5.9 KiB
Syscall Description
syzkaller
uses declarative description of syscalls to generate, mutate, minimize,
serialize and deserialize programs (sequences of syscalls). Below you can see
(hopefully self-explanatory) excerpt from the description:
open(file filename, flags flags[open_flags], mode flags[open_mode]) fd
read(fd fd, buf buffer[out], count len[buf]) len[buf]
close(fd fd)
open_mode = S_IRUSR, S_IWUSR, S_IXUSR, S_IRGRP, S_IWGRP, S_IXGRP, S_IROTH, S_IWOTH, S_IXOTH
The description is contained in sys/*.txt
files. See for example sys/sys.txt file.
Syntax
Pseudo-formal grammar of syscall description:
syscallname "(" [arg ["," arg]*] ")" [type]
arg = argname type
argname = identifier
type = typename [ "[" type-options "]" ]
typename = "fileoff" | "buffer" | "vma" , "len" | "flags" |
"filename" | "ptr" | "array" | "intN" | "intptr"
type-options = [type-opt ["," type-opt]]
common type-options include:
"opt" - the argument is optional (like mmap fd argument, or accept peer argument)
rest of the type-options are type-specific:
"fileoff": offset within a file, type-options:
argname of the file
"buffer": a pointer to a memory buffer (like read/write buffer argument), type-options:
direction (in/out/inout)
"string": a pointer to a memory buffer, similar to buffer[in]
"vma": a pointer to a set of pages (used as input for mmap/munmap/mremap/madvise)
"len": length of buffer/vma/arrayptr (for array it is number of elements), type-options:
argname of the object
"flags": a set of flags, type-options:
reference to flags description
"filename": a file/link/dir name
"ptr": a pointer to an object, type-options:
type of the object; direction (in/out/inout)
"array": a variable/fixed-length array, type-options:
type of elements, optional size (fixed "5", or ranged "5:10", boundaries inclusive)
"intN"/"intptr": an integer without a particular meaning, type-options:
range of values (e.g. "5:10", or "-100:200", optional)
flags/len/flags also have trailing underlying type type-option when used in structs/unions/pointers.
Flags are described as:
flagname = const ["," const]*
Structs are described as:
structname "{" "\n"
(fieldname type "\n")+
"}"
Structs can have trailing attributes "packed" and "align_N", they are specified in square brackets after the struct.
Unions are described as:
unionname "[" "\n"
(fieldname type "\n")+
"]"
Unions can have a trailing "varlen" attribute (specified in square brackets after the union), which means that union length is not maximum of all option lengths, but rather length of a particular chosen option (such unions can't be part of a struct, because their size is not statically known).
Custom resources are described as:
resource identifier "[" underlying_type "]" [ ":" const ("," const)* ]
underlying_type
is either one of int8
, int16
, int32
, int64
, intptr
or another resource.
Resources can then be used as types. For example:
resource fd[int32]: 0xffffffffffffffff, AT_FDCWD, 1000000
resource sock[fd]
resource sock_unix[sock]
socket(...) sock
accept(fd sock, ...) sock
listen(fd sock, backlog int32)
Description files also contain include
directives that refer to Linux kernel header files
and define
directives that define symbolic constant values. See the following section for details.
Code generation
Textual syscall descriptions are translated into code used by syzkaller
.
This process consists of 2 steps. The first step is extraction of values of symbolic
constants from Linux sources using syz-extract
utility.
syz-extract
generates a small C program that includes kernel headers referenced
by include
directives, defines macros as specified by define
directives and
prints values of symbolic constants. Results are stored in .const
files, one per arch.
For example, sys/tty.txt is translated into sys/tty_amd64.const.
The second step is generation of Go code for syzkaller. This step uses syscall descriptions and the const files generated during the first step. You can see a result in sys/sys_amd64.go and in executor/syscalls.h.
Describing new system calls
This section describes how to extend syzkaller to allow fuzz testing of a new system call; this is particularly useful for kernel developers who are proposing new system calls.
First, add a declarative description of the new system call to the appropriate file:
- Various
sys/<subsystem>.txt
files hold system calls for particular kernel subsystems, for examplebpf
orsocket
. - sys/sys.txt holds descriptions for more general system calls.
- An entirely new subsystem can be added as a new
sys/<new>.txt
file.
The description format is described above.
If the subsystem is present in the mainline kernel, add the new txt file to extract.sh
file and run make extract LINUX=$KSRC
with KSRC
set to the location of a kernel
source tree. This will generate const files.
If the subsystem is not present in the mainline kernel, then you need to manually
run syz-extract
binary:
make bin/syz-extract
bin/syz-extract -arch $ARCH -linux "$LINUX" -linuxbld "$LINUXBLD" sys/<new>.txt
$ARCH
is one of amd64
, arm64
, ppc64le
. If the subsystem is supported on several architectures,
then run syz-exctact
for each arch.
$LINUX
should point to kernel source checkout, which is configured for the corresponding arch
(i.e. you need to run make someconfig && make
there first). If the kernel was built into a separate
directory (with make O=...
) then also set $LINUXBLD
to the location of the
build directory.
Then, run make generate
which will update generated code.
Rebuild syzkaller (make clean all
) to force use of the new system call definitions.
Optionally, adjust the enable_syscalls
configuration value for syzkaller to specifically target the
new system calls.