-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sys: filesystem image fuzzing #1020
Comments
I have done an initial port of the syz-mount-image for NetBSD. I have used a copy of the sys/linux/filesystems.txt with all the unsupported filesystems removed. @zsm-oss Could tell me how to test whether the images are getting properly build? Do we have some testing mechanism anywhere? |
If you mean just based on the descriptions, then I afraid proper images won't be built. The chances that it will build a proper 1MB blob are effectively 0. In a private email you also mentioned:
If we have good primitives for describing image format, then it would solve the problem of mutation and would make metadata mutator unnecessary.
We currently allow at least 200MB of memory per test. Isn't it enough? The largest minimal size of an image that I saw was 128MB (xfs?), so 200MB should be enough, no? |
If you'd like something to poke and prod, the following might help. |
I had a few queries regarding this. The current implementation seems to be generating segments and writing them into offsets into a file and then mounting that. We have different flags, options for each of the filesystems (I hope I am correct here). Due to this approach, we seem to lack internal parts such as superblocks, inodes etc. How possible(and logical) do you think it is to generate an entire image for a certain filesystem based on grammar alone. I think potential issues can be bitmaps, flags on structures. Is there a reason that you chose a generic approach than such an approach? Is there a significant advantage for the same over having an image-based mutator (which might be much easier to create)? I am currently able to mount images on NetBSD - problems I face are
|
Correct.
Correct.
This would be the most natural approach for syzkaller, because that's how we generate everything else. The main advantage of that will be that the fuzzer will be able to generate images that are radically different from any real images in a seed corpus, also we won't have any custom procedural code per fs. However, it's unclear if this will work and is feasible. To significant degree it's a research problem and results may even be worth publishing as a paper. As you noted there may be some things that may be hard to describe. Most likely it will require some extensions to the description language. But what are these extensions we don't know yet, we need to try first. We already can do checksums, but we will need a new type of checksum. I would also expect something related to efficient handling of padding (however, maybe existing support for alignment and sizing of structs will work?). We could also employ support for special structures and some limited custom patching/fixing of things, e.g. see what we do for iptables:
It was merely something I could in few days and still get some coverage for filesystems.
Custom per-image mutators is also an option. I don't know which is ultimately the best options (and what is even the best is not defined). The main advantage of custom mutators that I see is simplicity: we write custom procedural code and that's easier and we know it works. But the disadvantages are:
That's fine to have custom per-OS code here. What exactly is the problem here? :)
How are they passed? Is it something we can't describe? |
syzkaller recently became better at FS fuzzing. Relevant PRs: |
We could do better at minimizing the reproducers that mount fs images: https://lore.kernel.org/all/[email protected]/
We could set up the same files/folders in the syz-executor environment as we do in the mounted filesystems. E.g. before chrooting into the new location here: syzkaller/executor/common_linux.h Lines 3982 to 3983 in d399943
Or could transforming the |
One large area that syzkaller handles poorly is filesystem fuzzing: both mounting custom images and then executing random operations on these images.
What's exactly the best way of doing this is an open question.
We could either describe format of images in syzkaller descriptions and then let fuzzer generate/mutate them. The questions is: if generation of correct images is too complex for a full-kernel fuzzer? We will probably also need some extensions to the language to handle offsets/aligns/large zero paddings/etc.
Or we could maybe write some custom procedural logic to generate/mutate images. May be simpler, but worse long-term (more custom procedural code).
Or maybe something else.
FTR here is a good description on ext4 format:
https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout
Are there similar docs for other formats? Would be useful.
An interesting prior art is: Fuzzing File Systems via Two-Dimensional Input Space Exploration.
Some other prior art (though it's mostly "AFL on precollected corpus of images"):
https://lwn.net/Articles/685182/
https://events.static.linuxfound.org/sites/events/files/slides/AFL%20filesystem%20fuzzing%2C%20Vault%202016_0.pdf
https://www.blackhat.com/docs/eu-16/materials/eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf
https://www.blackhat.com/docs/eu-16/materials/eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf
https://lwn.net/Articles/637151/
The text was updated successfully, but these errors were encountered: