lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANn89i+qLwyPLztPt6Mavjimyv0H_UihVVNfJXWLjcwrqOudTw@mail.gmail.com>
Date: Wed, 6 Mar 2024 11:07:50 +0100
From: Eric Dumazet <edumazet@...gle.com>
To: xingwei lee <xrivendell7@...il.com>, Florian Westphal <fw@...len.de>
Cc: pabeni@...hat.com, davem@...emloft.net, kuba@...nel.org, 
	linux-hams@...r.kernel.org, linux-kernel@...r.kernel.org, 
	netdev@...r.kernel.org, ralf@...ux-mips.org, syzkaller-bugs@...glegroups.com, 
	samsun1006219@...il.com
Subject: Re: KASAN: slab-use-after-free Read in ip_finish_output

On Wed, Mar 6, 2024 at 11:00 AM xingwei lee <xrivendell7@...il.com> wrote:
>
> Hello, I found a new bug titled "KASAN: slab-use-after-free Read in
> ip_finish_output” or “KASAN: slab-use-after-free in sk_to_full_sk" and
> confirmed it in the latest net and net-next branch. After my simple
> analysis, it may be related to the net/rose or AF_PACKET/PF_PACKET
> socket.

I already had a syzbot report for this issue, thanks.

Adding Florian to the discussion.


The issue is cause by ip defrag layer, which calls skb_orphan()

These were my notes, I had little time to work on it so far.

Calling ip_defrag() in output path is also implying skb_orphan(),
which is buggy because output path relies on sk not disappearing.

A relevant old patch about the issue was :

commit 8282f27449bf15548cb82c77b6e04ee0ab827bdc
Author: Joe Stringer <joe@....org>
Date:   Fri Jan 22 15:49:12 2016 -0800

    inet: frag: Always orphan skbs inside ip_defrag()

    Later parts of the stack (including fragmentation) expect that there is
    never a socket attached to frag in a frag_list, however this invariant
    was not enforced on all defrag paths. This could lead to the
    BUG_ON(skb->sk) during ip_do_fragment(), as per the call stack at the
    end of this commit message.

    While the call could be added to openvswitch to fix this particular
    error, the head and tail of the frags list are already orphaned
    indirectly inside ip_defrag(), so it seems like the remaining fragments
    should all be orphaned in all circumstances.

    kernel BUG at net/ipv4/ip_output.c:586!

This is quite an interesting bug involving ipvlan fed with af_packet sockets.

net/ipv4/ip_output.c depends on skb->sk being set, and probably to an
inet socket, not an arbitrary one.

If we orphan the packet in ipvlan, then downstream things like FQ
packet scheduler will not work properly.

We need to change ip_defrag() to only use skb_orphan() when really
needed, ie whenever frag_list is going to be used.


BUG: KASAN: slab-use-after-free in sk_fullsock include/net/sock.h:2823 [inline]
BUG: KASAN: slab-use-after-free in ip_skb_dst_mtu+0x830/0x9b0
include/net/ip.h:499
Read of size 1 at addr ffff88802f1dc012 by task swapper/1/0

CPU: 1 PID: 0 Comm: swapper/1 Not tainted
6.8.0-rc5-syzkaller-00129-g2a770cdc4382 #0
Hardware name: Google Google Compute Engine/Google Compute Engine,
BIOS Google 01/25/2024
Call Trace:
<IRQ>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:377 [inline]
print_report+0x167/0x540 mm/kasan/report.c:488
kasan_report+0x142/0x180 mm/kasan/report.c:601
sk_fullsock include/net/sock.h:2823 [inline]
ip_skb_dst_mtu+0x830/0x9b0 include/net/ip.h:499
__ip_finish_output+0x12b/0x400 net/ipv4/ip_output.c:306
ipvlan_process_v4_outbound+0x3ef/0x700 drivers/net/ipvlan/ipvlan_core.c:442
ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:540 [inline]
ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
ipvlan_queue_xmit+0xaa2/0x11f0 drivers/net/ipvlan/ipvlan_core.c:668
ipvlan_start_xmit+0x4a/0x150 drivers/net/ipvlan/ipvlan_main.c:222
__netdev_start_xmit include/linux/netdevice.h:4989 [inline]
netdev_start_xmit include/linux/netdevice.h:5003 [inline]
xmit_one net/core/dev.c:3547 [inline]
dev_hard_start_xmit+0x242/0x770 net/core/dev.c:3563
sch_direct_xmit+0x2b6/0x5f0 net/sched/sch_generic.c:342
qdisc_restart net/sched/sch_generic.c:407 [inline]
__qdisc_run+0xbed/0x2150 net/sched/sch_generic.c:415
qdisc_run+0xda/0x270 include/net/pkt_sched.h:125
net_tx_action+0x877/0xa30 net/core/dev.c:5197
__do_softirq+0x2bb/0x942 kernel/softirq.c:553
invoke_softirq kernel/softirq.c:427 [inline]
__irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632
irq_exit_rcu+0x9/0x30 kernel/softirq.c:644
sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:native_irq_disable arch/x86/include/asm/irqflags.h:37 [inline]
RIP: 0010:arch_local_irq_disable arch/x86/include/asm/irqflags.h:72 [inline]
RIP: 0010:acpi_safe_halt+0x20/0x30 drivers/acpi/processor_idle.c:113
Code: 90 90 90 90 90 90 90 90 90 90 65 48 8b 05 a8 b9 9c 74 48 f7 00
08 00 00 00 75 10 66 90 0f 00 2d d6 04 a1 00 f3 0f 1e fa fb f4 <fa> c3
cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90
RSP: 0018:ffffc90000187d08 EFLAGS: 00000246
RAX: ffff8880172cbb80 RBX: ffff888017ac1064 RCX: 000000000002e1a1
RDX: 0000000000000001 RSI: ffff888017ac1000 RDI: ffff888017ac1064
RBP: 0000000000038f98 R08: ffff8880b9536d8b R09: 1ffff110172a6db1
R10: dffffc0000000000 R11: ffffffff8b670120 R12: ffff88801bfd2800
R13: 0000000000000000 R14: 0000000000000001 R15: ffffffff8e8984e0
acpi_idle_enter+0xe4/0x140 drivers/acpi/processor_idle.c:707
cpuidle_enter_state+0x118/0x490 drivers/cpuidle/cpuidle.c:267
cpuidle_enter+0x5d/0xa0 drivers/cpuidle/cpuidle.c:388
call_cpuidle kernel/sched/idle.c:134 [inline]
cpuidle_idle_call kernel/sched/idle.c:215 [inline]
do_idle+0x374/0x5d0 kernel/sched/idle.c:312
cpu_startup_entry+0x41/0x60 kernel/sched/idle.c:410
start_secondary+0x100/0x100 arch/x86/kernel/smpboot.c:336
secondary_startup_64_no_verify+0x171/0x17b
</TASK>

Allocated by task 5133:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
__kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
kasan_kmalloc include/linux/kasan.h:211 [inline]
__do_kmalloc_node mm/slub.c:3981 [inline]
__kmalloc+0x22e/0x490 mm/slub.c:3994
kmalloc include/linux/slab.h:594 [inline]
sk_prot_alloc+0xe0/0x210 net/core/sock.c:2078
sk_alloc+0x38/0x370 net/core/sock.c:2131
packet_create+0x104/0x790 net/packet/af_packet.c:3352
__sock_create+0x48f/0x920 net/socket.c:1571
sock_create net/socket.c:1622 [inline]
__sys_socket_create net/socket.c:1659 [inline]
__sys_socket+0x14f/0x3c0 net/socket.c:1706
__do_sys_socket net/socket.c:1720 [inline]
__se_sys_socket net/socket.c:1718 [inline]
__x64_sys_socket+0x7a/0x90 net/socket.c:1718
do_syscall_64+0xf9/0x240
entry_SYSCALL_64_after_hwframe+0x6f/0x77

Freed by task 0:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
poison_slab_object+0xa6/0xe0 mm/kasan/common.c:241
__kasan_slab_free+0x34/0x70 mm/kasan/common.c:257
kasan_slab_free include/linux/kasan.h:184 [inline]
slab_free_hook mm/slub.c:2121 [inline]
slab_free mm/slub.c:4299 [inline]
kfree+0x14a/0x380 mm/slub.c:4409
sk_prot_free net/core/sock.c:2114 [inline]
__sk_destruct+0x47f/0x5f0 net/core/sock.c:2206
skb_orphan include/linux/skbuff.h:3127 [inline]
ip_defrag+0x208/0x25d0 net/ipv4/ip_fragment.c:490
nf_ct_ipv4_gather_frags net/ipv4/netfilter/nf_defrag_ipv4.c:32 [inline]
ipv4_conntrack_defrag+0x3de/0x5a0 net/ipv4/netfilter/nf_defrag_ipv4.c:87
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook+0x2c4/0x450 include/linux/netfilter.h:269
__ip_local_out+0x3d9/0x4e0 net/ipv4/ip_output.c:118
ip_local_out+0x26/0x70 net/ipv4/ip_output.c:127
ipvlan_process_v4_outbound+0x3ef/0x700 drivers/net/ipvlan/ipvlan_core.c:442
ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:540 [inline]
ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
ipvlan_queue_xmit+0xaa2/0x11f0 drivers/net/ipvlan/ipvlan_core.c:668
ipvlan_start_xmit+0x4a/0x150 drivers/net/ipvlan/ipvlan_main.c:222
__netdev_start_xmit include/linux/netdevice.h:4989 [inline]
netdev_start_xmit include/linux/netdevice.h:5003 [inline]
xmit_one net/core/dev.c:3547 [inline]
dev_hard_start_xmit+0x242/0x770 net/core/dev.c:3563
sch_direct_xmit+0x2b6/0x5f0 net/sched/sch_generic.c:342
qdisc_restart net/sched/sch_generic.c:407 [inline]
__qdisc_run+0xbed/0x2150 net/sched/sch_generic.c:415
qdisc_run+0xda/0x270 include/net/pkt_sched.h:125
net_tx_action+0x877/0xa30 net/core/dev.c:5197
__do_softirq+0x2bb/0x942 kernel/softirq.c:553

The buggy address belongs to the object at ffff88802f1dc000
which belongs to the cache kmalloc-4k of size 4096
The buggy address is located 18 bytes inside of
freed 4096-byte region [ffff88802f1dc000, ffff88802f1dd000)

The buggy address belongs to the physical page:
page:ffffea0000bc7600 refcount:1 mapcount:0 mapping:0000000000000000
index:0x0 pfn:0x2f1d8
head:ffffea0000bc7600 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
anon flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff)
page_type: 0xffffffff()
raw: 00fff00000000840 ffff888014c42140 0000000000000000 dead000000000001
raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask
0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC),
pid 1, tgid 1 (swapper/0), ts 12832348429, free_ts 0
set_page_owner include/linux/page_owner.h:31 [inline]
post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533
prep_new_page mm/page_alloc.c:1540 [inline]
get_page_from_freelist+0x33ea/0x3580 mm/page_alloc.c:3311
__alloc_pages+0x255/0x680 mm/page_alloc.c:4567
__alloc_pages_node include/linux/gfp.h:238 [inline]
alloc_pages_node include/linux/gfp.h:261 [inline]
alloc_slab_page+0x5f/0x160 mm/slub.c:2190
allocate_slab mm/slub.c:2354 [inline]
new_slab+0x84/0x2f0 mm/slub.c:2407
___slab_alloc+0xd17/0x13e0 mm/slub.c:3540
__slab_alloc mm/slub.c:3625 [inline]
__slab_alloc_node mm/slub.c:3678 [inline]
slab_alloc_node mm/slub.c:3850 [inline]
kmalloc_trace+0x264/0x360 mm/slub.c:4007
kmalloc include/linux/slab.h:590 [inline]
kzalloc include/linux/slab.h:711 [inline]
kobject_uevent_env+0x28b/0x8f0 lib/kobject_uevent.c:524
kernel_add_sysfs_param+0x10a/0x130 kernel/params.c:821
param_sysfs_builtin+0x16e/0x1f0 kernel/params.c:856
param_sysfs_builtin_init+0x31/0x40 kernel/params.c:990
do_one_initcall+0x238/0x830 init/main.c:1236
do_initcall_level+0x157/0x210 init/main.c:1298
do_initcalls+0x3f/0x80 init/main.c:1314
kernel_init_freeable+0x42f/0x5d0 init/main.c:1551
kernel_init+0x1d/0x2a0 init/main.c:1441
page_owner free stack trace missing

Memory state around the buggy address:
ffff88802f1dbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff88802f1dbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff88802f1dc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff88802f1dc080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff88802f1dc100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb

>
> If you fix this issue, please add the following tag to the commit:
> Reported-by: xingwei lee <xrivendell7@...il.com>
> Reported-by: yue sun <samsun1006219@...il.com>
> kernel: net-next e3350ba4a5b7573d4e14ee1dff8c414646435a04(lastest)
> kernel config: https://syzkaller.appspot.com/text?tag=KernelConfig&x=4a65fa9f077ead01
> with KASAN enabled
> compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
>
> ./root@...kaller:~# ./535
> [  168.288592][    C2]
> ==================================================================
> [  168.290954][    C2] BUG: KASAN: slab-use-after-free in
> ip_finish_output+0x8d/0x330
> [  168.293040][    C2] Read of size 1 at addr ffff8880349c4012 by task
> swapper/2/0
> [  168.295066][    C2]
> [  168.296007][    C2] CPU: 2 PID: 0 Comm: swapper/2 Not tainted
> 6.8.0-rc6-02015-ge3350ba4a5b7 #13
> [  168.298646][    C2] Hardware name: QEMU Standard PC (i440FX + PIIX,
> 1996), BIOS 1.16.2-1.fc38 04/01/2014
> [  168.301143][    C2] Call Trace:
> [  168.301993][    C2]  <IRQ>
> [  168.302726][    C2]  dump_stack_lvl+0xee/0x1e0
> [  168.303918][    C2]  print_report+0xc4/0x620
> [  168.305260][    C2]  ? __virt_addr_valid+0x67/0x5c0
> [  168.306598][    C2]  ? __phys_addr+0xd3/0x150
> [  168.308122][    C2]  kasan_report+0xda/0x110
> [  168.309283][    C2]  ? ip_finish_output+0x8d/0x330
> [  168.310631][    C2]  ? ip_finish_output+0x8d/0x330
> [  168.311918][    C2]  ip_finish_output+0x8d/0x330
> [  168.313060][    C2]  ip_output+0x144/0x2b0
> [  168.313944][    C2]  ip_local_out+0xb8/0x1b0
> [  168.314865][    C2]  ipvlan_process_v4_outbound+0x3a0/0x500
> [  168.316058][    C2]  ? ipvlan_route_v6_outbound+0x4b0/0x4b0
> [  168.317261][    C2]  ? ipvlan_get_L3_hdr+0x91/0xda0
> [  168.318312][    C2]  ipvlan_queue_xmit+0xdb3/0x11c0
> [  168.319360][    C2]  ? print_usage_bug.part.0+0x550/0x550
> [  168.320507][    C2]  ? ipvlan_handle_mode_l3+0x150/0x150
> [  168.321671][    C2]  ? validate_xmit_xfrm+0x4c0/0x1320
> [  168.322766][    C2]  ? netif_skb_features+0x3ca/0xce0
> [  168.323848][    C2]  ipvlan_start_xmit+0x4e/0x160
> [  168.324860][    C2]  dev_hard_start_xmit+0x141/0x720
> [  168.325923][    C2]  sch_direct_xmit+0x1bd/0xc70
> [  168.327068][    C2]  ? ktime_get+0x2c3/0x4c0
> [  168.328137][    C2]  ? qdisc_dequeue_head+0x290/0x370
> [  168.329317][    C2]  ? dev_watchdog+0x940/0x940
> [  168.330387][    C2]  ? tbf_dequeue+0x980/0xdc0
> [  168.331454][    C2]  __qdisc_run+0x577/0x1ad0
> [  168.332384][    C2]  net_tx_action+0x765/0xd10
> [  168.333548][    C2]  __do_softirq+0x21a/0x8de
> [  168.334486][    C2]  ? __lock_text_end+0x3/0x3
> [  168.335434][    C2]  irq_exit_rcu+0xb7/0x120
> [  168.336352][    C2]  sysvec_apic_timer_interrupt+0x95/0xb0
> [  168.337665][    C2]  </IRQ>
> [  168.338266][    C2]  <TASK>
>
>
> =* repro.c =*
> #define _GNU_SOURCE
>
> #include <arpa/inet.h>
> #include <dirent.h>
> #include <endian.h>
> #include <errno.h>
> #include <fcntl.h>
> #include <net/if.h>
> #include <net/if_arp.h>
> #include <netinet/in.h>
> #include <sched.h>
> #include <signal.h>
> #include <stdarg.h>
> #include <stdbool.h>
> #include <stdint.h>
> #include <stdio.h>
> #include <stdlib.h>
> #include <string.h>
> #include <sys/ioctl.h>
> #include <sys/mount.h>
> #include <sys/prctl.h>
> #include <sys/resource.h>
> #include <sys/socket.h>
> #include <sys/stat.h>
> #include <sys/syscall.h>
> #include <sys/time.h>
> #include <sys/types.h>
> #include <sys/uio.h>
> #include <sys/wait.h>
> #include <time.h>
> #include <unistd.h>
>
> #include <linux/capability.h>
> #include <linux/genetlink.h>
> #include <linux/if_addr.h>
> #include <linux/if_ether.h>
> #include <linux/if_link.h>
> #include <linux/if_tun.h>
> #include <linux/in6.h>
> #include <linux/ip.h>
> #include <linux/neighbour.h>
> #include <linux/net.h>
> #include <linux/netlink.h>
> #include <linux/rtnetlink.h>
> #include <linux/tcp.h>
> #include <linux/veth.h>
>
> static unsigned long long procid;
>
> static void sleep_ms(uint64_t ms) {
>   usleep(ms * 1000);
> }
>
> static uint64_t current_time_ms(void) {
>   struct timespec ts;
>   if (clock_gettime(CLOCK_MONOTONIC, &ts))
>     exit(1);
>   return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
> }
>
> static bool write_file(const char* file, const char* what, ...) {
>   char buf[1024];
>   va_list args;
>   va_start(args, what);
>   vsnprintf(buf, sizeof(buf), what, args);
>   va_end(args);
>   buf[sizeof(buf) - 1] = 0;
>   int len = strlen(buf);
>   int fd = open(file, O_WRONLY | O_CLOEXEC);
>   if (fd == -1)
>     return false;
>   if (write(fd, buf, len) != len) {
>     int err = errno;
>     close(fd);
>     errno = err;
>     return false;
>   }
>   close(fd);
>   return true;
> }
>
> struct nlmsg {
>   char* pos;
>   int nesting;
>   struct nlattr* nested[8];
>   char buf[4096];
> };
>
> static void netlink_init(struct nlmsg* nlmsg,
>                          int typ,
>                          int flags,
>                          const void* data,
>                          int size) {
>   memset(nlmsg, 0, sizeof(*nlmsg));
>   struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf;
>   hdr->nlmsg_type = typ;
>   hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags;
>   memcpy(hdr + 1, data, size);
>   nlmsg->pos = (char*)(hdr + 1) + NLMSG_ALIGN(size);
> }
>
> static void netlink_attr(struct nlmsg* nlmsg,
>                          int typ,
>                          const void* data,
>                          int size) {
>   struct nlattr* attr = (struct nlattr*)nlmsg->pos;
>   attr->nla_len = sizeof(*attr) + size;
>   attr->nla_type = typ;
>   if (size > 0)
>     memcpy(attr + 1, data, size);
>   nlmsg->pos += NLMSG_ALIGN(attr->nla_len);
> }
>
> static void netlink_nest(struct nlmsg* nlmsg, int typ) {
>   struct nlattr* attr = (struct nlattr*)nlmsg->pos;
>   attr->nla_type = typ;
>   nlmsg->pos += sizeof(*attr);
>   nlmsg->nested[nlmsg->nesting++] = attr;
> }
>
> static void netlink_done(struct nlmsg* nlmsg) {
>   struct nlattr* attr = nlmsg->nested[--nlmsg->nesting];
>   attr->nla_len = nlmsg->pos - (char*)attr;
> }
>
> static int netlink_send_ext(struct nlmsg* nlmsg,
>                             int sock,
>                             uint16_t reply_type,
>                             int* reply_len,
>                             bool dofail) {
>   if (nlmsg->pos > nlmsg->buf + sizeof(nlmsg->buf) || nlmsg->nesting)
>     exit(1);
>   struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf;
>   hdr->nlmsg_len = nlmsg->pos - nlmsg->buf;
>   struct sockaddr_nl addr;
>   memset(&addr, 0, sizeof(addr));
>   addr.nl_family = AF_NETLINK;
>   ssize_t n = sendto(sock, nlmsg->buf, hdr->nlmsg_len, 0,
