| // KMSAN: uninit-value in sysfs_format_mac |
| // https://syzkaller.appspot.com/bug?id=6c137bde6efa724b85a59042225145a547947eb0 |
| // status:open |
| // autogenerated by syzkaller (https://github.com/google/syzkaller) |
| |
| #define _GNU_SOURCE |
| |
| #include <dirent.h> |
| #include <endian.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <net/if.h> |
| #include <netinet/in.h> |
| #include <sched.h> |
| #include <signal.h> |
| #include <stdarg.h> |
| #include <stdbool.h> |
| #include <stddef.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/ioctl.h> |
| #include <sys/mount.h> |
| #include <sys/prctl.h> |
| #include <sys/resource.h> |
| #include <sys/socket.h> |
| #include <sys/stat.h> |
| #include <sys/syscall.h> |
| #include <sys/time.h> |
| #include <sys/types.h> |
| #include <sys/wait.h> |
| #include <time.h> |
| #include <unistd.h> |
| |
| #include <linux/capability.h> |
| #include <linux/net.h> |
| #include <linux/usb/ch9.h> |
| |
| unsigned long long procid; |
| |
| static void sleep_ms(uint64_t ms) |
| { |
| usleep(ms * 1000); |
| } |
| |
| static uint64_t current_time_ms(void) |
| { |
| struct timespec ts; |
| if (clock_gettime(CLOCK_MONOTONIC, &ts)) |
| exit(1); |
| return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; |
| } |
| |
| static void use_temporary_dir(void) |
| { |
| char tmpdir_template[] = "./syzkaller.XXXXXX"; |
| char* tmpdir = mkdtemp(tmpdir_template); |
| if (!tmpdir) |
| exit(1); |
| if (chmod(tmpdir, 0777)) |
| exit(1); |
| if (chdir(tmpdir)) |
| exit(1); |
| } |
| |
| static bool write_file(const char* file, const char* what, ...) |
| { |
| char buf[1024]; |
| va_list args; |
| va_start(args, what); |
| vsnprintf(buf, sizeof(buf), what, args); |
| va_end(args); |
| buf[sizeof(buf) - 1] = 0; |
| int len = strlen(buf); |
| int fd = open(file, O_WRONLY | O_CLOEXEC); |
| if (fd == -1) |
| return false; |
| if (write(fd, buf, len) != len) { |
| int err = errno; |
| close(fd); |
| errno = err; |
| return false; |
| } |
| close(fd); |
| return true; |
| } |
| |
| #define MAX_FDS 30 |
| |
| #define USB_DEBUG 0 |
| |
| #define USB_MAX_IFACE_NUM 4 |
| #define USB_MAX_EP_NUM 32 |
| |
| struct usb_iface_index { |
| struct usb_interface_descriptor* iface; |
| uint8_t bInterfaceNumber; |
| uint8_t bAlternateSetting; |
| struct usb_endpoint_descriptor eps[USB_MAX_EP_NUM]; |
| int eps_num; |
| }; |
| |
| struct usb_device_index { |
| struct usb_device_descriptor* dev; |
| struct usb_config_descriptor* config; |
| uint8_t bMaxPower; |
| int config_length; |
| struct usb_iface_index ifaces[USB_MAX_IFACE_NUM]; |
| int ifaces_num; |
| int iface_cur; |
| }; |
| |
| static bool parse_usb_descriptor(char* buffer, size_t length, |
| struct usb_device_index* index) |
| { |
| if (length < sizeof(*index->dev) + sizeof(*index->config)) |
| return false; |
| memset(index, 0, sizeof(*index)); |
| index->dev = (struct usb_device_descriptor*)buffer; |
| index->config = (struct usb_config_descriptor*)(buffer + sizeof(*index->dev)); |
| index->bMaxPower = index->config->bMaxPower; |
| index->config_length = length - sizeof(*index->dev); |
| index->iface_cur = -1; |
| size_t offset = 0; |
| while (true) { |
| if (offset + 1 >= length) |
| break; |
| uint8_t desc_length = buffer[offset]; |
| uint8_t desc_type = buffer[offset + 1]; |
| if (desc_length <= 2) |
| break; |
| if (offset + desc_length > length) |
| break; |
| if (desc_type == USB_DT_INTERFACE && |
| index->ifaces_num < USB_MAX_IFACE_NUM) { |
| struct usb_interface_descriptor* iface = |
| (struct usb_interface_descriptor*)(buffer + offset); |
| index->ifaces[index->ifaces_num].iface = iface; |
| index->ifaces[index->ifaces_num].bInterfaceNumber = |
| iface->bInterfaceNumber; |
| index->ifaces[index->ifaces_num].bAlternateSetting = |
| iface->bAlternateSetting; |
| index->ifaces_num++; |
| } |
| if (desc_type == USB_DT_ENDPOINT && index->ifaces_num > 0) { |
| struct usb_iface_index* iface = &index->ifaces[index->ifaces_num - 1]; |
| if (iface->eps_num < USB_MAX_EP_NUM) { |
| memcpy(&iface->eps[iface->eps_num], buffer + offset, |
| sizeof(iface->eps[iface->eps_num])); |
| iface->eps_num++; |
| } |
| } |
| offset += desc_length; |
| } |
| return true; |
| } |
| |
| enum usb_fuzzer_event_type { |
| USB_FUZZER_EVENT_INVALID, |
| USB_FUZZER_EVENT_CONNECT, |
| USB_FUZZER_EVENT_DISCONNECT, |
| USB_FUZZER_EVENT_SUSPEND, |
| USB_FUZZER_EVENT_RESUME, |
| USB_FUZZER_EVENT_CONTROL, |
| }; |
| |
| struct usb_fuzzer_event { |
| uint32_t type; |
| uint32_t length; |
| char data[0]; |
| }; |
| |
| struct usb_fuzzer_init { |
| uint64_t speed; |
| const char* driver_name; |
| const char* device_name; |
| }; |
| |
| struct usb_fuzzer_ep_io { |
| uint16_t ep; |
| uint16_t flags; |
| uint32_t length; |
| char data[0]; |
| }; |
| |
| #define USB_FUZZER_IOCTL_INIT _IOW('U', 0, struct usb_fuzzer_init) |
| #define USB_FUZZER_IOCTL_RUN _IO('U', 1) |
| #define USB_FUZZER_IOCTL_EVENT_FETCH _IOR('U', 2, struct usb_fuzzer_event) |
| #define USB_FUZZER_IOCTL_EP0_WRITE _IOW('U', 3, struct usb_fuzzer_ep_io) |
| #define USB_FUZZER_IOCTL_EP0_READ _IOWR('U', 4, struct usb_fuzzer_ep_io) |
| #define USB_FUZZER_IOCTL_EP_ENABLE _IOW('U', 5, struct usb_endpoint_descriptor) |
| #define USB_FUZZER_IOCTL_EP_DISABLE _IOW('U', 6, int) |
| #define USB_FUZZER_IOCTL_EP_WRITE _IOW('U', 7, struct usb_fuzzer_ep_io) |
| #define USB_FUZZER_IOCTL_EP_READ _IOWR('U', 8, struct usb_fuzzer_ep_io) |
| #define USB_FUZZER_IOCTL_CONFIGURE _IO('U', 9) |
| #define USB_FUZZER_IOCTL_VBUS_DRAW _IOW('U', 10, uint32_t) |
| |
| static int usb_fuzzer_open() |
| { |
| return open("/sys/kernel/debug/usb-fuzzer", O_RDWR); |
| } |
| |
| static int usb_fuzzer_init(int fd, uint32_t speed, const char* driver, |
| const char* device) |
| { |
| struct usb_fuzzer_init arg; |
| arg.speed = speed; |
| arg.driver_name = driver; |
| arg.device_name = device; |
| return ioctl(fd, USB_FUZZER_IOCTL_INIT, &arg); |
| } |
| |
| static int usb_fuzzer_run(int fd) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_RUN, 0); |
| } |
| |
| static int usb_fuzzer_event_fetch(int fd, struct usb_fuzzer_event* event) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_EVENT_FETCH, event); |
| } |
| |
| static int usb_fuzzer_ep0_write(int fd, struct usb_fuzzer_ep_io* io) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_EP0_WRITE, io); |
| } |
| |
| static int usb_fuzzer_ep0_read(int fd, struct usb_fuzzer_ep_io* io) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_EP0_READ, io); |
| } |
| |
| static int usb_fuzzer_ep_enable(int fd, struct usb_endpoint_descriptor* desc) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_EP_ENABLE, desc); |
| } |
| |
| static int usb_fuzzer_ep_disable(int fd, int ep) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_EP_DISABLE, ep); |
| } |
| |
| static int usb_fuzzer_configure(int fd) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_CONFIGURE, 0); |
| } |
| |
| static int usb_fuzzer_vbus_draw(int fd, uint32_t power) |
| { |
| return ioctl(fd, USB_FUZZER_IOCTL_VBUS_DRAW, power); |
| } |
| |
| #define MAX_USB_FDS 6 |
| |
| struct usb_info { |
| int fd; |
| struct usb_device_index index; |
| }; |
| |
| static struct usb_info usb_devices[MAX_USB_FDS]; |
| static int usb_devices_num; |
| |
| static struct usb_device_index* add_usb_index(int fd, char* dev, size_t dev_len) |
| { |
| int i = __atomic_fetch_add(&usb_devices_num, 1, __ATOMIC_RELAXED); |
| if (i >= MAX_USB_FDS) |
| return NULL; |
| int rv = 0; |
| rv = parse_usb_descriptor(dev, dev_len, &usb_devices[i].index); |
| if (!rv) |
| return NULL; |
| __atomic_store_n(&usb_devices[i].fd, fd, __ATOMIC_RELEASE); |
| return &usb_devices[i].index; |
| } |
| |
| static struct usb_device_index* lookup_usb_index(int fd) |
| { |
| int i; |
| for (i = 0; i < MAX_USB_FDS; i++) { |
| if (__atomic_load_n(&usb_devices[i].fd, __ATOMIC_ACQUIRE) == fd) { |
| return &usb_devices[i].index; |
| } |
| } |
| return NULL; |
| } |
| |
| static int lookup_interface(int fd, uint8_t bInterfaceNumber, |
| uint8_t bAlternateSetting) |
| { |
| struct usb_device_index* index = lookup_usb_index(fd); |
| int i; |
| if (!index) |
| return -1; |
| for (i = 0; i < index->ifaces_num; i++) { |
| if (index->ifaces[i].bInterfaceNumber == bInterfaceNumber && |
| index->ifaces[i].bAlternateSetting == bAlternateSetting) |
| return i; |
| } |
| return -1; |
| } |
| |
| static void set_interface(int fd, int n) |
| { |
| struct usb_device_index* index = lookup_usb_index(fd); |
| int ep; |
| if (!index) |
| return; |
| if (index->iface_cur >= 0 && index->iface_cur < index->ifaces_num) { |
| for (ep = 0; ep < index->ifaces[index->iface_cur].eps_num; ep++) { |
| int rv = usb_fuzzer_ep_disable(fd, ep); |
| if (rv < 0) { |
| } else { |
| } |
| } |
| } |
| if (n >= 0 && n < index->ifaces_num) { |
| for (ep = 0; ep < index->ifaces[n].eps_num; ep++) { |
| int rv = usb_fuzzer_ep_enable(fd, &index->ifaces[n].eps[ep]); |
| if (rv < 0) { |
| } else { |
| } |
| } |
| index->iface_cur = n; |
| } |
| } |
| |
| static int configure_device(int fd) |
| { |
| struct usb_device_index* index = lookup_usb_index(fd); |
| if (!index) |
| return -1; |
| int rv = usb_fuzzer_vbus_draw(fd, index->bMaxPower); |
| if (rv < 0) { |
| return rv; |
| } |
| rv = usb_fuzzer_configure(fd); |
| if (rv < 0) { |
| return rv; |
| } |
| set_interface(fd, 0); |
| return 0; |
| } |
| |
| #define USB_MAX_PACKET_SIZE 1024 |
| |
| struct usb_fuzzer_control_event { |
| struct usb_fuzzer_event inner; |
| struct usb_ctrlrequest ctrl; |
| char data[USB_MAX_PACKET_SIZE]; |
| }; |
| |
| struct usb_fuzzer_ep_io_data { |
| struct usb_fuzzer_ep_io inner; |
| char data[USB_MAX_PACKET_SIZE]; |
| }; |
| |
| struct vusb_connect_string_descriptor { |
| uint32_t len; |
| char* str; |
| } __attribute__((packed)); |
| |
| struct vusb_connect_descriptors { |
| uint32_t qual_len; |
| char* qual; |
| uint32_t bos_len; |
| char* bos; |
| uint32_t strs_len; |
| struct vusb_connect_string_descriptor strs[0]; |
| } __attribute__((packed)); |
| |
| static const char default_string[] = {8, USB_DT_STRING, 's', 0, 'y', 0, 'z', 0}; |
| |
| static const char default_lang_id[] = {4, USB_DT_STRING, 0x09, 0x04}; |
| |
| static bool lookup_connect_response(int fd, |
| struct vusb_connect_descriptors* descs, |
| struct usb_ctrlrequest* ctrl, |
| char** response_data, |
| uint32_t* response_length) |
| { |
| struct usb_device_index* index = lookup_usb_index(fd); |
| uint8_t str_idx; |
| if (!index) |
| return false; |
| switch (ctrl->bRequestType & USB_TYPE_MASK) { |
| case USB_TYPE_STANDARD: |
| switch (ctrl->bRequest) { |
| case USB_REQ_GET_DESCRIPTOR: |
| switch (ctrl->wValue >> 8) { |
| case USB_DT_DEVICE: |
| *response_data = (char*)index->dev; |
| *response_length = sizeof(*index->dev); |
| return true; |
| case USB_DT_CONFIG: |
| *response_data = (char*)index->config; |
| *response_length = index->config_length; |
| return true; |
| case USB_DT_STRING: |
| str_idx = (uint8_t)ctrl->wValue; |
| if (descs && str_idx < descs->strs_len) { |
| *response_data = descs->strs[str_idx].str; |
| *response_length = descs->strs[str_idx].len; |
| return true; |
| } |
| if (str_idx == 0) { |
| *response_data = (char*)&default_lang_id[0]; |
| *response_length = default_lang_id[0]; |
| return true; |
| } |
| *response_data = (char*)&default_string[0]; |
| *response_length = default_string[0]; |
| return true; |
| case USB_DT_BOS: |
| *response_data = descs->bos; |
| *response_length = descs->bos_len; |
| return true; |
| case USB_DT_DEVICE_QUALIFIER: |
| if (!descs->qual) { |
| struct usb_qualifier_descriptor* qual = |
| (struct usb_qualifier_descriptor*)response_data; |
| qual->bLength = sizeof(*qual); |
| qual->bDescriptorType = USB_DT_DEVICE_QUALIFIER; |
| qual->bcdUSB = index->dev->bcdUSB; |
| qual->bDeviceClass = index->dev->bDeviceClass; |
| qual->bDeviceSubClass = index->dev->bDeviceSubClass; |
| qual->bDeviceProtocol = index->dev->bDeviceProtocol; |
| qual->bMaxPacketSize0 = index->dev->bMaxPacketSize0; |
| qual->bNumConfigurations = index->dev->bNumConfigurations; |
| qual->bRESERVED = 0; |
| *response_length = sizeof(*qual); |
| return true; |
| } |
| *response_data = descs->qual; |
| *response_length = descs->qual_len; |
| return true; |
| default: |
| exit(1); |
| return false; |
| } |
| break; |
| default: |
| exit(1); |
| return false; |
| } |
| break; |
| default: |
| exit(1); |
| return false; |
| } |
| return false; |
| } |
| |
| static volatile long syz_usb_connect(volatile long a0, volatile long a1, |
| volatile long a2, volatile long a3) |
| { |
| uint64_t speed = a0; |
| uint64_t dev_len = a1; |
| char* dev = (char*)a2; |
| struct vusb_connect_descriptors* descs = (struct vusb_connect_descriptors*)a3; |
| if (!dev) { |
| return -1; |
| } |
| int fd = usb_fuzzer_open(); |
| if (fd < 0) { |
| return fd; |
| } |
| if (fd >= MAX_FDS) { |
| close(fd); |
| return -1; |
| } |
| struct usb_device_index* index = add_usb_index(fd, dev, dev_len); |
| if (!index) { |
| return -1; |
| } |
| char device[32]; |
| sprintf(&device[0], "dummy_udc.%llu", procid); |
| int rv = usb_fuzzer_init(fd, speed, "dummy_udc", &device[0]); |
| if (rv < 0) { |
| return rv; |
| } |
| rv = usb_fuzzer_run(fd); |
| if (rv < 0) { |
| return rv; |
| } |
| bool done = false; |
| while (!done) { |
| struct usb_fuzzer_control_event event; |
| event.inner.type = 0; |
| event.inner.length = sizeof(event.ctrl); |
| rv = usb_fuzzer_event_fetch(fd, (struct usb_fuzzer_event*)&event); |
| if (rv < 0) { |
| return rv; |
| } |
| if (event.inner.type != USB_FUZZER_EVENT_CONTROL) |
| continue; |
| bool response_found = false; |
| char* response_data = NULL; |
| uint32_t response_length = 0; |
| if (event.ctrl.bRequestType & USB_DIR_IN) { |
| response_found = lookup_connect_response( |
| fd, descs, &event.ctrl, &response_data, &response_length); |
| if (!response_found) { |
| return -1; |
| } |
| } else { |
| if ((event.ctrl.bRequestType & USB_TYPE_MASK) != USB_TYPE_STANDARD || |
| event.ctrl.bRequest != USB_REQ_SET_CONFIGURATION) { |
| exit(1); |
| return -1; |
| } |
| done = true; |
| } |
| if (done) { |
| rv = configure_device(fd); |
| if (rv < 0) { |
| return rv; |
| } |
| } |
| struct usb_fuzzer_ep_io_data response; |
| response.inner.ep = 0; |
| response.inner.flags = 0; |
| if (response_length > sizeof(response.data)) |
| response_length = 0; |
| if (event.ctrl.wLength < response_length) |
| response_length = event.ctrl.wLength; |
| response.inner.length = response_length; |
| if (response_data) |
| memcpy(&response.data[0], response_data, response_length); |
| else |
| memset(&response.data[0], 0, response_length); |
| if (event.ctrl.bRequestType & USB_DIR_IN) { |
| rv = usb_fuzzer_ep0_write(fd, (struct usb_fuzzer_ep_io*)&response); |
| } else { |
| rv = usb_fuzzer_ep0_read(fd, (struct usb_fuzzer_ep_io*)&response); |
| } |
| if (rv < 0) { |
| return rv; |
| } |
| } |
| sleep_ms(200); |
| return fd; |
| } |
| |
| struct vusb_descriptor { |
| uint8_t req_type; |
| uint8_t desc_type; |
| uint32_t len; |
| char data[0]; |
| } __attribute__((packed)); |
| |
| struct vusb_descriptors { |
| uint32_t len; |
| struct vusb_descriptor* generic; |
| struct vusb_descriptor* descs[0]; |
| } __attribute__((packed)); |
| |
| struct vusb_response { |
| uint8_t type; |
| uint8_t req; |
| uint32_t len; |
| char data[0]; |
| } __attribute__((packed)); |
| |
| struct vusb_responses { |
| uint32_t len; |
| struct vusb_response* generic; |
| struct vusb_response* resps[0]; |
| } __attribute__((packed)); |
| |
| static bool lookup_control_response(struct vusb_descriptors* descs, |
| struct vusb_responses* resps, |
| struct usb_ctrlrequest* ctrl, |
| char** response_data, |
| uint32_t* response_length) |
| { |
| int descs_num = 0; |
| int resps_num = 0; |
| if (descs) |
| descs_num = (descs->len - offsetof(struct vusb_descriptors, descs)) / |
| sizeof(descs->descs[0]); |
| if (resps) |
| resps_num = (resps->len - offsetof(struct vusb_responses, resps)) / |
| sizeof(resps->resps[0]); |
| uint8_t req = ctrl->bRequest; |
| uint8_t req_type = ctrl->bRequestType & USB_TYPE_MASK; |
| uint8_t desc_type = ctrl->wValue >> 8; |
| if (req == USB_REQ_GET_DESCRIPTOR) { |
| int i; |
| for (i = 0; i < descs_num; i++) { |
| struct vusb_descriptor* desc = descs->descs[i]; |
| if (!desc) |
| continue; |
| if (desc->req_type == req_type && desc->desc_type == desc_type) { |
| *response_length = desc->len; |
| if (*response_length != 0) |
| *response_data = &desc->data[0]; |
| else |
| *response_data = NULL; |
| return true; |
| } |
| } |
| if (descs && descs->generic) { |
| *response_data = &descs->generic->data[0]; |
| *response_length = descs->generic->len; |
| return true; |
| } |
| } else { |
| int i; |
| for (i = 0; i < resps_num; i++) { |
| struct vusb_response* resp = resps->resps[i]; |
| if (!resp) |
| continue; |
| if (resp->type == req_type && resp->req == req) { |
| *response_length = resp->len; |
| if (*response_length != 0) |
| *response_data = &resp->data[0]; |
| else |
| *response_data = NULL; |
| return true; |
| } |
| } |
| if (resps && resps->generic) { |
| *response_data = &resps->generic->data[0]; |
| *response_length = resps->generic->len; |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| static volatile long syz_usb_control_io(volatile long a0, volatile long a1, |
| volatile long a2) |
| { |
| int fd = a0; |
| struct vusb_descriptors* descs = (struct vusb_descriptors*)a1; |
| struct vusb_responses* resps = (struct vusb_responses*)a2; |
| struct usb_fuzzer_control_event event; |
| event.inner.type = 0; |
| event.inner.length = USB_MAX_PACKET_SIZE; |
| int rv = usb_fuzzer_event_fetch(fd, (struct usb_fuzzer_event*)&event); |
| if (rv < 0) { |
| return rv; |
| } |
| if (event.inner.type != USB_FUZZER_EVENT_CONTROL) { |
| return -1; |
| } |
| bool response_found = false; |
| char* response_data = NULL; |
| uint32_t response_length = 0; |
| if ((event.ctrl.bRequestType & USB_DIR_IN) && event.ctrl.wLength) { |
| response_found = lookup_control_response(descs, resps, &event.ctrl, |
| &response_data, &response_length); |
| if (!response_found) { |
| return -1; |
| } |
| } else { |
| if ((event.ctrl.bRequestType & USB_TYPE_MASK) == USB_TYPE_STANDARD || |
| event.ctrl.bRequest == USB_REQ_SET_INTERFACE) { |
| int iface_num = event.ctrl.wIndex; |
| int alt_set = event.ctrl.wValue; |
| int iface_index = lookup_interface(fd, iface_num, alt_set); |
| if (iface_index < 0) { |
| } else { |
| set_interface(fd, iface_index); |
| } |
| } |
| response_length = event.ctrl.wLength; |
| } |
| struct usb_fuzzer_ep_io_data response; |
| response.inner.ep = 0; |
| response.inner.flags = 0; |
| if (response_length > sizeof(response.data)) |
| response_length = 0; |
| if (event.ctrl.wLength < response_length) |
| response_length = event.ctrl.wLength; |
| if ((event.ctrl.bRequestType & USB_DIR_IN) && !event.ctrl.wLength) { |
| response_length = USB_MAX_PACKET_SIZE; |
| } |
| response.inner.length = response_length; |
| if (response_data) |
| memcpy(&response.data[0], response_data, response_length); |
| else |
| memset(&response.data[0], 0, response_length); |
| if ((event.ctrl.bRequestType & USB_DIR_IN) && event.ctrl.wLength) { |
| rv = usb_fuzzer_ep0_write(fd, (struct usb_fuzzer_ep_io*)&response); |
| } else { |
| rv = usb_fuzzer_ep0_read(fd, (struct usb_fuzzer_ep_io*)&response); |
| } |
| if (rv < 0) { |
| return rv; |
| } |
| sleep_ms(200); |
| return 0; |
| } |
| |
| #define XT_TABLE_SIZE 1536 |
| #define XT_MAX_ENTRIES 10 |
| |
| struct xt_counters { |
| uint64_t pcnt, bcnt; |
| }; |
| |
| struct ipt_getinfo { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int hook_entry[5]; |
| unsigned int underflow[5]; |
| unsigned int num_entries; |
| unsigned int size; |
| }; |
| |
| struct ipt_get_entries { |
| char name[32]; |
| unsigned int size; |
| void* entrytable[XT_TABLE_SIZE / sizeof(void*)]; |
| }; |
| |
| struct ipt_replace { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int num_entries; |
| unsigned int size; |
| unsigned int hook_entry[5]; |
| unsigned int underflow[5]; |
| unsigned int num_counters; |
| struct xt_counters* counters; |
| char entrytable[XT_TABLE_SIZE]; |
| }; |
| |
| struct ipt_table_desc { |
| const char* name; |
| struct ipt_getinfo info; |
| struct ipt_replace replace; |
| }; |
| |
| static struct ipt_table_desc ipv4_tables[] = { |
| {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, |
| {.name = "raw"}, {.name = "security"}, |
| }; |
| |
| static struct ipt_table_desc ipv6_tables[] = { |
| {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, |
| {.name = "raw"}, {.name = "security"}, |
| }; |
| |
| #define IPT_BASE_CTL 64 |
| #define IPT_SO_SET_REPLACE (IPT_BASE_CTL) |
| #define IPT_SO_GET_INFO (IPT_BASE_CTL) |
| #define IPT_SO_GET_ENTRIES (IPT_BASE_CTL + 1) |
| |
| struct arpt_getinfo { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int hook_entry[3]; |
| unsigned int underflow[3]; |
| unsigned int num_entries; |
| unsigned int size; |
| }; |
| |
| struct arpt_get_entries { |
| char name[32]; |
| unsigned int size; |
| void* entrytable[XT_TABLE_SIZE / sizeof(void*)]; |
| }; |
| |
| struct arpt_replace { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int num_entries; |
| unsigned int size; |
| unsigned int hook_entry[3]; |
| unsigned int underflow[3]; |
| unsigned int num_counters; |
| struct xt_counters* counters; |
| char entrytable[XT_TABLE_SIZE]; |
| }; |
| |
| struct arpt_table_desc { |
| const char* name; |
| struct arpt_getinfo info; |
| struct arpt_replace replace; |
| }; |
| |
| static struct arpt_table_desc arpt_tables[] = { |
| {.name = "filter"}, |
| }; |
| |
| #define ARPT_BASE_CTL 96 |
| #define ARPT_SO_SET_REPLACE (ARPT_BASE_CTL) |
| #define ARPT_SO_GET_INFO (ARPT_BASE_CTL) |
| #define ARPT_SO_GET_ENTRIES (ARPT_BASE_CTL + 1) |
| |
| static void checkpoint_iptables(struct ipt_table_desc* tables, int num_tables, |
| int family, int level) |
| { |
| struct ipt_get_entries entries; |
| socklen_t optlen; |
| int fd, i; |
| fd = socket(family, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < num_tables; i++) { |
| struct ipt_table_desc* table = &tables[i]; |
| strcpy(table->info.name, table->name); |
| strcpy(table->replace.name, table->name); |
| optlen = sizeof(table->info); |
| if (getsockopt(fd, level, IPT_SO_GET_INFO, &table->info, &optlen)) { |
| switch (errno) { |
| case EPERM: |
| case ENOENT: |
| case ENOPROTOOPT: |
| continue; |
| } |
| exit(1); |
| } |
| if (table->info.size > sizeof(table->replace.entrytable)) |
| exit(1); |
| if (table->info.num_entries > XT_MAX_ENTRIES) |
| exit(1); |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; |
| if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| table->replace.valid_hooks = table->info.valid_hooks; |
| table->replace.num_entries = table->info.num_entries; |
| table->replace.size = table->info.size; |
| memcpy(table->replace.hook_entry, table->info.hook_entry, |
| sizeof(table->replace.hook_entry)); |
| memcpy(table->replace.underflow, table->info.underflow, |
| sizeof(table->replace.underflow)); |
| memcpy(table->replace.entrytable, entries.entrytable, table->info.size); |
| } |
| close(fd); |
| } |
| |
| static void reset_iptables(struct ipt_table_desc* tables, int num_tables, |
| int family, int level) |
| { |
| struct xt_counters counters[XT_MAX_ENTRIES]; |
| struct ipt_get_entries entries; |
| struct ipt_getinfo info; |
| socklen_t optlen; |
| int fd, i; |
| fd = socket(family, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < num_tables; i++) { |
| struct ipt_table_desc* table = &tables[i]; |
| if (table->info.valid_hooks == 0) |
| continue; |
| memset(&info, 0, sizeof(info)); |
| strcpy(info.name, table->name); |
| optlen = sizeof(info); |
| if (getsockopt(fd, level, IPT_SO_GET_INFO, &info, &optlen)) |
| exit(1); |
| if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; |
| if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| if (memcmp(table->replace.entrytable, entries.entrytable, |
| table->info.size) == 0) |
| continue; |
| } |
| table->replace.num_counters = info.num_entries; |
| table->replace.counters = counters; |
| optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + |
| table->replace.size; |
| if (setsockopt(fd, level, IPT_SO_SET_REPLACE, &table->replace, optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| static void checkpoint_arptables(void) |
| { |
| struct arpt_get_entries entries; |
| socklen_t optlen; |
| unsigned i; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { |
| struct arpt_table_desc* table = &arpt_tables[i]; |
| strcpy(table->info.name, table->name); |
| strcpy(table->replace.name, table->name); |
| optlen = sizeof(table->info); |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &table->info, &optlen)) { |
| switch (errno) { |
| case EPERM: |
| case ENOENT: |
| case ENOPROTOOPT: |
| continue; |
| } |
| exit(1); |
| } |
| if (table->info.size > sizeof(table->replace.entrytable)) |
| exit(1); |
| if (table->info.num_entries > XT_MAX_ENTRIES) |
| exit(1); |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| table->replace.valid_hooks = table->info.valid_hooks; |
| table->replace.num_entries = table->info.num_entries; |
| table->replace.size = table->info.size; |
| memcpy(table->replace.hook_entry, table->info.hook_entry, |
| sizeof(table->replace.hook_entry)); |
| memcpy(table->replace.underflow, table->info.underflow, |
| sizeof(table->replace.underflow)); |
| memcpy(table->replace.entrytable, entries.entrytable, table->info.size); |
| } |
| close(fd); |
| } |
| |
| static void reset_arptables() |
| { |
| struct xt_counters counters[XT_MAX_ENTRIES]; |
| struct arpt_get_entries entries; |
| struct arpt_getinfo info; |
| socklen_t optlen; |
| unsigned i; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { |
| struct arpt_table_desc* table = &arpt_tables[i]; |
| if (table->info.valid_hooks == 0) |
| continue; |
| memset(&info, 0, sizeof(info)); |
| strcpy(info.name, table->name); |
| optlen = sizeof(info); |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &info, &optlen)) |
| exit(1); |
| if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| if (memcmp(table->replace.entrytable, entries.entrytable, |
| table->info.size) == 0) |
| continue; |
| } else { |
| } |
| table->replace.num_counters = info.num_entries; |
| table->replace.counters = counters; |
| optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + |
| table->replace.size; |
| if (setsockopt(fd, SOL_IP, ARPT_SO_SET_REPLACE, &table->replace, optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| #define NF_BR_NUMHOOKS 6 |
| #define EBT_TABLE_MAXNAMELEN 32 |
| #define EBT_CHAIN_MAXNAMELEN 32 |
| #define EBT_BASE_CTL 128 |
| #define EBT_SO_SET_ENTRIES (EBT_BASE_CTL) |
| #define EBT_SO_GET_INFO (EBT_BASE_CTL) |
| #define EBT_SO_GET_ENTRIES (EBT_SO_GET_INFO + 1) |
| #define EBT_SO_GET_INIT_INFO (EBT_SO_GET_ENTRIES + 1) |
| #define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO + 1) |
| |
| struct ebt_replace { |
| char name[EBT_TABLE_MAXNAMELEN]; |
| unsigned int valid_hooks; |
| unsigned int nentries; |
| unsigned int entries_size; |
| struct ebt_entries* hook_entry[NF_BR_NUMHOOKS]; |
| unsigned int num_counters; |
| struct ebt_counter* counters; |
| char* entries; |
| }; |
| |
| struct ebt_entries { |
| unsigned int distinguisher; |
| char name[EBT_CHAIN_MAXNAMELEN]; |
| unsigned int counter_offset; |
| int policy; |
| unsigned int nentries; |
| char data[0] __attribute__((aligned(__alignof__(struct ebt_replace)))); |
| }; |
| |
| struct ebt_table_desc { |
| const char* name; |
| struct ebt_replace replace; |
| char entrytable[XT_TABLE_SIZE]; |
| }; |
| |
| static struct ebt_table_desc ebt_tables[] = { |
| {.name = "filter"}, {.name = "nat"}, {.name = "broute"}, |
| }; |
| |
| static void checkpoint_ebtables(void) |
| { |
| socklen_t optlen; |
| unsigned i; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { |
| struct ebt_table_desc* table = &ebt_tables[i]; |
| strcpy(table->replace.name, table->name); |
| optlen = sizeof(table->replace); |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_INFO, &table->replace, |
| &optlen)) { |
| switch (errno) { |
| case EPERM: |
| case ENOENT: |
| case ENOPROTOOPT: |
| continue; |
| } |
| exit(1); |
| } |
| if (table->replace.entries_size > sizeof(table->entrytable)) |
| exit(1); |
| table->replace.num_counters = 0; |
| table->replace.entries = table->entrytable; |
| optlen = sizeof(table->replace) + table->replace.entries_size; |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_ENTRIES, &table->replace, |
| &optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| static void reset_ebtables() |
| { |
| struct ebt_replace replace; |
| char entrytable[XT_TABLE_SIZE]; |
| socklen_t optlen; |
| unsigned i, j, h; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { |
| struct ebt_table_desc* table = &ebt_tables[i]; |
| if (table->replace.valid_hooks == 0) |
| continue; |
| memset(&replace, 0, sizeof(replace)); |
| strcpy(replace.name, table->name); |
| optlen = sizeof(replace); |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_INFO, &replace, &optlen)) |
| exit(1); |
| replace.num_counters = 0; |
| table->replace.entries = 0; |
| for (h = 0; h < NF_BR_NUMHOOKS; h++) |
| table->replace.hook_entry[h] = 0; |
| if (memcmp(&table->replace, &replace, sizeof(table->replace)) == 0) { |
| memset(&entrytable, 0, sizeof(entrytable)); |
