From: Avi Kivity <avi@redhat.com>
To: Marcelo Tosatti <mtosatti@redhat.com>
Cc: lmr@redhat.com, kvm@vger.kernel.org
Subject: Re: [PATCH 3/3] KVM: x86 emulator: fuzz tester
Date: Thu, 25 Aug 2011 22:04:52 +0300 [thread overview]
Message-ID: <4E569CD4.6010101@redhat.com> (raw)
In-Reply-To: <20110825162753.GA6617@amt.cnet>
On 08/25/2011 07:27 PM, Marcelo Tosatti wrote:
> On Mon, Aug 22, 2011 at 04:41:09PM +0300, Avi Kivity wrote:
> > The x86 emulator is directly exposed to guest code; therefore it is part
> > of the directly exposed attack surface. To reduce the risk of
> > vulnerabilities, this patch adds a fuzz test that runs random instructions
> > through the emulator. A vulnerability will usually result in an oops.
> >
> > + for (i = 0; i< NR_VCPU_REGS; ++i)
> > + ctxt->regs[i] = randlong();
> > + r = x86_decode_insn(ctxt, NULL, 0);
>
> It could rerun N times instructions that have been decoded successfully.
> This would increase the chance of testing the code path for that (class
> of) instruction.
Good idea. I'll keep N small (20?) so that we fuzz the decoder as well.
> Also fuzzing from an actual guest is useful to test the real backend
> functions. What problem did you encounter? The new testsuite scheme
> seems a good fit for that (with the exception of being locked to 32-bit
> mode).
Mostly that I forgot it exists. Other issues are that it's harder to
force random values through it - though I could allocate a couple GB and
fill it with random values. We also lose the ability to test inputs to
callbacks (not that I do much of that here).
I'll try it out.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
next prev parent reply other threads:[~2011-08-25 19:04 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-08-22 13:41 [PATCH 0/3] Emulator fuzz tester Avi Kivity
2011-08-22 13:41 ` [PATCH 1/3] KVM: x86 emulator: make prototype of ->write_std() the same as ->write_emulated Avi Kivity
2011-08-22 13:41 ` [PATCH 2/3] KVM: x86 emulator: export main interface Avi Kivity
2011-08-22 13:41 ` [PATCH 3/3] KVM: x86 emulator: fuzz tester Avi Kivity
2011-08-25 16:27 ` Marcelo Tosatti
2011-08-25 19:04 ` Avi Kivity [this message]
2011-08-29 12:42 ` Avi Kivity
2011-08-25 22:17 ` Lucas Meneghel Rodrigues
2011-08-29 12:01 ` Avi Kivity
2011-08-25 19:07 ` [PATCH 0/3] Emulator " Lucas Meneghel Rodrigues
2011-08-26 0:11 ` Lucas Meneghel Rodrigues
2011-08-29 12:05 ` Avi Kivity
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4E569CD4.6010101@redhat.com \
--to=avi@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=lmr@redhat.com \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox