|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] tools/insn-fuzz: Fix assertion failures in x86_emulate_wrapper()
commit db7b5b0c50b238ca259b83af3aca102701c4abac
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
AuthorDate: Tue Mar 7 16:20:51 2017 +0000
Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CommitDate: Thu Apr 6 18:42:50 2017 +0100
tools/insn-fuzz: Fix assertion failures in x86_emulate_wrapper()
c/s 92cf67888 "x86/emul: Hold x86_emulate() to strict X86EMUL_EXCEPTION
requirements" was appropriate for the hypervisor, but the fuzzer stubs
didn't
conform to the stricter requirements. AFL is very quick to discover this.
Extend the fuzzing harness exception logic to raise exceptions
appropriately.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
---
tools/fuzz/x86_instruction_emulator/fuzz-emul.c | 27 ++++++++++++++++++++-----
1 file changed, 22 insertions(+), 5 deletions(-)
diff --git a/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
b/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
index 9544aa4..aadbb40 100644
--- a/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
+++ b/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
@@ -86,10 +86,15 @@ static int maybe_fail(struct x86_emulate_ctxt *ctxt,
printf("maybe_fail %s: %d\n", why, rc);
+ if ( rc == X86EMUL_EXCEPTION )
+ /* Fake up a pagefault. */
+ x86_emul_pagefault(0, 0, ctxt);
+
return rc;
}
static int data_read(struct x86_emulate_ctxt *ctxt,
+ enum x86_segment seg,
const char *why, void *dst, unsigned int bytes)
{
struct fuzz_state *s = ctxt->data;
@@ -98,7 +103,17 @@ static int data_read(struct x86_emulate_ctxt *ctxt,
int rc;
if ( s->data_index + bytes > s->data_num )
+ {
+ /*
+ * Fake up a segment limit violation. System segment limit volations
+ * are reported by X86EMUL_EXCEPTION alone, so the emulator can fill
+ * in the correct context.
+ */
+ if ( !is_x86_system_segment(seg) )
+ x86_emul_hw_exception(13, 0, ctxt);
+
rc = X86EMUL_EXCEPTION;
+ }
else
rc = maybe_fail(ctxt, why, true);
@@ -126,7 +141,7 @@ static int fuzz_read(
/* Reads expected for all user and system segments. */
assert(is_x86_user_segment(seg) || is_x86_system_segment(seg));
- return data_read(ctxt, "read", p_data, bytes);
+ return data_read(ctxt, seg, "read", p_data, bytes);
}
static int fuzz_read_io(
@@ -135,7 +150,7 @@ static int fuzz_read_io(
unsigned long *val,
struct x86_emulate_ctxt *ctxt)
{
- return data_read(ctxt, "read_io", val, bytes);
+ return data_read(ctxt, x86_seg_none, "read_io", val, bytes);
}
static int fuzz_insn_fetch(
@@ -157,7 +172,7 @@ static int fuzz_insn_fetch(
return maybe_fail(ctxt, "insn_fetch", true);
}
- return data_read(ctxt, "insn_fetch", p_data, bytes);
+ return data_read(ctxt, seg, "insn_fetch", p_data, bytes);
}
static int _fuzz_rep_read(struct x86_emulate_ctxt *ctxt,
@@ -166,7 +181,7 @@ static int _fuzz_rep_read(struct x86_emulate_ctxt *ctxt,
int rc;
unsigned long bytes_read = 0;
- rc = data_read(ctxt, why, &bytes_read, sizeof(bytes_read));
+ rc = data_read(ctxt, x86_seg_none, why, &bytes_read, sizeof(bytes_read));
if ( bytes_read <= *reps )
*reps = bytes_read;
@@ -436,7 +451,7 @@ static int fuzz_read_msr(
* should preferably return consistent values, but returning
* random values is fine in fuzzer.
*/
- return data_read(ctxt, "read_msr", val, sizeof(*val));
+ return data_read(ctxt, x86_seg_none, "read_msr", val, sizeof(*val));
case MSR_EFER:
*val = c->msr[MSRI_EFER];
*val &= ~EFER_LMA;
@@ -458,6 +473,7 @@ static int fuzz_read_msr(
}
}
+ x86_emul_hw_exception(13, 0, ctxt);
return X86EMUL_EXCEPTION;
}
@@ -491,6 +507,7 @@ static int fuzz_write_msr(
}
}
+ x86_emul_hw_exception(13, 0, ctxt);
return X86EMUL_EXCEPTION;
}
--
generated by git-patchbot for /home/xen/git/xen.git#master
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxx
https://lists.xenproject.org/xen-changelog
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |