2016-08-28 14:33:32 +00:00
|
|
|
// AUTOGENERATED FROM executor/common.h
|
|
|
|
package csource
|
2016-11-19 10:14:11 +00:00
|
|
|
|
2016-08-28 14:33:32 +00:00
|
|
|
var commonHeader = `
|
|
|
|
|
2016-10-04 14:12:12 +00:00
|
|
|
|
2016-11-22 14:48:46 +00:00
|
|
|
#ifndef _GNU_SOURCE
|
2016-11-21 16:34:34 +00:00
|
|
|
#define _GNU_SOURCE
|
2016-11-22 14:48:46 +00:00
|
|
|
#endif
|
2016-10-04 14:12:12 +00:00
|
|
|
|
|
|
|
#include <sys/ioctl.h>
|
2016-12-08 14:20:01 +00:00
|
|
|
#include <sys/mman.h>
|
2016-10-04 14:12:12 +00:00
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/prctl.h>
|
|
|
|
#include <sys/resource.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/syscall.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
|
|
|
|
#include <linux/capability.h>
|
2017-01-08 16:20:32 +00:00
|
|
|
#include <linux/kvm.h>
|
2016-10-04 14:12:12 +00:00
|
|
|
#include <linux/sched.h>
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <linux/if.h>
|
|
|
|
#include <linux/if_ether.h>
|
|
|
|
#include <linux/if_tun.h>
|
|
|
|
#include <linux/ip.h>
|
|
|
|
#include <linux/tcp.h>
|
2016-10-04 14:12:12 +00:00
|
|
|
#include <net/if_arp.h>
|
|
|
|
|
|
|
|
#include <assert.h>
|
2016-10-18 19:07:40 +00:00
|
|
|
#include <dirent.h>
|
|
|
|
#include <errno.h>
|
2016-08-28 14:33:32 +00:00
|
|
|
#include <fcntl.h>
|
2016-10-18 19:07:40 +00:00
|
|
|
#include <grp.h>
|
2016-08-28 14:33:32 +00:00
|
|
|
#include <pthread.h>
|
|
|
|
#include <setjmp.h>
|
|
|
|
#include <signal.h>
|
2016-10-18 19:07:40 +00:00
|
|
|
#include <stdarg.h>
|
2016-12-02 12:18:42 +00:00
|
|
|
#include <stdbool.h>
|
2016-08-28 14:33:32 +00:00
|
|
|
#include <stddef.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2016-10-18 19:07:40 +00:00
|
|
|
const int kFailStatus = 67;
|
|
|
|
const int kErrorStatus = 68;
|
|
|
|
const int kRetryStatus = 69;
|
|
|
|
|
2016-12-08 14:20:01 +00:00
|
|
|
__attribute__((noreturn)) void doexit(int status)
|
|
|
|
{
|
2017-01-08 14:28:38 +00:00
|
|
|
volatile unsigned i;
|
2016-12-08 14:20:01 +00:00
|
|
|
syscall(__NR_exit_group, status);
|
2017-01-08 14:28:38 +00:00
|
|
|
for (i = 0;; i++) {
|
2016-12-08 14:20:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(SYZ_EXECUTOR)
|
|
|
|
#define exit use_doexit_instead
|
|
|
|
#define _exit use_doexit_instead
|
|
|
|
#endif
|
|
|
|
|
2016-10-18 19:07:40 +00:00
|
|
|
__attribute__((noreturn)) void fail(const char* msg, ...)
|
|
|
|
{
|
|
|
|
int e = errno;
|
|
|
|
fflush(stdout);
|
|
|
|
va_list args;
|
|
|
|
va_start(args, msg);
|
|
|
|
vfprintf(stderr, msg, args);
|
|
|
|
va_end(args);
|
|
|
|
fprintf(stderr, " (errno %d)\n", e);
|
2017-03-05 13:44:32 +00:00
|
|
|
doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus);
|
2016-10-18 19:07:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(SYZ_EXECUTOR)
|
|
|
|
__attribute__((noreturn)) void error(const char* msg, ...)
|
|
|
|
{
|
|
|
|
fflush(stdout);
|
|
|
|
va_list args;
|
|
|
|
va_start(args, msg);
|
|
|
|
vfprintf(stderr, msg, args);
|
|
|
|
va_end(args);
|
|
|
|
fprintf(stderr, "\n");
|
2016-12-08 14:20:01 +00:00
|
|
|
doexit(kErrorStatus);
|
2016-10-18 19:07:40 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
__attribute__((noreturn)) void exitf(const char* msg, ...)
|
|
|
|
{
|
|
|
|
int e = errno;
|
|
|
|
fflush(stdout);
|
|
|
|
va_list args;
|
|
|
|
va_start(args, msg);
|
|
|
|
vfprintf(stderr, msg, args);
|
|
|
|
va_end(args);
|
|
|
|
fprintf(stderr, " (errno %d)\n", e);
|
2016-12-08 14:20:01 +00:00
|
|
|
doexit(kRetryStatus);
|
2016-10-18 19:07:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int flag_debug;
|
|
|
|
|
|
|
|
void debug(const char* msg, ...)
|
|
|
|
{
|
|
|
|
if (!flag_debug)
|
|
|
|
return;
|
|
|
|
va_list args;
|
|
|
|
va_start(args, msg);
|
|
|
|
vfprintf(stdout, msg, args);
|
|
|
|
va_end(args);
|
|
|
|
fflush(stdout);
|
|
|
|
}
|
|
|
|
|
2016-08-28 14:33:32 +00:00
|
|
|
__thread int skip_segv;
|
|
|
|
__thread jmp_buf segv_env;
|
|
|
|
|
|
|
|
static void segv_handler(int sig, siginfo_t* info, void* uctx)
|
|
|
|
{
|
2017-01-25 10:01:30 +00:00
|
|
|
uintptr_t addr = (uintptr_t)info->si_addr;
|
2017-01-27 19:51:41 +00:00
|
|
|
const uintptr_t prog_start = 1 << 20;
|
|
|
|
const uintptr_t prog_end = 100 << 20;
|
2017-01-25 10:01:30 +00:00
|
|
|
if (__atomic_load_n(&skip_segv, __ATOMIC_RELAXED) && (addr < prog_start || addr > prog_end)) {
|
|
|
|
debug("SIGSEGV on %p, skipping\n", addr);
|
2016-08-28 14:33:32 +00:00
|
|
|
_longjmp(segv_env, 1);
|
2017-01-25 10:01:30 +00:00
|
|
|
}
|
|
|
|
debug("SIGSEGV on %p, exiting\n", addr);
|
2016-12-08 14:20:01 +00:00
|
|
|
doexit(sig);
|
|
|
|
for (;;) {
|
|
|
|
}
|
2016-08-28 14:33:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void install_segv_handler()
|
|
|
|
{
|
|
|
|
struct sigaction sa;
|
2017-05-17 18:35:50 +00:00
|
|
|
|
|
|
|
memset(&sa, 0, sizeof(sa));
|
|
|
|
sa.sa_handler = SIG_IGN;
|
|
|
|
syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8);
|
|
|
|
syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8);
|
|
|
|
|
2016-08-28 14:33:32 +00:00
|
|
|
memset(&sa, 0, sizeof(sa));
|
|
|
|
sa.sa_sigaction = segv_handler;
|
|
|
|
sa.sa_flags = SA_NODEFER | SA_SIGINFO;
|
|
|
|
sigaction(SIGSEGV, &sa, NULL);
|
|
|
|
sigaction(SIGBUS, &sa, NULL);
|
|
|
|
}
|
|
|
|
|
2017-05-18 12:26:02 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_USE_TMP_DIR)
|
|
|
|
static void use_temporary_dir()
|
|
|
|
{
|
2017-05-17 18:35:50 +00:00
|
|
|
char tmpdir_template[] = "./syzkaller.XXXXXX";
|
|
|
|
char* tmpdir = mkdtemp(tmpdir_template);
|
|
|
|
if (!tmpdir)
|
|
|
|
fail("failed to mkdtemp");
|
|
|
|
if (chmod(tmpdir, 0777))
|
|
|
|
fail("failed to chmod");
|
|
|
|
if (chdir(tmpdir))
|
|
|
|
fail("failed to chdir");
|
|
|
|
}
|
2017-05-18 12:26:02 +00:00
|
|
|
#endif
|
2017-05-17 18:35:50 +00:00
|
|
|
|
2016-08-28 14:33:32 +00:00
|
|
|
#define NONFAILING(...) \
|
|
|
|
{ \
|
|
|
|
__atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \
|
|
|
|
if (_setjmp(segv_env) == 0) { \
|
|
|
|
__VA_ARGS__; \
|
|
|
|
} \
|
|
|
|
__atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \
|
|
|
|
}
|
|
|
|
|
2017-01-17 18:04:37 +00:00
|
|
|
#define BITMASK_LEN(type, bf_len) (type)((1ull << (bf_len)) - 1)
|
|
|
|
|
|
|
|
#define BITMASK_LEN_OFF(type, bf_off, bf_len) (type)(BITMASK_LEN(type, (bf_len)) << (bf_off))
|
|
|
|
|
|
|
|
#define STORE_BY_BITMASK(type, addr, val, bf_off, bf_len) \
|
|
|
|
if ((bf_off) == 0 && (bf_len) == 0) { \
|
2017-01-20 12:24:53 +00:00
|
|
|
*(type*)(addr) = (type)(val); \
|
2017-01-17 18:04:37 +00:00
|
|
|
} else { \
|
|
|
|
type new_val = *(type*)(addr); \
|
|
|
|
new_val &= ~BITMASK_LEN_OFF(type, (bf_off), (bf_len)); \
|
|
|
|
new_val |= ((type)(val)&BITMASK_LEN(type, (bf_len))) << (bf_off); \
|
|
|
|
*(type*)(addr) = new_val; \
|
|
|
|
}
|
2017-01-17 16:20:01 +00:00
|
|
|
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_TUN_ENABLE)
|
2016-10-04 14:12:12 +00:00
|
|
|
static void vsnprintf_check(char* str, size_t size, const char* format, va_list args)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
rv = vsnprintf(str, size, format, args);
|
|
|
|
if (rv < 0)
|
|
|
|
fail("tun: snprintf failed");
|
|
|
|
if ((size_t)rv >= size)
|
|
|
|
fail("tun: string '%s...' doesn't fit into buffer", str);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void snprintf_check(char* str, size_t size, const char* format, ...)
|
|
|
|
{
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
va_start(args, format);
|
|
|
|
vsnprintf_check(str, size, format, args);
|
|
|
|
va_end(args);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define COMMAND_MAX_LEN 128
|
|
|
|
|
|
|
|
static void execute_command(const char* format, ...)
