#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Use this to convert qtest log info from a generic fuzzer input into a qtest trace that you can feed into a standard qemu-system process. Example usage: QEMU_FUZZ_ARGS="-machine q35,accel=qtest" QEMU_FUZZ_OBJECTS="*" \ ./i386-softmmu/qemu-fuzz-i386 --fuzz-target=generic-pci-fuzz # .. Finds some crash QTEST_LOG=1 FUZZ_SERIALIZE_QTEST=1 \ QEMU_FUZZ_ARGS="-machine q35,accel=qtest" QEMU_FUZZ_OBJECTS="*" \ ./i386-softmmu/qemu-fuzz-i386 --fuzz-target=generic-pci-fuzz /path/to/crash 2> qtest_log_output scripts/oss-fuzz/reorder_fuzzer_qtest_trace.py qtest_log_output > qtest_trace ./i386-softmmu/qemu-fuzz-i386 -machine q35,accel=qtest \ -qtest stdio < qtest_trace ### Details ### Some fuzzer make use of hooks that allow us to populate some memory range, just before a DMA read from that range. This means that the fuzzer can produce activity that looks like: [start] read from mmio addr [end] read from mmio addr [start] write to pio addr [start] fill a DMA buffer just in time [end] fill a DMA buffer just in time [start] fill a DMA buffer just in time [end] fill a DMA buffer just in time [end] write to pio addr [start] read from mmio addr [end] read from mmio addr We annotate these "nested" DMA writes, so with QTEST_LOG=1 the QTest trace might look something like: [R +0.028431] readw 0x10000 [R +0.028434] outl 0xc000 0xbeef # Triggers a DMA read from 0xbeef and 0xbf00 [DMA][R +0.034639] write 0xbeef 0x2 0xAAAA [DMA][R +0.034639] write 0xbf00 0x2 0xBBBB [R +0.028431] readw 0xfc000 This script would reorder the above trace so it becomes: readw 0x10000 write 0xbeef 0x2 0xAAAA write 0xbf00 0x2 0xBBBB outl 0xc000 0xbeef readw 0xfc000 I.e. by the time, 0xc000 tries to read from DMA, those DMA buffers have already been set up, removing the need for the DMA hooks. We can simply provide this reordered trace via -qtest stdio to reproduce the input Note: this won't work for traces where the device tries to read from the same DMA region twice in between MMIO/PIO commands. E.g: [R +0.028434] outl 0xc000 0xbeef [DMA][R +0.034639] write 0xbeef 0x2 0xAAAA [DMA][R +0.034639] write 0xbeef 0x2 0xBBBB The fuzzer will annotate suspected double-fetches with [DOUBLE-FETCH]. This script looks for these tags and warns the users that the resulting trace might not reproduce the bug. """ import sys __author__ = "Alexander Bulekov " __copyright__ = "Copyright (C) 2020, Red Hat, Inc." __license__ = "GPL version 2 or (at your option) any later version" __maintainer__ = "Alexander Bulekov" __email__ = "alxndr@bu.edu" def usage(): sys.exit("Usage: {} /path/to/qtest_log_output".format((sys.argv[0]))) def main(filename): with open(filename, "r") as f: trace = f.readlines() # Leave only lines that look like logged qtest commands trace[:] = [x.strip() for x in trace if "[R +" in x or "[S +" in x and "CLOSED" not in x] for i in range(len(trace)): if i+1 < len(trace): if "[DMA]" in trace[i+1]: if "[DOUBLE-FETCH]" in trace[i+1]: sys.stderr.write("Warning: Likely double fetch on line" "{}.\n There will likely be problems " "reproducing behavior with the " "resulting qtest trace\n\n".format(i+1)) trace[i], trace[i+1] = trace[i+1], trace[i] for line in trace: print(line.split("]")[-1].strip()) if __name__ == '__main__': if len(sys.argv) == 1: usage() main(sys.argv[1])