aboutsummaryrefslogtreecommitdiffstats
path: root/executor
diff options
context:
space:
mode:
Diffstat (limited to 'executor')
-rw-r--r--executor/common.h34
-rw-r--r--executor/common_bsd.h14
-rw-r--r--executor/common_linux.h116
3 files changed, 82 insertions, 82 deletions
diff --git a/executor/common.h b/executor/common.h
index 2671db7d7..7f03eac8c 100644
--- a/executor/common.h
+++ b/executor/common.h
@@ -39,9 +39,9 @@ NORETURN void doexit(int status)
}
#endif
-#if SYZ_EXECUTOR || SYZ_PROCS || SYZ_REPEAT && SYZ_ENABLE_CGROUPS || \
- SYZ_ENABLE_NETDEV || __NR_syz_mount_image || __NR_syz_read_part_table || \
- __NR_syz_usb_connect || (GOOS_freebsd || GOOS_openbsd || GOOS_netbsd) && SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_MULTI_PROC || SYZ_REPEAT && SYZ_CGROUPS || \
+ SYZ_NET_DEVICES || __NR_syz_mount_image || __NR_syz_read_part_table || \
+ __NR_syz_usb_connect || (GOOS_freebsd || GOOS_openbsd || GOOS_netbsd) && SYZ_NET_INJECTION
unsigned long long procid;
#endif
@@ -146,7 +146,7 @@ static void sleep_ms(uint64 ms)
#endif
#if SYZ_EXECUTOR || SYZ_THREADED || SYZ_REPEAT && SYZ_EXECUTOR_USES_FORK_SERVER || \
- SYZ_ENABLE_LEAK
+ SYZ_LEAK
#include <time.h>
static uint64 current_time_ms(void)
@@ -158,14 +158,14 @@ static uint64 current_time_ms(void)
}
#endif
-#if SYZ_EXECUTOR || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP || SYZ_USE_TMP_DIR
+#if SYZ_EXECUTOR || SYZ_SANDBOX_ANDROID || SYZ_USE_TMP_DIR
#include <stdlib.h>
#include <sys/stat.h>
#include <unistd.h>
static void use_temporary_dir(void)
{
-#if SYZ_SANDBOX_ANDROID_UNTRUSTED_APP
+#if SYZ_SANDBOX_ANDROID
char tmpdir_template[] = "/data/data/syzkaller/syzkaller.XXXXXX";
#elif GOOS_fuchsia
char tmpdir_template[] = "/tmp/syzkaller.XXXXXX";
@@ -642,7 +642,7 @@ static void loop(void)
#if SYZ_EXECUTOR || SYZ_USE_TMP_DIR
remove_dir(cwdbuf);
#endif
-#if SYZ_ENABLE_LEAK
+#if SYZ_LEAK
// Note: this will fail under setuid sandbox because we don't have
// write permissions for the kmemleak file.