| replace.entries = entrytable; |
| optlen = sizeof(replace) + replace.entries_size; |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_ENTRIES, &replace, &optlen)) |
| exit(1); |
| if (memcmp(table->entrytable, entrytable, replace.entries_size) == 0) |
| continue; |
| } |
| for (j = 0, h = 0; h < NF_BR_NUMHOOKS; h++) { |
| if (table->replace.valid_hooks & (1 << h)) { |
| table->replace.hook_entry[h] = |
| (struct ebt_entries*)table->entrytable + j; |
| j++; |
| } |
| } |
| table->replace.entries = table->entrytable; |
| optlen = sizeof(table->replace) + table->replace.entries_size; |
| if (setsockopt(fd, SOL_IP, EBT_SO_SET_ENTRIES, &table->replace, optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| static void checkpoint_net_namespace(void) |
| { |
| checkpoint_ebtables(); |
| checkpoint_arptables(); |
| checkpoint_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), |
| AF_INET, SOL_IP); |
| checkpoint_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), |
| AF_INET6, SOL_IPV6); |
| } |
| |
| static void reset_net_namespace(void) |
| { |
| reset_ebtables(); |
| reset_arptables(); |
| reset_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), |
| AF_INET, SOL_IP); |
| reset_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), |
| AF_INET6, SOL_IPV6); |
| } |
| |
| static void setup_common() |
| { |
| if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) { |
| } |
| } |
| |
| static void loop(); |
| |
| static void sandbox_common() |
| { |
| prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); |
| setpgrp(); |
| setsid(); |
| struct rlimit rlim; |
| rlim.rlim_cur = rlim.rlim_max = (200 << 20); |
| setrlimit(RLIMIT_AS, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 32 << 20; |
| setrlimit(RLIMIT_MEMLOCK, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 136 << 20; |
| setrlimit(RLIMIT_FSIZE, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 1 << 20; |
| setrlimit(RLIMIT_STACK, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 0; |
| setrlimit(RLIMIT_CORE, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 256; |
| setrlimit(RLIMIT_NOFILE, &rlim); |
| if (unshare(CLONE_NEWNS)) { |
| } |
| if (unshare(CLONE_NEWIPC)) { |
| } |
| if (unshare(0x02000000)) { |
| } |
| if (unshare(CLONE_NEWUTS)) { |
| } |
| if (unshare(CLONE_SYSVSEM)) { |
| } |
| typedef struct { |
| const char* name; |
| const char* value; |
| } sysctl_t; |
| static const sysctl_t sysctls[] = { |
| {"/proc/sys/kernel/shmmax", "16777216"}, |
| {"/proc/sys/kernel/shmall", "536870912"}, |
| {"/proc/sys/kernel/shmmni", "1024"}, |
| {"/proc/sys/kernel/msgmax", "8192"}, |
| {"/proc/sys/kernel/msgmni", "1024"}, |
| {"/proc/sys/kernel/msgmnb", "1024"}, |
| {"/proc/sys/kernel/sem", "1024 1048576 500 1024"}, |
| }; |
| unsigned i; |
| for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++) |
| write_file(sysctls[i].name, sysctls[i].value); |
| } |
| |
| int wait_for_loop(int pid) |
| { |
| if (pid < 0) |
| exit(1); |
| int status = 0; |
| while (waitpid(-1, &status, __WALL) != pid) { |
| } |
| return WEXITSTATUS(status); |
| } |
| |
| static void drop_caps(void) |
| { |
| struct __user_cap_header_struct cap_hdr = {}; |
| struct __user_cap_data_struct cap_data[2] = {}; |
| cap_hdr.version = _LINUX_CAPABILITY_VERSION_3; |
| cap_hdr.pid = getpid(); |
| if (syscall(SYS_capget, &cap_hdr, &cap_data)) |
| exit(1); |
| const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE); |
| cap_data[0].effective &= ~drop; |
| cap_data[0].permitted &= ~drop; |
| cap_data[0].inheritable &= ~drop; |
| if (syscall(SYS_capset, &cap_hdr, &cap_data)) |
| exit(1); |
| } |
| |
| static int do_sandbox_none(void) |
| { |
| if (unshare(CLONE_NEWPID)) { |
| } |
| int pid = fork(); |
| if (pid != 0) |
| return wait_for_loop(pid); |
| setup_common(); |
| sandbox_common(); |
| drop_caps(); |
| if (unshare(CLONE_NEWNET)) { |
| } |
| loop(); |
| exit(1); |
| } |
| |
| #define FS_IOC_SETFLAGS _IOW('f', 2, long) |
| static void remove_dir(const char* dir) |
| { |
| DIR* dp; |
| struct dirent* ep; |
| int iter = 0; |
| retry: |
| while (umount2(dir, MNT_DETACH) == 0) { |
| } |
| dp = opendir(dir); |
| if (dp == NULL) { |
| if (errno == EMFILE) { |
| exit(1); |
| } |
| exit(1); |
| } |
| while ((ep = readdir(dp))) { |
| if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) |
| continue; |
| char filename[FILENAME_MAX]; |
| snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); |
| while (umount2(filename, MNT_DETACH) == 0) { |
| } |
| struct stat st; |
| if (lstat(filename, &st)) |
| exit(1); |
| if (S_ISDIR(st.st_mode)) { |
| remove_dir(filename); |
| continue; |
| } |
| int i; |
| for (i = 0;; i++) { |
| if (unlink(filename) == 0) |
| break; |
| if (errno == EPERM) { |
| int fd = open(filename, O_RDONLY); |
| if (fd != -1) { |
| long flags = 0; |
| if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) |
| close(fd); |
| continue; |
