blob: 306b4e418d015ee44d481139a518ec8c8f2b6384 [file] [log] [blame]
// Copyright 2018 syzkaller project authors. All rights reserved.
// Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file.
// Package gvisor provides support for gVisor, user-space kernel, testing.
// See https://github.com/google/gvisor
package gvisor
import (
"bytes"
"fmt"
"io"
"net"
"os"
"os/exec"
"path/filepath"
"strings"
"syscall"
"time"
"github.com/google/syzkaller/pkg/config"
"github.com/google/syzkaller/pkg/log"
"github.com/google/syzkaller/pkg/osutil"
"github.com/google/syzkaller/vm/vmimpl"
)
func init() {
vmimpl.Register("gvisor", ctor, true)
}
type Config struct {
Count int `json:"count"` // number of VMs to use
RunscArgs string `json:"runsc_args"`
}
type Pool struct {
env *vmimpl.Env
cfg *Config
}
type instance struct {
cfg *Config
image string
debug bool
rootDir string
imageDir string
name string
port int
cmd *exec.Cmd
merger *vmimpl.OutputMerger
}
func ctor(env *vmimpl.Env) (vmimpl.Pool, error) {
cfg := &Config{
Count: 1,
}
if err := config.LoadData(env.Config, cfg); err != nil {
return nil, fmt.Errorf("failed to parse vm config: %v", err)
}
if cfg.Count < 1 || cfg.Count > 128 {
return nil, fmt.Errorf("invalid config param count: %v, want [1, 128]", cfg.Count)
}
if env.Debug && cfg.Count > 1 {
log.Logf(0, "limiting number of VMs from %v to 1 in debug mode", cfg.Count)
cfg.Count = 1
}
if !osutil.IsExist(env.Image) {
return nil, fmt.Errorf("image file %q does not exist", env.Image)
}
pool := &Pool{
cfg: cfg,
env: env,
}
return pool, nil
}
func (pool *Pool) Count() int {
return pool.cfg.Count
}
func (pool *Pool) Create(workdir string, index int) (vmimpl.Instance, error) {
rootDir := filepath.Clean(filepath.Join(workdir, "..", "gvisor_root"))
imageDir := filepath.Join(workdir, "image")
bundleDir := filepath.Join(workdir, "bundle")
osutil.MkdirAll(rootDir)
osutil.MkdirAll(bundleDir)
osutil.MkdirAll(imageDir)
caps := ""
for _, c := range sandboxCaps {
if caps != "" {
caps += ", "
}
caps += "\"" + c + "\""
}
vmConfig := fmt.Sprintf(configTempl, imageDir, caps)
if err := osutil.WriteFile(filepath.Join(bundleDir, "config.json"), []byte(vmConfig)); err != nil {
return nil, err
}
bin, err := exec.LookPath(os.Args[0])
if err != nil {
return nil, fmt.Errorf("failed to lookup %v: %v", os.Args[0], err)
}
if err := osutil.CopyFile(bin, filepath.Join(imageDir, "init")); err != nil {
return nil, err
}
rpipe, wpipe, err := osutil.LongPipe()
if err != nil {
return nil, err
}
var tee io.Writer
if pool.env.Debug {
tee = os.Stdout
}
merger := vmimpl.NewOutputMerger(tee)
merger.Add("gvisor", rpipe)
inst := &instance{
cfg: pool.cfg,
image: pool.env.Image,
debug: pool.env.Debug,
rootDir: rootDir,
imageDir: imageDir,
name: fmt.Sprintf("%v-%v", pool.env.Name, index),
merger: merger,
}
// Kill the previous instance in case it's still running.
osutil.Run(time.Minute, inst.runscCmd("delete", "-force", inst.name))
time.Sleep(3 * time.Second)
cmd := inst.runscCmd("run", "-bundle", bundleDir, inst.name)
cmd.Stdout = wpipe
cmd.Stderr = wpipe
if err := cmd.Start(); err != nil {
wpipe.Close()
merger.Wait()
return nil, err
}
inst.cmd = cmd
wpipe.Close()
if err := inst.waitBoot(); err != nil {
inst.Close()
return nil, err
}
return inst, nil
}
func (inst *instance) waitBoot() error {
errorMsg := []byte("FATAL ERROR:")
bootedMsg := []byte(initStartMsg)
timeout := time.NewTimer(time.Minute)
defer timeout.Stop()
var output []byte
for {
select {
case out := <-inst.merger.Output:
output = append(output, out...)
if pos := bytes.Index(output, errorMsg); pos != -1 {
end := bytes.IndexByte(output[pos:], '\n')
if end == -1 {
end = len(output)
} else {
end += pos
}
return vmimpl.BootError{
Title: string(output[pos:end]),
Output: output,
}
}
if bytes.Contains(output, bootedMsg) {
return nil
}
case err := <-inst.merger.Err:
return vmimpl.BootError{
Title: fmt.Sprintf("runsc failed: %v", err),
Output: output,
}
case <-timeout.C:
return vmimpl.BootError{
Title: "init process did not start",
Output: output,
}
}
}
}
func (inst *instance) runscCmd(add ...string) *exec.Cmd {
args := []string{
"-root", inst.rootDir,
"-watchdog-action=panic",
"-network=none",
"-debug",
}
if inst.cfg.RunscArgs != "" {
args = append(args, strings.Split(inst.cfg.RunscArgs, " ")...)
