzzing on beremetal code (Xen hypervisor in this case) using QEMU as an emulator. It employs QEMU's ability to create snapshots to run many tests relatively quickly: system state is saved right before executing a new test and restored after the test is finished. This patch adds all necessary plumbing to run aarch64 build of Xen inside that LibAFL-QEMU fuzzer. From the Xen perspective we need to do following things: 1. Able to communicate with LibAFL-QEMU fuzzer. This is done by executing special opcodes, that only LibAFL-QEMU can handle. 2. Use interface from p.1 to tell the fuzzer about code Xen section, so fuzzer know which part of code to track and gather coverage data. 3. Report fuzzer about crash. This is done in panic() function. 4. Prevent test harness from shooting itself in knee. Right now test harness is an external component, because we want to test external Xen interfaces, but it is possible to fuzz internal code if we want to. Test harness is implemented as a Zephyr-based application which launches as Dom0 kernel and performs different tests. As test harness can issue hypercall that shuts itself down, KConfig option CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING was added. It basically tells fuzzer that test was completed successfully if Dom0 tries to shut itself (or the whole machine) down. Signed-off-by: Volodymyr Babchuk --- I tried to fuzz the vGIC emulator and hypercall interface. While vGIC fuzzing didn't yield any interesting results, hypercall fuzzing found a way to crash the hypervisor from Dom0 on aarch64, using "XEN_SYSCTL_page_offline_op" with "sysctl_query_page_offline" sub-op, because it leads to page_is_ram_type() call which is marked UNREACHABLE on ARM. --- docs/hypervisor-guide/fuzzing.rst | 102 +++++++++++++ xen/arch/arm/Kconfig.debug | 26 ++++ xen/arch/arm/Makefile | 1 + xen/arch/arm/include/asm/libafl_qemu.h | 54 +++++++ xen/arch/arm/include/asm/libafl_qemu_defs.h | 37 +++++ xen/arch/arm/libafl_qemu.c | 152 ++++++++++++++++++++ xen/arch/arm/psci.c | 13 ++ xen/common/sched/core.c | 17 +++ xen/common/shutdown.c | 7 + xen/drivers/char/console.c | 8 ++ 10 files changed, 417 insertions(+) create mode 100644 docs/hypervisor-guide/fuzzing.rst create mode 100644 xen/arch/arm/include/asm/libafl_qemu.h create mode 100644 xen/arch/arm/include/asm/libafl_qemu_defs.h create mode 100644 xen/arch/arm/libafl_qemu.c diff --git a/docs/hypervisor-guide/fuzzing.rst b/docs/hypervisor-guide/fuzzing.rst new file mode 100644 index 0000000000..9570de7670 --- /dev/null +++ b/docs/hypervisor-guide/fuzzing.rst @@ -0,0 +1,102 @@ +.. SPDX-License-Identifier: CC-BY-4.0 + +Fuzzing +======= + +It is possible to use LibAFL-QEMU for fuzzing hypervisor. Right now +only aarch64 is supported and only hypercall fuzzing is enabled in the +test harness, but there are plans to add vGIC interface fuzzing, PSCI +fuzzing and vPL011 fuzzing as well. + + +Principle of operation +---------------------- + +LibAFL-QEMU is a part of American Fuzzy lop plus plus (AKA AFL++) +project. It uses special build of QEMU, that allows to fuzz baremetal +software like Xen hypervisor or Linux kernel. Basic idea is that we +have software under test (Xen hypervisor in our case) and a test +harness application. Test harness uses special protocol to communicate +with LibAFL outside of QEMU to get input data and report test +result. LibAFL monitors which branches are taken by Xen and mutates +input data in attempt to discover new code paths that eventually can +lead to a crash or other unintended behavior. + +LibAFL uses QEMU's `snapshot` feature to run multiple test without +restarting the whole system every time. This speeds up fuzzing process +greatly. + +So, to try Xen fuzzing we need three components: LibAFL-based fuzzer, +test harness and Xen itself. + +Building Xen for fuzzing +------------------------ + +Xen hypervisor should be built with these two options:: + + CONFIG_LIBAFL_QEMU_FUZZER=y + CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING=y + +Building test harness +--------------------- + +We need to make low-level actions, like issuing random hypercalls, so +for test harness we use special build of Zephyr application. + +You need to prepare environment for building Zephyr as described in +getting `started guide +`_. + +Next, download test harness application and built it:: + + # mkdir zephyr-harness + # cd zephyr-harness + # west init -m https://github.com/xen-troops/xen-fuzzer-harness + # cd xen-fuzzer-harness + # west update + # west build + +Building LibAFL-QEMU based fuzzer +--------------------------------- + +Fuzzer is written in Rust, so you need Rust toolchain and `cargo` tool +in your system. Please refer to your distro documentation on how to +obtain them. + +Once Rust is ready, fetch and build the fuzzer:: + + # git clone https://github.com/xen-troops/xen-fuzzer-rs + # cd xen-fuzzer-rs + # cargo build + +Running the fuzzer +------------------ + +Run it like this:: + + # target/debug/xen_fuzzer -accel tcg \ + -machine virt,virtualization=yes,acpi=off \ + -m 4G \ + -L target/debug/qemu-libafl-bridge/pc-bios \ + -nographic \ + -cpu max \ + -append 'dom0_mem=512 loglvl=none guest_loglvl=none console=dtuart' \ + -kernel /path/to/xen/xen/xen \ + -device guest-loader,addr=0x42000000,kernel=/path/to/zephyr-harness/build/zephyr/zephyr.bin \ + -snapshot + +Any inputs that led to crashes will be found in `crashes` directory. + +You can use standard QEMU parameters to redirect console output, +change memory size, HW compisition, etc. + + +TODOs +----- + + - Add x86 support. + - Implement fuzzing of other external hypervisor interfaces. + - Better integration: user should not build manually multiple + different projects + - Add ability to re-run fuzzer with a given input to make crash + debugging more comfortable diff --git a/xen/arch/arm/Kconfig.debug b/xen/arch/arm/Kconfig.debug index 7660e599c0..9e2c4649ed 100644 --- a/xen/arch/arm/Kconfig.debug +++ b/xen/arch/arm/Kconfig.debug @@ -183,3 +183,29 @@ config EARLY_PRINTK_INC default "debug-mvebu.inc" if EARLY_UART_MVEBU default "debug-pl011.inc" if EARLY_UART_PL011 default "debug-scif.inc" if EARLY_UART_SCIF + +config LIBAFL_QEMU_FUZZER + bool "Enable LibAFL-QEMU calls" + help + This option enables support for LibAFL-QEMU calls. Enable this + only when you are going to run hypervisor inside LibAFL-QEMU. + Xen will report code section to LibAFL and will report about + crash when it panics. + + Do not try to run Xen built on this option on any real hardware + or plain QEMU, because it will just crash during startup. + +config LIBAFL_QEMU_FUZZER_PASS_BLOCKING + depends on LIBAFL_QEMU_FUZZER + bool "LibAFL: Report any attempt to suspend/destroy a domain as a success" + help + When fuzzing hypercalls, fuzzer sometimes will issue an hypercall that + leads to a domain shutdown, or machine shutdown, or vCPU being + blocked, or something similar. In this case test harness will not be + able to report about successfully handled call to the fuzzer. Fuzzer + will report timeout and mark this as a crash, which is not true. So, + in such cases we need to report about successfully test case from the + hypervisor itself. + + Enable this option only if fuzzing attempt can lead to a correct + stoppage, like when fuzzing hypercalls or