| } |
| } |
| if (errno == EROFS) { |
| break; |
| } |
| if (errno != EBUSY || i > 100) |
| exit(1); |
| if (umount2(filename, MNT_DETACH)) |
| exit(1); |
| } |
| } |
| closedir(dp); |
| int i; |
| for (i = 0;; i++) { |
| if (rmdir(dir) == 0) |
| break; |
| if (i < 100) { |
| if (errno == EPERM) { |
| int fd = open(dir, O_RDONLY); |
| if (fd != -1) { |
| long flags = 0; |
| if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) |
| close(fd); |
| continue; |
| } |
| } |
| if (errno == EROFS) { |
| break; |
| } |
| if (errno == EBUSY) { |
| if (umount2(dir, MNT_DETACH)) |
| exit(1); |
| continue; |
| } |
| if (errno == ENOTEMPTY) { |
| if (iter < 100) { |
| iter++; |
| goto retry; |
| } |
| } |
| } |
| exit(1); |
| } |
| } |
| |
| static void kill_and_wait(int pid, int* status) |
| { |
| kill(-pid, SIGKILL); |
| kill(pid, SIGKILL); |
| int i; |
| for (i = 0; i < 100; i++) { |
| if (waitpid(-1, status, WNOHANG | __WALL) == pid) |
| return; |
| usleep(1000); |
| } |
| DIR* dir = opendir("/sys/fs/fuse/connections"); |
| if (dir) { |
| for (;;) { |
| struct dirent* ent = readdir(dir); |
| if (!ent) |
| break; |
| if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) |
| continue; |
| char abort[300]; |
| snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", |
| ent->d_name); |
| int fd = open(abort, O_WRONLY); |
| if (fd == -1) { |
| continue; |
| } |
| if (write(fd, abort, 1) < 0) { |
| } |
| close(fd); |
| } |
| closedir(dir); |
| } else { |
| } |
| while (waitpid(-1, status, __WALL) != pid) { |
| } |
| } |
| |
| static void setup_loop() |
| { |
| checkpoint_net_namespace(); |
| } |
| |
| static void reset_loop() |
| { |
| reset_net_namespace(); |
| } |
| |
| static void setup_test() |
| { |
| prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); |
| setpgrp(); |
| write_file("/proc/self/oom_score_adj", "1000"); |
| } |
| |
| static void close_fds() |
| { |
| int fd; |
| for (fd = 3; fd < MAX_FDS; fd++) |
| close(fd); |
| } |
| |
| static void execute_one(void); |
| |
| #define WAIT_FLAGS __WALL |
| |
| static void loop(void) |
| { |
| setup_loop(); |
| int iter; |
| for (iter = 0;; iter++) { |
| char cwdbuf[32]; |
| sprintf(cwdbuf, "./%d", iter); |
| if (mkdir(cwdbuf, 0777)) |
| exit(1); |
| reset_loop(); |
| int pid = fork(); |
| if (pid < 0) |
| exit(1); |
| if (pid == 0) { |
| if (chdir(cwdbuf)) |
| exit(1); |
| setup_test(); |
| execute_one(); |
| close_fds(); |
| exit(0); |
| } |
| int status = 0; |
| uint64_t start = current_time_ms(); |
| for (;;) { |
| if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) |
| break; |
| sleep_ms(1); |
| if (current_time_ms() - start < 5 * 1000) |
| continue; |
| kill_and_wait(pid, &status); |
| break; |
| } |
| remove_dir(cwdbuf); |
| } |
| } |
| |
| uint64_t r[1] = {0xffffffffffffffff}; |
| |
| void execute_one(void) |
| { |
| intptr_t res = 0; |
| *(uint8_t*)0x20000080 = 0x12; |
| *(uint8_t*)0x20000081 = 1; |
| *(uint16_t*)0x20000082 = 0; |
| *(uint8_t*)0x20000084 = 0x91; |
| *(uint8_t*)0x20000085 = 0x14; |
| *(uint8_t*)0x20000086 = 0x8f; |
| *(uint8_t*)0x20000087 = 0x40; |
| *(uint16_t*)0x20000088 = 0x411; |
| *(uint16_t*)0x2000008a = 0x12; |
| *(uint16_t*)0x2000008c = 0x565f; |
| *(uint8_t*)0x2000008e = 0; |
| *(uint8_t*)0x2000008f = 0; |
| *(uint8_t*)0x20000090 = 0; |
| *(uint8_t*)0x20000091 = 1; |
| *(uint8_t*)0x20000092 = 9; |
| *(uint8_t*)0x20000093 = 2; |
| *(uint16_t*)0x20000094 = 0x12; |
| *(uint8_t*)0x20000096 = 1; |
| *(uint8_t*)0x20000097 = 0; |
| *(uint8_t*)0x20000098 = 0; |
| *(uint8_t*)0x20000099 = 0; |
| *(uint8_t*)0x2000009a = 0; |
| *(uint8_t*)0x2000009b = 9; |
| *(uint8_t*)0x2000009c = 4; |
| *(uint8_t*)0x2000009d = 0xce; |
| *(uint8_t*)0x2000009e = 0; |
| *(uint8_t*)0x2000009f = 0; |
| *(uint8_t*)0x200000a0 = 0x54; |
| *(uint8_t*)0x200000a1 = 0x74; |
| *(uint8_t*)0x200000a2 = 0x24; |
| *(uint8_t*)0x200000a3 = 0; |
| res = syz_usb_connect(0, 0x24, 0x20000080, 0); |
| if (res != -1) |
| r[0] = res; |
| syz_usb_control_io(r[0], 0, 0); |
| *(uint32_t*)0x200023c0 = 0xac; |
| *(uint64_t*)0x200023c4 = 0x20000180; |
| memcpy((void*)0x20000180, "\x00\x00\x11", 3); |
| *(uint64_t*)0x200023cc = 0; |
| *(uint64_t*)0x200023d4 = 0; |
| *(uint64_t*)0x200023dc = 0; |
| *(uint64_t*)0x200023e4 = 0; |
| *(uint64_t*)0x200023ec = 0; |
| *(uint64_t*)0x200023f4 = 0; |
| *(uint64_t*)0x200023fc = 0; |
| *(uint64_t*)0x20002404 = 0; |
| *(uint64_t*)0x2000240c = 0; |
| *(uint64_t*)0x20002414 = 0; |
| *(uint64_t*)0x2000241c = 0; |
| *(uint64_t*)0x20002424 = 0; |
| *(uint64_t*)0x2000242c = 0; |
| *(uint64_t*)0x20002434 = 0; |
| *(uint64_t*)0x2000243c = 0; |
| syz_usb_control_io(r[0], 0, 0x200023c0); |
| } |
| int main(void) |
| { |
| syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); |
| for (procid = 0; procid < 6; procid++) { |
| if (fork() == 0) { |
| use_temporary_dir(); |
| do_sandbox_none(); |
| } |
| } |
| sleep(1000000); |
| return 0; |
| } |