>                      (struct sockaddr*)&addr, sizeof(addr));
>   if (n != (ssize_t)hdr->nlmsg_len) {
>     if (dofail)
>       exit(1);
>     return -1;
>   }
>   n = recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0);
>   if (reply_len)
>     *reply_len = 0;
>   if (n < 0) {
>     if (dofail)
>       exit(1);
>     return -1;
>   }
>   if (n < (ssize_t)sizeof(struct nlmsghdr)) {
>     errno = EINVAL;
>     if (dofail)
>       exit(1);
>     return -1;
>   }
>   if (hdr->nlmsg_type == NLMSG_DONE)
>     return 0;
>   if (reply_len && hdr->nlmsg_type == reply_type) {
>     *reply_len = n;
>     return 0;
>   }
>   if (n < (ssize_t)(sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr))) {
>     errno = EINVAL;
>     if (dofail)
>       exit(1);
>     return -1;
>   }
>   if (hdr->nlmsg_type != NLMSG_ERROR) {
>     errno = EINVAL;
>     if (dofail)
>       exit(1);
>     return -1;
>   }
>   errno = -((struct nlmsgerr*)(hdr + 1))->error;
>   return -errno;
> }
>
> static int netlink_send(struct nlmsg* nlmsg, int sock) {
>   return netlink_send_ext(nlmsg, sock, 0, NULL, true);
> }
>
> static int netlink_query_family_id(struct nlmsg* nlmsg,
>                                    int sock,
>                                    const char* family_name,
>                                    bool dofail) {
>   struct genlmsghdr genlhdr;
>   memset(&genlhdr, 0, sizeof(genlhdr));
>   genlhdr.cmd = CTRL_CMD_GETFAMILY;
>   netlink_init(nlmsg, GENL_ID_CTRL, 0, &genlhdr, sizeof(genlhdr));
>   netlink_attr(nlmsg, CTRL_ATTR_FAMILY_NAME, family_name,
>                strnlen(family_name, GENL_NAMSIZ - 1) + 1);
>   int n = 0;
>   int err = netlink_send_ext(nlmsg, sock, GENL_ID_CTRL, &n, dofail);
>   if (err < 0) {
>     return -1;
>   }
>   uint16_t id = 0;
>   struct nlattr* attr = (struct nlattr*)(nlmsg->buf + NLMSG_HDRLEN +
>                                          NLMSG_ALIGN(sizeof(genlhdr)));
>   for (; (char*)attr < nlmsg->buf + n;
>        attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) {
>     if (attr->nla_type == CTRL_ATTR_FAMILY_ID) {
>       id = *(uint16_t*)(attr + 1);
>       break;
>     }
>   }
>   if (!id) {
>     errno = EINVAL;
>     return -1;
>   }
>   recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0);
>   return id;
> }
>
> static int netlink_next_msg(struct nlmsg* nlmsg,
>                             unsigned int offset,
>                             unsigned int total_len) {
>   struct nlmsghdr* hdr = (struct nlmsghdr*)(nlmsg->buf + offset);
>   if (offset == total_len || offset + hdr->nlmsg_len > total_len)
>     return -1;
>   return hdr->nlmsg_len;
> }
>
> static void netlink_add_device_impl(struct nlmsg* nlmsg,
>                                     const char* type,
>                                     const char* name,
>                                     bool up) {
>   struct ifinfomsg hdr;
>   memset(&hdr, 0, sizeof(hdr));
>   if (up)
>     hdr.ifi_flags = hdr.ifi_change = IFF_UP;
>   netlink_init(nlmsg, RTM_NEWLINK, NLM_F_EXCL | NLM_F_CREATE, &hdr,
>                sizeof(hdr));
>   if (name)
>     netlink_attr(nlmsg, IFLA_IFNAME, name, strlen(name));
>   netlink_nest(nlmsg, IFLA_LINKINFO);
>   netlink_attr(nlmsg, IFLA_INFO_KIND, type, strlen(type));
> }
>
> static void netlink_add_device(struct nlmsg* nlmsg,
>                                int sock,
>                                const char* type,
>                                const char* name) {
>   netlink_add_device_impl(nlmsg, type, name, false);
>   netlink_done(nlmsg);
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_veth(struct nlmsg* nlmsg,
>                              int sock,
>                              const char* name,
>                              const char* peer) {
>   netlink_add_device_impl(nlmsg, "veth", name, false);
>   netlink_nest(nlmsg, IFLA_INFO_DATA);
>   netlink_nest(nlmsg, VETH_INFO_PEER);
>   nlmsg->pos += sizeof(struct ifinfomsg);
>   netlink_attr(nlmsg, IFLA_IFNAME, peer, strlen(peer));
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_xfrm(struct nlmsg* nlmsg, int sock, const char* name) {
>   netlink_add_device_impl(nlmsg, "xfrm", name, true);
>   netlink_nest(nlmsg, IFLA_INFO_DATA);
>   int if_id = 1;
>   netlink_attr(nlmsg, 2, &if_id, sizeof(if_id));
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_hsr(struct nlmsg* nlmsg,
>                             int sock,
>                             const char* name,
>                             const char* slave1,
>                             const char* slave2) {
>   netlink_add_device_impl(nlmsg, "hsr", name, false);
>   netlink_nest(nlmsg, IFLA_INFO_DATA);
>   int ifindex1 = if_nametoindex(slave1);
>   netlink_attr(nlmsg, IFLA_HSR_SLAVE1, &ifindex1, sizeof(ifindex1));
>   int ifindex2 = if_nametoindex(slave2);
>   netlink_attr(nlmsg, IFLA_HSR_SLAVE2, &ifindex2, sizeof(ifindex2));
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_linked(struct nlmsg* nlmsg,
>                                int sock,
>                                const char* type,
>                                const char* name,
>                                const char* link) {
>   netlink_add_device_impl(nlmsg, type, name, false);
>   netlink_done(nlmsg);
>   int ifindex = if_nametoindex(link);
>   netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex));
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_vlan(struct nlmsg* nlmsg,
>                              int sock,
>                              const char* name,
>                              const char* link,
>                              uint16_t id,
>                              uint16_t proto) {
>   netlink_add_device_impl(nlmsg, "vlan", name, false);
>   netlink_nest(nlmsg, IFLA_INFO_DATA);
>   netlink_attr(nlmsg, IFLA_VLAN_ID, &id, sizeof(id));
>   netlink_attr(nlmsg, IFLA_VLAN_PROTOCOL, &proto, sizeof(proto));
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   int ifindex = if_nametoindex(link);
>   netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex));
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_macvlan(struct nlmsg* nlmsg,
>                                 int sock,
>                                 const char* name,
>                                 const char* link) {
>   netlink_add_device_impl(nlmsg, "macvlan", name, false);
>   netlink_nest(nlmsg, IFLA_INFO_DATA);
>   uint32_t mode = MACVLAN_MODE_BRIDGE;
>   netlink_attr(nlmsg, IFLA_MACVLAN_MODE, &mode, sizeof(mode));
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   int ifindex = if_nametoindex(link);
>   netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex));
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_geneve(struct nlmsg* nlmsg,
>                                int sock,
>                                const char* name,
>                                uint32_t vni,
>                                struct in_addr* addr4,
>                                struct in6_addr* addr6) {
>   netlink_add_device_impl(nlmsg, "geneve", name, false);
>   netlink_nest(nlmsg, IFLA_INFO_DATA);
>   netlink_attr(nlmsg, IFLA_GENEVE_ID, &vni, sizeof(vni));
>   if (addr4)
>     netlink_attr(nlmsg, IFLA_GENEVE_REMOTE, addr4, sizeof(*addr4));
>   if (addr6)
>     netlink_attr(nlmsg, IFLA_GENEVE_REMOTE6, addr6, sizeof(*addr6));
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> #define IFLA_IPVLAN_FLAGS 2
> #define IPVLAN_MODE_L3S 2
> #undef IPVLAN_F_VEPA
> #define IPVLAN_F_VEPA 2
>
> static void netlink_add_ipvlan(struct nlmsg* nlmsg,
>                                int sock,
>                                const char* name,
>                                const char* link,
>                                uint16_t mode,
>                                uint16_t flags) {
>   netlink_add_device_impl(nlmsg, "ipvlan", name, false);
>   netlink_nest(nlmsg, IFLA_INFO_DATA);
>   netlink_attr(nlmsg, IFLA_IPVLAN_MODE, &mode, sizeof(mode));
>   netlink_attr(nlmsg, IFLA_IPVLAN_FLAGS, &flags, sizeof(flags));
>   netlink_done(nlmsg);
>   netlink_done(nlmsg);
>   int ifindex = if_nametoindex(link);
>   netlink_attr(nlmsg, IFLA_LINK, &ifindex, sizeof(ifindex));
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static void netlink_device_change(struct nlmsg* nlmsg,
>                                   int sock,
>                                   const char* name,
>                                   bool up,
>                                   const char* master,
>                                   const void* mac,
>                                   int macsize,
>                                   const char* new_name) {
>   struct ifinfomsg hdr;
>   memset(&hdr, 0, sizeof(hdr));
>   if (up)
>     hdr.ifi_flags = hdr.ifi_change = IFF_UP;
>   hdr.ifi_index = if_nametoindex(name);
>   netlink_init(nlmsg, RTM_NEWLINK, 0, &hdr, sizeof(hdr));
>   if (new_name)
>     netlink_attr(nlmsg, IFLA_IFNAME, new_name, strlen(new_name));
>   if (master) {
>     int ifindex = if_nametoindex(master);
>     netlink_attr(nlmsg, IFLA_MASTER, &ifindex, sizeof(ifindex));
>   }
>   if (macsize)
>     netlink_attr(nlmsg, IFLA_ADDRESS, mac, macsize);
>   int err = netlink_send(nlmsg, sock);
>   if (err < 0) {
>   }
> }
>
> static int netlink_add_addr(struct nlmsg* nlmsg,
>                             int sock,
>                             const char* dev,
>                             const void* addr,
>                             int addrsize) {
>   struct ifaddrmsg hdr;
>   memset(&hdr, 0, sizeof(hdr));
>   hdr.ifa_family = addrsize == 4 ? AF_INET : AF_INET6;
>   hdr.ifa_prefixlen = addrsize == 4 ? 24 : 120;
>   hdr.ifa_scope = RT_SCOPE_UNIVERSE;
>   hdr.ifa_index = if_nametoindex(dev);
>   netlink_init(nlmsg, RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr,
>                sizeof(hdr));
>   netlink_attr(nlmsg, IFA_LOCAL, addr, addrsize);
>   netlink_attr(nlmsg, IFA_ADDRESS, addr, addrsize);
>   return netlink_send(nlmsg, sock);
> }
>
> static void netlink_add_addr4(struct nlmsg* nlmsg,
>                               int sock,
>                               const char* dev,
>                               const char* addr) {
>   struct in_addr in_addr;
>   inet_pton(AF_INET, addr, &in_addr);
>   int err = netlink_add_addr(nlmsg, sock, dev, &in_addr, sizeof(in_addr));
>   if (err < 0) {
>   }
> }
>
> static void netlink_add_addr6(struct nlmsg* nlmsg,
>                               int sock,
>                               const char* dev,
>                               const char* addr) {
>   struct in6_addr in6_addr;
>   inet_pton(AF_INET6, addr, &in6_addr);
>   int err = netlink_add_addr(nlmsg, sock, dev, &in6_addr, sizeof(in6_addr));
>   if (err < 0) {
>   }
> }
>
> static struct nlmsg nlmsg;
>
> #define DEVLINK_FAMILY_NAME "devlink"
>
> #define DEVLINK_CMD_PORT_GET 5
> #define DEVLINK_ATTR_BUS_NAME 1
> #define DEVLINK_ATTR_DEV_NAME 2
> #define DEVLINK_ATTR_NETDEV_NAME 7
>
> static struct nlmsg nlmsg2;
>
> static void initialize_devlink_ports(const char* bus_name,
>                                      const char* dev_name,
>                                      const char* netdev_prefix) {
>   struct genlmsghdr genlhdr;
>   int len, total_len, id, err, offset;
>   uint16_t netdev_index;
>   int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC);
>   if (sock == -1)
>     exit(1);
>   int rtsock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
>   if (rtsock == -1)
>     exit(1);
>   id = netlink_query_family_id(&nlmsg, sock, DEVLINK_FAMILY_NAME, true);
>   if (id == -1)
>     goto error;
>   memset(&genlhdr, 0, sizeof(genlhdr));
>   genlhdr.cmd = DEVLINK_CMD_PORT_GET;
>   netlink_init(&nlmsg, id, NLM_F_DUMP, &genlhdr, sizeof(genlhdr));
>   netlink_attr(&nlmsg, DEVLINK_ATTR_BUS_NAME, bus_name, strlen(bus_name) + 1);
>   netlink_attr(&nlmsg, DEVLINK_ATTR_DEV_NAME, dev_name, strlen(dev_name) + 1);
>   err = netlink_send_ext(&nlmsg, sock, id, &total_len, true);
>   if (err < 0) {
>     goto error;
>   }
>   offset = 0;
>   netdev_index = 0;
>   while ((len = netlink_next_msg(&nlmsg, offset, total_len)) != -1) {
>     struct nlattr* attr = (struct nlattr*)(nlmsg.buf + offset + NLMSG_HDRLEN +
>                                            NLMSG_ALIGN(sizeof(genlhdr)));
>     for (; (char*)attr < nlmsg.buf + offset + len;
>          attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) {
>       if (attr->nla_type == DEVLINK_ATTR_NETDEV_NAME) {
>         char* port_name;
>         char netdev_name[IFNAMSIZ];
>         port_name = (char*)(attr + 1);
>         snprintf(netdev_name, sizeof(netdev_name), "%s%d", netdev_prefix,
>                  netdev_index);
>         netlink_device_change(&nlmsg2, rtsock, port_name, true, 0, 0, 0,
>                               netdev_name);
>         break;
>       }
>     }
>     offset += len;
>     netdev_index++;
>   }
> error:
>   close(rtsock);
>   close(sock);
> }
>
> #define DEV_IPV4 "172.20.20.%d"
> #define DEV_IPV6 "fe80::%02x"
> #define DEV_MAC 0x00aaaaaaaaaa
>
> static void netdevsim_add(unsigned int addr, unsigned int port_count) {
>   write_file("/sys/bus/netdevsim/del_device", "%u", addr);
>   if (write_file("/sys/bus/netdevsim/new_device", "%u %u", addr, port_count)) {
>     char buf[32];
>     snprintf(buf, sizeof(buf), "netdevsim%d", addr);
>     initialize_devlink_ports("netdevsim", buf, "netdevsim");
>   }
> }
>
> #define WG_GENL_NAME "wireguard"
> enum wg_cmd {
>   WG_CMD_GET_DEVICE,
>   WG_CMD_SET_DEVICE,
> };
> enum wgdevice_attribute {
>   WGDEVICE_A_UNSPEC,
>   WGDEVICE_A_IFINDEX,
>   WGDEVICE_A_IFNAME,
>   WGDEVICE_A_PRIVATE_KEY,
>   WGDEVICE_A_PUBLIC_KEY,
>   WGDEVICE_A_FLAGS,
>   WGDEVICE_A_LISTEN_PORT,
>   WGDEVICE_A_FWMARK,
>   WGDEVICE_A_PEERS,
> };
> enum wgpeer_attribute {
>   WGPEER_A_UNSPEC,
>   WGPEER_A_PUBLIC_KEY,
>   WGPEER_A_PRESHARED_KEY,
>   WGPEER_A_FLAGS,
>   WGPEER_A_ENDPOINT,
>   WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL,
>   WGPEER_A_LAST_HANDSHAKE_TIME,
>   WGPEER_A_RX_BYTES,
>   WGPEER_A_TX_BYTES,
>   WGPEER_A_ALLOWEDIPS,
>   WGPEER_A_PROTOCOL_VERSION,
> };
> enum wgallowedip_attribute {
>   WGALLOWEDIP_A_UNSPEC,
>   WGALLOWEDIP_A_FAMILY,
>   WGALLOWEDIP_A_IPADDR,
>   WGALLOWEDIP_A_CIDR_MASK,
> };
>
> static void netlink_wireguard_setup(void) {
>   const char ifname_a[] = "wg0";
>   const char ifname_b[] = "wg1";
>   const char ifname_c[] = "wg2";
>   const char private_a[] =
>       "\xa0\x5c\xa8\x4f\x6c\x9c\x8e\x38\x53\xe2\xfd\x7a\x70\xae\x0f\xb2\x0f\xa1"
>       "\x52\x60\x0c\xb0\x08\x45\x17\x4f\x08\x07\x6f\x8d\x78\x43";
>   const char private_b[] =
>       "\xb0\x80\x73\xe8\xd4\x4e\x91\xe3\xda\x92\x2c\x22\x43\x82\x44\xbb\x88\x5c"
>       "\x69\xe2\x69\xc8\xe9\xd8\x35\xb1\x14\x29\x3a\x4d\xdc\x6e";
>   const char private_c[] =
>       "\xa0\xcb\x87\x9a\x47\xf5\xbc\x64\x4c\x0e\x69\x3f\xa6\xd0\x31\xc7\x4a\x15"
>       "\x53\xb6\xe9\x01\xb9\xff\x2f\x51\x8c\x78\x04\x2f\xb5\x42";
>   const char public_a[] =
>       "\x97\x5c\x9d\x81\xc9\x83\xc8\x20\x9e\xe7\x81\x25\x4b\x89\x9f\x8e\xd9\x25"
>       "\xae\x9f\x09\x23\xc2\x3c\x62\xf5\x3c\x57\xcd\xbf\x69\x1c";
>   const char public_b[] =
>       "\xd1\x73\x28\x99\xf6\x11\xcd\x89\x94\x03\x4d\x7f\x41\x3d\xc9\x57\x63\x0e"
>       "\x54\x93\xc2\x85\xac\xa4\x00\x65\xcb\x63\x11\xbe\x69\x6b";
>   const char public_c[] =
>       "\xf4\x4d\xa3\x67\xa8\x8e\xe6\x56\x4f\x02\x02\x11\x45\x67\x27\x08\x2f\x5c"
>       "\xeb\xee\x8b\x1b\xf5\xeb\x73\x37\x34\x1b\x45\x9b\x39\x22";
>   const uint16_t listen_a = 20001;
>   const uint16_t listen_b = 20002;
>   const uint16_t listen_c = 20003;
>   const uint16_t af_inet = AF_INET;
>   const uint16_t af_inet6 = AF_INET6;
>   const struct sockaddr_in endpoint_b_v4 = {
>       .sin_family = AF_INET,
>       .sin_port = htons(listen_b),
>       .sin_addr = {htonl(INADDR_LOOPBACK)}};
>   const struct sockaddr_in endpoint_c_v4 = {
>       .sin_family = AF_INET,
>       .sin_port = htons(listen_c),
>       .sin_addr = {htonl(INADDR_LOOPBACK)}};
>   struct sockaddr_in6 endpoint_a_v6 = {.sin6_family = AF_INET6,
>                                        .sin6_port = htons(listen_a)};
>   endpoint_a_v6.sin6_addr = in6addr_loopback;
>   struct sockaddr_in6 endpoint_c_v6 = {.sin6_family = AF_INET6,
>                                        .sin6_port = htons(listen_c)};
>   endpoint_c_v6.sin6_addr = in6addr_loopback;
>   const struct in_addr first_half_v4 = {0};
>   const struct in_addr second_half_v4 = {(uint32_t)htonl(128 << 24)};
>   const struct in6_addr first_half_v6 = {{{0}}};
>   const struct in6_addr second_half_v6 = {{{0x80}}};
>   const uint8_t half_cidr = 1;
>   const uint16_t persistent_keepalives[] = {1, 3, 7, 9, 14, 19};
>   struct genlmsghdr genlhdr = {.cmd = WG_CMD_SET_DEVICE, .version = 1};
>   int sock;
>   int id, err;
>   sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC);
>   if (sock == -1) {
>     return;
>   }
>   id = netlink_query_family_id(&nlmsg, sock, WG_GENL_NAME, true);
>   if (id == -1)
>     goto error;
>   netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr));
>   netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_a, strlen(ifname_a) + 1);
>   netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_a, 32);
>   netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_a, 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32);
>   netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4,
>                sizeof(endpoint_b_v4));
>   netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL,
>                &persistent_keepalives[0], 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4,
>                sizeof(first_half_v4));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6,
>                sizeof(first_half_v6));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32);
>   netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v6,
>                sizeof(endpoint_c_v6));
>   netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL,
>                &persistent_keepalives[1], 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4,
>                sizeof(second_half_v4));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6,
>                sizeof(second_half_v6));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   err = netlink_send(&nlmsg, sock);
>   if (err < 0) {
>   }
>   netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr));
>   netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_b, strlen(ifname_b) + 1);
>   netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_b, 32);
>   netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_b, 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32);
>   netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6,
>                sizeof(endpoint_a_v6));
>   netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL,
>                &persistent_keepalives[2], 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4,
>                sizeof(first_half_v4));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6,
>                sizeof(first_half_v6));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_c, 32);
>   netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_c_v4,
>                sizeof(endpoint_c_v4));
>   netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL,
>                &persistent_keepalives[3], 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4,
>                sizeof(second_half_v4));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6,
>                sizeof(second_half_v6));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   err = netlink_send(&nlmsg, sock);
>   if (err < 0) {
>   }
>   netlink_init(&nlmsg, id, 0, &genlhdr, sizeof(genlhdr));
>   netlink_attr(&nlmsg, WGDEVICE_A_IFNAME, ifname_c, strlen(ifname_c) + 1);
>   netlink_attr(&nlmsg, WGDEVICE_A_PRIVATE_KEY, private_c, 32);
>   netlink_attr(&nlmsg, WGDEVICE_A_LISTEN_PORT, &listen_c, 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGDEVICE_A_PEERS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_a, 32);
>   netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_a_v6,
>                sizeof(endpoint_a_v6));