PSCI. diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile index e4ad1ce851..51b5e15b6a 100644 --- a/xen/arch/arm/Makefile +++ b/xen/arch/arm/Makefile @@ -10,6 +10,7 @@ obj-$(CONFIG_TEE) += tee/ obj-$(CONFIG_HAS_VPCI) += vpci.o obj-$(CONFIG_HAS_ALTERNATIVE) += alternative.o +obj-${CONFIG_LIBAFL_QEMU_FUZZER} += libafl_qemu.o obj-y += cpuerrata.o obj-y += cpufeature.o obj-y += decode.o diff --git a/xen/arch/arm/include/asm/libafl_qemu.h b/xen/arch/arm/include/asm/libafl_qemu.h new file mode 100644 index 0000000000..b90cf48b9a --- /dev/null +++ b/xen/arch/arm/include/asm/libafl_qemu.h @@ -0,0 +1,54 @@ +#ifndef LIBAFL_QEMU_H +#define LIBAFL_QEMU_H + +#include +#include "libafl_qemu_defs.h" +#define LIBAFL_QEMU_PRINTF_MAX_SIZE 4096 + +typedef uint64_t libafl_word; + +/** + * LibAFL QEMU header file. + * + * This file is a portable header file used to build target harnesses more + * conveniently. Its main purpose is to generate ready-to-use calls to + * communicate with the fuzzer. The list of commands is available at the bottom + * of this file. The rest mostly consists of macros generating the code used by + * the commands. + */ + +enum LibaflQemuEndStatus { + LIBAFL_QEMU_END_UNKNOWN = 0, + LIBAFL_QEMU_END_OK = 1, + LIBAFL_QEMU_END_CRASH = 2, +}; + +libafl_word libafl_qemu_start_virt(void *buf_vaddr, libafl_word max_len); + +libafl_word libafl_qemu_start_phys(void *buf_paddr, libafl_word max_len); + +libafl_word libafl_qemu_input_virt(void *buf_vaddr, libafl_word max_len); + +libafl_word libafl_qemu_input_phys(void *buf_paddr, libafl_word max_len); + +void libafl_qemu_end(enum LibaflQemuEndStatus status); + +void libafl_qemu_save(void); + +void libafl_qemu_load(void); + +libafl_word libafl_qemu_version(void); + +void libafl_qemu_page_current_allow(void); + +void libafl_qemu_internal_error(void); + +void __attribute__((format(printf, 1, 2))) lqprintf(const char *fmt, ...); + +void libafl_qemu_test(void); + +void libafl_qemu_trace_vaddr_range(libafl_word start, libafl_word end); + +void libafl_qemu_trace_vaddr_size(libafl_word start, libafl_word size); + +#endif diff --git a/xen/arch/arm/include/asm/libafl_qemu_defs.h b/xen/arch/arm/include/asm/libafl_qemu_defs.h new file mode 100644 index 0000000000..2866cadaac --- /dev/null +++ b/xen/arch/arm/include/asm/libafl_qemu_defs.h @@ -0,0 +1,37 @@ +#ifndef LIBAFL_QEMU_DEFS +#define LIBAFL_QEMU_DEFS + +#define LIBAFL_STRINGIFY(s) #s +#define XSTRINGIFY(s) LIBAFL_STRINGIFY(s) + +#if __STDC_VERSION__ >= 201112L + #define STATIC_CHECKS \ + _Static_assert(sizeof(void *) <= sizeof(libafl_word), \ + "pointer type should not be larger and libafl_word"); +#else + #define STATIC_CHECKS +#endif + +#define LIBAFL_SYNC_EXIT_OPCODE 0x66f23a0f +#define LIBAFL_BACKDOOR_OPCODE 0x44f23a0f + +#define LIBAFL_QEMU_TEST_VALUE 0xcafebabe + +#define LIBAFL_QEMU_HDR_VERSION_NUMBER 0111 // TODO: find a nice way to set it. + +typedef enum LibaflQemuCommand { + LIBAFL_QEMU_COMMAND_START_VIRT = 0, + LIBAFL_QEMU_COMMAND_START_PHYS = 1, + LIBAFL_QEMU_COMMAND_INPUT_VIRT = 2, + LIBAFL_QEMU_COMMAND_INPUT_PHYS = 3, + LIBAFL_QEMU_COMMAND_END = 4, + LIBAFL_QEMU_COMMAND_SAVE = 5, + LIBAFL_QEMU_COMMAND_LOAD = 6, + LIBAFL_QEMU_COMMAND_VERSION = 7, + LIBAFL_QEMU_COMMAND_VADDR_FILTER_ALLOW = 8, + LIBAFL_QEMU_COMMAND_INTERNAL_ERROR = 9, + LIBAFL_QEMU_COMMAND_LQPRINTF = 10, + LIBAFL_QEMU_COMMAND_TEST = 11, +} LibaflExit; + +#endif diff --git a/xen/arch/arm/libafl_qemu.c b/xen/arch/arm/libafl_qemu.c new file mode 100644 index 0000000000..58924ce6c6 --- /dev/null +++ b/xen/arch/arm/libafl_qemu.c @@ -0,0 +1,152 @@ +/* SPDX-License-Identifier: Apache-2.0 */ +/* + This file is based on libafl_qemu_impl.h and