|
|
|
|
{
|
|
|
|
va_list args;
|
|
|
|
char command[COMMAND_MAX_LEN];
|
2017-01-31 17:40:10 +00:00
|
|
|
int rv;
|
2016-10-04 14:12:12 +00:00
|
|
|
|
|
|
|
va_start(args, format);
|
|
|
|
|
|
|
|
vsnprintf_check(command, sizeof(command), format, args);
|
2017-01-31 17:40:10 +00:00
|
|
|
rv = system(command);
|
|
|
|
if (rv != 0)
|
|
|
|
fail("tun: command \"%s\" failed with code %d", &command[0], rv);
|
2016-10-04 14:12:12 +00:00
|
|
|
|
|
|
|
va_end(args);
|
|
|
|
}
|
|
|
|
|
2016-12-02 12:18:42 +00:00
|
|
|
int tunfd = -1;
|
2016-10-04 14:12:12 +00:00
|
|
|
|
2017-06-01 13:52:18 +00:00
|
|
|
#define SYZ_TUN_MAX_PACKET_SIZE 1000
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
|
2016-12-07 15:00:20 +00:00
|
|
|
#define MAX_PIDS 32
|
2016-10-04 14:12:12 +00:00
|
|
|
#define ADDR_MAX_LEN 32
|
|
|
|
|
|
|
|
#define LOCAL_MAC "aa:aa:aa:aa:aa:%02hx"
|
|
|
|
#define REMOTE_MAC "bb:bb:bb:bb:bb:%02hx"
|
|
|
|
|
2017-01-20 14:00:15 +00:00
|
|
|
#define LOCAL_IPV4 "172.20.%d.170"
|
|
|
|
#define REMOTE_IPV4 "172.20.%d.187"
|
2016-10-04 14:12:12 +00:00
|
|
|
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
#define LOCAL_IPV6 "fe80::%02hxaa"
|
|
|
|
#define REMOTE_IPV6 "fe80::%02hxbb"
|
2016-10-04 14:12:12 +00:00
|
|
|
|
|
|
|
static void initialize_tun(uint64_t pid)
|
|
|
|
{
|
2016-12-07 15:00:20 +00:00
|
|
|
if (pid >= MAX_PIDS)
|
|
|
|
fail("tun: no more than %d executors", MAX_PIDS);
|
2017-01-20 14:00:15 +00:00
|
|
|
int id = pid;
|
2016-10-04 14:12:12 +00:00
|
|
|
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
tunfd = open("/dev/net/tun", O_RDWR | O_NONBLOCK);
|
2016-10-04 14:12:12 +00:00
|
|
|
if (tunfd == -1)
|
|
|
|
fail("tun: can't open /dev/net/tun");
|
|
|
|
|
|
|
|
char iface[IFNAMSIZ];
|
|
|
|
snprintf_check(iface, sizeof(iface), "syz%d", id);
|
|
|
|
|
|
|
|
struct ifreq ifr;
|
|
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
|
|
strncpy(ifr.ifr_name, iface, IFNAMSIZ);
|
|
|
|
ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
|
|
|
|
if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0)
|
|
|
|
fail("tun: ioctl(TUNSETIFF) failed");
|
|
|
|
|
|
|
|
char local_mac[ADDR_MAX_LEN];
|
|
|
|
snprintf_check(local_mac, sizeof(local_mac), LOCAL_MAC, id);
|
|
|
|
char remote_mac[ADDR_MAX_LEN];
|
|
|
|
snprintf_check(remote_mac, sizeof(remote_mac), REMOTE_MAC, id);
|
|
|
|
|
|
|
|
char local_ipv4[ADDR_MAX_LEN];
|
|
|
|
snprintf_check(local_ipv4, sizeof(local_ipv4), LOCAL_IPV4, id);
|
|
|
|
char remote_ipv4[ADDR_MAX_LEN];
|
|
|
|
snprintf_check(remote_ipv4, sizeof(remote_ipv4), REMOTE_IPV4, id);
|
|
|
|
|
|
|
|
char local_ipv6[ADDR_MAX_LEN];
|
|
|
|
snprintf_check(local_ipv6, sizeof(local_ipv6), LOCAL_IPV6, id);
|
|
|
|
char remote_ipv6[ADDR_MAX_LEN];
|
|
|
|
snprintf_check(remote_ipv6, sizeof(remote_ipv6), REMOTE_IPV6, id);
|
|
|
|
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
execute_command("sysctl -w net.ipv6.conf.%s.accept_dad=0", iface);
|
|
|
|
|
|
|
|
execute_command("sysctl -w net.ipv6.conf.%s.router_solicitations=0", iface);
|
|
|
|
|
2016-10-04 14:12:12 +00:00
|
|
|
execute_command("ip link set dev %s address %s", iface, local_mac);
|
|
|
|
execute_command("ip addr add %s/24 dev %s", local_ipv4, iface);
|
|
|
|
execute_command("ip -6 addr add %s/120 dev %s", local_ipv6, iface);
|
|
|
|
execute_command("ip neigh add %s lladdr %s dev %s nud permanent", remote_ipv4, remote_mac, iface);
|
|
|
|
execute_command("ip -6 neigh add %s lladdr %s dev %s nud permanent", remote_ipv6, remote_mac, iface);
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
execute_command("ip link set dev %s up", iface);
|
2016-10-04 14:12:12 +00:00
|
|
|
}
|
|
|
|
|
2017-02-01 09:16:19 +00:00
|
|
|
static void setup_tun(uint64_t pid, bool enable_tun)
|
|
|
|
{
|
2017-01-31 17:40:10 +00:00
|
|
|
if (enable_tun)
|
|
|
|
initialize_tun(pid);
|
|
|
|
}
|
|
|
|
|
2017-05-17 18:20:23 +00:00
|
|
|
int read_tun(char* data, int size)
|
|
|
|
{
|
|
|
|
int rv = read(tunfd, data, size);
|
|
|
|
if (rv < 0) {
|
|
|
|
if (errno == EAGAIN)
|
|
|
|
return -1;
|
|
|
|
fail("tun: read failed with %d, errno: %d", rv, errno);
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
void debug_dump_data(const char* data, int length)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < length; i++) {
|
|
|
|
debug("%02hx ", (uint8_t)data[i] & (uint8_t)0xff);
|
|
|
|
if (i % 16 == 15)
|
|
|
|
debug("\n");
|
|
|
|
}
|
|
|
|
if (i % 16 != 0)
|
|
|
|
debug("\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || (defined(__NR_syz_emit_ethernet) && defined(SYZ_TUN_ENABLE)) || defined(__NR_syz_test)
|
2017-05-17 15:36:31 +00:00
|
|
|
struct csum_inet {
|
|
|
|
uint32_t acc;
|
|
|
|
};
|
|
|
|
|
|
|
|
void csum_inet_init(struct csum_inet* csum)
|
|
|
|
{
|
|
|
|
csum->acc = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void csum_inet_update(struct csum_inet* csum, const uint8_t* data, size_t length)
|
|
|
|
{
|
|
|
|
if (length == 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < length - 1; i += 2)
|
|
|
|
csum->acc += *(uint16_t*)&data[i];
|
|
|
|
|
|
|
|
if (length & 1)
|
|
|
|
csum->acc += (uint16_t)data[length - 1];
|
|
|
|
|
|
|
|
while (csum->acc > 0xffff)
|
|
|
|
csum->acc = (csum->acc & 0xffff) + (csum->acc >> 16);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint16_t csum_inet_digest(struct csum_inet* csum)
|
|
|
|
{
|
|
|
|
return ~csum->acc;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || (defined(__NR_syz_emit_ethernet) && defined(SYZ_TUN_ENABLE))
|
2016-10-04 14:12:12 +00:00
|
|
|
static uintptr_t syz_emit_ethernet(uintptr_t a0, uintptr_t a1)
|
|
|
|
{
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
|
2016-12-02 12:18:42 +00:00
|
|
|
if (tunfd < 0)
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
|
2016-10-04 14:12:12 +00:00
|
|
|
int64_t length = a0;
|
|
|
|
char* data = (char*)a1;
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
debug_dump_data(data, length);
|
2016-10-04 14:12:12 +00:00
|
|
|
return write(tunfd, data, length);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || (defined(SYZ_REPEAT) && defined(SYZ_TUN_ENABLE))
|
2017-05-17 18:20:23 +00:00
|
|
|
void flush_tun()
|
|
|
|
{
|
|
|
|
char data[SYZ_TUN_MAX_PACKET_SIZE];
|
|
|
|
while (read_tun(&data[0], sizeof(data)) != -1)
|
|
|
|
;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || (defined(__NR_syz_extract_tcp_res) && defined(SYZ_TUN_ENABLE))
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
struct ipv6hdr {
|
|
|
|
__u8 priority : 4,
|
|
|
|
version : 4;
|
|
|
|
__u8 flow_lbl[3];
|
|
|
|
|
|
|
|
__be16 payload_len;
|
|
|
|
__u8 nexthdr;
|
|
|
|
__u8 hop_limit;
|
|
|
|
|
|
|
|
struct in6_addr saddr;
|
|
|
|
struct in6_addr daddr;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct tcp_resources {
|
|
|
|
int32_t seq;
|
|
|
|
int32_t ack;
|
|
|
|
};
|
|
|
|
|
|
|
|
static uintptr_t syz_extract_tcp_res(uintptr_t a0, uintptr_t a1, uintptr_t a2)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (tunfd < 0)
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
|
|
|
|
char data[SYZ_TUN_MAX_PACKET_SIZE];
|
|
|
|
int rv = read_tun(&data[0], sizeof(data));
|
|
|
|
if (rv == -1)
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
size_t length = rv;
|
|
|
|
debug_dump_data(data, length);
|
|
|
|
|
|
|
|
struct tcphdr* tcphdr;
|
|
|
|
|
|
|
|
if (length < sizeof(struct ethhdr))
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
struct ethhdr* ethhdr = (struct ethhdr*)&data[0];
|
|
|
|
|
|
|
|
if (ethhdr->h_proto == htons(ETH_P_IP)) {
|
|
|
|
if (length < sizeof(struct ethhdr) + sizeof(struct iphdr))
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
struct iphdr* iphdr = (struct iphdr*)&data[sizeof(struct ethhdr)];
|
|
|
|
if (iphdr->protocol != IPPROTO_TCP)
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
if (length < sizeof(struct ethhdr) + iphdr->ihl * 4 + sizeof(struct tcphdr))
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
tcphdr = (struct tcphdr*)&data[sizeof(struct ethhdr) + iphdr->ihl * 4];
|
|
|
|
} else {
|
|
|
|
if (length < sizeof(struct ethhdr) + sizeof(struct ipv6hdr))
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
struct ipv6hdr* ipv6hdr = (struct ipv6hdr*)&data[sizeof(struct ethhdr)];
|
|
|
|
if (ipv6hdr->nexthdr != IPPROTO_TCP)
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
if (length < sizeof(struct ethhdr) + sizeof(struct ipv6hdr) + sizeof(struct tcphdr))
|
|
|
|
return (uintptr_t)-1;
|
|
|
|
tcphdr = (struct tcphdr*)&data[sizeof(struct ethhdr) + sizeof(struct ipv6hdr)];
|
|
|
|
}
|
|
|
|
|
|
|
|
struct tcp_resources* res = (struct tcp_resources*)a0;
|
|
|
|
NONFAILING(res->seq = htonl((ntohl(tcphdr->seq) + (uint32_t)a1)));
|
|
|
|
NONFAILING(res->ack = htonl((ntohl(tcphdr->ack_seq) + (uint32_t)a2)));
|
|
|
|
|
|
|
|
debug("extracted seq: %08x\n", res->seq);
|
|
|
|
debug("extracted ack: %08x\n", res->ack);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-11-26 15:37:46 +00:00
|
|
|
#ifdef __NR_syz_open_dev
|
2016-08-28 14:33:32 +00:00
|
|
|
static uintptr_t syz_open_dev(uintptr_t a0, uintptr_t a1, uintptr_t a2)
|
|
|
|
{
|
|
|
|
if (a0 == 0xc || a0 == 0xb) {
|
|
|
|
char buf[128];
|
|
|
|
sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, (uint8_t)a2);
|
|
|
|
return open(buf, O_RDWR, 0);
|
|
|
|
} else {
|
|
|
|
char buf[1024];
|
|
|
|
char* hash;
|
2017-01-08 14:30:38 +00:00
|
|
|
NONFAILING(strncpy(buf, (char*)a0, sizeof(buf)));
|
2016-08-28 14:33:32 +00:00
|
|
|
buf[sizeof(buf) - 1] = 0;
|
|
|
|
while ((hash = strchr(buf, '#'))) {
|
|
|
|
*hash = '0' + (char)(a1 % 10);
|
|
|
|
a1 /= 10;
|
|
|
|
}
|
|
|
|
return open(buf, a2, 0);
|
|
|
|
}
|
|
|
|
}
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
2016-08-28 14:33:32 +00:00
|
|
|
|
2016-11-26 15:37:46 +00:00
|
|
|
#ifdef __NR_syz_open_pts
|
2016-08-28 14:33:32 +00:00
|
|
|
static uintptr_t syz_open_pts(uintptr_t a0, uintptr_t a1)
|
|
|
|
{
|
|
|
|
int ptyno = 0;
|
|
|
|
if (ioctl(a0, TIOCGPTN, &ptyno))
|
|
|
|
return -1;
|
|
|
|
char buf[128];
|
|
|
|
sprintf(buf, "/dev/pts/%d", ptyno);
|
|
|
|
return open(buf, a1, 0);
|
|
|
|
}
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
2016-08-28 14:33:32 +00:00
|
|
|
|
2016-11-26 15:37:46 +00:00
|
|
|
#ifdef __NR_syz_fuse_mount
|
2016-08-28 14:33:32 +00:00
|
|
|
static uintptr_t syz_fuse_mount(uintptr_t a0, uintptr_t a1, uintptr_t a2, uintptr_t a3, uintptr_t a4, uintptr_t a5)
|
|
|
|
{
|
|
|
|
uint64_t target = a0;
|
|
|
|
uint64_t mode = a1;
|
|
|
|
uint64_t uid = a2;
|
|
|
|
uint64_t gid = a3;
|
|
|
|
uint64_t maxread = a4;
|
|
|
|
uint64_t flags = a5;
|
|
|
|
|
|
|
|
int fd = open("/dev/fuse", O_RDWR);
|
|
|
|
if (fd == -1)
|
|
|
|
return fd;
|
|
|
|
char buf[1024];
|
|
|
|
sprintf(buf, "fd=%d,user_id=%ld,group_id=%ld,rootmode=0%o", fd, (long)uid, (long)gid, (unsigned)mode & ~3u);
|
|
|
|
if (maxread != 0)
|
|
|
|
sprintf(buf + strlen(buf), ",max_read=%ld", (long)maxread);
|
|
|
|
if (mode & 1)
|
|
|
|
strcat(buf, ",default_permissions");
|
|
|
|
if (mode & 2)
|
|
|
|
strcat(buf, ",allow_other");
|
|
|
|
syscall(SYS_mount, "", target, "fuse", flags, buf);
|
|
|
|
return fd;
|
|
|
|
}
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
2016-08-28 14:33:32 +00:00
|
|
|
|
2016-11-26 15:37:46 +00:00
|
|
|
#ifdef __NR_syz_fuseblk_mount
|
2016-08-28 14:33:32 +00:00
|
|
|
static uintptr_t syz_fuseblk_mount(uintptr_t a0, uintptr_t a1, uintptr_t a2, uintptr_t a3, uintptr_t a4, uintptr_t a5, uintptr_t a6, uintptr_t a7)
|
|
|
|
{
|
|
|
|
uint64_t target = a0;
|
|
|
|
uint64_t blkdev = a1;
|
|
|
|
uint64_t mode = a2;
|
|
|
|
uint64_t uid = a3;
|
|
|
|
uint64_t gid = a4;
|
|
|
|
uint64_t maxread = a5;
|
|
|
|
uint64_t blksize = a6;
|
|
|
|
uint64_t flags = a7;
|
|
|
|
|
|
|
|
int fd = open("/dev/fuse", O_RDWR);
|
|
|
|
if (fd == -1)
|
|
|
|
return fd;
|
|
|
|
if (syscall(SYS_mknodat, AT_FDCWD, blkdev, S_IFBLK, makedev(7, 199)))
|
|
|
|
return fd;
|
|
|
|
char buf[256];
|
|
|
|
sprintf(buf, "fd=%d,user_id=%ld,group_id=%ld,rootmode=0%o", fd, (long)uid, (long)gid, (unsigned)mode & ~3u);
|
|
|
|
if (maxread != 0)
|
|
|
|
sprintf(buf + strlen(buf), ",max_read=%ld", (long)maxread);
|
|
|
|
if (blksize != 0)
|
|
|
|
sprintf(buf + strlen(buf), ",blksize=%ld", (long)blksize);
|
|
|
|
if (mode & 1)
|
|
|
|
strcat(buf, ",default_permissions");
|
|
|
|
if (mode & 2)
|
|
|
|
strcat(buf, ",allow_other");
|
|
|
|
syscall(SYS_mount, blkdev, target, "fuseblk", flags, buf);
|
|
|
|
return fd;
|
|
|
|
}
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
2016-08-28 14:33:32 +00:00
|
|
|
|
2017-01-08 16:20:32 +00:00
|
|
|
#ifdef __NR_syz_kvm_setup_cpu
|
2017-01-12 10:57:17 +00:00
|
|
|
#if defined(__x86_64__)
|
2017-01-08 16:20:32 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
const char kvm_asm16_cpl3[] = "\x0f\x20\xc0\x66\x83\xc8\x01\x0f\x22\xc0\xb8\xa0\x00\x0f\x00\xd8\xb8\x2b\x00\x8e\xd8\x8e\xc0\x8e\xe0\x8e\xe8\xbc\x00\x01\xc7\x06\x00\x01\x1d\xba\xc7\x06\x02\x01\x23\x00\xc7\x06\x04\x01\x00\x01\xc7\x06\x06\x01\x2b\x00\xcb";
|
|
|
|
const char kvm_asm32_paged[] = "\x0f\x20\xc0\x0d\x00\x00\x00\x80\x0f\x22\xc0";
|
|
|
|
const char kvm_asm32_vm86[] = "\x66\xb8\xb8\x00\x0f\x00\xd8\xea\x00\x00\x00\x00\xd0\x00";
|
|
|
|
const char kvm_asm32_paged_vm86[] = "\x0f\x20\xc0\x0d\x00\x00\x00\x80\x0f\x22\xc0\x66\xb8\xb8\x00\x0f\x00\xd8\xea\x00\x00\x00\x00\xd0\x00";
|
|
|
|
const char kvm_asm64_vm86[] = "\x0f\x20\xc0\x0d\x00\x00\x00\x80\x0f\x22\xc0\x66\xb8\xb8\x00\x0f\x00\xd8\xea\x00\x00\x00\x00\xd0\x00";
|
|
|
|
const char kvm_asm64_enable_long[] = "\x0f\x20\xc0\x0d\x00\x00\x00\x80\x0f\x22\xc0\xea\xde\xc0\xad\x0b\x50\x00\x48\xc7\xc0\xd8\x00\x00\x00\x0f\x00\xd8";
|
2017-02-01 09:16:19 +00:00
|
|
|
const char kvm_asm64_init_vm[] = "\x0f\x20\xc0\x0d\x00\x00\x00\x80\x0f\x22\xc0\xea\xde\xc0\xad\x0b\x50\x00\x48\xc7\xc0\xd8\x00\x00\x00\x0f\x00\xd8\x48\xc7\xc1\x3a\x00\x00\x00\x0f\x32\x48\x83\xc8\x05\x0f\x30\x0f\x20\xe0\x48\x0d\x00\x20\x00\x00\x0f\x22\xe0\x48\xc7\xc1\x80\x04\x00\x00\x0f\x32\x48\xc7\xc2\x00\x60\x00\x00\x89\x02\x48\xc7\xc2\x00\x70\x00\x00\x89\x02\x48\xc7\xc0\x00\x5f\x00\x00\xf3\x0f\xc7\x30\x48\xc7\xc0\x08\x5f\x00\x00\x66\x0f\xc7\x30\x0f\xc7\x30\x48\xc7\xc1\x81\x04\x00\x00\x0f\x32\x48\x83\xc8\x3f\x48\x21\xd0\x48\xc7\xc2\x00\x40\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x02\x40\x00\x00\x48\xb8\x84\x9e\x99\xf3\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x1e\x40\x00\x00\x48\xc7\xc0\x81\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc1\x83\x04\x00\x00\x0f\x32\x48\x0d\xff\x6f\x03\x00\x48\x21\xd0\x48\xc7\xc2\x0c\x40\x00\x00\x0f\x79\xd0\x48\xc7\xc1\x84\x04\x00\x00\x0f\x32\x48\x0d\xff\x17\x00\x00\x48\x21\xd0\x48\xc7\xc2\x12\x40\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x04\x2c\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x00\x28\x00\x00\x48\xc7\xc0\xff\xff\xff\xff\x0f\x79\xd0\x48\xc7\xc2\x02\x0c\x00\x00\x48\xc7\xc0\x50\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc0\x58\x00\x00\x00\x48\xc7\xc2\x00\x0c\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x04\x0c\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x06\x0c\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x08\x0c\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x0a\x0c\x00\x00\x0f\x79\xd0\x48\xc7\xc0\xd8\x00\x00\x00\x48\xc7\xc2\x0c\x0c\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x02\x2c\x00\x00\x48\xc7\xc0\x00\x05\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x00\x4c\x00\x00\x48\xc7\xc0\x50\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x10\x6c\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x12\x6c\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x0f\x20\xc0\x48\xc7\xc2\x00\x6c\x00\x00\x48\x89\xc0\x0f\x79\xd0\x0f\x20\xd8\x48\xc7\xc2\x02\x6c\x00\x00\x48\x89\xc0\x0f\x79\xd0\x0f\x20\xe0\x48\xc7\xc2\x04\x6c\x00\x00\x48\x89\xc0\x0f\x79\xd0\x48\xc7\xc2\x06\x6c\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x08\x6c\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x0a\x6c\x00\x00\x48\xc7\xc0\x00\x3a\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x0c\x6c\x00\x00\x48\xc7\xc0\x00\x10\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x0e\x6c\x00\x00\x48\xc7\xc0\x00\x38\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x14\x6c\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x16\x6c\x00\x00\x48\x8b\x04\x25\x10\x5f\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x00\x00\x00\x00\x48\xc7\xc0\x01\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x02\x00\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x00\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x02\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x04\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x06\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc1\x77\x02\x00\x00\x0f\x32\x48\xc1\xe2\x20\x48\x09\xd0\x48\xc7\xc2\x00\x2c\x00\x00\x48\x89\xc0\x0f\x79\xd0\x48\xc7\xc2\x04\x40\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x0a\x40\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x0e\x40\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x10\x40\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x16\x40\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x14\x40\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x00\x60\x00\x00\x48\xc7\xc0\xff\xff\xff\xff\x0f\x79\xd0\x48\xc7\xc2\x02\x60\x00\x00\x48\xc7\xc0\xff\xff\xff\xff\x0f\x79\xd0\x48\xc7\xc2\x1c\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x1e\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x20\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x22\x20\x00\x00\x48\xc7\xc0\x00\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x00\x08\x00\x00\x48\xc7\xc0\x58\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x02\x08\x00\x00\x48\xc7\xc0\x50\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x04\x08\x00\x00\x48\xc7\xc0\x58\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x06\x08\x00\x00\x48\xc7\xc0\x58\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x08\x08\x00\x00\x48\xc7\xc0\x58\x00\x00\x00\x0f\x79\xd0\x48\xc7\xc2\x0a\x08\x00\x00\x48\
|
2017-01-08 16:20:32 +00:00
|
|
|
const char kvm_asm64_vm_exit[] = "\x48\xc7\xc3\x00\x44\x00\x00\x0f\x78\xda\x48\xc7\xc3\x02\x44\x00\x00\x0f\x78\xd9\x48\xc7\xc0\x00\x64\x00\x00\x0f\x78\xc0\x48\xc7\xc3\x1e\x68\x00\x00\x0f\x78\xdb\xf4";
|
|
|
|
const char kvm_asm64_cpl3[] = "\x0f\x20\xc0\x0d\x00\x00\x00\x80\x0f\x22\xc0\xea\xde\xc0\xad\x0b\x50\x00\x48\xc7\xc0\xd8\x00\x00\x00\x0f\x00\xd8\x48\xc7\xc0\x6b\x00\x00\x00\x8e\xd8\x8e\xc0\x8e\xe0\x8e\xe8\x48\xc7\xc4\x80\x0f\x00\x00\x48\xc7\x04\x24\x1d\xba\x00\x00\x48\xc7\x44\x24\x04\x63\x00\x00\x00\x48\xc7\x44\x24\x08\x80\x0f\x00\x00\x48\xc7\x44\x24\x0c\x6b\x00\x00\x00\xcb";
|
|
|
|
|
|
|
|
#define ADDR_TEXT 0x0000
|
|
|
|
#define ADDR_GDT 0x1000
|
|
|
|
#define ADDR_LDT 0x1800
|
|
|
|
#define ADDR_PML4 0x2000
|
|
|
|
#define ADDR_PDP 0x3000
|
|
|
|
#define ADDR_PD 0x4000
|
|
|
|
#define ADDR_STACK0 0x0f80
|
|
|
|
#define ADDR_VAR_HLT 0x2800
|
|
|
|
#define ADDR_VAR_SYSRET 0x2808
|
|
|
|
#define ADDR_VAR_SYSEXIT 0x2810
|
|
|
|
#define ADDR_VAR_IDT 0x3800
|
|
|
|
#define ADDR_VAR_TSS64 0x3a00
|
|
|
|
#define ADDR_VAR_TSS64_CPL3 0x3c00
|
|
|
|
#define ADDR_VAR_TSS16 0x3d00
|
|
|
|
#define ADDR_VAR_TSS16_2 0x3e00
|
|
|
|
#define ADDR_VAR_TSS16_CPL3 0x3f00
|
|
|
|
#define ADDR_VAR_TSS32 0x4800
|
|
|
|
#define ADDR_VAR_TSS32_2 0x4a00
|
|
|
|
#define ADDR_VAR_TSS32_CPL3 0x4c00
|
|
|
|
#define ADDR_VAR_TSS32_VM86 0x4e00
|
|
|
|
#define ADDR_VAR_VMXON_PTR 0x5f00
|
|
|
|
#define ADDR_VAR_VMCS_PTR 0x5f08
|
|
|
|
#define ADDR_VAR_VMEXIT_PTR 0x5f10
|
2017-01-28 18:04:37 +00:00
|
|
|
#define ADDR_VAR_VMWRITE_FLD 0x5f18
|
|
|
|
#define ADDR_VAR_VMWRITE_VAL 0x5f20
|
2017-01-08 16:20:32 +00:00
|
|
|
#define ADDR_VAR_VMXON 0x6000
|
|
|
|
#define ADDR_VAR_VMCS 0x7000
|
|
|
|
#define ADDR_VAR_VMEXIT_CODE 0x9000
|
|
|
|
#define ADDR_VAR_USER_CODE 0x9100
|
|
|
|
#define ADDR_VAR_USER_CODE2 0x9120
|
|
|
|
|
|
|
|
#define SEL_LDT (1 << 3)
|
|
|
|
#define SEL_CS16 (2 << 3)
|
|
|
|
#define SEL_DS16 (3 << 3)
|
|
|
|
#define SEL_CS16_CPL3 ((4 << 3) + 3)
|
|
|
|
#define SEL_DS16_CPL3 ((5 << 3) + 3)
|
|
|
|
#define SEL_CS32 (6 << 3)
|
|
|
|
#define SEL_DS32 (7 << 3)
|
|
|
|
#define SEL_CS32_CPL3 ((8 << 3) + 3)
|
|
|
|
#define SEL_DS32_CPL3 ((9 << 3) + 3)
|
|
|
|
#define SEL_CS64 (10 << 3)
|
|
|
|
#define SEL_DS64 (11 << 3)
|
|
|
|
#define SEL_CS64_CPL3 ((12 << 3) + 3)
|
|
|
|
#define SEL_DS64_CPL3 ((13 << 3) + 3)
|
|
|
|
#define SEL_CGATE16 (14 << 3)
|
|
|
|
#define SEL_TGATE16 (15 << 3)
|
|
|
|
#define SEL_CGATE32 (16 << 3)
|
|
|
|
#define SEL_TGATE32 (17 << 3)
|
|
|
|
#define SEL_CGATE64 (18 << 3)
|
|
|
|
#define SEL_CGATE64_HI (19 << 3)
|
|
|
|
#define SEL_TSS16 (20 << 3)
|
|
|
|
#define SEL_TSS16_2 (21 << 3)
|
|
|
|
#define SEL_TSS16_CPL3 ((22 << 3) + 3)
|
|
|
|
#define SEL_TSS32 (23 << 3)
|
|
|
|
#define SEL_TSS32_2 (24 << 3)
|
|
|
|
#define SEL_TSS32_CPL3 ((25 << 3) + 3)
|
|
|
|
#define SEL_TSS32_VM86 (26 << 3)
|
|
|
|
#define SEL_TSS64 (27 << 3)
|
|
|
|
#define SEL_TSS64_HI (28 << 3)
|
|
|
|
#define SEL_TSS64_CPL3 ((29 << 3) + 3)
|
|
|
|
#define SEL_TSS64_CPL3_HI (30 << 3)
|
|
|
|
|
|
|
|
#define MSR_IA32_FEATURE_CONTROL 0x3a
|
|
|
|
#define MSR_IA32_VMX_BASIC 0x480
|
|
|
|
#define MSR_IA32_SMBASE 0x9e
|
|
|
|
#define MSR_IA32_SYSENTER_CS 0x174
|
|
|
|
#define MSR_IA32_SYSENTER_ESP 0x175
|
|
|
|
#define MSR_IA32_SYSENTER_EIP 0x176
|
|
|
|
#define MSR_IA32_STAR 0xC0000081
|
|
|
|
#define MSR_IA32_LSTAR 0xC0000082
|
|
|
|
#define MSR_IA32_VMX_PROCBASED_CTLS2 0x48B
|
|
|
|
|
|
|
|
#define NEXT_INSN $0xbadc0de
|
|
|
|
#define PREFIX_SIZE 0xba1d
|
|
|
|
|
|
|
|
#ifndef KVM_SMI
|
|
|
|
#define KVM_SMI _IO(KVMIO, 0xb7)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define CR0_PE 1
|
|
|
|
#define CR0_MP (1 << 1)
|
|
|
|
#define CR0_EM (1 << 2)
|
|
|
|
#define CR0_TS (1 << 3)
|
|
|
|
#define CR0_ET (1 << 4)
|
|
|
|
#define CR0_NE (1 << 5)
|
|
|
|
#define CR0_WP (1 << 16)
|
|
|
|
#define CR0_AM (1 << 18)
|
|
|
|
#define CR0_NW (1 << 29)
|
|
|
|
#define CR0_CD (1 << 30)
|
|
|
|
#define CR0_PG (1 << 31)
|
|
|
|
|
|
|
|
#define CR4_VME 1
|
|
|
|
#define CR4_PVI (1 << 1)
|
|
|
|
#define CR4_TSD (1 << 2)
|
|
|
|
#define CR4_DE (1 << 3)
|
|
|
|
#define CR4_PSE (1 << 4)
|
|
|
|
#define CR4_PAE (1 << 5)
|
|
|
|
#define CR4_MCE (1 << 6)
|
|
|
|
#define CR4_PGE (1 << 7)
|
|
|
|
#define CR4_PCE (1 << 8)
|
|
|
|
#define CR4_OSFXSR (1 << 8)
|
|
|
|
#define CR4_OSXMMEXCPT (1 << 10)
|
|
|
|
#define CR4_UMIP (1 << 11)
|
|
|
|
#define CR4_VMXE (1 << 13)
|
|
|
|
#define CR4_SMXE (1 << 14)
|
|
|
|
#define CR4_FSGSBASE (1 << 16)
|
|
|
|
#define CR4_PCIDE (1 << 17)
|
|
|
|
#define CR4_OSXSAVE (1 << 18)
|
|
|
|
#define CR4_SMEP (1 << 20)
|
|
|
|
#define CR4_SMAP (1 << 21)
|
|
|
|
#define CR4_PKE (1 << 22)
|
|
|
|
|
|
|
|
#define EFER_SCE 1
|
|
|
|
#define EFER_LME (1 << 8)
|
|
|
|
#define EFER_LMA (1 << 10)
|
|
|
|
#define EFER_NXE (1 << 11)
|
|
|
|
#define EFER_SVME (1 << 12)
|
|
|
|
#define EFER_LMSLE (1 << 13)
|
|
|
|
#define EFER_FFXSR (1 << 14)
|
|
|
|
#define EFER_TCE (1 << 15)
|
|
|
|
|
|
|
|
#define PDE32_PRESENT 1
|
|
|
|
#define PDE32_RW (1 << 1)
|
|
|
|
#define PDE32_USER (1 << 2)
|
|
|
|
#define PDE32_PS (1 << 7)
|
|
|
|
|
|
|
|
#define PDE64_PRESENT 1
|
|
|
|
#define PDE64_RW (1 << 1)
|
|
|
|
#define PDE64_USER (1 << 2)
|
|
|
|
#define PDE64_ACCESSED (1 << 5)
|
|
|
|
#define PDE64_DIRTY (1 << 6)
|
|
|
|
#define PDE64_PS (1 << 7)
|
|
|
|
#define PDE64_G (1 << 8)
|
|
|
|
|
|
|
|
struct tss16 {
|
|
|
|
uint16_t prev;
|
|
|
|
uint16_t sp0;
|
|
|
|
uint16_t ss0;
|
|
|
|
uint16_t sp1;
|
|
|
|
uint16_t ss1;
|
|
|
|
uint16_t sp2;
|
|
|
|
uint16_t ss2;
|
|
|
|
uint16_t ip;
|
|
|
|
uint16_t flags;
|
|
|
|
uint16_t ax;
|
|
|
|
uint16_t cx;
|
|
|
|
uint16_t dx;
|
|
|
|
uint16_t bx;
|
|
|
|
uint16_t sp;
|
|
|
|
uint16_t bp;
|
|
|
|
uint16_t si;
|
|
|
|
uint16_t di;
|
|
|
|
uint16_t es;
|
|
|
|
uint16_t cs;
|
|
|
|
uint16_t ss;
|
|
|
|
uint16_t ds;
|
|
|
|
uint16_t ldt;
|
|
|
|
} __attribute__((packed));
|
|
|
|
|
|
|
|
struct tss32 {
|
|
|
|
uint16_t prev, prevh;
|
|
|
|
uint32_t sp0;
|
|
|
|
uint16_t ss0, ss0h;
|
|
|
|
uint32_t sp1;
|
|
|
|
uint16_t ss1, ss1h;
|
|
|
|
uint32_t sp2;
|
|
|
|
uint16_t ss2, ss2h;
|
|
|
|
uint32_t cr3;
|
|
|
|
uint32_t ip;
|
|
|
|
uint32_t flags;
|
|
|
|
uint32_t ax;
|
|
|
|
uint32_t cx;
|
|
|
|
uint32_t dx;
|
|
|
|
uint32_t bx;
|
|
|
|
uint32_t sp;
|
|
|
|
uint32_t bp;
|
|
|
|
uint32_t si;
|
|
|
|
uint32_t di;
|
|
|
|
uint16_t es, esh;
|
|
|
|
uint16_t cs, csh;
|
|
|
|
uint16_t ss, ssh;
|
|
|
|
uint16_t ds, dsh;
|
|
|
|
uint16_t fs, fsh;
|
|
|
|
uint16_t gs, gsh;
|
|
|
|
uint16_t ldt, ldth;
|
|
|
|
uint16_t trace;
|
|
|
|
uint16_t io_bitmap;
|
|
|
|
} __attribute__((packed));
|
|
|
|
|
|
|
|
struct tss64 {
|
|
|
|
uint32_t reserved0;
|
|
|
|
uint64_t rsp[3];
|
|
|
|
uint64_t reserved1;
|
|
|
|
uint64_t ist[7];
|
|
|
|
uint64_t reserved2;
|
|
|
|
uint32_t reserved3;
|
|
|
|
uint32_t io_bitmap;
|
|
|
|
} __attribute__((packed));
|
|
|
|
|
|
|
|
static void fill_segment_descriptor(uint64_t* dt, uint64_t* lt, struct kvm_segment* seg)
|
|
|
|
{
|
|
|
|
uint16_t index = seg->selector >> 3;
|
|
|
|
uint64_t limit = seg->g ? seg->limit >> 12 : seg->limit;
|
|
|
|
uint64_t sd = (limit & 0xffff) | (seg->base & 0xffffff) << 16 | (uint64_t)seg->type << 40 | (uint64_t)seg->s << 44 | (uint64_t)seg->dpl << 45 | (uint64_t)seg->present << 47 | (limit & 0xf0000ULL) << 48 | (uint64_t)seg->avl << 52 | (uint64_t)seg->l << 53 | (uint64_t)seg->db << 54 | (uint64_t)seg->g << 55 | (seg->base & 0xff000000ULL) << 56;
|
|
|
|
NONFAILING(dt[index] = sd);
|
|
|
|
NONFAILING(lt[index] = sd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void fill_segment_descriptor_dword(uint64_t* dt, uint64_t* lt, struct kvm_segment* seg)
|
|
|
|
{
|
|
|
|
fill_segment_descriptor(dt, lt, seg);
|
|
|
|
uint16_t index = seg->selector >> 3;
|
|
|
|
NONFAILING(dt[index + 1] = 0);
|
|
|
|
NONFAILING(lt[index + 1] = 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void setup_syscall_msrs(int cpufd, uint16_t sel_cs, uint16_t sel_cs_cpl3)
|
|
|
|
{
|
|
|
|
char buf[sizeof(struct kvm_msrs) + 5 * sizeof(struct kvm_msr_entry)];
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
struct kvm_msrs* msrs = (struct kvm_msrs*)buf;
|
|
|
|
msrs->nmsrs = 5;
|
|
|
|
msrs->entries[0].index = MSR_IA32_SYSENTER_CS;
|
|
|
|
msrs->entries[0].data = sel_cs;
|
|
|
|
msrs->entries[1].index = MSR_IA32_SYSENTER_ESP;
|
|
|
|
msrs->entries[1].data = ADDR_STACK0;
|
|
|
|
msrs->entries[2].index = MSR_IA32_SYSENTER_EIP;
|
|
|
|
msrs->entries[2].data = ADDR_VAR_SYSEXIT;
|
|
|
|
msrs->entries[3].index = MSR_IA32_STAR;
|
|
|
|
msrs->entries[3].data = ((uint64_t)sel_cs << 32) | ((uint64_t)sel_cs_cpl3 << 48);
|
|
|
|
msrs->entries[4].index = MSR_IA32_LSTAR;
|
|
|
|
msrs->entries[4].data = ADDR_VAR_SYSRET;
|
|
|
|
ioctl(cpufd, KVM_SET_MSRS, msrs);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void setup_32bit_idt(struct kvm_sregs* sregs, char* host_mem, uintptr_t guest_mem)
|
|
|
|
{
|
|
|
|
sregs->idt.base = guest_mem + ADDR_VAR_IDT;
|
|
|
|
sregs->idt.limit = 0x1ff;
|
|
|
|
uint64_t* idt = (uint64_t*)(host_mem + sregs->idt.base);
|
2017-01-12 10:57:17 +00:00
|
|
|
int i;
|
|
|
|
for (i = 0; i < 32; i++) {
|
2017-01-08 16:20:32 +00:00
|
|
|
struct kvm_segment gate;
|
|
|
|
gate.selector = i << 3;
|
|
|
|
switch (i % 6) {
|
|
|
|
case 0:
|
|
|
|
gate.type = 6;
|
|
|
|
gate.base = SEL_CS16;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
gate.type = 7;
|
|
|
|
gate.base = SEL_CS16;
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
gate.type = 3;
|
|
|
|
gate.base = SEL_TGATE16;
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
gate.type = 14;
|
|
|
|
gate.base = SEL_CS32;
|
|
|
|
break;
|
|
|
|
case 4:
|
|
|
|
gate.type = 15;
|
|
|
|
gate.base = SEL_CS32;
|
|
|
|
break;
|
|
|
|
case 6:
|
|
|
|
gate.type = 11;
|
|
|
|
gate.base = SEL_TGATE32;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
gate.limit = guest_mem + ADDR_VAR_USER_CODE2;
|
|
|
|
gate.present = 1;
|
|
|
|
gate.dpl = 0;
|
|
|
|
gate.s = 0;
|
|
|
|
gate.g = 0;
|
|
|
|
gate.db = 0;
|
|
|
|
gate.l = 0;
|
|
|
|
gate.avl = 0;
|
|
|
|
fill_segment_descriptor(idt, idt, &gate);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void setup_64bit_idt(struct kvm_sregs* sregs, char* host_mem, uintptr_t guest_mem)
|
|
|
|
{
|
|
|
|
sregs->idt.base = guest_mem + ADDR_VAR_IDT;
|
|
|
|
sregs->idt.limit = 0x1ff;
|
|
|
|
uint64_t* idt = (uint64_t*)(host_mem + sregs->idt.base);
|
2017-01-12 10:57:17 +00:00
|
|
|
int i;
|
|
|
|
for (i = 0; i < 32; i++) {
|
2017-01-08 16:20:32 +00:00
|
|
|
struct kvm_segment gate;
|
|
|
|
gate.selector = (i * 2) << 3;
|
|
|
|
gate.type = (i & 1) ? 14 : 15;
|
|
|
|
gate.base = SEL_CS64;
|
|
|
|
gate.limit = guest_mem + ADDR_VAR_USER_CODE2;
|
|
|
|
gate.present = 1;
|
|
|
|
gate.dpl = 0;
|
|
|
|
gate.s = 0;
|
|
|
|
gate.g = 0;
|
|
|
|
gate.db = 0;
|
|
|
|
gate.l = 0;
|
|
|
|
gate.avl = 0;
|
|
|
|
fill_segment_descriptor_dword(idt, idt, &gate);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct kvm_text {
|
|
|
|
uintptr_t typ;
|
|
|
|
const void* text;
|
|
|
|
uintptr_t size;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvm_opt {
|
|
|
|
uint64_t typ;
|
|
|
|
uint64_t val;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define KVM_SETUP_PAGING (1 << 0)
|
|
|
|
#define KVM_SETUP_PAE (1 << 1)
|
|
|
|
#define KVM_SETUP_PROTECTED (1 << 2)
|
|
|
|
#define KVM_SETUP_CPL3 (1 << 3)
|
|
|
|
#define KVM_SETUP_VIRT86 (1 << 4)
|
|
|
|
#define KVM_SETUP_SMM (1 << 5)
|
|
|
|
#define KVM_SETUP_VM (1 << 6)
|
|
|
|
|
|
|
|
static uintptr_t syz_kvm_setup_cpu(uintptr_t a0, uintptr_t a1, uintptr_t a2, uintptr_t a3, uintptr_t a4, uintptr_t a5, uintptr_t a6, uintptr_t a7)
|
|
|
|
{
|
|
|
|
const int vmfd = a0;
|
|
|
|
const int cpufd = a1;
|
|
|
|
char* const host_mem = (char*)a2;
|
|
|
|
const struct kvm_text* const text_array_ptr = (struct kvm_text*)a3;
|
|
|
|
const uintptr_t text_count = a4;
|
|
|
|
const uintptr_t flags = a5;
|
|
|
|
const struct kvm_opt* const opt_array_ptr = (struct kvm_opt*)a6;
|
|
|
|
uintptr_t opt_count = a7;
|
|
|
|
|
|
|
|
const uintptr_t page_size = 4 << 10;
|
|
|
|
const uintptr_t ioapic_page = 10;
|
|
|
|
const uintptr_t guest_mem_size = 24 * page_size;
|
|
|
|
const uintptr_t guest_mem = 0;
|
|
|
|
|
2017-01-12 10:57:17 +00:00
|
|
|
(void)text_count;
|
2017-01-08 16:20:32 +00:00
|
|
|
int text_type = 0;
|
|
|
|
const void* text = 0;
|
2017-01-25 10:01:30 +00:00
|
|
|
uintptr_t text_size = 0;
|
2017-01-08 16:20:32 +00:00
|
|
|
NONFAILING(text_type = text_array_ptr[0].typ);
|
|
|
|
NONFAILING(text = text_array_ptr[0].text);
|
|
|
|
NONFAILING(text_size = text_array_ptr[0].size);
|
|
|
|
|
|
|
|
uintptr_t i;
|
|
|
|
for (i = 0; i < guest_mem_size / page_size; i++) {
|
|
|
|
struct kvm_userspace_memory_region memreg;
|
|
|
|
memreg.slot = i;
|
|
|
|
memreg.flags = 0;
|
|
|
|
memreg.guest_phys_addr = guest_mem + i * page_size;
|
|
|
|
if (i == ioapic_page)
|
|
|
|
memreg.guest_phys_addr = 0xfec00000;
|
|
|
|
memreg.memory_size = page_size;
|
|
|
|
memreg.userspace_addr = (uintptr_t)host_mem + i * page_size;
|
|
|
|
ioctl(vmfd, KVM_SET_USER_MEMORY_REGION, &memreg);
|
|
|
|
}
|
|
|
|
struct kvm_userspace_memory_region memreg;
|
|
|
|
memreg.slot = 1 + (1 << 16);
|
|
|
|
memreg.flags = 0;
|
|
|
|
memreg.guest_phys_addr = 0x30000;
|
|
|
|
memreg.memory_size = 64 << 10;
|
|
|
|
memreg.userspace_addr = (uintptr_t)host_mem;
|
|
|
|
ioctl(vmfd, KVM_SET_USER_MEMORY_REGION, &memreg);
|
|
|
|
|
|
|
|
struct kvm_sregs sregs;
|
|
|
|
if (ioctl(cpufd, KVM_GET_SREGS, &sregs))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
struct kvm_regs regs;
|
|
|
|
memset(®s, 0, sizeof(regs));
|
|
|
|
regs.rip = guest_mem + ADDR_TEXT;
|
|
|
|
regs.rsp = ADDR_STACK0;
|
|
|
|
|
|
|
|
sregs.gdt.base = guest_mem + ADDR_GDT;
|
|
|
|
sregs.gdt.limit = 256 * sizeof(uint64_t) - 1;
|
|
|
|
uint64_t* gdt = (uint64_t*)(host_mem + sregs.gdt.base);
|
|
|
|
|
|
|
|
struct kvm_segment seg_ldt;
|
|
|
|
seg_ldt.selector = SEL_LDT;
|
|
|
|
seg_ldt.type = 2;
|
|
|
|
seg_ldt.base = guest_mem + ADDR_LDT;
|
|
|
|
seg_ldt.limit = 256 * sizeof(uint64_t) - 1;
|
|
|
|
seg_ldt.present = 1;
|
|
|
|
seg_ldt.dpl = 0;
|
|
|
|
seg_ldt.s = 0;
|
|
|
|
seg_ldt.g = 0;
|
|
|
|
seg_ldt.db = 1;
|
|
|
|
seg_ldt.l = 0;
|
|
|
|
sregs.ldt = seg_ldt;
|
2017-01-28 18:04:37 +00:00
|
|
|
uint64_t* ldt = (uint64_t*)(host_mem + sregs.ldt.base);
|
2017-01-08 16:20:32 +00:00
|
|
|
|
|
|
|
struct kvm_segment seg_cs16;
|
|
|
|
seg_cs16.selector = SEL_CS16;
|
|
|
|
seg_cs16.type = 11;
|
|
|
|
seg_cs16.base = 0;
|
|
|
|
seg_cs16.limit = 0xfffff;
|
|
|
|
seg_cs16.present = 1;
|
|
|
|
seg_cs16.dpl = 0;
|
|
|
|
seg_cs16.s = 1;
|
|
|
|
seg_cs16.g = 0;
|
|
|
|
seg_cs16.db = 0;
|
|
|
|
seg_cs16.l = 0;
|
|
|
|
|
|
|
|
struct kvm_segment seg_ds16 = seg_cs16;
|
|
|
|
seg_ds16.selector = SEL_DS16;
|
|
|
|
seg_ds16.type = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cs16_cpl3 = seg_cs16;
|
|
|
|
seg_cs16_cpl3.selector = SEL_CS16_CPL3;
|
|
|
|
seg_cs16_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_ds16_cpl3 = seg_ds16;
|
|
|
|
seg_ds16_cpl3.selector = SEL_DS16_CPL3;
|
|
|
|
seg_ds16_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cs32 = seg_cs16;
|
|
|
|
seg_cs32.selector = SEL_CS32;
|
|
|
|
seg_cs32.db = 1;
|
|
|
|
|
|
|
|
struct kvm_segment seg_ds32 = seg_ds16;
|
|
|
|
seg_ds32.selector = SEL_DS32;
|
|
|
|
seg_ds32.db = 1;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cs32_cpl3 = seg_cs32;
|
|
|
|
seg_cs32_cpl3.selector = SEL_CS32_CPL3;
|
|
|
|
seg_cs32_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_ds32_cpl3 = seg_ds32;
|
|
|
|
seg_ds32_cpl3.selector = SEL_DS32_CPL3;
|
|
|
|
seg_ds32_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cs64 = seg_cs16;
|
|
|
|
seg_cs64.selector = SEL_CS64;
|
|
|
|
seg_cs64.l = 1;
|
|
|
|
|
|
|
|
struct kvm_segment seg_ds64 = seg_ds32;
|
|
|
|
seg_ds64.selector = SEL_DS64;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cs64_cpl3 = seg_cs64;
|
|
|
|
seg_cs64_cpl3.selector = SEL_CS64_CPL3;
|
|
|
|
seg_cs64_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_ds64_cpl3 = seg_ds64;
|
|
|
|
seg_ds64_cpl3.selector = SEL_DS64_CPL3;
|
|
|
|
seg_ds64_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss32;
|
|
|
|
seg_tss32.selector = SEL_TSS32;
|
|
|
|
seg_tss32.type = 9;
|
|
|
|
seg_tss32.base = ADDR_VAR_TSS32;
|
|
|
|
seg_tss32.limit = 0x1ff;
|
|
|
|
seg_tss32.present = 1;
|
|
|
|
seg_tss32.dpl = 0;
|
|
|
|
seg_tss32.s = 0;
|
|
|
|
seg_tss32.g = 0;
|
|
|
|
seg_tss32.db = 0;
|
|
|
|
seg_tss32.l = 0;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss32_2 = seg_tss32;
|
|
|
|
seg_tss32_2.selector = SEL_TSS32_2;
|
|
|
|
seg_tss32_2.base = ADDR_VAR_TSS32_2;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss32_cpl3 = seg_tss32;
|
|
|
|
seg_tss32_cpl3.selector = SEL_TSS32_CPL3;
|
|
|
|
seg_tss32_cpl3.base = ADDR_VAR_TSS32_CPL3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss32_vm86 = seg_tss32;
|
|
|
|
seg_tss32_vm86.selector = SEL_TSS32_VM86;
|
|
|
|
seg_tss32_vm86.base = ADDR_VAR_TSS32_VM86;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss16 = seg_tss32;
|
|
|
|
seg_tss16.selector = SEL_TSS16;
|
|
|
|
seg_tss16.base = ADDR_VAR_TSS16;
|
|
|
|
seg_tss16.limit = 0xff;
|
|
|
|
seg_tss16.type = 1;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss16_2 = seg_tss16;
|
|
|
|
seg_tss16_2.selector = SEL_TSS16_2;
|
|
|
|
seg_tss16_2.base = ADDR_VAR_TSS16_2;
|
|
|
|
seg_tss16_2.dpl = 0;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss16_cpl3 = seg_tss16;
|
|
|
|
seg_tss16_cpl3.selector = SEL_TSS16_CPL3;
|
|
|
|
seg_tss16_cpl3.base = ADDR_VAR_TSS16_CPL3;
|
|
|
|
seg_tss16_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss64 = seg_tss32;
|
|
|
|
seg_tss64.selector = SEL_TSS64;
|
|
|
|
seg_tss64.base = ADDR_VAR_TSS64;
|
|
|
|
seg_tss64.limit = 0x1ff;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tss64_cpl3 = seg_tss64;
|
|
|
|
seg_tss64_cpl3.selector = SEL_TSS64_CPL3;
|
|
|
|
seg_tss64_cpl3.base = ADDR_VAR_TSS64_CPL3;
|
|
|
|
seg_tss64_cpl3.dpl = 3;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cgate16;
|
|
|
|
seg_cgate16.selector = SEL_CGATE16;
|
|
|
|
seg_cgate16.type = 4;
|
|
|
|
seg_cgate16.base = SEL_CS16 | (2 << 16);
|
|
|
|
seg_cgate16.limit = ADDR_VAR_USER_CODE2;
|
|
|
|
seg_cgate16.present = 1;
|
|
|
|
seg_cgate16.dpl = 0;
|
|
|
|
seg_cgate16.s = 0;
|
|
|
|
seg_cgate16.g = 0;
|
|
|
|
seg_cgate16.db = 0;
|
|
|
|
seg_cgate16.l = 0;
|
|
|
|
seg_cgate16.avl = 0;
|
|
|
|
|
|
|
|
struct kvm_segment seg_tgate16 = seg_cgate16;
|
|
|
|
seg_tgate16.selector = SEL_TGATE16;
|
|
|
|
seg_tgate16.type = 3;
|
|
|
|
seg_cgate16.base = SEL_TSS16_2;
|
|
|
|
seg_tgate16.limit = 0;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cgate32 = seg_cgate16;
|
|
|
|
seg_cgate32.selector = SEL_CGATE32;
|
|
|
|
seg_cgate32.type = 12;
|
|
|
|
seg_cgate32.base = SEL_CS32 | (2 << 16);
|
|
|
|
|
|
|
|
struct kvm_segment seg_tgate32 = seg_cgate32;
|
|
|
|
seg_tgate32.selector = SEL_TGATE32;
|
|
|
|
seg_tgate32.type = 11;
|
|
|
|
seg_tgate32.base = SEL_TSS32_2;
|
|
|
|
seg_tgate32.limit = 0;
|
|
|
|
|
|
|
|
struct kvm_segment seg_cgate64 = seg_cgate16;
|
|
|
|
seg_cgate64.selector = SEL_CGATE64;
|
|
|
|
seg_cgate64.type = 12;
|
|
|
|
seg_cgate64.base = SEL_CS64;
|
|
|
|
|
|
|
|
int kvmfd = open("/dev/kvm", O_RDWR);
|
2017-01-12 10:57:17 +00:00
|
|
|
char buf[sizeof(struct kvm_cpuid2) + 128 * sizeof(struct kvm_cpuid_entry2)];
|
2017-01-08 16:20:32 +00:00
|
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
struct kvm_cpuid2* cpuid = (struct kvm_cpuid2*)buf;
|
|
|
|
cpuid->nent = 128;
|
|
|
|
ioctl(kvmfd, KVM_GET_SUPPORTED_CPUID, cpuid);
|
|
|
|
ioctl(cpufd, KVM_SET_CPUID2, cpuid);
|
|
|
|
close(kvmfd);
|
|
|
|
|
2017-01-28 18:04:37 +00:00
|
|
|
const char* text_prefix = 0;
|
2017-01-08 16:20:32 +00:00
|
|
|
int text_prefix_size = 0;
|
|
|
|
char* host_text = host_mem + ADDR_TEXT;
|
|
|
|
|
2017-01-12 10:57:17 +00:00
|
|
|
if (text_type == 8) {
|
2017-01-08 16:20:32 +00:00
|
|
|
if (flags & KVM_SETUP_SMM) {
|
|
|
|
if (flags & KVM_SETUP_PROTECTED) {
|
|
|
|
sregs.cs = seg_cs16;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds16;
|
|
|
|
sregs.cr0 |= CR0_PE;
|
|
|
|
} else {
|
|
|
|
sregs.cs.selector = 0;
|
|
|
|
sregs.cs.base = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
NONFAILING(*(host_mem + ADDR_TEXT) = 0xf4);
|
|
|
|
host_text = host_mem + 0x8000;
|
|
|
|
|
|
|
|
ioctl(cpufd, KVM_SMI, 0);
|
|
|
|
} else if (flags & KVM_SETUP_VIRT86) {
|
|
|
|
sregs.cs = seg_cs32;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds32;
|
|
|
|
sregs.cr0 |= CR0_PE;
|
|
|
|
sregs.efer |= EFER_SCE;
|
|
|
|
|
|
|
|
setup_syscall_msrs(cpufd, SEL_CS32, SEL_CS32_CPL3);
|
|
|
|
setup_32bit_idt(&sregs, host_mem, guest_mem);
|
|
|
|
|
|
|
|
if (flags & KVM_SETUP_PAGING) {
|
|
|
|
uint64_t pd_addr = guest_mem + ADDR_PD;
|
|
|
|
uint64_t* pd = (uint64_t*)(host_mem + ADDR_PD);
|
|
|
|
NONFAILING(pd[0] = PDE32_PRESENT | PDE32_RW | PDE32_USER | PDE32_PS);
|
|
|
|
sregs.cr3 = pd_addr;
|
|
|
|
sregs.cr4 |= CR4_PSE;
|
|
|
|
|
|
|
|
text_prefix = kvm_asm32_paged_vm86;
|
|
|
|
text_prefix_size = sizeof(kvm_asm32_paged_vm86) - 1;
|
|
|
|
} else {
|
|
|
|
text_prefix = kvm_asm32_vm86;
|
|
|
|
text_prefix_size = sizeof(kvm_asm32_vm86) - 1;
|
|
|
|
}
|
2017-01-12 10:57:17 +00:00
|
|
|
} else {
|
|
|
|
sregs.cs.selector = 0;
|
|
|
|
sregs.cs.base = 0;
|
|
|
|
}
|
|
|
|
} else if (text_type == 16) {
|
|
|
|
if (flags & KVM_SETUP_CPL3) {
|
2017-01-08 16:20:32 +00:00
|
|
|
sregs.cs = seg_cs16;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds16;
|
|
|
|
|
|
|
|
text_prefix = kvm_asm16_cpl3;
|
|
|
|
text_prefix_size = sizeof(kvm_asm16_cpl3) - 1;
|
|
|
|
} else {
|
2017-01-12 10:57:17 +00:00
|
|
|
sregs.cr0 |= CR0_PE;
|
|
|
|
sregs.cs = seg_cs16;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds16;
|
2017-01-08 16:20:32 +00:00
|
|
|
}
|
|
|
|
} else if (text_type == 32) {
|
|
|
|
sregs.cr0 |= CR0_PE;
|
|
|
|
sregs.efer |= EFER_SCE;
|
|
|
|
|
|
|
|
setup_syscall_msrs(cpufd, SEL_CS32, SEL_CS32_CPL3);
|
|
|
|
setup_32bit_idt(&sregs, host_mem, guest_mem);
|
|
|
|
|
|
|
|
if (flags & KVM_SETUP_SMM) {
|
|
|
|
sregs.cs = seg_cs32;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds32;
|
|
|
|
|
|
|
|
NONFAILING(*(host_mem + ADDR_TEXT) = 0xf4);
|
|
|
|
host_text = host_mem + 0x8000;
|
|
|
|
|
|
|
|
ioctl(cpufd, KVM_SMI, 0);
|
|
|
|
} else if (flags & KVM_SETUP_PAGING) {
|
|
|
|
sregs.cs = seg_cs32;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds32;
|
|
|
|
|
|
|
|
uint64_t pd_addr = guest_mem + ADDR_PD;
|
|
|
|
uint64_t* pd = (uint64_t*)(host_mem + ADDR_PD);
|
|
|
|
NONFAILING(pd[0] = PDE32_PRESENT | PDE32_RW | PDE32_USER | PDE32_PS);
|
|
|
|
sregs.cr3 = pd_addr;
|
|
|
|
sregs.cr4 |= CR4_PSE;
|
|
|
|
|
|
|
|
text_prefix = kvm_asm32_paged;
|
|
|
|
text_prefix_size = sizeof(kvm_asm32_paged) - 1;
|
|
|
|
} else if (flags & KVM_SETUP_CPL3) {
|
|
|
|
sregs.cs = seg_cs32_cpl3;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds32_cpl3;
|
|
|
|
} else {
|
|
|
|
sregs.cs = seg_cs32;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds32;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
sregs.efer |= EFER_LME | EFER_SCE;
|
|
|
|
sregs.cr0 |= CR0_PE;
|
|
|
|
|
|
|
|
setup_syscall_msrs(cpufd, SEL_CS64, SEL_CS64_CPL3);
|
|
|
|
setup_64bit_idt(&sregs, host_mem, guest_mem);
|
|
|
|
|
|
|
|
sregs.cs = seg_cs32;
|
|
|
|
sregs.ds = sregs.es = sregs.fs = sregs.gs = sregs.ss = seg_ds32;
|
|
|
|
|
|
|
|
uint64_t pml4_addr = guest_mem + ADDR_PML4;
|
|
|
|
uint64_t* pml4 = (uint64_t*)(host_mem + ADDR_PML4);
|
|
|
|
uint64_t pdpt_addr = guest_mem + ADDR_PDP;
|
|
|
|
uint64_t* pdpt = (uint64_t*)(host_mem + ADDR_PDP);
|
|
|
|
uint64_t pd_addr = guest_mem + ADDR_PD;
|
|
|
|
uint64_t* pd = (uint64_t*)(host_mem + ADDR_PD);
|
|
|
|
NONFAILING(pml4[0] = PDE64_PRESENT | PDE64_RW | PDE64_USER | pdpt_addr);
|
|
|
|
NONFAILING(pdpt[0] = PDE64_PRESENT | PDE64_RW | PDE64_USER | pd_addr);
|
|
|
|
NONFAILING(pd[0] = PDE64_PRESENT | PDE64_RW | PDE64_USER | PDE64_PS);
|
|
|
|
sregs.cr3 = pml4_addr;
|
|
|
|
sregs.cr4 |= CR4_PAE;
|
|
|
|
|
|
|
|
if (flags & KVM_SETUP_VM) {
|
|
|
|
sregs.cr0 |= CR0_NE;
|
|
|
|
|
|
|
|
NONFAILING(*((uint64_t*)(host_mem + ADDR_VAR_VMXON_PTR)) = ADDR_VAR_VMXON);
|
|
|
|
NONFAILING(*((uint64_t*)(host_mem + ADDR_VAR_VMCS_PTR)) = ADDR_VAR_VMCS);
|
|
|
|
NONFAILING(memcpy(host_mem + ADDR_VAR_VMEXIT_CODE, kvm_asm64_vm_exit, sizeof(kvm_asm64_vm_exit) - 1));
|
|
|
|
NONFAILING(*((uint64_t*)(host_mem + ADDR_VAR_VMEXIT_PTR)) = ADDR_VAR_VMEXIT_CODE);
|
|
|
|
|
|
|
|
text_prefix = kvm_asm64_init_vm;
|
|
|
|
text_prefix_size = sizeof(kvm_asm64_init_vm) - 1;
|
|
|
|
} else if (flags & KVM_SETUP_CPL3) {
|
|
|
|
text_prefix = kvm_asm64_cpl3;
|
|
|
|
text_prefix_size = sizeof(kvm_asm64_cpl3) - 1;
|
|
|
|
} else {
|
|
|
|
text_prefix = kvm_asm64_enable_long;
|
|
|
|
text_prefix_size = sizeof(kvm_asm64_enable_long) - 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss16* tss16 = (struct tss16*)(host_mem + seg_tss16_2.base);
|
2017-01-08 16:20:32 +00:00
|
|
|
NONFAILING(
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss16* tss = tss16;
|
2017-01-08 16:20:32 +00:00
|
|
|
memset(tss, 0, sizeof(*tss));
|
|
|
|
tss->ss0 = tss->ss1 = tss->ss2 = SEL_DS16;
|
|
|
|
tss->sp0 = tss->sp1 = tss->sp2 = ADDR_STACK0;
|
|
|
|
tss->ip = ADDR_VAR_USER_CODE2;
|
|
|
|
tss->flags = (1 << 1);
|
|
|
|
tss->cs = SEL_CS16;
|
|
|
|
tss->es = tss->ds = tss->ss = SEL_DS16;
|
|
|
|
tss->ldt = SEL_LDT);
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss16* tss16_cpl3 = (struct tss16*)(host_mem + seg_tss16_cpl3.base);
|
2017-01-08 16:20:32 +00:00
|
|
|
NONFAILING(
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss16* tss = tss16_cpl3;
|
2017-01-08 16:20:32 +00:00
|
|
|
memset(tss, 0, sizeof(*tss));
|
|
|
|
tss->ss0 = tss->ss1 = tss->ss2 = SEL_DS16;
|
|
|
|
tss->sp0 = tss->sp1 = tss->sp2 = ADDR_STACK0;
|
|
|
|
tss->ip = ADDR_VAR_USER_CODE2;
|
|
|
|
tss->flags = (1 << 1);
|
|
|
|
tss->cs = SEL_CS16_CPL3;
|
|
|
|
tss->es = tss->ds = tss->ss = SEL_DS16_CPL3;
|
|
|
|
tss->ldt = SEL_LDT);
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss32* tss32 = (struct tss32*)(host_mem + seg_tss32_vm86.base);
|
2017-01-08 16:20:32 +00:00
|
|
|
NONFAILING(
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss32* tss = tss32;
|
2017-01-08 16:20:32 +00:00
|
|
|
memset(tss, 0, sizeof(*tss));
|
|
|
|
tss->ss0 = tss->ss1 = tss->ss2 = SEL_DS32;
|
|
|
|
tss->sp0 = tss->sp1 = tss->sp2 = ADDR_STACK0;
|
|
|
|
tss->ip = ADDR_VAR_USER_CODE;
|
|
|
|
tss->flags = (1 << 1) | (1 << 17);
|
|
|
|
tss->ldt = SEL_LDT;
|
|
|
|
tss->cr3 = sregs.cr3;
|
|
|
|
tss->io_bitmap = offsetof(struct tss32, io_bitmap));
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss32* tss32_cpl3 = (struct tss32*)(host_mem + seg_tss32_2.base);
|
2017-01-08 16:20:32 +00:00
|
|
|
NONFAILING(
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss32* tss = tss32_cpl3;
|
2017-01-08 16:20:32 +00:00
|
|
|
memset(tss, 0, sizeof(*tss));
|
|
|
|
tss->ss0 = tss->ss1 = tss->ss2 = SEL_DS32;
|
|
|
|
tss->sp0 = tss->sp1 = tss->sp2 = ADDR_STACK0;
|
|
|
|
tss->ip = ADDR_VAR_USER_CODE;
|
|
|
|
tss->flags = (1 << 1);
|
|
|
|
tss->cr3 = sregs.cr3;
|
|
|
|
tss->es = tss->ds = tss->ss = tss->gs = tss->fs = SEL_DS32;
|
|
|
|
tss->cs = SEL_CS32;
|
|
|
|
tss->ldt = SEL_LDT;
|
|
|
|
tss->cr3 = sregs.cr3;
|
|
|
|
tss->io_bitmap = offsetof(struct tss32, io_bitmap));
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss64* tss64 = (struct tss64*)(host_mem + seg_tss64.base);
|
2017-01-08 16:20:32 +00:00
|
|
|
NONFAILING(
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss64* tss = tss64;
|
2017-01-08 16:20:32 +00:00
|
|
|
memset(tss, 0, sizeof(*tss));
|
|
|
|
tss->rsp[0] = ADDR_STACK0;
|
|
|
|
tss->rsp[1] = ADDR_STACK0;
|
|
|
|
tss->rsp[2] = ADDR_STACK0;
|
|
|
|
tss->io_bitmap = offsetof(struct tss64, io_bitmap));
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss64* tss64_cpl3 = (struct tss64*)(host_mem + seg_tss64_cpl3.base);
|
2017-01-08 16:20:32 +00:00
|
|
|
NONFAILING(
|
2017-01-28 18:04:37 +00:00
|
|
|
struct tss64* tss = tss64_cpl3;
|
2017-01-08 16:20:32 +00:00
|
|
|
memset(tss, 0, sizeof(*tss));
|
|
|
|
tss->rsp[0] = ADDR_STACK0;
|
|
|
|
tss->rsp[1] = ADDR_STACK0;
|
|
|
|
tss->rsp[2] = ADDR_STACK0;
|
|
|
|
tss->io_bitmap = offsetof(struct tss64, io_bitmap));
|
|
|
|
|
|
|
|
if (text_size > 1000)
|
|
|
|
text_size = 1000;
|
|
|
|
if (text_prefix) {
|
|
|
|
NONFAILING(memcpy(host_text, text_prefix, text_prefix_size));
|
|
|
|
void* patch = 0;
|
|
|
|
NONFAILING(patch = memmem(host_text, text_prefix_size, "\xde\xc0\xad\x0b", 4));
|
|
|
|
if (patch)
|
|
|
|
NONFAILING(*((uint32_t*)patch) = guest_mem + ADDR_TEXT + ((char*)patch - host_text) + 6);
|
|
|
|
uint16_t magic = PREFIX_SIZE;
|
|
|
|
patch = 0;
|
|
|
|
NONFAILING(patch = memmem(host_text, text_prefix_size, &magic, sizeof(magic)));
|
|
|
|
if (patch)
|
|
|
|
NONFAILING(*((uint16_t*)patch) = guest_mem + ADDR_TEXT + text_prefix_size);
|
|
|
|
}
|
|
|
|
NONFAILING(memcpy((void*)(host_text + text_prefix_size), text, text_size));
|
|
|
|
NONFAILING(*(host_text + text_prefix_size + text_size) = 0xf4);
|
|
|
|
|
|
|
|
NONFAILING(memcpy(host_mem + ADDR_VAR_USER_CODE, text, text_size));
|
|
|
|
NONFAILING(*(host_mem + ADDR_VAR_USER_CODE + text_size) = 0xf4);
|
|
|
|
|
|
|
|
NONFAILING(*(host_mem + ADDR_VAR_HLT) = 0xf4);
|
|
|
|
NONFAILING(memcpy(host_mem + ADDR_VAR_SYSRET, "\x0f\x07\xf4", 3));
|
|
|
|
NONFAILING(memcpy(host_mem + ADDR_VAR_SYSEXIT, "\x0f\x35\xf4", 3));
|
|
|
|
|
2017-01-28 18:04:37 +00:00
|
|
|
NONFAILING(*(uint64_t*)(host_mem + ADDR_VAR_VMWRITE_FLD) = 0);
|
|
|
|
NONFAILING(*(uint64_t*)(host_mem + ADDR_VAR_VMWRITE_VAL) = 0);
|
|
|
|
|
|
|
|
if (opt_count > 2)
|
|
|
|
opt_count = 2;
|
|
|
|
for (i = 0; i < opt_count; i++) {
|
|
|
|
uint64_t typ = 0;
|
|
|
|
uint64_t val = 0;
|
|
|
|
NONFAILING(typ = opt_array_ptr[i].typ);
|
|
|
|
NONFAILING(val = opt_array_ptr[i].val);
|
|
|
|
switch (typ % 9) {
|
|
|
|
case 0:
|
|
|
|
sregs.cr0 ^= val & (CR0_MP | CR0_EM | CR0_ET | CR0_NE | CR0_WP | CR0_AM | CR0_NW | CR0_CD);
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
sregs.cr4 ^= val & (CR4_VME | CR4_PVI | CR4_TSD | CR4_DE | CR4_MCE | CR4_PGE | CR4_PCE |
|
|
|
|
CR4_OSFXSR | CR4_OSXMMEXCPT | CR4_UMIP | CR4_VMXE | CR4_SMXE | CR4_FSGSBASE | CR4_PCIDE |
|
|
|
|
CR4_OSXSAVE | CR4_SMEP | CR4_SMAP | CR4_PKE);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
sregs.efer ^= val & (EFER_SCE | EFER_NXE | EFER_SVME | EFER_LMSLE | EFER_FFXSR | EFER_TCE);
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
val &= ((1 << 8) | (1 << 9) | (1 << 10) | (1 << 12) | (1 << 13) | (1 << 14) |
|
|
|
|
(1 << 15) | (1 << 18) | (1 << 19) | (1 << 20) | (1 << 21));
|
|
|
|
regs.rflags ^= val;
|
|
|
|
NONFAILING(tss16->flags ^= val);
|
|
|
|
NONFAILING(tss16_cpl3->flags ^= val);
|
|
|
|
NONFAILING(tss32->flags ^= val);
|
|
|
|
NONFAILING(tss32_cpl3->flags ^= val);
|
|
|
|
break;
|
|
|
|
case 4:
|
|
|
|
seg_cs16.type = val & 0xf;
|
|
|
|
seg_cs32.type = val & 0xf;
|
|
|
|
seg_cs64.type = val & 0xf;
|
|
|
|
break;
|
|
|
|
case 5:
|
|
|
|
seg_cs16_cpl3.type = val & 0xf;
|
|
|
|
seg_cs32_cpl3.type = val & 0xf;
|
|
|
|
seg_cs64_cpl3.type = val & 0xf;
|
|
|
|
break;
|
|
|
|
case 6:
|
|
|
|
seg_ds16.type = val & 0xf;
|
|
|
|
seg_ds32.type = val & 0xf;
|
|
|
|
seg_ds64.type = val & 0xf;
|
|
|
|
break;
|
|
|
|
case 7:
|
|
|
|
seg_ds16_cpl3.type = val & 0xf;
|
|
|
|
seg_ds32_cpl3.type = val & 0xf;
|
|
|
|
seg_ds64_cpl3.type = val & 0xf;
|
|
|
|
break;
|
|
|
|
case 8:
|
|
|
|
NONFAILING(*(uint64_t*)(host_mem + ADDR_VAR_VMWRITE_FLD) = (val & 0xffff));
|
|
|
|
NONFAILING(*(uint64_t*)(host_mem + ADDR_VAR_VMWRITE_VAL) = (val >> 16));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fail("bad kvm setup opt");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
regs.rflags |= 2;
|
|
|
|
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_ldt);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cs16);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_ds16);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cs16_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_ds16_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cs32);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_ds32);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cs32_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_ds32_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cs64);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_ds64);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cs64_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_ds64_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tss32);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tss32_2);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tss32_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tss32_vm86);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tss16);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tss16_2);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tss16_cpl3);
|
|
|
|
fill_segment_descriptor_dword(gdt, ldt, &seg_tss64);
|
|
|
|
fill_segment_descriptor_dword(gdt, ldt, &seg_tss64_cpl3);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cgate16);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tgate16);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_cgate32);
|
|
|
|
fill_segment_descriptor(gdt, ldt, &seg_tgate32);
|
|
|
|
fill_segment_descriptor_dword(gdt, ldt, &seg_cgate64);
|
|
|
|
|
2017-01-08 16:20:32 +00:00
|
|
|
if (ioctl(cpufd, KVM_SET_SREGS, &sregs))
|
|
|
|
return -1;
|
|
|
|
if (ioctl(cpufd, KVM_SET_REGS, ®s))
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
2017-01-12 10:57:17 +00:00
|
|
|
#elif defined(__aarch64__)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
struct kvm_text {
|
|
|
|
uintptr_t typ;
|
|
|
|
const void* text;
|
|
|
|
uintptr_t size;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvm_opt {
|
|
|
|
uint64_t typ;
|
|
|
|
uint64_t val;
|
|
|
|
};
|
|
|
|
|
|
|
|
static uintptr_t syz_kvm_setup_cpu(uintptr_t a0, uintptr_t a1, uintptr_t a2, uintptr_t a3, uintptr_t a4, uintptr_t a5, uintptr_t a6, uintptr_t a7)
|
|
|
|
{
|
|
|
|
const int vmfd = a0;
|
|
|
|
const int cpufd = a1;
|
|
|
|
char* const host_mem = (char*)a2;
|
|
|
|
const struct kvm_text* const text_array_ptr = (struct kvm_text*)a3;
|
|
|
|
const uintptr_t text_count = a4;
|
|
|
|
const uintptr_t flags = a5;
|
|
|
|
const struct kvm_opt* const opt_array_ptr = (struct kvm_opt*)a6;
|
|
|
|
uintptr_t opt_count = a7;
|
|
|
|
|
|
|
|
(void)flags;
|
|
|
|
(void)opt_count;
|
|
|
|
|
|
|
|
const uintptr_t page_size = 4 << 10;
|
|
|
|
const uintptr_t guest_mem = 0;
|
|
|
|
const uintptr_t guest_mem_size = 24 * page_size;
|
|
|
|
|
|
|
|
(void)text_count;
|
|
|
|
int text_type = 0;
|
|
|
|
const void* text = 0;
|
|
|
|
int text_size = 0;
|
|
|
|
NONFAILING(text_type = text_array_ptr[0].typ);
|
|
|
|
NONFAILING(text = text_array_ptr[0].text);
|
|
|
|
NONFAILING(text_size = text_array_ptr[0].size);
|
|
|
|
(void)text_type;
|
|
|
|
(void)opt_array_ptr;
|
|
|
|
|
|
|
|
uint32_t features = 0;
|
|
|
|
if (opt_count > 1)
|
|
|
|
opt_count = 1;
|
|
|
|
uintptr_t i;
|
|
|
|
for (i = 0; i < opt_count; i++) {
|
|
|
|
uint64_t typ = 0;
|
|
|
|
uint64_t val = 0;
|
|
|
|
NONFAILING(typ = opt_array_ptr[i].typ);
|
|
|
|
NONFAILING(val = opt_array_ptr[i].val);
|
|
|
|
switch (typ) {
|
|
|
|
case 1:
|
|
|
|
features = val;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < guest_mem_size / page_size; i++) {
|
|
|
|
struct kvm_userspace_memory_region memreg;
|
|
|
|
memreg.slot = i;
|
|
|
|
memreg.flags = 0;
|
|
|
|
memreg.guest_phys_addr = guest_mem + i * page_size;
|
|
|
|
memreg.memory_size = page_size;
|
|
|
|
memreg.userspace_addr = (uintptr_t)host_mem + i * page_size;
|
|
|
|
ioctl(vmfd, KVM_SET_USER_MEMORY_REGION, &memreg);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct kvm_vcpu_init init;
|
|
|
|
ioctl(cpufd, KVM_ARM_PREFERRED_TARGET, &init);
|
|
|
|
init.features[0] = features;
|
|
|
|
ioctl(cpufd, KVM_ARM_VCPU_INIT, &init);
|
|
|
|
|
|
|
|
if (text_size > 1000)
|
|
|
|
text_size = 1000;
|
|
|
|
NONFAILING(memcpy(host_mem, text, text_size));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2017-03-05 13:44:32 +00:00
|
|
|
#else
|
|
|
|
static uintptr_t syz_kvm_setup_cpu(uintptr_t a0, uintptr_t a1, uintptr_t a2, uintptr_t a3, uintptr_t a4, uintptr_t a5, uintptr_t a6, uintptr_t a7)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2017-01-12 10:57:17 +00:00
|
|
|
#endif
|
2017-01-08 16:20:32 +00:00
|
|
|
#endif
|
|
|
|
|
2016-08-28 14:33:32 +00:00
|
|
|
static uintptr_t execute_syscall(int nr, uintptr_t a0, uintptr_t a1, uintptr_t a2, uintptr_t a3, uintptr_t a4, uintptr_t a5, uintptr_t a6, uintptr_t a7, uintptr_t a8)
|
|
|
|
{
|
|
|
|
switch (nr) {
|
|
|
|
default:
|
|
|
|
return syscall(nr, a0, a1, a2, a3, a4, a5);
|
2016-11-26 15:37:46 +00:00
|
|
|
#ifdef __NR_syz_test
|
2016-09-28 18:06:42 +00:00
|
|
|
case __NR_syz_test:
|
|
|
|
return 0;
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
|
|
|
#ifdef __NR_syz_open_dev
|
2016-08-28 14:33:32 +00:00
|
|
|
case __NR_syz_open_dev:
|
|
|
|
return syz_open_dev(a0, a1, a2);
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
|
|
|
#ifdef __NR_syz_open_pts
|
2016-08-28 14:33:32 +00:00
|
|
|
case __NR_syz_open_pts:
|
|
|
|
return syz_open_pts(a0, a1);
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
|
|
|
#ifdef __NR_syz_fuse_mount
|
2016-08-28 14:33:32 +00:00
|
|
|
case __NR_syz_fuse_mount:
|
|
|
|
return syz_fuse_mount(a0, a1, a2, a3, a4, a5);
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
|
|
|
#ifdef __NR_syz_fuseblk_mount
|
2016-08-28 14:33:32 +00:00
|
|
|
case __NR_syz_fuseblk_mount:
|
|
|
|
return syz_fuseblk_mount(a0, a1, a2, a3, a4, a5, a6, a7);
|
2016-10-04 14:12:12 +00:00
|
|
|
#endif
|
2017-05-17 18:20:23 +00:00
|
|
|
#if defined(__NR_syz_emit_ethernet)
|
2016-10-04 14:12:12 +00:00
|
|
|
case __NR_syz_emit_ethernet:
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_TUN_ENABLE)
|
2016-10-04 14:12:12 +00:00
|
|
|
return syz_emit_ethernet(a0, a1);
|
2017-05-17 18:20:23 +00:00
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
2017-01-08 16:20:32 +00:00
|
|
|
#endif
|
2017-05-17 18:20:23 +00:00
|
|
|
#if defined(__NR_syz_extract_tcp_res)
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
case __NR_syz_extract_tcp_res:
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_TUN_ENABLE)
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
return syz_extract_tcp_res(a0, a1, a2);
|
2017-05-17 18:20:23 +00:00
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
sys, executor: extract tcp sequence numbers from /dev/net/tun
This commit adds a new pseudo syscall syz_extract_tcp_res, that reads
a packet from /dev/net/tun and extracts tcp sequence numbers to be used
in subsequent packets.
As a result this syzkaller program:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000001000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
listen(r0, 0x5)
syz_emit_ethernet(0x36, &(0x7f0000002000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="4c6112cc15d8", [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}})
syz_extract_tcp_res(&(0x7f0000003000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x38, &(0x7f0000004000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x800, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @tcp={{0x1, 0x0, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {"0c10"}}}}}})
r3 = accept$inet(r0, &(0x7f0000005000)={0x0, 0x0, @multicast1=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000006000)=0x10)
established a TCP connection:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:20000 0.0.0.0:* LISTEN 5477/a.out
tcp 2 0 172.20.0.170:20000 172.20.0.187:20001 ESTABLISHED 5477/a.out
Similar program for IPv6:
mmap(&(0x7f0000000000/0x10000)=nil, (0x10000), 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c)
listen(r0, 0x5)
syz_emit_ethernet(0x4a, &(0x7f0000001000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
syz_extract_tcp_res(&(0x7f0000002000)={<r1=>0x42424242, <r2=>0x42424242}, 0x1, 0x0)
syz_emit_ethernet(0x4a, &(0x7f0000003000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="de895db1468d", [], {{0x86dd, @ipv6={0x0, 0x6, "a228af", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r2, r1, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, {[]}}, {""}}}}}}})
r3 = accept$inet6(r0, &(0x7f0000004000)={0x0, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, &(0x7f0000005000)=0x1c)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp6 0 0 :::20001 :::* LISTEN 5527/a.out
tcp6 0 0 fe80::aa:20001 fe80::bb:20000 ESTABLISHED 5527/a.out
2017-05-16 14:14:58 +00:00
|
|
|
#endif
|
2017-01-08 16:20:32 +00:00
|
|
|
#ifdef __NR_syz_kvm_setup_cpu
|
|
|
|
case __NR_syz_kvm_setup_cpu:
|
|
|
|
return syz_kvm_setup_cpu(a0, a1, a2, a3, a4, a5, a6, a7);
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
2016-08-28 14:33:32 +00:00
|
|
|
}
|
|
|
|
}
|
2016-10-18 19:07:40 +00:00
|
|
|
|
|
|
|
static void loop();
|
|
|
|
|
|
|
|
static void sandbox_common()
|
|
|
|
{
|
|
|
|
prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
|
|
|
|
setpgrp();
|
|
|
|
setsid();
|
|
|
|
|
|
|
|
struct rlimit rlim;
|
|
|
|
rlim.rlim_cur = rlim.rlim_max = 128 << 20;
|
|
|
|
setrlimit(RLIMIT_AS, &rlim);
|
|
|
|
rlim.rlim_cur = rlim.rlim_max = 1 << 20;
|
|
|
|
setrlimit(RLIMIT_FSIZE, &rlim);
|
|
|
|
rlim.rlim_cur = rlim.rlim_max = 1 << 20;
|
|
|
|
setrlimit(RLIMIT_STACK, &rlim);
|
|
|
|
rlim.rlim_cur = rlim.rlim_max = 0;
|
|
|
|
setrlimit(RLIMIT_CORE, &rlim);
|
|
|
|
|
|
|
|
unshare(CLONE_NEWNS);
|
|
|
|
unshare(CLONE_NEWIPC);
|
|
|
|
unshare(CLONE_IO);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_SANDBOX_NONE)
|
2017-01-31 17:40:10 +00:00
|
|
|
static int do_sandbox_none(int executor_pid, bool enable_tun)
|
2016-10-18 19:07:40 +00:00
|
|
|
{
|
|
|
|
int pid = fork();
|
|
|
|
if (pid)
|
|
|
|
return pid;
|
2017-01-31 17:40:10 +00:00
|
|
|
|
2016-10-18 19:07:40 +00:00
|
|
|
sandbox_common();
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_TUN_ENABLE)
|
2017-01-31 17:40:10 +00:00
|
|
|
setup_tun(executor_pid, enable_tun);
|
2017-02-01 13:52:35 +00:00
|
|
|
#endif
|
2017-01-31 17:40:10 +00:00
|
|
|
|
2016-10-18 19:07:40 +00:00
|
|
|
loop();
|
2016-12-08 14:20:01 +00:00
|
|
|
doexit(1);
|
2016-10-18 19:07:40 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_SANDBOX_SETUID)
|
2017-01-31 17:40:10 +00:00
|
|
|
static int do_sandbox_setuid(int executor_pid, bool enable_tun)
|
2016-10-18 19:07:40 +00:00
|
|
|
{
|
|
|
|
int pid = fork();
|
|
|
|
if (pid)
|
|
|
|
return pid;
|
|
|
|
|
|
|
|
sandbox_common();
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_TUN_ENABLE)
|
2017-01-31 17:40:10 +00:00
|
|
|
setup_tun(executor_pid, enable_tun);
|
2017-02-01 13:52:35 +00:00
|
|
|
#endif
|
2016-10-18 19:07:40 +00:00
|
|
|
|
|
|
|
const int nobody = 65534;
|
|
|
|
if (setgroups(0, NULL))
|
|
|
|
fail("failed to setgroups");
|
|
|
|
if (syscall(SYS_setresgid, nobody, nobody, nobody))
|
|
|
|
fail("failed to setresgid");
|
|
|
|
if (syscall(SYS_setresuid, nobody, nobody, nobody))
|
|
|
|
fail("failed to setresuid");
|
|
|
|
|
2017-05-25 10:40:06 +00:00
|
|
|
prctl(PR_SET_DUMPABLE, 1, 0, 0, 0);
|
|
|
|
|
2016-10-18 19:07:40 +00:00
|
|
|
loop();
|
2016-12-08 14:20:01 +00:00
|
|
|
doexit(1);
|
2016-10-18 19:07:40 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-05-25 14:07:10 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_SANDBOX_NAMESPACE) || defined(SYZ_FAULT_INJECTION)
|
2016-10-18 19:07:40 +00:00
|
|
|
static bool write_file(const char* file, const char* what, ...)
|
|
|
|
{
|
|
|
|
char buf[1024];
|
|
|
|
va_list args;
|
|
|
|
va_start(args, what);
|
|
|
|
vsnprintf(buf, sizeof(buf), what, args);
|
|
|
|
va_end(args);
|
|
|
|
buf[sizeof(buf) - 1] = 0;
|
|
|
|
int len = strlen(buf);
|
|
|
|
|
|
|
|
int fd = open(file, O_WRONLY | O_CLOEXEC);
|
|
|
|
if (fd == -1)
|
|
|
|
return false;
|
|
|
|
if (write(fd, buf, len) != len) {
|
|
|
|
close(fd);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
return true;
|
|
|
|
}
|
2017-05-25 14:07:10 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_SANDBOX_NAMESPACE)
|
|
|
|
static int real_uid;
|
|
|
|
static int real_gid;
|
|
|
|
static int epid;
|
|
|
|
static bool etun;
|
|
|
|
__attribute__((aligned(64 << 10))) static char sandbox_stack[1 << 20];
|
2016-10-18 19:07:40 +00:00
|
|
|
|
|
|
|
static int namespace_sandbox_proc(void* arg)
|
|
|
|
{
|
|
|
|
sandbox_common();
|
|
|
|
|
|
|
|
write_file("/proc/self/setgroups", "deny");
|
|
|
|
if (!write_file("/proc/self/uid_map", "0 %d 1\n", real_uid))
|
|
|
|
fail("write of /proc/self/uid_map failed");
|
|
|
|
if (!write_file("/proc/self/gid_map", "0 %d 1\n", real_gid))
|
|
|
|
fail("write of /proc/self/gid_map failed");
|
|
|
|
|
2017-05-18 12:36:53 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_TUN_ENABLE)
|
2017-01-31 17:40:10 +00:00
|
|
|
setup_tun(epid, etun);
|
2017-02-01 13:52:35 +00:00
|
|
|
#endif
|
2017-01-31 17:40:10 +00:00
|
|
|
|
2016-10-18 19:07:40 +00:00
|
|
|
if (mkdir("./syz-tmp", 0777))
|
|
|
|
fail("mkdir(syz-tmp) failed");
|
|
|
|
if (mount("", "./syz-tmp", "tmpfs", 0, NULL))
|
|
|
|
fail("mount(tmpfs) failed");
|
|
|
|
if (mkdir("./syz-tmp/newroot", 0777))
|
|
|
|
fail("mkdir failed");
|
|
|
|
if (mkdir("./syz-tmp/newroot/dev", 0700))
|
|
|
|
fail("mkdir failed");
|
|
|
|
if (mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND | MS_REC | MS_PRIVATE, NULL))
|
|
|
|
fail("mount(dev) failed");
|
2017-05-25 10:40:06 +00:00
|
|
|
if (mkdir("./syz-tmp/newroot/proc", 0700))
|
|
|
|
fail("mkdir failed");
|
|
|
|
if (mount(NULL, "./syz-tmp/newroot/proc", "proc", 0, NULL))
|
|
|
|
fail("mount(proc) failed");
|
2016-10-18 19:07:40 +00:00
|
|
|
if (mkdir("./syz-tmp/pivot", 0777))
|
|
|
|
fail("mkdir failed");
|
|
|
|
if (syscall(SYS_pivot_root, "./syz-tmp", "./syz-tmp/pivot")) {
|
|
|
|
debug("pivot_root failed");
|
|
|
|
if (chdir("./syz-tmp"))
|
|
|
|
fail("chdir failed");
|
|
|
|
} else {
|
|
|
|
if (chdir("/"))
|
|
|
|
fail("chdir failed");
|
|
|
|
if (umount2("./pivot", MNT_DETACH))
|
|
|
|
fail("umount failed");
|
|
|
|
}
|
|
|
|
if (chroot("./newroot"))
|
|
|
|
fail("chroot failed");
|
|
|
|
if (chdir("/"))
|
|
|
|
fail("chdir failed");
|
|
|
|
|
2016-12-07 15:00:20 +00:00
|
|
|
struct __user_cap_header_struct cap_hdr = {};
|
|
|
|
struct __user_cap_data_struct cap_data[2] = {};
|
2016-10-18 19:07:40 +00:00
|
|
|
cap_hdr.version = _LINUX_CAPABILITY_VERSION_3;
|
|
|
|
cap_hdr.pid = getpid();
|
|
|
|
if (syscall(SYS_capget, &cap_hdr, &cap_data))
|
|
|
|
fail("capget failed");
|
|
|
|
cap_data[0].effective &= ~(1 << CAP_SYS_PTRACE);
|
|
|
|
cap_data[0].permitted &= ~(1 << CAP_SYS_PTRACE);
|
|
|
|
cap_data[0].inheritable &= ~(1 << CAP_SYS_PTRACE);
|
|
|
|
if (syscall(SYS_capset, &cap_hdr, &cap_data))
|
|
|
|
fail("capset failed");
|
|
|
|
|
|
|
|
loop();
|
2016-12-08 14:20:01 +00:00
|
|
|
doexit(1);
|
2016-10-18 19:07:40 +00:00
|
|
|
}
|
|
|
|
|
2017-01-31 17:40:10 +00:00
|
|
|
static int do_sandbox_namespace(int executor_pid, bool enable_tun)
|
2016-10-18 19:07:40 +00:00
|
|
|
{
|
|
|
|
real_uid = getuid();
|
|
|
|
real_gid = getgid();
|
2017-01-31 17:40:10 +00:00
|
|
|
epid = executor_pid;
|
|
|
|
etun = enable_tun;
|
2016-12-08 14:20:01 +00:00
|
|
|
mprotect(sandbox_stack, 4096, PROT_NONE);
|
2016-12-23 15:25:35 +00:00
|
|
|
return clone(namespace_sandbox_proc, &sandbox_stack[sizeof(sandbox_stack) - 64],
|
2016-10-18 19:07:40 +00:00
|
|
|
CLONE_NEWUSER | CLONE_NEWPID | CLONE_NEWUTS | CLONE_NEWNET, NULL);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-11-29 18:02:58 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_REPEAT)
|
2016-10-18 19:07:40 +00:00
|
|
|
static void remove_dir(const char* dir)
|
|
|
|
{
|
|
|
|
DIR* dp;
|
|
|
|
struct dirent* ep;
|
|
|
|
int iter = 0;
|
|
|
|
retry:
|
|
|
|
dp = opendir(dir);
|
|
|
|
if (dp == NULL) {
|
|
|
|
if (errno == EMFILE) {
|
|
|
|
exitf("opendir(%s) failed due to NOFILE, exiting");
|
|
|
|
}
|
|
|
|
exitf("opendir(%s) failed", dir);
|
|
|
|
}
|
|
|
|
while ((ep = readdir(dp))) {
|
|
|
|
if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0)
|
|
|
|
continue;
|
|
|
|
char filename[FILENAME_MAX];
|
|
|
|
snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name);
|
|
|
|
struct stat st;
|
|
|
|
if (lstat(filename, &st))
|
|
|
|
exitf("lstat(%s) failed", filename);
|
|
|
|
if (S_ISDIR(st.st_mode)) {
|
|
|
|
remove_dir(filename);
|
|
|
|
continue;
|
|
|
|
}
|
2016-11-26 15:37:46 +00:00
|
|
|
int i;
|
|
|
|
for (i = 0;; i++) {
|
2016-10-18 19:07:40 +00:00
|
|
|
debug("unlink(%s)\n", filename);
|
|
|
|
if (unlink(filename) == 0)
|
|
|
|
break;
|
|
|
|
if (errno == EROFS) {
|
|
|
|
debug("ignoring EROFS\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (errno != EBUSY || i > 100)
|
|
|
|
exitf("unlink(%s) failed", filename);
|
|
|
|
debug("umount(%s)\n", filename);
|
|
|
|
if (umount2(filename, MNT_DETACH))
|
|
|
|
exitf("umount(%s) failed", filename);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
closedir(dp);
|
2016-11-26 15:37:46 +00:00
|
|
|
int i;
|
|
|
|
for (i = 0;; i++) {
|
2016-10-18 19:07:40 +00:00
|
|
|
debug("rmdir(%s)\n", dir);
|
|
|
|
if (rmdir(dir) == 0)
|
|
|
|
break;
|
|
|
|
if (i < 100) {
|
|
|
|
if (errno == EROFS) {
|
|
|
|
debug("ignoring EROFS\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (errno == EBUSY) {
|
|
|
|
debug("umount(%s)\n", dir);
|
|
|
|
if (umount2(dir, MNT_DETACH))
|
|
|
|
exitf("umount(%s) failed", dir);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (errno == ENOTEMPTY) {
|
|
|
|
if (iter < 100) {
|
|
|
|
iter++;
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
exitf("rmdir(%s) failed", dir);
|
|
|
|
}
|
|
|
|
}
|
2016-11-29 18:02:58 +00:00
|
|
|
#endif
|
2016-10-18 19:07:40 +00:00
|
|
|
|
2016-11-26 15:37:46 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_REPEAT)
|
2016-10-18 19:07:40 +00:00
|
|
|
static uint64_t current_time_ms()
|
|
|
|
{
|
|
|
|
struct timespec ts;
|
|
|
|
|
|
|
|
if (clock_gettime(CLOCK_MONOTONIC, &ts))
|
|
|
|
fail("clock_gettime failed");
|
|
|
|
return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
|
|
|
|
}
|
2016-11-26 15:37:46 +00:00
|
|
|
#endif
|
2016-10-18 19:07:40 +00:00
|
|
|
|
2017-05-25 14:07:10 +00:00
|
|
|
#if defined(SYZ_EXECUTOR) || defined(SYZ_FAULT_INJECTION)
|
|
|
|
static int inject_fault(int nth)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
char buf[128];
|
|
|
|
|
|
|
|
sprintf(buf, "/proc/self/task/%d/fail-nth", (int)syscall(SYS_gettid));
|
|
|
|
fd = open(buf, O_RDWR);
|
|
|
|
if (fd == -1)
|
|
|
|
fail("failed to open /proc/self/task/tid/fail-nth");
|
|
|
|
sprintf(buf, "%d", nth + 1);
|
|
|
|
if (write(fd, buf, strlen(buf)) != (ssize_t)strlen(buf))
|
|
|
|
fail("failed to write /proc/self/task/tid/fail-nth");
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2016-10-18 19:07:40 +00:00
|
|
|
#if defined(SYZ_REPEAT)
|
|
|
|
static void test();
|
|
|
|
|
|
|
|
void loop()
|
|
|
|
{
|
2016-11-26 15:37:46 +00:00
|
|
|
int iter;
|
|
|
|
for (iter = 0;; iter++) {
|
2016-10-18 19:07:40 +00:00
|
|
|
char cwdbuf[256];
|
|
|
|
sprintf(cwdbuf, "./%d", iter);
|
|
|
|
if (mkdir(cwdbuf, 0777))
|
|
|
|
fail("failed to mkdir");
|
|
|
|
int pid = fork();
|
|
|
|
if (pid < 0)
|
|
|
|
fail("clone failed");
|
|
|
|
if (pid == 0) {
|
|
|
|
prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
|
|
|
|
setpgrp();
|
|
|
|
if (chdir(cwdbuf))
|
|
|
|
fail("failed to chdir");
|
2017-05-18 12:36:53 +00:00
|
|
|
#ifdef SYZ_TUN_ENABLE
|
2017-05-17 16:05:28 +00:00
|
|
|
flush_tun();
|
|
|
|
#endif
|
2016-10-18 19:07:40 +00:00
|
|
|
test();
|
2016-12-08 14:20:01 +00:00
|
|
|
doexit(0);
|
2016-10-18 19:07:40 +00:00
|
|
|
}
|
|
|
|
int status = 0;
|
|
|
|
uint64_t start = current_time_ms();
|
|
|
|
for (;;) {
|
2016-12-07 15:00:20 +00:00
|
|
|
int res = waitpid(-1, &status, __WALL | WNOHANG);
|
2016-10-18 19:07:40 +00:00
|
|
|
if (res == pid)
|
|
|
|
break;
|
|
|
|
usleep(1000);
|
|
|
|
if (current_time_ms() - start > 5 * 1000) {
|
|
|
|
kill(-pid, SIGKILL);
|
|
|
|
kill(pid, SIGKILL);
|
2016-12-07 15:00:20 +00:00
|
|
|
while (waitpid(-1, &status, __WALL) != pid) {
|
|
|
|
}
|
2016-10-18 19:07:40 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
remove_dir(cwdbuf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2016-08-28 14:33:32 +00:00
|
|
|
`
|