}
args = append(args, add...)
cmd := osutil.Command(inst.image, args...)
cmd.Env = []string{
"GOTRACEBACK=all",
"GORACE=halt_on_error=1",
}
return cmd
}
func (inst *instance) Close() {
time.Sleep(3 * time.Second)
osutil.Run(time.Minute, inst.runscCmd("delete", "-force", inst.name))
inst.cmd.Process.Kill()
inst.merger.Wait()
inst.cmd.Wait()
osutil.Run(time.Minute, inst.runscCmd("delete", "-force", inst.name))
time.Sleep(3 * time.Second)
}
func (inst *instance) Forward(port int) (string, error) {
if inst.port != 0 {
return "", fmt.Errorf("forward port is already setup")
}
inst.port = port
return "stdin", nil
}
func (inst *instance) Copy(hostSrc string) (string, error) {
fname := filepath.Base(hostSrc)
if err := osutil.CopyFile(hostSrc, filepath.Join(inst.imageDir, fname)); err != nil {
return "", err
}
if err := os.Chmod(inst.imageDir, 0777); err != nil {
return "", err
}
return filepath.Join("/", fname), nil
}
func (inst *instance) Run(timeout time.Duration, stop <-chan bool, command string) (
<-chan []byte, <-chan error, error) {
args := []string{"exec", "-user=0:0"}
for _, c := range sandboxCaps {
args = append(args, "-cap", c)
}
args = append(args, inst.name)
args = append(args, strings.Split(command, " ")...)
cmd := inst.runscCmd(args...)
rpipe, wpipe, err := osutil.LongPipe()
if err != nil {
return nil, nil, err
}
defer wpipe.Close()
inst.merger.Add("cmd", rpipe)
cmd.Stdout = wpipe
cmd.Stderr = wpipe
guestSock, err := inst.guestProxy()
if err != nil {
return nil, nil, err
}
if guestSock != nil {
defer guestSock.Close()
cmd.Stdin = guestSock
}
if err := cmd.Start(); err != nil {
return nil, nil, err
}
errc := make(chan error, 1)
signal := func(err error) {
select {
case errc <- err:
default:
}
}
go func() {
select {
case <-time.After(timeout):
signal(vmimpl.ErrTimeout)
case <-stop:
signal(vmimpl.ErrTimeout)
case err := <-inst.merger.Err:
cmd.Process.Kill()
if cmdErr := cmd.Wait(); cmdErr == nil {
// If the command exited successfully, we got EOF error from merger.
// But in this case no error has happened and the EOF is expected.
err = nil
}
signal(err)
return
}
cmd.Process.Kill()
cmd.Wait()
}()
return inst.merger.Output, errc, nil
}
func (inst *instance) guestProxy() (*os.File, error) {
if inst.port == 0 {
return nil, nil
}
// One does not simply let gvisor guest connect to host tcp port.
// We create a unix socket, pass it to guest in stdin.
// Guest will use it instead of dialing manager directly.
// On host we connect to manager tcp port and proxy between the tcp and unix connections.
socks, err := syscall.Socketpair(syscall.AF_UNIX, syscall.SOCK_STREAM, 0)
if err != nil {
return nil, err
}
hostSock := os.NewFile(uintptr(socks[0]), "host unix proxy")
guestSock := os.NewFile(uintptr(socks[1]), "guest unix proxy")
conn, err := net.Dial("tcp", fmt.Sprintf("localhost:%v", inst.port))
if err != nil {
hostSock.Close()
guestSock.Close()
return nil, err
}
go func() {
io.Copy(hostSock, conn)
hostSock.Close()
}()
go func() {
io.Copy(conn, hostSock)
conn.Close()
}()
return guestSock, nil
}
func (inst *instance) Diagnose() ([]byte, bool) {
b, err := osutil.Run(time.Minute, inst.runscCmd("debug", "-stacks", inst.name))
if err != nil {
b = append(b, []byte(fmt.Sprintf("\n\nError collecting stacks: %v", err))...)
}
return b, false
}
func init() {
if os.Getenv("SYZ_GVISOR_PROXY") != "" {
fmt.Fprint(os.Stderr, initStartMsg)
select {}
}
}
const initStartMsg = "SYZKALLER INIT STARTED\n"
const configTempl = `
{
"root": {
"path": "%[1]v",
"readonly": true
},
"process":{
"args": ["/init"],
"cwd": "/tmp",
"env": ["SYZ_GVISOR_PROXY=1"],
"capabilities": {
"bounding": [%[2]v],
"effective": [%[2]v],
"inheritable": [%[2]v],
"permitted": [%[2]v],
"ambient": [%[2]v]
}
}
}
`
var sandboxCaps = []string{
"CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID",
"CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE",
"CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW",
"CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT",
"CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE",
"CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE",
"CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN",
"CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ",
}