>   netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL,
>                &persistent_keepalives[4], 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v4,
>                sizeof(first_half_v4));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &first_half_v6,
>                sizeof(first_half_v6));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGPEER_A_PUBLIC_KEY, public_b, 32);
>   netlink_attr(&nlmsg, WGPEER_A_ENDPOINT, &endpoint_b_v4,
>                sizeof(endpoint_b_v4));
>   netlink_attr(&nlmsg, WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL,
>                &persistent_keepalives[5], 2);
>   netlink_nest(&nlmsg, NLA_F_NESTED | WGPEER_A_ALLOWEDIPS);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v4,
>                sizeof(second_half_v4));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_nest(&nlmsg, NLA_F_NESTED | 0);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_FAMILY, &af_inet6, 2);
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_IPADDR, &second_half_v6,
>                sizeof(second_half_v6));
>   netlink_attr(&nlmsg, WGALLOWEDIP_A_CIDR_MASK, &half_cidr, 1);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   netlink_done(&nlmsg);
>   err = netlink_send(&nlmsg, sock);
>   if (err < 0) {
>   }
>
> error:
>   close(sock);
> }
>
> static void initialize_netdevices(void) {
>   char netdevsim[16];
>   sprintf(netdevsim, "netdevsim%d", (int)procid);
>   struct {
>     const char* type;
>     const char* dev;
>   } devtypes[] = {
>       {"ip6gretap", "ip6gretap0"}, {"bridge", "bridge0"}, {"vcan", "vcan0"},
>       {"bond", "bond0"},           {"team", "team0"},     {"dummy", "dummy0"},
>       {"nlmon", "nlmon0"},         {"caif", "caif0"},     {"batadv", "batadv0"},
>       {"vxcan", "vxcan1"},         {"veth", 0},           {"wireguard", "wg0"},
>       {"wireguard", "wg1"},        {"wireguard", "wg2"},
>   };
>   const char* devmasters[] = {"bridge", "bond", "team", "batadv"};
>   struct {
>     const char* name;
>     int macsize;
>     bool noipv6;
>   } devices[] = {
>       {"lo", ETH_ALEN},
>       {"sit0", 0},
>       {"bridge0", ETH_ALEN},
>       {"vcan0", 0, true},
>       {"tunl0", 0},
>       {"gre0", 0},
>       {"gretap0", ETH_ALEN},
>       {"ip_vti0", 0},
>       {"ip6_vti0", 0},
>       {"ip6tnl0", 0},
>       {"ip6gre0", 0},
>       {"ip6gretap0", ETH_ALEN},
>       {"erspan0", ETH_ALEN},
>       {"bond0", ETH_ALEN},
>       {"veth0", ETH_ALEN},
>       {"veth1", ETH_ALEN},
>       {"team0", ETH_ALEN},
>       {"veth0_to_bridge", ETH_ALEN},
>       {"veth1_to_bridge", ETH_ALEN},
>       {"veth0_to_bond", ETH_ALEN},
>       {"veth1_to_bond", ETH_ALEN},
>       {"veth0_to_team", ETH_ALEN},
>       {"veth1_to_team", ETH_ALEN},
>       {"veth0_to_hsr", ETH_ALEN},
>       {"veth1_to_hsr", ETH_ALEN},
>       {"hsr0", 0},
>       {"dummy0", ETH_ALEN},
>       {"nlmon0", 0},
>       {"vxcan0", 0, true},
>       {"vxcan1", 0, true},
>       {"caif0", ETH_ALEN},
>       {"batadv0", ETH_ALEN},
>       {netdevsim, ETH_ALEN},
>       {"xfrm0", ETH_ALEN},
>       {"veth0_virt_wifi", ETH_ALEN},
>       {"veth1_virt_wifi", ETH_ALEN},
>       {"virt_wifi0", ETH_ALEN},
>       {"veth0_vlan", ETH_ALEN},
>       {"veth1_vlan", ETH_ALEN},
>       {"vlan0", ETH_ALEN},
>       {"vlan1", ETH_ALEN},
>       {"macvlan0", ETH_ALEN},
>       {"macvlan1", ETH_ALEN},
>       {"ipvlan0", ETH_ALEN},
>       {"ipvlan1", ETH_ALEN},
>       {"veth0_macvtap", ETH_ALEN},
>       {"veth1_macvtap", ETH_ALEN},
>       {"macvtap0", ETH_ALEN},
>       {"macsec0", ETH_ALEN},
>       {"veth0_to_batadv", ETH_ALEN},
>       {"veth1_to_batadv", ETH_ALEN},
>       {"batadv_slave_0", ETH_ALEN},
>       {"batadv_slave_1", ETH_ALEN},
>       {"geneve0", ETH_ALEN},
>       {"geneve1", ETH_ALEN},
>       {"wg0", 0},
>       {"wg1", 0},
>       {"wg2", 0},
>   };
>   int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
>   if (sock == -1)
>     exit(1);
>   unsigned i;
>   for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++)
>     netlink_add_device(&nlmsg, sock, devtypes[i].type, devtypes[i].dev);
>   for (i = 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) {
>     char master[32], slave0[32], veth0[32], slave1[32], veth1[32];
>     sprintf(slave0, "%s_slave_0", devmasters[i]);
>     sprintf(veth0, "veth0_to_%s", devmasters[i]);
>     netlink_add_veth(&nlmsg, sock, slave0, veth0);
>     sprintf(slave1, "%s_slave_1", devmasters[i]);
>     sprintf(veth1, "veth1_to_%s", devmasters[i]);
>     netlink_add_veth(&nlmsg, sock, slave1, veth1);
>     sprintf(master, "%s0", devmasters[i]);
>     netlink_device_change(&nlmsg, sock, slave0, false, master, 0, 0, NULL);
>     netlink_device_change(&nlmsg, sock, slave1, false, master, 0, 0, NULL);
>   }
>   netlink_add_xfrm(&nlmsg, sock, "xfrm0");
>   netlink_device_change(&nlmsg, sock, "bridge_slave_0", true, 0, 0, 0, NULL);
>   netlink_device_change(&nlmsg, sock, "bridge_slave_1", true, 0, 0, 0, NULL);
>   netlink_add_veth(&nlmsg, sock, "hsr_slave_0", "veth0_to_hsr");
>   netlink_add_veth(&nlmsg, sock, "hsr_slave_1", "veth1_to_hsr");
>   netlink_add_hsr(&nlmsg, sock, "hsr0", "hsr_slave_0", "hsr_slave_1");
>   netlink_device_change(&nlmsg, sock, "hsr_slave_0", true, 0, 0, 0, NULL);
>   netlink_device_change(&nlmsg, sock, "hsr_slave_1", true, 0, 0, 0, NULL);
>   netlink_add_veth(&nlmsg, sock, "veth0_virt_wifi", "veth1_virt_wifi");
>   netlink_add_linked(&nlmsg, sock, "virt_wifi", "virt_wifi0",
>                      "veth1_virt_wifi");
>   netlink_add_veth(&nlmsg, sock, "veth0_vlan", "veth1_vlan");
>   netlink_add_vlan(&nlmsg, sock, "vlan0", "veth0_vlan", 0, htons(ETH_P_8021Q));
>   netlink_add_vlan(&nlmsg, sock, "vlan1", "veth0_vlan", 1, htons(ETH_P_8021AD));
>   netlink_add_macvlan(&nlmsg, sock, "macvlan0", "veth1_vlan");
>   netlink_add_macvlan(&nlmsg, sock, "macvlan1", "veth1_vlan");
>   netlink_add_ipvlan(&nlmsg, sock, "ipvlan0", "veth0_vlan", IPVLAN_MODE_L2, 0);
>   netlink_add_ipvlan(&nlmsg, sock, "ipvlan1", "veth0_vlan", IPVLAN_MODE_L3S,
>                      IPVLAN_F_VEPA);
>   netlink_add_veth(&nlmsg, sock, "veth0_macvtap", "veth1_macvtap");
>   netlink_add_linked(&nlmsg, sock, "macvtap", "macvtap0", "veth0_macvtap");
>   netlink_add_linked(&nlmsg, sock, "macsec", "macsec0", "veth1_macvtap");
>   char addr[32];
>   sprintf(addr, DEV_IPV4, 14 + 10);
>   struct in_addr geneve_addr4;
>   if (inet_pton(AF_INET, addr, &geneve_addr4) <= 0)
>     exit(1);
>   struct in6_addr geneve_addr6;
>   if (inet_pton(AF_INET6, "fc00::01", &geneve_addr6) <= 0)
>     exit(1);
>   netlink_add_geneve(&nlmsg, sock, "geneve0", 0, &geneve_addr4, 0);
>   netlink_add_geneve(&nlmsg, sock, "geneve1", 1, 0, &geneve_addr6);