check_leaks();
@@ -662,7 +662,7 @@ static void loop(void)
/*RESULTS*/
-#if SYZ_THREADED || SYZ_REPEAT || SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP
+#if SYZ_THREADED || SYZ_REPEAT || SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID
#if SYZ_THREADED
void execute_call(int call)
#elif SYZ_REPEAT
@@ -695,40 +695,40 @@ int main(void)
/*MMAP_DATA*/
#endif
-#if SYZ_ENABLE_BINFMT_MISC
+#if SYZ_BINFMT_MISC
setup_binfmt_misc();
#endif
-#if SYZ_ENABLE_LEAK
+#if SYZ_LEAK
setup_leak();
#endif
-#if SYZ_FAULT_INJECTION
+#if SYZ_FAULT
setup_fault();
#endif
-#if SYZ_ENABLE_KCSAN
+#if SYZ_KCSAN
setup_kcsan();
#endif
#if SYZ_HANDLE_SEGV
install_segv_handler();
#endif
-#if SYZ_PROCS
+#if SYZ_MULTI_PROC
for (procid = 0; procid < /*PROCS*/; procid++) {
if (fork() == 0) {
#endif
-#if SYZ_USE_TMP_DIR || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP
+#if SYZ_USE_TMP_DIR || SYZ_SANDBOX_ANDROID
use_temporary_dir();
#endif
/*SANDBOX_FUNC*/
#if SYZ_HAVE_CLOSE_FDS && !SYZ_THREADED && !SYZ_REPEAT && !SYZ_SANDBOX_NONE && \
- !SYZ_SANDBOX_SETUID && !SYZ_SANDBOX_NAMESPACE && !SYZ_SANDBOX_ANDROID_UNTRUSTED_APP
+ !SYZ_SANDBOX_SETUID && !SYZ_SANDBOX_NAMESPACE && !SYZ_SANDBOX_ANDROID
close_fds();
#endif
-#if SYZ_PROCS
+#if SYZ_MULTI_PROC
}
}
sleep(1000000);
#endif
-#if !SYZ_PROCS && !SYZ_REPEAT && SYZ_ENABLE_LEAK
+#if !SYZ_MULTI_PROC && !SYZ_REPEAT && SYZ_LEAK
check_leaks();
#endif
return 0;
diff --git a/executor/common_bsd.h b/executor/common_bsd.h
index 7cc55820d..c818d802e 100644
--- a/executor/common_bsd.h
+++ b/executor/common_bsd.h
@@ -37,7 +37,7 @@ static uintptr_t syz_open_pts(void)
#endif // GOOS_openbsd
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
#include <fcntl.h>
#include <net/if_tun.h>
@@ -194,9 +194,9 @@ static void initialize_tun(int tun_id)
execute_command(0, "ndp -s %s%%%s %s", remote_ipv6, tun_iface, remote_mac);
}
-#endif // SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#endif // SYZ_EXECUTOR || SYZ_NET_INJECTION
-#if SYZ_EXECUTOR || __NR_syz_emit_ethernet && SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || __NR_syz_emit_ethernet && SYZ_NET_INJECTION
#include <stdbool.h>
#include <sys/uio.h>
@@ -214,7 +214,7 @@ static long syz_emit_ethernet(volatile long a0, volatile long a1)
}
#endif
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE && (__NR_syz_extract_tcp_res || SYZ_REPEAT)
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION && (__NR_syz_extract_tcp_res || SYZ_REPEAT)
#include <errno.h>
static int read_tun(char* data, int size)
@@ -232,7 +232,7 @@ static int read_tun(char* data, int size)
}
#endif
-#if SYZ_EXECUTOR || __NR_syz_extract_tcp_res && SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || __NR_syz_extract_tcp_res && SYZ_NET_INJECTION
struct tcp_resources {
uint32 seq;
@@ -349,7 +349,7 @@ static void loop();
static int do_sandbox_none(void)
{
sandbox_common();
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
initialize_tun(procid);
#endif
loop();
@@ -384,7 +384,7 @@ static int do_sandbox_setuid(void)
return wait_for_loop(pid);
sandbox_common();
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
initialize_tun(procid);
#endif
diff --git a/executor/common_linux.h b/executor/common_linux.h
index 34f600313..4c8e79c4e 100644
--- a/executor/common_linux.h
+++ b/executor/common_linux.h
@@ -70,9 +70,9 @@ static int event_timedwait(event_t* ev, uint64 timeout)
}
#endif
-#if SYZ_EXECUTOR || SYZ_REPEAT || SYZ_TUN_ENABLE || SYZ_FAULT_INJECTION || SYZ_SANDBOX_NONE || \
- SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP || \
- SYZ_FAULT_INJECTION || SYZ_ENABLE_LEAK || SYZ_ENABLE_BINFMT_MISC
+#if SYZ_EXECUTOR || SYZ_REPEAT || SYZ_NET_INJECTION || SYZ_FAULT || SYZ_SANDBOX_NONE || \
+ SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID || \
+ SYZ_FAULT || SYZ_LEAK || SYZ_BINFMT_MISC
#include <errno.h>
#include <fcntl.h>
#include <stdarg.h>
@@ -106,7 +106,7 @@ static bool write_file(const char* file, const char* what, ...)
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV || SYZ_TUN_ENABLE || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES || SYZ_NET_INJECTION || SYZ_DEVLINK_PCI
#include <arpa/inet.h>
#include <net/if.h>
#include <netinet/in.h>
@@ -153,7 +153,7 @@ static void netlink_attr(struct nlmsg* nlmsg, int typ,
nlmsg->pos += NLMSG_ALIGN(attr->nla_len);
}
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
static void netlink_nest(struct nlmsg* nlmsg, int typ)
{
struct nlattr* attr = (struct nlattr*)nlmsg->pos;
@@ -205,7 +205,7 @@ static int netlink_send(struct nlmsg* nlmsg, int sock)
return netlink_send_ext(nlmsg, sock, 0, NULL);
}
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES || SYZ_DEVLINK_PCI
static int netlink_next_msg(struct nlmsg* nlmsg, unsigned int offset,
unsigned int total_len)
{
@@ -217,7 +217,7 @@ static int netlink_next_msg(struct nlmsg* nlmsg, unsigned int offset,
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
static void netlink_add_device_impl(struct nlmsg* nlmsg, const char* type,
const char* name)
{
@@ -274,7 +274,7 @@ static void netlink_add_hsr(struct nlmsg* nlmsg, int sock, const char* name,
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV || SYZ_TUN_ENABLE || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES || SYZ_NET_INJECTION || SYZ_DEVLINK_PCI
static void netlink_device_change(struct nlmsg* nlmsg, int sock, const char* name, bool up,
const char* master, const void* mac, int macsize,
const char* new_name)
@@ -299,7 +299,7 @@ static void netlink_device_change(struct nlmsg* nlmsg, int sock, const char* nam
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES || SYZ_NET_INJECTION
static int netlink_add_addr(struct nlmsg* nlmsg, int sock, const char* dev,
const void* addr, int addrsize)
{
@@ -336,7 +336,7 @@ static void netlink_add_addr6(struct nlmsg* nlmsg, int sock,
}
#endif
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
static void netlink_add_neigh(struct nlmsg* nlmsg, int sock, const char* name,
const void* addr, int addrsize, const void* mac, int macsize)
{
@@ -356,7 +356,7 @@ static void netlink_add_neigh(struct nlmsg* nlmsg, int sock, const char* name,
#endif
#endif
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
#include <arpa/inet.h>
#include <errno.h>
#include <fcntl.h>
@@ -464,24 +464,24 @@ static void initialize_tun(void)
}
#endif
-#if SYZ_EXECUTOR || __NR_syz_init_net_socket || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || __NR_syz_init_net_socket || SYZ_DEVLINK_PCI
const int kInitNetNsFd = 239; // see kMaxFd
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI || SYZ_NET_DEVICES
#include <linux/genetlink.h>
#define DEVLINK_FAMILY_NAME "devlink"
#define DEVLINK_CMD_PORT_GET 5
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI
#define DEVLINK_CMD_RELOAD 37
#endif
#define DEVLINK_ATTR_BUS_NAME 1
#define DEVLINK_ATTR_DEV_NAME 2
#define DEVLINK_ATTR_NETDEV_NAME 7
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI
#define DEVLINK_ATTR_NETNS_FD 137
#endif
@@ -517,7 +517,7 @@ static int netlink_devlink_id_get(struct nlmsg* nlmsg, int sock)
return id;
}
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI
static void netlink_devlink_netns_move(const char* bus_name, const char* dev_name, int netns_fd)
{
struct genlmsghdr genlhdr;
@@ -599,7 +599,7 @@ error:
