2025/08/06 17:17:43 extracted 302591 symbol hashes for base and 302591 for patched 2025/08/06 17:17:43 adding modified_functions to focus areas: ["nvmet_execute_disc_identify" "xsk_create" "xsk_destruct_skb" "xsk_generic_xmit" "xsk_getsockopt" "xsk_notifier" "xsk_release" "xsk_setsockopt"] 2025/08/06 17:17:43 adding directly modified files to focus areas: ["include/net/xdp_sock.h" "net/xdp/xsk.c" "net/xdp/xsk_queue.h"] 2025/08/06 17:17:44 downloaded the corpus from https://storage.googleapis.com/syzkaller/corpus/ci-upstream-bpf-kasan-gce-corpus.db 2025/08/06 17:18:34 runner 3 connected 2025/08/06 17:18:34 runner 8 connected 2025/08/06 17:18:34 runner 2 connected 2025/08/06 17:18:40 executor cover filter: 0 PCs 2025/08/06 17:18:40 initializing coverage information... 2025/08/06 17:18:41 runner 1 connected 2025/08/06 17:18:41 runner 7 connected 2025/08/06 17:18:41 runner 6 connected 2025/08/06 17:18:41 runner 9 connected 2025/08/06 17:18:41 runner 0 connected 2025/08/06 17:18:41 runner 2 connected 2025/08/06 17:18:42 runner 3 connected 2025/08/06 17:18:42 runner 1 connected 2025/08/06 17:18:42 runner 0 connected 2025/08/06 17:18:43 machine check: transitively disabled the following syscalls (missing resource [creating syscalls]): bpf$BPF_LINK_CREATE : fd_pidfd [openat$pidfd openat$thread_pidfd syz_clone3 syz_pidfd_open] bpf$BPF_LINK_CREATE_XDP : fd_pidfd [openat$pidfd openat$thread_pidfd syz_clone3 syz_pidfd_open] bpf$MAP_UPDATE_ELEM : sock_udp [socket$inet_udp socket$inet_udplite] close$binfmt : fd_binfmt [openat$binfmt] close$fd_v4l2_buffer : fd_v4l2_buffer [ioctl$VIDIOC_QUERYBUF_DMABUF] close$ibv_device : fd_rdma [openat$uverbs0] ioctl$TUNSETGROUP : gid [fstat fstat$auto getegid ...] ioctl$TUNSETOWNER : uid [fstat fstat$auto geteuid ...] mount$bpf : uid [fstat fstat$auto geteuid ...] recvmsg$can_bcm : sock_can_bcm [socket$can_bcm] recvmsg$can_j1939 : sock_can_j1939 [socket$can_j1939] recvmsg$can_raw : sock_can_raw [socket$can_raw] recvmsg$hf : sock_hf [socket$hf] recvmsg$inet_nvme : nvme_sock [syz_socket_connect_nvme_tcp] recvmsg$qrtr : sock_qrtr [socket$qrtr] sendmsg$802154_dgram : sock_802154_dgram [syz_init_net_socket$802154_dgram] sendmsg$802154_raw : sock_802154_raw [syz_init_net_socket$802154_raw] sendmsg$AUDIT_ADD_RULE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_DEL_RULE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_GET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_GET_FEATURE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_LIST_RULES : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_MAKE_EQUIV : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_SET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_SET_FEATURE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_SIGNAL_INFO : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_TRIM : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_TTY_GET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_TTY_SET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_USER : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_USER_AVC : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_USER_TTY : sock_nl_audit [socket$nl_audit] sendmsg$BATADV_CMD_GET_BLA_BACKBONE : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_BLA_CLAIM : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_DAT_CACHE : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_GATEWAYS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_HARDIF : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_MCAST_FLAGS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_MESH : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_NEIGHBORS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_ORIGINATORS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_ROUTING_ALGOS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_VLAN : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_SET_HARDIF : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_SET_MESH : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_SET_VLAN : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_TP_METER : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_TP_METER_CANCEL : sock_nl_generic [socket$nl_generic] sendmsg$DCCPDIAG_GETSOCK : sock_diag [socket$nl_sock_diag] sendmsg$DEVLINK_CMD_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_SPLIT : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_UNSPLIT : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_DEL : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_NEW : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RELOAD : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_POOL_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_POOL_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_GROUP_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_GROUP_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_POLICER_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_POLICER_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_CHANNELS_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_CHANNELS_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_COALESCE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_COALESCE_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_DEBUG_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_DEBUG_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_EEE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_EEE_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_FEATURES_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_FEATURES_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKINFO_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKINFO_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKMODES_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKMODES_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKSTATE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PAUSE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PAUSE_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_RINGS_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_RINGS_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_STRSET_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_TSINFO_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_WOL_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_WOL_SET : sock_nl_generic [socket$nl_generic] sendmsg$FOU_CMD_ADD : sock_nl_generic [socket$nl_generic] sendmsg$FOU_CMD_DEL : sock_nl_generic [socket$nl_generic] sendmsg$FOU_CMD_GET : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_DELPDP : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_ECHOREQ : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_GETPDP : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_NEWPDP : sock_nl_generic [socket$nl_generic] sendmsg$IEEE802154_ADD_IFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_ASSOCIATE_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_ASSOCIATE_RESP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_DISASSOCIATE_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LIST_IFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LIST_PHY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_GETPARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_SETPARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_SCAN_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_SET_MACPARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_START_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IPCTNL_MSG_CT_DELETE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_CTRZERO : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_DYING : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_STATS : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_DELETE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_DELETE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_ADD : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_CREATE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_DEL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_DESTROY : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_FLUSH : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_GET_BYINDEX : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_GET_BYNAME : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_HEADER : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_LIST : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_PROTOCOL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_RENAME : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_SAVE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_SWAP : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_TEST : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_TYPE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPVS_CMD_DEL_DAEMON : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_DEL_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_DEL_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_FLUSH : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_DAEMON : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_INFO : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_NEW_DAEMON : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_NEW_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_NEW_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_INFO : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_ZERO : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_NOOP : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_CREATE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_DELETE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_GET : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_MODIFY : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_CREATE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_DELETE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_GET : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_MODIFY : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_ADD_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_ANNOUNCE : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_DEL_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_GET_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_GET_LIMITS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_REMOVE : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SET_FLAGS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SET_LIMITS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY : sock_nl_generic [socket$nl_generic] sendmsg$NBD_CMD_CONNECT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NBD_CMD_DISCONNECT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NBD_CMD_RECONFIGURE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NBD_CMD_STATUS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NET_DM_CMD_START : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NET_DM_CMD_STOP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_ACTIVATE_TARGET : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEACTIVATE_TARGET : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEP_LINK_DOWN : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEP_LINK_UP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEV_DOWN : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEV_UP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DISABLE_SE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_ENABLE_SE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_FW_DOWNLOAD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_GET_DEVICE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_GET_SE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_GET_TARGET : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_LLC_GET_PARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_LLC_SDREQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_LLC_SET_PARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_SE_IO : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_START_POLL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_VENDOR : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFNL_MSG_ACCT_DEL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_ACCT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_ACCT_GET_CTRZERO : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_ACCT_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_COMPAT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_CTHELPER_DEL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_CTHELPER_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_CTHELPER_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFQNL_MSG_CONFIG : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFQNL_MSG_VERDICT : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFQNL_MSG_VERDICT_BATCH : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_BATCH : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETCHAIN : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETFLOWTABLE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETGEN : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETOBJ : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETOBJ_RESET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETRULE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETSET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETSETELEM : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETTABLE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFULNL_MSG_CONFIG : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NL80211_CMD_ABORT_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_ADD_NAN_FUNCTION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_ADD_TX_TS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_ASSOCIATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_AUTHENTICATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL: sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CHANNEL_SWITCH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CONNECT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CONTROL_PORT_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CRIT_PROTOCOL_START : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEAUTHENTICATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_NAN_FUNCTION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_PMK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_PMKSA : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_TX_TS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DISASSOCIATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DISCONNECT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_EXTERNAL_AUTH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_FLUSH_PMKSA : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_COALESCE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_MESH_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_MPP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_POWER_SAVE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_REG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_SURVEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_WIPHY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_WOWLAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_JOIN_IBSS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_JOIN_MESH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_JOIN_OCB : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_LEAVE_IBSS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_LEAVE_MESH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_LEAVE_OCB : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NOTIFY_RADAR : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_PEER_MEASUREMENT_START : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_PROBE_CLIENT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_PROBE_MESH_LINK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_RADAR_DETECT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REGISTER_BEACONS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REGISTER_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_RELOAD_REGDB : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REQ_SET_REG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_BEACON : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_BSS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_CHANNEL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_COALESCE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_CQM : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MAC_ACL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MCAST_RATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MESH_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST: sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_NOACK_MAP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_PMK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_PMKSA : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_POWER_SAVE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_QOS_MAP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_REG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_TID_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WDS_PEER : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WIPHY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WIPHY_NETNS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WOWLAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_AP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_NAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_P2P_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_SCHED_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_AP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_NAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_P2P_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_SCHED_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH: sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_MGMT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_OPER : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TESTMODE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TRIGGER_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UNEXPECTED_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UPDATE_FT_IES : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UPDATE_OWE_INFO : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_VENDOR : sock_nl_generic [socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_INTERFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_WPAN_PHY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_INTERFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_CCA_MODE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_CHANNEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_LBT_MODE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_PAN_ID : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_SEC_PARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_SHORT_ADDR : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_TX_POWER : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_ADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_LIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_LISTALL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_REMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_ADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_LIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_LISTALL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_REMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_ADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_ADDDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_LISTALL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_LISTDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_PROTOCOLS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_REMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_REMOVEDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_VERSION : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_ACCEPT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_LIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICADDDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICLIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICLISTDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICREMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$OSF_MSG_ADD : sock_nl_netfilter [socket$nl_netfilter] sendmsg$OSF_MSG_REMOVE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$RDMA_NLDEV_CMD_DELLINK : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_NEWLINK : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_PORT_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_MR_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_PD_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_QP_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_SET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_STAT_DEL : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_STAT_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_STAT_SET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_SYS_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_SYS_SET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$SEG6_CMD_DUMPHMAC : sock_nl_generic [socket$nl_generic] sendmsg$SEG6_CMD_GET_TUNSRC : sock_nl_generic [socket$nl_generic] sendmsg$SEG6_CMD_SETHMAC : sock_nl_generic [socket$nl_generic] sendmsg$SEG6_CMD_SET_TUNSRC : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_ADD : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_DEL : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_FLUSH : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_GET : sock_nl_generic [socket$nl_generic] sendmsg$SOCK_DESTROY : sock_diag [socket$nl_sock_diag] sendmsg$SOCK_DIAG_BY_FAMILY : sock_diag [socket$nl_sock_diag] sendmsg$TCPDIAG_GETSOCK : sock_diag [socket$nl_sock_diag] sendmsg$TEAM_CMD_NOOP : sock_nl_generic [socket$nl_generic] sendmsg$TEAM_CMD_OPTIONS_GET : sock_nl_generic [socket$nl_generic] sendmsg$TEAM_CMD_OPTIONS_SET : sock_nl_generic [socket$nl_generic] sendmsg$TEAM_CMD_PORT_LIST_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_DISABLE_BEARER : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_ENABLE_BEARER : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_BEARER_NAMES : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_LINKS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_MAX_PORTS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_MEDIA_NAMES : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_NETID : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_NODES : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_REMOTE_MNG : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_RESET_LINK_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_LINK_PRI : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_LINK_TOL : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_LINK_WINDOW : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_NETID : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_NODE_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_LINK_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_NAME_TABLE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_PORTS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_ADD : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_DISABLE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_ENABLE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_KEY_FLUSH : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_KEY_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_LINK_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_LINK_RESET_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_LINK_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MEDIA_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MEDIA_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MON_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MON_PEER_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MON_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NAME_TABLE_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NET_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NET_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NODE_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_PEER_REMOVE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_PUBL_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_SOCK_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_UDP_GET_REMOTEIP : sock_nl_generic [socket$nl_generic] sendmsg$WG_CMD_GET_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$WG_CMD_SET_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$alg : sock_algconn [accept$alg accept4$alg] sendmsg$can_bcm : sock_can_bcm [socket$can_bcm] sendmsg$can_j1939 : sock_can_j1939 [socket$can_j1939] sendmsg$can_raw : sock_can_raw [socket$can_raw] sendmsg$hf : sock_hf [socket$hf] sendmsg$inet6 : sock_in6 [accept$inet6 accept4$inet6 socket$igmp6 ...] sendmsg$inet_sctp : sock_sctp [socket$inet_sctp] sendmsg$key : sock_key [socket$key] sendmsg$netlink : sock_netlink [socket$netlink socket$nl_audit socket$nl_crypto ...] sendmsg$nfc_llcp : sock_nfc_llcp [accept$nfc_llcp accept4$nfc_llcp syz_init_net_socket$nfc_llcp] sendmsg$nl_crypto : sock_nl_crypto [socket$nl_crypto] sendmsg$nl_generic : sock_nl_generic [socket$nl_generic] sendmsg$nl_netfilter : sock_nl_netfilter [socket$nl_netfilter] sendmsg$nl_route : sock_nl_route [socket$nl_route] sendmsg$nl_route_sched : sock_nl_route [socket$nl_route] sendmsg$nl_route_sched_retired : sock_nl_route [socket$nl_route] sendmsg$nl_xfrm : sock_nl_xfrm [socket$nl_xfrm] sendmsg$qrtr : sock_qrtr [socket$qrtr] sendmsg$rds : sock_rds [socket$rds] sendmsg$xdp : sock_xdp [socket$xdp] write$tun : tcp_seq_num [syz_extract_tcp_res syz_extract_tcp_res$synack] BinFmtMisc : enabled Comparisons : enabled Coverage : enabled DelayKcovMmap : enabled DevlinkPCI : PCI device 0000:00:10.0 is not available ExtraCoverage : enabled Fault : enabled KCSAN : write(/sys/kernel/debug/kcsan, on) failed KcovResetIoctl : kernel does not support ioctl(KCOV_RESET_TRACE) LRWPANEmulation : enabled Leak : failed to write(kmemleak, "scan=off") NetDevices : enabled NetInjection : enabled NicVF : PCI device 0000:00:11.0 is not available SandboxAndroid : setfilecon: setxattr failed. (errno 1: Operation not permitted). . process exited with status 67. SandboxNamespace : enabled SandboxNone : enabled SandboxSetuid : enabled Swap : enabled USBEmulation : enabled VhciInjection : enabled WifiEmulation : enabled syscalls : 139/8048 2025/08/06 17:18:43 base: machine check complete 2025/08/06 17:18:45 discovered 7667 source files, 337376 symbols 2025/08/06 17:18:45 coverage filter: nvmet_execute_disc_identify: [nvmet_execute_disc_identify] 2025/08/06 17:18:45 coverage filter: xsk_create: [xsk_create] 2025/08/06 17:18:45 coverage filter: xsk_destruct_skb: [xsk_destruct_skb] 2025/08/06 17:18:45 coverage filter: xsk_generic_xmit: [xsk_generic_xmit] 2025/08/06 17:18:45 coverage filter: xsk_getsockopt: [xsk_getsockopt] 2025/08/06 17:18:45 coverage filter: xsk_notifier: [xsk_notifier] 2025/08/06 17:18:45 coverage filter: xsk_release: [xsk_release] 2025/08/06 17:18:45 coverage filter: xsk_setsockopt: [xsk_setsockopt] 2025/08/06 17:18:45 coverage filter: include/net/xdp_sock.h: [] 2025/08/06 17:18:45 coverage filter: net/xdp/xsk.c: [net/xdp/xsk.c] 2025/08/06 17:18:45 coverage filter: net/xdp/xsk_queue.h: [] 2025/08/06 17:18:45 area "symbols": 350 PCs in the cover filter 2025/08/06 17:18:45 area "files": 949 PCs in the cover filter 2025/08/06 17:18:45 area "": 0 PCs in the cover filter 2025/08/06 17:18:45 executor cover filter: 0 PCs 2025/08/06 17:18:48 machine check: transitively disabled the following syscalls (missing resource [creating syscalls]): bpf$BPF_LINK_CREATE : fd_pidfd [openat$pidfd openat$thread_pidfd syz_clone3 syz_pidfd_open] bpf$BPF_LINK_CREATE_XDP : fd_pidfd [openat$pidfd openat$thread_pidfd syz_clone3 syz_pidfd_open] bpf$MAP_UPDATE_ELEM : sock_udp [socket$inet_udp socket$inet_udplite] close$binfmt : fd_binfmt [openat$binfmt] close$fd_v4l2_buffer : fd_v4l2_buffer [ioctl$VIDIOC_QUERYBUF_DMABUF] close$ibv_device : fd_rdma [openat$uverbs0] ioctl$TUNSETGROUP : gid [fstat fstat$auto getegid ...] ioctl$TUNSETOWNER : uid [fstat fstat$auto geteuid ...] mount$bpf : uid [fstat fstat$auto geteuid ...] recvmsg$can_bcm : sock_can_bcm [socket$can_bcm] recvmsg$can_j1939 : sock_can_j1939 [socket$can_j1939] recvmsg$can_raw : sock_can_raw [socket$can_raw] recvmsg$hf : sock_hf [socket$hf] recvmsg$inet_nvme : nvme_sock [syz_socket_connect_nvme_tcp] recvmsg$qrtr : sock_qrtr [socket$qrtr] sendmsg$802154_dgram : sock_802154_dgram [syz_init_net_socket$802154_dgram] sendmsg$802154_raw : sock_802154_raw [syz_init_net_socket$802154_raw] sendmsg$AUDIT_ADD_RULE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_DEL_RULE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_GET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_GET_FEATURE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_LIST_RULES : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_MAKE_EQUIV : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_SET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_SET_FEATURE : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_SIGNAL_INFO : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_TRIM : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_TTY_GET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_TTY_SET : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_USER : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_USER_AVC : sock_nl_audit [socket$nl_audit] sendmsg$AUDIT_USER_TTY : sock_nl_audit [socket$nl_audit] sendmsg$BATADV_CMD_GET_BLA_BACKBONE : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_BLA_CLAIM : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_DAT_CACHE : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_GATEWAYS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_HARDIF : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_MCAST_FLAGS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_MESH : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_NEIGHBORS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_ORIGINATORS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_ROUTING_ALGOS : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_GET_VLAN : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_SET_HARDIF : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_SET_MESH : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_SET_VLAN : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_TP_METER : sock_nl_generic [socket$nl_generic] sendmsg$BATADV_CMD_TP_METER_CANCEL : sock_nl_generic [socket$nl_generic] sendmsg$DCCPDIAG_GETSOCK : sock_diag [socket$nl_sock_diag] sendmsg$DEVLINK_CMD_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_SPLIT : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_PORT_UNSPLIT : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_DEL : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_NEW : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RATE_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_RELOAD : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_POOL_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_POOL_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_GROUP_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_GROUP_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_POLICER_GET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_POLICER_SET : sock_nl_generic [socket$nl_generic] sendmsg$DEVLINK_CMD_TRAP_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_CHANNELS_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_CHANNELS_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_COALESCE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_COALESCE_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_DEBUG_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_DEBUG_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_EEE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_EEE_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_FEATURES_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_FEATURES_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKINFO_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKINFO_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKMODES_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKMODES_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_LINKSTATE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PAUSE_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PAUSE_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_RINGS_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_RINGS_SET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_STRSET_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_TSINFO_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_WOL_GET : sock_nl_generic [socket$nl_generic] sendmsg$ETHTOOL_MSG_WOL_SET : sock_nl_generic [socket$nl_generic] sendmsg$FOU_CMD_ADD : sock_nl_generic [socket$nl_generic] sendmsg$FOU_CMD_DEL : sock_nl_generic [socket$nl_generic] sendmsg$FOU_CMD_GET : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_DELPDP : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_ECHOREQ : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_GETPDP : sock_nl_generic [socket$nl_generic] sendmsg$GTP_CMD_NEWPDP : sock_nl_generic [socket$nl_generic] sendmsg$IEEE802154_ADD_IFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_ASSOCIATE_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_ASSOCIATE_RESP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_DISASSOCIATE_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LIST_IFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LIST_PHY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_GETPARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_LLSEC_SETPARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_SCAN_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_SET_MACPARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IEEE802154_START_REQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$IPCTNL_MSG_CT_DELETE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_CTRZERO : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_DYING : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_STATS : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_CT_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_DELETE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_EXP_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_DELETE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPCTNL_MSG_TIMEOUT_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_ADD : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_CREATE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_DEL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_DESTROY : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_FLUSH : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_GET_BYINDEX : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_GET_BYNAME : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_HEADER : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_LIST : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_PROTOCOL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_RENAME : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_SAVE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_SWAP : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_TEST : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPSET_CMD_TYPE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$IPVS_CMD_DEL_DAEMON : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_DEL_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_DEL_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_FLUSH : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_DAEMON : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_INFO : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_GET_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_NEW_DAEMON : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_NEW_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_NEW_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_DEST : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_INFO : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_SET_SERVICE : sock_nl_generic [socket$nl_generic] sendmsg$IPVS_CMD_ZERO : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_NOOP : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_CREATE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_DELETE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_GET : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_SESSION_MODIFY : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_CREATE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_DELETE : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_GET : sock_nl_generic [socket$nl_generic] sendmsg$L2TP_CMD_TUNNEL_MODIFY : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_ADD_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_ANNOUNCE : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_DEL_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_GET_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_GET_LIMITS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_REMOVE : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SET_FLAGS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SET_LIMITS : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE : sock_nl_generic [socket$nl_generic] sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY : sock_nl_generic [socket$nl_generic] sendmsg$NBD_CMD_CONNECT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NBD_CMD_DISCONNECT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NBD_CMD_RECONFIGURE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NBD_CMD_STATUS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NET_DM_CMD_START : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NET_DM_CMD_STOP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_ACTIVATE_TARGET : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEACTIVATE_TARGET : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEP_LINK_DOWN : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEP_LINK_UP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEV_DOWN : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DEV_UP : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_DISABLE_SE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_ENABLE_SE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_FW_DOWNLOAD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_GET_DEVICE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_GET_SE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_GET_TARGET : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_LLC_GET_PARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_LLC_SDREQ : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_LLC_SET_PARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_SE_IO : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_START_POLL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFC_CMD_VENDOR : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NFNL_MSG_ACCT_DEL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_ACCT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_ACCT_GET_CTRZERO : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_ACCT_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_COMPAT_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_CTHELPER_DEL : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_CTHELPER_GET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFNL_MSG_CTHELPER_NEW : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFQNL_MSG_CONFIG : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFQNL_MSG_VERDICT : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFQNL_MSG_VERDICT_BATCH : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_BATCH : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETCHAIN : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETFLOWTABLE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETGEN : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETOBJ : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETOBJ_RESET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETRULE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETSET : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETSETELEM : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFT_MSG_GETTABLE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NFULNL_MSG_CONFIG : sock_nl_netfilter [socket$nl_netfilter] sendmsg$NL80211_CMD_ABORT_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_ADD_NAN_FUNCTION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_ADD_TX_TS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_ASSOCIATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_AUTHENTICATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL: sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CHANNEL_SWITCH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CONNECT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CONTROL_PORT_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CRIT_PROTOCOL_START : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEAUTHENTICATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_NAN_FUNCTION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_PMK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_PMKSA : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DEL_TX_TS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DISASSOCIATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_DISCONNECT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_EXTERNAL_AUTH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_FLUSH_PMKSA : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_COALESCE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_MESH_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_MPP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_POWER_SAVE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_REG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_SURVEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_WIPHY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_GET_WOWLAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_JOIN_IBSS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_JOIN_MESH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_JOIN_OCB : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_LEAVE_IBSS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_LEAVE_MESH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_LEAVE_OCB : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NEW_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_NOTIFY_RADAR : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_PEER_MEASUREMENT_START : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_PROBE_CLIENT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_PROBE_MESH_LINK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_RADAR_DETECT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REGISTER_BEACONS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REGISTER_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_RELOAD_REGDB : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_REQ_SET_REG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_BEACON : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_BSS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_CHANNEL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_COALESCE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_CQM : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_INTERFACE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_KEY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MAC_ACL : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MCAST_RATE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MESH_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MPATH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST: sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_NOACK_MAP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_PMK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_PMKSA : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_POWER_SAVE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_QOS_MAP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_REG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_STATION : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_TID_CONFIG : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WDS_PEER : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WIPHY : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WIPHY_NETNS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_SET_WOWLAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_AP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_NAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_P2P_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_START_SCHED_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_AP : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_NAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_P2P_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_STOP_SCHED_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH: sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_MGMT : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TDLS_OPER : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TESTMODE : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_TRIGGER_SCAN : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UNEXPECTED_FRAME : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UPDATE_FT_IES : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_UPDATE_OWE_INFO : sock_nl_generic [socket$nl_generic] sendmsg$NL80211_CMD_VENDOR : sock_nl_generic [socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_DEL_SEC_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_INTERFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_SEC_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_GET_WPAN_PHY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_INTERFACE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_DEV : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_DEVKEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_KEY : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_NEW_SEC_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_CCA_MODE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_CHANNEL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_LBT_MODE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_PAN_ID : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_SEC_PARAMS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_SHORT_ADDR : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_TX_POWER : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_ADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_LIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_LISTALL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CALIPSO_C_REMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_ADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_LIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_LISTALL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_CIPSOV4_C_REMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_ADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_ADDDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_LISTALL : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_LISTDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_PROTOCOLS : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_REMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_REMOVEDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_MGMT_C_VERSION : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_ACCEPT : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_LIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICADD : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICADDDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICLIST : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICLISTDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICREMOVE : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF : sock_nl_generic_init [syz_init_net_socket$nl_generic] sendmsg$OSF_MSG_ADD : sock_nl_netfilter [socket$nl_netfilter] sendmsg$OSF_MSG_REMOVE : sock_nl_netfilter [socket$nl_netfilter] sendmsg$RDMA_NLDEV_CMD_DELLINK : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_NEWLINK : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_PORT_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_MR_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_PD_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_RES_QP_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_SET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_STAT_DEL : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_STAT_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_STAT_SET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_SYS_GET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$RDMA_NLDEV_CMD_SYS_SET : sock_nl_rdma [socket$nl_rdma syz_init_net_socket$nl_rdma] sendmsg$SEG6_CMD_DUMPHMAC : sock_nl_generic [socket$nl_generic] sendmsg$SEG6_CMD_GET_TUNSRC : sock_nl_generic [socket$nl_generic] sendmsg$SEG6_CMD_SETHMAC : sock_nl_generic [socket$nl_generic] sendmsg$SEG6_CMD_SET_TUNSRC : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_ADD : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_DEL : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_FLUSH : sock_nl_generic [socket$nl_generic] sendmsg$SMC_PNETID_GET : sock_nl_generic [socket$nl_generic] sendmsg$SOCK_DESTROY : sock_diag [socket$nl_sock_diag] sendmsg$SOCK_DIAG_BY_FAMILY : sock_diag [socket$nl_sock_diag] sendmsg$TCPDIAG_GETSOCK : sock_diag [socket$nl_sock_diag] sendmsg$TEAM_CMD_NOOP : sock_nl_generic [socket$nl_generic] sendmsg$TEAM_CMD_OPTIONS_GET : sock_nl_generic [socket$nl_generic] sendmsg$TEAM_CMD_OPTIONS_SET : sock_nl_generic [socket$nl_generic] sendmsg$TEAM_CMD_PORT_LIST_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_DISABLE_BEARER : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_ENABLE_BEARER : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_BEARER_NAMES : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_LINKS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_MAX_PORTS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_MEDIA_NAMES : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_NETID : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_NODES : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_GET_REMOTE_MNG : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_RESET_LINK_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_LINK_PRI : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_LINK_TOL : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_LINK_WINDOW : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_NETID : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SET_NODE_ADDR : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_LINK_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_NAME_TABLE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_PORTS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_CMD_SHOW_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_ADD : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_DISABLE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_ENABLE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_BEARER_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_KEY_FLUSH : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_KEY_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_LINK_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_LINK_RESET_STATS : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_LINK_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MEDIA_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MEDIA_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MON_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MON_PEER_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_MON_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NAME_TABLE_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NET_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NET_SET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_NODE_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_PEER_REMOVE : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_PUBL_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_SOCK_GET : sock_nl_generic [socket$nl_generic] sendmsg$TIPC_NL_UDP_GET_REMOTEIP : sock_nl_generic [socket$nl_generic] sendmsg$WG_CMD_GET_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$WG_CMD_SET_DEVICE : sock_nl_generic [socket$nl_generic] sendmsg$alg : sock_algconn [accept$alg accept4$alg] sendmsg$can_bcm : sock_can_bcm [socket$can_bcm] sendmsg$can_j1939 : sock_can_j1939 [socket$can_j1939] sendmsg$can_raw : sock_can_raw [socket$can_raw] sendmsg$hf : sock_hf [socket$hf] sendmsg$inet6 : sock_in6 [accept$inet6 accept4$inet6 socket$igmp6 ...] sendmsg$inet_sctp : sock_sctp [socket$inet_sctp] sendmsg$key : sock_key [socket$key] sendmsg$netlink : sock_netlink [socket$netlink socket$nl_audit socket$nl_crypto ...] sendmsg$nfc_llcp : sock_nfc_llcp [accept$nfc_llcp accept4$nfc_llcp syz_init_net_socket$nfc_llcp] sendmsg$nl_crypto : sock_nl_crypto [socket$nl_crypto] sendmsg$nl_generic : sock_nl_generic [socket$nl_generic] sendmsg$nl_netfilter : sock_nl_netfilter [socket$nl_netfilter] sendmsg$nl_route : sock_nl_route [socket$nl_route] sendmsg$nl_route_sched : sock_nl_route [socket$nl_route] sendmsg$nl_route_sched_retired : sock_nl_route [socket$nl_route] sendmsg$nl_xfrm : sock_nl_xfrm [socket$nl_xfrm] sendmsg$qrtr : sock_qrtr [socket$qrtr] sendmsg$rds : sock_rds [socket$rds] sendmsg$xdp : sock_xdp [socket$xdp] write$tun : tcp_seq_num [syz_extract_tcp_res syz_extract_tcp_res$synack] BinFmtMisc : enabled Comparisons : enabled Coverage : enabled DelayKcovMmap : enabled DevlinkPCI : PCI device 0000:00:10.0 is not available ExtraCoverage : enabled Fault : enabled KCSAN : write(/sys/kernel/debug/kcsan, on) failed KcovResetIoctl : kernel does not support ioctl(KCOV_RESET_TRACE) LRWPANEmulation : enabled Leak : failed to write(kmemleak, "scan=off") NetDevices : enabled NetInjection : enabled NicVF : PCI device 0000:00:11.0 is not available SandboxAndroid : setfilecon: setxattr failed. (errno 1: Operation not permitted). . process exited with status 67. SandboxNamespace : enabled SandboxNone : enabled SandboxSetuid : enabled Swap : enabled USBEmulation : enabled VhciInjection : enabled WifiEmulation : enabled syscalls : 139/8048 2025/08/06 17:18:48 new: machine check complete 2025/08/06 17:18:48 new: adding 22555 seeds 2025/08/06 17:19:06 patched crashed: WARNING in __perf_event_overflow [need repro = true] 2025/08/06 17:19:06 scheduled a reproduction of 'WARNING in __perf_event_overflow' 2025/08/06 17:20:02 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:20:02 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:20:03 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:20:03 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:20:06 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:20:06 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:20:12 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:20:12 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:20:14 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:20:14 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:20:17 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:20:17 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:20:50 runner 2 connected 2025/08/06 17:20:55 runner 9 connected 2025/08/06 17:21:00 runner 0 connected 2025/08/06 17:21:02 runner 3 connected 2025/08/06 17:21:04 runner 7 connected 2025/08/06 17:21:05 runner 1 connected 2025/08/06 17:21:36 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 17:22:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:22:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:22:19 base crash: lost connection to test machine 2025/08/06 17:22:19 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:22:19 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:22:27 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:22:27 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:22:30 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:22:30 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:22:32 runner 3 connected 2025/08/06 17:22:37 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:22:37 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:22:45 STAT { "buffer too small": 0, "candidate triage jobs": 180, "candidates": 19743, "comps overflows": 0, "corpus": 2620, "corpus [files]": 151, "corpus [symbols]": 151, "cover overflows": 509, "coverage": 54946, "distributor delayed": 5661, "distributor undelayed": 5512, "distributor violated": 523, "exec candidate": 2812, "exec collide": 0, "exec fuzz": 0, "exec gen": 0, "exec hints": 0, "exec inject": 0, "exec minimize": 0, "exec retries": 0, "exec seeds": 0, "exec smash": 0, "exec total [base]": 11732, "exec total [new]": 11997, "exec triage": 8423, "executor restarts": 66, "fault jobs": 0, "fuzzer jobs": 180, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 2, "hints jobs": 0, "max signal": 56128, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 0, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 2812, "no exec duration": 78487000000, "no exec requests": 209, "pending": 12, "prog exec time": 185, "reproducing": 0, "rpc recv": 839059784, "rpc sent": 37916040, "signal": 54308, "smash jobs": 0, "triage jobs": 0, "vm output": 557097, "vm restarts [base]": 4, "vm restarts [new]": 15 } 2025/08/06 17:23:02 patched crashed: INFO: rcu detected stall in perf_event_open [need repro = false] 2025/08/06 17:23:05 runner 8 connected 2025/08/06 17:23:06 runner 1 connected 2025/08/06 17:23:09 runner 7 connected 2025/08/06 17:23:14 runner 0 connected 2025/08/06 17:23:26 runner 9 connected 2025/08/06 17:23:50 runner 2 connected 2025/08/06 17:24:17 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:24:17 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:24:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:24:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:24:27 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:24:27 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:24:28 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:24:28 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:24:31 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:24:31 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:24:47 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:24:47 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:25:05 runner 2 connected 2025/08/06 17:25:07 runner 7 connected 2025/08/06 17:25:15 runner 8 connected 2025/08/06 17:25:17 runner 3 connected 2025/08/06 17:25:20 runner 9 connected 2025/08/06 17:25:28 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:25:28 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:25:36 runner 0 connected 2025/08/06 17:25:36 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:25:36 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:25:38 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:25:38 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:25:47 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:25:47 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:25:50 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:25:50 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:25:59 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:25:59 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:26:17 runner 2 connected 2025/08/06 17:26:24 runner 7 connected 2025/08/06 17:26:27 runner 8 connected 2025/08/06 17:26:35 runner 9 connected 2025/08/06 17:26:38 runner 3 connected 2025/08/06 17:26:41 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:26:41 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:26:48 runner 0 connected 2025/08/06 17:27:29 runner 2 connected 2025/08/06 17:27:45 STAT { "buffer too small": 0, "candidate triage jobs": 32, "candidates": 17518, "comps overflows": 0, "corpus": 4975, "corpus [files]": 273, "corpus [symbols]": 272, "cover overflows": 972, "coverage": 62339, "distributor delayed": 10484, "distributor undelayed": 10483, "distributor violated": 680, "exec candidate": 5037, "exec collide": 0, "exec fuzz": 0, "exec gen": 0, "exec hints": 0, "exec inject": 0, "exec minimize": 0, "exec retries": 7, "exec seeds": 0, "exec smash": 0, "exec total [base]": 22628, "exec total [new]": 23193, "exec triage": 15492, "executor restarts": 128, "fault jobs": 0, "fuzzer jobs": 32, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 6, "hints jobs": 0, "max signal": 62967, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 0, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 5037, "no exec duration": 461627000000, "no exec requests": 1426, "pending": 25, "prog exec time": 237, "reproducing": 0, "rpc recv": 1614753660, "rpc sent": 74339840, "signal": 61654, "smash jobs": 0, "triage jobs": 0, "vm output": 1135824, "vm restarts [base]": 5, "vm restarts [new]": 33 } 2025/08/06 17:27:51 new: boot error: can't ssh into the instance 2025/08/06 17:27:51 new: boot error: can't ssh into the instance 2025/08/06 17:28:22 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:28:22 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:28:33 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:28:33 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:28:40 runner 4 connected 2025/08/06 17:28:40 runner 5 connected 2025/08/06 17:29:10 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:29:10 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:29:11 runner 8 connected 2025/08/06 17:29:12 new: boot error: can't ssh into the instance 2025/08/06 17:29:20 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:29:20 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:29:21 runner 9 connected 2025/08/06 17:29:30 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:29:30 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:29:42 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:29:42 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:29:52 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:29:52 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:29:57 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:29:57 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:29:58 runner 2 connected 2025/08/06 17:30:01 runner 6 connected 2025/08/06 17:30:08 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:30:08 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:30:20 runner 0 connected 2025/08/06 17:30:22 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:30:22 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:30:31 runner 5 connected 2025/08/06 17:30:33 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:30:33 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:30:41 runner 9 connected 2025/08/06 17:30:43 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:30:43 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:30:46 runner 8 connected 2025/08/06 17:30:49 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:30:49 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:30:54 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:30:54 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:30:58 runner 3 connected 2025/08/06 17:31:02 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:31:02 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:31:06 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:31:06 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:31:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:31:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:31:21 runner 6 connected 2025/08/06 17:31:24 runner 2 connected 2025/08/06 17:31:37 runner 0 connected 2025/08/06 17:31:42 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:31:42 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:31:43 runner 5 connected 2025/08/06 17:31:50 runner 9 connected 2025/08/06 17:31:53 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:31:53 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:31:55 runner 8 connected 2025/08/06 17:32:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:32:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:32:06 runner 3 connected 2025/08/06 17:32:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:32:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:32:31 runner 6 connected 2025/08/06 17:32:36 new: boot error: can't ssh into the instance 2025/08/06 17:32:38 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:32:38 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:32:41 runner 2 connected 2025/08/06 17:32:45 STAT { "buffer too small": 0, "candidate triage jobs": 164, "candidates": 15213, "comps overflows": 0, "corpus": 7106, "corpus [files]": 360, "corpus [symbols]": 358, "cover overflows": 1494, "coverage": 67017, "distributor delayed": 14902, "distributor undelayed": 14803, "distributor violated": 726, "exec candidate": 7342, "exec collide": 0, "exec fuzz": 0, "exec gen": 0, "exec hints": 0, "exec inject": 0, "exec minimize": 0, "exec retries": 18, "exec seeds": 0, "exec smash": 0, "exec total [base]": 36365, "exec total [new]": 36338, "exec triage": 22410, "executor restarts": 198, "fault jobs": 0, "fuzzer jobs": 164, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 1, "hints jobs": 0, "max signal": 67957, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 0, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 7342, "no exec duration": 861733000000, "no exec requests": 2622, "pending": 47, "prog exec time": 99, "reproducing": 0, "rpc recv": 2380490196, "rpc sent": 117666128, "signal": 66117, "smash jobs": 0, "triage jobs": 0, "vm output": 1814625, "vm restarts [base]": 5, "vm restarts [new]": 53 } 2025/08/06 17:32:47 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:32:47 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:32:50 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:32:50 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:32:53 runner 0 connected 2025/08/06 17:32:59 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:32:59 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:33:02 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:33:02 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:33:03 runner 5 connected 2025/08/06 17:33:22 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:33:22 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:33:24 runner 1 connected 2025/08/06 17:33:27 runner 3 connected 2025/08/06 17:33:29 runner 9 connected 2025/08/06 17:33:32 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:33:32 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:33:39 runner 8 connected 2025/08/06 17:33:49 runner 6 connected 2025/08/06 17:34:03 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:34:03 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:34:09 runner 0 connected 2025/08/06 17:34:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:34:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:34:21 runner 5 connected 2025/08/06 17:34:25 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:34:25 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:34:36 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:34:36 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:34:44 runner 1 connected 2025/08/06 17:34:46 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:34:46 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:35:04 runner 3 connected 2025/08/06 17:35:13 runner 6 connected 2025/08/06 17:35:24 runner 8 connected 2025/08/06 17:35:27 runner 0 connected 2025/08/06 17:35:33 patched crashed: WARNING in corrupted [need repro = true] 2025/08/06 17:35:33 scheduled a reproduction of 'WARNING in corrupted' 2025/08/06 17:35:43 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:35:43 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:36:21 runner 9 connected 2025/08/06 17:36:31 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:36:31 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:36:32 runner 6 connected 2025/08/06 17:36:41 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:36:41 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:37:03 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:37:03 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:37:03 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:37:03 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:37:12 runner 5 connected 2025/08/06 17:37:13 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:37:13 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:37:14 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:37:14 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:37:23 runner 9 connected 2025/08/06 17:37:23 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:37:23 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:37:45 runner 6 connected 2025/08/06 17:37:45 STAT { "buffer too small": 0, "candidate triage jobs": 19, "candidates": 13064, "comps overflows": 0, "corpus": 9359, "corpus [files]": 449, "corpus [symbols]": 447, "cover overflows": 2205, "coverage": 70608, "distributor delayed": 19350, "distributor undelayed": 19331, "distributor violated": 859, "exec candidate": 9491, "exec collide": 0, "exec fuzz": 0, "exec gen": 0, "exec hints": 0, "exec inject": 0, "exec minimize": 0, "exec retries": 28, "exec seeds": 0, "exec smash": 0, "exec total [base]": 53141, "exec total [new]": 53244, "exec triage": 29157, "executor restarts": 267, "fault jobs": 0, "fuzzer jobs": 19, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 2, "hints jobs": 0, "max signal": 71355, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 0, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9491, "no exec duration": 1571540000000, "no exec requests": 5678, "pending": 67, "prog exec time": 202, "reproducing": 0, "rpc recv": 3134217664, "rpc sent": 166901920, "signal": 69660, "smash jobs": 0, "triage jobs": 0, "vm output": 2578729, "vm restarts [base]": 5, "vm restarts [new]": 72 } 2025/08/06 17:37:52 runner 1 connected 2025/08/06 17:37:54 runner 8 connected 2025/08/06 17:37:55 runner 3 connected 2025/08/06 17:37:57 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:37:57 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:37:57 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:37:57 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:38:05 runner 0 connected 2025/08/06 17:38:14 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 17:38:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:38:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:38:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:38:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:38:25 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:38:25 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:38:28 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:38:28 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:38:38 runner 5 connected 2025/08/06 17:38:38 runner 9 connected 2025/08/06 17:38:56 runner 3 connected 2025/08/06 17:38:57 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:38:57 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:39:06 runner 0 connected 2025/08/06 17:39:10 runner 8 connected 2025/08/06 17:39:25 new: boot error: can't ssh into the instance 2025/08/06 17:39:45 runner 5 connected 2025/08/06 17:39:48 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:39:48 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:40:13 runner 4 connected 2025/08/06 17:40:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:40:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:40:23 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:40:23 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:40:23 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:40:23 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:40:27 new: boot error: can't ssh into the instance 2025/08/06 17:40:29 runner 8 connected 2025/08/06 17:40:34 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:40:34 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:40:44 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:40:44 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:40:53 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:40:53 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:40:59 runner 5 connected 2025/08/06 17:41:04 runner 3 connected 2025/08/06 17:41:09 runner 7 connected 2025/08/06 17:41:15 runner 9 connected 2025/08/06 17:41:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:41:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:41:23 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:41:23 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:41:26 runner 4 connected 2025/08/06 17:41:34 runner 8 connected 2025/08/06 17:41:45 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:41:45 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:42:07 runner 5 connected 2025/08/06 17:42:11 runner 3 connected 2025/08/06 17:42:30 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:42:30 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:42:32 runner 7 connected 2025/08/06 17:42:35 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:42:35 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:42:45 STAT { "buffer too small": 0, "candidate triage jobs": 7, "candidates": 12948, "comps overflows": 0, "corpus": 9452, "corpus [files]": 460, "corpus [symbols]": 458, "cover overflows": 2705, "coverage": 70762, "distributor delayed": 19607, "distributor undelayed": 19601, "distributor violated": 876, "exec candidate": 9607, "exec collide": 0, "exec fuzz": 0, "exec gen": 0, "exec hints": 0, "exec inject": 0, "exec minimize": 0, "exec retries": 33, "exec seeds": 0, "exec smash": 0, "exec total [base]": 61835, "exec total [new]": 61977, "exec triage": 29605, "executor restarts": 333, "fault jobs": 0, "fuzzer jobs": 7, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 4, "hints jobs": 0, "max signal": 71873, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 0, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9606, "no exec duration": 2409083000000, "no exec requests": 8907, "pending": 86, "prog exec time": 155, "reproducing": 0, "rpc recv": 3833873412, "rpc sent": 202114960, "signal": 69844, "smash jobs": 0, "triage jobs": 0, "vm output": 3180694, "vm restarts [base]": 5, "vm restarts [new]": 93 } 2025/08/06 17:43:00 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:43:00 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:43:08 new: boot error: can't ssh into the instance 2025/08/06 17:43:18 runner 9 connected 2025/08/06 17:43:23 runner 5 connected 2025/08/06 17:43:42 runner 7 connected 2025/08/06 17:43:49 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:43:49 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:43:56 runner 2 connected 2025/08/06 17:44:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:44:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:44:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:44:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:44:05 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:44:05 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:44:06 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:44:06 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:44:17 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:44:17 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:44:17 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:44:17 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:44:30 runner 5 connected 2025/08/06 17:44:45 runner 8 connected 2025/08/06 17:44:46 runner 9 connected 2025/08/06 17:44:46 runner 3 connected 2025/08/06 17:44:54 runner 4 connected 2025/08/06 17:44:58 runner 7 connected 2025/08/06 17:45:00 runner 2 connected 2025/08/06 17:45:08 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:45:08 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:45:08 patched crashed: WARNING in corrupted [need repro = true] 2025/08/06 17:45:08 scheduled a reproduction of 'WARNING in corrupted' 2025/08/06 17:45:17 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:45:17 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:45:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:45:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:45:22 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:45:22 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:45:29 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:45:29 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:45:32 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:45:32 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:45:56 runner 5 connected 2025/08/06 17:45:57 runner 9 connected 2025/08/06 17:45:59 runner 3 connected 2025/08/06 17:46:05 runner 8 connected 2025/08/06 17:46:10 runner 2 connected 2025/08/06 17:46:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:46:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:46:17 runner 7 connected 2025/08/06 17:46:22 runner 4 connected 2025/08/06 17:46:48 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:46:48 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:03 runner 5 connected 2025/08/06 17:47:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:47:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:47:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:11 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:47:11 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:12 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:47:12 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:47:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:23 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:47:23 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:29 runner 7 connected 2025/08/06 17:47:45 STAT { "buffer too small": 0, "candidate triage jobs": 2, "candidates": 12790, "comps overflows": 0, "corpus": 9489, "corpus [files]": 467, "corpus [symbols]": 465, "cover overflows": 3241, "coverage": 70835, "distributor delayed": 19763, "distributor undelayed": 19763, "distributor violated": 890, "exec candidate": 9765, "exec collide": 0, "exec fuzz": 0, "exec gen": 0, "exec hints": 0, "exec inject": 0, "exec minimize": 0, "exec retries": 34, "exec seeds": 0, "exec smash": 0, "exec total [base]": 71562, "exec total [new]": 71744, "exec triage": 29898, "executor restarts": 392, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 0, "hints jobs": 0, "max signal": 72021, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 0, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9676, "no exec duration": 2737277000000, "no exec requests": 10358, "pending": 109, "prog exec time": 0, "reproducing": 0, "rpc recv": 4468597692, "rpc sent": 238399824, "signal": 69911, "smash jobs": 0, "triage jobs": 0, "vm output": 3713077, "vm restarts [base]": 5, "vm restarts [new]": 113 } 2025/08/06 17:47:45 runner 4 connected 2025/08/06 17:47:46 runner 2 connected 2025/08/06 17:47:50 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:47:50 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:47:52 runner 3 connected 2025/08/06 17:47:54 runner 9 connected 2025/08/06 17:48:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:48:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:48:20 new: boot error: can't ssh into the instance 2025/08/06 17:48:23 new: boot error: can't ssh into the instance 2025/08/06 17:48:23 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:48:23 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:48:24 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:48:24 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:48:31 runner 7 connected 2025/08/06 17:48:35 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:48:35 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:48:47 runner 4 connected 2025/08/06 17:48:50 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:48:50 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:49:05 runner 2 connected 2025/08/06 17:49:05 runner 9 connected 2025/08/06 17:49:06 runner 1 connected 2025/08/06 17:49:22 runner 3 connected 2025/08/06 17:49:31 runner 7 connected 2025/08/06 17:49:47 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:49:47 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:49:57 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:49:57 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:50:07 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:50:07 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:50:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:50:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:50:28 new: boot error: can't ssh into the instance 2025/08/06 17:50:38 runner 1 connected 2025/08/06 17:50:49 runner 7 connected 2025/08/06 17:51:10 runner 0 connected 2025/08/06 17:51:18 patched crashed: WARNING in corrupted [need repro = true] 2025/08/06 17:51:18 scheduled a reproduction of 'WARNING in corrupted' 2025/08/06 17:52:06 runner 2 connected 2025/08/06 17:52:45 STAT { "buffer too small": 0, "candidate triage jobs": 2, "candidates": 5543, "comps overflows": 0, "corpus": 9518, "corpus [files]": 469, "corpus [symbols]": 467, "cover overflows": 4076, "coverage": 70918, "distributor delayed": 19902, "distributor undelayed": 19902, "distributor violated": 900, "exec candidate": 17012, "exec collide": 0, "exec fuzz": 0, "exec gen": 0, "exec hints": 0, "exec inject": 0, "exec minimize": 0, "exec retries": 41, "exec seeds": 0, "exec smash": 0, "exec total [base]": 85414, "exec total [new]": 86206, "exec triage": 30226, "executor restarts": 446, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 5, "hints jobs": 0, "max signal": 72298, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 0, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9754, "no exec duration": 3265180000000, "no exec requests": 12612, "pending": 120, "prog exec time": 140, "reproducing": 0, "rpc recv": 4953288388, "rpc sent": 282808120, "signal": 69990, "smash jobs": 0, "triage jobs": 0, "vm output": 4312786, "vm restarts [base]": 5, "vm restarts [new]": 128 } 2025/08/06 17:53:45 triaged 97.4% of the corpus 2025/08/06 17:53:45 starting bug reproductions 2025/08/06 17:53:45 starting bug reproductions (max 10 VMs, 7 repros) 2025/08/06 17:53:45 start reproducing 'WARNING in corrupted' 2025/08/06 17:53:45 start reproducing 'WARNING in __perf_event_overflow' 2025/08/06 17:53:45 start reproducing 'WARNING in xsk_create' 2025/08/06 17:54:15 triaged 99.7% of the corpus 2025/08/06 17:54:53 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 17:54:58 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 17:55:34 base crash: lost connection to test machine 2025/08/06 17:55:34 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:55:34 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:56:05 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 17:56:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:56:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:56:11 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 17:56:15 runner 1 connected 2025/08/06 17:56:15 runner 7 connected 2025/08/06 17:56:50 runner 4 connected 2025/08/06 17:57:18 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 17:57:20 new: boot error: can't ssh into the instance 2025/08/06 17:57:29 new: boot error: can't ssh into the instance 2025/08/06 17:57:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 0, "corpus": 9536, "corpus [files]": 470, "corpus [symbols]": 468, "cover overflows": 4516, "coverage": 70970, "distributor delayed": 20011, "distributor undelayed": 20011, "distributor violated": 914, "exec candidate": 22555, "exec collide": 679, "exec fuzz": 1262, "exec gen": 68, "exec hints": 366, "exec inject": 0, "exec minimize": 55, "exec retries": 43, "exec seeds": 15, "exec smash": 114, "exec total [base]": 94364, "exec total [new]": 94567, "exec triage": 30487, "executor restarts": 460, "fault jobs": 0, "fuzzer jobs": 3, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 2, "hints jobs": 1, "max signal": 72563, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 30, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9823, "no exec duration": 3857199000000, "no exec requests": 14142, "pending": 119, "prog exec time": 359, "reproducing": 3, "rpc recv": 5067734948, "rpc sent": 318881056, "signal": 70036, "smash jobs": 0, "triage jobs": 2, "vm output": 4915632, "vm restarts [base]": 6, "vm restarts [new]": 130 } 2025/08/06 17:58:06 reproducing crash 'WARNING in __perf_event_overflow': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f kernel/events/core.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 17:58:07 patched crashed: WARNING in corrupted [need repro = true] 2025/08/06 17:58:07 scheduled a reproduction of 'WARNING in corrupted' 2025/08/06 17:58:10 runner 5 connected 2025/08/06 17:58:15 base crash: lost connection to test machine 2025/08/06 17:58:25 new: boot error: can't ssh into the instance 2025/08/06 17:58:49 runner 4 connected 2025/08/06 17:58:50 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:58:50 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:58:51 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 17:58:51 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 17:59:02 runner 1 connected 2025/08/06 17:59:12 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 17:59:14 runner 6 connected 2025/08/06 17:59:31 runner 5 connected 2025/08/06 17:59:39 runner 7 connected 2025/08/06 17:59:52 new: boot error: can't ssh into the instance 2025/08/06 18:00:13 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:00:14 new: boot error: can't ssh into the instance 2025/08/06 18:00:27 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:00:27 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:00:29 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:00:52 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:00:52 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:00:54 runner 6 connected 2025/08/06 18:01:03 runner 9 connected 2025/08/06 18:01:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:01:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:01:16 runner 4 connected 2025/08/06 18:01:33 runner 7 connected 2025/08/06 18:01:53 runner 5 connected 2025/08/06 18:02:37 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:02:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 0, "corpus": 9540, "corpus [files]": 471, "corpus [symbols]": 469, "cover overflows": 4794, "coverage": 70974, "distributor delayed": 20109, "distributor undelayed": 20097, "distributor violated": 914, "exec candidate": 22555, "exec collide": 1844, "exec fuzz": 3632, "exec gen": 216, "exec hints": 618, "exec inject": 0, "exec minimize": 124, "exec retries": 46, "exec seeds": 27, "exec smash": 211, "exec total [base]": 98621, "exec total [new]": 98801, "exec triage": 30603, "executor restarts": 498, "fault jobs": 0, "fuzzer jobs": 19, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 4, "hints jobs": 2, "max signal": 72642, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 63, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9868, "no exec duration": 4849309000000, "no exec requests": 16972, "pending": 125, "prog exec time": 352, "reproducing": 3, "rpc recv": 5422264360, "rpc sent": 361432224, "signal": 70040, "smash jobs": 1, "triage jobs": 16, "vm output": 5624701, "vm restarts [base]": 7, "vm restarts [new]": 140 } 2025/08/06 18:03:15 patched crashed: INFO: rcu detected stall in smp_call_function [need repro = false] 2025/08/06 18:03:26 runner 4 connected 2025/08/06 18:03:40 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:03:40 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:03:57 runner 6 connected 2025/08/06 18:03:58 base crash: lost connection to test machine 2025/08/06 18:04:16 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:04:16 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:04:22 runner 5 connected 2025/08/06 18:04:27 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:04:27 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:04:40 runner 3 connected 2025/08/06 18:04:57 runner 4 connected 2025/08/06 18:04:59 new: boot error: can't ssh into the instance 2025/08/06 18:05:09 runner 9 connected 2025/08/06 18:05:13 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:05:28 base crash: lost connection to test machine 2025/08/06 18:05:55 runner 7 connected 2025/08/06 18:06:03 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:06:09 runner 2 connected 2025/08/06 18:06:23 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:06:47 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:06:47 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:06:47 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f mm/slab_common.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:06:57 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:06:57 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:07:00 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:07:04 runner 6 connected 2025/08/06 18:07:24 new: boot error: can't ssh into the instance 2025/08/06 18:07:26 new: boot error: can't ssh into the instance 2025/08/06 18:07:28 runner 4 connected 2025/08/06 18:07:38 runner 9 connected 2025/08/06 18:07:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 3, "corpus": 9553, "corpus [files]": 473, "corpus [symbols]": 471, "cover overflows": 5413, "coverage": 70993, "distributor delayed": 20257, "distributor undelayed": 20257, "distributor violated": 916, "exec candidate": 22555, "exec collide": 4194, "exec fuzz": 8024, "exec gen": 422, "exec hints": 1837, "exec inject": 0, "exec minimize": 607, "exec retries": 46, "exec seeds": 69, "exec smash": 564, "exec total [base]": 107911, "exec total [new]": 108108, "exec triage": 30860, "executor restarts": 526, "fault jobs": 0, "fuzzer jobs": 7, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 3, "hints jobs": 3, "max signal": 72792, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 303, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9946, "no exec duration": 5475719000000, "no exec requests": 19324, "pending": 130, "prog exec time": 239, "reproducing": 3, "rpc recv": 5801749296, "rpc sent": 437970752, "signal": 70059, "smash jobs": 1, "triage jobs": 3, "vm output": 6692798, "vm restarts [base]": 9, "vm restarts [new]": 149 } 2025/08/06 18:07:53 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:07:54 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:07:54 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:08:07 runner 8 connected 2025/08/06 18:08:16 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:08:16 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:08:32 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f mm/slab_common.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:08:35 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:08:35 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:08:35 runner 4 connected 2025/08/06 18:08:58 runner 9 connected 2025/08/06 18:09:01 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:09:16 runner 6 connected 2025/08/06 18:09:25 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:09:27 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:09:36 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f mm/slab_common.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:10:07 runner 4 connected 2025/08/06 18:10:07 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:10:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:10:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:10:19 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:10:19 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:10:35 new: boot error: can't ssh into the instance 2025/08/06 18:10:40 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f mm/slab_common.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:10:50 runner 9 connected 2025/08/06 18:11:43 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:11:43 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f mm/slab_common.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:12:06 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:12:06 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:12:27 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:12:27 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:12:36 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:12:36 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:12:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 3, "corpus": 9558, "corpus [files]": 473, "corpus [symbols]": 471, "cover overflows": 5759, "coverage": 70998, "distributor delayed": 20324, "distributor undelayed": 20324, "distributor violated": 916, "exec candidate": 22555, "exec collide": 5895, "exec fuzz": 11307, "exec gen": 595, "exec hints": 2588, "exec inject": 0, "exec minimize": 721, "exec retries": 49, "exec seeds": 84, "exec smash": 695, "exec total [base]": 114159, "exec total [new]": 114370, "exec triage": 30959, "executor restarts": 556, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 0, "hints jobs": 2, "max signal": 72899, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 369, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9977, "no exec duration": 6749331000000, "no exec requests": 23517, "pending": 138, "prog exec time": 0, "reproducing": 3, "rpc recv": 6003676392, "rpc sent": 491444896, "signal": 70064, "smash jobs": 0, "triage jobs": 0, "vm output": 7629739, "vm restarts [base]": 9, "vm restarts [new]": 155 } 2025/08/06 18:12:47 runner 9 connected 2025/08/06 18:12:50 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:12:51 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:13:09 runner 4 connected 2025/08/06 18:13:17 runner 6 connected 2025/08/06 18:13:21 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:13:21 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:13:31 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:13:31 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:13:47 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:13:47 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:14:01 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:14:01 runner 9 connected 2025/08/06 18:14:13 runner 4 connected 2025/08/06 18:14:28 runner 6 connected 2025/08/06 18:14:35 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:14:35 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:14:49 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:14:49 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:14:52 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:14:52 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:15:17 runner 9 connected 2025/08/06 18:15:19 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:15:30 runner 6 connected 2025/08/06 18:15:35 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:15:35 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:16:16 runner 9 connected 2025/08/06 18:16:25 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:16:25 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:16:27 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:17:05 new: boot error: can't ssh into the instance 2025/08/06 18:17:06 runner 6 connected 2025/08/06 18:17:34 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:17:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 3, "corpus": 9558, "corpus [files]": 473, "corpus [symbols]": 471, "cover overflows": 5880, "coverage": 70998, "distributor delayed": 20335, "distributor undelayed": 20334, "distributor violated": 919, "exec candidate": 22555, "exec collide": 6541, "exec fuzz": 12433, "exec gen": 667, "exec hints": 3026, "exec inject": 0, "exec minimize": 763, "exec retries": 49, "exec seeds": 84, "exec smash": 695, "exec total [base]": 116506, "exec total [new]": 116716, "exec triage": 30976, "executor restarts": 583, "fault jobs": 0, "fuzzer jobs": 7, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 1, "hints jobs": 2, "max signal": 72911, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 397, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9985, "no exec duration": 7695249000000, "no exec requests": 25744, "pending": 146, "prog exec time": 271, "reproducing": 3, "rpc recv": 6314969584, "rpc sent": 515685208, "signal": 70064, "smash jobs": 0, "triage jobs": 5, "vm output": 8376520, "vm restarts [base]": 9, "vm restarts [new]": 165 } 2025/08/06 18:17:46 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:17:46 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:17:47 runner 5 connected 2025/08/06 18:18:27 runner 6 connected 2025/08/06 18:18:37 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:18:51 base crash: lost connection to test machine 2025/08/06 18:19:04 patched crashed: WARNING in corrupted [need repro = true] 2025/08/06 18:19:04 scheduled a reproduction of 'WARNING in corrupted' 2025/08/06 18:19:20 base crash: lost connection to test machine 2025/08/06 18:19:23 runner 0 connected 2025/08/06 18:19:27 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:19:32 runner 3 connected 2025/08/06 18:19:33 new: boot error: can't ssh into the instance 2025/08/06 18:19:45 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:19:46 runner 5 connected 2025/08/06 18:20:02 runner 2 connected 2025/08/06 18:20:09 runner 9 connected 2025/08/06 18:20:13 new: boot error: can't ssh into the instance 2025/08/06 18:20:13 runner 7 connected 2025/08/06 18:20:25 new: boot error: can't ssh into the instance 2025/08/06 18:20:49 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:21:00 patched crashed: WARNING in corrupted [need repro = true] 2025/08/06 18:21:00 scheduled a reproduction of 'WARNING in corrupted' 2025/08/06 18:21:06 runner 8 connected 2025/08/06 18:21:19 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:21:19 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:21:21 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:21:22 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:21:22 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:21:32 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:21:32 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:21:42 runner 7 connected 2025/08/06 18:21:42 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:21:42 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:21:57 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:22:00 runner 6 connected 2025/08/06 18:22:00 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:22:00 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:22:14 runner 9 connected 2025/08/06 18:22:23 runner 8 connected 2025/08/06 18:22:29 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:22:34 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:22:34 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:22:42 runner 7 connected 2025/08/06 18:22:44 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:22:44 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:22:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 3, "corpus": 9561, "corpus [files]": 473, "corpus [symbols]": 471, "cover overflows": 6208, "coverage": 71001, "distributor delayed": 20364, "distributor undelayed": 20362, "distributor violated": 919, "exec candidate": 22555, "exec collide": 7891, "exec fuzz": 14935, "exec gen": 787, "exec hints": 3748, "exec inject": 0, "exec minimize": 844, "exec retries": 51, "exec seeds": 93, "exec smash": 770, "exec total [base]": 121408, "exec total [new]": 121622, "exec triage": 31023, "executor restarts": 617, "fault jobs": 0, "fuzzer jobs": 5, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 1, "hints jobs": 3, "max signal": 72933, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 467, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 9999, "no exec duration": 8249568000000, "no exec requests": 27483, "pending": 156, "prog exec time": 384, "reproducing": 3, "rpc recv": 6725135624, "rpc sent": 559321392, "signal": 70067, "smash jobs": 0, "triage jobs": 2, "vm output": 9304674, "vm restarts [base]": 12, "vm restarts [new]": 176 } 2025/08/06 18:22:47 base crash: lost connection to test machine 2025/08/06 18:23:04 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:23:15 runner 9 connected 2025/08/06 18:23:25 runner 6 connected 2025/08/06 18:23:28 runner 1 connected 2025/08/06 18:23:35 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:23:57 patched crashed: WARNING in corrupted [need repro = true] 2025/08/06 18:23:57 scheduled a reproduction of 'WARNING in corrupted' 2025/08/06 18:24:03 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:24:03 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:24:06 new: boot error: can't ssh into the instance 2025/08/06 18:24:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:24:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:24:11 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:24:15 fuzzer has reached the modified code (471 + 473 + 0), continuing fuzzing 2025/08/06 18:24:38 runner 7 connected 2025/08/06 18:24:45 runner 6 connected 2025/08/06 18:24:50 runner 8 connected 2025/08/06 18:24:53 reproducing crash 'WARNING in __perf_event_overflow': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f kernel/events/core.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:24:57 new: boot error: can't ssh into the instance 2025/08/06 18:25:14 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:25:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:25:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:25:18 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:25:26 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:25:26 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:25:56 runner 6 connected 2025/08/06 18:26:07 runner 8 connected 2025/08/06 18:26:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:26:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:26:18 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:26:19 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:26:19 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:26:23 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:26:29 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:26:29 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:26:50 runner 7 connected 2025/08/06 18:27:00 runner 6 connected 2025/08/06 18:27:06 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:27:06 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:27:11 runner 9 connected 2025/08/06 18:27:27 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:27:42 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:27:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 3, "corpus": 9562, "corpus [files]": 473, "corpus [symbols]": 471, "cover overflows": 6523, "coverage": 71001, "distributor delayed": 20416, "distributor undelayed": 20415, "distributor violated": 920, "exec candidate": 22555, "exec collide": 9406, "exec fuzz": 17723, "exec gen": 933, "exec hints": 4351, "exec inject": 0, "exec minimize": 892, "exec retries": 51, "exec seeds": 96, "exec smash": 795, "exec total [base]": 126604, "exec total [new]": 126817, "exec triage": 31088, "executor restarts": 653, "fault jobs": 0, "fuzzer jobs": 4, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 2, "hints jobs": 2, "max signal": 73415, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 504, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10021, "no exec duration": 9305773000000, "no exec requests": 30622, "pending": 165, "prog exec time": 474, "reproducing": 3, "rpc recv": 7105717560, "rpc sent": 608224488, "signal": 70067, "smash jobs": 0, "triage jobs": 2, "vm output": 10419235, "vm restarts [base]": 13, "vm restarts [new]": 186 } 2025/08/06 18:27:47 runner 8 connected 2025/08/06 18:28:13 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:28:13 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:28:24 runner 6 connected 2025/08/06 18:28:26 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:28:26 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:28:42 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:28:54 runner 9 connected 2025/08/06 18:29:07 runner 8 connected 2025/08/06 18:29:21 patched crashed: INFO: rcu detected stall in sock_alloc_file [need repro = false] 2025/08/06 18:29:40 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:29:40 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:29:52 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:29:52 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:30:02 runner 7 connected 2025/08/06 18:30:03 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:30:03 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:30:22 runner 8 connected 2025/08/06 18:30:24 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:30:24 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:30:33 runner 9 connected 2025/08/06 18:30:44 runner 6 connected 2025/08/06 18:31:03 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:31:03 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:31:27 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:31:27 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:31:27 new: boot error: can't ssh into the instance 2025/08/06 18:31:42 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:31:45 runner 9 connected 2025/08/06 18:32:08 runner 6 connected 2025/08/06 18:32:09 runner 5 connected 2025/08/06 18:32:34 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:32:34 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:32:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 3, "corpus": 9564, "corpus [files]": 473, "corpus [symbols]": 471, "cover overflows": 6691, "coverage": 71003, "distributor delayed": 20458, "distributor undelayed": 20455, "distributor violated": 922, "exec candidate": 22555, "exec collide": 10286, "exec fuzz": 19422, "exec gen": 1023, "exec hints": 4634, "exec inject": 0, "exec minimize": 927, "exec retries": 51, "exec seeds": 102, "exec smash": 837, "exec total [base]": 129689, "exec total [new]": 129902, "exec triage": 31136, "executor restarts": 691, "fault jobs": 0, "fuzzer jobs": 6, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 3, "hints jobs": 2, "max signal": 73450, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 535, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10037, "no exec duration": 10256004000000, "no exec requests": 33021, "pending": 174, "prog exec time": 272, "reproducing": 3, "rpc recv": 7452454152, "rpc sent": 641299712, "signal": 70069, "smash jobs": 1, "triage jobs": 3, "vm output": 11182643, "vm restarts [base]": 13, "vm restarts [new]": 197 } 2025/08/06 18:32:49 base crash: lost connection to test machine 2025/08/06 18:32:49 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:33:00 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:33:00 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:33:15 runner 5 connected 2025/08/06 18:33:31 runner 1 connected 2025/08/06 18:33:40 new: boot error: can't ssh into the instance 2025/08/06 18:33:42 runner 9 connected 2025/08/06 18:34:00 base crash: lost connection to test machine 2025/08/06 18:34:46 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:35:00 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:35:00 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:35:03 new: boot error: can't ssh into the instance 2025/08/06 18:35:11 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:35:11 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:35:25 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:35:25 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:35:41 runner 8 connected 2025/08/06 18:35:44 runner 4 connected 2025/08/06 18:35:52 runner 6 connected 2025/08/06 18:35:59 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:35:59 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:36:00 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:36:06 runner 5 connected 2025/08/06 18:36:12 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:36:12 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:36:24 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:36:24 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:36:41 runner 8 connected 2025/08/06 18:36:50 patched crashed: INFO: rcu detected stall in perf_event_open [need repro = false] 2025/08/06 18:36:54 runner 6 connected 2025/08/06 18:37:04 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:37:06 runner 5 connected 2025/08/06 18:37:14 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:37:14 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:37:32 runner 9 connected 2025/08/06 18:37:33 new: boot error: can't ssh into the instance 2025/08/06 18:37:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 6, "corpus": 9565, "corpus [files]": 473, "corpus [symbols]": 471, "cover overflows": 7021, "coverage": 71004, "distributor delayed": 20481, "distributor undelayed": 20481, "distributor violated": 922, "exec candidate": 22555, "exec collide": 11526, "exec fuzz": 21748, "exec gen": 1143, "exec hints": 4949, "exec inject": 0, "exec minimize": 997, "exec retries": 143, "exec seeds": 105, "exec smash": 854, "exec total [base]": 133808, "exec total [new]": 134131, "exec triage": 31174, "executor restarts": 822, "fault jobs": 0, "fuzzer jobs": 3, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 4, "hints jobs": 2, "max signal": 73480, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 576, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10049, "no exec duration": 10584100000000, "no exec requests": 34031, "pending": 182, "prog exec time": 357, "reproducing": 3, "rpc recv": 7800634288, "rpc sent": 681281496, "signal": 70070, "smash jobs": 0, "triage jobs": 1, "vm output": 12788017, "vm restarts [base]": 14, "vm restarts [new]": 207 } 2025/08/06 18:37:55 runner 4 connected 2025/08/06 18:38:14 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:38:14 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:38:19 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:38:19 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:38:26 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:38:26 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:38:38 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:38:42 base crash: lost connection to test machine 2025/08/06 18:38:48 new: boot error: can't ssh into the instance 2025/08/06 18:38:55 runner 9 connected 2025/08/06 18:39:00 runner 8 connected 2025/08/06 18:39:07 runner 6 connected 2025/08/06 18:39:24 runner 3 connected 2025/08/06 18:39:41 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:39:54 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:39:57 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:40:21 base crash: lost connection to test machine 2025/08/06 18:40:29 new: boot error: can't ssh into the instance 2025/08/06 18:40:34 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:40:34 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:40:35 runner 8 connected 2025/08/06 18:40:35 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:40:35 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:40:44 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:41:00 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:41:00 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:41:04 runner 3 connected 2025/08/06 18:41:06 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:41:11 runner 7 connected 2025/08/06 18:41:15 runner 9 connected 2025/08/06 18:41:16 runner 6 connected 2025/08/06 18:41:33 base crash: lost connection to test machine 2025/08/06 18:41:41 runner 8 connected 2025/08/06 18:41:53 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:41:56 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:41:56 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:42:12 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:42:16 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:42:22 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:42:22 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:42:22 runner 0 connected 2025/08/06 18:42:41 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:42:41 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:42:44 runner 5 connected 2025/08/06 18:42:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 6, "corpus": 9568, "corpus [files]": 474, "corpus [symbols]": 472, "cover overflows": 7520, "coverage": 71014, "distributor delayed": 20532, "distributor undelayed": 20528, "distributor violated": 922, "exec candidate": 22555, "exec collide": 14143, "exec fuzz": 26516, "exec gen": 1399, "exec hints": 5598, "exec inject": 0, "exec minimize": 1102, "exec retries": 161, "exec seeds": 114, "exec smash": 929, "exec total [base]": 139319, "exec total [new]": 142692, "exec triage": 31246, "executor restarts": 870, "fault jobs": 0, "fuzzer jobs": 6, "fuzzing VMs [base]": 2, "fuzzing VMs [new]": 1, "hints jobs": 2, "max signal": 73526, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 623, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10075, "no exec duration": 10584489000000, "no exec requests": 34035, "pending": 191, "prog exec time": 317, "reproducing": 3, "rpc recv": 8184988460, "rpc sent": 747105824, "signal": 70080, "smash jobs": 0, "triage jobs": 4, "vm output": 14221496, "vm restarts [base]": 17, "vm restarts [new]": 217 } 2025/08/06 18:42:45 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:42:57 runner 6 connected 2025/08/06 18:43:03 runner 4 connected 2025/08/06 18:43:04 base crash: lost connection to test machine 2025/08/06 18:43:08 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:43:20 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:43:22 runner 8 connected 2025/08/06 18:43:45 runner 3 connected 2025/08/06 18:43:48 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:44:06 base: boot error: can't ssh into the instance 2025/08/06 18:44:07 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:44:07 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:44:10 reproducing crash 'WARNING in __perf_event_overflow': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f kernel/events/core.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:44:14 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:44:14 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:44:16 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:44:32 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:44:33 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:44:33 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:44:44 runner 6 connected 2025/08/06 18:44:47 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:44:47 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:44:57 runner 2 connected 2025/08/06 18:44:57 runner 5 connected 2025/08/06 18:45:07 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:45:07 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:45:10 runner 8 connected 2025/08/06 18:45:23 runner 4 connected 2025/08/06 18:45:29 base crash: lost connection to test machine 2025/08/06 18:45:30 reproducing crash 'WARNING in __perf_event_overflow': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f kernel/events/core.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:45:38 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:45:44 runner 9 connected 2025/08/06 18:45:52 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:45:53 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:45:56 runner 6 connected 2025/08/06 18:45:58 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:45:58 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:45:59 base crash: lost connection to test machine 2025/08/06 18:46:01 base crash: lost connection to test machine 2025/08/06 18:46:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:46:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:46:21 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:46:21 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:46:25 runner 1 connected 2025/08/06 18:46:41 runner 8 connected 2025/08/06 18:46:47 runner 4 connected 2025/08/06 18:46:49 runner 3 connected 2025/08/06 18:46:55 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:46:57 runner 0 connected 2025/08/06 18:46:57 runner 9 connected 2025/08/06 18:47:02 reproducing crash 'WARNING in __perf_event_overflow': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f kernel/events/core.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:47:02 repro finished 'WARNING in __perf_event_overflow', repro=true crepro=false desc='WARNING in __perf_event_overflow' hub=false from_dashboard=false 2025/08/06 18:47:02 found repro for "WARNING in __perf_event_overflow" (orig title: "-SAME-", reliability: 1), took 53.28 minutes 2025/08/06 18:47:02 "WARNING in __perf_event_overflow": saved crash log into 1754506022.crash.log 2025/08/06 18:47:02 "WARNING in __perf_event_overflow": saved repro log into 1754506022.repro.log 2025/08/06 18:47:02 failed to recv *flatrpc.InfoRequestRawT: unexpected EOF 2025/08/06 18:47:09 new: boot error: can't ssh into the instance 2025/08/06 18:47:10 runner 6 connected 2025/08/06 18:47:10 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:47:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 6, "corpus": 9568, "corpus [files]": 474, "corpus [symbols]": 472, "cover overflows": 7808, "coverage": 71014, "distributor delayed": 20578, "distributor undelayed": 20578, "distributor violated": 922, "exec candidate": 22555, "exec collide": 15620, "exec fuzz": 29225, "exec gen": 1556, "exec hints": 5991, "exec inject": 0, "exec minimize": 1133, "exec retries": 161, "exec seeds": 114, "exec smash": 929, "exec total [base]": 144757, "exec total [new]": 147521, "exec triage": 31303, "executor restarts": 915, "fault jobs": 0, "fuzzer jobs": 3, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 5, "hints jobs": 2, "max signal": 73548, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 645, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10092, "no exec duration": 10584638000000, "no exec requests": 34038, "pending": 199, "prog exec time": 461, "reproducing": 2, "rpc recv": 8749383460, "rpc sent": 799818376, "signal": 70080, "smash jobs": 0, "triage jobs": 1, "vm output": 15213683, "vm restarts [base]": 22, "vm restarts [new]": 230 } 2025/08/06 18:48:06 runner 0 connected 2025/08/06 18:48:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:48:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:48:23 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:48:40 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:48:40 repro finished 'WARNING in corrupted', repro=true crepro=false desc='WARNING in xsk_create' hub=false from_dashboard=false 2025/08/06 18:48:40 found repro for "WARNING in xsk_create" (orig title: "WARNING in corrupted", reliability: 1), took 54.92 minutes 2025/08/06 18:48:40 start reproducing 'WARNING in corrupted' 2025/08/06 18:48:40 "WARNING in xsk_create": saved crash log into 1754506120.crash.log 2025/08/06 18:48:40 "WARNING in xsk_create": saved repro log into 1754506120.repro.log 2025/08/06 18:48:50 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:48:50 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:48:50 attempt #0 to run "WARNING in __perf_event_overflow" on base: crashed with WARNING in __perf_event_overflow 2025/08/06 18:48:50 crashes both: WARNING in __perf_event_overflow / WARNING in __perf_event_overflow 2025/08/06 18:49:02 base crash: lost connection to test machine 2025/08/06 18:49:08 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:49:08 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:49:09 runner 8 connected 2025/08/06 18:49:47 runner 0 connected 2025/08/06 18:49:47 runner 5 connected 2025/08/06 18:49:50 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:49:51 runner 2 connected 2025/08/06 18:49:55 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:50:06 runner 6 connected 2025/08/06 18:50:32 attempt #0 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 18:51:12 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:51:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:51:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:52:03 runner 6 connected 2025/08/06 18:52:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:52:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:52:13 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:52:18 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:52:18 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:52:19 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:52:19 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:52:25 attempt #1 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 18:52:25 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:52:25 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:52:30 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:52:30 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:52:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 14, "corpus": 9576, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 8399, "coverage": 71024, "distributor delayed": 20625, "distributor undelayed": 20623, "distributor violated": 922, "exec candidate": 22555, "exec collide": 18254, "exec fuzz": 34366, "exec gen": 1818, "exec hints": 6645, "exec inject": 0, "exec minimize": 1343, "exec retries": 166, "exec seeds": 138, "exec smash": 1129, "exec total [base]": 150787, "exec total [new]": 156714, "exec triage": 31381, "executor restarts": 939, "fault jobs": 0, "fuzzer jobs": 6, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 0, "hints jobs": 3, "max signal": 73597, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 751, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10120, "no exec duration": 10584816000000, "no exec requests": 34040, "pending": 207, "prog exec time": 0, "reproducing": 2, "rpc recv": 8982635948, "rpc sent": 866373616, "signal": 70090, "smash jobs": 0, "triage jobs": 3, "vm output": 16178280, "vm restarts [base]": 24, "vm restarts [new]": 235 } 2025/08/06 18:52:51 new: boot error: can't ssh into the instance 2025/08/06 18:52:58 runner 4 connected 2025/08/06 18:53:02 runner 0 connected 2025/08/06 18:53:07 runner 9 connected 2025/08/06 18:53:08 runner 5 connected 2025/08/06 18:53:20 runner 6 connected 2025/08/06 18:53:33 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:53:41 runner 7 connected 2025/08/06 18:54:12 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:54:22 runner 0 connected 2025/08/06 18:54:26 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:54:26 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:54:52 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:55:00 base crash: lost connection to test machine 2025/08/06 18:55:01 runner 7 connected 2025/08/06 18:55:15 runner 9 connected 2025/08/06 18:55:42 runner 0 connected 2025/08/06 18:55:48 runner 0 connected 2025/08/06 18:56:16 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:56:16 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:56:25 base crash: lost connection to test machine 2025/08/06 18:56:29 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:56:54 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:56:54 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:57:01 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:57:01 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:57:06 runner 9 connected 2025/08/06 18:57:08 new: boot error: can't ssh into the instance 2025/08/06 18:57:14 runner 3 connected 2025/08/06 18:57:19 runner 6 connected 2025/08/06 18:57:42 runner 7 connected 2025/08/06 18:57:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 15, "corpus": 9578, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 8789, "coverage": 71028, "distributor delayed": 20665, "distributor undelayed": 20665, "distributor violated": 922, "exec candidate": 22555, "exec collide": 20147, "exec fuzz": 38072, "exec gen": 2001, "exec hints": 6683, "exec inject": 0, "exec minimize": 1419, "exec retries": 168, "exec seeds": 141, "exec smash": 1204, "exec total [base]": 157345, "exec total [new]": 162753, "exec triage": 31432, "executor restarts": 973, "fault jobs": 0, "fuzzer jobs": 1, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 4, "hints jobs": 1, "max signal": 73621, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 782, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10136, "no exec duration": 10584816000000, "no exec requests": 34040, "pending": 211, "prog exec time": 452, "reproducing": 2, "rpc recv": 9425382496, "rpc sent": 928012112, "signal": 70094, "smash jobs": 0, "triage jobs": 0, "vm output": 16930757, "vm restarts [base]": 26, "vm restarts [new]": 248 } 2025/08/06 18:57:57 runner 4 connected 2025/08/06 18:57:59 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:57:59 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:58:26 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:58:33 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:58:33 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:58:38 patched crashed: no output from test machine [need repro = false] 2025/08/06 18:58:40 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 18:58:42 base crash: lost connection to test machine 2025/08/06 18:58:48 runner 6 connected 2025/08/06 18:59:27 runner 5 connected 2025/08/06 18:59:28 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:59:28 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:59:31 runner 9 connected 2025/08/06 18:59:31 runner 2 connected 2025/08/06 18:59:32 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:59:32 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:59:46 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 18:59:54 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 18:59:54 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 18:59:56 new: boot error: can't ssh into the instance 2025/08/06 19:00:21 runner 7 connected 2025/08/06 19:00:43 runner 9 connected 2025/08/06 19:00:59 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:00:59 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:00:59 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:00:59 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:01:05 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:01:08 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:01:08 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:01:11 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:01:11 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:01:18 new: boot error: can't ssh into the instance 2025/08/06 19:01:48 runner 5 connected 2025/08/06 19:01:58 runner 0 connected 2025/08/06 19:02:00 runner 9 connected 2025/08/06 19:02:09 base crash: lost connection to test machine 2025/08/06 19:02:09 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:02:09 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:02:19 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:02:19 repro finished 'WARNING in xsk_create', repro=true crepro=false desc='WARNING in xsk_create' hub=false from_dashboard=false 2025/08/06 19:02:19 found repro for "WARNING in xsk_create" (orig title: "-SAME-", reliability: 1), took 68.57 minutes 2025/08/06 19:02:19 start reproducing 'WARNING in xsk_create' 2025/08/06 19:02:19 "WARNING in xsk_create": saved crash log into 1754506939.crash.log 2025/08/06 19:02:19 "WARNING in xsk_create": saved repro log into 1754506939.repro.log 2025/08/06 19:02:26 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:02:30 base: boot error: can't ssh into the instance 2025/08/06 19:02:31 new: boot error: can't ssh into the instance 2025/08/06 19:02:33 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:02:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 15, "corpus": 9578, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 9026, "coverage": 71028, "distributor delayed": 20684, "distributor undelayed": 20683, "distributor violated": 922, "exec candidate": 22555, "exec collide": 21393, "exec fuzz": 40402, "exec gen": 2127, "exec hints": 6842, "exec inject": 0, "exec minimize": 1419, "exec retries": 169, "exec seeds": 141, "exec smash": 1204, "exec total [base]": 163335, "exec total [new]": 166628, "exec triage": 31452, "executor restarts": 1007, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 1, "fuzzing VMs [new]": 1, "hints jobs": 1, "max signal": 73634, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 785, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10143, "no exec duration": 10584837000000, "no exec requests": 34041, "pending": 220, "prog exec time": 425, "reproducing": 2, "rpc recv": 9770085176, "rpc sent": 978071520, "signal": 70094, "smash jobs": 0, "triage jobs": 1, "vm output": 17502596, "vm restarts [base]": 27, "vm restarts [new]": 257 } 2025/08/06 19:02:57 runner 3 connected 2025/08/06 19:02:58 runner 5 connected 2025/08/06 19:03:15 runner 0 connected 2025/08/06 19:03:21 runner 8 connected 2025/08/06 19:03:39 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:03:48 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:03:50 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:03:50 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:04:11 attempt #2 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:04:11 patched-only: WARNING in xsk_create 2025/08/06 19:04:11 scheduled a reproduction of 'WARNING in xsk_create (full)' 2025/08/06 19:04:11 start reproducing 'WARNING in xsk_create (full)' 2025/08/06 19:04:21 attempt #0 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:04:28 runner 9 connected 2025/08/06 19:04:37 runner 8 connected 2025/08/06 19:04:39 runner 5 connected 2025/08/06 19:05:01 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:05:01 runner 0 connected 2025/08/06 19:05:02 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:05:04 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:05:27 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:05:29 base crash: lost connection to test machine 2025/08/06 19:05:30 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:05:49 runner 8 connected 2025/08/06 19:06:07 attempt #1 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:06:18 runner 5 connected 2025/08/06 19:06:19 reproducing crash 'no output/lost connection': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:06:40 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:07:11 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:07:18 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:07:36 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:07:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 15, "corpus": 9579, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 9135, "coverage": 71029, "distributor delayed": 20710, "distributor undelayed": 20703, "distributor violated": 922, "exec candidate": 22555, "exec collide": 21970, "exec fuzz": 41558, "exec gen": 2178, "exec hints": 7035, "exec inject": 0, "exec minimize": 1425, "exec retries": 171, "exec seeds": 144, "exec smash": 1229, "exec total [base]": 165932, "exec total [new]": 168659, "exec triage": 31472, "executor restarts": 1033, "fault jobs": 0, "fuzzer jobs": 8, "fuzzing VMs [base]": 2, "fuzzing VMs [new]": 0, "hints jobs": 1, "max signal": 73650, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 794, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10154, "no exec duration": 10722043000000, "no exec requests": 34436, "pending": 220, "prog exec time": 0, "reproducing": 3, "rpc recv": 10082314584, "rpc sent": 1003041040, "signal": 70095, "smash jobs": 0, "triage jobs": 7, "vm output": 17927604, "vm restarts [base]": 29, "vm restarts [new]": 265 } 2025/08/06 19:08:00 runner 5 connected 2025/08/06 19:08:00 attempt #2 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:08:00 patched-only: WARNING in xsk_create 2025/08/06 19:08:00 scheduled a reproduction of 'WARNING in xsk_create (full)' 2025/08/06 19:08:07 runner 8 connected 2025/08/06 19:08:39 new: boot error: can't ssh into the instance 2025/08/06 19:08:50 runner 1 connected 2025/08/06 19:08:50 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:09:18 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:09:28 runner 4 connected 2025/08/06 19:09:33 new: boot error: can't ssh into the instance 2025/08/06 19:09:42 repro finished 'WARNING in xsk_create (full)', repro=false crepro=false desc='' hub=false from_dashboard=false 2025/08/06 19:09:42 failed repro for "WARNING in xsk_create", err=failed to build program: // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static unsigned long long procid; static __thread int clone_ongoing; static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* ctx) { if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) { exit(sig); } uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0; int valid = addr < prog_start || addr > prog_end; if (skip && valid) { _longjmp(segv_env, 1); } exit(sig); } static void install_segv_handler(void) { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) ({ int ok = 1; __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); if (_setjmp(segv_env) == 0) { __VA_ARGS__; } else ok = 0; __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); ok; }) static void sleep_ms(uint64_t ms) { usleep(ms * 1000); } static uint64_t current_time_ms(void) { struct timespec ts; if (clock_gettime(CLOCK_MONOTONIC, &ts)) exit(1); return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; } static void use_temporary_dir(void) { char tmpdir_template[] = "./syzkaller.XXXXXX"; char* tmpdir = mkdtemp(tmpdir_template); if (!tmpdir) exit(1); if (chmod(tmpdir, 0777)) exit(1); if (chdir(tmpdir)) exit(1); } static void thread_start(void* (*fn)(void*), void* arg) { pthread_t th; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setstacksize(&attr, 128 << 10); int i = 0; for (; i < 100; i++) { if (pthread_create(&th, &attr, fn, arg) == 0) { pthread_attr_destroy(&attr); return; } if (errno == EAGAIN) { usleep(50); continue; } break; } exit(1); } typedef struct { int state; } event_t; static void event_init(event_t* ev) { ev->state = 0; } static void event_reset(event_t* ev) { ev->state = 0; } static void event_set(event_t* ev) { if (ev->state) exit(1); __atomic_store_n(&ev->state, 1, __ATOMIC_RELEASE); syscall(SYS_futex, &ev->state, FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1000000); } static void event_wait(event_t* ev) { while (!__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, 0); } static int event_isset(event_t* ev) { return __atomic_load_n(&ev->state, __ATOMIC_ACQUIRE); } static int event_timedwait(event_t* ev, uint64_t timeout) { uint64_t start = current_time_ms(); uint64_t now = start; for (;;) { uint64_t remain = timeout - (now - start); struct timespec ts; ts.tv_sec = remain / 1000; ts.tv_nsec = (remain % 1000) * 1000 * 1000; syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, &ts); if (__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) return 1; now = current_time_ms(); if (now - start > timeout) return 0; } } static bool write_file(const char* file, const char* what, ...) { char buf[1024]; va_list args; va_start(args, what); vsnprintf(buf, sizeof(buf), what, args); va_end(args); buf[sizeof(buf) - 1] = 0; int len = strlen(buf); int fd = open(file, O_WRONLY | O_CLOEXEC); if (fd == -1) return false; if (write(fd, buf, len) != len) { int err = errno; close(fd); errno = err; return false; } close(fd); return true; } struct nlmsg { char* pos; int nesting; struct nlattr* nested[8]; char buf[4096]; }; static void netlink_init(struct nlmsg* nlmsg, int typ, int flags, const void* data, int size) { memset(nlmsg, 0, sizeof(*nlmsg)); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_type = typ; hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags; memcpy(hdr + 1, data, size); nlmsg->pos = (char*)(hdr + 1) + NLMSG_ALIGN(size); } static void netlink_attr(struct nlmsg* nlmsg, int typ, const void* data, int size) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_len = sizeof(*attr) + size; attr->nla_type = typ; if (size > 0) memcpy(attr + 1, data, size); nlmsg->pos += NLMSG_ALIGN(attr->nla_len); } static void netlink_nest(struct nlmsg* nlmsg, int typ) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_type = typ; nlmsg->pos += sizeof(*attr); nlmsg->nested[nlmsg->nesting++] = attr; } static void netlink_done(struct nlmsg* nlmsg) { struct nlattr* attr = nlmsg->nested[--nlmsg->nesting]; attr->nla_len = nlmsg->pos - (char*)attr; } static int netlink_send_ext(struct nlmsg* nlmsg, int sock, uint16_t reply_type, int* reply_len, bool dofail) { if (nlmsg->pos > nlmsg->buf + sizeof(nlmsg->buf) || nlmsg->nesting) exit(1); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_len = nlmsg->pos - nlmsg->buf; struct sockaddr_nl addr; memset(&addr, 0, sizeof(addr)); addr.nl_family = AF_NETLINK; ssize_t n = sendto(sock, nlmsg->buf, hdr->nlmsg_len, 0, (struct sockaddr*)&addr, sizeof(addr)); if (n != (ssize_t)hdr->nlmsg_len) { if (dofail) exit(1); return -1; } n = recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); if (reply_len) *reply_len = 0; if (n < 0) { if (dofail) exit(1); return -1; } if (n < (ssize_t)sizeof(struct nlmsghdr)) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type == NLMSG_DONE) return 0; if (reply_len && hdr->nlmsg_type == reply_type) { *reply_len = n; return 0; } if (n < (ssize_t)(sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr))) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type != NLMSG_ERROR) { errno = EINVAL; if (dofail) exit(1); return -1; } errno = -((struct nlmsgerr*)(hdr + 1))->error; return -errno; } static int netlink_send(struct nlmsg* nlmsg, int sock) { return netlink_send_ext(nlmsg, sock, 0, NULL, true); } static int netlink_query_family_id(struct nlmsg* nlmsg, int sock, const char* family_name, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = CTRL_CMD_GETFAMILY; netlink_init(nlmsg, GENL_ID_CTRL, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, CTRL_ATTR_FAMILY_NAME, family_name, strnlen(family_name, GENL_NAMSIZ - 1) + 1); int n = 0; int err = netlink_send_ext(nlmsg, sock, GENL_ID_CTRL, &n, dofail); if (err < 0) { return -1; } uint16_t id = 0; struct nlattr* attr = (struct nlattr*)(nlmsg->buf + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg->buf + n; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == CTRL_ATTR_FAMILY_ID) { id = *(uint16_t*)(attr + 1); break; } } if (!id) { errno = EINVAL; return -1; } recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); return id; } static int netlink_next_msg(struct nlmsg* nlmsg, unsigned int offset, unsigned int total_len) { struct nlmsghdr* hdr = (struct nlmsghdr*)(nlmsg->buf + offset); if (offset == total_len || offset + hdr->nlmsg_len > total_len) return -1; return hdr->nlmsg_len; } static void netlink_add_device_impl(struct nlmsg* nlmsg, const char* type, const char* name, bool up) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; netlink_init(nlmsg, RTM_NEWLINK, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); if (name) netlink_attr(nlmsg, IFLA_IFNAME, name, strlen(name)); netlink_nest(nlmsg, IFLA_LINKINFO); netlink_attr(nlmsg, IFLA_INFO_KIND, type, strlen(type)); } static void netlink_add_device(struct nlmsg* nlmsg, int sock, const char* type, const char* name) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_veth(struct nlmsg* nlmsg, int sock, const char* name, const char* peer) { netlink_add_device_impl(nlmsg, "veth", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_nest(nlmsg, VETH_INFO_PEER); nlmsg->pos += sizeof(struct ifinfomsg); netlink_attr(nlmsg, IFLA_IFNAME, peer, strlen(peer)); netlink_done(nlmsg); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_xfrm(struct nlmsg* nlmsg, int sock, const char* name) { netlink_add_device_impl(nlmsg, "xfrm", name, true); netlink_nest(nlmsg, IFLA_INFO_DATA); int if_id = 1; netlink_attr(nlmsg, 2, &if_id, sizeof(if_id)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_hsr(struct nlmsg* nlmsg, int sock, const char* name, const char* slave1, const char* slave2) { netlink_add_device_impl(nlmsg, "hsr", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); int ifindex1 = if_nametoindex(slave1); netlink_attr(nlmsg, IFLA_HSR_SLAVE1, &ifindex1, sizeof(ifindex1)); int ifindex2 = if_nametoindex(slave2); netlink_attr(nlmsg, IFLA_HSR_SLAVE2, &ifindex2, sizeof(ifindex2)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_linked(struct nlmsg* nlmsg, int sock, const char* type, const char* name, const char* link) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_vlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t id, uint16_t proto) { netlink_add_device_impl(nlmsg, "vlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_VLAN_ID, &id, sizeof(id)); netlink_attr(nlmsg, IFLA_VLAN_PROTOCOL, &proto, sizeof(proto)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_macvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link) { netlink_add_device_impl(nlmsg, "macvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); uint32_t mode = MACVLAN_MODE_BRIDGE; netlink_attr(nlmsg, IFLA_MACVLAN_MODE, &mode, sizeof(mode)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_geneve(struct nlmsg* nlmsg, int sock, const char* name, uint32_t vni, struct in_addr* addr4, struct in6_addr* addr6) { netlink_add_device_impl(nlmsg, "geneve", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_GENEVE_ID, &vni, sizeof(vni)); if (addr4) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE, addr4, sizeof(*addr4)); if (addr6) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE6, addr6, sizeof(*addr6)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } #define IFLA_IPVLAN_FLAGS 2 #define IPVLAN_MODE_L3S 2 #undef IPVLAN_F_VEPA #define IPVLAN_F_VEPA 2 static void netlink_add_ipvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t mode, uint16_t flags) { netlink_add_device_impl(nlmsg, "ipvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_IPVLAN_MODE, &mode, sizeof(mode)); netlink_attr(nlmsg, IFLA_IPVLAN_FLAGS, &flags, sizeof(flags)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_device_change(struct nlmsg* nlmsg, int sock, const char* name, bool up, const char* master, const void* mac, int macsize, const char* new_name) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; hdr.ifi_index = if_nametoindex(name); netlink_init(nlmsg, RTM_NEWLINK, 0, &hdr, sizeof(hdr)); if (new_name) netlink_attr(nlmsg, IFLA_IFNAME, new_name, strlen(new_name)); if (master) { int ifindex = if_nametoindex(master); netlink_attr(nlmsg, IFLA_MASTER, &ifindex, sizeof(ifindex)); } if (macsize) netlink_attr(nlmsg, IFLA_ADDRESS, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static int netlink_add_addr(struct nlmsg* nlmsg, int sock, const char* dev, const void* addr, int addrsize) { struct ifaddrmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ifa_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ifa_prefixlen = addrsize == 4 ? 24 : 120; hdr.ifa_scope = RT_SCOPE_UNIVERSE; hdr.ifa_index = if_nametoindex(dev); netlink_init(nlmsg, RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, IFA_LOCAL, addr, addrsize); netlink_attr(nlmsg, IFA_ADDRESS, addr, addrsize); return netlink_send(nlmsg, sock); } static void netlink_add_addr4(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in_addr in_addr; inet_pton(AF_INET, addr, &in_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in_addr, sizeof(in_addr)); if (err < 0) { } } static void netlink_add_addr6(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in6_addr in6_addr; inet_pton(AF_INET6, addr, &in6_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in6_addr, sizeof(in6_addr)); if (err < 0) { } } static void netlink_add_neigh(struct nlmsg* nlmsg, int sock, const char* name, const void* addr, int addrsize, const void* mac, int macsize) { struct ndmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ndm_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ndm_ifindex = if_nametoindex(name); hdr.ndm_state = NUD_PERMANENT; netlink_init(nlmsg, RTM_NEWNEIGH, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, NDA_DST, addr, addrsize); netlink_attr(nlmsg, NDA_LLADDR, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static struct nlmsg nlmsg; static int tunfd = -1; #define TUN_IFACE "syz_tun" #define LOCAL_MAC 0xaaaaaaaaaaaa #define REMOTE_MAC 0xaaaaaaaaaabb #define LOCAL_IPV4 "172.20.20.170" #define REMOTE_IPV4 "172.20.20.187" #define LOCAL_IPV6 "fe80::aa" #define REMOTE_IPV6 "fe80::bb" #define IFF_NAPI 0x0010 static void initialize_tun(void) { tunfd = open("/dev/net/tun", O_RDWR | O_NONBLOCK); if (tunfd == -1) { printf("tun: can't open /dev/net/tun: please enable CONFIG_TUN=y\n"); printf("otherwise fuzzing or reproducing might not work as intended\n"); return; } const int kTunFd = 200; if (dup2(tunfd, kTunFd) < 0) exit(1); close(tunfd); tunfd = kTunFd; struct ifreq ifr; memset(&ifr, 0, sizeof(ifr)); strncpy(ifr.ifr_name, TUN_IFACE, IFNAMSIZ); ifr.ifr_flags = IFF_TAP | IFF_NO_PI; if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0) { exit(1); } char sysctl[64]; sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/accept_dad", TUN_IFACE); write_file(sysctl, "0"); sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/router_solicitations", TUN_IFACE); write_file(sysctl, "0"); int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); netlink_add_addr4(&nlmsg, sock, TUN_IFACE, LOCAL_IPV4); netlink_add_addr6(&nlmsg, sock, TUN_IFACE, LOCAL_IPV6); uint64_t macaddr = REMOTE_MAC; struct in_addr in_addr; inet_pton(AF_INET, REMOTE_IPV4, &in_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in_addr, sizeof(in_addr), &macaddr, ETH_ALEN); struct in6_addr in6_addr; inet_pton(AF_INET6, REMOTE_IPV6, &in6_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in6_addr, sizeof(in6_addr), &macaddr, ETH_ALEN); macaddr = LOCAL_MAC; netlink_device_change(&nlmsg, sock, TUN_IFACE, true, 0, &macaddr, ETH_ALEN, NULL); close(sock); } #define DEVLINK_FAMILY_NAME "devlink" #define DEVLINK_CMD_PORT_GET 5 #define DEVLINK_ATTR_BUS_NAME 1 #define DEVLINK_ATTR_DEV_NAME 2 #define DEVLINK_ATTR_NETDEV_NAME 7 static struct nlmsg nlmsg2; static void initialize_devlink_ports(const char* bus_name, const char* dev_name, const char* netdev_prefix) { struct genlmsghdr genlhdr; int len, total_len, id, err, offset; uint16_t netdev_index; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) exit(1); int rtsock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (rtsock == -1) exit(1); id = netlink_query_family_id(&nlmsg, sock, DEVLINK_FAMILY_NAME, true); if (id == -1) goto error; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = DEVLINK_CMD_PORT_GET; netlink_init(&nlmsg, id, NLM_F_DUMP, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, DEVLINK_ATTR_BUS_NAME, bus_name, strlen(bus_name) + 1); netlink_attr(&nlmsg, DEVLINK_ATTR_DEV_NAME, dev_name, strlen(dev_name) + 1); err = netlink_send_ext(&nlmsg, sock, id, &total_len, true); if (err < 0) { goto error; } offset = 0; netdev_index = 0; while ((len = netlink_next_msg(&nlmsg, offset, total_len)) != -1) { struct nlattr* attr = (struct nlattr*)(nlmsg.buf + offset + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg.buf + offset + len; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == DEVLINK_ATTR_NETDEV_NAME) { char* port_name; char netdev_name[IFNAMSIZ]; port_name = (char*)(attr + 1); snprintf(netdev_name, sizeof(netdev_name), "%s%d", netdev_prefix, netdev_index); netlink_device_change(&nlmsg2, rtsock, port_name, true, 0, 0, 0, netdev_name); break; } } offset += len; netdev_index++; } error: close(rtsock); close(sock); } #define WIFI_INITIAL_DEVICE_COUNT 2 #define WIFI_MAC_BASE { 0x08, 0x02, 0x11, 0x00, 0x00, 0x00} #define WIFI_IBSS_BSSID { 0x50, 0x50, 0x50, 0x50, 0x50, 0x50} #define WIFI_IBSS_SSID { 0x10, 0x10, 0x10, 0x10, 0x10, 0x10} #define WIFI_DEFAULT_FREQUENCY 2412 #define WIFI_DEFAULT_SIGNAL 0 #define WIFI_DEFAULT_RX_RATE 1 #define HWSIM_CMD_REGISTER 1 #define HWSIM_CMD_FRAME 2 #define HWSIM_CMD_NEW_RADIO 4 #define HWSIM_ATTR_SUPPORT_P2P_DEVICE 14 #define HWSIM_ATTR_PERM_ADDR 22 #define IF_OPER_UP 6 struct join_ibss_props { int wiphy_freq; bool wiphy_freq_fixed; uint8_t* mac; uint8_t* ssid; int ssid_len; }; static int set_interface_state(const char* interface_name, int on) { struct ifreq ifr; int sock = socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) { return -1; } memset(&ifr, 0, sizeof(ifr)); strcpy(ifr.ifr_name, interface_name); int ret = ioctl(sock, SIOCGIFFLAGS, &ifr); if (ret < 0) { close(sock); return -1; } if (on) ifr.ifr_flags |= IFF_UP; else ifr.ifr_flags &= ~IFF_UP; ret = ioctl(sock, SIOCSIFFLAGS, &ifr); close(sock); if (ret < 0) { return -1; } return 0; } static int nl80211_set_interface(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, uint32_t iftype, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_SET_INTERFACE; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_IFTYPE, &iftype, sizeof(iftype)); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int nl80211_join_ibss(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, struct join_ibss_props* props, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_JOIN_IBSS; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_SSID, props->ssid, props->ssid_len); netlink_attr(nlmsg, NL80211_ATTR_WIPHY_FREQ, &(props->wiphy_freq), sizeof(props->wiphy_freq)); if (props->mac) netlink_attr(nlmsg, NL80211_ATTR_MAC, props->mac, ETH_ALEN); if (props->wiphy_freq_fixed) netlink_attr(nlmsg, NL80211_ATTR_FREQ_FIXED, NULL, 0); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int get_ifla_operstate(struct nlmsg* nlmsg, int ifindex, bool dofail) { struct ifinfomsg info; memset(&info, 0, sizeof(info)); info.ifi_family = AF_UNSPEC; info.ifi_index = ifindex; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) { return -1; } netlink_init(nlmsg, RTM_GETLINK, 0, &info, sizeof(info)); int n; int err = netlink_send_ext(nlmsg, sock, RTM_NEWLINK, &n, dofail); close(sock); if (err) { return -1; } struct rtattr* attr = IFLA_RTA(NLMSG_DATA(nlmsg->buf)); for (; RTA_OK(attr, n); attr = RTA_NEXT(attr, n)) { if (attr->rta_type == IFLA_OPERSTATE) return *((int32_t*)RTA_DATA(attr)); } return -1; } static int await_ifla_operstate(struct nlmsg* nlmsg, char* interface, int operstate, bool dofail) { int ifindex = if_nametoindex(interface); while (true) { usleep(1000); int ret = get_ifla_operstate(nlmsg, ifindex, dofail); if (ret < 0) return ret; if (ret == operstate) return 0; } return 0; } static int nl80211_setup_ibss_interface(struct nlmsg* nlmsg, int sock, int nl80211_family_id, char* interface, struct join_ibss_props* ibss_props, bool dofail) { int ifindex = if_nametoindex(interface); if (ifindex == 0) { return -1; } int ret = nl80211_set_interface(nlmsg, sock, nl80211_family_id, ifindex, NL80211_IFTYPE_ADHOC, dofail); if (ret < 0) { return -1; } ret = set_interface_state(interface, 1); if (ret < 0) { return -1; } ret = nl80211_join_ibss(nlmsg, sock, nl80211_family_id, ifindex, ibss_props, dofail); if (ret < 0) { return -1; } return 0; } static int hwsim80211_create_device(struct nlmsg* nlmsg, int sock, int hwsim_family, uint8_t mac_addr[ETH_ALEN]) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = HWSIM_CMD_NEW_RADIO; netlink_init(nlmsg, hwsim_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, HWSIM_ATTR_SUPPORT_P2P_DEVICE, NULL, 0); netlink_attr(nlmsg, HWSIM_ATTR_PERM_ADDR, mac_addr, ETH_ALEN); int err = netlink_send(nlmsg, sock); if (err < 0) { } return err; } static void initialize_wifi_devices(void) { int rfkill = open("/dev/rfkill", O_RDWR); if (rfkill == -1) exit(1); struct rfkill_event event = {0}; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; if (write(rfkill, &event, sizeof(event)) != (ssize_t)(sizeof(event))) exit(1); close(rfkill); uint8_t mac_addr[6] = WIFI_MAC_BASE; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock < 0) exit(1); int hwsim_family_id = netlink_query_family_id(&nlmsg, sock, "MAC80211_HWSIM", true); int nl80211_family_id = netlink_query_family_id(&nlmsg, sock, "nl80211", true); if (hwsim_family_id < 0 || nl80211_family_id < 0) exit(1); uint8_t ssid[] = WIFI_IBSS_SSID; uint8_t bssid[] = WIFI_IBSS_BSSID; struct join_ibss_props ibss_props = { .wiphy_freq = WIFI_DEFAULT_FREQUENCY, .wiphy_freq_fixed = true, .mac = bssid, .ssid = ssid, .ssid_len = sizeof(ssid)}; for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { mac_addr[5] = device_id; int ret = hwsim80211_create_device(&nlmsg, sock, hwsim_family_id, mac_addr); if (ret < 0) exit(1); char interface[6] = "wlan0"; interface[4] += device_id; if (nl80211_setup_ibss_interface(&nlmsg, sock, nl80211_family_id, interface, &ibss_props, true) < 0) exit(1); } for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { char interface[6] = "wlan0"; interface[4] += device_id; int ret = await_ifla_operstate(&nlmsg, interface, IF_OPER_UP, true); if (ret < 0) exit(1); } close(sock); } static int runcmdline(char* cmdline) { int ret = system(cmdline); if (ret) { } return ret; } #define DEV_IPV4 "172.20.20.%d" #define DEV_IPV6 "fe80::%02x" #define DEV_MAC 0x00aaaaaaaaaa static void netdevsim_add(unsigned int addr, unsigned int port_count) { write_file("/sys/bus/netdevsim/del_device", "%u", addr); if (write_file("/sys/bus/netdevsim/new_device", "%u %u", addr, port_count)) { char buf[32]; snprintf(buf, sizeof(buf), "netdevsim%d", addr); initialize_devlink_ports("netdevsim", buf, "netdevsim"); } } #define WG_GENL_NAME "wireguard" enum wg_cmd { WG_CMD_GET_DEVICE, WG_CMD_SET_DEVICE, }; enum wgdevice_attribute { WGDEVICE_A_UNSPEC, WGDEVICE_A_IFINDEX, WGDEVICE_A_IFNAME, WGDEVICE_A_PRIVATE_KEY, WGDEVICE_A_PUBLIC_KEY, WGDEVICE_A_FLAGS, WGDEVICE_A_LISTEN_PORT, WGDEVICE_A_FWMARK, WGDEVICE_A_PEERS, }; enum wgpeer_attribute { WGPEER_A_UNSPEC, WGPEER_A_PUBLIC_KEY, WGPEER_A_PRESHARED_KEY, WGPEER_A_FLAGS, WGPEER_A_ENDPOINT, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, WGPEER_A_LAST_HANDSHAKE_TIME, WGPEER_A_RX_BYTES, WGPEER_A_TX_BYTES, WGPEER_A_ALLOWEDIPS, WGPEER_A_PROTOCOL_VERSION, }; enum wgallowedip_attribute { WGALLOWEDIP_A_UNSPEC, WGALLOWEDIP_A_FAMILY, WGALLOWEDIP_A_IPADDR, WGALLOWEDIP_A_CIDR_MASK, }; static void netlink_wireguard_setup(void) { const char ifname_a[] = "wg0"; const char ifname_b[] = "wg1"; const char ifname_c[] = "wg2"; const char private_a[] = "\xa0\x5c\xa8\x4f\x6c\x9c\x8e\x38\x53\xe2\xfd\x7a\x70\xae\x0f\xb2\x0f\xa1\x52\x60\x0c\xb0\x08\x45\x17\x4f\x08\x07\x6f\x8d\x78\x43"; const char private_b[] = "\xb0\x80\x73\xe8\xd4\x4e\x91\xe3\xda\x92\x2c\x22\x43\x82\x44\xbb\x88\x5c\x69\xe2\x69\xc8\xe9\xd8\x35\xb1\x14\x29\x3a\x4d\xdc\x6e"; const char private_c[] = "\xa0\xcb\x87\x9a\x47\xf5\xbc\x64\x4c\x0e\x69\x3f\xa6\xd0\x31\xc7\x4a\x15\x53\xb6\xe9\x01\xb9\xff\x2f\x51\x8c\x78\x04\x2f\xb5\x42"; const char public_a[] = "\x97\x5c\x9d\x81\xc9\x83\xc8\x20\x9e\xe7\x81\x25\x4b\x89\x9f\x8e\xd9\x25\xae\x9f\x09\x23\xc2\x3c\x62\xf5\x3c\x57\xcd\xbf\x69\x1c"; const char public_b[] = "\xd1\x73\x28\x99\xf6\x11\xcd\x89\x94\x03\x4d\x7f\x41\x3d\xc9\x57\x63\x0e\x54\x93\xc2\x85\xac\xa4\x00\x65\xcb\x63\x11\xbe\x69\x6b"; const char public_c[] = "\xf4\x4d\xa3\x67\xa8\x8e\xe6\x56\x4f\x02\x02\x11\x45\x67\x27\x08\x2f\x5c\xeb\xee\x8b\x1b\xf5\xeb\x73\x37\x34\x1b\x45\x9b\x39\x22"; const uint16_t listen_a = 20001; const uint16_t listen_b = 20002; const uint16_t listen_c = 20003; const uint16_t af_inet = AF_INET; const uint16_t af_inet6 = AF_INET6; const struct sockaddr_in endpoint_b_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_b), .sin_addr = {htonl(INADDR_LOOPBACK)}}; const struct sockaddr_in endpoint_c_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_c), .sin_addr = {htonl(INADDR_LOOPBACK)}}; struct sockaddr_in6 endpoint_a_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_a)}; endpoint_a_v6.sin6_addr = in6addr_loopback; struct sockaddr_in6 endpoint_c_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_c)}; endpoint_c_v6.sin6_addr = in6addr_loopback; const struct in_addr first_half_v4 = {0}; const struct in_addr second_half_v4 = {(uint32_t)htonl(128 << 24)}; const struct in6_addr first_half_v6 = {{{0}}}; const struct in6_addr second_half_v6 = {{{0x80}}}; const uint8_t half_cidr = 1; const uint16_t persistent_keepalives[] = {1, 3, 7, 9, 14, 19}; struct genlmsghdr genlhdr = { .cmd = WG_CMD_SET_DEVICE, .version = 1}; int sock; int id, err; sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) { return; } id = netlink_query_family_id(&nlmsg, sock, WG_GENL_NAME, true); if (id == -1) goto error; netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_a, strlen(ifname_a) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_a, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_a, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[0], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v6, sizeof(endpoint_c_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[1], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_b, strlen(ifname_b) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_b, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_b, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[2], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v4, sizeof(endpoint_c_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[3], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_c, strlen(ifname_c) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_c, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_c, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[4], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[5], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } error: close(sock); } static void initialize_netdevices(void) { char netdevsim[16]; sprintf(netdevsim, "netdevsim%d", (int)procid); struct { const char* type; const char* dev; } devtypes[] = { {"ip6gretap", "ip6gretap0"}, {"bridge", "bridge0"}, {"vcan", "vcan0"}, {"bond", "bond0"}, {"team", "team0"}, {"dummy", "dummy0"}, {"nlmon", "nlmon0"}, {"caif", "caif0"}, {"batadv", "batadv0"}, {"vxcan", "vxcan1"}, {"veth", 0}, {"wireguard", "wg0"}, {"wireguard", "wg1"}, {"wireguard", "wg2"}, }; const char* devmasters[] = {"bridge", "bond", "team", "batadv"}; struct { const char* name; int macsize; bool noipv6; } devices[] = { {"lo", ETH_ALEN}, {"sit0", 0}, {"bridge0", ETH_ALEN}, {"vcan0", 0, true}, {"tunl0", 0}, {"gre0", 0}, {"gretap0", ETH_ALEN}, {"ip_vti0", 0}, {"ip6_vti0", 0}, {"ip6tnl0", 0}, {"ip6gre0", 0}, {"ip6gretap0", ETH_ALEN}, {"erspan0", ETH_ALEN}, {"bond0", ETH_ALEN}, {"veth0", ETH_ALEN}, {"veth1", ETH_ALEN}, {"team0", ETH_ALEN}, {"veth0_to_bridge", ETH_ALEN}, {"veth1_to_bridge", ETH_ALEN}, {"veth0_to_bond", ETH_ALEN}, {"veth1_to_bond", ETH_ALEN}, {"veth0_to_team", ETH_ALEN}, {"veth1_to_team", ETH_ALEN}, {"veth0_to_hsr", ETH_ALEN}, {"veth1_to_hsr", ETH_ALEN}, {"hsr0", 0}, {"dummy0", ETH_ALEN}, {"nlmon0", 0}, {"vxcan0", 0, true}, {"vxcan1", 0, true}, {"caif0", ETH_ALEN}, {"batadv0", ETH_ALEN}, {netdevsim, ETH_ALEN}, {"xfrm0", ETH_ALEN}, {"veth0_virt_wifi", ETH_ALEN}, {"veth1_virt_wifi", ETH_ALEN}, {"virt_wifi0", ETH_ALEN}, {"veth0_vlan", ETH_ALEN}, {"veth1_vlan", ETH_ALEN}, {"vlan0", ETH_ALEN}, {"vlan1", ETH_ALEN}, {"macvlan0", ETH_ALEN}, {"macvlan1", ETH_ALEN}, {"ipvlan0", ETH_ALEN}, {"ipvlan1", ETH_ALEN}, {"veth0_macvtap", ETH_ALEN}, {"veth1_macvtap", ETH_ALEN}, {"macvtap0", ETH_ALEN}, {"macsec0", ETH_ALEN}, {"veth0_to_batadv", ETH_ALEN}, {"veth1_to_batadv", ETH_ALEN}, {"batadv_slave_0", ETH_ALEN}, {"batadv_slave_1", ETH_ALEN}, {"geneve0", ETH_ALEN}, {"geneve1", ETH_ALEN}, {"wg0", 0}, {"wg1", 0}, {"wg2", 0}, }; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) netlink_add_device(&nlmsg, sock, devtypes[i].type, devtypes[i].dev); for (i = 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) { char master[32], slave0[32], veth0[32], slave1[32], veth1[32]; sprintf(slave0, "%s_slave_0", devmasters[i]); sprintf(veth0, "veth0_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave0, veth0); sprintf(slave1, "%s_slave_1", devmasters[i]); sprintf(veth1, "veth1_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave1, veth1); sprintf(master, "%s0", devmasters[i]); netlink_device_change(&nlmsg, sock, slave0, false, master, 0, 0, NULL); netlink_device_change(&nlmsg, sock, slave1, false, master, 0, 0, NULL); } netlink_add_xfrm(&nlmsg, sock, "xfrm0"); netlink_device_change(&nlmsg, sock, "bridge_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "bridge_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "hsr_slave_0", "veth0_to_hsr"); netlink_add_veth(&nlmsg, sock, "hsr_slave_1", "veth1_to_hsr"); netlink_add_hsr(&nlmsg, sock, "hsr0", "hsr_slave_0", "hsr_slave_1"); netlink_device_change(&nlmsg, sock, "hsr_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "hsr_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "veth0_virt_wifi", "veth1_virt_wifi"); netlink_add_linked(&nlmsg, sock, "virt_wifi", "virt_wifi0", "veth1_virt_wifi"); netlink_add_veth(&nlmsg, sock, "veth0_vlan", "veth1_vlan"); netlink_add_vlan(&nlmsg, sock, "vlan0", "veth0_vlan", 0, htons(ETH_P_8021Q)); netlink_add_vlan(&nlmsg, sock, "vlan1", "veth0_vlan", 1, htons(ETH_P_8021AD)); netlink_add_macvlan(&nlmsg, sock, "macvlan0", "veth1_vlan"); netlink_add_macvlan(&nlmsg, sock, "macvlan1", "veth1_vlan"); netlink_add_ipvlan(&nlmsg, sock, "ipvlan0", "veth0_vlan", IPVLAN_MODE_L2, 0); netlink_add_ipvlan(&nlmsg, sock, "ipvlan1", "veth0_vlan", IPVLAN_MODE_L3S, IPVLAN_F_VEPA); netlink_add_veth(&nlmsg, sock, "veth0_macvtap", "veth1_macvtap"); netlink_add_linked(&nlmsg, sock, "macvtap", "macvtap0", "veth0_macvtap"); netlink_add_linked(&nlmsg, sock, "macsec", "macsec0", "veth1_macvtap"); char addr[32]; sprintf(addr, DEV_IPV4, 14 + 10); struct in_addr geneve_addr4; if (inet_pton(AF_INET, addr, &geneve_addr4) <= 0) exit(1); struct in6_addr geneve_addr6; if (inet_pton(AF_INET6, "fc00::01", &geneve_addr6) <= 0) exit(1); netlink_add_geneve(&nlmsg, sock, "geneve0", 0, &geneve_addr4, 0); netlink_add_geneve(&nlmsg, sock, "geneve1", 1, 0, &geneve_addr6); netdevsim_add((int)procid, 4); netlink_wireguard_setup(); for (i = 0; i < sizeof(devices) / (sizeof(devices[0])); i++) { char addr[32]; sprintf(addr, DEV_IPV4, i + 10); netlink_add_addr4(&nlmsg, sock, devices[i].name, addr); if (!devices[i].noipv6) { sprintf(addr, DEV_IPV6, i + 10); netlink_add_addr6(&nlmsg, sock, devices[i].name, addr); } uint64_t macaddr = DEV_MAC + ((i + 10ull) << 40); netlink_device_change(&nlmsg, sock, devices[i].name, true, 0, &macaddr, devices[i].macsize, NULL); } close(sock); } static void initialize_netdevices_init(void) { int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); struct { const char* type; int macsize; bool noipv6; bool noup; } devtypes[] = { {"nr", 7, true}, {"rose", 5, true, true}, }; unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) { char dev[32], addr[32]; sprintf(dev, "%s%d", devtypes[i].type, (int)procid); sprintf(addr, "172.30.%d.%d", i, (int)procid + 1); netlink_add_addr4(&nlmsg, sock, dev, addr); if (!devtypes[i].noipv6) { sprintf(addr, "fe88::%02x:%02x", i, (int)procid + 1); netlink_add_addr6(&nlmsg, sock, dev, addr); } int macsize = devtypes[i].macsize; uint64_t macaddr = 0xbbbbbb + ((unsigned long long)i << (8 * (macsize - 2))) + (procid << (8 * (macsize - 1))); netlink_device_change(&nlmsg, sock, dev, !devtypes[i].noup, 0, &macaddr, macsize, NULL); } close(sock); } static int read_tun(char* data, int size) { if (tunfd < 0) return -1; int rv = read(tunfd, data, size); if (rv < 0) { if (errno == EAGAIN || errno == EBADF || errno == EBADFD) return -1; exit(1); } return rv; } static void flush_tun() { char data[1000]; while (read_tun(&data[0], sizeof(data)) != -1) { } } #define MAX_FDS 30 #define BTPROTO_HCI 1 #define ACL_LINK 1 #define SCAN_PAGE 2 typedef struct { uint8_t b[6]; } __attribute__((packed)) bdaddr_t; #define HCI_COMMAND_PKT 1 #define HCI_EVENT_PKT 4 #define HCI_VENDOR_PKT 0xff struct hci_command_hdr { uint16_t opcode; uint8_t plen; } __attribute__((packed)); struct hci_event_hdr { uint8_t evt; uint8_t plen; } __attribute__((packed)); #define HCI_EV_CONN_COMPLETE 0x03 struct hci_ev_conn_complete { uint8_t status; uint16_t handle; bdaddr_t bdaddr; uint8_t link_type; uint8_t encr_mode; } __attribute__((packed)); #define HCI_EV_CONN_REQUEST 0x04 struct hci_ev_conn_request { bdaddr_t bdaddr; uint8_t dev_class[3]; uint8_t link_type; } __attribute__((packed)); #define HCI_EV_REMOTE_FEATURES 0x0b struct hci_ev_remote_features { uint8_t status; uint16_t handle; uint8_t features[8]; } __attribute__((packed)); #define HCI_EV_CMD_COMPLETE 0x0e struct hci_ev_cmd_complete { uint8_t ncmd; uint16_t opcode; } __attribute__((packed)); #define HCI_OP_WRITE_SCAN_ENABLE 0x0c1a #define HCI_OP_READ_BUFFER_SIZE 0x1005 struct hci_rp_read_buffer_size { uint8_t status; uint16_t acl_mtu; uint8_t sco_mtu; uint16_t acl_max_pkt; uint16_t sco_max_pkt; } __attribute__((packed)); #define HCI_OP_READ_BD_ADDR 0x1009 struct hci_rp_read_bd_addr { uint8_t status; bdaddr_t bdaddr; } __attribute__((packed)); #define HCI_EV_LE_META 0x3e struct hci_ev_le_meta { uint8_t subevent; } __attribute__((packed)); #define HCI_EV_LE_CONN_COMPLETE 0x01 struct hci_ev_le_conn_complete { uint8_t status; uint16_t handle; uint8_t role; uint8_t bdaddr_type; bdaddr_t bdaddr; uint16_t interval; uint16_t latency; uint16_t supervision_timeout; uint8_t clk_accurancy; } __attribute__((packed)); struct hci_dev_req { uint16_t dev_id; uint32_t dev_opt; }; struct vhci_vendor_pkt_request { uint8_t type; uint8_t opcode; } __attribute__((packed)); struct vhci_pkt { uint8_t type; union { struct { uint8_t opcode; uint16_t id; } __attribute__((packed)) vendor_pkt; struct hci_command_hdr command_hdr; }; } __attribute__((packed)); #define HCIDEVUP _IOW('H', 201, int) #define HCISETSCAN _IOW('H', 221, int) static int vhci_fd = -1; static void rfkill_unblock_all() { int fd = open("/dev/rfkill", O_WRONLY); if (fd < 0) exit(1); struct rfkill_event event = {0}; event.idx = 0; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; event.soft = 0; event.hard = 0; if (write(fd, &event, sizeof(event)) < 0) exit(1); close(fd); } static void hci_send_event_packet(int fd, uint8_t evt, void* data, size_t data_len) { struct iovec iv[3]; struct hci_event_hdr hdr; hdr.evt = evt; hdr.plen = data_len; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = data; iv[2].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static void hci_send_event_cmd_complete(int fd, uint16_t opcode, void* data, size_t data_len) { struct iovec iv[4]; struct hci_event_hdr hdr; hdr.evt = HCI_EV_CMD_COMPLETE; hdr.plen = sizeof(struct hci_ev_cmd_complete) + data_len; struct hci_ev_cmd_complete evt_hdr; evt_hdr.ncmd = 1; evt_hdr.opcode = opcode; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = &evt_hdr; iv[2].iov_len = sizeof(evt_hdr); iv[3].iov_base = data; iv[3].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static bool process_command_pkt(int fd, char* buf, ssize_t buf_size) { struct hci_command_hdr* hdr = (struct hci_command_hdr*)buf; if (buf_size < (ssize_t)sizeof(struct hci_command_hdr) || hdr->plen != buf_size - sizeof(struct hci_command_hdr)) exit(1); switch (hdr->opcode) { case HCI_OP_WRITE_SCAN_ENABLE: { uint8_t status = 0; hci_send_event_cmd_complete(fd, hdr->opcode, &status, sizeof(status)); return true; } case HCI_OP_READ_BD_ADDR: { struct hci_rp_read_bd_addr rp = {0}; rp.status = 0; memset(&rp.bdaddr, 0xaa, 6); hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } case HCI_OP_READ_BUFFER_SIZE: { struct hci_rp_read_buffer_size rp = {0}; rp.status = 0; rp.acl_mtu = 1021; rp.sco_mtu = 96; rp.acl_max_pkt = 4; rp.sco_max_pkt = 6; hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } } char dummy[0xf9] = {0}; hci_send_event_cmd_complete(fd, hdr->opcode, dummy, sizeof(dummy)); return false; } static void* event_thread(void* arg) { while (1) { char buf[1024] = {0}; ssize_t buf_size = read(vhci_fd, buf, sizeof(buf)); if (buf_size < 0) exit(1); if (buf_size > 0 && buf[0] == HCI_COMMAND_PKT) { if (process_command_pkt(vhci_fd, buf + 1, buf_size - 1)) break; } } return NULL; } #define HCI_HANDLE_1 200 #define HCI_HANDLE_2 201 #define HCI_PRIMARY 0 #define HCI_OP_RESET 0x0c03 static void initialize_vhci() { int hci_sock = socket(AF_BLUETOOTH, SOCK_RAW, BTPROTO_HCI); if (hci_sock < 0) exit(1); vhci_fd = open("/dev/vhci", O_RDWR); if (vhci_fd == -1) exit(1); const int kVhciFd = 202; if (dup2(vhci_fd, kVhciFd) < 0) exit(1); close(vhci_fd); vhci_fd = kVhciFd; struct vhci_vendor_pkt_request vendor_pkt_req = {HCI_VENDOR_PKT, HCI_PRIMARY}; if (write(vhci_fd, &vendor_pkt_req, sizeof(vendor_pkt_req)) != sizeof(vendor_pkt_req)) exit(1); struct vhci_pkt vhci_pkt; if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); if (vhci_pkt.type == HCI_COMMAND_PKT && vhci_pkt.command_hdr.opcode == HCI_OP_RESET) { char response[1] = {0}; hci_send_event_cmd_complete(vhci_fd, HCI_OP_RESET, response, sizeof(response)); if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); } if (vhci_pkt.type != HCI_VENDOR_PKT) exit(1); int dev_id = vhci_pkt.vendor_pkt.id; pthread_t th; if (pthread_create(&th, NULL, event_thread, NULL)) exit(1); int ret = ioctl(hci_sock, HCIDEVUP, dev_id); if (ret) { if (errno == ERFKILL) { rfkill_unblock_all(); ret = ioctl(hci_sock, HCIDEVUP, dev_id); } if (ret && errno != EALREADY) exit(1); } struct hci_dev_req dr = {0}; dr.dev_id = dev_id; dr.dev_opt = SCAN_PAGE; if (ioctl(hci_sock, HCISETSCAN, &dr)) exit(1); struct hci_ev_conn_request request; memset(&request, 0, sizeof(request)); memset(&request.bdaddr, 0xaa, 6); *(uint8_t*)&request.bdaddr.b[5] = 0x10; request.link_type = ACL_LINK; hci_send_event_packet(vhci_fd, HCI_EV_CONN_REQUEST, &request, sizeof(request)); struct hci_ev_conn_complete complete; memset(&complete, 0, sizeof(complete)); complete.status = 0; complete.handle = HCI_HANDLE_1; memset(&complete.bdaddr, 0xaa, 6); *(uint8_t*)&complete.bdaddr.b[5] = 0x10; complete.link_type = ACL_LINK; complete.encr_mode = 0; hci_send_event_packet(vhci_fd, HCI_EV_CONN_COMPLETE, &complete, sizeof(complete)); struct hci_ev_remote_features features; memset(&features, 0, sizeof(features)); features.status = 0; features.handle = HCI_HANDLE_1; hci_send_event_packet(vhci_fd, HCI_EV_REMOTE_FEATURES, &features, sizeof(features)); struct { struct hci_ev_le_meta le_meta; struct hci_ev_le_conn_complete le_conn; } le_conn; memset(&le_conn, 0, sizeof(le_conn)); le_conn.le_meta.subevent = HCI_EV_LE_CONN_COMPLETE; memset(&le_conn.le_conn.bdaddr, 0xaa, 6); *(uint8_t*)&le_conn.le_conn.bdaddr.b[5] = 0x11; le_conn.le_conn.role = 1; le_conn.le_conn.handle = HCI_HANDLE_2; hci_send_event_packet(vhci_fd, HCI_EV_LE_META, &le_conn, sizeof(le_conn)); pthread_join(th, NULL); close(hci_sock); } #define XT_TABLE_SIZE 1536 #define XT_MAX_ENTRIES 10 struct xt_counters { uint64_t pcnt, bcnt; }; struct ipt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_entries; unsigned int size; }; struct ipt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_table_desc { const char* name; struct ipt_getinfo info; struct ipt_replace replace; }; static struct ipt_table_desc ipv4_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; static struct ipt_table_desc ipv6_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; #define IPT_BASE_CTL 64 #define IPT_SO_SET_REPLACE (IPT_BASE_CTL) #define IPT_SO_GET_INFO (IPT_BASE_CTL) #define IPT_SO_GET_ENTRIES (IPT_BASE_CTL + 1) struct arpt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_entries; unsigned int size; }; struct arpt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_table_desc { const char* name; struct arpt_getinfo info; struct arpt_replace replace; }; static struct arpt_table_desc arpt_tables[] = { {.name = "filter"}, }; #define ARPT_BASE_CTL 96 #define ARPT_SO_SET_REPLACE (ARPT_BASE_CTL) #define ARPT_SO_GET_INFO (ARPT_BASE_CTL) #define ARPT_SO_GET_ENTRIES (ARPT_BASE_CTL + 1) static void checkpoint_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; if (table->info.valid_hooks == 0) continue; struct ipt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, level, IPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_arptables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_arptables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; if (table->info.valid_hooks == 0) continue; struct arpt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } else { } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, SOL_IP, ARPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } #define NF_BR_NUMHOOKS 6 #define EBT_TABLE_MAXNAMELEN 32 #define EBT_CHAIN_MAXNAMELEN 32 #define EBT_BASE_CTL 128 #define EBT_SO_SET_ENTRIES (EBT_BASE_CTL) #define EBT_SO_GET_INFO (EBT_BASE_CTL) #define EBT_SO_GET_ENTRIES (EBT_SO_GET_INFO + 1) #define EBT_SO_GET_INIT_INFO (EBT_SO_GET_ENTRIES + 1) #define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO + 1) struct ebt_replace { char name[EBT_TABLE_MAXNAMELEN]; unsigned int valid_hooks; unsigned int nentries; unsigned int entries_size; struct ebt_entries* hook_entry[NF_BR_NUMHOOKS]; unsigned int num_counters; struct ebt_counter* counters; char* entries; }; struct ebt_entries { unsigned int distinguisher; char name[EBT_CHAIN_MAXNAMELEN]; unsigned int counter_offset; int policy; unsigned int nentries; char data[0] __attribute__((aligned(__alignof__(struct ebt_replace)))); }; struct ebt_table_desc { const char* name; struct ebt_replace replace; char entrytable[XT_TABLE_SIZE]; }; static struct ebt_table_desc ebt_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "broute"}, }; static void checkpoint_ebtables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (size_t i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_INFO, &table->replace, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->replace.entries_size > sizeof(table->entrytable)) exit(1); table->replace.num_counters = 0; table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_ENTRIES, &table->replace, &optlen)) exit(1); } close(fd); } static void reset_ebtables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; if (table->replace.valid_hooks == 0) continue; struct ebt_replace replace; memset(&replace, 0, sizeof(replace)); strcpy(replace.name, table->name); socklen_t optlen = sizeof(replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INFO, &replace, &optlen)) exit(1); replace.num_counters = 0; table->replace.entries = 0; for (unsigned h = 0; h < NF_BR_NUMHOOKS; h++) table->replace.hook_entry[h] = 0; if (memcmp(&table->replace, &replace, sizeof(table->replace)) == 0) { char entrytable[XT_TABLE_SIZE]; memset(&entrytable, 0, sizeof(entrytable)); replace.entries = entrytable; optlen = sizeof(replace) + replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_ENTRIES, &replace, &optlen)) exit(1); if (memcmp(table->entrytable, entrytable, replace.entries_size) == 0) continue; } for (unsigned j = 0, h = 0; h < NF_BR_NUMHOOKS; h++) { if (table->replace.valid_hooks & (1 << h)) { table->replace.hook_entry[h] = (struct ebt_entries*)table->entrytable + j; j++; } } table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (setsockopt(fd, SOL_IP, EBT_SO_SET_ENTRIES, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_net_namespace(void) { checkpoint_ebtables(); checkpoint_arptables(); checkpoint_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); checkpoint_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void reset_net_namespace(void) { reset_ebtables(); reset_arptables(); reset_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); reset_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void mount_cgroups(const char* dir, const char** controllers, int count) { if (mkdir(dir, 0777)) { return; } char enabled[128] = {0}; int i = 0; for (; i < count; i++) { if (mount("none", dir, "cgroup", 0, controllers[i])) { continue; } umount(dir); strcat(enabled, ","); strcat(enabled, controllers[i]); } if (enabled[0] == 0) { if (rmdir(dir) && errno != EBUSY) exit(1); return; } if (mount("none", dir, "cgroup", 0, enabled + 1)) { if (rmdir(dir) && errno != EBUSY) exit(1); } if (chmod(dir, 0777)) { } } static void mount_cgroups2(const char** controllers, int count) { if (mkdir("/syzcgroup/unified", 0777)) { return; } if (mount("none", "/syzcgroup/unified", "cgroup2", 0, NULL)) { if (rmdir("/syzcgroup/unified") && errno != EBUSY) exit(1); return; } if (chmod("/syzcgroup/unified", 0777)) { } int control = open("/syzcgroup/unified/cgroup.subtree_control", O_WRONLY); if (control == -1) return; int i; for (i = 0; i < count; i++) if (write(control, controllers[i], strlen(controllers[i])) < 0) { } close(control); } static void setup_cgroups() { const char* unified_controllers[] = {"+cpu", "+io", "+pids"}; const char* net_controllers[] = {"net", "net_prio", "devices", "blkio", "freezer"}; const char* cpu_controllers[] = {"cpuset", "cpuacct", "hugetlb", "rlimit", "memory"}; if (mkdir("/syzcgroup", 0777)) { return; } mount_cgroups2(unified_controllers, sizeof(unified_controllers) / sizeof(unified_controllers[0])); mount_cgroups("/syzcgroup/net", net_controllers, sizeof(net_controllers) / sizeof(net_controllers[0])); mount_cgroups("/syzcgroup/cpu", cpu_controllers, sizeof(cpu_controllers) / sizeof(cpu_controllers[0])); write_file("/syzcgroup/cpu/cgroup.clone_children", "1"); write_file("/syzcgroup/cpu/cpuset.memory_pressure_enabled", "1"); } static void setup_cgroups_loop() { int pid = getpid(); char file[128]; char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/pids.max", cgroupdir); write_file(file, "32"); snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(file, sizeof(file), "%s/memory.soft_limit_in_bytes", cgroupdir); write_file(file, "%d", 299 << 20); snprintf(file, sizeof(file), "%s/memory.limit_in_bytes", cgroupdir); write_file(file, "%d", 300 << 20); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); } static void setup_cgroups_test() { char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (symlink(cgroupdir, "./cgroup")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.cpu")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.net")) { } } static void initialize_cgroups() { if (mkdir("./syz-tmp/newroot/syzcgroup", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/unified", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/cpu", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/net", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/syzcgroup/unified", "./syz-tmp/newroot/syzcgroup/unified", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/cpu", "./syz-tmp/newroot/syzcgroup/cpu", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/net", "./syz-tmp/newroot/syzcgroup/net", NULL, bind_mount_flags, NULL)) { } } static void setup_gadgetfs(); static void setup_binderfs(); static void setup_fusectl(); static void sandbox_common_mount_tmpfs(void) { write_file("/proc/sys/fs/mount-max", "100000"); if (mkdir("./syz-tmp", 0777)) exit(1); if (mount("", "./syz-tmp", "tmpfs", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot", 0777)) exit(1); if (mkdir("./syz-tmp/newroot/dev", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/dev", "./syz-tmp/newroot/dev", NULL, bind_mount_flags, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/proc", 0700)) exit(1); if (mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/selinux", 0700)) exit(1); const char* selinux_path = "./syz-tmp/newroot/selinux"; if (mount("/selinux", selinux_path, NULL, bind_mount_flags, NULL)) { if (errno != ENOENT) exit(1); if (mount("/sys/fs/selinux", selinux_path, NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); } if (mkdir("./syz-tmp/newroot/sys", 0700)) exit(1); if (mount("/sys", "./syz-tmp/newroot/sys", 0, bind_mount_flags, NULL)) exit(1); if (mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mkdir("./syz-tmp/newroot/syz-inputs", 0700)) exit(1); if (mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, bind_mount_flags | MS_RDONLY, NULL) && errno != ENOENT) exit(1); initialize_cgroups(); if (mkdir("./syz-tmp/pivot", 0777)) exit(1); if (syscall(SYS_pivot_root, "./syz-tmp", "./syz-tmp/pivot")) { if (chdir("./syz-tmp")) exit(1); } else { if (chdir("/")) exit(1); if (umount2("./pivot", MNT_DETACH)) exit(1); } if (chroot("./newroot")) exit(1); if (chdir("/")) exit(1); setup_gadgetfs(); setup_binderfs(); setup_fusectl(); } static void setup_gadgetfs() { if (mkdir("/dev/gadgetfs", 0777)) { } if (mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL)) { } } static void setup_fusectl() { if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) { } } static void setup_binderfs() { if (mkdir("/dev/binderfs", 0777)) { } if (mount("binder", "/dev/binderfs", "binder", 0, NULL)) { } } static void loop(); static void sandbox_common() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); if (getppid() == 1) exit(1); struct rlimit rlim; rlim.rlim_cur = rlim.rlim_max = (200 << 20); setrlimit(RLIMIT_AS, &rlim); rlim.rlim_cur = rlim.rlim_max = 32 << 20; setrlimit(RLIMIT_MEMLOCK, &rlim); rlim.rlim_cur = rlim.rlim_max = 136 << 20; setrlimit(RLIMIT_FSIZE, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_STACK, &rlim); rlim.rlim_cur = rlim.rlim_max = 128 << 20; setrlimit(RLIMIT_CORE, &rlim); rlim.rlim_cur = rlim.rlim_max = 256; setrlimit(RLIMIT_NOFILE, &rlim); if (unshare(CLONE_NEWNS)) { } if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, NULL)) { } if (unshare(CLONE_NEWIPC)) { } if (unshare(0x02000000)) { } if (unshare(CLONE_NEWUTS)) { } if (unshare(CLONE_SYSVSEM)) { } typedef struct { const char* name; const char* value; } sysctl_t; static const sysctl_t sysctls[] = { {"/proc/sys/kernel/shmmax", "16777216"}, {"/proc/sys/kernel/shmall", "536870912"}, {"/proc/sys/kernel/shmmni", "1024"}, {"/proc/sys/kernel/msgmax", "8192"}, {"/proc/sys/kernel/msgmni", "1024"}, {"/proc/sys/kernel/msgmnb", "1024"}, {"/proc/sys/kernel/sem", "1024 1048576 500 1024"}, }; unsigned i; for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++) write_file(sysctls[i].name, sysctls[i].value); } static int wait_for_loop(int pid) { if (pid < 0) exit(1); int status = 0; while (waitpid(-1, &status, __WALL) != pid) { } return WEXITSTATUS(status); } static void drop_caps(void) { struct __user_cap_header_struct cap_hdr = {}; struct __user_cap_data_struct cap_data[2] = {}; cap_hdr.version = _LINUX_CAPABILITY_VERSION_3; cap_hdr.pid = getpid(); if (syscall(SYS_capget, &cap_hdr, &cap_data)) exit(1); const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE); cap_data[0].effective &= ~drop; cap_data[0].permitted &= ~drop; cap_data[0].inheritable &= ~drop; if (syscall(SYS_capset, &cap_hdr, &cap_data)) exit(1); } static int do_sandbox_none(void) { if (unshare(CLONE_NEWPID)) { } int pid = fork(); if (pid != 0) return wait_for_loop(pid); initialize_vhci(); sandbox_common(); drop_caps(); initialize_netdevices_init(); if (unshare(CLONE_NEWNET)) { } write_file("/proc/sys/net/ipv4/ping_group_range", "0 65535"); initialize_tun(); initialize_netdevices(); initialize_wifi_devices(); sandbox_common_mount_tmpfs(); loop(); exit(1); } #define FS_IOC_SETFLAGS _IOW('f', 2, long) static void remove_dir(const char* dir) { int iter = 0; DIR* dp = 0; const int umount_flags = MNT_FORCE | UMOUNT_NOFOLLOW; retry: while (umount2(dir, umount_flags) == 0) { } dp = opendir(dir); if (dp == NULL) { if (errno == EMFILE) { exit(1); } exit(1); } struct dirent* ep = 0; while ((ep = readdir(dp))) { if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) continue; char filename[FILENAME_MAX]; snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); while (umount2(filename, umount_flags) == 0) { } struct stat st; if (lstat(filename, &st)) exit(1); if (S_ISDIR(st.st_mode)) { remove_dir(filename); continue; } int i; for (i = 0;; i++) { if (unlink(filename) == 0) break; if (errno == EPERM) { int fd = open(filename, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno != EBUSY || i > 100) exit(1); if (umount2(filename, umount_flags)) exit(1); } } closedir(dp); for (int i = 0;; i++) { if (rmdir(dir) == 0) break; if (i < 100) { if (errno == EPERM) { int fd = open(dir, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno == EBUSY) { if (umount2(dir, umount_flags)) exit(1); continue; } if (errno == ENOTEMPTY) { if (iter < 100) { iter++; goto retry; } } } exit(1); } } static void kill_and_wait(int pid, int* status) { kill(-pid, SIGKILL); kill(pid, SIGKILL); for (int i = 0; i < 100; i++) { if (waitpid(-1, status, WNOHANG | __WALL) == pid) return; usleep(1000); } DIR* dir = opendir("/sys/fs/fuse/connections"); if (dir) { for (;;) { struct dirent* ent = readdir(dir); if (!ent) break; if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) continue; char abort[300]; snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", ent->d_name); int fd = open(abort, O_WRONLY); if (fd == -1) { continue; } if (write(fd, abort, 1) < 0) { } close(fd); } closedir(dir); } else { } while (waitpid(-1, status, __WALL) != pid) { } } static void setup_loop() { setup_cgroups_loop(); checkpoint_net_namespace(); } static void reset_loop() { reset_net_namespace(); } static void setup_test() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); setpgrp(); setup_cgroups_test(); write_file("/proc/self/oom_score_adj", "1000"); flush_tun(); if (symlink("/dev/binderfs", "./binderfs")) { } } static void close_fds() { for (int fd = 3; fd < MAX_FDS; fd++) close(fd); } static const char* setup_binfmt_misc() { if (mount(0, "/proc/sys/fs/binfmt_misc", "binfmt_misc", 0, 0) && errno != EBUSY) { return NULL; } if (!write_file("/proc/sys/fs/binfmt_misc/register", ":syz0:M:0:\x01::./file0:") || !write_file("/proc/sys/fs/binfmt_misc/register", ":syz1:M:1:\x02::./file0:POC")) return "write(/proc/sys/fs/binfmt_misc/register) failed"; return NULL; } static const char* setup_usb() { if (chmod("/dev/raw-gadget", 0666)) return "failed to chmod /dev/raw-gadget"; return NULL; } static void setup_sysctl() { int cad_pid = fork(); if (cad_pid < 0) exit(1); if (cad_pid == 0) { for (;;) sleep(100); } char tmppid[32]; snprintf(tmppid, sizeof(tmppid), "%d", cad_pid); struct { const char* name; const char* data; } files[] = { {"/sys/kernel/debug/x86/nmi_longest_ns", "10000000000"}, {"/proc/sys/kernel/hung_task_check_interval_secs", "20"}, {"/proc/sys/net/core/bpf_jit_kallsyms", "1"}, {"/proc/sys/net/core/bpf_jit_harden", "0"}, {"/proc/sys/kernel/kptr_restrict", "0"}, {"/proc/sys/kernel/softlockup_all_cpu_backtrace", "1"}, {"/proc/sys/fs/mount-max", "100"}, {"/proc/sys/vm/oom_dump_tasks", "0"}, {"/proc/sys/debug/exception-trace", "0"}, {"/proc/sys/kernel/printk", "7 4 1 3"}, {"/proc/sys/kernel/keys/gc_delay", "1"}, {"/proc/sys/vm/oom_kill_allocating_task", "1"}, {"/proc/sys/kernel/ctrl-alt-del", "0"}, {"/proc/sys/kernel/cad_pid", tmppid}, }; for (size_t i = 0; i < sizeof(files) / sizeof(files[0]); i++) { if (!write_file(files[i].name, files[i].data)) { } } kill(cad_pid, SIGKILL); while (waitpid(cad_pid, NULL, 0) != cad_pid) ; } #define NL802154_CMD_SET_SHORT_ADDR 11 #define NL802154_ATTR_IFINDEX 3 #define NL802154_ATTR_SHORT_ADDR 10 static const char* setup_802154() { const char* error = NULL; int sock_generic = -1; int sock_route = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock_route == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) failed"; goto fail; } sock_generic = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock_generic == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) failed"; goto fail; } { int nl802154_family_id = netlink_query_family_id(&nlmsg, sock_generic, "nl802154", true); if (nl802154_family_id < 0) { error = "netlink_query_family_id failed"; goto fail; } for (int i = 0; i < 2; i++) { char devname[] = "wpan0"; devname[strlen(devname) - 1] += i; uint64_t hwaddr = 0xaaaaaaaaaaaa0002 + (i << 8); uint16_t shortaddr = 0xaaa0 + i; int ifindex = if_nametoindex(devname); struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL802154_CMD_SET_SHORT_ADDR; netlink_init(&nlmsg, nl802154_family_id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, NL802154_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(&nlmsg, NL802154_ATTR_SHORT_ADDR, &shortaddr, sizeof(shortaddr)); if (netlink_send(&nlmsg, sock_generic) < 0) { error = "NL802154_CMD_SET_SHORT_ADDR failed"; goto fail; } netlink_device_change(&nlmsg, sock_route, devname, true, 0, &hwaddr, sizeof(hwaddr), 0); if (i == 0) { netlink_add_device_impl(&nlmsg, "lowpan", "lowpan0", false); netlink_done(&nlmsg); netlink_attr(&nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); if (netlink_send(&nlmsg, sock_route) < 0) { error = "netlink: adding device lowpan0 type lowpan link wpan0"; goto fail; } } } } fail: close(sock_route); close(sock_generic); return error; } #define SWAP_FILE "./swap-file" #define SWAP_FILE_SIZE (128 * 1000 * 1000) static const char* setup_swap() { swapoff(SWAP_FILE); unlink(SWAP_FILE); int fd = open(SWAP_FILE, O_CREAT | O_WRONLY | O_CLOEXEC, 0600); if (fd == -1) return "swap file open failed"; fallocate(fd, FALLOC_FL_ZERO_RANGE, 0, SWAP_FILE_SIZE); close(fd); char cmdline[64]; sprintf(cmdline, "mkswap %s", SWAP_FILE); if (runcmdline(cmdline)) return "mkswap failed"; if (swapon(SWAP_FILE, SWAP_FLAG_PREFER) == 1) return "swapon failed"; return NULL; } struct thread_t { int created, call; event_t ready, done; }; static struct thread_t threads[16]; static void execute_call(int call); static int running; static void* thr(void* arg) { struct thread_t* th = (struct thread_t*)arg; for (;;) { event_wait(&th->ready); event_reset(&th->ready); execute_call(th->call); __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); event_set(&th->done); } return 0; } static void execute_one(void) { if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } int i, call, thread; for (call = 0; call < 1; call++) { for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); thread++) { struct thread_t* th = &threads[thread]; if (!th->created) { th->created = 1; event_init(&th->ready); event_init(&th->done); event_set(&th->done); thread_start(thr, th); } if (!event_isset(&th->done)) continue; event_reset(&th->done); th->call = call; __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); event_set(&th->ready); event_timedwait(&th->done, 50); break; } } for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) sleep_ms(1); close_fds(); } static void execute_one(void); #define WAIT_FLAGS __WALL static void loop(void) { setup_loop(); int iter = 0; for (;; iter++) { char cwdbuf[32]; sprintf(cwdbuf, "./%d", iter); if (mkdir(cwdbuf, 0777)) exit(1); reset_loop(); int pid = fork(); if (pid < 0) exit(1); if (pid == 0) { if (chdir(cwdbuf)) exit(1); setup_test(); execute_one(); exit(0); } int status = 0; uint64_t start = current_time_ms(); for (;;) { sleep_ms(10); if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) break; if (current_time_ms() - start < 5000) continue; kill_and_wait(pid, &status); break; } remove_dir(cwdbuf); } } void execute_call(int call) { switch (call) { case 0: // socket$kcm arguments: [ // domain: const = 0x2c (8 bytes) // type: kcm_socket_type = 0x3 (8 bytes) // proto: const = 0x0 (4 bytes) // ] // returns sock_kcm syscall(__NR_socket, /*domain=*/0x2cul, /*type=SOCK_DGRAM|0x1*/3ul, /*proto=*/0); break; } } int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); setup_sysctl(); setup_cgroups(); const char* reason; (void)reason; if ((reason = setup_binfmt_misc())) printf("the reproducer may not work as expected: binfmt_misc setup failed: %s\n", reason); if ((reason = setup_usb())) printf("the reproducer may not work as expected: USB injection setup failed: %s\n", reason); if ((reason = setup_802154())) printf("the reproducer may not work as expected: 802154 injection setup failed: %s\n", reason); if ((reason = setup_swap())) printf("the reproducer may not work as expected: swap setup failed: %s\n", reason); install_segv_handler(); for (procid = 0; procid < 3; procid++) { if (fork() == 0) { use_temporary_dir(); do_sandbox_none(); } } sleep(1000000); return 0; } compiler invocation: gcc [-o /tmp/syz-executor2863446893 -DGOOS_linux=1 -DGOARCH_amd64=1 -DHOSTGOOS_linux=1 -x c - -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -fpermissive -w] 2025/08/06 19:09:42 start reproducing 'WARNING in xsk_create (full)' 2025/08/06 19:09:42 "WARNING in xsk_create": saved crash log into 1754507382.crash.log 2025/08/06 19:09:48 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:10:02 new: boot error: can't ssh into the instance 2025/08/06 19:10:22 runner 6 connected 2025/08/06 19:10:41 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:11:01 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:11:05 new: boot error: can't ssh into the instance 2025/08/06 19:11:09 reproducing crash 'no output/lost connection': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:11:16 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:11:19 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:11:29 runner 4 connected 2025/08/06 19:11:53 runner 7 connected 2025/08/06 19:12:04 runner 5 connected 2025/08/06 19:12:18 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:12:25 new: boot error: can't ssh into the instance 2025/08/06 19:12:38 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:12:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 15, "corpus": 9580, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 9381, "coverage": 71030, "distributor delayed": 20733, "distributor undelayed": 20733, "distributor violated": 929, "exec candidate": 22555, "exec collide": 23136, "exec fuzz": 43872, "exec gen": 2272, "exec hints": 7270, "exec inject": 0, "exec minimize": 1440, "exec retries": 172, "exec seeds": 147, "exec smash": 1233, "exec total [base]": 169825, "exec total [new]": 172556, "exec triage": 31527, "executor restarts": 1056, "fault jobs": 0, "fuzzer jobs": 4, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 3, "hints jobs": 2, "max signal": 73695, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 812, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10168, "no exec duration": 11353264000000, "no exec requests": 36376, "pending": 220, "prog exec time": 510, "reproducing": 3, "rpc recv": 10337955216, "rpc sent": 1041600856, "signal": 70096, "smash jobs": 1, "triage jobs": 1, "vm output": 18500335, "vm restarts [base]": 30, "vm restarts [new]": 272 } 2025/08/06 19:12:49 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:13:36 repro finished 'WARNING in xsk_create (full)', repro=false crepro=false desc='' hub=false from_dashboard=false 2025/08/06 19:13:36 failed repro for "WARNING in xsk_create", err=failed to build program: // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static unsigned long long procid; static __thread int clone_ongoing; static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* ctx) { if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) { exit(sig); } uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0; int valid = addr < prog_start || addr > prog_end; if (skip && valid) { _longjmp(segv_env, 1); } exit(sig); } static void install_segv_handler(void) { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) ({ int ok = 1; __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); if (_setjmp(segv_env) == 0) { __VA_ARGS__; } else ok = 0; __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); ok; }) static void sleep_ms(uint64_t ms) { usleep(ms * 1000); } static uint64_t current_time_ms(void) { struct timespec ts; if (clock_gettime(CLOCK_MONOTONIC, &ts)) exit(1); return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; } static void use_temporary_dir(void) { char tmpdir_template[] = "./syzkaller.XXXXXX"; char* tmpdir = mkdtemp(tmpdir_template); if (!tmpdir) exit(1); if (chmod(tmpdir, 0777)) exit(1); if (chdir(tmpdir)) exit(1); } static void thread_start(void* (*fn)(void*), void* arg) { pthread_t th; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setstacksize(&attr, 128 << 10); int i = 0; for (; i < 100; i++) { if (pthread_create(&th, &attr, fn, arg) == 0) { pthread_attr_destroy(&attr); return; } if (errno == EAGAIN) { usleep(50); continue; } break; } exit(1); } typedef struct { int state; } event_t; static void event_init(event_t* ev) { ev->state = 0; } static void event_reset(event_t* ev) { ev->state = 0; } static void event_set(event_t* ev) { if (ev->state) exit(1); __atomic_store_n(&ev->state, 1, __ATOMIC_RELEASE); syscall(SYS_futex, &ev->state, FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1000000); } static void event_wait(event_t* ev) { while (!__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, 0); } static int event_isset(event_t* ev) { return __atomic_load_n(&ev->state, __ATOMIC_ACQUIRE); } static int event_timedwait(event_t* ev, uint64_t timeout) { uint64_t start = current_time_ms(); uint64_t now = start; for (;;) { uint64_t remain = timeout - (now - start); struct timespec ts; ts.tv_sec = remain / 1000; ts.tv_nsec = (remain % 1000) * 1000 * 1000; syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, &ts); if (__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) return 1; now = current_time_ms(); if (now - start > timeout) return 0; } } static bool write_file(const char* file, const char* what, ...) { char buf[1024]; va_list args; va_start(args, what); vsnprintf(buf, sizeof(buf), what, args); va_end(args); buf[sizeof(buf) - 1] = 0; int len = strlen(buf); int fd = open(file, O_WRONLY | O_CLOEXEC); if (fd == -1) return false; if (write(fd, buf, len) != len) { int err = errno; close(fd); errno = err; return false; } close(fd); return true; } struct nlmsg { char* pos; int nesting; struct nlattr* nested[8]; char buf[4096]; }; static void netlink_init(struct nlmsg* nlmsg, int typ, int flags, const void* data, int size) { memset(nlmsg, 0, sizeof(*nlmsg)); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_type = typ; hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags; memcpy(hdr + 1, data, size); nlmsg->pos = (char*)(hdr + 1) + NLMSG_ALIGN(size); } static void netlink_attr(struct nlmsg* nlmsg, int typ, const void* data, int size) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_len = sizeof(*attr) + size; attr->nla_type = typ; if (size > 0) memcpy(attr + 1, data, size); nlmsg->pos += NLMSG_ALIGN(attr->nla_len); } static void netlink_nest(struct nlmsg* nlmsg, int typ) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_type = typ; nlmsg->pos += sizeof(*attr); nlmsg->nested[nlmsg->nesting++] = attr; } static void netlink_done(struct nlmsg* nlmsg) { struct nlattr* attr = nlmsg->nested[--nlmsg->nesting]; attr->nla_len = nlmsg->pos - (char*)attr; } static int netlink_send_ext(struct nlmsg* nlmsg, int sock, uint16_t reply_type, int* reply_len, bool dofail) { if (nlmsg->pos > nlmsg->buf + sizeof(nlmsg->buf) || nlmsg->nesting) exit(1); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_len = nlmsg->pos - nlmsg->buf; struct sockaddr_nl addr; memset(&addr, 0, sizeof(addr)); addr.nl_family = AF_NETLINK; ssize_t n = sendto(sock, nlmsg->buf, hdr->nlmsg_len, 0, (struct sockaddr*)&addr, sizeof(addr)); if (n != (ssize_t)hdr->nlmsg_len) { if (dofail) exit(1); return -1; } n = recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); if (reply_len) *reply_len = 0; if (n < 0) { if (dofail) exit(1); return -1; } if (n < (ssize_t)sizeof(struct nlmsghdr)) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type == NLMSG_DONE) return 0; if (reply_len && hdr->nlmsg_type == reply_type) { *reply_len = n; return 0; } if (n < (ssize_t)(sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr))) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type != NLMSG_ERROR) { errno = EINVAL; if (dofail) exit(1); return -1; } errno = -((struct nlmsgerr*)(hdr + 1))->error; return -errno; } static int netlink_send(struct nlmsg* nlmsg, int sock) { return netlink_send_ext(nlmsg, sock, 0, NULL, true); } static int netlink_query_family_id(struct nlmsg* nlmsg, int sock, const char* family_name, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = CTRL_CMD_GETFAMILY; netlink_init(nlmsg, GENL_ID_CTRL, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, CTRL_ATTR_FAMILY_NAME, family_name, strnlen(family_name, GENL_NAMSIZ - 1) + 1); int n = 0; int err = netlink_send_ext(nlmsg, sock, GENL_ID_CTRL, &n, dofail); if (err < 0) { return -1; } uint16_t id = 0; struct nlattr* attr = (struct nlattr*)(nlmsg->buf + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg->buf + n; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == CTRL_ATTR_FAMILY_ID) { id = *(uint16_t*)(attr + 1); break; } } if (!id) { errno = EINVAL; return -1; } recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); return id; } static int netlink_next_msg(struct nlmsg* nlmsg, unsigned int offset, unsigned int total_len) { struct nlmsghdr* hdr = (struct nlmsghdr*)(nlmsg->buf + offset); if (offset == total_len || offset + hdr->nlmsg_len > total_len) return -1; return hdr->nlmsg_len; } static void netlink_add_device_impl(struct nlmsg* nlmsg, const char* type, const char* name, bool up) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; netlink_init(nlmsg, RTM_NEWLINK, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); if (name) netlink_attr(nlmsg, IFLA_IFNAME, name, strlen(name)); netlink_nest(nlmsg, IFLA_LINKINFO); netlink_attr(nlmsg, IFLA_INFO_KIND, type, strlen(type)); } static void netlink_add_device(struct nlmsg* nlmsg, int sock, const char* type, const char* name) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_veth(struct nlmsg* nlmsg, int sock, const char* name, const char* peer) { netlink_add_device_impl(nlmsg, "veth", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_nest(nlmsg, VETH_INFO_PEER); nlmsg->pos += sizeof(struct ifinfomsg); netlink_attr(nlmsg, IFLA_IFNAME, peer, strlen(peer)); netlink_done(nlmsg); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_xfrm(struct nlmsg* nlmsg, int sock, const char* name) { netlink_add_device_impl(nlmsg, "xfrm", name, true); netlink_nest(nlmsg, IFLA_INFO_DATA); int if_id = 1; netlink_attr(nlmsg, 2, &if_id, sizeof(if_id)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_hsr(struct nlmsg* nlmsg, int sock, const char* name, const char* slave1, const char* slave2) { netlink_add_device_impl(nlmsg, "hsr", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); int ifindex1 = if_nametoindex(slave1); netlink_attr(nlmsg, IFLA_HSR_SLAVE1, &ifindex1, sizeof(ifindex1)); int ifindex2 = if_nametoindex(slave2); netlink_attr(nlmsg, IFLA_HSR_SLAVE2, &ifindex2, sizeof(ifindex2)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_linked(struct nlmsg* nlmsg, int sock, const char* type, const char* name, const char* link) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_vlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t id, uint16_t proto) { netlink_add_device_impl(nlmsg, "vlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_VLAN_ID, &id, sizeof(id)); netlink_attr(nlmsg, IFLA_VLAN_PROTOCOL, &proto, sizeof(proto)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_macvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link) { netlink_add_device_impl(nlmsg, "macvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); uint32_t mode = MACVLAN_MODE_BRIDGE; netlink_attr(nlmsg, IFLA_MACVLAN_MODE, &mode, sizeof(mode)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_geneve(struct nlmsg* nlmsg, int sock, const char* name, uint32_t vni, struct in_addr* addr4, struct in6_addr* addr6) { netlink_add_device_impl(nlmsg, "geneve", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_GENEVE_ID, &vni, sizeof(vni)); if (addr4) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE, addr4, sizeof(*addr4)); if (addr6) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE6, addr6, sizeof(*addr6)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } #define IFLA_IPVLAN_FLAGS 2 #define IPVLAN_MODE_L3S 2 #undef IPVLAN_F_VEPA #define IPVLAN_F_VEPA 2 static void netlink_add_ipvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t mode, uint16_t flags) { netlink_add_device_impl(nlmsg, "ipvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_IPVLAN_MODE, &mode, sizeof(mode)); netlink_attr(nlmsg, IFLA_IPVLAN_FLAGS, &flags, sizeof(flags)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_device_change(struct nlmsg* nlmsg, int sock, const char* name, bool up, const char* master, const void* mac, int macsize, const char* new_name) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; hdr.ifi_index = if_nametoindex(name); netlink_init(nlmsg, RTM_NEWLINK, 0, &hdr, sizeof(hdr)); if (new_name) netlink_attr(nlmsg, IFLA_IFNAME, new_name, strlen(new_name)); if (master) { int ifindex = if_nametoindex(master); netlink_attr(nlmsg, IFLA_MASTER, &ifindex, sizeof(ifindex)); } if (macsize) netlink_attr(nlmsg, IFLA_ADDRESS, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static int netlink_add_addr(struct nlmsg* nlmsg, int sock, const char* dev, const void* addr, int addrsize) { struct ifaddrmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ifa_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ifa_prefixlen = addrsize == 4 ? 24 : 120; hdr.ifa_scope = RT_SCOPE_UNIVERSE; hdr.ifa_index = if_nametoindex(dev); netlink_init(nlmsg, RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, IFA_LOCAL, addr, addrsize); netlink_attr(nlmsg, IFA_ADDRESS, addr, addrsize); return netlink_send(nlmsg, sock); } static void netlink_add_addr4(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in_addr in_addr; inet_pton(AF_INET, addr, &in_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in_addr, sizeof(in_addr)); if (err < 0) { } } static void netlink_add_addr6(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in6_addr in6_addr; inet_pton(AF_INET6, addr, &in6_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in6_addr, sizeof(in6_addr)); if (err < 0) { } } static void netlink_add_neigh(struct nlmsg* nlmsg, int sock, const char* name, const void* addr, int addrsize, const void* mac, int macsize) { struct ndmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ndm_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ndm_ifindex = if_nametoindex(name); hdr.ndm_state = NUD_PERMANENT; netlink_init(nlmsg, RTM_NEWNEIGH, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, NDA_DST, addr, addrsize); netlink_attr(nlmsg, NDA_LLADDR, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static struct nlmsg nlmsg; static int tunfd = -1; #define TUN_IFACE "syz_tun" #define LOCAL_MAC 0xaaaaaaaaaaaa #define REMOTE_MAC 0xaaaaaaaaaabb #define LOCAL_IPV4 "172.20.20.170" #define REMOTE_IPV4 "172.20.20.187" #define LOCAL_IPV6 "fe80::aa" #define REMOTE_IPV6 "fe80::bb" #define IFF_NAPI 0x0010 static void initialize_tun(void) { tunfd = open("/dev/net/tun", O_RDWR | O_NONBLOCK); if (tunfd == -1) { printf("tun: can't open /dev/net/tun: please enable CONFIG_TUN=y\n"); printf("otherwise fuzzing or reproducing might not work as intended\n"); return; } const int kTunFd = 200; if (dup2(tunfd, kTunFd) < 0) exit(1); close(tunfd); tunfd = kTunFd; struct ifreq ifr; memset(&ifr, 0, sizeof(ifr)); strncpy(ifr.ifr_name, TUN_IFACE, IFNAMSIZ); ifr.ifr_flags = IFF_TAP | IFF_NO_PI; if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0) { exit(1); } char sysctl[64]; sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/accept_dad", TUN_IFACE); write_file(sysctl, "0"); sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/router_solicitations", TUN_IFACE); write_file(sysctl, "0"); int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); netlink_add_addr4(&nlmsg, sock, TUN_IFACE, LOCAL_IPV4); netlink_add_addr6(&nlmsg, sock, TUN_IFACE, LOCAL_IPV6); uint64_t macaddr = REMOTE_MAC; struct in_addr in_addr; inet_pton(AF_INET, REMOTE_IPV4, &in_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in_addr, sizeof(in_addr), &macaddr, ETH_ALEN); struct in6_addr in6_addr; inet_pton(AF_INET6, REMOTE_IPV6, &in6_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in6_addr, sizeof(in6_addr), &macaddr, ETH_ALEN); macaddr = LOCAL_MAC; netlink_device_change(&nlmsg, sock, TUN_IFACE, true, 0, &macaddr, ETH_ALEN, NULL); close(sock); } #define DEVLINK_FAMILY_NAME "devlink" #define DEVLINK_CMD_PORT_GET 5 #define DEVLINK_ATTR_BUS_NAME 1 #define DEVLINK_ATTR_DEV_NAME 2 #define DEVLINK_ATTR_NETDEV_NAME 7 static struct nlmsg nlmsg2; static void initialize_devlink_ports(const char* bus_name, const char* dev_name, const char* netdev_prefix) { struct genlmsghdr genlhdr; int len, total_len, id, err, offset; uint16_t netdev_index; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) exit(1); int rtsock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (rtsock == -1) exit(1); id = netlink_query_family_id(&nlmsg, sock, DEVLINK_FAMILY_NAME, true); if (id == -1) goto error; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = DEVLINK_CMD_PORT_GET; netlink_init(&nlmsg, id, NLM_F_DUMP, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, DEVLINK_ATTR_BUS_NAME, bus_name, strlen(bus_name) + 1); netlink_attr(&nlmsg, DEVLINK_ATTR_DEV_NAME, dev_name, strlen(dev_name) + 1); err = netlink_send_ext(&nlmsg, sock, id, &total_len, true); if (err < 0) { goto error; } offset = 0; netdev_index = 0; while ((len = netlink_next_msg(&nlmsg, offset, total_len)) != -1) { struct nlattr* attr = (struct nlattr*)(nlmsg.buf + offset + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg.buf + offset + len; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == DEVLINK_ATTR_NETDEV_NAME) { char* port_name; char netdev_name[IFNAMSIZ]; port_name = (char*)(attr + 1); snprintf(netdev_name, sizeof(netdev_name), "%s%d", netdev_prefix, netdev_index); netlink_device_change(&nlmsg2, rtsock, port_name, true, 0, 0, 0, netdev_name); break; } } offset += len; netdev_index++; } error: close(rtsock); close(sock); } #define WIFI_INITIAL_DEVICE_COUNT 2 #define WIFI_MAC_BASE { 0x08, 0x02, 0x11, 0x00, 0x00, 0x00} #define WIFI_IBSS_BSSID { 0x50, 0x50, 0x50, 0x50, 0x50, 0x50} #define WIFI_IBSS_SSID { 0x10, 0x10, 0x10, 0x10, 0x10, 0x10} #define WIFI_DEFAULT_FREQUENCY 2412 #define WIFI_DEFAULT_SIGNAL 0 #define WIFI_DEFAULT_RX_RATE 1 #define HWSIM_CMD_REGISTER 1 #define HWSIM_CMD_FRAME 2 #define HWSIM_CMD_NEW_RADIO 4 #define HWSIM_ATTR_SUPPORT_P2P_DEVICE 14 #define HWSIM_ATTR_PERM_ADDR 22 #define IF_OPER_UP 6 struct join_ibss_props { int wiphy_freq; bool wiphy_freq_fixed; uint8_t* mac; uint8_t* ssid; int ssid_len; }; static int set_interface_state(const char* interface_name, int on) { struct ifreq ifr; int sock = socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) { return -1; } memset(&ifr, 0, sizeof(ifr)); strcpy(ifr.ifr_name, interface_name); int ret = ioctl(sock, SIOCGIFFLAGS, &ifr); if (ret < 0) { close(sock); return -1; } if (on) ifr.ifr_flags |= IFF_UP; else ifr.ifr_flags &= ~IFF_UP; ret = ioctl(sock, SIOCSIFFLAGS, &ifr); close(sock); if (ret < 0) { return -1; } return 0; } static int nl80211_set_interface(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, uint32_t iftype, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_SET_INTERFACE; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_IFTYPE, &iftype, sizeof(iftype)); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int nl80211_join_ibss(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, struct join_ibss_props* props, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_JOIN_IBSS; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_SSID, props->ssid, props->ssid_len); netlink_attr(nlmsg, NL80211_ATTR_WIPHY_FREQ, &(props->wiphy_freq), sizeof(props->wiphy_freq)); if (props->mac) netlink_attr(nlmsg, NL80211_ATTR_MAC, props->mac, ETH_ALEN); if (props->wiphy_freq_fixed) netlink_attr(nlmsg, NL80211_ATTR_FREQ_FIXED, NULL, 0); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int get_ifla_operstate(struct nlmsg* nlmsg, int ifindex, bool dofail) { struct ifinfomsg info; memset(&info, 0, sizeof(info)); info.ifi_family = AF_UNSPEC; info.ifi_index = ifindex; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) { return -1; } netlink_init(nlmsg, RTM_GETLINK, 0, &info, sizeof(info)); int n; int err = netlink_send_ext(nlmsg, sock, RTM_NEWLINK, &n, dofail); close(sock); if (err) { return -1; } struct rtattr* attr = IFLA_RTA(NLMSG_DATA(nlmsg->buf)); for (; RTA_OK(attr, n); attr = RTA_NEXT(attr, n)) { if (attr->rta_type == IFLA_OPERSTATE) return *((int32_t*)RTA_DATA(attr)); } return -1; } static int await_ifla_operstate(struct nlmsg* nlmsg, char* interface, int operstate, bool dofail) { int ifindex = if_nametoindex(interface); while (true) { usleep(1000); int ret = get_ifla_operstate(nlmsg, ifindex, dofail); if (ret < 0) return ret; if (ret == operstate) return 0; } return 0; } static int nl80211_setup_ibss_interface(struct nlmsg* nlmsg, int sock, int nl80211_family_id, char* interface, struct join_ibss_props* ibss_props, bool dofail) { int ifindex = if_nametoindex(interface); if (ifindex == 0) { return -1; } int ret = nl80211_set_interface(nlmsg, sock, nl80211_family_id, ifindex, NL80211_IFTYPE_ADHOC, dofail); if (ret < 0) { return -1; } ret = set_interface_state(interface, 1); if (ret < 0) { return -1; } ret = nl80211_join_ibss(nlmsg, sock, nl80211_family_id, ifindex, ibss_props, dofail); if (ret < 0) { return -1; } return 0; } static int hwsim80211_create_device(struct nlmsg* nlmsg, int sock, int hwsim_family, uint8_t mac_addr[ETH_ALEN]) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = HWSIM_CMD_NEW_RADIO; netlink_init(nlmsg, hwsim_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, HWSIM_ATTR_SUPPORT_P2P_DEVICE, NULL, 0); netlink_attr(nlmsg, HWSIM_ATTR_PERM_ADDR, mac_addr, ETH_ALEN); int err = netlink_send(nlmsg, sock); if (err < 0) { } return err; } static void initialize_wifi_devices(void) { int rfkill = open("/dev/rfkill", O_RDWR); if (rfkill == -1) exit(1); struct rfkill_event event = {0}; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; if (write(rfkill, &event, sizeof(event)) != (ssize_t)(sizeof(event))) exit(1); close(rfkill); uint8_t mac_addr[6] = WIFI_MAC_BASE; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock < 0) exit(1); int hwsim_family_id = netlink_query_family_id(&nlmsg, sock, "MAC80211_HWSIM", true); int nl80211_family_id = netlink_query_family_id(&nlmsg, sock, "nl80211", true); if (hwsim_family_id < 0 || nl80211_family_id < 0) exit(1); uint8_t ssid[] = WIFI_IBSS_SSID; uint8_t bssid[] = WIFI_IBSS_BSSID; struct join_ibss_props ibss_props = { .wiphy_freq = WIFI_DEFAULT_FREQUENCY, .wiphy_freq_fixed = true, .mac = bssid, .ssid = ssid, .ssid_len = sizeof(ssid)}; for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { mac_addr[5] = device_id; int ret = hwsim80211_create_device(&nlmsg, sock, hwsim_family_id, mac_addr); if (ret < 0) exit(1); char interface[6] = "wlan0"; interface[4] += device_id; if (nl80211_setup_ibss_interface(&nlmsg, sock, nl80211_family_id, interface, &ibss_props, true) < 0) exit(1); } for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { char interface[6] = "wlan0"; interface[4] += device_id; int ret = await_ifla_operstate(&nlmsg, interface, IF_OPER_UP, true); if (ret < 0) exit(1); } close(sock); } static int runcmdline(char* cmdline) { int ret = system(cmdline); if (ret) { } return ret; } #define DEV_IPV4 "172.20.20.%d" #define DEV_IPV6 "fe80::%02x" #define DEV_MAC 0x00aaaaaaaaaa static void netdevsim_add(unsigned int addr, unsigned int port_count) { write_file("/sys/bus/netdevsim/del_device", "%u", addr); if (write_file("/sys/bus/netdevsim/new_device", "%u %u", addr, port_count)) { char buf[32]; snprintf(buf, sizeof(buf), "netdevsim%d", addr); initialize_devlink_ports("netdevsim", buf, "netdevsim"); } } #define WG_GENL_NAME "wireguard" enum wg_cmd { WG_CMD_GET_DEVICE, WG_CMD_SET_DEVICE, }; enum wgdevice_attribute { WGDEVICE_A_UNSPEC, WGDEVICE_A_IFINDEX, WGDEVICE_A_IFNAME, WGDEVICE_A_PRIVATE_KEY, WGDEVICE_A_PUBLIC_KEY, WGDEVICE_A_FLAGS, WGDEVICE_A_LISTEN_PORT, WGDEVICE_A_FWMARK, WGDEVICE_A_PEERS, }; enum wgpeer_attribute { WGPEER_A_UNSPEC, WGPEER_A_PUBLIC_KEY, WGPEER_A_PRESHARED_KEY, WGPEER_A_FLAGS, WGPEER_A_ENDPOINT, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, WGPEER_A_LAST_HANDSHAKE_TIME, WGPEER_A_RX_BYTES, WGPEER_A_TX_BYTES, WGPEER_A_ALLOWEDIPS, WGPEER_A_PROTOCOL_VERSION, }; enum wgallowedip_attribute { WGALLOWEDIP_A_UNSPEC, WGALLOWEDIP_A_FAMILY, WGALLOWEDIP_A_IPADDR, WGALLOWEDIP_A_CIDR_MASK, }; static void netlink_wireguard_setup(void) { const char ifname_a[] = "wg0"; const char ifname_b[] = "wg1"; const char ifname_c[] = "wg2"; const char private_a[] = "\xa0\x5c\xa8\x4f\x6c\x9c\x8e\x38\x53\xe2\xfd\x7a\x70\xae\x0f\xb2\x0f\xa1\x52\x60\x0c\xb0\x08\x45\x17\x4f\x08\x07\x6f\x8d\x78\x43"; const char private_b[] = "\xb0\x80\x73\xe8\xd4\x4e\x91\xe3\xda\x92\x2c\x22\x43\x82\x44\xbb\x88\x5c\x69\xe2\x69\xc8\xe9\xd8\x35\xb1\x14\x29\x3a\x4d\xdc\x6e"; const char private_c[] = "\xa0\xcb\x87\x9a\x47\xf5\xbc\x64\x4c\x0e\x69\x3f\xa6\xd0\x31\xc7\x4a\x15\x53\xb6\xe9\x01\xb9\xff\x2f\x51\x8c\x78\x04\x2f\xb5\x42"; const char public_a[] = "\x97\x5c\x9d\x81\xc9\x83\xc8\x20\x9e\xe7\x81\x25\x4b\x89\x9f\x8e\xd9\x25\xae\x9f\x09\x23\xc2\x3c\x62\xf5\x3c\x57\xcd\xbf\x69\x1c"; const char public_b[] = "\xd1\x73\x28\x99\xf6\x11\xcd\x89\x94\x03\x4d\x7f\x41\x3d\xc9\x57\x63\x0e\x54\x93\xc2\x85\xac\xa4\x00\x65\xcb\x63\x11\xbe\x69\x6b"; const char public_c[] = "\xf4\x4d\xa3\x67\xa8\x8e\xe6\x56\x4f\x02\x02\x11\x45\x67\x27\x08\x2f\x5c\xeb\xee\x8b\x1b\xf5\xeb\x73\x37\x34\x1b\x45\x9b\x39\x22"; const uint16_t listen_a = 20001; const uint16_t listen_b = 20002; const uint16_t listen_c = 20003; const uint16_t af_inet = AF_INET; const uint16_t af_inet6 = AF_INET6; const struct sockaddr_in endpoint_b_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_b), .sin_addr = {htonl(INADDR_LOOPBACK)}}; const struct sockaddr_in endpoint_c_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_c), .sin_addr = {htonl(INADDR_LOOPBACK)}}; struct sockaddr_in6 endpoint_a_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_a)}; endpoint_a_v6.sin6_addr = in6addr_loopback; struct sockaddr_in6 endpoint_c_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_c)}; endpoint_c_v6.sin6_addr = in6addr_loopback; const struct in_addr first_half_v4 = {0}; const struct in_addr second_half_v4 = {(uint32_t)htonl(128 << 24)}; const struct in6_addr first_half_v6 = {{{0}}}; const struct in6_addr second_half_v6 = {{{0x80}}}; const uint8_t half_cidr = 1; const uint16_t persistent_keepalives[] = {1, 3, 7, 9, 14, 19}; struct genlmsghdr genlhdr = { .cmd = WG_CMD_SET_DEVICE, .version = 1}; int sock; int id, err; sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) { return; } id = netlink_query_family_id(&nlmsg, sock, WG_GENL_NAME, true); if (id == -1) goto error; netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_a, strlen(ifname_a) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_a, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_a, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[0], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v6, sizeof(endpoint_c_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[1], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_b, strlen(ifname_b) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_b, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_b, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[2], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v4, sizeof(endpoint_c_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[3], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_c, strlen(ifname_c) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_c, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_c, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[4], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[5], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } error: close(sock); } static void initialize_netdevices(void) { char netdevsim[16]; sprintf(netdevsim, "netdevsim%d", (int)procid); struct { const char* type; const char* dev; } devtypes[] = { {"ip6gretap", "ip6gretap0"}, {"bridge", "bridge0"}, {"vcan", "vcan0"}, {"bond", "bond0"}, {"team", "team0"}, {"dummy", "dummy0"}, {"nlmon", "nlmon0"}, {"caif", "caif0"}, {"batadv", "batadv0"}, {"vxcan", "vxcan1"}, {"veth", 0}, {"wireguard", "wg0"}, {"wireguard", "wg1"}, {"wireguard", "wg2"}, }; const char* devmasters[] = {"bridge", "bond", "team", "batadv"}; struct { const char* name; int macsize; bool noipv6; } devices[] = { {"lo", ETH_ALEN}, {"sit0", 0}, {"bridge0", ETH_ALEN}, {"vcan0", 0, true}, {"tunl0", 0}, {"gre0", 0}, {"gretap0", ETH_ALEN}, {"ip_vti0", 0}, {"ip6_vti0", 0}, {"ip6tnl0", 0}, {"ip6gre0", 0}, {"ip6gretap0", ETH_ALEN}, {"erspan0", ETH_ALEN}, {"bond0", ETH_ALEN}, {"veth0", ETH_ALEN}, {"veth1", ETH_ALEN}, {"team0", ETH_ALEN}, {"veth0_to_bridge", ETH_ALEN}, {"veth1_to_bridge", ETH_ALEN}, {"veth0_to_bond", ETH_ALEN}, {"veth1_to_bond", ETH_ALEN}, {"veth0_to_team", ETH_ALEN}, {"veth1_to_team", ETH_ALEN}, {"veth0_to_hsr", ETH_ALEN}, {"veth1_to_hsr", ETH_ALEN}, {"hsr0", 0}, {"dummy0", ETH_ALEN}, {"nlmon0", 0}, {"vxcan0", 0, true}, {"vxcan1", 0, true}, {"caif0", ETH_ALEN}, {"batadv0", ETH_ALEN}, {netdevsim, ETH_ALEN}, {"xfrm0", ETH_ALEN}, {"veth0_virt_wifi", ETH_ALEN}, {"veth1_virt_wifi", ETH_ALEN}, {"virt_wifi0", ETH_ALEN}, {"veth0_vlan", ETH_ALEN}, {"veth1_vlan", ETH_ALEN}, {"vlan0", ETH_ALEN}, {"vlan1", ETH_ALEN}, {"macvlan0", ETH_ALEN}, {"macvlan1", ETH_ALEN}, {"ipvlan0", ETH_ALEN}, {"ipvlan1", ETH_ALEN}, {"veth0_macvtap", ETH_ALEN}, {"veth1_macvtap", ETH_ALEN}, {"macvtap0", ETH_ALEN}, {"macsec0", ETH_ALEN}, {"veth0_to_batadv", ETH_ALEN}, {"veth1_to_batadv", ETH_ALEN}, {"batadv_slave_0", ETH_ALEN}, {"batadv_slave_1", ETH_ALEN}, {"geneve0", ETH_ALEN}, {"geneve1", ETH_ALEN}, {"wg0", 0}, {"wg1", 0}, {"wg2", 0}, }; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) netlink_add_device(&nlmsg, sock, devtypes[i].type, devtypes[i].dev); for (i = 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) { char master[32], slave0[32], veth0[32], slave1[32], veth1[32]; sprintf(slave0, "%s_slave_0", devmasters[i]); sprintf(veth0, "veth0_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave0, veth0); sprintf(slave1, "%s_slave_1", devmasters[i]); sprintf(veth1, "veth1_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave1, veth1); sprintf(master, "%s0", devmasters[i]); netlink_device_change(&nlmsg, sock, slave0, false, master, 0, 0, NULL); netlink_device_change(&nlmsg, sock, slave1, false, master, 0, 0, NULL); } netlink_add_xfrm(&nlmsg, sock, "xfrm0"); netlink_device_change(&nlmsg, sock, "bridge_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "bridge_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "hsr_slave_0", "veth0_to_hsr"); netlink_add_veth(&nlmsg, sock, "hsr_slave_1", "veth1_to_hsr"); netlink_add_hsr(&nlmsg, sock, "hsr0", "hsr_slave_0", "hsr_slave_1"); netlink_device_change(&nlmsg, sock, "hsr_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "hsr_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "veth0_virt_wifi", "veth1_virt_wifi"); netlink_add_linked(&nlmsg, sock, "virt_wifi", "virt_wifi0", "veth1_virt_wifi"); netlink_add_veth(&nlmsg, sock, "veth0_vlan", "veth1_vlan"); netlink_add_vlan(&nlmsg, sock, "vlan0", "veth0_vlan", 0, htons(ETH_P_8021Q)); netlink_add_vlan(&nlmsg, sock, "vlan1", "veth0_vlan", 1, htons(ETH_P_8021AD)); netlink_add_macvlan(&nlmsg, sock, "macvlan0", "veth1_vlan"); netlink_add_macvlan(&nlmsg, sock, "macvlan1", "veth1_vlan"); netlink_add_ipvlan(&nlmsg, sock, "ipvlan0", "veth0_vlan", IPVLAN_MODE_L2, 0); netlink_add_ipvlan(&nlmsg, sock, "ipvlan1", "veth0_vlan", IPVLAN_MODE_L3S, IPVLAN_F_VEPA); netlink_add_veth(&nlmsg, sock, "veth0_macvtap", "veth1_macvtap"); netlink_add_linked(&nlmsg, sock, "macvtap", "macvtap0", "veth0_macvtap"); netlink_add_linked(&nlmsg, sock, "macsec", "macsec0", "veth1_macvtap"); char addr[32]; sprintf(addr, DEV_IPV4, 14 + 10); struct in_addr geneve_addr4; if (inet_pton(AF_INET, addr, &geneve_addr4) <= 0) exit(1); struct in6_addr geneve_addr6; if (inet_pton(AF_INET6, "fc00::01", &geneve_addr6) <= 0) exit(1); netlink_add_geneve(&nlmsg, sock, "geneve0", 0, &geneve_addr4, 0); netlink_add_geneve(&nlmsg, sock, "geneve1", 1, 0, &geneve_addr6); netdevsim_add((int)procid, 4); netlink_wireguard_setup(); for (i = 0; i < sizeof(devices) / (sizeof(devices[0])); i++) { char addr[32]; sprintf(addr, DEV_IPV4, i + 10); netlink_add_addr4(&nlmsg, sock, devices[i].name, addr); if (!devices[i].noipv6) { sprintf(addr, DEV_IPV6, i + 10); netlink_add_addr6(&nlmsg, sock, devices[i].name, addr); } uint64_t macaddr = DEV_MAC + ((i + 10ull) << 40); netlink_device_change(&nlmsg, sock, devices[i].name, true, 0, &macaddr, devices[i].macsize, NULL); } close(sock); } static void initialize_netdevices_init(void) { int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); struct { const char* type; int macsize; bool noipv6; bool noup; } devtypes[] = { {"nr", 7, true}, {"rose", 5, true, true}, }; unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) { char dev[32], addr[32]; sprintf(dev, "%s%d", devtypes[i].type, (int)procid); sprintf(addr, "172.30.%d.%d", i, (int)procid + 1); netlink_add_addr4(&nlmsg, sock, dev, addr); if (!devtypes[i].noipv6) { sprintf(addr, "fe88::%02x:%02x", i, (int)procid + 1); netlink_add_addr6(&nlmsg, sock, dev, addr); } int macsize = devtypes[i].macsize; uint64_t macaddr = 0xbbbbbb + ((unsigned long long)i << (8 * (macsize - 2))) + (procid << (8 * (macsize - 1))); netlink_device_change(&nlmsg, sock, dev, !devtypes[i].noup, 0, &macaddr, macsize, NULL); } close(sock); } static int read_tun(char* data, int size) { if (tunfd < 0) return -1; int rv = read(tunfd, data, size); if (rv < 0) { if (errno == EAGAIN || errno == EBADF || errno == EBADFD) return -1; exit(1); } return rv; } static void flush_tun() { char data[1000]; while (read_tun(&data[0], sizeof(data)) != -1) { } } #define MAX_FDS 30 #define BTPROTO_HCI 1 #define ACL_LINK 1 #define SCAN_PAGE 2 typedef struct { uint8_t b[6]; } __attribute__((packed)) bdaddr_t; #define HCI_COMMAND_PKT 1 #define HCI_EVENT_PKT 4 #define HCI_VENDOR_PKT 0xff struct hci_command_hdr { uint16_t opcode; uint8_t plen; } __attribute__((packed)); struct hci_event_hdr { uint8_t evt; uint8_t plen; } __attribute__((packed)); #define HCI_EV_CONN_COMPLETE 0x03 struct hci_ev_conn_complete { uint8_t status; uint16_t handle; bdaddr_t bdaddr; uint8_t link_type; uint8_t encr_mode; } __attribute__((packed)); #define HCI_EV_CONN_REQUEST 0x04 struct hci_ev_conn_request { bdaddr_t bdaddr; uint8_t dev_class[3]; uint8_t link_type; } __attribute__((packed)); #define HCI_EV_REMOTE_FEATURES 0x0b struct hci_ev_remote_features { uint8_t status; uint16_t handle; uint8_t features[8]; } __attribute__((packed)); #define HCI_EV_CMD_COMPLETE 0x0e struct hci_ev_cmd_complete { uint8_t ncmd; uint16_t opcode; } __attribute__((packed)); #define HCI_OP_WRITE_SCAN_ENABLE 0x0c1a #define HCI_OP_READ_BUFFER_SIZE 0x1005 struct hci_rp_read_buffer_size { uint8_t status; uint16_t acl_mtu; uint8_t sco_mtu; uint16_t acl_max_pkt; uint16_t sco_max_pkt; } __attribute__((packed)); #define HCI_OP_READ_BD_ADDR 0x1009 struct hci_rp_read_bd_addr { uint8_t status; bdaddr_t bdaddr; } __attribute__((packed)); #define HCI_EV_LE_META 0x3e struct hci_ev_le_meta { uint8_t subevent; } __attribute__((packed)); #define HCI_EV_LE_CONN_COMPLETE 0x01 struct hci_ev_le_conn_complete { uint8_t status; uint16_t handle; uint8_t role; uint8_t bdaddr_type; bdaddr_t bdaddr; uint16_t interval; uint16_t latency; uint16_t supervision_timeout; uint8_t clk_accurancy; } __attribute__((packed)); struct hci_dev_req { uint16_t dev_id; uint32_t dev_opt; }; struct vhci_vendor_pkt_request { uint8_t type; uint8_t opcode; } __attribute__((packed)); struct vhci_pkt { uint8_t type; union { struct { uint8_t opcode; uint16_t id; } __attribute__((packed)) vendor_pkt; struct hci_command_hdr command_hdr; }; } __attribute__((packed)); #define HCIDEVUP _IOW('H', 201, int) #define HCISETSCAN _IOW('H', 221, int) static int vhci_fd = -1; static void rfkill_unblock_all() { int fd = open("/dev/rfkill", O_WRONLY); if (fd < 0) exit(1); struct rfkill_event event = {0}; event.idx = 0; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; event.soft = 0; event.hard = 0; if (write(fd, &event, sizeof(event)) < 0) exit(1); close(fd); } static void hci_send_event_packet(int fd, uint8_t evt, void* data, size_t data_len) { struct iovec iv[3]; struct hci_event_hdr hdr; hdr.evt = evt; hdr.plen = data_len; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = data; iv[2].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static void hci_send_event_cmd_complete(int fd, uint16_t opcode, void* data, size_t data_len) { struct iovec iv[4]; struct hci_event_hdr hdr; hdr.evt = HCI_EV_CMD_COMPLETE; hdr.plen = sizeof(struct hci_ev_cmd_complete) + data_len; struct hci_ev_cmd_complete evt_hdr; evt_hdr.ncmd = 1; evt_hdr.opcode = opcode; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = &evt_hdr; iv[2].iov_len = sizeof(evt_hdr); iv[3].iov_base = data; iv[3].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static bool process_command_pkt(int fd, char* buf, ssize_t buf_size) { struct hci_command_hdr* hdr = (struct hci_command_hdr*)buf; if (buf_size < (ssize_t)sizeof(struct hci_command_hdr) || hdr->plen != buf_size - sizeof(struct hci_command_hdr)) exit(1); switch (hdr->opcode) { case HCI_OP_WRITE_SCAN_ENABLE: { uint8_t status = 0; hci_send_event_cmd_complete(fd, hdr->opcode, &status, sizeof(status)); return true; } case HCI_OP_READ_BD_ADDR: { struct hci_rp_read_bd_addr rp = {0}; rp.status = 0; memset(&rp.bdaddr, 0xaa, 6); hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } case HCI_OP_READ_BUFFER_SIZE: { struct hci_rp_read_buffer_size rp = {0}; rp.status = 0; rp.acl_mtu = 1021; rp.sco_mtu = 96; rp.acl_max_pkt = 4; rp.sco_max_pkt = 6; hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } } char dummy[0xf9] = {0}; hci_send_event_cmd_complete(fd, hdr->opcode, dummy, sizeof(dummy)); return false; } static void* event_thread(void* arg) { while (1) { char buf[1024] = {0}; ssize_t buf_size = read(vhci_fd, buf, sizeof(buf)); if (buf_size < 0) exit(1); if (buf_size > 0 && buf[0] == HCI_COMMAND_PKT) { if (process_command_pkt(vhci_fd, buf + 1, buf_size - 1)) break; } } return NULL; } #define HCI_HANDLE_1 200 #define HCI_HANDLE_2 201 #define HCI_PRIMARY 0 #define HCI_OP_RESET 0x0c03 static void initialize_vhci() { int hci_sock = socket(AF_BLUETOOTH, SOCK_RAW, BTPROTO_HCI); if (hci_sock < 0) exit(1); vhci_fd = open("/dev/vhci", O_RDWR); if (vhci_fd == -1) exit(1); const int kVhciFd = 202; if (dup2(vhci_fd, kVhciFd) < 0) exit(1); close(vhci_fd); vhci_fd = kVhciFd; struct vhci_vendor_pkt_request vendor_pkt_req = {HCI_VENDOR_PKT, HCI_PRIMARY}; if (write(vhci_fd, &vendor_pkt_req, sizeof(vendor_pkt_req)) != sizeof(vendor_pkt_req)) exit(1); struct vhci_pkt vhci_pkt; if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); if (vhci_pkt.type == HCI_COMMAND_PKT && vhci_pkt.command_hdr.opcode == HCI_OP_RESET) { char response[1] = {0}; hci_send_event_cmd_complete(vhci_fd, HCI_OP_RESET, response, sizeof(response)); if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); } if (vhci_pkt.type != HCI_VENDOR_PKT) exit(1); int dev_id = vhci_pkt.vendor_pkt.id; pthread_t th; if (pthread_create(&th, NULL, event_thread, NULL)) exit(1); int ret = ioctl(hci_sock, HCIDEVUP, dev_id); if (ret) { if (errno == ERFKILL) { rfkill_unblock_all(); ret = ioctl(hci_sock, HCIDEVUP, dev_id); } if (ret && errno != EALREADY) exit(1); } struct hci_dev_req dr = {0}; dr.dev_id = dev_id; dr.dev_opt = SCAN_PAGE; if (ioctl(hci_sock, HCISETSCAN, &dr)) exit(1); struct hci_ev_conn_request request; memset(&request, 0, sizeof(request)); memset(&request.bdaddr, 0xaa, 6); *(uint8_t*)&request.bdaddr.b[5] = 0x10; request.link_type = ACL_LINK; hci_send_event_packet(vhci_fd, HCI_EV_CONN_REQUEST, &request, sizeof(request)); struct hci_ev_conn_complete complete; memset(&complete, 0, sizeof(complete)); complete.status = 0; complete.handle = HCI_HANDLE_1; memset(&complete.bdaddr, 0xaa, 6); *(uint8_t*)&complete.bdaddr.b[5] = 0x10; complete.link_type = ACL_LINK; complete.encr_mode = 0; hci_send_event_packet(vhci_fd, HCI_EV_CONN_COMPLETE, &complete, sizeof(complete)); struct hci_ev_remote_features features; memset(&features, 0, sizeof(features)); features.status = 0; features.handle = HCI_HANDLE_1; hci_send_event_packet(vhci_fd, HCI_EV_REMOTE_FEATURES, &features, sizeof(features)); struct { struct hci_ev_le_meta le_meta; struct hci_ev_le_conn_complete le_conn; } le_conn; memset(&le_conn, 0, sizeof(le_conn)); le_conn.le_meta.subevent = HCI_EV_LE_CONN_COMPLETE; memset(&le_conn.le_conn.bdaddr, 0xaa, 6); *(uint8_t*)&le_conn.le_conn.bdaddr.b[5] = 0x11; le_conn.le_conn.role = 1; le_conn.le_conn.handle = HCI_HANDLE_2; hci_send_event_packet(vhci_fd, HCI_EV_LE_META, &le_conn, sizeof(le_conn)); pthread_join(th, NULL); close(hci_sock); } #define XT_TABLE_SIZE 1536 #define XT_MAX_ENTRIES 10 struct xt_counters { uint64_t pcnt, bcnt; }; struct ipt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_entries; unsigned int size; }; struct ipt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_table_desc { const char* name; struct ipt_getinfo info; struct ipt_replace replace; }; static struct ipt_table_desc ipv4_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; static struct ipt_table_desc ipv6_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; #define IPT_BASE_CTL 64 #define IPT_SO_SET_REPLACE (IPT_BASE_CTL) #define IPT_SO_GET_INFO (IPT_BASE_CTL) #define IPT_SO_GET_ENTRIES (IPT_BASE_CTL + 1) struct arpt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_entries; unsigned int size; }; struct arpt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_table_desc { const char* name; struct arpt_getinfo info; struct arpt_replace replace; }; static struct arpt_table_desc arpt_tables[] = { {.name = "filter"}, }; #define ARPT_BASE_CTL 96 #define ARPT_SO_SET_REPLACE (ARPT_BASE_CTL) #define ARPT_SO_GET_INFO (ARPT_BASE_CTL) #define ARPT_SO_GET_ENTRIES (ARPT_BASE_CTL + 1) static void checkpoint_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; if (table->info.valid_hooks == 0) continue; struct ipt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, level, IPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_arptables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_arptables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; if (table->info.valid_hooks == 0) continue; struct arpt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } else { } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, SOL_IP, ARPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } #define NF_BR_NUMHOOKS 6 #define EBT_TABLE_MAXNAMELEN 32 #define EBT_CHAIN_MAXNAMELEN 32 #define EBT_BASE_CTL 128 #define EBT_SO_SET_ENTRIES (EBT_BASE_CTL) #define EBT_SO_GET_INFO (EBT_BASE_CTL) #define EBT_SO_GET_ENTRIES (EBT_SO_GET_INFO + 1) #define EBT_SO_GET_INIT_INFO (EBT_SO_GET_ENTRIES + 1) #define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO + 1) struct ebt_replace { char name[EBT_TABLE_MAXNAMELEN]; unsigned int valid_hooks; unsigned int nentries; unsigned int entries_size; struct ebt_entries* hook_entry[NF_BR_NUMHOOKS]; unsigned int num_counters; struct ebt_counter* counters; char* entries; }; struct ebt_entries { unsigned int distinguisher; char name[EBT_CHAIN_MAXNAMELEN]; unsigned int counter_offset; int policy; unsigned int nentries; char data[0] __attribute__((aligned(__alignof__(struct ebt_replace)))); }; struct ebt_table_desc { const char* name; struct ebt_replace replace; char entrytable[XT_TABLE_SIZE]; }; static struct ebt_table_desc ebt_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "broute"}, }; static void checkpoint_ebtables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (size_t i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_INFO, &table->replace, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->replace.entries_size > sizeof(table->entrytable)) exit(1); table->replace.num_counters = 0; table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_ENTRIES, &table->replace, &optlen)) exit(1); } close(fd); } static void reset_ebtables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; if (table->replace.valid_hooks == 0) continue; struct ebt_replace replace; memset(&replace, 0, sizeof(replace)); strcpy(replace.name, table->name); socklen_t optlen = sizeof(replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INFO, &replace, &optlen)) exit(1); replace.num_counters = 0; table->replace.entries = 0; for (unsigned h = 0; h < NF_BR_NUMHOOKS; h++) table->replace.hook_entry[h] = 0; if (memcmp(&table->replace, &replace, sizeof(table->replace)) == 0) { char entrytable[XT_TABLE_SIZE]; memset(&entrytable, 0, sizeof(entrytable)); replace.entries = entrytable; optlen = sizeof(replace) + replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_ENTRIES, &replace, &optlen)) exit(1); if (memcmp(table->entrytable, entrytable, replace.entries_size) == 0) continue; } for (unsigned j = 0, h = 0; h < NF_BR_NUMHOOKS; h++) { if (table->replace.valid_hooks & (1 << h)) { table->replace.hook_entry[h] = (struct ebt_entries*)table->entrytable + j; j++; } } table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (setsockopt(fd, SOL_IP, EBT_SO_SET_ENTRIES, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_net_namespace(void) { checkpoint_ebtables(); checkpoint_arptables(); checkpoint_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); checkpoint_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void reset_net_namespace(void) { reset_ebtables(); reset_arptables(); reset_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); reset_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void mount_cgroups(const char* dir, const char** controllers, int count) { if (mkdir(dir, 0777)) { return; } char enabled[128] = {0}; int i = 0; for (; i < count; i++) { if (mount("none", dir, "cgroup", 0, controllers[i])) { continue; } umount(dir); strcat(enabled, ","); strcat(enabled, controllers[i]); } if (enabled[0] == 0) { if (rmdir(dir) && errno != EBUSY) exit(1); return; } if (mount("none", dir, "cgroup", 0, enabled + 1)) { if (rmdir(dir) && errno != EBUSY) exit(1); } if (chmod(dir, 0777)) { } } static void mount_cgroups2(const char** controllers, int count) { if (mkdir("/syzcgroup/unified", 0777)) { return; } if (mount("none", "/syzcgroup/unified", "cgroup2", 0, NULL)) { if (rmdir("/syzcgroup/unified") && errno != EBUSY) exit(1); return; } if (chmod("/syzcgroup/unified", 0777)) { } int control = open("/syzcgroup/unified/cgroup.subtree_control", O_WRONLY); if (control == -1) return; int i; for (i = 0; i < count; i++) if (write(control, controllers[i], strlen(controllers[i])) < 0) { } close(control); } static void setup_cgroups() { const char* unified_controllers[] = {"+cpu", "+io", "+pids"}; const char* net_controllers[] = {"net", "net_prio", "devices", "blkio", "freezer"}; const char* cpu_controllers[] = {"cpuset", "cpuacct", "hugetlb", "rlimit", "memory"}; if (mkdir("/syzcgroup", 0777)) { return; } mount_cgroups2(unified_controllers, sizeof(unified_controllers) / sizeof(unified_controllers[0])); mount_cgroups("/syzcgroup/net", net_controllers, sizeof(net_controllers) / sizeof(net_controllers[0])); mount_cgroups("/syzcgroup/cpu", cpu_controllers, sizeof(cpu_controllers) / sizeof(cpu_controllers[0])); write_file("/syzcgroup/cpu/cgroup.clone_children", "1"); write_file("/syzcgroup/cpu/cpuset.memory_pressure_enabled", "1"); } static void setup_cgroups_loop() { int pid = getpid(); char file[128]; char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/pids.max", cgroupdir); write_file(file, "32"); snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(file, sizeof(file), "%s/memory.soft_limit_in_bytes", cgroupdir); write_file(file, "%d", 299 << 20); snprintf(file, sizeof(file), "%s/memory.limit_in_bytes", cgroupdir); write_file(file, "%d", 300 << 20); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); } static void setup_cgroups_test() { char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (symlink(cgroupdir, "./cgroup")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.cpu")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.net")) { } } static void initialize_cgroups() { if (mkdir("./syz-tmp/newroot/syzcgroup", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/unified", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/cpu", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/net", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/syzcgroup/unified", "./syz-tmp/newroot/syzcgroup/unified", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/cpu", "./syz-tmp/newroot/syzcgroup/cpu", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/net", "./syz-tmp/newroot/syzcgroup/net", NULL, bind_mount_flags, NULL)) { } } static void setup_gadgetfs(); static void setup_binderfs(); static void setup_fusectl(); static void sandbox_common_mount_tmpfs(void) { write_file("/proc/sys/fs/mount-max", "100000"); if (mkdir("./syz-tmp", 0777)) exit(1); if (mount("", "./syz-tmp", "tmpfs", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot", 0777)) exit(1); if (mkdir("./syz-tmp/newroot/dev", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/dev", "./syz-tmp/newroot/dev", NULL, bind_mount_flags, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/proc", 0700)) exit(1); if (mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/selinux", 0700)) exit(1); const char* selinux_path = "./syz-tmp/newroot/selinux"; if (mount("/selinux", selinux_path, NULL, bind_mount_flags, NULL)) { if (errno != ENOENT) exit(1); if (mount("/sys/fs/selinux", selinux_path, NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); } if (mkdir("./syz-tmp/newroot/sys", 0700)) exit(1); if (mount("/sys", "./syz-tmp/newroot/sys", 0, bind_mount_flags, NULL)) exit(1); if (mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mkdir("./syz-tmp/newroot/syz-inputs", 0700)) exit(1); if (mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, bind_mount_flags | MS_RDONLY, NULL) && errno != ENOENT) exit(1); initialize_cgroups(); if (mkdir("./syz-tmp/pivot", 0777)) exit(1); if (syscall(SYS_pivot_root, "./syz-tmp", "./syz-tmp/pivot")) { if (chdir("./syz-tmp")) exit(1); } else { if (chdir("/")) exit(1); if (umount2("./pivot", MNT_DETACH)) exit(1); } if (chroot("./newroot")) exit(1); if (chdir("/")) exit(1); setup_gadgetfs(); setup_binderfs(); setup_fusectl(); } static void setup_gadgetfs() { if (mkdir("/dev/gadgetfs", 0777)) { } if (mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL)) { } } static void setup_fusectl() { if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) { } } static void setup_binderfs() { if (mkdir("/dev/binderfs", 0777)) { } if (mount("binder", "/dev/binderfs", "binder", 0, NULL)) { } } static void loop(); static void sandbox_common() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); if (getppid() == 1) exit(1); struct rlimit rlim; rlim.rlim_cur = rlim.rlim_max = (200 << 20); setrlimit(RLIMIT_AS, &rlim); rlim.rlim_cur = rlim.rlim_max = 32 << 20; setrlimit(RLIMIT_MEMLOCK, &rlim); rlim.rlim_cur = rlim.rlim_max = 136 << 20; setrlimit(RLIMIT_FSIZE, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_STACK, &rlim); rlim.rlim_cur = rlim.rlim_max = 128 << 20; setrlimit(RLIMIT_CORE, &rlim); rlim.rlim_cur = rlim.rlim_max = 256; setrlimit(RLIMIT_NOFILE, &rlim); if (unshare(CLONE_NEWNS)) { } if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, NULL)) { } if (unshare(CLONE_NEWIPC)) { } if (unshare(0x02000000)) { } if (unshare(CLONE_NEWUTS)) { } if (unshare(CLONE_SYSVSEM)) { } typedef struct { const char* name; const char* value; } sysctl_t; static const sysctl_t sysctls[] = { {"/proc/sys/kernel/shmmax", "16777216"}, {"/proc/sys/kernel/shmall", "536870912"}, {"/proc/sys/kernel/shmmni", "1024"}, {"/proc/sys/kernel/msgmax", "8192"}, {"/proc/sys/kernel/msgmni", "1024"}, {"/proc/sys/kernel/msgmnb", "1024"}, {"/proc/sys/kernel/sem", "1024 1048576 500 1024"}, }; unsigned i; for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++) write_file(sysctls[i].name, sysctls[i].value); } static int wait_for_loop(int pid) { if (pid < 0) exit(1); int status = 0; while (waitpid(-1, &status, __WALL) != pid) { } return WEXITSTATUS(status); } static void drop_caps(void) { struct __user_cap_header_struct cap_hdr = {}; struct __user_cap_data_struct cap_data[2] = {}; cap_hdr.version = _LINUX_CAPABILITY_VERSION_3; cap_hdr.pid = getpid(); if (syscall(SYS_capget, &cap_hdr, &cap_data)) exit(1); const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE); cap_data[0].effective &= ~drop; cap_data[0].permitted &= ~drop; cap_data[0].inheritable &= ~drop; if (syscall(SYS_capset, &cap_hdr, &cap_data)) exit(1); } static int do_sandbox_none(void) { if (unshare(CLONE_NEWPID)) { } int pid = fork(); if (pid != 0) return wait_for_loop(pid); initialize_vhci(); sandbox_common(); drop_caps(); initialize_netdevices_init(); if (unshare(CLONE_NEWNET)) { } write_file("/proc/sys/net/ipv4/ping_group_range", "0 65535"); initialize_tun(); initialize_netdevices(); initialize_wifi_devices(); sandbox_common_mount_tmpfs(); loop(); exit(1); } #define FS_IOC_SETFLAGS _IOW('f', 2, long) static void remove_dir(const char* dir) { int iter = 0; DIR* dp = 0; const int umount_flags = MNT_FORCE | UMOUNT_NOFOLLOW; retry: while (umount2(dir, umount_flags) == 0) { } dp = opendir(dir); if (dp == NULL) { if (errno == EMFILE) { exit(1); } exit(1); } struct dirent* ep = 0; while ((ep = readdir(dp))) { if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) continue; char filename[FILENAME_MAX]; snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); while (umount2(filename, umount_flags) == 0) { } struct stat st; if (lstat(filename, &st)) exit(1); if (S_ISDIR(st.st_mode)) { remove_dir(filename); continue; } int i; for (i = 0;; i++) { if (unlink(filename) == 0) break; if (errno == EPERM) { int fd = open(filename, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno != EBUSY || i > 100) exit(1); if (umount2(filename, umount_flags)) exit(1); } } closedir(dp); for (int i = 0;; i++) { if (rmdir(dir) == 0) break; if (i < 100) { if (errno == EPERM) { int fd = open(dir, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno == EBUSY) { if (umount2(dir, umount_flags)) exit(1); continue; } if (errno == ENOTEMPTY) { if (iter < 100) { iter++; goto retry; } } } exit(1); } } static void kill_and_wait(int pid, int* status) { kill(-pid, SIGKILL); kill(pid, SIGKILL); for (int i = 0; i < 100; i++) { if (waitpid(-1, status, WNOHANG | __WALL) == pid) return; usleep(1000); } DIR* dir = opendir("/sys/fs/fuse/connections"); if (dir) { for (;;) { struct dirent* ent = readdir(dir); if (!ent) break; if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) continue; char abort[300]; snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", ent->d_name); int fd = open(abort, O_WRONLY); if (fd == -1) { continue; } if (write(fd, abort, 1) < 0) { } close(fd); } closedir(dir); } else { } while (waitpid(-1, status, __WALL) != pid) { } } static void setup_loop() { setup_cgroups_loop(); checkpoint_net_namespace(); } static void reset_loop() { reset_net_namespace(); } static void setup_test() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); setpgrp(); setup_cgroups_test(); write_file("/proc/self/oom_score_adj", "1000"); flush_tun(); if (symlink("/dev/binderfs", "./binderfs")) { } } static void close_fds() { for (int fd = 3; fd < MAX_FDS; fd++) close(fd); } static const char* setup_binfmt_misc() { if (mount(0, "/proc/sys/fs/binfmt_misc", "binfmt_misc", 0, 0) && errno != EBUSY) { return NULL; } if (!write_file("/proc/sys/fs/binfmt_misc/register", ":syz0:M:0:\x01::./file0:") || !write_file("/proc/sys/fs/binfmt_misc/register", ":syz1:M:1:\x02::./file0:POC")) return "write(/proc/sys/fs/binfmt_misc/register) failed"; return NULL; } static const char* setup_usb() { if (chmod("/dev/raw-gadget", 0666)) return "failed to chmod /dev/raw-gadget"; return NULL; } static void setup_sysctl() { int cad_pid = fork(); if (cad_pid < 0) exit(1); if (cad_pid == 0) { for (;;) sleep(100); } char tmppid[32]; snprintf(tmppid, sizeof(tmppid), "%d", cad_pid); struct { const char* name; const char* data; } files[] = { {"/sys/kernel/debug/x86/nmi_longest_ns", "10000000000"}, {"/proc/sys/kernel/hung_task_check_interval_secs", "20"}, {"/proc/sys/net/core/bpf_jit_kallsyms", "1"}, {"/proc/sys/net/core/bpf_jit_harden", "0"}, {"/proc/sys/kernel/kptr_restrict", "0"}, {"/proc/sys/kernel/softlockup_all_cpu_backtrace", "1"}, {"/proc/sys/fs/mount-max", "100"}, {"/proc/sys/vm/oom_dump_tasks", "0"}, {"/proc/sys/debug/exception-trace", "0"}, {"/proc/sys/kernel/printk", "7 4 1 3"}, {"/proc/sys/kernel/keys/gc_delay", "1"}, {"/proc/sys/vm/oom_kill_allocating_task", "1"}, {"/proc/sys/kernel/ctrl-alt-del", "0"}, {"/proc/sys/kernel/cad_pid", tmppid}, }; for (size_t i = 0; i < sizeof(files) / sizeof(files[0]); i++) { if (!write_file(files[i].name, files[i].data)) { } } kill(cad_pid, SIGKILL); while (waitpid(cad_pid, NULL, 0) != cad_pid) ; } #define NL802154_CMD_SET_SHORT_ADDR 11 #define NL802154_ATTR_IFINDEX 3 #define NL802154_ATTR_SHORT_ADDR 10 static const char* setup_802154() { const char* error = NULL; int sock_generic = -1; int sock_route = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock_route == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) failed"; goto fail; } sock_generic = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock_generic == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) failed"; goto fail; } { int nl802154_family_id = netlink_query_family_id(&nlmsg, sock_generic, "nl802154", true); if (nl802154_family_id < 0) { error = "netlink_query_family_id failed"; goto fail; } for (int i = 0; i < 2; i++) { char devname[] = "wpan0"; devname[strlen(devname) - 1] += i; uint64_t hwaddr = 0xaaaaaaaaaaaa0002 + (i << 8); uint16_t shortaddr = 0xaaa0 + i; int ifindex = if_nametoindex(devname); struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL802154_CMD_SET_SHORT_ADDR; netlink_init(&nlmsg, nl802154_family_id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, NL802154_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(&nlmsg, NL802154_ATTR_SHORT_ADDR, &shortaddr, sizeof(shortaddr)); if (netlink_send(&nlmsg, sock_generic) < 0) { error = "NL802154_CMD_SET_SHORT_ADDR failed"; goto fail; } netlink_device_change(&nlmsg, sock_route, devname, true, 0, &hwaddr, sizeof(hwaddr), 0); if (i == 0) { netlink_add_device_impl(&nlmsg, "lowpan", "lowpan0", false); netlink_done(&nlmsg); netlink_attr(&nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); if (netlink_send(&nlmsg, sock_route) < 0) { error = "netlink: adding device lowpan0 type lowpan link wpan0"; goto fail; } } } } fail: close(sock_route); close(sock_generic); return error; } #define SWAP_FILE "./swap-file" #define SWAP_FILE_SIZE (128 * 1000 * 1000) static const char* setup_swap() { swapoff(SWAP_FILE); unlink(SWAP_FILE); int fd = open(SWAP_FILE, O_CREAT | O_WRONLY | O_CLOEXEC, 0600); if (fd == -1) return "swap file open failed"; fallocate(fd, FALLOC_FL_ZERO_RANGE, 0, SWAP_FILE_SIZE); close(fd); char cmdline[64]; sprintf(cmdline, "mkswap %s", SWAP_FILE); if (runcmdline(cmdline)) return "mkswap failed"; if (swapon(SWAP_FILE, SWAP_FLAG_PREFER) == 1) return "swapon failed"; return NULL; } struct thread_t { int created, call; event_t ready, done; }; static struct thread_t threads[16]; static void execute_call(int call); static int running; static void* thr(void* arg) { struct thread_t* th = (struct thread_t*)arg; for (;;) { event_wait(&th->ready); event_reset(&th->ready); execute_call(th->call); __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); event_set(&th->done); } return 0; } static void execute_one(void) { if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } int i, call, thread; for (call = 0; call < 1; call++) { for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); thread++) { struct thread_t* th = &threads[thread]; if (!th->created) { th->created = 1; event_init(&th->ready); event_init(&th->done); event_set(&th->done); thread_start(thr, th); } if (!event_isset(&th->done)) continue; event_reset(&th->done); th->call = call; __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); event_set(&th->ready); event_timedwait(&th->done, 50); break; } } for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) sleep_ms(1); close_fds(); } static void execute_one(void); #define WAIT_FLAGS __WALL static void loop(void) { setup_loop(); int iter = 0; for (;; iter++) { char cwdbuf[32]; sprintf(cwdbuf, "./%d", iter); if (mkdir(cwdbuf, 0777)) exit(1); reset_loop(); int pid = fork(); if (pid < 0) exit(1); if (pid == 0) { if (chdir(cwdbuf)) exit(1); setup_test(); execute_one(); exit(0); } int status = 0; uint64_t start = current_time_ms(); for (;;) { sleep_ms(10); if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) break; if (current_time_ms() - start < 5000) continue; kill_and_wait(pid, &status); break; } remove_dir(cwdbuf); } } void execute_call(int call) { switch (call) { case 0: // socket$kcm arguments: [ // domain: const = 0x2c (8 bytes) // type: kcm_socket_type = 0x3 (8 bytes) // proto: const = 0x0 (4 bytes) // ] // returns sock_kcm syscall(__NR_socket, /*domain=*/0x2cul, /*type=SOCK_DGRAM|0x1*/3ul, /*proto=*/0); break; } } int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); setup_sysctl(); setup_cgroups(); const char* reason; (void)reason; if ((reason = setup_binfmt_misc())) printf("the reproducer may not work as expected: binfmt_misc setup failed: %s\n", reason); if ((reason = setup_usb())) printf("the reproducer may not work as expected: USB injection setup failed: %s\n", reason); if ((reason = setup_802154())) printf("the reproducer may not work as expected: 802154 injection setup failed: %s\n", reason); if ((reason = setup_swap())) printf("the reproducer may not work as expected: swap setup failed: %s\n", reason); install_segv_handler(); for (procid = 0; procid < 3; procid++) { if (fork() == 0) { use_temporary_dir(); do_sandbox_none(); } } sleep(1000000); return 0; } compiler invocation: gcc [-o /tmp/syz-executor2241863920 -DGOOS_linux=1 -DGOARCH_amd64=1 -DHOSTGOOS_linux=1 -x c - -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -fpermissive -w] 2025/08/06 19:13:36 "WARNING in xsk_create": saved crash log into 1754507616.crash.log 2025/08/06 19:13:39 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:13:48 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:14:20 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:14:26 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:14:27 runner 0 connected 2025/08/06 19:14:37 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:14:55 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:15:06 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:15:07 new: boot error: can't ssh into the instance 2025/08/06 19:15:20 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:15:27 runner 5 connected 2025/08/06 19:15:35 base: boot error: can't ssh into the instance 2025/08/06 19:15:39 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:16:08 runner 7 connected 2025/08/06 19:16:24 runner 2 connected 2025/08/06 19:16:25 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:16:25 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:16:57 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:16:57 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:17:15 runner 0 connected 2025/08/06 19:17:35 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:17:45 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:17:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 15, "corpus": 9582, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 9637, "coverage": 71032, "distributor delayed": 20757, "distributor undelayed": 20757, "distributor violated": 935, "exec candidate": 22555, "exec collide": 24393, "exec fuzz": 46280, "exec gen": 2417, "exec hints": 7523, "exec inject": 0, "exec minimize": 1492, "exec retries": 175, "exec seeds": 150, "exec smash": 1283, "exec total [base]": 174022, "exec total [new]": 176757, "exec triage": 31564, "executor restarts": 1076, "fault jobs": 0, "fuzzer jobs": 3, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 1, "hints jobs": 2, "max signal": 73714, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 850, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10180, "no exec duration": 12060266000000, "no exec requests": 38404, "pending": 220, "prog exec time": 480, "reproducing": 2, "rpc recv": 10499880092, "rpc sent": 1080536128, "signal": 70098, "smash jobs": 1, "triage jobs": 0, "vm output": 19161812, "vm restarts [base]": 31, "vm restarts [new]": 276 } 2025/08/06 19:17:46 runner 7 connected 2025/08/06 19:17:50 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:18:13 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:18:26 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:18:37 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:18:39 runner 0 connected 2025/08/06 19:18:51 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:19:15 runner 7 connected 2025/08/06 19:19:21 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:19:24 new: boot error: can't ssh into the instance 2025/08/06 19:19:26 runner 5 connected 2025/08/06 19:19:28 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f mm/slab_common.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:20:08 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:20:10 runner 0 connected 2025/08/06 19:20:12 runner 8 connected 2025/08/06 19:20:27 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:20:39 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:20:50 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f mm/slab_common.