diff options
Diffstat (limited to 'docs/freebsd')
| -rw-r--r-- | docs/freebsd/README.md | 101 | ||||
| -rw-r--r-- | docs/freebsd/found_bugs.md | 7 |
2 files changed, 108 insertions, 0 deletions
diff --git a/docs/freebsd/README.md b/docs/freebsd/README.md new file mode 100644 index 000000000..d15689ac5 --- /dev/null +++ b/docs/freebsd/README.md @@ -0,0 +1,101 @@ +# FreeBSD + +## How to run syzkaller on FreeBSD using qemu + +So far the process is tested only on linux/amd64 host. To build Go binaries do: +``` +make manager fuzzer execprog TARGETOS=freebsd +``` +To build C `syz-executor` binary, copy `executor/*` files to a FreeBSD machine and build there with: +``` +c++ executor/executor_freebsd.cc -o syz-executor -O1 -lpthread -DGOOS=\"freebsd\" -DGIT_REVISION=\"CURRENT_GIT_REVISION\" +``` +Then, copy out the binary back to host into `bin/freebsd_amd64` dir. + +Building/running on a FreeBSD host should work as well, but currently our `Makefile` does not work there, so you will need to do its work manually. + +Then, you need a FreeBSD image with root ssh access with a key. General instructions can be found here [qemu instructions](https://wiki.qemu.org/Hosts/BSD). I used `FreeBSD-11.0-RELEASE-amd64.qcow2` image, and it required a freashly built `qemu-system-x86_64` (networking did not work in the system-provided one). After booting add the following to `/boot/loader.conf`: +``` +autoboot_delay="-1" +console="comconsole" +``` +and the following to `/etc/rc.conf`: +``` +sshd_enable="YES" +ifconfig_em0="inet 10.0.0.1 netmask 255.255.255.0" +``` +Here is `/etc/ssh/sshd_config` that I used: +``` +Port 22 +AddressFamily any +ListenAddress 0.0.0.0 +ListenAddress :: +Protocol 2 +HostKey /etc/ssh/ssh_host_rsa_key +SyslogFacility AUTH +LogLevel INFO +AuthenticationMethods publickey password +PermitRootLogin yes +PubkeyAuthentication yes +AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2 +PasswordAuthentication yes +PermitEmptyPasswords yes +Subsystem sftp /usr/libexec/sftp-server +``` + +Check that you can run the VM with: +``` +qemu-system-x86_64 -m 2048 -hda FreeBSD-11.0-RELEASE-amd64.qcow2 -enable-kvm -netdev user,id=mynet0,host=10.0.2.10,hostfwd=tcp::10022-:22 -device e1000,netdev=mynet0 -nographic +``` +and ssh into it with a key. + +If all of the above worked, create `freebsd.cfg` config file with the following contents (alter paths as necessary): +``` +{ + "name": "freebsd", + "target": "freebsd/amd64", + "http": ":10000", + "workdir": "/workdir", + "syzkaller": "/gopath/src/github.com/google/syzkaller", + "image": "/FreeBSD-11.1-RELEASE-amd64.qcow2", + "sshkey": "/freebsd_id_rsa", + "sandbox": "none", + "procs": 8, + "type": "qemu", + "vm": { + "qemu": "/qemu/build/x86_64-softmmu/qemu-system-x86_64", + "count": 10, + "cpu": 4, + "mem": 2048 + } +} +``` + +Then, start `syz-manager` with: +``` +bin/syz-manager -config freebsd.cfg +``` +It should start printing output along the lines of: +``` +booting test machines... +wait for the connection from test machine... +machine check: 253 calls enabled, kcov=true, kleakcheck=false, faultinjection=false, comps=false +executed 3622, cover 1219, crashes 0, repro 0 +executed 7921, cover 1239, crashes 0, repro 0 +executed 32807, cover 1244, crashes 0, repro 0 +executed 35803, cover 1248, crashes 0, repro 0 +``` +If something does not work, add `-debug` flag to `syz-manager`. + +## Missing things + +- Coverage. `executor/executor_freebsd.cc` uses a very primitive fallback for coverage. We need KCOV for FreeBSD. It will also help to assess what's covered and what's missing. +- System call descriptions. `sys/freebsd/*.txt` is a dirty copy from `sys/linux/*.txt` with everything that does not compile dropped. We need to go through syscalls and verify/fix/extend them, including devices/ioctls/etc. +- Currently only `amd64` arch is supported. Supporting `386` would be useful, because it should cover compat paths. Also, we could do testing of the linux-compatibility subsystem. +- `pkg/csource` needs to be taught how to generate/build C reproducers. +- `pkg/host` needs to be taught how to detect supported syscalls/devices. +- `pkg/report`/`pkg/symbolizer` need to be taught how to extract/symbolize kernel crash reports. +- We need to learn how to build/use debug version of kernel. +- KASAN for FreeBSD would be useful. +- On Linux we have emission of exernal networking/USB traffic into kernel using tun/gadgetfs. Implementing these for FreeBSD could uncover a number of high-profile bugs. +- Last but not least, we need to support FreeBSD in `syz-ci` command (including building kernel/image continuously from git). diff --git a/docs/freebsd/found_bugs.md b/docs/freebsd/found_bugs.md new file mode 100644 index 000000000..5de46cce4 --- /dev/null +++ b/docs/freebsd/found_bugs.md @@ -0,0 +1,7 @@ +# Found Bugs + +Newer bugs come first + +- [Fix a locking bug in the IPPROTO_SCTP level SCTP_EVENT socket option.](https://reviews.freebsd.org/rS343954) +- [Fix a locking issue in the IPPROTO_SCTP level SCTP_PEER_ADDR_THLDS socket](https://reviews.freebsd.org/rS343960) +- [Check the index hasn't changed after writing the cmp entry.](https://reviews.freebsd.org/rS344517) |