close(sock);
}
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI
static void initialize_devlink_pci(void)
{
#if SYZ_EXECUTOR
@@ -623,7 +623,7 @@ static void initialize_devlink_pci(void)
#endif
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
#include <arpa/inet.h>
#include <errno.h>
#include <fcntl.h>
@@ -843,7 +843,7 @@ static void initialize_netdevices_init(void)
}
#endif
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE && (__NR_syz_extract_tcp_res || SYZ_REPEAT)
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION && (__NR_syz_extract_tcp_res || SYZ_REPEAT)
#include <errno.h>
static int read_tun(char* data, int size)
@@ -864,7 +864,7 @@ static int read_tun(char* data, int size)
}
#endif
-#if SYZ_EXECUTOR || __NR_syz_emit_ethernet && SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || __NR_syz_emit_ethernet && SYZ_NET_INJECTION
#include <stdbool.h>
#include <sys/uio.h>
@@ -925,7 +925,7 @@ static long syz_emit_ethernet(volatile long a0, volatile long a1, volatile long
}
#endif
-#if SYZ_EXECUTOR || SYZ_REPEAT && SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_REPEAT && SYZ_NET_INJECTION
static void flush_tun()
{
#if SYZ_EXECUTOR
@@ -938,7 +938,7 @@ static void flush_tun()
}
#endif
-#if SYZ_EXECUTOR || __NR_syz_extract_tcp_res && SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || __NR_syz_extract_tcp_res && SYZ_NET_INJECTION
#ifndef __ANDROID__
// Can't include <linux/ipv6.h>, since it causes
// conflicts due to some structs redefinition.
@@ -1015,7 +1015,7 @@ static long syz_extract_tcp_res(volatile long a0, volatile long a1, volatile lon
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_CLOSE_FDS || __NR_syz_usb_connect
+#if SYZ_EXECUTOR || SYZ_CLOSE_FDS || __NR_syz_usb_connect
#define MAX_FDS 30
#endif
@@ -1108,7 +1108,7 @@ static long syz_open_pts(volatile long a0, volatile long a1)
#endif
#if SYZ_EXECUTOR || __NR_syz_init_net_socket
-#if SYZ_EXECUTOR || SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP
+#if SYZ_EXECUTOR || SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID
#include <fcntl.h>
#include <sched.h>
#include <sys/stat.h>
@@ -1442,7 +1442,7 @@ static long syz_kvm_setup_cpu(volatile long a0, volatile long a1, volatile long
#endif
#endif
-#if SYZ_EXECUTOR || SYZ_RESET_NET_NAMESPACE
+#if SYZ_EXECUTOR || SYZ_NET_RESET
#include <errno.h>
#include <net/if.h>
#include <netinet/in.h>
@@ -1938,7 +1938,7 @@ static void reset_net_namespace(void)
}
#endif
-#if SYZ_EXECUTOR || (SYZ_ENABLE_CGROUPS && (SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP))
+#if SYZ_EXECUTOR || (SYZ_CGROUPS && (SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID))
#include <fcntl.h>
#include <sys/mount.h>
#include <sys/stat.h>
@@ -2088,7 +2088,7 @@ void initialize_cgroups()
#endif
#endif
-#if SYZ_EXECUTOR || SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP
+#if SYZ_EXECUTOR || SYZ_SANDBOX_NONE || SYZ_SANDBOX_SETUID || SYZ_SANDBOX_NAMESPACE || SYZ_SANDBOX_ANDROID
#include <errno.h>
#include <sys/mount.h>
@@ -2097,7 +2097,7 @@ static void setup_common()
if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) {
debug("mount(fusectl) failed: %d\n", errno);
}
-#if SYZ_EXECUTOR || SYZ_ENABLE_CGROUPS
+#if SYZ_EXECUTOR || SYZ_CGROUPS
setup_cgroups();
#endif
}
@@ -2116,7 +2116,7 @@ static void sandbox_common()
setpgrp();
setsid();
-#if SYZ_EXECUTOR || __NR_syz_init_net_socket || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || __NR_syz_init_net_socket || SYZ_DEVLINK_PCI
int netns = open("/proc/self/ns/net", O_RDONLY);
if (netns == -1)
fail("open(/proc/self/ns/net) failed");
@@ -2248,19 +2248,19 @@ static int do_sandbox_none(void)
setup_common();
sandbox_common();
drop_caps();
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
initialize_netdevices_init();
#endif
if (unshare(CLONE_NEWNET)) {
debug("unshare(CLONE_NEWNET): %d\n", errno);
}
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI
initialize_devlink_pci();
#endif
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
initialize_tun();
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
initialize_netdevices();
#endif
loop();
@@ -2285,19 +2285,19 @@ static int do_sandbox_setuid(void)
setup_common();
sandbox_common();
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
initialize_netdevices_init();
#endif
if (unshare(CLONE_NEWNET)) {
debug("unshare(CLONE_NEWNET): %d\n", errno);
}
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI
initialize_devlink_pci();
#endif
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
initialize_tun();
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
initialize_netdevices();
#endif
@@ -2339,17 +2339,17 @@ static int namespace_sandbox_proc(void* arg)
if (!write_file("/proc/self/gid_map", "0 %d 1\n", real_gid))
fail("write of /proc/self/gid_map failed");
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
initialize_netdevices_init();
#endif
// CLONE_NEWNET must always happen before tun setup,
// because we want the tun device in the test namespace.
if (unshare(CLONE_NEWNET))
fail("unshare(CLONE_NEWNET)");
-#if SYZ_EXECUTOR || SYZ_ENABLE_DEVLINK_PCI
+#if SYZ_EXECUTOR || SYZ_DEVLINK_PCI
initialize_devlink_pci();
#endif
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
// We setup tun here as it needs to be in the test net namespace,
// which in turn needs to be in the test user namespace.
// However, IFF_NAPI_FRAGS will fail as we are not root already.
@@ -2357,7 +2357,7 @@ static int namespace_sandbox_proc(void* arg)
// to move it to the target namespace.
initialize_tun();
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
initialize_netdevices();
#endif
@@ -2390,7 +2390,7 @@ static int namespace_sandbox_proc(void* arg)
fail("mkdir failed");
if (mount("/sys", "./syz-tmp/newroot/sys", 0, bind_mount_flags, NULL))
fail("mount(sysfs) failed");
-#if SYZ_EXECUTOR || SYZ_ENABLE_CGROUPS
+#if SYZ_EXECUTOR || SYZ_CGROUPS
initialize_cgroups();
#endif
if (mkdir("./syz-tmp/pivot", 0777))
@@ -2431,7 +2431,7 @@ static int do_sandbox_namespace(void)
}
#endif
-#if SYZ_EXECUTOR || SYZ_SANDBOX_ANDROID_UNTRUSTED_APP
+#if SYZ_EXECUTOR || SYZ_SANDBOX_ANDROID
#include <fcntl.h> // open(2)
#include <grp.h> // setgroups
#include <sys/xattr.h> // setxattr, getxattr
@@ -2560,10 +2560,10 @@ static int do_sandbox_android_untrusted_app(void)
syz_setfilecon(".", SELINUX_LABEL_APP_DATA_FILE);
syz_setcon(SELINUX_CONTEXT_UNTRUSTED_APP);
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
initialize_tun();
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_NETDEV
+#if SYZ_EXECUTOR || SYZ_NET_DEVICES
// Note: sandbox_android_untrusted_app does not unshare net namespace.