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:20:51 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:20:58 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:21:15 runner 5 connected 2025/08/06 19:21:26 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:21:28 runner 7 connected 2025/08/06 19:21:36 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:21:40 runner 0 connected 2025/08/06 19:21:48 runner 8 connected 2025/08/06 19:21:48 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:22:01 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:22:03 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:22:13 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:22:26 runner 5 connected 2025/08/06 19:22:37 runner 7 connected 2025/08/06 19:22:44 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:22:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 15, "corpus": 9582, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 9742, "coverage": 71032, "distributor delayed": 20765, "distributor undelayed": 20765, "distributor violated": 935, "exec candidate": 22555, "exec collide": 24949, "exec fuzz": 47281, "exec gen": 2462, "exec hints": 7681, "exec inject": 0, "exec minimize": 1492, "exec retries": 177, "exec seeds": 150, "exec smash": 1304, "exec total [base]": 175809, "exec total [new]": 178545, "exec triage": 31572, "executor restarts": 1108, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 2, "hints jobs": 1, "max signal": 73718, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 857, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10183, "no exec duration": 12673652000000, "no exec requests": 39908, "pending": 220, "prog exec time": 372, "reproducing": 2, "rpc recv": 10871481548, "rpc sent": 1102642000, "signal": 70098, "smash jobs": 0, "triage jobs": 1, "vm output": 19674686, "vm restarts [base]": 31, "vm restarts [new]": 288 } 2025/08/06 19:22:50 runner 0 connected 2025/08/06 19:22:55 new: boot error: can't ssh into the instance 2025/08/06 19:23:01 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:23:03 runner 8 connected 2025/08/06 19:23:12 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:23:20 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:23:23 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:23:34 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:23:43 runner 4 connected 2025/08/06 19:23:51 runner 7 connected 2025/08/06 19:23:59 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:24:02 runner 0 connected 2025/08/06 19:24:22 runner 5 connected 2025/08/06 19:24:32 new: boot error: can't ssh into the instance 2025/08/06 19:24:40 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:25:13 new: boot error: can't ssh into the instance 2025/08/06 19:25:20 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:26:02 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:26:10 runner 9 connected 2025/08/06 19:26:32 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:26:39 base crash: lost connection to test machine 2025/08/06 19:26:40 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:26:40 repro finished 'WARNING in corrupted', repro=true crepro=false desc='WARNING in xsk_create' hub=false from_dashboard=false 2025/08/06 19:26:40 found repro for "WARNING in xsk_create" (orig title: "WARNING in corrupted", reliability: 1), took 38.00 minutes 2025/08/06 19:26:40 "WARNING in xsk_create": saved crash log into 1754508400.crash.log 2025/08/06 19:26:40 start reproducing 'WARNING in corrupted' 2025/08/06 19:26:40 "WARNING in xsk_create": saved repro log into 1754508400.repro.log 2025/08/06 19:26:52 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:27:11 base crash: lost connection to test machine 2025/08/06 19:27:26 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:27:28 runner 1 connected 2025/08/06 19:27:30 runner 5 connected 2025/08/06 19:27:41 runner 9 connected 2025/08/06 19:27:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 15, "corpus": 9584, "corpus [files]": 476, "corpus [symbols]": 474, "cover overflows": 10074, "coverage": 71034, "distributor delayed": 20785, "distributor undelayed": 20785, "distributor violated": 935, "exec candidate": 22555, "exec collide": 26690, "exec fuzz": 50716, "exec gen": 2626, "exec hints": 7908, "exec inject": 0, "exec minimize": 1662, "exec retries": 180, "exec seeds": 154, "exec smash": 1331, "exec total [base]": 180458, "exec total [new]": 184357, "exec triage": 31604, "executor restarts": 1141, "fault jobs": 0, "fuzzer jobs": 5, "fuzzing VMs [base]": 2, "fuzzing VMs [new]": 4, "hints jobs": 2, "max signal": 73733, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 929, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10194, "no exec duration": 13164643000000, "no exec requests": 41421, "pending": 219, "prog exec time": 386, "reproducing": 2, "rpc recv": 11159294056, "rpc sent": 1152606768, "signal": 70100, "smash jobs": 1, "triage jobs": 2, "vm output": 20456571, "vm restarts [base]": 32, "vm restarts [new]": 297 } 2025/08/06 19:27:50 new: boot error: can't ssh into the instance 2025/08/06 19:27:58 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:27:59 runner 2 connected 2025/08/06 19:28:14 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:28:14 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:28:26 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:28:26 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:28:33 attempt #0 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:28:35 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:28:51 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:29:03 runner 0 connected 2025/08/06 19:29:17 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:29:23 runner 7 connected 2025/08/06 19:29:32 runner 5 connected 2025/08/06 19:30:13 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:30:13 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:30:19 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:30:24 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:30:24 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:30:24 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:30:24 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:30:33 attempt #1 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:30:37 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:30:37 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:30:42 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:31:03 runner 4 connected 2025/08/06 19:31:21 runner 0 connected 2025/08/06 19:31:27 runner 9 connected 2025/08/06 19:31:37 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:31:59 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:32:02 patched crashed: INFO: rcu detected stall in corrupted [need repro = false] 2025/08/06 19:32:06 base crash: INFO: rcu detected stall in perf_event_open 2025/08/06 19:32:16 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 19:32:16 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 19:32:26 attempt #2 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:32:26 patched-only: WARNING in xsk_create 2025/08/06 19:32:26 scheduled a reproduction of 'WARNING in xsk_create (full)' 2025/08/06 19:32:26 start reproducing 'WARNING in xsk_create (full)' 2025/08/06 19:32:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 17, "corpus": 9587, "corpus [files]": 477, "corpus [symbols]": 475, "cover overflows": 10356, "coverage": 71040, "distributor delayed": 20805, "distributor undelayed": 20802, "distributor violated": 935, "exec candidate": 22555, "exec collide": 28121, "exec fuzz": 53415, "exec gen": 2768, "exec hints": 8166, "exec inject": 0, "exec minimize": 1804, "exec retries": 180, "exec seeds": 165, "exec smash": 1422, "exec total [base]": 185574, "exec total [new]": 189148, "exec triage": 31627, "executor restarts": 1163, "fault jobs": 0, "fuzzer jobs": 4, "fuzzing VMs [base]": 2, "fuzzing VMs [new]": 1, "hints jobs": 1, "max signal": 73754, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1007, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10204, "no exec duration": 13164643000000, "no exec requests": 41421, "pending": 226, "prog exec time": 355, "reproducing": 3, "rpc recv": 11415418864, "rpc sent": 1200092192, "signal": 70105, "smash jobs": 0, "triage jobs": 3, "vm output": 21082729, "vm restarts [base]": 33, "vm restarts [new]": 303 } 2025/08/06 19:32:51 runner 5 connected 2025/08/06 19:32:54 runner 2 connected 2025/08/06 19:33:03 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:33:15 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:33:29 new: boot error: can't ssh into the instance 2025/08/06 19:33:43 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:33:44 reproducing crash 'no output/lost connection': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:33:50 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:34:18 runner 8 connected 2025/08/06 19:34:31 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:34:33 runner 9 connected 2025/08/06 19:34:38 new: boot error: can't ssh into the instance 2025/08/06 19:34:40 runner 5 connected 2025/08/06 19:35:26 runner 6 connected 2025/08/06 19:35:33 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:35:34 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:36:22 runner 8 connected 2025/08/06 19:36:32 runner 5 connected 2025/08/06 19:36:47 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:37:07 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:37:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 17, "corpus": 9588, "corpus [files]": 477, "corpus [symbols]": 475, "cover overflows": 10580, "coverage": 71041, "distributor delayed": 20834, "distributor undelayed": 20832, "distributor violated": 935, "exec candidate": 22555, "exec collide": 29369, "exec fuzz": 55813, "exec gen": 2905, "exec hints": 8387, "exec inject": 0, "exec minimize": 1914, "exec retries": 180, "exec seeds": 165, "exec smash": 1447, "exec total [base]": 190548, "exec total [new]": 193332, "exec triage": 31665, "executor restarts": 1184, "fault jobs": 0, "fuzzer jobs": 5, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 3, "hints jobs": 1, "max signal": 73768, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1061, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10216, "no exec duration": 13561932000000, "no exec requests": 42714, "pending": 226, "prog exec time": 380, "reproducing": 3, "rpc recv": 11669713060, "rpc sent": 1244145536, "signal": 70106, "smash jobs": 0, "triage jobs": 4, "vm output": 21643244, "vm restarts [base]": 34, "vm restarts [new]": 310 } 2025/08/06 19:37:56 new: boot error: can't ssh into the instance 2025/08/06 19:37:56 runner 9 connected 2025/08/06 19:38:07 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:38:19 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:39:09 runner 9 connected 2025/08/06 19:39:20 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:39:29 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:40:10 runner 5 connected 2025/08/06 19:40:20 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:40:22 repro finished 'WARNING in xsk_create (full)', repro=false crepro=false desc='' hub=false from_dashboard=false 2025/08/06 19:40:22 failed repro for "WARNING in xsk_create", err=failed to build program: // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static unsigned long long procid; static __thread int clone_ongoing; static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* ctx) { if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) { exit(sig); } uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0; int valid = addr < prog_start || addr > prog_end; if (skip && valid) { _longjmp(segv_env, 1); } exit(sig); } static void install_segv_handler(void) { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) ({ int ok = 1; __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); if (_setjmp(segv_env) == 0) { __VA_ARGS__; } else ok = 0; __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); ok; }) static void sleep_ms(uint64_t ms) { usleep(ms * 1000); } static uint64_t current_time_ms(void) { struct timespec ts; if (clock_gettime(CLOCK_MONOTONIC, &ts)) exit(1); return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; } static void use_temporary_dir(void) { char tmpdir_template[] = "./syzkaller.XXXXXX"; char* tmpdir = mkdtemp(tmpdir_template); if (!tmpdir) exit(1); if (chmod(tmpdir, 0777)) exit(1); if (chdir(tmpdir)) exit(1); } static void thread_start(void* (*fn)(void*), void* arg) { pthread_t th; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setstacksize(&attr, 128 << 10); int i = 0; for (; i < 100; i++) { if (pthread_create(&th, &attr, fn, arg) == 0) { pthread_attr_destroy(&attr); return; } if (errno == EAGAIN) { usleep(50); continue; } break; } exit(1); } typedef struct { int state; } event_t; static void event_init(event_t* ev) { ev->state = 0; } static void event_reset(event_t* ev) { ev->state = 0; } static void event_set(event_t* ev) { if (ev->state) exit(1); __atomic_store_n(&ev->state, 1, __ATOMIC_RELEASE); syscall(SYS_futex, &ev->state, FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1000000); } static void event_wait(event_t* ev) { while (!__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, 0); } static int event_isset(event_t* ev) { return __atomic_load_n(&ev->state, __ATOMIC_ACQUIRE); } static int event_timedwait(event_t* ev, uint64_t timeout) { uint64_t start = current_time_ms(); uint64_t now = start; for (;;) { uint64_t remain = timeout - (now - start); struct timespec ts; ts.tv_sec = remain / 1000; ts.tv_nsec = (remain % 1000) * 1000 * 1000; syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, &ts); if (__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) return 1; now = current_time_ms(); if (now - start > timeout) return 0; } } static bool write_file(const char* file, const char* what, ...) { char buf[1024]; va_list args; va_start(args, what); vsnprintf(buf, sizeof(buf), what, args); va_end(args); buf[sizeof(buf) - 1] = 0; int len = strlen(buf); int fd = open(file, O_WRONLY | O_CLOEXEC); if (fd == -1) return false; if (write(fd, buf, len) != len) { int err = errno; close(fd); errno = err; return false; } close(fd); return true; } struct nlmsg { char* pos; int nesting; struct nlattr* nested[8]; char buf[4096]; }; static void netlink_init(struct nlmsg* nlmsg, int typ, int flags, const void* data, int size) { memset(nlmsg, 0, sizeof(*nlmsg)); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_type = typ; hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags; memcpy(hdr + 1, data, size); nlmsg->pos = (char*)(hdr + 1) + NLMSG_ALIGN(size); } static void netlink_attr(struct nlmsg* nlmsg, int typ, const void* data, int size) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_len = sizeof(*attr) + size; attr->nla_type = typ; if (size > 0) memcpy(attr + 1, data, size); nlmsg->pos += NLMSG_ALIGN(attr->nla_len); } static void netlink_nest(struct nlmsg* nlmsg, int typ) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_type = typ; nlmsg->pos += sizeof(*attr); nlmsg->nested[nlmsg->nesting++] = attr; } static void netlink_done(struct nlmsg* nlmsg) { struct nlattr* attr = nlmsg->nested[--nlmsg->nesting]; attr->nla_len = nlmsg->pos - (char*)attr; } static int netlink_send_ext(struct nlmsg* nlmsg, int sock, uint16_t reply_type, int* reply_len, bool dofail) { if (nlmsg->pos > nlmsg->buf + sizeof(nlmsg->buf) || nlmsg->nesting) exit(1); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_len = nlmsg->pos - nlmsg->buf; struct sockaddr_nl addr; memset(&addr, 0, sizeof(addr)); addr.nl_family = AF_NETLINK; ssize_t n = sendto(sock, nlmsg->buf, hdr->nlmsg_len, 0, (struct sockaddr*)&addr, sizeof(addr)); if (n != (ssize_t)hdr->nlmsg_len) { if (dofail) exit(1); return -1; } n = recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); if (reply_len) *reply_len = 0; if (n < 0) { if (dofail) exit(1); return -1; } if (n < (ssize_t)sizeof(struct nlmsghdr)) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type == NLMSG_DONE) return 0; if (reply_len && hdr->nlmsg_type == reply_type) { *reply_len = n; return 0; } if (n < (ssize_t)(sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr))) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type != NLMSG_ERROR) { errno = EINVAL; if (dofail) exit(1); return -1; } errno = -((struct nlmsgerr*)(hdr + 1))->error; return -errno; } static int netlink_send(struct nlmsg* nlmsg, int sock) { return netlink_send_ext(nlmsg, sock, 0, NULL, true); } static int netlink_query_family_id(struct nlmsg* nlmsg, int sock, const char* family_name, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = CTRL_CMD_GETFAMILY; netlink_init(nlmsg, GENL_ID_CTRL, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, CTRL_ATTR_FAMILY_NAME, family_name, strnlen(family_name, GENL_NAMSIZ - 1) + 1); int n = 0; int err = netlink_send_ext(nlmsg, sock, GENL_ID_CTRL, &n, dofail); if (err < 0) { return -1; } uint16_t id = 0; struct nlattr* attr = (struct nlattr*)(nlmsg->buf + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg->buf + n; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == CTRL_ATTR_FAMILY_ID) { id = *(uint16_t*)(attr + 1); break; } } if (!id) { errno = EINVAL; return -1; } recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); return id; } static int netlink_next_msg(struct nlmsg* nlmsg, unsigned int offset, unsigned int total_len) { struct nlmsghdr* hdr = (struct nlmsghdr*)(nlmsg->buf + offset); if (offset == total_len || offset + hdr->nlmsg_len > total_len) return -1; return hdr->nlmsg_len; } static void netlink_add_device_impl(struct nlmsg* nlmsg, const char* type, const char* name, bool up) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; netlink_init(nlmsg, RTM_NEWLINK, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); if (name) netlink_attr(nlmsg, IFLA_IFNAME, name, strlen(name)); netlink_nest(nlmsg, IFLA_LINKINFO); netlink_attr(nlmsg, IFLA_INFO_KIND, type, strlen(type)); } static void netlink_add_device(struct nlmsg* nlmsg, int sock, const char* type, const char* name) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_veth(struct nlmsg* nlmsg, int sock, const char* name, const char* peer) { netlink_add_device_impl(nlmsg, "veth", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_nest(nlmsg, VETH_INFO_PEER); nlmsg->pos += sizeof(struct ifinfomsg); netlink_attr(nlmsg, IFLA_IFNAME, peer, strlen(peer)); netlink_done(nlmsg); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_xfrm(struct nlmsg* nlmsg, int sock, const char* name) { netlink_add_device_impl(nlmsg, "xfrm", name, true); netlink_nest(nlmsg, IFLA_INFO_DATA); int if_id = 1; netlink_attr(nlmsg, 2, &if_id, sizeof(if_id)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_hsr(struct nlmsg* nlmsg, int sock, const char* name, const char* slave1, const char* slave2) { netlink_add_device_impl(nlmsg, "hsr", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); int ifindex1 = if_nametoindex(slave1); netlink_attr(nlmsg, IFLA_HSR_SLAVE1, &ifindex1, sizeof(ifindex1)); int ifindex2 = if_nametoindex(slave2); netlink_attr(nlmsg, IFLA_HSR_SLAVE2, &ifindex2, sizeof(ifindex2)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_linked(struct nlmsg* nlmsg, int sock, const char* type, const char* name, const char* link) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_vlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t id, uint16_t proto) { netlink_add_device_impl(nlmsg, "vlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_VLAN_ID, &id, sizeof(id)); netlink_attr(nlmsg, IFLA_VLAN_PROTOCOL, &proto, sizeof(proto)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_macvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link) { netlink_add_device_impl(nlmsg, "macvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); uint32_t mode = MACVLAN_MODE_BRIDGE; netlink_attr(nlmsg, IFLA_MACVLAN_MODE, &mode, sizeof(mode)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_geneve(struct nlmsg* nlmsg, int sock, const char* name, uint32_t vni, struct in_addr* addr4, struct in6_addr* addr6) { netlink_add_device_impl(nlmsg, "geneve", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_GENEVE_ID, &vni, sizeof(vni)); if (addr4) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE, addr4, sizeof(*addr4)); if (addr6) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE6, addr6, sizeof(*addr6)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } #define IFLA_IPVLAN_FLAGS 2 #define IPVLAN_MODE_L3S 2 #undef IPVLAN_F_VEPA #define IPVLAN_F_VEPA 2 static void netlink_add_ipvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t mode, uint16_t flags) { netlink_add_device_impl(nlmsg, "ipvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_IPVLAN_MODE, &mode, sizeof(mode)); netlink_attr(nlmsg, IFLA_IPVLAN_FLAGS, &flags, sizeof(flags)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_device_change(struct nlmsg* nlmsg, int sock, const char* name, bool up, const char* master, const void* mac, int macsize, const char* new_name) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; hdr.ifi_index = if_nametoindex(name); netlink_init(nlmsg, RTM_NEWLINK, 0, &hdr, sizeof(hdr)); if (new_name) netlink_attr(nlmsg, IFLA_IFNAME, new_name, strlen(new_name)); if (master) { int ifindex = if_nametoindex(master); netlink_attr(nlmsg, IFLA_MASTER, &ifindex, sizeof(ifindex)); } if (macsize) netlink_attr(nlmsg, IFLA_ADDRESS, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static int netlink_add_addr(struct nlmsg* nlmsg, int sock, const char* dev, const void* addr, int addrsize) { struct ifaddrmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ifa_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ifa_prefixlen = addrsize == 4 ? 24 : 120; hdr.ifa_scope = RT_SCOPE_UNIVERSE; hdr.ifa_index = if_nametoindex(dev); netlink_init(nlmsg, RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, IFA_LOCAL, addr, addrsize); netlink_attr(nlmsg, IFA_ADDRESS, addr, addrsize); return netlink_send(nlmsg, sock); } static void netlink_add_addr4(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in_addr in_addr; inet_pton(AF_INET, addr, &in_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in_addr, sizeof(in_addr)); if (err < 0) { } } static void netlink_add_addr6(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in6_addr in6_addr; inet_pton(AF_INET6, addr, &in6_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in6_addr, sizeof(in6_addr)); if (err < 0) { } } static void netlink_add_neigh(struct nlmsg* nlmsg, int sock, const char* name, const void* addr, int addrsize, const void* mac, int macsize) { struct ndmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ndm_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ndm_ifindex = if_nametoindex(name); hdr.ndm_state = NUD_PERMANENT; netlink_init(nlmsg, RTM_NEWNEIGH, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, NDA_DST, addr, addrsize); netlink_attr(nlmsg, NDA_LLADDR, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static struct nlmsg nlmsg; static int tunfd = -1; #define TUN_IFACE "syz_tun" #define LOCAL_MAC 0xaaaaaaaaaaaa #define REMOTE_MAC 0xaaaaaaaaaabb #define LOCAL_IPV4 "172.20.20.170" #define REMOTE_IPV4 "172.20.20.187" #define LOCAL_IPV6 "fe80::aa" #define REMOTE_IPV6 "fe80::bb" #define IFF_NAPI 0x0010 static void initialize_tun(void) { tunfd = open("/dev/net/tun", O_RDWR | O_NONBLOCK); if (tunfd == -1) { printf("tun: can't open /dev/net/tun: please enable CONFIG_TUN=y\n"); printf("otherwise fuzzing or reproducing might not work as intended\n"); return; } const int kTunFd = 200; if (dup2(tunfd, kTunFd) < 0) exit(1); close(tunfd); tunfd = kTunFd; struct ifreq ifr; memset(&ifr, 0, sizeof(ifr)); strncpy(ifr.ifr_name, TUN_IFACE, IFNAMSIZ); ifr.ifr_flags = IFF_TAP | IFF_NO_PI; if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0) { exit(1); } char sysctl[64]; sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/accept_dad", TUN_IFACE); write_file(sysctl, "0"); sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/router_solicitations", TUN_IFACE); write_file(sysctl, "0"); int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); netlink_add_addr4(&nlmsg, sock, TUN_IFACE, LOCAL_IPV4); netlink_add_addr6(&nlmsg, sock, TUN_IFACE, LOCAL_IPV6); uint64_t macaddr = REMOTE_MAC; struct in_addr in_addr; inet_pton(AF_INET, REMOTE_IPV4, &in_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in_addr, sizeof(in_addr), &macaddr, ETH_ALEN); struct in6_addr in6_addr; inet_pton(AF_INET6, REMOTE_IPV6, &in6_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in6_addr, sizeof(in6_addr), &macaddr, ETH_ALEN); macaddr = LOCAL_MAC; netlink_device_change(&nlmsg, sock, TUN_IFACE, true, 0, &macaddr, ETH_ALEN, NULL); close(sock); } #define DEVLINK_FAMILY_NAME "devlink" #define DEVLINK_CMD_PORT_GET 5 #define DEVLINK_ATTR_BUS_NAME 1 #define DEVLINK_ATTR_DEV_NAME 2 #define DEVLINK_ATTR_NETDEV_NAME 7 static struct nlmsg nlmsg2; static void initialize_devlink_ports(const char* bus_name, const char* dev_name, const char* netdev_prefix) { struct genlmsghdr genlhdr; int len, total_len, id, err, offset; uint16_t netdev_index; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) exit(1); int rtsock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (rtsock == -1) exit(1); id = netlink_query_family_id(&nlmsg, sock, DEVLINK_FAMILY_NAME, true); if (id == -1) goto error; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = DEVLINK_CMD_PORT_GET; netlink_init(&nlmsg, id, NLM_F_DUMP, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, DEVLINK_ATTR_BUS_NAME, bus_name, strlen(bus_name) + 1); netlink_attr(&nlmsg, DEVLINK_ATTR_DEV_NAME, dev_name, strlen(dev_name) + 1); err = netlink_send_ext(&nlmsg, sock, id, &total_len, true); if (err < 0) { goto error; } offset = 0; netdev_index = 0; while ((len = netlink_next_msg(&nlmsg, offset, total_len)) != -1) { struct nlattr* attr = (struct nlattr*)(nlmsg.buf + offset + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg.buf + offset + len; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == DEVLINK_ATTR_NETDEV_NAME) { char* port_name; char netdev_name[IFNAMSIZ]; port_name = (char*)(attr + 1); snprintf(netdev_name, sizeof(netdev_name), "%s%d", netdev_prefix, netdev_index); netlink_device_change(&nlmsg2, rtsock, port_name, true, 0, 0, 0, netdev_name); break; } } offset += len; netdev_index++; } error: close(rtsock); close(sock); } #define WIFI_INITIAL_DEVICE_COUNT 2 #define WIFI_MAC_BASE { 0x08, 0x02, 0x11, 0x00, 0x00, 0x00} #define WIFI_IBSS_BSSID { 0x50, 0x50, 0x50, 0x50, 0x50, 0x50} #define WIFI_IBSS_SSID { 0x10, 0x10, 0x10, 0x10, 0x10, 0x10} #define WIFI_DEFAULT_FREQUENCY 2412 #define WIFI_DEFAULT_SIGNAL 0 #define WIFI_DEFAULT_RX_RATE 1 #define HWSIM_CMD_REGISTER 1 #define HWSIM_CMD_FRAME 2 #define HWSIM_CMD_NEW_RADIO 4 #define HWSIM_ATTR_SUPPORT_P2P_DEVICE 14 #define HWSIM_ATTR_PERM_ADDR 22 #define IF_OPER_UP 6 struct join_ibss_props { int wiphy_freq; bool wiphy_freq_fixed; uint8_t* mac; uint8_t* ssid; int ssid_len; }; static int set_interface_state(const char* interface_name, int on) { struct ifreq ifr; int sock = socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) { return -1; } memset(&ifr, 0, sizeof(ifr)); strcpy(ifr.ifr_name, interface_name); int ret = ioctl(sock, SIOCGIFFLAGS, &ifr); if (ret < 0) { close(sock); return -1; } if (on) ifr.ifr_flags |= IFF_UP; else ifr.ifr_flags &= ~IFF_UP; ret = ioctl(sock, SIOCSIFFLAGS, &ifr); close(sock); if (ret < 0) { return -1; } return 0; } static int nl80211_set_interface(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, uint32_t iftype, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_SET_INTERFACE; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_IFTYPE, &iftype, sizeof(iftype)); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int nl80211_join_ibss(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, struct join_ibss_props* props, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_JOIN_IBSS; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_SSID, props->ssid, props->ssid_len); netlink_attr(nlmsg, NL80211_ATTR_WIPHY_FREQ, &(props->wiphy_freq), sizeof(props->wiphy_freq)); if (props->mac) netlink_attr(nlmsg, NL80211_ATTR_MAC, props->mac, ETH_ALEN); if (props->wiphy_freq_fixed) netlink_attr(nlmsg, NL80211_ATTR_FREQ_FIXED, NULL, 0); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int get_ifla_operstate(struct nlmsg* nlmsg, int ifindex, bool dofail) { struct ifinfomsg info; memset(&info, 0, sizeof(info)); info.ifi_family = AF_UNSPEC; info.ifi_index = ifindex; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) { return -1; } netlink_init(nlmsg, RTM_GETLINK, 0, &info, sizeof(info)); int n; int err = netlink_send_ext(nlmsg, sock, RTM_NEWLINK, &n, dofail); close(sock); if (err) { return -1; } struct rtattr* attr = IFLA_RTA(NLMSG_DATA(nlmsg->buf)); for (; RTA_OK(attr, n); attr = RTA_NEXT(attr, n)) { if (attr->rta_type == IFLA_OPERSTATE) return *((int32_t*)RTA_DATA(attr)); } return -1; } static int await_ifla_operstate(struct nlmsg* nlmsg, char* interface, int operstate, bool dofail) { int ifindex = if_nametoindex(interface); while (true) { usleep(1000); int ret = get_ifla_operstate(nlmsg, ifindex, dofail); if (ret < 0) return ret; if (ret == operstate) return 0; } return 0; } static int nl80211_setup_ibss_interface(struct nlmsg* nlmsg, int sock, int nl80211_family_id, char* interface, struct join_ibss_props* ibss_props, bool dofail) { int ifindex = if_nametoindex(interface); if (ifindex == 0) { return -1; } int ret = nl80211_set_interface(nlmsg, sock, nl80211_family_id, ifindex, NL80211_IFTYPE_ADHOC, dofail); if (ret < 0) { return -1; } ret = set_interface_state(interface, 1); if (ret < 0) { return -1; } ret = nl80211_join_ibss(nlmsg, sock, nl80211_family_id, ifindex, ibss_props, dofail); if (ret < 0) { return -1; } return 0; } static int hwsim80211_create_device(struct nlmsg* nlmsg, int sock, int hwsim_family, uint8_t mac_addr[ETH_ALEN]) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = HWSIM_CMD_NEW_RADIO; netlink_init(nlmsg, hwsim_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, HWSIM_ATTR_SUPPORT_P2P_DEVICE, NULL, 0); netlink_attr(nlmsg, HWSIM_ATTR_PERM_ADDR, mac_addr, ETH_ALEN); int err = netlink_send(nlmsg, sock); if (err < 0) { } return err; } static void initialize_wifi_devices(void) { int rfkill = open("/dev/rfkill", O_RDWR); if (rfkill == -1) exit(1); struct rfkill_event event = {0}; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; if (write(rfkill, &event, sizeof(event)) != (ssize_t)(sizeof(event))) exit(1); close(rfkill); uint8_t mac_addr[6] = WIFI_MAC_BASE; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock < 0) exit(1); int hwsim_family_id = netlink_query_family_id(&nlmsg, sock, "MAC80211_HWSIM", true); int nl80211_family_id = netlink_query_family_id(&nlmsg, sock, "nl80211", true); if (hwsim_family_id < 0 || nl80211_family_id < 0) exit(1); uint8_t ssid[] = WIFI_IBSS_SSID; uint8_t bssid[] = WIFI_IBSS_BSSID; struct join_ibss_props ibss_props = { .wiphy_freq = WIFI_DEFAULT_FREQUENCY, .wiphy_freq_fixed = true, .mac = bssid, .ssid = ssid, .ssid_len = sizeof(ssid)}; for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { mac_addr[5] = device_id; int ret = hwsim80211_create_device(&nlmsg, sock, hwsim_family_id, mac_addr); if (ret < 0) exit(1); char interface[6] = "wlan0"; interface[4] += device_id; if (nl80211_setup_ibss_interface(&nlmsg, sock, nl80211_family_id, interface, &ibss_props, true) < 0) exit(1); } for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { char interface[6] = "wlan0"; interface[4] += device_id; int ret = await_ifla_operstate(&nlmsg, interface, IF_OPER_UP, true); if (ret < 0) exit(1); } close(sock); } static int runcmdline(char* cmdline) { int ret = system(cmdline); if (ret) { } return ret; } #define DEV_IPV4 "172.20.20.%d" #define DEV_IPV6 "fe80::%02x" #define DEV_MAC 0x00aaaaaaaaaa static void netdevsim_add(unsigned int addr, unsigned int port_count) { write_file("/sys/bus/netdevsim/del_device", "%u", addr); if (write_file("/sys/bus/netdevsim/new_device", "%u %u", addr, port_count)) { char buf[32]; snprintf(buf, sizeof(buf), "netdevsim%d", addr); initialize_devlink_ports("netdevsim", buf, "netdevsim"); } } #define WG_GENL_NAME "wireguard" enum wg_cmd { WG_CMD_GET_DEVICE, WG_CMD_SET_DEVICE, }; enum wgdevice_attribute { WGDEVICE_A_UNSPEC, WGDEVICE_A_IFINDEX, WGDEVICE_A_IFNAME, WGDEVICE_A_PRIVATE_KEY, WGDEVICE_A_PUBLIC_KEY, WGDEVICE_A_FLAGS, WGDEVICE_A_LISTEN_PORT, WGDEVICE_A_FWMARK, WGDEVICE_A_PEERS, }; enum wgpeer_attribute { WGPEER_A_UNSPEC, WGPEER_A_PUBLIC_KEY, WGPEER_A_PRESHARED_KEY, WGPEER_A_FLAGS, WGPEER_A_ENDPOINT, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, WGPEER_A_LAST_HANDSHAKE_TIME, WGPEER_A_RX_BYTES, WGPEER_A_TX_BYTES, WGPEER_A_ALLOWEDIPS, WGPEER_A_PROTOCOL_VERSION, }; enum wgallowedip_attribute { WGALLOWEDIP_A_UNSPEC, WGALLOWEDIP_A_FAMILY, WGALLOWEDIP_A_IPADDR, WGALLOWEDIP_A_CIDR_MASK, }; static void netlink_wireguard_setup(void) { const char ifname_a[] = "wg0"; const char ifname_b[] = "wg1"; const char ifname_c[] = "wg2"; const char private_a[] = "\xa0\x5c\xa8\x4f\x6c\x9c\x8e\x38\x53\xe2\xfd\x7a\x70\xae\x0f\xb2\x0f\xa1\x52\x60\x0c\xb0\x08\x45\x17\x4f\x08\x07\x6f\x8d\x78\x43"; const char private_b[] = "\xb0\x80\x73\xe8\xd4\x4e\x91\xe3\xda\x92\x2c\x22\x43\x82\x44\xbb\x88\x5c\x69\xe2\x69\xc8\xe9\xd8\x35\xb1\x14\x29\x3a\x4d\xdc\x6e"; const char private_c[] = "\xa0\xcb\x87\x9a\x47\xf5\xbc\x64\x4c\x0e\x69\x3f\xa6\xd0\x31\xc7\x4a\x15\x53\xb6\xe9\x01\xb9\xff\x2f\x51\x8c\x78\x04\x2f\xb5\x42"; const char public_a[] = "\x97\x5c\x9d\x81\xc9\x83\xc8\x20\x9e\xe7\x81\x25\x4b\x89\x9f\x8e\xd9\x25\xae\x9f\x09\x23\xc2\x3c\x62\xf5\x3c\x57\xcd\xbf\x69\x1c"; const char public_b[] = "\xd1\x73\x28\x99\xf6\x11\xcd\x89\x94\x03\x4d\x7f\x41\x3d\xc9\x57\x63\x0e\x54\x93\xc2\x85\xac\xa4\x00\x65\xcb\x63\x11\xbe\x69\x6b"; const char public_c[] = "\xf4\x4d\xa3\x67\xa8\x8e\xe6\x56\x4f\x02\x02\x11\x45\x67\x27\x08\x2f\x5c\xeb\xee\x8b\x1b\xf5\xeb\x73\x37\x34\x1b\x45\x9b\x39\x22"; const uint16_t listen_a = 20001; const uint16_t listen_b = 20002; const uint16_t listen_c = 20003; const uint16_t af_inet = AF_INET; const uint16_t af_inet6 = AF_INET6; const struct sockaddr_in endpoint_b_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_b), .sin_addr = {htonl(INADDR_LOOPBACK)}}; const struct sockaddr_in endpoint_c_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_c), .sin_addr = {htonl(INADDR_LOOPBACK)}}; struct sockaddr_in6 endpoint_a_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_a)}; endpoint_a_v6.sin6_addr = in6addr_loopback; struct sockaddr_in6 endpoint_c_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_c)}; endpoint_c_v6.sin6_addr = in6addr_loopback; const struct in_addr first_half_v4 = {0}; const struct in_addr second_half_v4 = {(uint32_t)htonl(128 << 24)}; const struct in6_addr first_half_v6 = {{{0}}}; const struct in6_addr second_half_v6 = {{{0x80}}}; const uint8_t half_cidr = 1; const uint16_t persistent_keepalives[] = {1, 3, 7, 9, 14, 19}; struct genlmsghdr genlhdr = { .cmd = WG_CMD_SET_DEVICE, .version = 1}; int sock; int id, err; sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) { return; } id = netlink_query_family_id(&nlmsg, sock, WG_GENL_NAME, true); if (id == -1) goto error; netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_a, strlen(ifname_a) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_a, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_a, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[0], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v6, sizeof(endpoint_c_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[1], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_b, strlen(ifname_b) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_b, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_b, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[2], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v4, sizeof(endpoint_c_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[3], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_c, strlen(ifname_c) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_c, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_c, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[4], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[5], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } error: close(sock); } static void initialize_netdevices(void) { char netdevsim[16]; sprintf(netdevsim, "netdevsim%d", (int)procid); struct { const char* type; const char* dev; } devtypes[] = { {"ip6gretap", "ip6gretap0"}, {"bridge", "bridge0"}, {"vcan", "vcan0"}, {"bond", "bond0"}, {"team", "team0"}, {"dummy", "dummy0"}, {"nlmon", "nlmon0"}, {"caif", "caif0"}, {"batadv", "batadv0"}, {"vxcan", "vxcan1"}, {"veth", 0}, {"wireguard", "wg0"}, {"wireguard", "wg1"}, {"wireguard", "wg2"}, }; const char* devmasters[] = {"bridge", "bond", "team", "batadv"}; struct { const char* name; int macsize; bool noipv6; } devices[] = { {"lo", ETH_ALEN}, {"sit0", 0}, {"bridge0", ETH_ALEN}, {"vcan0", 0, true}, {"tunl0", 0}, {"gre0", 0}, {"gretap0", ETH_ALEN}, {"ip_vti0", 0}, {"ip6_vti0", 0}, {"ip6tnl0", 0}, {"ip6gre0", 0}, {"ip6gretap0", ETH_ALEN}, {"erspan0", ETH_ALEN}, {"bond0", ETH_ALEN}, {"veth0", ETH_ALEN}, {"veth1", ETH_ALEN}, {"team0", ETH_ALEN}, {"veth0_to_bridge", ETH_ALEN}, {"veth1_to_bridge", ETH_ALEN}, {"veth0_to_bond", ETH_ALEN}, {"veth1_to_bond", ETH_ALEN}, {"veth0_to_team", ETH_ALEN}, {"veth1_to_team", ETH_ALEN}, {"veth0_to_hsr", ETH_ALEN}, {"veth1_to_hsr", ETH_ALEN}, {"hsr0", 0}, {"dummy0", ETH_ALEN}, {"nlmon0", 0}, {"vxcan0", 0, true}, {"vxcan1", 0, true}, {"caif0", ETH_ALEN}, {"batadv0", ETH_ALEN}, {netdevsim, ETH_ALEN}, {"xfrm0", ETH_ALEN}, {"veth0_virt_wifi", ETH_ALEN}, {"veth1_virt_wifi", ETH_ALEN}, {"virt_wifi0", ETH_ALEN}, {"veth0_vlan", ETH_ALEN}, {"veth1_vlan", ETH_ALEN}, {"vlan0", ETH_ALEN}, {"vlan1", ETH_ALEN}, {"macvlan0", ETH_ALEN}, {"macvlan1", ETH_ALEN}, {"ipvlan0", ETH_ALEN}, {"ipvlan1", ETH_ALEN}, {"veth0_macvtap", ETH_ALEN}, {"veth1_macvtap", ETH_ALEN}, {"macvtap0", ETH_ALEN}, {"macsec0", ETH_ALEN}, {"veth0_to_batadv", ETH_ALEN}, {"veth1_to_batadv", ETH_ALEN}, {"batadv_slave_0", ETH_ALEN}, {"batadv_slave_1", ETH_ALEN}, {"geneve0", ETH_ALEN}, {"geneve1", ETH_ALEN}, {"wg0", 0}, {"wg1", 0}, {"wg2", 0}, }; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) netlink_add_device(&nlmsg, sock, devtypes[i].type, devtypes[i].dev); for (i = 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) { char master[32], slave0[32], veth0[32], slave1[32], veth1[32]; sprintf(slave0, "%s_slave_0", devmasters[i]); sprintf(veth0, "veth0_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave0, veth0); sprintf(slave1, "%s_slave_1", devmasters[i]); sprintf(veth1, "veth1_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave1, veth1); sprintf(master, "%s0", devmasters[i]); netlink_device_change(&nlmsg, sock, slave0, false, master, 0, 0, NULL); netlink_device_change(&nlmsg, sock, slave1, false, master, 0, 0, NULL); } netlink_add_xfrm(&nlmsg, sock, "xfrm0"); netlink_device_change(&nlmsg, sock, "bridge_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "bridge_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "hsr_slave_0", "veth0_to_hsr"); netlink_add_veth(&nlmsg, sock, "hsr_slave_1", "veth1_to_hsr"); netlink_add_hsr(&nlmsg, sock, "hsr0", "hsr_slave_0", "hsr_slave_1"); netlink_device_change(&nlmsg, sock, "hsr_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "hsr_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "veth0_virt_wifi", "veth1_virt_wifi"); netlink_add_linked(&nlmsg, sock, "virt_wifi", "virt_wifi0", "veth1_virt_wifi"); netlink_add_veth(&nlmsg, sock, "veth0_vlan", "veth1_vlan"); netlink_add_vlan(&nlmsg, sock, "vlan0", "veth0_vlan", 0, htons(ETH_P_8021Q)); netlink_add_vlan(&nlmsg, sock, "vlan1", "veth0_vlan", 1, htons(ETH_P_8021AD)); netlink_add_macvlan(&nlmsg, sock, "macvlan0", "veth1_vlan"); netlink_add_macvlan(&nlmsg, sock, "macvlan1", "veth1_vlan"); netlink_add_ipvlan(&nlmsg, sock, "ipvlan0", "veth0_vlan", IPVLAN_MODE_L2, 0); netlink_add_ipvlan(&nlmsg, sock, "ipvlan1", "veth0_vlan", IPVLAN_MODE_L3S, IPVLAN_F_VEPA); netlink_add_veth(&nlmsg, sock, "veth0_macvtap", "veth1_macvtap"); netlink_add_linked(&nlmsg, sock, "macvtap", "macvtap0", "veth0_macvtap"); netlink_add_linked(&nlmsg, sock, "macsec", "macsec0", "veth1_macvtap"); char addr[32]; sprintf(addr, DEV_IPV4, 14 + 10); struct in_addr geneve_addr4; if (inet_pton(AF_INET, addr, &geneve_addr4) <= 0) exit(1); struct in6_addr geneve_addr6; if (inet_pton(AF_INET6, "fc00::01", &geneve_addr6) <= 0) exit(1); netlink_add_geneve(&nlmsg, sock, "geneve0", 0, &geneve_addr4, 0); netlink_add_geneve(&nlmsg, sock, "geneve1", 1, 0, &geneve_addr6); netdevsim_add((int)procid, 4); netlink_wireguard_setup(); for (i = 0; i < sizeof(devices) / (sizeof(devices[0])); i++) { char addr[32]; sprintf(addr, DEV_IPV4, i + 10); netlink_add_addr4(&nlmsg, sock, devices[i].name, addr); if (!devices[i].noipv6) { sprintf(addr, DEV_IPV6, i + 10); netlink_add_addr6(&nlmsg, sock, devices[i].name, addr); } uint64_t macaddr = DEV_MAC + ((i + 10ull) << 40); netlink_device_change(&nlmsg, sock, devices[i].name, true, 0, &macaddr, devices[i].macsize, NULL); } close(sock); } static void initialize_netdevices_init(void) { int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); struct { const char* type; int macsize; bool noipv6; bool noup; } devtypes[] = { {"nr", 7, true}, {"rose", 5, true, true}, }; unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) { char dev[32], addr[32]; sprintf(dev, "%s%d", devtypes[i].type, (int)procid); sprintf(addr, "172.30.%d.%d", i, (int)procid + 1); netlink_add_addr4(&nlmsg, sock, dev, addr); if (!devtypes[i].noipv6) { sprintf(addr, "fe88::%02x:%02x", i, (int)procid + 1); netlink_add_addr6(&nlmsg, sock, dev, addr); } int macsize = devtypes[i].macsize; uint64_t macaddr = 0xbbbbbb + ((unsigned long long)i << (8 * (macsize - 2))) + (procid << (8 * (macsize - 1))); netlink_device_change(&nlmsg, sock, dev, !devtypes[i].noup, 0, &macaddr, macsize, NULL); } close(sock); } static int read_tun(char* data, int size) { if (tunfd < 0) return -1; int rv = read(tunfd, data, size); if (rv < 0) { if (errno == EAGAIN || errno == EBADF || errno == EBADFD) return -1; exit(1); } return rv; } static void flush_tun() { char data[1000]; while (read_tun(&data[0], sizeof(data)) != -1) { } } #define MAX_FDS 30 #define BTPROTO_HCI 1 #define ACL_LINK 1 #define SCAN_PAGE 2 typedef struct { uint8_t b[6]; } __attribute__((packed)) bdaddr_t; #define HCI_COMMAND_PKT 1 #define HCI_EVENT_PKT 4 #define HCI_VENDOR_PKT 0xff struct hci_command_hdr { uint16_t opcode; uint8_t plen; } __attribute__((packed)); struct hci_event_hdr { uint8_t evt; uint8_t plen; } __attribute__((packed)); #define HCI_EV_CONN_COMPLETE 0x03 struct hci_ev_conn_complete { uint8_t status; uint16_t handle; bdaddr_t bdaddr; uint8_t link_type; uint8_t encr_mode; } __attribute__((packed)); #define HCI_EV_CONN_REQUEST 0x04 struct hci_ev_conn_request { bdaddr_t bdaddr; uint8_t dev_class[3]; uint8_t link_type; } __attribute__((packed)); #define HCI_EV_REMOTE_FEATURES 0x0b struct hci_ev_remote_features { uint8_t status; uint16_t handle; uint8_t features[8]; } __attribute__((packed)); #define HCI_EV_CMD_COMPLETE 0x0e struct hci_ev_cmd_complete { uint8_t ncmd; uint16_t opcode; } __attribute__((packed)); #define HCI_OP_WRITE_SCAN_ENABLE 0x0c1a #define HCI_OP_READ_BUFFER_SIZE 0x1005 struct hci_rp_read_buffer_size { uint8_t status; uint16_t acl_mtu; uint8_t sco_mtu; uint16_t acl_max_pkt; uint16_t sco_max_pkt; } __attribute__((packed)); #define HCI_OP_READ_BD_ADDR 0x1009 struct hci_rp_read_bd_addr { uint8_t status; bdaddr_t bdaddr; } __attribute__((packed)); #define HCI_EV_LE_META 0x3e struct hci_ev_le_meta { uint8_t subevent; } __attribute__((packed)); #define HCI_EV_LE_CONN_COMPLETE 0x01 struct hci_ev_le_conn_complete { uint8_t status; uint16_t handle; uint8_t role; uint8_t bdaddr_type; bdaddr_t bdaddr; uint16_t interval; uint16_t latency; uint16_t supervision_timeout; uint8_t clk_accurancy; } __attribute__((packed)); struct hci_dev_req { uint16_t dev_id; uint32_t dev_opt; }; struct vhci_vendor_pkt_request { uint8_t type; uint8_t opcode; } __attribute__((packed)); struct vhci_pkt { uint8_t type; union { struct { uint8_t opcode; uint16_t id; } __attribute__((packed)) vendor_pkt; struct hci_command_hdr command_hdr; }; } __attribute__((packed)); #define HCIDEVUP _IOW('H', 201, int) #define HCISETSCAN _IOW('H', 221, int) static int vhci_fd = -1; static void rfkill_unblock_all() { int fd = open("/dev/rfkill", O_WRONLY); if (fd < 0) exit(1); struct rfkill_event event = {0}; event.idx = 0; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; event.soft = 0; event.hard = 0; if (write(fd, &event, sizeof(event)) < 0) exit(1); close(fd); } static void hci_send_event_packet(int fd, uint8_t evt, void* data, size_t data_len) { struct iovec iv[3]; struct hci_event_hdr hdr; hdr.evt = evt; hdr.plen = data_len; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = data; iv[2].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static void hci_send_event_cmd_complete(int fd, uint16_t opcode, void* data, size_t data_len) { struct iovec iv[4]; struct hci_event_hdr hdr; hdr.evt = HCI_EV_CMD_COMPLETE; hdr.plen = sizeof(struct hci_ev_cmd_complete) + data_len; struct hci_ev_cmd_complete evt_hdr; evt_hdr.ncmd = 1; evt_hdr.opcode = opcode; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = &evt_hdr; iv[2].iov_len = sizeof(evt_hdr); iv[3].iov_base = data; iv[3].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static bool process_command_pkt(int fd, char* buf, ssize_t buf_size) { struct hci_command_hdr* hdr = (struct hci_command_hdr*)buf; if (buf_size < (ssize_t)sizeof(struct hci_command_hdr) || hdr->plen != buf_size - sizeof(struct hci_command_hdr)) exit(1); switch (hdr->opcode) { case HCI_OP_WRITE_SCAN_ENABLE: { uint8_t status = 0; hci_send_event_cmd_complete(fd, hdr->opcode, &status, sizeof(status)); return true; } case HCI_OP_READ_BD_ADDR: { struct hci_rp_read_bd_addr rp = {0}; rp.status = 0; memset(&rp.bdaddr, 0xaa, 6); hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } case HCI_OP_READ_BUFFER_SIZE: { struct hci_rp_read_buffer_size rp = {0}; rp.status = 0; rp.acl_mtu = 1021; rp.sco_mtu = 96; rp.acl_max_pkt = 4; rp.sco_max_pkt = 6; hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } } char dummy[0xf9] = {0}; hci_send_event_cmd_complete(fd, hdr->opcode, dummy, sizeof(dummy)); return false; } static void* event_thread(void* arg) { while (1) { char buf[1024] = {0}; ssize_t buf_size = read(vhci_fd, buf, sizeof(buf)); if (buf_size < 0) exit(1); if (buf_size > 0 && buf[0] == HCI_COMMAND_PKT) { if (process_command_pkt(vhci_fd, buf + 1, buf_size - 1)) break; } } return NULL; } #define HCI_HANDLE_1 200 #define HCI_HANDLE_2 201 #define HCI_PRIMARY 0 #define HCI_OP_RESET 0x0c03 static void initialize_vhci() { int hci_sock = socket(AF_BLUETOOTH, SOCK_RAW, BTPROTO_HCI); if (hci_sock < 0) exit(1); vhci_fd = open("/dev/vhci", O_RDWR); if (vhci_fd == -1) exit(1); const int kVhciFd = 202; if (dup2(vhci_fd, kVhciFd) < 0) exit(1); close(vhci_fd); vhci_fd = kVhciFd; struct vhci_vendor_pkt_request vendor_pkt_req = {HCI_VENDOR_PKT, HCI_PRIMARY}; if (write(vhci_fd, &vendor_pkt_req, sizeof(vendor_pkt_req)) != sizeof(vendor_pkt_req)) exit(1); struct vhci_pkt vhci_pkt; if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); if (vhci_pkt.type == HCI_COMMAND_PKT && vhci_pkt.command_hdr.opcode == HCI_OP_RESET) { char response[1] = {0}; hci_send_event_cmd_complete(vhci_fd, HCI_OP_RESET, response, sizeof(response)); if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); } if (vhci_pkt.type != HCI_VENDOR_PKT) exit(1); int dev_id = vhci_pkt.vendor_pkt.id; pthread_t th; if (pthread_create(&th, NULL, event_thread, NULL)) exit(1); int ret = ioctl(hci_sock, HCIDEVUP, dev_id); if (ret) { if (errno == ERFKILL) { rfkill_unblock_all(); ret = ioctl(hci_sock, HCIDEVUP, dev_id); } if (ret && errno != EALREADY) exit(1); } struct hci_dev_req dr = {0}; dr.dev_id = dev_id; dr.dev_opt = SCAN_PAGE; if (ioctl(hci_sock, HCISETSCAN, &dr)) exit(1); struct hci_ev_conn_request request; memset(&request, 0, sizeof(request)); memset(&request.bdaddr, 0xaa, 6); *(uint8_t*)&request.bdaddr.b[5] = 0x10; request.link_type = ACL_LINK; hci_send_event_packet(vhci_fd, HCI_EV_CONN_REQUEST, &request, sizeof(request)); struct hci_ev_conn_complete complete; memset(&complete, 0, sizeof(complete)); complete.status = 0; complete.handle = HCI_HANDLE_1; memset(&complete.bdaddr, 0xaa, 6); *(uint8_t*)&complete.bdaddr.b[5] = 0x10; complete.link_type = ACL_LINK; complete.encr_mode = 0; hci_send_event_packet(vhci_fd, HCI_EV_CONN_COMPLETE, &complete, sizeof(complete)); struct hci_ev_remote_features features; memset(&features, 0, sizeof(features)); features.status = 0; features.handle = HCI_HANDLE_1; hci_send_event_packet(vhci_fd, HCI_EV_REMOTE_FEATURES, &features, sizeof(features)); struct { struct hci_ev_le_meta le_meta; struct hci_ev_le_conn_complete le_conn; } le_conn; memset(&le_conn, 0, sizeof(le_conn)); le_conn.le_meta.subevent = HCI_EV_LE_CONN_COMPLETE; memset(&le_conn.le_conn.bdaddr, 0xaa, 6); *(uint8_t*)&le_conn.le_conn.bdaddr.b[5] = 0x11; le_conn.le_conn.role = 1; le_conn.le_conn.handle = HCI_HANDLE_2; hci_send_event_packet(vhci_fd, HCI_EV_LE_META, &le_conn, sizeof(le_conn)); pthread_join(th, NULL); close(hci_sock); } #define XT_TABLE_SIZE 1536 #define XT_MAX_ENTRIES 10 struct xt_counters { uint64_t pcnt, bcnt; }; struct ipt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_entries; unsigned int size; }; struct ipt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_table_desc { const char* name; struct ipt_getinfo info; struct ipt_replace replace; }; static struct ipt_table_desc ipv4_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; static struct ipt_table_desc ipv6_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; #define IPT_BASE_CTL 64 #define IPT_SO_SET_REPLACE (IPT_BASE_CTL) #define IPT_SO_GET_INFO (IPT_BASE_CTL) #define IPT_SO_GET_ENTRIES (IPT_BASE_CTL + 1) struct arpt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_entries; unsigned int size; }; struct arpt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_table_desc { const char* name; struct arpt_getinfo info; struct arpt_replace replace; }; static struct arpt_table_desc arpt_tables[] = { {.name = "filter"}, }; #define ARPT_BASE_CTL 96 #define ARPT_SO_SET_REPLACE (ARPT_BASE_CTL) #define ARPT_SO_GET_INFO (ARPT_BASE_CTL) #define ARPT_SO_GET_ENTRIES (ARPT_BASE_CTL + 1) static void checkpoint_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; if (table->info.valid_hooks == 0) continue; struct ipt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, level, IPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_arptables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_arptables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; if (table->info.valid_hooks == 0) continue; struct arpt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } else { } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, SOL_IP, ARPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } #define NF_BR_NUMHOOKS 6 #define EBT_TABLE_MAXNAMELEN 32 #define EBT_CHAIN_MAXNAMELEN 32 #define EBT_BASE_CTL 128 #define EBT_SO_SET_ENTRIES (EBT_BASE_CTL) #define EBT_SO_GET_INFO (EBT_BASE_CTL) #define EBT_SO_GET_ENTRIES (EBT_SO_GET_INFO + 1) #define EBT_SO_GET_INIT_INFO (EBT_SO_GET_ENTRIES + 1) #define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO + 1) struct ebt_replace { char name[EBT_TABLE_MAXNAMELEN]; unsigned int valid_hooks; unsigned int nentries; unsigned int entries_size; struct ebt_entries* hook_entry[NF_BR_NUMHOOKS]; unsigned int num_counters; struct ebt_counter* counters; char* entries; }; struct ebt_entries { unsigned int distinguisher; char name[EBT_CHAIN_MAXNAMELEN]; unsigned int counter_offset; int policy; unsigned int nentries; char data[0] __attribute__((aligned(__alignof__(struct ebt_replace)))); }; struct ebt_table_desc { const char* name; struct ebt_replace replace; char entrytable[XT_TABLE_SIZE]; }; static struct ebt_table_desc ebt_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "broute"}, }; static void checkpoint_ebtables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (size_t i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_INFO, &table->replace, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->replace.entries_size > sizeof(table->entrytable)) exit(1); table->replace.num_counters = 0; table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_ENTRIES, &table->replace, &optlen)) exit(1); } close(fd); } static void reset_ebtables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; if (table->replace.valid_hooks == 0) continue; struct ebt_replace replace; memset(&replace, 0, sizeof(replace)); strcpy(replace.name, table->name); socklen_t optlen = sizeof(replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INFO, &replace, &optlen)) exit(1); replace.num_counters = 0; table->replace.entries = 0; for (unsigned h = 0; h < NF_BR_NUMHOOKS; h++) table->replace.hook_entry[h] = 0; if (memcmp(&table->replace, &replace, sizeof(table->replace)) == 0) { char entrytable[XT_TABLE_SIZE]; memset(&entrytable, 0, sizeof(entrytable)); replace.entries = entrytable; optlen = sizeof(replace) + replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_ENTRIES, &replace, &optlen)) exit(1); if (memcmp(table->entrytable, entrytable, replace.entries_size) == 0) continue; } for (unsigned j = 0, h = 0; h < NF_BR_NUMHOOKS; h++) { if (table->replace.valid_hooks & (1 << h)) { table->replace.hook_entry[h] = (struct ebt_entries*)table->entrytable + j; j++; } } table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (setsockopt(fd, SOL_IP, EBT_SO_SET_ENTRIES, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_net_namespace(void) { checkpoint_ebtables(); checkpoint_arptables(); checkpoint_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); checkpoint_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void reset_net_namespace(void) { reset_ebtables(); reset_arptables(); reset_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); reset_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void mount_cgroups(const char* dir, const char** controllers, int count) { if (mkdir(dir, 0777)) { return; } char enabled[128] = {0}; int i = 0; for (; i < count; i++) { if (mount("none", dir, "cgroup", 0, controllers[i])) { continue; } umount(dir); strcat(enabled, ","); strcat(enabled, controllers[i]); } if (enabled[0] == 0) { if (rmdir(dir) && errno != EBUSY) exit(1); return; } if (mount("none", dir, "cgroup", 0, enabled + 1)) { if (rmdir(dir) && errno != EBUSY) exit(1); } if (chmod(dir, 0777)) { } } static void mount_cgroups2(const char** controllers, int count) { if (mkdir("/syzcgroup/unified", 0777)) { return; } if (mount("none", "/syzcgroup/unified", "cgroup2", 0, NULL)) { if (rmdir("/syzcgroup/unified") && errno != EBUSY) exit(1); return; } if (chmod("/syzcgroup/unified", 0777)) { } int control = open("/syzcgroup/unified/cgroup.subtree_control", O_WRONLY); if (control == -1) return; int i; for (i = 0; i < count; i++) if (write(control, controllers[i], strlen(controllers[i])) < 0) { } close(control); } static void setup_cgroups() { const char* unified_controllers[] = {"+cpu", "+io", "+pids"}; const char* net_controllers[] = {"net", "net_prio", "devices", "blkio", "freezer"}; const char* cpu_controllers[] = {"cpuset", "cpuacct", "hugetlb", "rlimit", "memory"}; if (mkdir("/syzcgroup", 0777)) { return; } mount_cgroups2(unified_controllers, sizeof(unified_controllers) / sizeof(unified_controllers[0])); mount_cgroups("/syzcgroup/net", net_controllers, sizeof(net_controllers) / sizeof(net_controllers[0])); mount_cgroups("/syzcgroup/cpu", cpu_controllers, sizeof(cpu_controllers) / sizeof(cpu_controllers[0])); write_file("/syzcgroup/cpu/cgroup.clone_children", "1"); write_file("/syzcgroup/cpu/cpuset.memory_pressure_enabled", "1"); } static void setup_cgroups_loop() { int pid = getpid(); char file[128]; char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/pids.max", cgroupdir); write_file(file, "32"); snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(file, sizeof(file), "%s/memory.soft_limit_in_bytes", cgroupdir); write_file(file, "%d", 299 << 20); snprintf(file, sizeof(file), "%s/memory.limit_in_bytes", cgroupdir); write_file(file, "%d", 300 << 20); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); } static void setup_cgroups_test() { char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (symlink(cgroupdir, "./cgroup")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.cpu")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.net")) { } } static void initialize_cgroups() { if (mkdir("./syz-tmp/newroot/syzcgroup", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/unified", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/cpu", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/net", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/syzcgroup/unified", "./syz-tmp/newroot/syzcgroup/unified", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/cpu", "./syz-tmp/newroot/syzcgroup/cpu", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/net", "./syz-tmp/newroot/syzcgroup/net", NULL, bind_mount_flags, NULL)) { } } static void setup_gadgetfs(); static void setup_binderfs(); static void setup_fusectl(); static void sandbox_common_mount_tmpfs(void) { write_file("/proc/sys/fs/mount-max", "100000"); if (mkdir("./syz-tmp", 0777)) exit(1); if (mount("", "./syz-tmp", "tmpfs", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot", 0777)) exit(1); if (mkdir("./syz-tmp/newroot/dev", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/dev", "./syz-tmp/newroot/dev", NULL, bind_mount_flags, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/proc", 0700)) exit(1); if (mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/selinux", 0700)) exit(1); const char* selinux_path = "./syz-tmp/newroot/selinux"; if (mount("/selinux", selinux_path, NULL, bind_mount_flags, NULL)) { if (errno != ENOENT) exit(1); if (mount("/sys/fs/selinux", selinux_path, NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); } if (mkdir("./syz-tmp/newroot/sys", 0700)) exit(1); if (mount("/sys", "./syz-tmp/newroot/sys", 0, bind_mount_flags, NULL)) exit(1); if (mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mkdir("./syz-tmp/newroot/syz-inputs", 0700)) exit(1); if (mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, bind_mount_flags | MS_RDONLY, NULL) && errno != ENOENT) exit(1); initialize_cgroups(); if (mkdir("./syz-tmp/pivot", 0777)) exit(1); if (syscall(SYS_pivot_root, "./syz-tmp", "./syz-tmp/pivot")) { if (chdir("./syz-tmp")) exit(1); } else { if (chdir("/")) exit(1); if (umount2("./pivot", MNT_DETACH)) exit(1); } if (chroot("./newroot")) exit(1); if (chdir("/")) exit(1); setup_gadgetfs(); setup_binderfs(); setup_fusectl(); } static void setup_gadgetfs() { if (mkdir("/dev/gadgetfs", 0777)) { } if (mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL)) { } } static void setup_fusectl() { if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) { } } static void setup_binderfs() { if (mkdir("/dev/binderfs", 0777)) { } if (mount("binder", "/dev/binderfs", "binder", 0, NULL)) { } } static void loop(); static void sandbox_common() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); if (getppid() == 1) exit(1); struct rlimit rlim; rlim.rlim_cur = rlim.rlim_max = (200 << 20); setrlimit(RLIMIT_AS, &rlim); rlim.rlim_cur = rlim.rlim_max = 32 << 20; setrlimit(RLIMIT_MEMLOCK, &rlim); rlim.rlim_cur = rlim.rlim_max = 136 << 20; setrlimit(RLIMIT_FSIZE, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_STACK, &rlim); rlim.rlim_cur = rlim.rlim_max = 128 << 20; setrlimit(RLIMIT_CORE, &rlim); rlim.rlim_cur = rlim.rlim_max = 256; setrlimit(RLIMIT_NOFILE, &rlim); if (unshare(CLONE_NEWNS)) { } if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, NULL)) { } if (unshare(CLONE_NEWIPC)) { } if (unshare(0x02000000)) { } if (unshare(CLONE_NEWUTS)) { } if (unshare(CLONE_SYSVSEM)) { } typedef struct { const char* name; const char* value; } sysctl_t; static const sysctl_t sysctls[] = { {"/proc/sys/kernel/shmmax", "16777216"}, {"/proc/sys/kernel/shmall", "536870912"}, {"/proc/sys/kernel/shmmni", "1024"}, {"/proc/sys/kernel/msgmax", "8192"}, {"/proc/sys/kernel/msgmni", "1024"}, {"/proc/sys/kernel/msgmnb", "1024"}, {"/proc/sys/kernel/sem", "1024 1048576 500 1024"}, }; unsigned i; for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++) write_file(sysctls[i].name, sysctls[i].value); } static int wait_for_loop(int pid) { if (pid < 0) exit(1); int status = 0; while (waitpid(-1, &status, __WALL) != pid) { } return WEXITSTATUS(status); } static void drop_caps(void) { struct __user_cap_header_struct cap_hdr = {}; struct __user_cap_data_struct cap_data[2] = {}; cap_hdr.version = _LINUX_CAPABILITY_VERSION_3; cap_hdr.pid = getpid(); if (syscall(SYS_capget, &cap_hdr, &cap_data)) exit(1); const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE); cap_data[0].effective &= ~drop; cap_data[0].permitted &= ~drop; cap_data[0].inheritable &= ~drop; if (syscall(SYS_capset, &cap_hdr, &cap_data)) exit(1); } static int do_sandbox_none(void) { if (unshare(CLONE_NEWPID)) { } int pid = fork(); if (pid != 0) return wait_for_loop(pid); initialize_vhci(); sandbox_common(); drop_caps(); initialize_netdevices_init(); if (unshare(CLONE_NEWNET)) { } write_file("/proc/sys/net/ipv4/ping_group_range", "0 65535"); initialize_tun(); initialize_netdevices(); initialize_wifi_devices(); sandbox_common_mount_tmpfs(); loop(); exit(1); } #define FS_IOC_SETFLAGS _IOW('f', 2, long) static void remove_dir(const char* dir) { int iter = 0; DIR* dp = 0; const int umount_flags = MNT_FORCE | UMOUNT_NOFOLLOW; retry: while (umount2(dir, umount_flags) == 0) { } dp = opendir(dir); if (dp == NULL) { if (errno == EMFILE) { exit(1); } exit(1); } struct dirent* ep = 0; while ((ep = readdir(dp))) { if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) continue; char filename[FILENAME_MAX]; snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); while (umount2(filename, umount_flags) == 0) { } struct stat st; if (lstat(filename, &st)) exit(1); if (S_ISDIR(st.st_mode)) { remove_dir(filename); continue; } int i; for (i = 0;; i++) { if (unlink(filename) == 0) break; if (errno == EPERM) { int fd = open(filename, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno != EBUSY || i > 100) exit(1); if (umount2(filename, umount_flags)) exit(1); } } closedir(dp); for (int i = 0;; i++) { if (rmdir(dir) == 0) break; if (i < 100) { if (errno == EPERM) { int fd = open(dir, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno == EBUSY) { if (umount2(dir, umount_flags)) exit(1); continue; } if (errno == ENOTEMPTY) { if (iter < 100) { iter++; goto retry; } } } exit(1); } } static void kill_and_wait(int pid, int* status) { kill(-pid, SIGKILL); kill(pid, SIGKILL); for (int i = 0; i < 100; i++) { if (waitpid(-1, status, WNOHANG | __WALL) == pid) return; usleep(1000); } DIR* dir = opendir("/sys/fs/fuse/connections"); if (dir) { for (;;) { struct dirent* ent = readdir(dir); if (!ent) break; if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) continue; char abort[300]; snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", ent->d_name); int fd = open(abort, O_WRONLY); if (fd == -1) { continue; } if (write(fd, abort, 1) < 0) { } close(fd); } closedir(dir); } else { } while (waitpid(-1, status, __WALL) != pid) { } } static void setup_loop() { setup_cgroups_loop(); checkpoint_net_namespace(); } static void reset_loop() { reset_net_namespace(); } static void setup_test() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); setpgrp(); setup_cgroups_test(); write_file("/proc/self/oom_score_adj", "1000"); flush_tun(); if (symlink("/dev/binderfs", "./binderfs")) { } } static void close_fds() { for (int fd = 3; fd < MAX_FDS; fd++) close(fd); } static const char* setup_binfmt_misc() { if (mount(0, "/proc/sys/fs/binfmt_misc", "binfmt_misc", 0, 0) && errno != EBUSY) { return NULL; } if (!write_file("/proc/sys/fs/binfmt_misc/register", ":syz0:M:0:\x01::./file0:") || !write_file("/proc/sys/fs/binfmt_misc/register", ":syz1:M:1:\x02::./file0:POC")) return "write(/proc/sys/fs/binfmt_misc/register) failed"; return NULL; } static const char* setup_usb() { if (chmod("/dev/raw-gadget", 0666)) return "failed to chmod /dev/raw-gadget"; return NULL; } static void setup_sysctl() { int cad_pid = fork(); if (cad_pid < 0) exit(1); if (cad_pid == 0) { for (;;) sleep(100); } char tmppid[32]; snprintf(tmppid, sizeof(tmppid), "%d", cad_pid); struct { const char* name; const char* data; } files[] = { {"/sys/kernel/debug/x86/nmi_longest_ns", "10000000000"}, {"/proc/sys/kernel/hung_task_check_interval_secs", "20"}, {"/proc/sys/net/core/bpf_jit_kallsyms", "1"}, {"/proc/sys/net/core/bpf_jit_harden", "0"}, {"/proc/sys/kernel/kptr_restrict", "0"}, {"/proc/sys/kernel/softlockup_all_cpu_backtrace", "1"}, {"/proc/sys/fs/mount-max", "100"}, {"/proc/sys/vm/oom_dump_tasks", "0"}, {"/proc/sys/debug/exception-trace", "0"}, {"/proc/sys/kernel/printk", "7 4 1 3"}, {"/proc/sys/kernel/keys/gc_delay", "1"}, {"/proc/sys/vm/oom_kill_allocating_task", "1"}, {"/proc/sys/kernel/ctrl-alt-del", "0"}, {"/proc/sys/kernel/cad_pid", tmppid}, }; for (size_t i = 0; i < sizeof(files) / sizeof(files[0]); i++) { if (!write_file(files[i].name, files[i].data)) { } } kill(cad_pid, SIGKILL); while (waitpid(cad_pid, NULL, 0) != cad_pid) ; } #define NL802154_CMD_SET_SHORT_ADDR 11 #define NL802154_ATTR_IFINDEX 3 #define NL802154_ATTR_SHORT_ADDR 10 static const char* setup_802154() { const char* error = NULL; int sock_generic = -1; int sock_route = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock_route == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) failed"; goto fail; } sock_generic = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock_generic == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) failed"; goto fail; } { int nl802154_family_id = netlink_query_family_id(&nlmsg, sock_generic, "nl802154", true); if (nl802154_family_id < 0) { error = "netlink_query_family_id failed"; goto fail; } for (int i = 0; i < 2; i++) { char devname[] = "wpan0"; devname[strlen(devname) - 1] += i; uint64_t hwaddr = 0xaaaaaaaaaaaa0002 + (i << 8); uint16_t shortaddr = 0xaaa0 + i; int ifindex = if_nametoindex(devname); struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL802154_CMD_SET_SHORT_ADDR; netlink_init(&nlmsg, nl802154_family_id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, NL802154_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(&nlmsg, NL802154_ATTR_SHORT_ADDR, &shortaddr, sizeof(shortaddr)); if (netlink_send(&nlmsg, sock_generic) < 0) { error = "NL802154_CMD_SET_SHORT_ADDR failed"; goto fail; } netlink_device_change(&nlmsg, sock_route, devname, true, 0, &hwaddr, sizeof(hwaddr), 0); if (i == 0) { netlink_add_device_impl(&nlmsg, "lowpan", "lowpan0", false); netlink_done(&nlmsg); netlink_attr(&nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); if (netlink_send(&nlmsg, sock_route) < 0) { error = "netlink: adding device lowpan0 type lowpan link wpan0"; goto fail; } } } } fail: close(sock_route); close(sock_generic); return error; } #define SWAP_FILE "./swap-file" #define SWAP_FILE_SIZE (128 * 1000 * 1000) static const char* setup_swap() { swapoff(SWAP_FILE); unlink(SWAP_FILE); int fd = open(SWAP_FILE, O_CREAT | O_WRONLY | O_CLOEXEC, 0600); if (fd == -1) return "swap file open failed"; fallocate(fd, FALLOC_FL_ZERO_RANGE, 0, SWAP_FILE_SIZE); close(fd); char cmdline[64]; sprintf(cmdline, "mkswap %s", SWAP_FILE); if (runcmdline(cmdline)) return "mkswap failed"; if (swapon(SWAP_FILE, SWAP_FLAG_PREFER) == 1) return "swapon failed"; return NULL; } struct thread_t { int created, call; event_t ready, done; }; static struct thread_t threads[16]; static void execute_call(int call); static int running; static void* thr(void* arg) { struct thread_t* th = (struct thread_t*)arg; for (;;) { event_wait(&th->ready); event_reset(&th->ready); execute_call(th->call); __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); event_set(&th->done); } return 0; } static void execute_one(void) { if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } int i, call, thread; for (call = 0; call < 1; call++) { for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); thread++) { struct thread_t* th = &threads[thread]; if (!th->created) { th->created = 1; event_init(&th->ready); event_init(&th->done); event_set(&th->done); thread_start(thr, th); } if (!event_isset(&th->done)) continue; event_reset(&th->done); th->call = call; __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); event_set(&th->ready); event_timedwait(&th->done, 50); break; } } for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) sleep_ms(1); close_fds(); } static void execute_one(void); #define WAIT_FLAGS __WALL static void loop(void) { setup_loop(); int iter = 0; for (;; iter++) { char cwdbuf[32]; sprintf(cwdbuf, "./%d", iter); if (mkdir(cwdbuf, 0777)) exit(1); reset_loop(); int pid = fork(); if (pid < 0) exit(1); if (pid == 0) { if (chdir(cwdbuf)) exit(1); setup_test(); execute_one(); exit(0); } int status = 0; uint64_t start = current_time_ms(); for (;;) { sleep_ms(10); if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) break; if (current_time_ms() - start < 5000) continue; kill_and_wait(pid, &status); break; } remove_dir(cwdbuf); } } void execute_call(int call) { switch (call) { case 0: // socket$kcm arguments: [ // domain: const = 0x2c (8 bytes) // type: kcm_socket_type = 0x3 (8 bytes) // proto: const = 0x0 (4 bytes) // ] // returns sock_kcm syscall(__NR_socket, /*domain=*/0x2cul, /*type=SOCK_DGRAM|0x1*/3ul, /*proto=*/0); break; } } int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); setup_sysctl(); setup_cgroups(); const char* reason; (void)reason; if ((reason = setup_binfmt_misc())) printf("the reproducer may not work as expected: binfmt_misc setup failed: %s\n", reason); if ((reason = setup_usb())) printf("the reproducer may not work as expected: USB injection setup failed: %s\n", reason); if ((reason = setup_802154())) printf("the reproducer may not work as expected: 802154 injection setup failed: %s\n", reason); if ((reason = setup_swap())) printf("the reproducer may not work as expected: swap setup failed: %s\n", reason); install_segv_handler(); for (procid = 0; procid < 3; procid++) { if (fork() == 0) { use_temporary_dir(); do_sandbox_none(); } } sleep(1000000); return 0; } compiler invocation: gcc [-o /tmp/syz-executor2389421150 -DGOOS_linux=1 -DGOARCH_amd64=1 -DHOSTGOOS_linux=1 -x c - -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -fpermissive -w] 2025/08/06 19:40:22 "WARNING in xsk_create": saved crash log into 1754509222.crash.log 2025/08/06 19:40:30 new: boot error: can't ssh into the instance 2025/08/06 19:40:46 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:40:48 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:41:14 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:41:18 runner 7 connected 2025/08/06 19:41:35 runner 8 connected 2025/08/06 19:41:49 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:42:03 runner 6 connected 2025/08/06 19:42:21 new: boot error: can't ssh into the instance 2025/08/06 19:42:31 base: boot error: can't ssh into the instance 2025/08/06 19:42:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 18, "corpus": 9591, "corpus [files]": 478, "corpus [symbols]": 476, "cover overflows": 10911, "coverage": 71047, "distributor delayed": 20871, "distributor undelayed": 20871, "distributor violated": 938, "exec candidate": 22555, "exec collide": 31169, "exec fuzz": 59164, "exec gen": 3092, "exec hints": 8781, "exec inject": 0, "exec minimize": 2110, "exec retries": 183, "exec seeds": 177, "exec smash": 1547, "exec total [base]": 196495, "exec total [new]": 199431, "exec triage": 31721, "executor restarts": 1204, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 4, "hints jobs": 1, "max signal": 73802, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1147, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10233, "no exec duration": 13585774000000, "no exec requests": 42813, "pending": 226, "prog exec time": 435, "reproducing": 2, "rpc recv": 11868252012, "rpc sent": 1298674152, "signal": 70110, "smash jobs": 0, "triage jobs": 1, "vm output": 22265786, "vm restarts [base]": 34, "vm restarts [new]": 316 } 2025/08/06 19:43:18 runner 4 connected 2025/08/06 19:43:21 runner 0 connected 2025/08/06 19:43:49 new: boot error: can't ssh into the instance 2025/08/06 19:43:50 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:43:58 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:44:23 base crash: lost connection to test machine 2025/08/06 19:44:27 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:44:35 new: boot error: can't ssh into the instance 2025/08/06 19:44:46 runner 0 connected 2025/08/06 19:44:47 runner 8 connected 2025/08/06 19:44:54 runner 9 connected 2025/08/06 19:44:56 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:45:19 runner 2 connected 2025/08/06 19:45:21 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:45:24 runner 6 connected 2025/08/06 19:45:48 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:45:50 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:46:11 runner 7 connected 2025/08/06 19:46:16 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:46:18 base crash: lost connection to test machine 2025/08/06 19:46:38 runner 4 connected 2025/08/06 19:46:42 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:47:15 runner 3 connected 2025/08/06 19:47:22 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:47:39 runner 9 connected 2025/08/06 19:47:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 18, "corpus": 9595, "corpus [files]": 478, "corpus [symbols]": 476, "cover overflows": 11361, "coverage": 71061, "distributor delayed": 20911, "distributor undelayed": 20911, "distributor violated": 938, "exec candidate": 22555, "exec collide": 33690, "exec fuzz": 63797, "exec gen": 3325, "exec hints": 8980, "exec inject": 0, "exec minimize": 2270, "exec retries": 185, "exec seeds": 183, "exec smash": 1647, "exec total [base]": 202890, "exec total [new]": 207354, "exec triage": 31788, "executor restarts": 1230, "fault jobs": 0, "fuzzer jobs": 3, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 5, "hints jobs": 1, "max signal": 74301, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1226, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10256, "no exec duration": 13586510000000, "no exec requests": 42817, "pending": 226, "prog exec time": 404, "reproducing": 2, "rpc recv": 12189681344, "rpc sent": 1365192104, "signal": 70122, "smash jobs": 0, "triage jobs": 2, "vm output": 23158838, "vm restarts [base]": 37, "vm restarts [new]": 324 } 2025/08/06 19:47:45 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:48:02 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:48:48 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:48:53 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:49:00 runner 4 connected 2025/08/06 19:49:15 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:49:32 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:49:43 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:50:19 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:50:20 runner 9 connected 2025/08/06 19:50:26 new: boot error: can't ssh into the instance 2025/08/06 19:50:32 runner 8 connected 2025/08/06 19:50:42 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:50:51 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:50:54 new: boot error: can't ssh into the instance 2025/08/06 19:51:10 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 19:51:43 runner 5 connected 2025/08/06 19:51:43 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:51:45 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:51:45 repro finished 'WARNING in xsk_create', repro=true crepro=false desc='WARNING in xsk_create' hub=false from_dashboard=false 2025/08/06 19:51:45 found repro for "WARNING in xsk_create" (orig title: "-SAME-", reliability: 1), took 49.43 minutes 2025/08/06 19:51:45 "WARNING in xsk_create": saved crash log into 1754509905.crash.log 2025/08/06 19:51:45 "WARNING in xsk_create": saved repro log into 1754509905.repro.log 2025/08/06 19:51:45 start reproducing 'WARNING in xsk_create' 2025/08/06 19:51:50 runner 6 connected 2025/08/06 19:51:54 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:52:07 runner 7 connected 2025/08/06 19:52:13 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:52:16 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:52:38 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:52:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 18, "corpus": 9596, "corpus [files]": 478, "corpus [symbols]": 476, "cover overflows": 11768, "coverage": 71063, "distributor delayed": 20946, "distributor undelayed": 20945, "distributor violated": 939, "exec candidate": 22555, "exec collide": 35799, "exec fuzz": 67728, "exec gen": 3539, "exec hints": 9032, "exec inject": 0, "exec minimize": 2342, "exec retries": 188, "exec seeds": 186, "exec smash": 1672, "exec total [base]": 211080, "exec total [new]": 213809, "exec triage": 31842, "executor restarts": 1257, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 2, "hints jobs": 0, "max signal": 74566, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1265, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10274, "no exec duration": 13634832000000, "no exec requests": 42941, "pending": 225, "prog exec time": 554, "reproducing": 2, "rpc recv": 12419237452, "rpc sent": 1433547056, "signal": 70124, "smash jobs": 0, "triage jobs": 2, "vm output": 24081204, "vm restarts [base]": 37, "vm restarts [new]": 330 } 2025/08/06 19:52:51 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:53:02 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:53:07 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:53:12 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:53:34 runner 9 connected 2025/08/06 19:53:40 runner 6 connected 2025/08/06 19:53:44 attempt #0 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:53:44 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:53:57 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:53:59 runner 7 connected 2025/08/06 19:54:24 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:54:25 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:54:35 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:54:55 runner 9 connected 2025/08/06 19:55:13 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 19:55:13 runner 8 connected 2025/08/06 19:55:32 runner 6 connected 2025/08/06 19:55:34 attempt #1 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:56:35 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:56:41 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:56:47 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:56:54 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:57:32 runner 8 connected 2025/08/06 19:57:35 attempt #2 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 19:57:35 patched-only: WARNING in xsk_create 2025/08/06 19:57:35 scheduled a reproduction of 'WARNING in xsk_create (full)' 2025/08/06 19:57:35 start reproducing 'WARNING in xsk_create (full)' 2025/08/06 19:57:36 runner 6 connected 2025/08/06 19:57:41 runner 7 connected 2025/08/06 19:57:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 18, "corpus": 9597, "corpus [files]": 479, "corpus [symbols]": 477, "cover overflows": 11904, "coverage": 71064, "distributor delayed": 20959, "distributor undelayed": 20959, "distributor violated": 939, "exec candidate": 22555, "exec collide": 36571, "exec fuzz": 69147, "exec gen": 3615, "exec hints": 9035, "exec inject": 0, "exec minimize": 2384, "exec retries": 191, "exec seeds": 189, "exec smash": 1695, "exec total [base]": 213425, "exec total [new]": 216161, "exec triage": 31859, "executor restarts": 1282, "fault jobs": 0, "fuzzer jobs": 2, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 2, "hints jobs": 0, "max signal": 74575, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1296, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10280, "no exec duration": 13931930000000, "no exec requests": 43716, "pending": 225, "prog exec time": 477, "reproducing": 3, "rpc recv": 12670445076, "rpc sent": 1459413528, "signal": 70125, "smash jobs": 1, "triage jobs": 1, "vm output": 24604888, "vm restarts [base]": 37, "vm restarts [new]": 339 } 2025/08/06 19:57:57 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 19:58:31 runner 0 connected 2025/08/06 19:58:54 new: boot error: can't ssh into the instance 2025/08/06 20:00:11 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:00:11 repro finished 'WARNING in corrupted', repro=true crepro=false desc='WARNING in xsk_create' hub=false from_dashboard=false 2025/08/06 20:00:11 found repro for "WARNING in xsk_create" (orig title: "WARNING in corrupted", reliability: 1), took 33.51 minutes 2025/08/06 20:00:11 start reproducing 'WARNING in corrupted' 2025/08/06 20:00:11 "WARNING in xsk_create": saved crash log into 1754510411.crash.log 2025/08/06 20:00:11 "WARNING in xsk_create": saved repro log into 1754510411.repro.log 2025/08/06 20:00:26 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:00:26 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:01:15 runner 8 connected 2025/08/06 20:01:17 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:01:17 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:01:32 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:02:00 new: boot error: can't ssh into the instance 2025/08/06 20:02:05 attempt #0 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 20:02:14 runner 7 connected 2025/08/06 20:02:19 new: boot error: can't ssh into the instance 2025/08/06 20:02:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 18, "corpus": 9597, "corpus [files]": 479, "corpus [symbols]": 477, "cover overflows": 12085, "coverage": 71064, "distributor delayed": 20966, "distributor undelayed": 20966, "distributor violated": 943, "exec candidate": 22555, "exec collide": 37464, "exec fuzz": 70964, "exec gen": 3711, "exec hints": 9035, "exec inject": 0, "exec minimize": 2384, "exec retries": 195, "exec seeds": 189, "exec smash": 1696, "exec total [base]": 216249, "exec total [new]": 218988, "exec triage": 31874, "executor restarts": 1302, "fault jobs": 0, "fuzzer jobs": 0, "fuzzing VMs [base]": 3, "fuzzing VMs [new]": 2, "hints jobs": 0, "max signal": 74615, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1297, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10284, "no exec duration": 14760683000000, "no exec requests": 45882, "pending": 226, "prog exec time": 493, "reproducing": 3, "rpc recv": 12798158144, "rpc sent": 1486410264, "signal": 70125, "smash jobs": 0, "triage jobs": 0, "vm output": 24985618, "vm restarts [base]": 38, "vm restarts [new]": 341 } 2025/08/06 20:02:49 runner 4 connected 2025/08/06 20:02:49 reproducing crash 'no output/lost connection': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:03:10 runner 5 connected 2025/08/06 20:03:18 new: boot error: can't ssh into the instance 2025/08/06 20:03:49 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:03:49 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:03:57 attempt #1 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 20:04:00 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:04:00 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:04:10 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:04:13 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:04:13 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:04:24 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:04:24 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:04:31 new: boot error: can't ssh into the instance 2025/08/06 20:04:38 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:04:38 runner 5 connected 2025/08/06 20:04:49 runner 7 connected 2025/08/06 20:05:02 runner 4 connected 2025/08/06 20:05:04 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:05:04 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:05:12 runner 8 connected 2025/08/06 20:05:19 new: boot error: can't ssh into the instance 2025/08/06 20:05:30 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:05:30 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:05:36 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:05:36 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:05:48 attempt #2 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 20:05:48 patched-only: WARNING in xsk_create 2025/08/06 20:05:48 scheduled a reproduction of 'WARNING in xsk_create (full)' 2025/08/06 20:05:54 runner 5 connected 2025/08/06 20:05:58 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:06:19 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 20:06:19 runner 4 connected 2025/08/06 20:06:22 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:06:25 runner 7 connected 2025/08/06 20:06:36 runner 0 connected 2025/08/06 20:06:47 new: boot error: can't ssh into the instance 2025/08/06 20:07:08 runner 8 connected 2025/08/06 20:07:10 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 20:07:15 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:07:15 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:07:27 patched crashed: WARNING in xsk_create [need repro = true] 2025/08/06 20:07:27 scheduled a reproduction of 'WARNING in xsk_create' 2025/08/06 20:07:38 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:07:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 18, "corpus": 9597, "corpus [files]": 479, "corpus [symbols]": 477, "cover overflows": 12293, "coverage": 71064, "distributor delayed": 20971, "distributor undelayed": 20971, "distributor violated": 943, "exec candidate": 22555, "exec collide": 38619, "exec fuzz": 73044, "exec gen": 3809, "exec hints": 9035, "exec inject": 0, "exec minimize": 2384, "exec retries": 197, "exec seeds": 189, "exec smash": 1696, "exec total [base]": 219581, "exec total [new]": 222325, "exec triage": 31880, "executor restarts": 1335, "fault jobs": 0, "fuzzer jobs": 0, "fuzzing VMs [base]": 4, "fuzzing VMs [new]": 1, "hints jobs": 0, "max signal": 74621, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1301, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10286, "no exec duration": 15437935000000, "no exec requests": 47670, "pending": 236, "prog exec time": 293, "reproducing": 3, "rpc recv": 13140640816, "rpc sent": 1522322656, "signal": 70125, "smash jobs": 0, "triage jobs": 0, "vm output": 25645700, "vm restarts [base]": 39, "vm restarts [new]": 351 } 2025/08/06 20:07:59 runner 7 connected 2025/08/06 20:08:02 new: boot error: can't ssh into the instance 2025/08/06 20:08:05 runner 4 connected 2025/08/06 20:08:08 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:08:08 repro finished 'WARNING in xsk_create', repro=true crepro=false desc='WARNING in xsk_create' hub=false from_dashboard=false 2025/08/06 20:08:08 found repro for "WARNING in xsk_create" (orig title: "-SAME-", reliability: 1), took 16.38 minutes 2025/08/06 20:08:08 "WARNING in xsk_create": saved crash log into 1754510888.crash.log 2025/08/06 20:08:08 start reproducing 'WARNING in xsk_create' 2025/08/06 20:08:08 "WARNING in xsk_create": saved repro log into 1754510888.repro.log 2025/08/06 20:08:12 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:08:24 runner 5 connected 2025/08/06 20:08:31 repro finished 'WARNING in xsk_create (full)', repro=false crepro=false desc='' hub=false from_dashboard=false 2025/08/06 20:08:31 failed repro for "WARNING in xsk_create", err=failed to build program: // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static unsigned long long procid; static __thread int clone_ongoing; static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* ctx) { if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) { exit(sig); } uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0; int valid = addr < prog_start || addr > prog_end; if (skip && valid) { _longjmp(segv_env, 1); } exit(sig); } static void install_segv_handler(void) { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) ({ int ok = 1; __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); if (_setjmp(segv_env) == 0) { __VA_ARGS__; } else ok = 0; __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); ok; }) static void sleep_ms(uint64_t ms) { usleep(ms * 1000); } static uint64_t current_time_ms(void) { struct timespec ts; if (clock_gettime(CLOCK_MONOTONIC, &ts)) exit(1); return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; } static void use_temporary_dir(void) { char tmpdir_template[] = "./syzkaller.XXXXXX"; char* tmpdir = mkdtemp(tmpdir_template); if (!tmpdir) exit(1); if (chmod(tmpdir, 0777)) exit(1); if (chdir(tmpdir)) exit(1); } static void thread_start(void* (*fn)(void*), void* arg) { pthread_t th; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setstacksize(&attr, 128 << 10); int i = 0; for (; i < 100; i++) { if (pthread_create(&th, &attr, fn, arg) == 0) { pthread_attr_destroy(&attr); return; } if (errno == EAGAIN) { usleep(50); continue; } break; } exit(1); } typedef struct { int state; } event_t; static void event_init(event_t* ev) { ev->state = 0; } static void event_reset(event_t* ev) { ev->state = 0; } static void event_set(event_t* ev) { if (ev->state) exit(1); __atomic_store_n(&ev->state, 1, __ATOMIC_RELEASE); syscall(SYS_futex, &ev->state, FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1000000); } static void event_wait(event_t* ev) { while (!__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, 0); } static int event_isset(event_t* ev) { return __atomic_load_n(&ev->state, __ATOMIC_ACQUIRE); } static int event_timedwait(event_t* ev, uint64_t timeout) { uint64_t start = current_time_ms(); uint64_t now = start; for (;;) { uint64_t remain = timeout - (now - start); struct timespec ts; ts.tv_sec = remain / 1000; ts.tv_nsec = (remain % 1000) * 1000 * 1000; syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, &ts); if (__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) return 1; now = current_time_ms(); if (now - start > timeout) return 0; } } static bool write_file(const char* file, const char* what, ...) { char buf[1024]; va_list args; va_start(args, what); vsnprintf(buf, sizeof(buf), what, args); va_end(args); buf[sizeof(buf) - 1] = 0; int len = strlen(buf); int fd = open(file, O_WRONLY | O_CLOEXEC); if (fd == -1) return false; if (write(fd, buf, len) != len) { int err = errno; close(fd); errno = err; return false; } close(fd); return true; } struct nlmsg { char* pos; int nesting; struct nlattr* nested[8]; char buf[4096]; }; static void netlink_init(struct nlmsg* nlmsg, int typ, int flags, const void* data, int size) { memset(nlmsg, 0, sizeof(*nlmsg)); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_type = typ; hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags; memcpy(hdr + 1, data, size); nlmsg->pos = (char*)(hdr + 1) + NLMSG_ALIGN(size); } static void netlink_attr(struct nlmsg* nlmsg, int typ, const void* data, int size) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_len = sizeof(*attr) + size; attr->nla_type = typ; if (size > 0) memcpy(attr + 1, data, size); nlmsg->pos += NLMSG_ALIGN(attr->nla_len); } static void netlink_nest(struct nlmsg* nlmsg, int typ) { struct nlattr* attr = (struct nlattr*)nlmsg->pos; attr->nla_type = typ; nlmsg->pos += sizeof(*attr); nlmsg->nested[nlmsg->nesting++] = attr; } static void netlink_done(struct nlmsg* nlmsg) { struct nlattr* attr = nlmsg->nested[--nlmsg->nesting]; attr->nla_len = nlmsg->pos - (char*)attr; } static int netlink_send_ext(struct nlmsg* nlmsg, int sock, uint16_t reply_type, int* reply_len, bool dofail) { if (nlmsg->pos > nlmsg->buf + sizeof(nlmsg->buf) || nlmsg->nesting) exit(1); struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf; hdr->nlmsg_len = nlmsg->pos - nlmsg->buf; struct sockaddr_nl addr; memset(&addr, 0, sizeof(addr)); addr.nl_family = AF_NETLINK; ssize_t n = sendto(sock, nlmsg->buf, hdr->nlmsg_len, 0, (struct sockaddr*)&addr, sizeof(addr)); if (n != (ssize_t)hdr->nlmsg_len) { if (dofail) exit(1); return -1; } n = recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); if (reply_len) *reply_len = 0; if (n < 0) { if (dofail) exit(1); return -1; } if (n < (ssize_t)sizeof(struct nlmsghdr)) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type == NLMSG_DONE) return 0; if (reply_len && hdr->nlmsg_type == reply_type) { *reply_len = n; return 0; } if (n < (ssize_t)(sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr))) { errno = EINVAL; if (dofail) exit(1); return -1; } if (hdr->nlmsg_type != NLMSG_ERROR) { errno = EINVAL; if (dofail) exit(1); return -1; } errno = -((struct nlmsgerr*)(hdr + 1))->error; return -errno; } static int netlink_send(struct nlmsg* nlmsg, int sock) { return netlink_send_ext(nlmsg, sock, 0, NULL, true); } static int netlink_query_family_id(struct nlmsg* nlmsg, int sock, const char* family_name, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = CTRL_CMD_GETFAMILY; netlink_init(nlmsg, GENL_ID_CTRL, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, CTRL_ATTR_FAMILY_NAME, family_name, strnlen(family_name, GENL_NAMSIZ - 1) + 1); int n = 0; int err = netlink_send_ext(nlmsg, sock, GENL_ID_CTRL, &n, dofail); if (err < 0) { return -1; } uint16_t id = 0; struct nlattr* attr = (struct nlattr*)(nlmsg->buf + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg->buf + n; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == CTRL_ATTR_FAMILY_ID) { id = *(uint16_t*)(attr + 1); break; } } if (!id) { errno = EINVAL; return -1; } recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0); return id; } static int netlink_next_msg(struct nlmsg* nlmsg, unsigned int offset, unsigned int total_len) { struct nlmsghdr* hdr = (struct nlmsghdr*)(nlmsg->buf + offset); if (offset == total_len || offset + hdr->nlmsg_len > total_len) return -1; return hdr->nlmsg_len; } static void netlink_add_device_impl(struct nlmsg* nlmsg, const char* type, const char* name, bool up) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; netlink_init(nlmsg, RTM_NEWLINK, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); if (name) netlink_attr(nlmsg, IFLA_IFNAME, name, strlen(name)); netlink_nest(nlmsg, IFLA_LINKINFO); netlink_attr(nlmsg, IFLA_INFO_KIND, type, strlen(type)); } static void netlink_add_device(struct nlmsg* nlmsg, int sock, const char* type, const char* name) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_veth(struct nlmsg* nlmsg, int sock, const char* name, const char* peer) { netlink_add_device_impl(nlmsg, "veth", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_nest(nlmsg, VETH_INFO_PEER); nlmsg->pos += sizeof(struct ifinfomsg); netlink_attr(nlmsg, IFLA_IFNAME, peer, strlen(peer)); netlink_done(nlmsg); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_xfrm(struct nlmsg* nlmsg, int sock, const char* name) { netlink_add_device_impl(nlmsg, "xfrm", name, true); netlink_nest(nlmsg, IFLA_INFO_DATA); int if_id = 1; netlink_attr(nlmsg, 2, &if_id, sizeof(if_id)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_hsr(struct nlmsg* nlmsg, int sock, const char* name, const char* slave1, const char* slave2) { netlink_add_device_impl(nlmsg, "hsr", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); int ifindex1 = if_nametoindex(slave1); netlink_attr(nlmsg, IFLA_HSR_SLAVE1, &ifindex1, sizeof(ifindex1)); int ifindex2 = if_nametoindex(slave2); netlink_attr(nlmsg, IFLA_HSR_SLAVE2, &ifindex2, sizeof(ifindex2)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_linked(struct nlmsg* nlmsg, int sock, const char* type, const char* name, const char* link) { netlink_add_device_impl(nlmsg, type, name, false); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_vlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t id, uint16_t proto) { netlink_add_device_impl(nlmsg, "vlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_VLAN_ID, &id, sizeof(id)); netlink_attr(nlmsg, IFLA_VLAN_PROTOCOL, &proto, sizeof(proto)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_macvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link) { netlink_add_device_impl(nlmsg, "macvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); uint32_t mode = MACVLAN_MODE_BRIDGE; netlink_attr(nlmsg, IFLA_MACVLAN_MODE, &mode, sizeof(mode)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_add_geneve(struct nlmsg* nlmsg, int sock, const char* name, uint32_t vni, struct in_addr* addr4, struct in6_addr* addr6) { netlink_add_device_impl(nlmsg, "geneve", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_GENEVE_ID, &vni, sizeof(vni)); if (addr4) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE, addr4, sizeof(*addr4)); if (addr6) netlink_attr(nlmsg, IFLA_GENEVE_REMOTE6, addr6, sizeof(*addr6)); netlink_done(nlmsg); netlink_done(nlmsg); int err = netlink_send(nlmsg, sock); if (err < 0) { } } #define IFLA_IPVLAN_FLAGS 2 #define IPVLAN_MODE_L3S 2 #undef IPVLAN_F_VEPA #define IPVLAN_F_VEPA 2 static void netlink_add_ipvlan(struct nlmsg* nlmsg, int sock, const char* name, const char* link, uint16_t mode, uint16_t flags) { netlink_add_device_impl(nlmsg, "ipvlan", name, false); netlink_nest(nlmsg, IFLA_INFO_DATA); netlink_attr(nlmsg, IFLA_IPVLAN_MODE, &mode, sizeof(mode)); netlink_attr(nlmsg, IFLA_IPVLAN_FLAGS, &flags, sizeof(flags)); netlink_done(nlmsg); netlink_done(nlmsg); int ifindex = if_nametoindex(link); netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static void netlink_device_change(struct nlmsg* nlmsg, int sock, const char* name, bool up, const char* master, const void* mac, int macsize, const char* new_name) { struct ifinfomsg hdr; memset(&hdr, 0, sizeof(hdr)); if (up) hdr.ifi_flags = hdr.ifi_change = IFF_UP; hdr.ifi_index = if_nametoindex(name); netlink_init(nlmsg, RTM_NEWLINK, 0, &hdr, sizeof(hdr)); if (new_name) netlink_attr(nlmsg, IFLA_IFNAME, new_name, strlen(new_name)); if (master) { int ifindex = if_nametoindex(master); netlink_attr(nlmsg, IFLA_MASTER, &ifindex, sizeof(ifindex)); } if (macsize) netlink_attr(nlmsg, IFLA_ADDRESS, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static int netlink_add_addr(struct nlmsg* nlmsg, int sock, const char* dev, const void* addr, int addrsize) { struct ifaddrmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ifa_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ifa_prefixlen = addrsize == 4 ? 24 : 120; hdr.ifa_scope = RT_SCOPE_UNIVERSE; hdr.ifa_index = if_nametoindex(dev); netlink_init(nlmsg, RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, IFA_LOCAL, addr, addrsize); netlink_attr(nlmsg, IFA_ADDRESS, addr, addrsize); return netlink_send(nlmsg, sock); } static void netlink_add_addr4(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in_addr in_addr; inet_pton(AF_INET, addr, &in_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in_addr, sizeof(in_addr)); if (err < 0) { } } static void netlink_add_addr6(struct nlmsg* nlmsg, int sock, const char* dev, const char* addr) { struct in6_addr in6_addr; inet_pton(AF_INET6, addr, &in6_addr); int err = netlink_add_addr(nlmsg, sock, dev, &in6_addr, sizeof(in6_addr)); if (err < 0) { } } static void netlink_add_neigh(struct nlmsg* nlmsg, int sock, const char* name, const void* addr, int addrsize, const void* mac, int macsize) { struct ndmsg hdr; memset(&hdr, 0, sizeof(hdr)); hdr.ndm_family = addrsize == 4 ? AF_INET : AF_INET6; hdr.ndm_ifindex = if_nametoindex(name); hdr.ndm_state = NUD_PERMANENT; netlink_init(nlmsg, RTM_NEWNEIGH, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); netlink_attr(nlmsg, NDA_DST, addr, addrsize); netlink_attr(nlmsg, NDA_LLADDR, mac, macsize); int err = netlink_send(nlmsg, sock); if (err < 0) { } } static struct nlmsg nlmsg; static int tunfd = -1; #define TUN_IFACE "syz_tun" #define LOCAL_MAC 0xaaaaaaaaaaaa #define REMOTE_MAC 0xaaaaaaaaaabb #define LOCAL_IPV4 "172.20.20.170" #define REMOTE_IPV4 "172.20.20.187" #define LOCAL_IPV6 "fe80::aa" #define REMOTE_IPV6 "fe80::bb" #define IFF_NAPI 0x0010 static void initialize_tun(void) { tunfd = open("/dev/net/tun", O_RDWR | O_NONBLOCK); if (tunfd == -1) { printf("tun: can't open /dev/net/tun: please enable CONFIG_TUN=y\n"); printf("otherwise fuzzing or reproducing might not work as intended\n"); return; } const int kTunFd = 200; if (dup2(tunfd, kTunFd) < 0) exit(1); close(tunfd); tunfd = kTunFd; struct ifreq ifr; memset(&ifr, 0, sizeof(ifr)); strncpy(ifr.ifr_name, TUN_IFACE, IFNAMSIZ); ifr.ifr_flags = IFF_TAP | IFF_NO_PI; if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0) { exit(1); } char sysctl[64]; sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/accept_dad", TUN_IFACE); write_file(sysctl, "0"); sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/router_solicitations", TUN_IFACE); write_file(sysctl, "0"); int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); netlink_add_addr4(&nlmsg, sock, TUN_IFACE, LOCAL_IPV4); netlink_add_addr6(&nlmsg, sock, TUN_IFACE, LOCAL_IPV6); uint64_t macaddr = REMOTE_MAC; struct in_addr in_addr; inet_pton(AF_INET, REMOTE_IPV4, &in_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in_addr, sizeof(in_addr), &macaddr, ETH_ALEN); struct in6_addr in6_addr; inet_pton(AF_INET6, REMOTE_IPV6, &in6_addr); netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in6_addr, sizeof(in6_addr), &macaddr, ETH_ALEN); macaddr = LOCAL_MAC; netlink_device_change(&nlmsg, sock, TUN_IFACE, true, 0, &macaddr, ETH_ALEN, NULL); close(sock); } #define DEVLINK_FAMILY_NAME "devlink" #define DEVLINK_CMD_PORT_GET 5 #define DEVLINK_ATTR_BUS_NAME 1 #define DEVLINK_ATTR_DEV_NAME 2 #define DEVLINK_ATTR_NETDEV_NAME 7 static struct nlmsg nlmsg2; static void initialize_devlink_ports(const char* bus_name, const char* dev_name, const char* netdev_prefix) { struct genlmsghdr genlhdr; int len, total_len, id, err, offset; uint16_t netdev_index; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) exit(1); int rtsock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (rtsock == -1) exit(1); id = netlink_query_family_id(&nlmsg, sock, DEVLINK_FAMILY_NAME, true); if (id == -1) goto error; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = DEVLINK_CMD_PORT_GET; netlink_init(&nlmsg, id, NLM_F_DUMP, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, DEVLINK_ATTR_BUS_NAME, bus_name, strlen(bus_name) + 1); netlink_attr(&nlmsg, DEVLINK_ATTR_DEV_NAME, dev_name, strlen(dev_name) + 1); err = netlink_send_ext(&nlmsg, sock, id, &total_len, true); if (err < 0) { goto error; } offset = 0; netdev_index = 0; while ((len = netlink_next_msg(&nlmsg, offset, total_len)) != -1) { struct nlattr* attr = (struct nlattr*)(nlmsg.buf + offset + NLMSG_HDRLEN + NLMSG_ALIGN(sizeof(genlhdr))); for (; (char*)attr < nlmsg.buf + offset + len; attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) { if (attr->nla_type == DEVLINK_ATTR_NETDEV_NAME) { char* port_name; char netdev_name[IFNAMSIZ]; port_name = (char*)(attr + 1); snprintf(netdev_name, sizeof(netdev_name), "%s%d", netdev_prefix, netdev_index); netlink_device_change(&nlmsg2, rtsock, port_name, true, 0, 0, 0, netdev_name); break; } } offset += len; netdev_index++; } error: close(rtsock); close(sock); } #define WIFI_INITIAL_DEVICE_COUNT 2 #define WIFI_MAC_BASE { 0x08, 0x02, 0x11, 0x00, 0x00, 0x00} #define WIFI_IBSS_BSSID { 0x50, 0x50, 0x50, 0x50, 0x50, 0x50} #define WIFI_IBSS_SSID { 0x10, 0x10, 0x10, 0x10, 0x10, 0x10} #define WIFI_DEFAULT_FREQUENCY 2412 #define WIFI_DEFAULT_SIGNAL 0 #define WIFI_DEFAULT_RX_RATE 1 #define HWSIM_CMD_REGISTER 1 #define HWSIM_CMD_FRAME 2 #define HWSIM_CMD_NEW_RADIO 4 #define HWSIM_ATTR_SUPPORT_P2P_DEVICE 14 #define HWSIM_ATTR_PERM_ADDR 22 #define IF_OPER_UP 6 struct join_ibss_props { int wiphy_freq; bool wiphy_freq_fixed; uint8_t* mac; uint8_t* ssid; int ssid_len; }; static int set_interface_state(const char* interface_name, int on) { struct ifreq ifr; int sock = socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) { return -1; } memset(&ifr, 0, sizeof(ifr)); strcpy(ifr.ifr_name, interface_name); int ret = ioctl(sock, SIOCGIFFLAGS, &ifr); if (ret < 0) { close(sock); return -1; } if (on) ifr.ifr_flags |= IFF_UP; else ifr.ifr_flags &= ~IFF_UP; ret = ioctl(sock, SIOCSIFFLAGS, &ifr); close(sock); if (ret < 0) { return -1; } return 0; } static int nl80211_set_interface(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, uint32_t iftype, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_SET_INTERFACE; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_IFTYPE, &iftype, sizeof(iftype)); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int nl80211_join_ibss(struct nlmsg* nlmsg, int sock, int nl80211_family, uint32_t ifindex, struct join_ibss_props* props, bool dofail) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL80211_CMD_JOIN_IBSS; netlink_init(nlmsg, nl80211_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, NL80211_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(nlmsg, NL80211_ATTR_SSID, props->ssid, props->ssid_len); netlink_attr(nlmsg, NL80211_ATTR_WIPHY_FREQ, &(props->wiphy_freq), sizeof(props->wiphy_freq)); if (props->mac) netlink_attr(nlmsg, NL80211_ATTR_MAC, props->mac, ETH_ALEN); if (props->wiphy_freq_fixed) netlink_attr(nlmsg, NL80211_ATTR_FREQ_FIXED, NULL, 0); int err = netlink_send_ext(nlmsg, sock, 0, NULL, dofail); if (err < 0) { } return err; } static int get_ifla_operstate(struct nlmsg* nlmsg, int ifindex, bool dofail) { struct ifinfomsg info; memset(&info, 0, sizeof(info)); info.ifi_family = AF_UNSPEC; info.ifi_index = ifindex; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) { return -1; } netlink_init(nlmsg, RTM_GETLINK, 0, &info, sizeof(info)); int n; int err = netlink_send_ext(nlmsg, sock, RTM_NEWLINK, &n, dofail); close(sock); if (err) { return -1; } struct rtattr* attr = IFLA_RTA(NLMSG_DATA(nlmsg->buf)); for (; RTA_OK(attr, n); attr = RTA_NEXT(attr, n)) { if (attr->rta_type == IFLA_OPERSTATE) return *((int32_t*)RTA_DATA(attr)); } return -1; } static int await_ifla_operstate(struct nlmsg* nlmsg, char* interface, int operstate, bool dofail) { int ifindex = if_nametoindex(interface); while (true) { usleep(1000); int ret = get_ifla_operstate(nlmsg, ifindex, dofail); if (ret < 0) return ret; if (ret == operstate) return 0; } return 0; } static int nl80211_setup_ibss_interface(struct nlmsg* nlmsg, int sock, int nl80211_family_id, char* interface, struct join_ibss_props* ibss_props, bool dofail) { int ifindex = if_nametoindex(interface); if (ifindex == 0) { return -1; } int ret = nl80211_set_interface(nlmsg, sock, nl80211_family_id, ifindex, NL80211_IFTYPE_ADHOC, dofail); if (ret < 0) { return -1; } ret = set_interface_state(interface, 1); if (ret < 0) { return -1; } ret = nl80211_join_ibss(nlmsg, sock, nl80211_family_id, ifindex, ibss_props, dofail); if (ret < 0) { return -1; } return 0; } static int hwsim80211_create_device(struct nlmsg* nlmsg, int sock, int hwsim_family, uint8_t mac_addr[ETH_ALEN]) { struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = HWSIM_CMD_NEW_RADIO; netlink_init(nlmsg, hwsim_family, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(nlmsg, HWSIM_ATTR_SUPPORT_P2P_DEVICE, NULL, 0); netlink_attr(nlmsg, HWSIM_ATTR_PERM_ADDR, mac_addr, ETH_ALEN); int err = netlink_send(nlmsg, sock); if (err < 0) { } return err; } static void initialize_wifi_devices(void) { int rfkill = open("/dev/rfkill", O_RDWR); if (rfkill == -1) exit(1); struct rfkill_event event = {0}; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; if (write(rfkill, &event, sizeof(event)) != (ssize_t)(sizeof(event))) exit(1); close(rfkill); uint8_t mac_addr[6] = WIFI_MAC_BASE; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock < 0) exit(1); int hwsim_family_id = netlink_query_family_id(&nlmsg, sock, "MAC80211_HWSIM", true); int nl80211_family_id = netlink_query_family_id(&nlmsg, sock, "nl80211", true); if (hwsim_family_id < 0 || nl80211_family_id < 0) exit(1); uint8_t ssid[] = WIFI_IBSS_SSID; uint8_t bssid[] = WIFI_IBSS_BSSID; struct join_ibss_props ibss_props = { .wiphy_freq = WIFI_DEFAULT_FREQUENCY, .wiphy_freq_fixed = true, .mac = bssid, .ssid = ssid, .ssid_len = sizeof(ssid)}; for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { mac_addr[5] = device_id; int ret = hwsim80211_create_device(&nlmsg, sock, hwsim_family_id, mac_addr); if (ret < 0) exit(1); char interface[6] = "wlan0"; interface[4] += device_id; if (nl80211_setup_ibss_interface(&nlmsg, sock, nl80211_family_id, interface, &ibss_props, true) < 0) exit(1); } for (int device_id = 0; device_id < WIFI_INITIAL_DEVICE_COUNT; device_id++) { char interface[6] = "wlan0"; interface[4] += device_id; int ret = await_ifla_operstate(&nlmsg, interface, IF_OPER_UP, true); if (ret < 0) exit(1); } close(sock); } static int runcmdline(char* cmdline) { int ret = system(cmdline); if (ret) { } return ret; } #define DEV_IPV4 "172.20.20.