aboutsummaryrefslogtreecommitdiffstats
path: root/prog
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2020-01-05 11:46:35 +0100
committerDmitry Vyukov <dvyukov@google.com>2020-01-05 11:46:35 +0100
commit026aaeb2b5393e0c838873306e1c5f2084a8a1aa (patch)
tree348d47a986a845325a08fe21ab833f0ea81ec31e /prog
parent90408076e697f47d8da739b9ee6ea1da33c74bbd (diff)
prog: don't mutate strings with enumerated values
Strings with enumerated values are frequently file names or have complete enumeration of relevant values. Mutating complete enumeration if not very profitable. Mutating file names leads to escaping paths and fuzzer messing with things it is not supposed to mess with as in: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0)
Diffstat (limited to 'prog')
-rw-r--r--prog/encoding.go20
-rw-r--r--prog/encoding_test.go69
-rw-r--r--prog/hints.go10
-rw-r--r--prog/mutation.go12
4 files changed, 77 insertions, 34 deletions
diff --git a/prog/encoding.go b/prog/encoding.go
index 943dfe350..f288dbc93 100644
--- a/prog/encoding.go
+++ b/prog/encoding.go
@@ -506,10 +506,11 @@ func (p *parser) parseArgAddr(typ Type) (Arg, error) {
return arg, nil
}
-func (p *parser) parseArgString(typ Type) (Arg, error) {
- if _, ok := typ.(*BufferType); !ok {
+func (p *parser) parseArgString(t Type) (Arg, error) {
+ typ, ok := t.(*BufferType)
+ if !ok {
p.eatExcessive(true, "wrong string arg")
- return typ.DefaultArg(), nil
+ return t.DefaultArg(), nil
}
data, err := p.deserializeData()
if err != nil {
@@ -541,6 +542,19 @@ func (p *parser) parseArgString(typ Type) (Arg, error) {
data = append(data, make([]byte, diff)...)
}
data = data[:size]
+ if typ.Kind == BufferString && len(typ.Values) != 0 {
+ matched := false
+ for _, val := range typ.Values {
+ if string(data) == val {
+ matched = true
+ break
+ }
+ }
+ if !matched {
+ p.strictFailf("bad string value %q, expect %q", data, typ.Values)
+ data = []byte(typ.Values[0])
+ }
+ }
return MakeDataArg(typ, data), nil
}
diff --git a/prog/encoding_test.go b/prog/encoding_test.go
index ba7fe3329..b6e331cf0 100644
--- a/prog/encoding_test.go
+++ b/prog/encoding_test.go
@@ -8,7 +8,6 @@ import (
"fmt"
"math/rand"
"reflect"
- "regexp"
"sort"
"strings"
"testing"
@@ -132,8 +131,8 @@ func TestDeserialize(t *testing.T) {
tests := []struct {
input string
output string
- err *regexp.Regexp
- strictErr *regexp.Regexp
+ err string
+ strictErr string
}{
{
input: `test$struct(&(0x7f0000000000)={0x0, {0x0}})`,
@@ -141,7 +140,7 @@ func TestDeserialize(t *testing.T) {
{
input: `test$struct(&(0x7f0000000000)=0x0)`,
output: `test$struct(&(0x7f0000000000))`,
- strictErr: regexp.MustCompile("wrong int arg"),
+ strictErr: "wrong int arg",
},
{
input: `test$regression1(&(0x7f0000000000)=[{"000000"}, {"0000000000"}])`,
@@ -151,23 +150,23 @@ func TestDeserialize(t *testing.T) {
},
{
input: `test$excessive_args1(0x0, 0x1, {0x1, &(0x7f0000000000)=[0x1, 0x2]})`,
- strictErr: regexp.MustCompile("excessive syscall arguments"),
+ strictErr: "excessive syscall arguments",
},
{
input: `test$excessive_args2(0x0, 0x1, {0x1, &(0x7f0000000000)={0x1, 0x2}})`,
- strictErr: regexp.MustCompile("excessive syscall arguments"),
+ strictErr: "excessive syscall arguments",
},
{