libafl_qemu_qemu_arch.h + from LibAFL project. +*/ +#include +#include +#include +#include + +#define LIBAFL_DEFINE_FUNCTIONS(name, opcode) \ + libafl_word _libafl_##name##_call0( \ + libafl_word action) { \ + libafl_word ret; \ + __asm__ volatile ( \ + "mov x0, %1\n" \ + ".word " XSTRINGIFY(opcode) "\n" \ + "mov %0, x0\n" \ + : "=r"(ret) \ + : "r"(action) \ + : "x0" \ + ); \ + return ret; \ + } \ + \ + libafl_word _libafl_##name##_call1( \ + libafl_word action, libafl_word arg1) { \ + libafl_word ret; \ + __asm__ volatile ( \ + "mov x0, %1\n" \ + "mov x1, %2\n" \ + ".word " XSTRINGIFY(opcode) "\n" \ + "mov %0, x0\n" \ + : "=r"(ret) \ + : "r"(action), "r"(arg1) \ + : "x0", "x1" \ + ); \ + return ret; \ + } \ + \ + libafl_word _libafl_##name##_call2( \ + libafl_word action, libafl_word arg1, libafl_word arg2) { \ + libafl_word ret; \ + __asm__ volatile ( \ + "mov x0, %1\n" \ + "mov x1, %2\n" \ + "mov x2, %3\n" \ + ".word " XSTRINGIFY(opcode) "\n" \ + "mov %0, x0\n" \ + : "=r"(ret) \ + : "r"(action), "r"(arg1), "r"(arg2) \ + : "x0", "x1", "x2" \ + ); \ + return ret; \ + } + +// Generates sync exit functions +LIBAFL_DEFINE_FUNCTIONS(sync_exit, LIBAFL_SYNC_EXIT_OPCODE) + +// Generates backdoor functions +LIBAFL_DEFINE_FUNCTIONS(backdoor, LIBAFL_BACKDOOR_OPCODE) + +static char _lqprintf_buffer[LIBAFL_QEMU_PRINTF_MAX_SIZE] = {0}; + +libafl_word libafl_qemu_start_virt(void *buf_vaddr, + libafl_word max_len) { + return _libafl_sync_exit_call2(LIBAFL_QEMU_COMMAND_START_VIRT, + (libafl_word)buf_vaddr, max_len); +} + +libafl_word libafl_qemu_start_phys(void *buf_paddr, + libafl_word max_len) { + return _libafl_sync_exit_call2(LIBAFL_QEMU_COMMAND_START_PHYS, + (libafl_word)buf_paddr, max_len); +} + +libafl_word libafl_qemu_input_virt(void *buf_vaddr, + libafl_word max_len) { + return _libafl_sync_exit_call2(LIBAFL_QEMU_COMMAND_INPUT_VIRT, + (libafl_word)buf_vaddr, max_len); +} + +libafl_word libafl_qemu_input_phys(void *buf_paddr, + libafl_word max_len) { + return _libafl_sync_exit_call2(LIBAFL_QEMU_COMMAND_INPUT_PHYS, + (libafl_word)buf_paddr, max_len); +} + +void libafl_qemu_end(enum LibaflQemuEndStatus status) { + _libafl_sync_exit_call1(LIBAFL_QEMU_COMMAND_END, status); +} + +void libafl_qemu_save(void) { + _libafl_sync_exit_call0(LIBAFL_QEMU_COMMAND_SAVE); +} + +void libafl_qemu_load(void) { + _libafl_sync_exit_call0(LIBAFL_QEMU_COMMAND_LOAD); +} + +libafl_word libafl_qemu_version(void) { + return _libafl_sync_exit_call0(LIBAFL_QEMU_COMMAND_VERSION); +} + +void libafl_qemu_internal_error(void) { + _libafl_sync_exit_call0(LIBAFL_QEMU_COMMAND_INTERNAL_ERROR); +} + +void lqprintf(const char *fmt, ...) { + va_list args; + int res; + va_start(args, fmt); + res = vsnprintf(_lqprintf_buffer, LIBAFL_QEMU_PRINTF_MAX_SIZE, fmt, args); + va_end(args); + + if (res >= LIBAFL_QEMU_PRINTF_MAX_SIZE) { + // buffer is not big enough, either recompile the target with more + // space or print less things + libafl_qemu_internal_error(); + } + + _libafl_sync_exit_call2(LIBAFL_QEMU_COMMAND_LQPRINTF, + (libafl_word)_lqprintf_buffer, res); +} + +void libafl_qemu_test(void) { + _libafl_sync_exit_call1(LIBAFL_QEMU_COMMAND_TEST, LIBAFL_QEMU_TEST_VALUE); +} + +void libafl_qemu_trace_vaddr_range(libafl_word start, + libafl_word end) { + _libafl_sync_exit_call2(LIBAFL_QEMU_COMMAND_VADDR_FILTER_ALLOW, start, end); +} + +void libafl_qemu_trace_vaddr_size(libafl_word start, + libafl_word size) { + libafl_qemu_trace_vaddr_range(start, start + size); +} + +static int init_afl(void) +{ + vaddr_t xen_text_start = (vaddr_t)_stext; + vaddr_t xen_text_end = (vaddr_t)_etext; + + lqprintf("Telling AFL about code section: %lx - %lx\n", xen_text_start, xen_text_end); + + libafl_qemu_trace_vaddr_range(xen_text_start, xen_text_end); + + return 0; +} + +__initcall(init_afl); diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c index b6860a7760..c7a51a1144 100644 --- a/xen/arch/arm/psci.c +++ b/xen/arch/arm/psci.c @@ -17,6 +17,7 @@ #include #include #include +#include /* * While a 64-bit OS can make calls with SMC32 calling conventions, for @@ -49,6 +50,10 @@ int call_psci_cpu_on(int cpu) void call_psci_cpu_off(void) { +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif + if ( psci_ver > PSCI_VERSION(0, 1) ) { struct arm_smccc_res res; @@ -62,12 +67,20 @@ void call_psci_cpu_off(void) void call_psci_system_off(void) { +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif + if ( psci_ver > PSCI_VERSION(0, 1) ) arm_smccc_smc(PSCI_0_2_FN32_SYSTEM_OFF, NULL); } void call_psci_system_reset(void) { +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif + if ( psci_ver > PSCI_VERSION(0, 1) ) arm_smccc_smc(PSCI_0_2_FN32_SYSTEM_RESET, NULL); } diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c index d6296d99fd..fd722e0231 100644 --- a/xen/common/sched/core.c +++ b/xen/common/sched/core.c @@ -47,6 +47,10 @@ #define pv_shim false #endif +#ifdef CONFIG_LIBAFL_QEMU_FUZZER +#include +#endif + /* opt_sched: scheduler - default to configured value */ static char __initdata opt_sched[10] = CONFIG_SCHED_DEFAULT; string_param("sched", opt_sched); @@ -1452,6 +1456,10 @@ static long do_poll(const struct sched_poll *sched_poll) if ( !guest_handle_okay(sched_poll->ports, sched_poll->nr_ports) ) return -EFAULT; +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif + set_bit(_VPF_blocked, &v->pause_flags); v->poll_evtchn = -1; set_bit(v->vcpu_id, d->poll_mask); @@ -1887,12 +1895,18 @@ ret_t do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg) { case SCHEDOP_yield: { +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif ret = vcpu_yield(); break; } case SCHEDOP_block: { +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif vcpu_block_enable_events(); break; } @@ -1907,6 +1921,9 @@ ret_t do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg) TRACE_TIME(TRC_SCHED_SHUTDOWN, current->domain->domain_id, current->vcpu_id, sched_shutdown.reason); +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif ret = domain_shutdown(current->domain, (u8)sched_shutdown.reason); break; diff --git a/xen/common/shutdown.c b/xen/common/shutdown.c index c47341b977..1340f4b606 100644 --- a/xen/common/shutdown.c +++ b/xen/common/shutdown.c @@ -11,6 +11,10 @@ #include #include +#ifdef CONFIG_LIBAFL_QEMU_FUZZER +#include +#endif + /* opt_noreboot: If true, machine will need manual reset on error. */ bool __ro_after_init opt_noreboot; boolean_param("noreboot", opt_noreboot); @@ -32,6 +36,9 @@ static void noreturn reboot_or_halt(void) void hwdom_shutdown(unsigned char reason) { +#ifdef CONFIG_LIBAFL_QEMU_FUZZER_PASS_BLOCKING + libafl_qemu_end(LIBAFL_QEMU_END_OK); +#endif switch ( reason ) { case SHUTDOWN_poweroff: diff --git a/xen/drivers/char/console.c b/xen/drivers/char/console.c index 7da8c5296f..1262515e70 100644 --- a/xen/drivers/char/console.c +++ b/xen/drivers/char/console.c @@ -41,6 +41,9 @@ #ifdef CONFIG_SBSA_VUART_CONSOLE #include #endif +#ifdef CONFIG_LIBAFL_QEMU_FUZZER +#include +#endif /* console: comma-separated list of console outputs. */ static char __initdata opt_console[30] = OPT_CONSOLE_STR; @@ -1299,6 +1302,11 @@ void panic(const char *fmt, ...) kexec_crash(CRASHREASON_PANIC); + #ifdef CONFIG_LIBAFL_QEMU_FUZZER + /* Tell the fuzzer that we crashed */ + libafl_qemu_end(LIBAFL_QEMU_END_CRASH); + #endif + if ( opt_noreboot ) machine_halt(); else