| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374 |
- KCOV: code coverage for fuzzing
- ===============================
- KCOV collects and exposes kernel code coverage information in a form suitable
- for coverage-guided fuzzing. Coverage data of a running kernel is exported via
- the ``kcov`` debugfs file. Coverage collection is enabled on a task basis, and
- thus KCOV can capture precise coverage of a single system call.
- Note that KCOV does not aim to collect as much coverage as possible. It aims
- to collect more or less stable coverage that is a function of syscall inputs.
- To achieve this goal, it does not collect coverage in soft/hard interrupts
- (unless remove coverage collection is enabled, see below) and from some
- inherently non-deterministic parts of the kernel (e.g. scheduler, locking).
- Besides collecting code coverage, KCOV can also collect comparison operands.
- See the "Comparison operands collection" section for details.
- Besides collecting coverage data from syscall handlers, KCOV can also collect
- coverage for annotated parts of the kernel executing in background kernel
- tasks or soft interrupts. See the "Remote coverage collection" section for
- details.
- Prerequisites
- -------------
- KCOV relies on compiler instrumentation and requires GCC 6.1.0 or later
- or any Clang version supported by the kernel.
- Collecting comparison operands is supported with GCC 8+ or with Clang.
- To enable KCOV, configure the kernel with::
- CONFIG_KCOV=y
- To enable comparison operands collection, set::
- CONFIG_KCOV_ENABLE_COMPARISONS=y
- Coverage data only becomes accessible once debugfs has been mounted::
- mount -t debugfs none /sys/kernel/debug
- Coverage collection
- -------------------
- The following program demonstrates how to use KCOV to collect coverage for a
- single syscall from within a test program:
- .. code-block:: c
- #include <stdio.h>
- #include <stddef.h>
- #include <stdint.h>
- #include <stdlib.h>
- #include <sys/types.h>
- #include <sys/stat.h>
- #include <sys/ioctl.h>
- #include <sys/mman.h>
- #include <unistd.h>
- #include <fcntl.h>
- #include <linux/types.h>
- #define KCOV_INIT_TRACE _IOR('c', 1, unsigned long)
- #define KCOV_ENABLE _IO('c', 100)
- #define KCOV_DISABLE _IO('c', 101)
- #define COVER_SIZE (64<<10)
- #define KCOV_TRACE_PC 0
- #define KCOV_TRACE_CMP 1
- int main(int argc, char **argv)
- {
- int fd;
- unsigned long *cover, n, i;
- /* A single fd descriptor allows coverage collection on a single
- * thread.
- */
- fd = open("/sys/kernel/debug/kcov", O_RDWR);
- if (fd == -1)
- perror("open"), exit(1);
- /* Setup trace mode and trace size. */
- if (ioctl(fd, KCOV_INIT_TRACE, COVER_SIZE))
- perror("ioctl"), exit(1);
- /* Mmap buffer shared between kernel- and user-space. */
- cover = (unsigned long*)mmap(NULL, COVER_SIZE * sizeof(unsigned long),
- PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
- if ((void*)cover == MAP_FAILED)
- perror("mmap"), exit(1);
- /* Enable coverage collection on the current thread. */
- if (ioctl(fd, KCOV_ENABLE, KCOV_TRACE_PC))
- perror("ioctl"), exit(1);
- /* Reset coverage from the tail of the ioctl() call. */
- __atomic_store_n(&cover[0], 0, __ATOMIC_RELAXED);
- /* Call the target syscall call. */
- read(-1, NULL, 0);
- /* Read number of PCs collected. */
- n = __atomic_load_n(&cover[0], __ATOMIC_RELAXED);
- for (i = 0; i < n; i++)
- printf("0x%lx\n", cover[i + 1]);
- /* Disable coverage collection for the current thread. After this call
- * coverage can be enabled for a different thread.
- */
- if (ioctl(fd, KCOV_DISABLE, 0))
- perror("ioctl"), exit(1);
- /* Free resources. */
- if (munmap(cover, COVER_SIZE * sizeof(unsigned long)))
- perror("munmap"), exit(1);
- if (close(fd))
- perror("close"), exit(1);
- return 0;
- }
- After piping through ``addr2line`` the output of the program looks as follows::
- SyS_read
- fs/read_write.c:562
- __fdget_pos
- fs/file.c:774
- __fget_light
- fs/file.c:746
- __fget_light
- fs/file.c:750
- __fget_light
- fs/file.c:760
- __fdget_pos
- fs/file.c:784
- SyS_read
- fs/read_write.c:562
- If a program needs to collect coverage from several threads (independently),
- it needs to open ``/sys/kernel/debug/kcov`` in each thread separately.
- The interface is fine-grained to allow efficient forking of test processes.
- That is, a parent process opens ``/sys/kernel/debug/kcov``, enables trace mode,
- mmaps coverage buffer, and then forks child processes in a loop. The child
- processes only need to enable coverage (it gets disabled automatically when
- a thread exits).
- Comparison operands collection
- ------------------------------
- Comparison operands collection is similar to coverage collection:
- .. code-block:: c
- /* Same includes and defines as above. */
- /* Number of 64-bit words per record. */
- #define KCOV_WORDS_PER_CMP 4
- /*
- * The format for the types of collected comparisons.
- *
- * Bit 0 shows whether one of the arguments is a compile-time constant.
- * Bits 1 & 2 contain log2 of the argument size, up to 8 bytes.
- */
- #define KCOV_CMP_CONST (1 << 0)
- #define KCOV_CMP_SIZE(n) ((n) << 1)
- #define KCOV_CMP_MASK KCOV_CMP_SIZE(3)
- int main(int argc, char **argv)
- {
- int fd;
- uint64_t *cover, type, arg1, arg2, is_const, size;
- unsigned long n, i;
- fd = open("/sys/kernel/debug/kcov", O_RDWR);
- if (fd == -1)
- perror("open"), exit(1);
- if (ioctl(fd, KCOV_INIT_TRACE, COVER_SIZE))
- perror("ioctl"), exit(1);
- /*
- * Note that the buffer pointer is of type uint64_t*, because all
- * the comparison operands are promoted to uint64_t.
- */
- cover = (uint64_t *)mmap(NULL, COVER_SIZE * sizeof(unsigned long),
- PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
- if ((void*)cover == MAP_FAILED)
- perror("mmap"), exit(1);
- /* Note KCOV_TRACE_CMP instead of KCOV_TRACE_PC. */
- if (ioctl(fd, KCOV_ENABLE, KCOV_TRACE_CMP))
- perror("ioctl"), exit(1);
- __atomic_store_n(&cover[0], 0, __ATOMIC_RELAXED);
- read(-1, NULL, 0);
- /* Read number of comparisons collected. */
- n = __atomic_load_n(&cover[0], __ATOMIC_RELAXED);
- for (i = 0; i < n; i++) {
- uint64_t ip;
- type = cover[i * KCOV_WORDS_PER_CMP + 1];
- /* arg1 and arg2 - operands of the comparison. */
- arg1 = cover[i * KCOV_WORDS_PER_CMP + 2];
- arg2 = cover[i * KCOV_WORDS_PER_CMP + 3];
- /* ip - caller address. */
- ip = cover[i * KCOV_WORDS_PER_CMP + 4];
- /* size of the operands. */
- size = 1 << ((type & KCOV_CMP_MASK) >> 1);
- /* is_const - true if either operand is a compile-time constant.*/
- is_const = type & KCOV_CMP_CONST;
- printf("ip: 0x%lx type: 0x%lx, arg1: 0x%lx, arg2: 0x%lx, "
- "size: %lu, %s\n",
- ip, type, arg1, arg2, size,
- is_const ? "const" : "non-const");
- }
- if (ioctl(fd, KCOV_DISABLE, 0))
- perror("ioctl"), exit(1);
- /* Free resources. */
- if (munmap(cover, COVER_SIZE * sizeof(unsigned long)))
- perror("munmap"), exit(1);
- if (close(fd))
- perror("close"), exit(1);
- return 0;
- }
- Note that the KCOV modes (collection of code coverage or comparison operands)
- are mutually exclusive.
- Remote coverage collection
- --------------------------
- Besides collecting coverage data from handlers of syscalls issued from a
- userspace process, KCOV can also collect coverage for parts of the kernel
- executing in other contexts - so-called "remote" coverage.
- Using KCOV to collect remote coverage requires:
- 1. Modifying kernel code to annotate the code section from where coverage
- should be collected with ``kcov_remote_start`` and ``kcov_remote_stop``.
- 2. Using ``KCOV_REMOTE_ENABLE`` instead of ``KCOV_ENABLE`` in the userspace
- process that collects coverage.
- Both ``kcov_remote_start`` and ``kcov_remote_stop`` annotations and the
- ``KCOV_REMOTE_ENABLE`` ioctl accept handles that identify particular coverage
- collection sections. The way a handle is used depends on the context where the
- matching code section executes.
- KCOV supports collecting remote coverage from the following contexts:
- 1. Global kernel background tasks. These are the tasks that are spawned during
- kernel boot in a limited number of instances (e.g. one USB ``hub_event``
- worker is spawned per one USB HCD).
- 2. Local kernel background tasks. These are spawned when a userspace process
- interacts with some kernel interface and are usually killed when the process
- exits (e.g. vhost workers).
- 3. Soft interrupts.
- For #1 and #3, a unique global handle must be chosen and passed to the
- corresponding ``kcov_remote_start`` call. Then a userspace process must pass
- this handle to ``KCOV_REMOTE_ENABLE`` in the ``handles`` array field of the
- ``kcov_remote_arg`` struct. This will attach the used KCOV device to the code
- section referenced by this handle. Multiple global handles identifying
- different code sections can be passed at once.
- For #2, the userspace process instead must pass a non-zero handle through the
- ``common_handle`` field of the ``kcov_remote_arg`` struct. This common handle
- gets saved to the ``kcov_handle`` field in the current ``task_struct`` and
- needs to be passed to the newly spawned local tasks via custom kernel code
- modifications. Those tasks should in turn use the passed handle in their
- ``kcov_remote_start`` and ``kcov_remote_stop`` annotations.
- KCOV follows a predefined format for both global and common handles. Each
- handle is a ``u64`` integer. Currently, only the one top and the lower 4 bytes
- are used. Bytes 4-7 are reserved and must be zero.
- For global handles, the top byte of the handle denotes the id of a subsystem
- this handle belongs to. For example, KCOV uses ``1`` as the USB subsystem id.
- The lower 4 bytes of a global handle denote the id of a task instance within
- that subsystem. For example, each ``hub_event`` worker uses the USB bus number
- as the task instance id.
- For common handles, a reserved value ``0`` is used as a subsystem id, as such
- handles don't belong to a particular subsystem. The lower 4 bytes of a common
- handle identify a collective instance of all local tasks spawned by the
- userspace process that passed a common handle to ``KCOV_REMOTE_ENABLE``.
- In practice, any value can be used for common handle instance id if coverage
- is only collected from a single userspace process on the system. However, if
- common handles are used by multiple processes, unique instance ids must be
- used for each process. One option is to use the process id as the common
- handle instance id.
- The following program demonstrates using KCOV to collect coverage from both
- local tasks spawned by the process and the global task that handles USB bus #1:
- .. code-block:: c
- /* Same includes and defines as above. */
- struct kcov_remote_arg {
- __u32 trace_mode;
- __u32 area_size;
- __u32 num_handles;
- __aligned_u64 common_handle;
- __aligned_u64 handles[0];
- };
- #define KCOV_INIT_TRACE _IOR('c', 1, unsigned long)
- #define KCOV_DISABLE _IO('c', 101)
- #define KCOV_REMOTE_ENABLE _IOW('c', 102, struct kcov_remote_arg)
- #define COVER_SIZE (64 << 10)
- #define KCOV_TRACE_PC 0
- #define KCOV_SUBSYSTEM_COMMON (0x00ull << 56)
- #define KCOV_SUBSYSTEM_USB (0x01ull << 56)
- #define KCOV_SUBSYSTEM_MASK (0xffull << 56)
- #define KCOV_INSTANCE_MASK (0xffffffffull)
- static inline __u64 kcov_remote_handle(__u64 subsys, __u64 inst)
- {
- if (subsys & ~KCOV_SUBSYSTEM_MASK || inst & ~KCOV_INSTANCE_MASK)
- return 0;
- return subsys | inst;
- }
- #define KCOV_COMMON_ID 0x42
- #define KCOV_USB_BUS_NUM 1
- int main(int argc, char **argv)
- {
- int fd;
- unsigned long *cover, n, i;
- struct kcov_remote_arg *arg;
- fd = open("/sys/kernel/debug/kcov", O_RDWR);
- if (fd == -1)
- perror("open"), exit(1);
- if (ioctl(fd, KCOV_INIT_TRACE, COVER_SIZE))
- perror("ioctl"), exit(1);
- cover = (unsigned long*)mmap(NULL, COVER_SIZE * sizeof(unsigned long),
- PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
- if ((void*)cover == MAP_FAILED)
- perror("mmap"), exit(1);
- /* Enable coverage collection via common handle and from USB bus #1. */
- arg = calloc(1, sizeof(*arg) + sizeof(uint64_t));
- if (!arg)
- perror("calloc"), exit(1);
- arg->trace_mode = KCOV_TRACE_PC;
- arg->area_size = COVER_SIZE;
- arg->num_handles = 1;
- arg->common_handle = kcov_remote_handle(KCOV_SUBSYSTEM_COMMON,
- KCOV_COMMON_ID);
- arg->handles[0] = kcov_remote_handle(KCOV_SUBSYSTEM_USB,
- KCOV_USB_BUS_NUM);
- if (ioctl(fd, KCOV_REMOTE_ENABLE, arg))
- perror("ioctl"), free(arg), exit(1);
- free(arg);
- /*
- * Here the user needs to trigger execution of a kernel code section
- * that is either annotated with the common handle, or to trigger some
- * activity on USB bus #1.
- */
- sleep(2);
- n = __atomic_load_n(&cover[0], __ATOMIC_RELAXED);
- for (i = 0; i < n; i++)
- printf("0x%lx\n", cover[i + 1]);
- if (ioctl(fd, KCOV_DISABLE, 0))
- perror("ioctl"), exit(1);
- if (munmap(cover, COVER_SIZE * sizeof(unsigned long)))
- perror("munmap"), exit(1);
- if (close(fd))
- perror("close"), exit(1);
- return 0;
- }
|