input: `test$excessive_args2(0x0, 0x1, {0x1, &(0x7f0000000000)=nil})`,
- strictErr: regexp.MustCompile("excessive syscall arguments"),
+ strictErr: "excessive syscall arguments",
},
{
input: `test$excessive_args2(0x0, &(0x7f0000000000), 0x0)`,
- strictErr: regexp.MustCompile("excessive syscall arguments"),
+ strictErr: "excessive syscall arguments",
},
{
input: `test$excessive_fields1(&(0x7f0000000000)={0x1, &(0x7f0000000000)=[{0x0}, 0x2]}, {0x1, 0x2, [0x1, 0x2]})`,
- strictErr: regexp.MustCompile("excessive struct excessive_fields fields"),
+ strictErr: "excessive struct excessive_fields fields",
},
{
input: `test$excessive_fields1(0x0)`,
@@ -176,37 +175,37 @@ func TestDeserialize(t *testing.T) {
{
input: `test$excessive_fields1(r0)`,
output: `test$excessive_fields1(&(0x7f0000000000))`,
- strictErr: regexp.MustCompile("undeclared variable r0"),
+ strictErr: "undeclared variable r0",
},
{
input: `test$excessive_args2(r1)`,
output: `test$excessive_args2(0x0)`,
- strictErr: regexp.MustCompile("undeclared variable r1"),
+ strictErr: "undeclared variable r1",
},
{
input: `test$excessive_args2({0x0, 0x1})`,
output: `test$excessive_args2(0x0)`,
- strictErr: regexp.MustCompile("wrong struct arg"),
+ strictErr: "wrong struct arg",
},
{
input: `test$excessive_args2([0x0], 0x0)`,
output: `test$excessive_args2(0x0)`,
- strictErr: regexp.MustCompile("wrong array arg"),
+ strictErr: "wrong array arg",
},
{
input: `test$excessive_args2(@foo)`,
output: `test$excessive_args2(0x0)`,
- strictErr: regexp.MustCompile("wrong union arg"),
+ strictErr: "wrong union arg",
},
{
input: `test$excessive_args2('foo')`,
output: `test$excessive_args2(0x0)`,
- strictErr: regexp.MustCompile("wrong string arg"),
+ strictErr: "wrong string arg",
},
{
input: `test$excessive_args2(&(0x7f0000000000)={0x0, 0x1})`,
output: `test$excessive_args2(0x0)`,
- strictErr: regexp.MustCompile("wrong addr arg"),
+ strictErr: "wrong addr arg",
},
{
input: `test$excessive_args2(nil)`,
@@ -215,17 +214,17 @@ func TestDeserialize(t *testing.T) {
{
input: `test$type_confusion1(&(0x7f0000000000)=@unknown)`,
output: `test$type_confusion1(&(0x7f0000000000))`,
- strictErr: regexp.MustCompile("wrong union option"),
+ strictErr: "wrong union option",
},
{
input: `test$type_confusion1(&(0x7f0000000000)=@unknown={0x0, 'abc'}, 0x0)`,
output: `test$type_confusion1(&(0x7f0000000000))`,
- strictErr: regexp.MustCompile("wrong union option"),
+ strictErr: "wrong union option",
},
{
input: `test$excessive_fields1(&(0x7f0000000000)=0x0)`,
output: `test$excessive_fields1(&(0x7f0000000000))`,
- strictErr: regexp.MustCompile("wrong int arg"),
+ strictErr: "wrong int arg",
},
{
input: `test$excessive_fields1(0x0)`,
@@ -253,7 +252,7 @@ func TestDeserialize(t *testing.T) {
},
{
input: `test$auto0(AUTO, &AUTO={AUTO, AUTO, AUTO}, AUTO, 0x0)`,
- err: regexp.MustCompile(`wrong type \*prog\.IntType for AUTO`),
+ err: `wrong type *prog.IntType for AUTO`,
},
{
input: `test$str0(&AUTO="303100090a0d7022273a")`,
@@ -270,15 +269,33 @@ func TestDeserialize(t *testing.T) {
{
input: `test$out_const(&(0x7f0000000000)=0x2)`,
output: `test$out_const(&(0x7f0000000000))`,
- strictErr: regexp.MustCompile(`out arg const\[1, const\] has non-default value: 2`),