%d" #define DEV_IPV6 "fe80::%02x" #define DEV_MAC 0x00aaaaaaaaaa static void netdevsim_add(unsigned int addr, unsigned int port_count) { write_file("/sys/bus/netdevsim/del_device", "%u", addr); if (write_file("/sys/bus/netdevsim/new_device", "%u %u", addr, port_count)) { char buf[32]; snprintf(buf, sizeof(buf), "netdevsim%d", addr); initialize_devlink_ports("netdevsim", buf, "netdevsim"); } } #define WG_GENL_NAME "wireguard" enum wg_cmd { WG_CMD_GET_DEVICE, WG_CMD_SET_DEVICE, }; enum wgdevice_attribute { WGDEVICE_A_UNSPEC, WGDEVICE_A_IFINDEX, WGDEVICE_A_IFNAME, WGDEVICE_A_PRIVATE_KEY, WGDEVICE_A_PUBLIC_KEY, WGDEVICE_A_FLAGS, WGDEVICE_A_LISTEN_PORT, WGDEVICE_A_FWMARK, WGDEVICE_A_PEERS, }; enum wgpeer_attribute { WGPEER_A_UNSPEC, WGPEER_A_PUBLIC_KEY, WGPEER_A_PRESHARED_KEY, WGPEER_A_FLAGS, WGPEER_A_ENDPOINT, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, WGPEER_A_LAST_HANDSHAKE_TIME, WGPEER_A_RX_BYTES, WGPEER_A_TX_BYTES, WGPEER_A_ALLOWEDIPS, WGPEER_A_PROTOCOL_VERSION, }; enum wgallowedip_attribute { WGALLOWEDIP_A_UNSPEC, WGALLOWEDIP_A_FAMILY, WGALLOWEDIP_A_IPADDR, WGALLOWEDIP_A_CIDR_MASK, }; static void netlink_wireguard_setup(void) { const char ifname_a[] = "wg0"; const char ifname_b[] = "wg1"; const char ifname_c[] = "wg2"; const char private_a[] = "\xa0\x5c\xa8\x4f\x6c\x9c\x8e\x38\x53\xe2\xfd\x7a\x70\xae\x0f\xb2\x0f\xa1\x52\x60\x0c\xb0\x08\x45\x17\x4f\x08\x07\x6f\x8d\x78\x43"; const char private_b[] = "\xb0\x80\x73\xe8\xd4\x4e\x91\xe3\xda\x92\x2c\x22\x43\x82\x44\xbb\x88\x5c\x69\xe2\x69\xc8\xe9\xd8\x35\xb1\x14\x29\x3a\x4d\xdc\x6e"; const char private_c[] = "\xa0\xcb\x87\x9a\x47\xf5\xbc\x64\x4c\x0e\x69\x3f\xa6\xd0\x31\xc7\x4a\x15\x53\xb6\xe9\x01\xb9\xff\x2f\x51\x8c\x78\x04\x2f\xb5\x42"; const char public_a[] = "\x97\x5c\x9d\x81\xc9\x83\xc8\x20\x9e\xe7\x81\x25\x4b\x89\x9f\x8e\xd9\x25\xae\x9f\x09\x23\xc2\x3c\x62\xf5\x3c\x57\xcd\xbf\x69\x1c"; const char public_b[] = "\xd1\x73\x28\x99\xf6\x11\xcd\x89\x94\x03\x4d\x7f\x41\x3d\xc9\x57\x63\x0e\x54\x93\xc2\x85\xac\xa4\x00\x65\xcb\x63\x11\xbe\x69\x6b"; const char public_c[] = "\xf4\x4d\xa3\x67\xa8\x8e\xe6\x56\x4f\x02\x02\x11\x45\x67\x27\x08\x2f\x5c\xeb\xee\x8b\x1b\xf5\xeb\x73\x37\x34\x1b\x45\x9b\x39\x22"; const uint16_t listen_a = 20001; const uint16_t listen_b = 20002; const uint16_t listen_c = 20003; const uint16_t af_inet = AF_INET; const uint16_t af_inet6 = AF_INET6; const struct sockaddr_in endpoint_b_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_b), .sin_addr = {htonl(INADDR_LOOPBACK)}}; const struct sockaddr_in endpoint_c_v4 = { .sin_family = AF_INET, .sin_port = htons(listen_c), .sin_addr = {htonl(INADDR_LOOPBACK)}}; struct sockaddr_in6 endpoint_a_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_a)}; endpoint_a_v6.sin6_addr = in6addr_loopback; struct sockaddr_in6 endpoint_c_v6 = { .sin6_family = AF_INET6, .sin6_port = htons(listen_c)}; endpoint_c_v6.sin6_addr = in6addr_loopback; const struct in_addr first_half_v4 = {0}; const struct in_addr second_half_v4 = {(uint32_t)htonl(128 << 24)}; const struct in6_addr first_half_v6 = {{{0}}}; const struct in6_addr second_half_v6 = {{{0x80}}}; const uint8_t half_cidr = 1; const uint16_t persistent_keepalives[] = {1, 3, 7, 9, 14, 19}; struct genlmsghdr genlhdr = { .cmd = WG_CMD_SET_DEVICE, .version = 1}; int sock; int id, err; sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock == -1) { return; } id = netlink_query_family_id(&nlmsg, sock, WG_GENL_NAME, true); if (id == -1) goto error; netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_a, strlen(ifname_a) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_a, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_a, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[0], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v6, sizeof(endpoint_c_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[1], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_b, strlen(ifname_b) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_b, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_b, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[2], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v4, sizeof(endpoint_c_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[3], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_c, strlen(ifname_c) + 1); netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_c, 32); netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_c, 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6, sizeof(endpoint_a_v6)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[4], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4, sizeof(first_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6, sizeof(first_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32); netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4, sizeof(endpoint_b_v4)); netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL, &persistent_keepalives[5], 2); netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4, sizeof(second_half_v4)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_nest(&nlmsg, NLA_F_NESTED | 0); netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2); netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6, sizeof(second_half_v6)); netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); netlink_done(&nlmsg); err = netlink_send(&nlmsg, sock); if (err < 0) { } error: close(sock); } static void initialize_netdevices(void) { char netdevsim[16]; sprintf(netdevsim, "netdevsim%d", (int)procid); struct { const char* type; const char* dev; } devtypes[] = { {"ip6gretap", "ip6gretap0"}, {"bridge", "bridge0"}, {"vcan", "vcan0"}, {"bond", "bond0"}, {"team", "team0"}, {"dummy", "dummy0"}, {"nlmon", "nlmon0"}, {"caif", "caif0"}, {"batadv", "batadv0"}, {"vxcan", "vxcan1"}, {"veth", 0}, {"wireguard", "wg0"}, {"wireguard", "wg1"}, {"wireguard", "wg2"}, }; const char* devmasters[] = {"bridge", "bond", "team", "batadv"}; struct { const char* name; int macsize; bool noipv6; } devices[] = { {"lo", ETH_ALEN}, {"sit0", 0}, {"bridge0", ETH_ALEN}, {"vcan0", 0, true}, {"tunl0", 0}, {"gre0", 0}, {"gretap0", ETH_ALEN}, {"ip_vti0", 0}, {"ip6_vti0", 0}, {"ip6tnl0", 0}, {"ip6gre0", 0}, {"ip6gretap0", ETH_ALEN}, {"erspan0", ETH_ALEN}, {"bond0", ETH_ALEN}, {"veth0", ETH_ALEN}, {"veth1", ETH_ALEN}, {"team0", ETH_ALEN}, {"veth0_to_bridge", ETH_ALEN}, {"veth1_to_bridge", ETH_ALEN}, {"veth0_to_bond", ETH_ALEN}, {"veth1_to_bond", ETH_ALEN}, {"veth0_to_team", ETH_ALEN}, {"veth1_to_team", ETH_ALEN}, {"veth0_to_hsr", ETH_ALEN}, {"veth1_to_hsr", ETH_ALEN}, {"hsr0", 0}, {"dummy0", ETH_ALEN}, {"nlmon0", 0}, {"vxcan0", 0, true}, {"vxcan1", 0, true}, {"caif0", ETH_ALEN}, {"batadv0", ETH_ALEN}, {netdevsim, ETH_ALEN}, {"xfrm0", ETH_ALEN}, {"veth0_virt_wifi", ETH_ALEN}, {"veth1_virt_wifi", ETH_ALEN}, {"virt_wifi0", ETH_ALEN}, {"veth0_vlan", ETH_ALEN}, {"veth1_vlan", ETH_ALEN}, {"vlan0", ETH_ALEN}, {"vlan1", ETH_ALEN}, {"macvlan0", ETH_ALEN}, {"macvlan1", ETH_ALEN}, {"ipvlan0", ETH_ALEN}, {"ipvlan1", ETH_ALEN}, {"veth0_macvtap", ETH_ALEN}, {"veth1_macvtap", ETH_ALEN}, {"macvtap0", ETH_ALEN}, {"macsec0", ETH_ALEN}, {"veth0_to_batadv", ETH_ALEN}, {"veth1_to_batadv", ETH_ALEN}, {"batadv_slave_0", ETH_ALEN}, {"batadv_slave_1", ETH_ALEN}, {"geneve0", ETH_ALEN}, {"geneve1", ETH_ALEN}, {"wg0", 0}, {"wg1", 0}, {"wg2", 0}, }; int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) netlink_add_device(&nlmsg, sock, devtypes[i].type, devtypes[i].dev); for (i = 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) { char master[32], slave0[32], veth0[32], slave1[32], veth1[32]; sprintf(slave0, "%s_slave_0", devmasters[i]); sprintf(veth0, "veth0_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave0, veth0); sprintf(slave1, "%s_slave_1", devmasters[i]); sprintf(veth1, "veth1_to_%s", devmasters[i]); netlink_add_veth(&nlmsg, sock, slave1, veth1); sprintf(master, "%s0", devmasters[i]); netlink_device_change(&nlmsg, sock, slave0, false, master, 0, 0, NULL); netlink_device_change(&nlmsg, sock, slave1, false, master, 0, 0, NULL); } netlink_add_xfrm(&nlmsg, sock, "xfrm0"); netlink_device_change(&nlmsg, sock, "bridge_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "bridge_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "hsr_slave_0", "veth0_to_hsr"); netlink_add_veth(&nlmsg, sock, "hsr_slave_1", "veth1_to_hsr"); netlink_add_hsr(&nlmsg, sock, "hsr0", "hsr_slave_0", "hsr_slave_1"); netlink_device_change(&nlmsg, sock, "hsr_slave_0", true, 0, 0, 0, NULL); netlink_device_change(&nlmsg, sock, "hsr_slave_1", true, 0, 0, 0, NULL); netlink_add_veth(&nlmsg, sock, "veth0_virt_wifi", "veth1_virt_wifi"); netlink_add_linked(&nlmsg, sock, "virt_wifi", "virt_wifi0", "veth1_virt_wifi"); netlink_add_veth(&nlmsg, sock, "veth0_vlan", "veth1_vlan"); netlink_add_vlan(&nlmsg, sock, "vlan0", "veth0_vlan", 0, htons(ETH_P_8021Q)); netlink_add_vlan(&nlmsg, sock, "vlan1", "veth0_vlan", 1, htons(ETH_P_8021AD)); netlink_add_macvlan(&nlmsg, sock, "macvlan0", "veth1_vlan"); netlink_add_macvlan(&nlmsg, sock, "macvlan1", "veth1_vlan"); netlink_add_ipvlan(&nlmsg, sock, "ipvlan0", "veth0_vlan", IPVLAN_MODE_L2, 0); netlink_add_ipvlan(&nlmsg, sock, "ipvlan1", "veth0_vlan", IPVLAN_MODE_L3S, IPVLAN_F_VEPA); netlink_add_veth(&nlmsg, sock, "veth0_macvtap", "veth1_macvtap"); netlink_add_linked(&nlmsg, sock, "macvtap", "macvtap0", "veth0_macvtap"); netlink_add_linked(&nlmsg, sock, "macsec", "macsec0", "veth1_macvtap"); char addr[32]; sprintf(addr, DEV_IPV4, 14 + 10); struct in_addr geneve_addr4; if (inet_pton(AF_INET, addr, &geneve_addr4) <= 0) exit(1); struct in6_addr geneve_addr6; if (inet_pton(AF_INET6, "fc00::01", &geneve_addr6) <= 0) exit(1); netlink_add_geneve(&nlmsg, sock, "geneve0", 0, &geneve_addr4, 0); netlink_add_geneve(&nlmsg, sock, "geneve1", 1, 0, &geneve_addr6); netdevsim_add((int)procid, 4); netlink_wireguard_setup(); for (i = 0; i < sizeof(devices) / (sizeof(devices[0])); i++) { char addr[32]; sprintf(addr, DEV_IPV4, i + 10); netlink_add_addr4(&nlmsg, sock, devices[i].name, addr); if (!devices[i].noipv6) { sprintf(addr, DEV_IPV6, i + 10); netlink_add_addr6(&nlmsg, sock, devices[i].name, addr); } uint64_t macaddr = DEV_MAC + ((i + 10ull) << 40); netlink_device_change(&nlmsg, sock, devices[i].name, true, 0, &macaddr, devices[i].macsize, NULL); } close(sock); } static void initialize_netdevices_init(void) { int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock == -1) exit(1); struct { const char* type; int macsize; bool noipv6; bool noup; } devtypes[] = { {"nr", 7, true}, {"rose", 5, true, true}, }; unsigned i; for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) { char dev[32], addr[32]; sprintf(dev, "%s%d", devtypes[i].type, (int)procid); sprintf(addr, "172.30.%d.%d", i, (int)procid + 1); netlink_add_addr4(&nlmsg, sock, dev, addr); if (!devtypes[i].noipv6) { sprintf(addr, "fe88::%02x:%02x", i, (int)procid + 1); netlink_add_addr6(&nlmsg, sock, dev, addr); } int macsize = devtypes[i].macsize; uint64_t macaddr = 0xbbbbbb + ((unsigned long long)i << (8 * (macsize - 2))) + (procid << (8 * (macsize - 1))); netlink_device_change(&nlmsg, sock, dev, !devtypes[i].noup, 0, &macaddr, macsize, NULL); } close(sock); } static int read_tun(char* data, int size) { if (tunfd < 0) return -1; int rv = read(tunfd, data, size); if (rv < 0) { if (errno == EAGAIN || errno == EBADF || errno == EBADFD) return -1; exit(1); } return rv; } static void flush_tun() { char data[1000]; while (read_tun(&data[0], sizeof(data)) != -1) { } } #define MAX_FDS 30 #define BTPROTO_HCI 1 #define ACL_LINK 1 #define SCAN_PAGE 2 typedef struct { uint8_t b[6]; } __attribute__((packed)) bdaddr_t; #define HCI_COMMAND_PKT 1 #define HCI_EVENT_PKT 4 #define HCI_VENDOR_PKT 0xff struct hci_command_hdr { uint16_t opcode; uint8_t plen; } __attribute__((packed)); struct hci_event_hdr { uint8_t evt; uint8_t plen; } __attribute__((packed)); #define HCI_EV_CONN_COMPLETE 0x03 struct hci_ev_conn_complete { uint8_t status; uint16_t handle; bdaddr_t bdaddr; uint8_t link_type; uint8_t encr_mode; } __attribute__((packed)); #define HCI_EV_CONN_REQUEST 0x04 struct hci_ev_conn_request { bdaddr_t bdaddr; uint8_t dev_class[3]; uint8_t link_type; } __attribute__((packed)); #define HCI_EV_REMOTE_FEATURES 0x0b struct hci_ev_remote_features { uint8_t status; uint16_t handle; uint8_t features[8]; } __attribute__((packed)); #define HCI_EV_CMD_COMPLETE 0x0e struct hci_ev_cmd_complete { uint8_t ncmd; uint16_t opcode; } __attribute__((packed)); #define HCI_OP_WRITE_SCAN_ENABLE 0x0c1a #define HCI_OP_READ_BUFFER_SIZE 0x1005 struct hci_rp_read_buffer_size { uint8_t status; uint16_t acl_mtu; uint8_t sco_mtu; uint16_t acl_max_pkt; uint16_t sco_max_pkt; } __attribute__((packed)); #define HCI_OP_READ_BD_ADDR 0x1009 struct hci_rp_read_bd_addr { uint8_t status; bdaddr_t bdaddr; } __attribute__((packed)); #define HCI_EV_LE_META 0x3e struct hci_ev_le_meta { uint8_t subevent; } __attribute__((packed)); #define HCI_EV_LE_CONN_COMPLETE 0x01 struct hci_ev_le_conn_complete { uint8_t status; uint16_t handle; uint8_t role; uint8_t bdaddr_type; bdaddr_t bdaddr; uint16_t interval; uint16_t latency; uint16_t supervision_timeout; uint8_t clk_accurancy; } __attribute__((packed)); struct hci_dev_req { uint16_t dev_id; uint32_t dev_opt; }; struct vhci_vendor_pkt_request { uint8_t type; uint8_t opcode; } __attribute__((packed)); struct vhci_pkt { uint8_t type; union { struct { uint8_t opcode; uint16_t id; } __attribute__((packed)) vendor_pkt; struct hci_command_hdr command_hdr; }; } __attribute__((packed)); #define HCIDEVUP _IOW('H', 201, int) #define HCISETSCAN _IOW('H', 221, int) static int vhci_fd = -1; static void rfkill_unblock_all() { int fd = open("/dev/rfkill", O_WRONLY); if (fd < 0) exit(1); struct rfkill_event event = {0}; event.idx = 0; event.type = RFKILL_TYPE_ALL; event.op = RFKILL_OP_CHANGE_ALL; event.soft = 0; event.hard = 0; if (write(fd, &event, sizeof(event)) < 0) exit(1); close(fd); } static void hci_send_event_packet(int fd, uint8_t evt, void* data, size_t data_len) { struct iovec iv[3]; struct hci_event_hdr hdr; hdr.evt = evt; hdr.plen = data_len; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = data; iv[2].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static void hci_send_event_cmd_complete(int fd, uint16_t opcode, void* data, size_t data_len) { struct iovec iv[4]; struct hci_event_hdr hdr; hdr.evt = HCI_EV_CMD_COMPLETE; hdr.plen = sizeof(struct hci_ev_cmd_complete) + data_len; struct hci_ev_cmd_complete evt_hdr; evt_hdr.ncmd = 1; evt_hdr.opcode = opcode; uint8_t type = HCI_EVENT_PKT; iv[0].iov_base = &type; iv[0].iov_len = sizeof(type); iv[1].iov_base = &hdr; iv[1].iov_len = sizeof(hdr); iv[2].iov_base = &evt_hdr; iv[2].iov_len = sizeof(evt_hdr); iv[3].iov_base = data; iv[3].iov_len = data_len; if (writev(fd, iv, sizeof(iv) / sizeof(struct iovec)) < 0) exit(1); } static bool process_command_pkt(int fd, char* buf, ssize_t buf_size) { struct hci_command_hdr* hdr = (struct hci_command_hdr*)buf; if (buf_size < (ssize_t)sizeof(struct hci_command_hdr) || hdr->plen != buf_size - sizeof(struct hci_command_hdr)) exit(1); switch (hdr->opcode) { case HCI_OP_WRITE_SCAN_ENABLE: { uint8_t status = 0; hci_send_event_cmd_complete(fd, hdr->opcode, &status, sizeof(status)); return true; } case HCI_OP_READ_BD_ADDR: { struct hci_rp_read_bd_addr rp = {0}; rp.status = 0; memset(&rp.bdaddr, 0xaa, 6); hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } case HCI_OP_READ_BUFFER_SIZE: { struct hci_rp_read_buffer_size rp = {0}; rp.status = 0; rp.acl_mtu = 1021; rp.sco_mtu = 96; rp.acl_max_pkt = 4; rp.sco_max_pkt = 6; hci_send_event_cmd_complete(fd, hdr->opcode, &rp, sizeof(rp)); return false; } } char dummy[0xf9] = {0}; hci_send_event_cmd_complete(fd, hdr->opcode, dummy, sizeof(dummy)); return false; } static void* event_thread(void* arg) { while (1) { char buf[1024] = {0}; ssize_t buf_size = read(vhci_fd, buf, sizeof(buf)); if (buf_size < 0) exit(1); if (buf_size > 0 && buf[0] == HCI_COMMAND_PKT) { if (process_command_pkt(vhci_fd, buf + 1, buf_size - 1)) break; } } return NULL; } #define HCI_HANDLE_1 200 #define HCI_HANDLE_2 201 #define HCI_PRIMARY 0 #define HCI_OP_RESET 0x0c03 static void initialize_vhci() { int hci_sock = socket(AF_BLUETOOTH, SOCK_RAW, BTPROTO_HCI); if (hci_sock < 0) exit(1); vhci_fd = open("/dev/vhci", O_RDWR); if (vhci_fd == -1) exit(1); const int kVhciFd = 202; if (dup2(vhci_fd, kVhciFd) < 0) exit(1); close(vhci_fd); vhci_fd = kVhciFd; struct vhci_vendor_pkt_request vendor_pkt_req = {HCI_VENDOR_PKT, HCI_PRIMARY}; if (write(vhci_fd, &vendor_pkt_req, sizeof(vendor_pkt_req)) != sizeof(vendor_pkt_req)) exit(1); struct vhci_pkt vhci_pkt; if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); if (vhci_pkt.type == HCI_COMMAND_PKT && vhci_pkt.command_hdr.opcode == HCI_OP_RESET) { char response[1] = {0}; hci_send_event_cmd_complete(vhci_fd, HCI_OP_RESET, response, sizeof(response)); if (read(vhci_fd, &vhci_pkt, sizeof(vhci_pkt)) != sizeof(vhci_pkt)) exit(1); } if (vhci_pkt.type != HCI_VENDOR_PKT) exit(1); int dev_id = vhci_pkt.vendor_pkt.id; pthread_t th; if (pthread_create(&th, NULL, event_thread, NULL)) exit(1); int ret = ioctl(hci_sock, HCIDEVUP, dev_id); if (ret) { if (errno == ERFKILL) { rfkill_unblock_all(); ret = ioctl(hci_sock, HCIDEVUP, dev_id); } if (ret && errno != EALREADY) exit(1); } struct hci_dev_req dr = {0}; dr.dev_id = dev_id; dr.dev_opt = SCAN_PAGE; if (ioctl(hci_sock, HCISETSCAN, &dr)) exit(1); struct hci_ev_conn_request request; memset(&request, 0, sizeof(request)); memset(&request.bdaddr, 0xaa, 6); *(uint8_t*)&request.bdaddr.b[5] = 0x10; request.link_type = ACL_LINK; hci_send_event_packet(vhci_fd, HCI_EV_CONN_REQUEST, &request, sizeof(request)); struct hci_ev_conn_complete complete; memset(&complete, 0, sizeof(complete)); complete.status = 0; complete.handle = HCI_HANDLE_1; memset(&complete.bdaddr, 0xaa, 6); *(uint8_t*)&complete.bdaddr.b[5] = 0x10; complete.link_type = ACL_LINK; complete.encr_mode = 0; hci_send_event_packet(vhci_fd, HCI_EV_CONN_COMPLETE, &complete, sizeof(complete)); struct hci_ev_remote_features features; memset(&features, 0, sizeof(features)); features.status = 0; features.handle = HCI_HANDLE_1; hci_send_event_packet(vhci_fd, HCI_EV_REMOTE_FEATURES, &features, sizeof(features)); struct { struct hci_ev_le_meta le_meta; struct hci_ev_le_conn_complete le_conn; } le_conn; memset(&le_conn, 0, sizeof(le_conn)); le_conn.le_meta.subevent = HCI_EV_LE_CONN_COMPLETE; memset(&le_conn.le_conn.bdaddr, 0xaa, 6); *(uint8_t*)&le_conn.le_conn.bdaddr.b[5] = 0x11; le_conn.le_conn.role = 1; le_conn.le_conn.handle = HCI_HANDLE_2; hci_send_event_packet(vhci_fd, HCI_EV_LE_META, &le_conn, sizeof(le_conn)); pthread_join(th, NULL); close(hci_sock); } #define XT_TABLE_SIZE 1536 #define XT_MAX_ENTRIES 10 struct xt_counters { uint64_t pcnt, bcnt; }; struct ipt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_entries; unsigned int size; }; struct ipt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[5]; unsigned int underflow[5]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct ipt_table_desc { const char* name; struct ipt_getinfo info; struct ipt_replace replace; }; static struct ipt_table_desc ipv4_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; static struct ipt_table_desc ipv6_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, {.name = "raw"}, {.name = "security"}, }; #define IPT_BASE_CTL 64 #define IPT_SO_SET_REPLACE (IPT_BASE_CTL) #define IPT_SO_GET_INFO (IPT_BASE_CTL) #define IPT_SO_GET_ENTRIES (IPT_BASE_CTL + 1) struct arpt_getinfo { char name[32]; unsigned int valid_hooks; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_entries; unsigned int size; }; struct arpt_get_entries { char name[32]; unsigned int size; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_replace { char name[32]; unsigned int valid_hooks; unsigned int num_entries; unsigned int size; unsigned int hook_entry[3]; unsigned int underflow[3]; unsigned int num_counters; struct xt_counters* counters; uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)]; }; struct arpt_table_desc { const char* name; struct arpt_getinfo info; struct arpt_replace replace; }; static struct arpt_table_desc arpt_tables[] = { {.name = "filter"}, }; #define ARPT_BASE_CTL 96 #define ARPT_SO_SET_REPLACE (ARPT_BASE_CTL) #define ARPT_SO_GET_INFO (ARPT_BASE_CTL) #define ARPT_SO_GET_ENTRIES (ARPT_BASE_CTL + 1) static void checkpoint_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_iptables(struct ipt_table_desc* tables, int num_tables, int family, int level) { int fd = socket(family, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (int i = 0; i < num_tables; i++) { struct ipt_table_desc* table = &tables[i]; if (table->info.valid_hooks == 0) continue; struct ipt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, level, IPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct ipt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, level, IPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_arptables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; strcpy(table->info.name, table->name); strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &table->info, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->info.size > sizeof(table->replace.entrytable)) exit(1); if (table->info.num_entries > XT_MAX_ENTRIES) exit(1); struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); table->replace.valid_hooks = table->info.valid_hooks; table->replace.num_entries = table->info.num_entries; table->replace.size = table->info.size; memcpy(table->replace.hook_entry, table->info.hook_entry, sizeof(table->replace.hook_entry)); memcpy(table->replace.underflow, table->info.underflow, sizeof(table->replace.underflow)); memcpy(table->replace.entrytable, entries.entrytable, table->info.size); } close(fd); } static void reset_arptables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { struct arpt_table_desc* table = &arpt_tables[i]; if (table->info.valid_hooks == 0) continue; struct arpt_getinfo info; memset(&info, 0, sizeof(info)); strcpy(info.name, table->name); socklen_t optlen = sizeof(info); if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &info, &optlen)) exit(1); if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { struct arpt_get_entries entries; memset(&entries, 0, sizeof(entries)); strcpy(entries.name, table->name); entries.size = table->info.size; optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) exit(1); if (memcmp(table->replace.entrytable, entries.entrytable, table->info.size) == 0) continue; } else { } struct xt_counters counters[XT_MAX_ENTRIES]; table->replace.num_counters = info.num_entries; table->replace.counters = counters; optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + table->replace.size; if (setsockopt(fd, SOL_IP, ARPT_SO_SET_REPLACE, &table->replace, optlen)) exit(1); } close(fd); } #define NF_BR_NUMHOOKS 6 #define EBT_TABLE_MAXNAMELEN 32 #define EBT_CHAIN_MAXNAMELEN 32 #define EBT_BASE_CTL 128 #define EBT_SO_SET_ENTRIES (EBT_BASE_CTL) #define EBT_SO_GET_INFO (EBT_BASE_CTL) #define EBT_SO_GET_ENTRIES (EBT_SO_GET_INFO + 1) #define EBT_SO_GET_INIT_INFO (EBT_SO_GET_ENTRIES + 1) #define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO + 1) struct ebt_replace { char name[EBT_TABLE_MAXNAMELEN]; unsigned int valid_hooks; unsigned int nentries; unsigned int entries_size; struct ebt_entries* hook_entry[NF_BR_NUMHOOKS]; unsigned int num_counters; struct ebt_counter* counters; char* entries; }; struct ebt_entries { unsigned int distinguisher; char name[EBT_CHAIN_MAXNAMELEN]; unsigned int counter_offset; int policy; unsigned int nentries; char data[0] __attribute__((aligned(__alignof__(struct ebt_replace)))); }; struct ebt_table_desc { const char* name; struct ebt_replace replace; char entrytable[XT_TABLE_SIZE]; }; static struct ebt_table_desc ebt_tables[] = { {.name = "filter"}, {.name = "nat"}, {.name = "broute"}, }; static void checkpoint_ebtables(void) { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (size_t i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; strcpy(table->replace.name, table->name); socklen_t optlen = sizeof(table->replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_INFO, &table->replace, &optlen)) { switch (errno) { case EPERM: case ENOENT: case ENOPROTOOPT: continue; } exit(1); } if (table->replace.entries_size > sizeof(table->entrytable)) exit(1); table->replace.num_counters = 0; table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_ENTRIES, &table->replace, &optlen)) exit(1); } close(fd); } static void reset_ebtables() { int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (fd == -1) { switch (errno) { case EAFNOSUPPORT: case ENOPROTOOPT: case ENOENT: return; } exit(1); } for (unsigned i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { struct ebt_table_desc* table = &ebt_tables[i]; if (table->replace.valid_hooks == 0) continue; struct ebt_replace replace; memset(&replace, 0, sizeof(replace)); strcpy(replace.name, table->name); socklen_t optlen = sizeof(replace); if (getsockopt(fd, SOL_IP, EBT_SO_GET_INFO, &replace, &optlen)) exit(1); replace.num_counters = 0; table->replace.entries = 0; for (unsigned h = 0; h < NF_BR_NUMHOOKS; h++) table->replace.hook_entry[h] = 0; if (memcmp(&table->replace, &replace, sizeof(table->replace)) == 0) { char entrytable[XT_TABLE_SIZE]; memset(&entrytable, 0, sizeof(entrytable)); replace.entries = entrytable; optlen = sizeof(replace) + replace.entries_size; if (getsockopt(fd, SOL_IP, EBT_SO_GET_ENTRIES, &replace, &optlen)) exit(1); if (memcmp(table->entrytable, entrytable, replace.entries_size) == 0) continue; } for (unsigned j = 0, h = 0; h < NF_BR_NUMHOOKS; h++) { if (table->replace.valid_hooks & (1 << h)) { table->replace.hook_entry[h] = (struct ebt_entries*)table->entrytable + j; j++; } } table->replace.entries = table->entrytable; optlen = sizeof(table->replace) + table->replace.entries_size; if (setsockopt(fd, SOL_IP, EBT_SO_SET_ENTRIES, &table->replace, optlen)) exit(1); } close(fd); } static void checkpoint_net_namespace(void) { checkpoint_ebtables(); checkpoint_arptables(); checkpoint_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); checkpoint_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void reset_net_namespace(void) { reset_ebtables(); reset_arptables(); reset_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), AF_INET, SOL_IP); reset_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), AF_INET6, SOL_IPV6); } static void mount_cgroups(const char* dir, const char** controllers, int count) { if (mkdir(dir, 0777)) { return; } char enabled[128] = {0}; int i = 0; for (; i < count; i++) { if (mount("none", dir, "cgroup", 0, controllers[i])) { continue; } umount(dir); strcat(enabled, ","); strcat(enabled, controllers[i]); } if (enabled[0] == 0) { if (rmdir(dir) && errno != EBUSY) exit(1); return; } if (mount("none", dir, "cgroup", 0, enabled + 1)) { if (rmdir(dir) && errno != EBUSY) exit(1); } if (chmod(dir, 0777)) { } } static void mount_cgroups2(const char** controllers, int count) { if (mkdir("/syzcgroup/unified", 0777)) { return; } if (mount("none", "/syzcgroup/unified", "cgroup2", 0, NULL)) { if (rmdir("/syzcgroup/unified") && errno != EBUSY) exit(1); return; } if (chmod("/syzcgroup/unified", 0777)) { } int control = open("/syzcgroup/unified/cgroup.subtree_control", O_WRONLY); if (control == -1) return; int i; for (i = 0; i < count; i++) if (write(control, controllers[i], strlen(controllers[i])) < 0) { } close(control); } static void setup_cgroups() { const char* unified_controllers[] = {"+cpu", "+io", "+pids"}; const char* net_controllers[] = {"net", "net_prio", "devices", "blkio", "freezer"}; const char* cpu_controllers[] = {"cpuset", "cpuacct", "hugetlb", "rlimit", "memory"}; if (mkdir("/syzcgroup", 0777)) { return; } mount_cgroups2(unified_controllers, sizeof(unified_controllers) / sizeof(unified_controllers[0])); mount_cgroups("/syzcgroup/net", net_controllers, sizeof(net_controllers) / sizeof(net_controllers[0])); mount_cgroups("/syzcgroup/cpu", cpu_controllers, sizeof(cpu_controllers) / sizeof(cpu_controllers[0])); write_file("/syzcgroup/cpu/cgroup.clone_children", "1"); write_file("/syzcgroup/cpu/cpuset.memory_pressure_enabled", "1"); } static void setup_cgroups_loop() { int pid = getpid(); char file[128]; char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/pids.max", cgroupdir); write_file(file, "32"); snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); snprintf(file, sizeof(file), "%s/memory.soft_limit_in_bytes", cgroupdir); write_file(file, "%d", 299 << 20); snprintf(file, sizeof(file), "%s/memory.limit_in_bytes", cgroupdir); write_file(file, "%d", 300 << 20); snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (mkdir(cgroupdir, 0777)) { } snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); write_file(file, "%d", pid); } static void setup_cgroups_test() { char cgroupdir[64]; snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); if (symlink(cgroupdir, "./cgroup")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.cpu")) { } snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); if (symlink(cgroupdir, "./cgroup.net")) { } } static void initialize_cgroups() { if (mkdir("./syz-tmp/newroot/syzcgroup", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/unified", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/cpu", 0700)) exit(1); if (mkdir("./syz-tmp/newroot/syzcgroup/net", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/syzcgroup/unified", "./syz-tmp/newroot/syzcgroup/unified", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/cpu", "./syz-tmp/newroot/syzcgroup/cpu", NULL, bind_mount_flags, NULL)) { } if (mount("/syzcgroup/net", "./syz-tmp/newroot/syzcgroup/net", NULL, bind_mount_flags, NULL)) { } } static void setup_gadgetfs(); static void setup_binderfs(); static void setup_fusectl(); static void sandbox_common_mount_tmpfs(void) { write_file("/proc/sys/fs/mount-max", "100000"); if (mkdir("./syz-tmp", 0777)) exit(1); if (mount("", "./syz-tmp", "tmpfs", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot", 0777)) exit(1); if (mkdir("./syz-tmp/newroot/dev", 0700)) exit(1); unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; if (mount("/dev", "./syz-tmp/newroot/dev", NULL, bind_mount_flags, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/proc", 0700)) exit(1); if (mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL)) exit(1); if (mkdir("./syz-tmp/newroot/selinux", 0700)) exit(1); const char* selinux_path = "./syz-tmp/newroot/selinux"; if (mount("/selinux", selinux_path, NULL, bind_mount_flags, NULL)) { if (errno != ENOENT) exit(1); if (mount("/sys/fs/selinux", selinux_path, NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); } if (mkdir("./syz-tmp/newroot/sys", 0700)) exit(1); if (mount("/sys", "./syz-tmp/newroot/sys", 0, bind_mount_flags, NULL)) exit(1); if (mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, bind_mount_flags, NULL) && errno != ENOENT) exit(1); if (mkdir("./syz-tmp/newroot/syz-inputs", 0700)) exit(1); if (mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, bind_mount_flags | MS_RDONLY, NULL) && errno != ENOENT) exit(1); initialize_cgroups(); if (mkdir("./syz-tmp/pivot", 0777)) exit(1); if (syscall(SYS_pivot_root, "./syz-tmp", "./syz-tmp/pivot")) { if (chdir("./syz-tmp")) exit(1); } else { if (chdir("/")) exit(1); if (umount2("./pivot", MNT_DETACH)) exit(1); } if (chroot("./newroot")) exit(1); if (chdir("/")) exit(1); setup_gadgetfs(); setup_binderfs(); setup_fusectl(); } static void setup_gadgetfs() { if (mkdir("/dev/gadgetfs", 0777)) { } if (mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL)) { } } static void setup_fusectl() { if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) { } } static void setup_binderfs() { if (mkdir("/dev/binderfs", 0777)) { } if (mount("binder", "/dev/binderfs", "binder", 0, NULL)) { } } static void loop(); static void sandbox_common() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); if (getppid() == 1) exit(1); struct rlimit rlim; rlim.rlim_cur = rlim.rlim_max = (200 << 20); setrlimit(RLIMIT_AS, &rlim); rlim.rlim_cur = rlim.rlim_max = 32 << 20; setrlimit(RLIMIT_MEMLOCK, &rlim); rlim.rlim_cur = rlim.rlim_max = 136 << 20; setrlimit(RLIMIT_FSIZE, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_STACK, &rlim); rlim.rlim_cur = rlim.rlim_max = 128 << 20; setrlimit(RLIMIT_CORE, &rlim); rlim.rlim_cur = rlim.rlim_max = 256; setrlimit(RLIMIT_NOFILE, &rlim); if (unshare(CLONE_NEWNS)) { } if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, NULL)) { } if (unshare(CLONE_NEWIPC)) { } if (unshare(0x02000000)) { } if (unshare(CLONE_NEWUTS)) { } if (unshare(CLONE_SYSVSEM)) { } typedef struct { const char* name; const char* value; } sysctl_t; static const sysctl_t sysctls[] = { {"/proc/sys/kernel/shmmax", "16777216"}, {"/proc/sys/kernel/shmall", "536870912"}, {"/proc/sys/kernel/shmmni", "1024"}, {"/proc/sys/kernel/msgmax", "8192"}, {"/proc/sys/kernel/msgmni", "1024"}, {"/proc/sys/kernel/msgmnb", "1024"}, {"/proc/sys/kernel/sem", "1024 1048576 500 1024"}, }; unsigned i; for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++) write_file(sysctls[i].name, sysctls[i].value); } static int wait_for_loop(int pid) { if (pid < 0) exit(1); int status = 0; while (waitpid(-1, &status, __WALL) != pid) { } return WEXITSTATUS(status); } static void drop_caps(void) { struct __user_cap_header_struct cap_hdr = {}; struct __user_cap_data_struct cap_data[2] = {}; cap_hdr.version = _LINUX_CAPABILITY_VERSION_3; cap_hdr.pid = getpid(); if (syscall(SYS_capget, &cap_hdr, &cap_data)) exit(1); const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE); cap_data[0].effective &= ~drop; cap_data[0].permitted &= ~drop; cap_data[0].inheritable &= ~drop; if (syscall(SYS_capset, &cap_hdr, &cap_data)) exit(1); } static int do_sandbox_none(void) { if (unshare(CLONE_NEWPID)) { } int pid = fork(); if (pid != 0) return wait_for_loop(pid); initialize_vhci(); sandbox_common(); drop_caps(); initialize_netdevices_init(); if (unshare(CLONE_NEWNET)) { } write_file("/proc/sys/net/ipv4/ping_group_range", "0 65535"); initialize_tun(); initialize_netdevices(); initialize_wifi_devices(); sandbox_common_mount_tmpfs(); loop(); exit(1); } #define FS_IOC_SETFLAGS _IOW('f', 2, long) static void remove_dir(const char* dir) { int iter = 0; DIR* dp = 0; const int umount_flags = MNT_FORCE | UMOUNT_NOFOLLOW; retry: while (umount2(dir, umount_flags) == 0) { } dp = opendir(dir); if (dp == NULL) { if (errno == EMFILE) { exit(1); } exit(1); } struct dirent* ep = 0; while ((ep = readdir(dp))) { if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) continue; char filename[FILENAME_MAX]; snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); while (umount2(filename, umount_flags) == 0) { } struct stat st; if (lstat(filename, &st)) exit(1); if (S_ISDIR(st.st_mode)) { remove_dir(filename); continue; } int i; for (i = 0;; i++) { if (unlink(filename) == 0) break; if (errno == EPERM) { int fd = open(filename, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno != EBUSY || i > 100) exit(1); if (umount2(filename, umount_flags)) exit(1); } } closedir(dp); for (int i = 0;; i++) { if (rmdir(dir) == 0) break; if (i < 100) { if (errno == EPERM) { int fd = open(dir, O_RDONLY); if (fd != -1) { long flags = 0; if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) { } close(fd); continue; } } if (errno == EROFS) { break; } if (errno == EBUSY) { if (umount2(dir, umount_flags)) exit(1); continue; } if (errno == ENOTEMPTY) { if (iter < 100) { iter++; goto retry; } } } exit(1); } } static void kill_and_wait(int pid, int* status) { kill(-pid, SIGKILL); kill(pid, SIGKILL); for (int i = 0; i < 100; i++) { if (waitpid(-1, status, WNOHANG | __WALL) == pid) return; usleep(1000); } DIR* dir = opendir("/sys/fs/fuse/connections"); if (dir) { for (;;) { struct dirent* ent = readdir(dir); if (!ent) break; if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) continue; char abort[300]; snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", ent->d_name); int fd = open(abort, O_WRONLY); if (fd == -1) { continue; } if (write(fd, abort, 1) < 0) { } close(fd); } closedir(dir); } else { } while (waitpid(-1, status, __WALL) != pid) { } } static void setup_loop() { setup_cgroups_loop(); checkpoint_net_namespace(); } static void reset_loop() { reset_net_namespace(); } static void setup_test() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); setpgrp(); setup_cgroups_test(); write_file("/proc/self/oom_score_adj", "1000"); flush_tun(); if (symlink("/dev/binderfs", "./binderfs")) { } } static void close_fds() { for (int fd = 3; fd < MAX_FDS; fd++) close(fd); } static const char* setup_binfmt_misc() { if (mount(0, "/proc/sys/fs/binfmt_misc", "binfmt_misc", 0, 0) && errno != EBUSY) { return NULL; } if (!write_file("/proc/sys/fs/binfmt_misc/register", ":syz0:M:0:\x01::./file0:") || !write_file("/proc/sys/fs/binfmt_misc/register", ":syz1:M:1:\x02::./file0:POC")) return "write(/proc/sys/fs/binfmt_misc/register) failed"; return NULL; } static const char* setup_usb() { if (chmod("/dev/raw-gadget", 0666)) return "failed to chmod /dev/raw-gadget"; return NULL; } static void setup_sysctl() { int cad_pid = fork(); if (cad_pid < 0) exit(1); if (cad_pid == 0) { for (;;) sleep(100); } char tmppid[32]; snprintf(tmppid, sizeof(tmppid), "%d", cad_pid); struct { const char* name; const char* data; } files[] = { {"/sys/kernel/debug/x86/nmi_longest_ns", "10000000000"}, {"/proc/sys/kernel/hung_task_check_interval_secs", "20"}, {"/proc/sys/net/core/bpf_jit_kallsyms", "1"}, {"/proc/sys/net/core/bpf_jit_harden", "0"}, {"/proc/sys/kernel/kptr_restrict", "0"}, {"/proc/sys/kernel/softlockup_all_cpu_backtrace", "1"}, {"/proc/sys/fs/mount-max", "100"}, {"/proc/sys/vm/oom_dump_tasks", "0"}, {"/proc/sys/debug/exception-trace", "0"}, {"/proc/sys/kernel/printk", "7 4 1 3"}, {"/proc/sys/kernel/keys/gc_delay", "1"}, {"/proc/sys/vm/oom_kill_allocating_task", "1"}, {"/proc/sys/kernel/ctrl-alt-del", "0"}, {"/proc/sys/kernel/cad_pid", tmppid}, }; for (size_t i = 0; i < sizeof(files) / sizeof(files[0]); i++) { if (!write_file(files[i].name, files[i].data)) { } } kill(cad_pid, SIGKILL); while (waitpid(cad_pid, NULL, 0) != cad_pid) ; } #define NL802154_CMD_SET_SHORT_ADDR 11 #define NL802154_ATTR_IFINDEX 3 #define NL802154_ATTR_SHORT_ADDR 10 static const char* setup_802154() { const char* error = NULL; int sock_generic = -1; int sock_route = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); if (sock_route == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) failed"; goto fail; } sock_generic = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC); if (sock_generic == -1) { error = "socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) failed"; goto fail; } { int nl802154_family_id = netlink_query_family_id(&nlmsg, sock_generic, "nl802154", true); if (nl802154_family_id < 0) { error = "netlink_query_family_id failed"; goto fail; } for (int i = 0; i < 2; i++) { char devname[] = "wpan0"; devname[strlen(devname) - 1] += i; uint64_t hwaddr = 0xaaaaaaaaaaaa0002 + (i << 8); uint16_t shortaddr = 0xaaa0 + i; int ifindex = if_nametoindex(devname); struct genlmsghdr genlhdr; memset(&genlhdr, 0, sizeof(genlhdr)); genlhdr.cmd = NL802154_CMD_SET_SHORT_ADDR; netlink_init(&nlmsg, nl802154_family_id, 0, &genlhdr, sizeof(genlhdr)); netlink_attr(&nlmsg, NL802154_ATTR_IFINDEX, &ifindex, sizeof(ifindex)); netlink_attr(&nlmsg, NL802154_ATTR_SHORT_ADDR, &shortaddr, sizeof(shortaddr)); if (netlink_send(&nlmsg, sock_generic) < 0) { error = "NL802154_CMD_SET_SHORT_ADDR failed"; goto fail; } netlink_device_change(&nlmsg, sock_route, devname, true, 0, &hwaddr, sizeof(hwaddr), 0); if (i == 0) { netlink_add_device_impl(&nlmsg, "lowpan", "lowpan0", false); netlink_done(&nlmsg); netlink_attr(&nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex)); if (netlink_send(&nlmsg, sock_route) < 0) { error = "netlink: adding device lowpan0 type lowpan link wpan0"; goto fail; } } } } fail: close(sock_route); close(sock_generic); return error; } #define SWAP_FILE "./swap-file" #define SWAP_FILE_SIZE (128 * 1000 * 1000) static const char* setup_swap() { swapoff(SWAP_FILE); unlink(SWAP_FILE); int fd = open(SWAP_FILE, O_CREAT | O_WRONLY | O_CLOEXEC, 0600); if (fd == -1) return "swap file open failed"; fallocate(fd, FALLOC_FL_ZERO_RANGE, 0, SWAP_FILE_SIZE); close(fd); char cmdline[64]; sprintf(cmdline, "mkswap %s", SWAP_FILE); if (runcmdline(cmdline)) return "mkswap failed"; if (swapon(SWAP_FILE, SWAP_FLAG_PREFER) == 1) return "swapon failed"; return NULL; } struct thread_t { int created, call; event_t ready, done; }; static struct thread_t threads[16]; static void execute_call(int call); static int running; static void* thr(void* arg) { struct thread_t* th = (struct thread_t*)arg; for (;;) { event_wait(&th->ready); event_reset(&th->ready); execute_call(th->call); __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); event_set(&th->done); } return 0; } static void execute_one(void) { if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } int i, call, thread; for (call = 0; call < 1; call++) { for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); thread++) { struct thread_t* th = &threads[thread]; if (!th->created) { th->created = 1; event_init(&th->ready); event_init(&th->done); event_set(&th->done); thread_start(thr, th); } if (!event_isset(&th->done)) continue; event_reset(&th->done); th->call = call; __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); event_set(&th->ready); event_timedwait(&th->done, 50); break; } } for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) sleep_ms(1); close_fds(); } static void execute_one(void); #define WAIT_FLAGS __WALL static void loop(void) { setup_loop(); int iter = 0; for (;; iter++) { char cwdbuf[32]; sprintf(cwdbuf, "./%d", iter); if (mkdir(cwdbuf, 0777)) exit(1); reset_loop(); int pid = fork(); if (pid < 0) exit(1); if (pid == 0) { if (chdir(cwdbuf)) exit(1); setup_test(); execute_one(); exit(0); } int status = 0; uint64_t start = current_time_ms(); for (;;) { sleep_ms(10); if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) break; if (current_time_ms() - start < 5000) continue; kill_and_wait(pid, &status); break; } remove_dir(cwdbuf); } } void execute_call(int call) { switch (call) { case 0: // socket$kcm arguments: [ // domain: const = 0x2c (8 bytes) // type: kcm_socket_type = 0x3 (8 bytes) // proto: const = 0x0 (4 bytes) // ] // returns sock_kcm syscall(__NR_socket, /*domain=*/0x2cul, /*type=SOCK_DGRAM|0x1*/3ul, /*proto=*/0); break; } } int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); setup_sysctl(); setup_cgroups(); const char* reason; (void)reason; if ((reason = setup_binfmt_misc())) printf("the reproducer may not work as expected: binfmt_misc setup failed: %s\n", reason); if ((reason = setup_usb())) printf("the reproducer may not work as expected: USB injection setup failed: %s\n", reason); if ((reason = setup_802154())) printf("the reproducer may not work as expected: 802154 injection setup failed: %s\n", reason); if ((reason = setup_swap())) printf("the reproducer may not work as expected: swap setup failed: %s\n", reason); install_segv_handler(); for (procid = 0; procid < 3; procid++) { if (fork() == 0) { use_temporary_dir(); do_sandbox_none(); } } sleep(1000000); return 0; } compiler invocation: gcc [-o /tmp/syz-executor86937819 -DGOOS_linux=1 -DGOARCH_amd64=1 -DHOSTGOOS_linux=1 -x c - -m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -fpermissive -w] 2025/08/06 20:08:31 start reproducing 'WARNING in xsk_create (full)' 2025/08/06 20:08:31 "WARNING in xsk_create": saved crash log into 1754510911.crash.log 2025/08/06 20:08:51 runner 6 connected 2025/08/06 20:09:08 runner 8 connected 2025/08/06 20:09:13 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 20:09:27 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:09:38 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:09:49 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:10:00 attempt #0 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 20:10:02 runner 5 connected 2025/08/06 20:10:28 runner 6 connected 2025/08/06 20:10:40 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:10:45 runner 7 connected 2025/08/06 20:10:47 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:11:29 runner 4 connected 2025/08/06 20:11:42 base crash: lost connection to test machine 2025/08/06 20:11:50 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:11:54 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:11:55 attempt #1 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 20:12:06 reproducing crash 'no output/lost connection': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:12:39 runner 5 connected 2025/08/06 20:12:39 runner 3 connected 2025/08/06 20:12:45 STAT { "buffer too small": 0, "candidate triage jobs": 0, "candidates": 0, "comps overflows": 18, "corpus": 9597, "corpus [files]": 479, "corpus [symbols]": 477, "cover overflows": 12645, "coverage": 71064, "distributor delayed": 20989, "distributor undelayed": 20988, "distributor violated": 943, "exec candidate": 22555, "exec collide": 40569, "exec fuzz": 76620, "exec gen": 4010, "exec hints": 9035, "exec inject": 0, "exec minimize": 2384, "exec retries": 202, "exec seeds": 189, "exec smash": 1696, "exec total [base]": 224301, "exec total [new]": 228084, "exec triage": 31906, "executor restarts": 1367, "fault jobs": 0, "fuzzer jobs": 1, "fuzzing VMs [base]": 2, "fuzzing VMs [new]": 3, "hints jobs": 0, "max signal": 74634, "minimize: array": 0, "minimize: buffer": 0, "minimize: call": 1304, "minimize: filename": 0, "minimize: integer": 0, "minimize: pointer": 0, "minimize: props": 0, "minimize: resource": 0, "modules [base]": 1, "modules [new]": 1, "new inputs": 10295, "no exec duration": 15781221000000, "no exec requests": 48753, "pending": 234, "prog exec time": 329, "reproducing": 3, "rpc recv": 13425757680, "rpc sent": 1574122256, "signal": 70125, "smash jobs": 0, "triage jobs": 1, "vm output": 26394403, "vm restarts [base]": 40, "vm restarts [new]": 361 } 2025/08/06 20:13:25 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:13:48 attempt #2 to run "WARNING in xsk_create" on base: did not crash 2025/08/06 20:13:48 patched-only: WARNING in xsk_create 2025/08/06 20:13:48 scheduled a reproduction of 'WARNING in xsk_create (full)' 2025/08/06 20:14:13 base crash: lost connection to test machine 2025/08/06 20:14:18 patched crashed: lost connection to test machine [need repro = false] 2025/08/06 20:14:37 new: boot error: can't ssh into the instance 2025/08/06 20:14:45 runner 0 connected 2025/08/06 20:14:55 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:15:06 runner 6 connected 2025/08/06 20:15:09 runner 2 connected 2025/08/06 20:15:24 new: boot error: can't ssh into the instance 2025/08/06 20:15:25 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:15:36 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:16:12 patched crashed: WARNING in xsk_create [need repro = false] 2025/08/06 20:16:22 runner 5 connected 2025/08/06 20:16:33 runner 6 connected 2025/08/06 20:16:34 base crash: lost connection to test machine 2025/08/06 20:16:48 reproducing crash 'WARNING in corrupted': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:16:52 new: boot error: can't ssh into the instance 2025/08/06 20:17:31 runner 3 connected 2025/08/06 20:17:42 bug reporting terminated 2025/08/06 20:17:42 status reporting terminated 2025/08/06 20:17:42 repro finished 'WARNING in xsk_create (full)', repro=false crepro=false desc='' hub=false from_dashboard=false 2025/08/06 20:17:42 repro finished 'WARNING in corrupted', repro=false crepro=false desc='' hub=false from_dashboard=false 2025/08/06 20:17:42 syz-diff (base): kernel context loop terminated 2025/08/06 20:18:04 reproducing crash 'WARNING in xsk_create': failed to symbolize report: failed to start scripts/get_maintainer.pl [scripts/get_maintainer.pl --git-min-percent=15 -f net/xdp/xsk.c]: fork/exec scripts/get_maintainer.pl: no such file or directory 2025/08/06 20:18:04 repro finished 'WARNING in xsk_create', repro=false crepro=false desc='' hub=false from_dashboard=false 2025/08/06 20:26:17 syz-diff (new): kernel context loop terminated 2025/08/06 20:26:17 diff fuzzing terminated 2025/08/06 20:26:17 fuzzing is finished 2025/08/06 20:26:17 status at the end: Title On-Base On-Patched WARNING in xsk_create 300 crashes[reproduced] INFO: rcu detected stall in corrupted 1 crashes INFO: rcu detected stall in perf_event_open 1 crashes 2 crashes INFO: rcu detected stall in smp_call_function 1 crashes INFO: rcu detected stall in sock_alloc_file 1 crashes WARNING in __perf_event_overflow 1 crashes 1 crashes[reproduced] WARNING in corrupted 7 crashes lost connection to test machine 30 crashes 42 crashes no output from test machine 1 crashes