initialize_netdevices_init();
initialize_netdevices();
@@ -2689,7 +2689,7 @@ retry:
}
#endif
-#if SYZ_EXECUTOR || SYZ_FAULT_INJECTION
+#if SYZ_EXECUTOR || SYZ_FAULT
#include <fcntl.h>
#include <string.h>
#include <sys/stat.h>
@@ -2786,7 +2786,7 @@ static void kill_and_wait(int pid, int* status)
}
#endif
-#if SYZ_EXECUTOR || SYZ_REPEAT && (SYZ_ENABLE_CGROUPS || SYZ_RESET_NET_NAMESPACE)
+#if SYZ_EXECUTOR || SYZ_REPEAT && (SYZ_CGROUPS || SYZ_NET_RESET)
#include <fcntl.h>
#include <sys/ioctl.h>
#include <sys/stat.h>
@@ -2796,16 +2796,16 @@ static void kill_and_wait(int pid, int* status)
#define SYZ_HAVE_SETUP_LOOP 1
static void setup_loop()
{
-#if SYZ_EXECUTOR || SYZ_ENABLE_CGROUPS
+#if SYZ_EXECUTOR || SYZ_CGROUPS
setup_cgroups_loop();
#endif
-#if SYZ_EXECUTOR || SYZ_RESET_NET_NAMESPACE
+#if SYZ_EXECUTOR || SYZ_NET_RESET
checkpoint_net_namespace();
#endif
}
#endif
-#if SYZ_EXECUTOR || SYZ_REPEAT && (SYZ_RESET_NET_NAMESPACE || __NR_syz_mount_image || __NR_syz_read_part_table)
+#if SYZ_EXECUTOR || SYZ_REPEAT && (SYZ_NET_RESET || __NR_syz_mount_image || __NR_syz_read_part_table)
#define SYZ_HAVE_RESET_LOOP 1
static void reset_loop()
{
@@ -2818,7 +2818,7 @@ static void reset_loop()
close(loopfd);
}
#endif
-#if SYZ_EXECUTOR || SYZ_RESET_NET_NAMESPACE
+#if SYZ_EXECUTOR || SYZ_NET_RESET
reset_net_namespace();
#endif
}
@@ -2832,12 +2832,12 @@ static void setup_test()
{
prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
setpgrp();
-#if SYZ_EXECUTOR || SYZ_ENABLE_CGROUPS
+#if SYZ_EXECUTOR || SYZ_CGROUPS
setup_cgroups_test();
#endif
// It's the leaf test process we want to be always killed first.
write_file("/proc/self/oom_score_adj", "1000");
-#if SYZ_EXECUTOR || SYZ_TUN_ENABLE
+#if SYZ_EXECUTOR || SYZ_NET_INJECTION
// Read all remaining packets from tun to better
// isolate consequently executing programs.
flush_tun();
@@ -2845,7 +2845,7 @@ static void setup_test()
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_CLOSE_FDS
+#if SYZ_EXECUTOR || SYZ_CLOSE_FDS
#define SYZ_HAVE_CLOSE_FDS 1
static void close_fds()
{
@@ -2863,7 +2863,7 @@ static void close_fds()
}
#endif
-#if SYZ_EXECUTOR || SYZ_FAULT_INJECTION
+#if SYZ_EXECUTOR || SYZ_FAULT
#include <errno.h>
static void setup_fault()
@@ -2892,7 +2892,7 @@ static void setup_fault()
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_LEAK
+#if SYZ_EXECUTOR || SYZ_LEAK
#include <fcntl.h>
#include <stdio.h>
#include <string.h>
@@ -2991,7 +2991,7 @@ static void check_leaks(void)
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_BINFMT_MISC
+#if SYZ_EXECUTOR || SYZ_BINFMT_MISC
#include <fcntl.h>
#include <sys/mount.h>
#include <sys/stat.h>
@@ -3007,7 +3007,7 @@ static void setup_binfmt_misc()
}
#endif
-#if SYZ_EXECUTOR || SYZ_ENABLE_KCSAN
+#if SYZ_EXECUTOR || SYZ_KCSAN
#define KCSAN_DEBUGFS_FILE "/sys/kernel/debug/kcsan"
static void setup_kcsan()