1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
|
// Copyright 2018 syzkaller project authors. All rights reserved.
// Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file.
package build
import (
"errors"
"fmt"
"os"
"path/filepath"
"runtime"
"time"
"github.com/google/syzkaller/pkg/osutil"
"github.com/google/syzkaller/sys/targets"
)
type fuchsia struct{}
// syzRoot returns $GOPATH/src/github.com/google/syzkaller.
func syzRoot() (string, error) {
_, selfPath, _, ok := runtime.Caller(0)
if !ok {
return "", errors.New("runtime.Caller failed")
}
return filepath.Abs(filepath.Join(filepath.Dir(selfPath), "../.."))
}
// nolint: goconst // to ignore "out/"
func (fu fuchsia) build(params Params) (ImageDetails, error) {
syzDir, err := syzRoot()
if err != nil {
return ImageDetails{}, err
}
sysTarget := targets.Get(targets.Fuchsia, params.TargetArch)
if sysTarget == nil {
return ImageDetails{}, fmt.Errorf("unsupported fuchsia arch %v", params.TargetArch)
}
arch := sysTarget.KernelHeaderArch
product := fmt.Sprintf("%s.%s", "core", arch)
if _, err := runSandboxed(time.Hour, params.KernelDir,
"scripts/fx", "--dir", "out/"+arch,
"set", product,
"--args", fmt.Sprintf(`syzkaller_dir="%s"`, syzDir),
"--with-base", "//bundles/tools",
"--with-base", "//src/testing/fuzzing/syzkaller",
"--variant", "kasan",
"--no-goma",
); err != nil {
return ImageDetails{}, err
}
if _, err := runSandboxed(time.Hour*2, params.KernelDir, "scripts/fx", "clean-build"); err != nil {
return ImageDetails{}, err
}
// Add ssh keys to the zbi image so syzkaller can access the fuchsia vm.
_, sshKeyPub, err := genSSHKeys(params.OutputDir)
if err != nil {
return ImageDetails{}, err
}
sshZBI := filepath.Join(params.OutputDir, "initrd")
kernelZBI := filepath.Join(params.KernelDir, "out", arch, "fuchsia.zbi")
authorizedKeys := fmt.Sprintf("data/ssh/authorized_keys=%s", sshKeyPub)
if _, err := osutil.RunCmd(time.Minute, params.KernelDir, "out/"+arch+"/host_x64/zbi",
"-o", sshZBI, kernelZBI, "--entry", authorizedKeys); err != nil {
return ImageDetails{}, err
}
// Copy and extend the fvm.
fvmTool := filepath.Join("out", arch, "host_x64", "fvm")
fvmDst := filepath.Join(params.OutputDir, "image")
fvmSrc := filepath.Join(params.KernelDir, "out", arch, "obj", "build", "images", "fuchsia", "fuchsia", "fvm.blk")
if err := osutil.CopyFile(fvmSrc, fvmDst); err != nil {
return ImageDetails{}, err
}
if _, err := osutil.RunCmd(time.Minute*5, params.KernelDir, fvmTool, fvmDst, "extend", "--length", "3G"); err != nil {
return ImageDetails{}, err
}
for src, dst := range map[string]string{
"out/" + arch + "/kernel_" + arch + "-kasan/zircon.elf": "obj/zircon.elf",
"out/" + arch + "/multiboot.bin": "kernel",
} {
fullSrc := filepath.Join(params.KernelDir, filepath.FromSlash(src))
fullDst := filepath.Join(params.OutputDir, filepath.FromSlash(dst))
if err := osutil.CopyFile(fullSrc, fullDst); err != nil {
return ImageDetails{}, fmt.Errorf("failed to copy %v: %w", src, err)
}
}
return ImageDetails{}, nil
}
func (fu fuchsia) clean(params Params) error {
// We always do clean build because incremental build is frequently broken.
// So no need to clean separately.
return nil
}
func runSandboxed(timeout time.Duration, dir, command string, arg ...string) ([]byte, error) {
cmd := osutil.Command(command, arg...)
cmd.Dir = dir
if err := osutil.Sandbox(cmd, true, false); err != nil {
return nil, err
}
return osutil.Run(timeout, cmd)
}
// genSSHKeys generates a pair of ssh keys inside the given directory, named key and key.pub.
// If both files already exist, this function does nothing.
// The function returns the path to both keys.
func genSSHKeys(dir string) (privKey, pubKey string, err error) {
privKey = filepath.Join(dir, "key")
pubKey = filepath.Join(dir, "key.pub")
os.Remove(privKey)
os.Remove(pubKey)
if _, err := osutil.RunCmd(time.Minute*5, dir, "ssh-keygen", "-t", "rsa", "-b", "2048",
"-N", "", "-C", "syzkaller-ssh", "-f", privKey); err != nil {
return "", "", err
}
return privKey, pubKey, nil
}
|