+ strictErr: `out arg const[1, const] has non-default value: 2`,
+ },
+ {
+ input: `test$str1(&(0x7f0000000000)='foo\x00')`,
+ output: `test$str1(&(0x7f0000000000)='foo\x00')`,
+ },
+ {
+ input: `test$str1(&(0x7f0000000000)='bar\x00')`,
+ output: `test$str1(&(0x7f0000000000)='foo\x00')`,
+ strictErr: `bad string value "bar\x00", expect ["foo\x00"]`,
+ },
+ {
+ input: `test$str2(&(0x7f0000000000)='bar\x00')`,
+ output: `test$str2(&(0x7f0000000000)='bar\x00')`,
+ },
+ {
+ input: `test$str2(&(0x7f0000000000)='baz\x00')`,
+ output: `test$str2(&(0x7f0000000000)='foo\x00')`,
+ strictErr: `bad string value "baz\x00", expect ["foo\x00" "bar\x00"]`,
},
}
buf := make([]byte, ExecBufferSize)
for _, test := range tests {
- if test.err != nil && test.strictErr == nil {
+ if test.strictErr == "" {
test.strictErr = test.err
}
- if test.err != nil && test.output != "" {
+ if test.err != "" && test.output != "" {
t.Errorf("both err and output are set")
continue
}
@@ -289,18 +306,18 @@ func TestDeserialize(t *testing.T) {
wantErr = test.strictErr
}
if err != nil {
- if wantErr == nil {
+ if wantErr == "" {
t.Errorf("deserialization failed with\n%s\ndata:\n%s\n",
err, test.input)
continue
}
- if !wantErr.MatchString(err.Error()) {
+ if !strings.Contains(err.Error(), wantErr) {
t.Errorf("deserialization failed with\n%s\nwhich doesn't match\n%s\ndata:\n%s",
err, wantErr, test.input)
continue
}
} else {
- if wantErr != nil {
+ if wantErr != "" {
t.Errorf("deserialization should have failed with:\n%s\ndata:\n%s\n",
wantErr, test.input)
continue
diff --git a/prog/hints.go b/prog/hints.go
index 91a254acc..f7f9dc487 100644
--- a/prog/hints.go
+++ b/prog/hints.go
@@ -93,9 +93,17 @@ func generateHints(compMap CompMap, arg Arg, exec func()) {
// Csum will not pass validation and is always computed.
return
case *BufferType:
- if t.Kind == BufferFilename {
+ switch t.Kind {
+ case BufferFilename:
// This can generate escaping paths and is probably not too useful anyway.
return
+ case BufferString:
+ if len(t.Values) != 0 {
+ // These are frequently file names or complete enumerations.
+ // Mutating these may be useful iff we intercept strcmp
+ // (and filter out file names).
+ return
+ }
}
}
diff --git a/prog/mutation.go b/prog/mutation.go
index c9f647ae8..571b54a3f 100644
--- a/prog/mutation.go
+++ b/prog/mutation.go
@@ -344,14 +344,14 @@ func (t *BufferType) mutate(r *randGen, s *state, arg Arg, ctx ArgCtx) (calls []
data := append([]byte{}, a.Data()...)
a.data = mutateData(r, data, minLen, maxLen)
case BufferString:
- data := append([]byte{}, a.Data()...)
- if r.bin() {
+ if len(t.Values) != 0 {
+ a.data = r.randString(s, t)
+ } else {
if t.TypeSize != 0 {
minLen, maxLen = t.TypeSize, t.TypeSize
}
+ data := append([]byte{}, a.Data()...)
a.data = mutateData(r, data, minLen, maxLen)
- } else {
- a.data = r.randString(s, t)
}
case BufferFilename:
a.data = []byte(r.filename(s, t))
@@ -630,6 +630,10 @@ func (t *BufferType) getMutationPrio(target *Target, arg Arg, ignoreSpecial bool
if t.Dir() == DirOut && !t.Varlen() {
return dontMutate, false
}
+ if t.Kind == BufferString && len(t.Values) == 1 {
+ // These are effectively consts (and frequently file names).
+ return dontMutate, false
+ }
return 0.8 * maxPriority, false
}