>   netdevsim_add((int)procid, 4);
>   netlink_wireguard_setup();
>   for (i = 0; i < sizeof(devices) / (sizeof(devices[0])); i++) {
>     char addr[32];
>     sprintf(addr, DEV_IPV4, i + 10);
>     netlink_add_addr4(&nlmsg, sock, devices[i].name, addr);
>     if (!devices[i].noipv6) {
>       sprintf(addr, DEV_IPV6, i + 10);
>       netlink_add_addr6(&nlmsg, sock, devices[i].name, addr);
>     }
>     uint64_t macaddr = DEV_MAC + ((i + 10ull) << 40);
>     netlink_device_change(&nlmsg, sock, devices[i].name, true, 0, &macaddr,
>                           devices[i].macsize, NULL);
>   }
>   close(sock);
> }
> static void initialize_netdevices_init(void) {
>   int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
>   if (sock == -1)
>     exit(1);
>   struct {
>     const char* type;
>     int macsize;
>     bool noipv6;
>     bool noup;
>   } devtypes[] = {
>       {"nr", 7, true},
>       {"rose", 5, true, true},
>   };
>   unsigned i;
>   for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) {
>     char dev[32], addr[32];
>     sprintf(dev, "%s%d", devtypes[i].type, (int)procid);
>     sprintf(addr, "172.30.%d.%d", i, (int)procid + 1);
>     netlink_add_addr4(&nlmsg, sock, dev, addr);
>     if (!devtypes[i].noipv6) {
>       sprintf(addr, "fe88::%02x:%02x", i, (int)procid + 1);
>       netlink_add_addr6(&nlmsg, sock, dev, addr);
>     }
>     int macsize = devtypes[i].macsize;
>     uint64_t macaddr = 0xbbbbbb +
>                        ((unsigned long long)i << (8 * (macsize - 2))) +
>                        (procid << (8 * (macsize - 1)));
>     netlink_device_change(&nlmsg, sock, dev, !devtypes[i].noup, 0, &macaddr,
>                           macsize, NULL);
>   }
>   close(sock);
> }
>
> #define MAX_FDS 30
>
> static long syz_genetlink_get_family_id(volatile long name,
>                                         volatile long sock_arg) {
>   int fd = sock_arg;
>   if (fd < 0) {
>     fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC);
>     if (fd == -1) {
>       return -1;
>     }
>   }
>   struct nlmsg nlmsg_tmp;
>   int ret = netlink_query_family_id(&nlmsg_tmp, fd, (char*)name, false);
>   if ((int)sock_arg < 0)
>     close(fd);
>   if (ret < 0) {
>     return -1;
>   }
>   return ret;
> }
>
> static void setup_common() {
>   if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) {
>   }
> }
>
> static void setup_binderfs() {
>   if (mkdir("/dev/binderfs", 0777)) {
>   }
>   if (mount("binder", "/dev/binderfs", "binder", 0, NULL)) {
>   }
>   if (symlink("/dev/binderfs", "./binderfs")) {
>   }
> }
>
> static void loop();
>
> static void sandbox_common() {
>   prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
>   setsid();
>   struct rlimit rlim;
>   rlim.rlim_cur = rlim.rlim_max = (200 << 20);
>   setrlimit(RLIMIT_AS, &rlim);
>   rlim.rlim_cur = rlim.rlim_max = 32 << 20;
>   setrlimit(RLIMIT_MEMLOCK, &rlim);
>   rlim.rlim_cur = rlim.rlim_max = 136 << 20;
>   setrlimit(RLIMIT_FSIZE, &rlim);
>   rlim.rlim_cur = rlim.rlim_max = 1 << 20;
>   setrlimit(RLIMIT_STACK, &rlim);
>   rlim.rlim_cur = rlim.rlim_max = 128 << 20;
>   setrlimit(RLIMIT_CORE, &rlim);
>   rlim.rlim_cur = rlim.rlim_max = 256;
>   setrlimit(RLIMIT_NOFILE, &rlim);
>   if (unshare(CLONE_NEWNS)) {
>   }
>   if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, NULL)) {
>   }
>   if (unshare(CLONE_NEWIPC)) {
>   }
>   if (unshare(0x02000000)) {
>   }
>   if (unshare(CLONE_NEWUTS)) {
>   }
>   if (unshare(CLONE_SYSVSEM)) {
>   }
>   typedef struct {
>     const char* name;
>     const char* value;
>   } sysctl_t;
>   static const sysctl_t sysctls[] = {
>       {"/proc/sys/kernel/shmmax", "16777216"},
>       {"/proc/sys/kernel/shmall", "536870912"},
>       {"/proc/sys/kernel/shmmni", "1024"},
>       {"/proc/sys/kernel/msgmax", "8192"},
>       {"/proc/sys/kernel/msgmni", "1024"},
>       {"/proc/sys/kernel/msgmnb", "1024"},
>       {"/proc/sys/kernel/sem", "1024 1048576 500 1024"},
>   };
>   unsigned i;
>   for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++)
>     write_file(sysctls[i].name, sysctls[i].value);
> }
>
> static int wait_for_loop(int pid) {
>   if (pid < 0)
>     exit(1);
>   int status = 0;
>   while (waitpid(-1, &status, __WALL) != pid) {
>   }
>   return WEXITSTATUS(status);
> }
>
> static void drop_caps(void) {
>   struct __user_cap_header_struct cap_hdr = {};
>   struct __user_cap_data_struct cap_data[2] = {};
>   cap_hdr.version = _LINUX_CAPABILITY_VERSION_3;
>   cap_hdr.pid = getpid();
>   if (syscall(SYS_capget, &cap_hdr, &cap_data))
>     exit(1);
>   const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE);
>   cap_data[0].effective &= ~drop;
>   cap_data[0].permitted &= ~drop;
>   cap_data[0].inheritable &= ~drop;
>   if (syscall(SYS_capset, &cap_hdr, &cap_data))
>     exit(1);
> }
>
> static int do_sandbox_none(void) {
>   if (unshare(CLONE_NEWPID)) {
>   }
>   int pid = fork();
>   if (pid != 0)
>     return wait_for_loop(pid);
>   setup_common();
>   sandbox_common();
>   drop_caps();
>   initialize_netdevices_init();
>   if (unshare(CLONE_NEWNET)) {
>   }
>   write_file("/proc/sys/net/ipv4/ping_group_range", "0 65535");
>   initialize_netdevices();
>   setup_binderfs();
>   loop();
>   exit(1);
> }
>
> static void kill_and_wait(int pid, int* status) {
>   kill(-pid, SIGKILL);
>   kill(pid, SIGKILL);
>   for (int i = 0; i < 100; i++) {
>     if (waitpid(-1, status, WNOHANG | __WALL) == pid)
>       return;
>     usleep(1000);
>   }
>   DIR* dir = opendir("/sys/fs/fuse/connections");
>   if (dir) {
>     for (;;) {
>       struct dirent* ent = readdir(dir);
>       if (!ent)
>         break;
>       if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0)
>         continue;
>       char abort[300];
>       snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort",
>                ent->d_name);
>       int fd = open(abort, O_WRONLY);
>       if (fd == -1) {
>         continue;
>       }
>       if (write(fd, abort, 1) < 0) {
>       }
>       close(fd);
>     }
>     closedir(dir);
>   } else {
>   }
>   while (waitpid(-1, status, __WALL) != pid) {
>   }
> }
>
> static void setup_test() {
>   prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
>   setpgrp();
>   write_file("/proc/self/oom_score_adj", "1000");
> }
>
> static void close_fds() {
>   for (int fd = 3; fd < MAX_FDS; fd++)
>     close(fd);
> }
>
> static void execute_one(void);
>
> #define WAIT_FLAGS __WALL
>
> static void loop(void) {
>   int iter = 0;
>   for (;; iter++) {
>     int pid = fork();
>     if (pid < 0)
>       exit(1);
>     if (pid == 0) {
>       setup_test();
>       execute_one();
>       close_fds();
>       exit(0);
>     }
>     int status = 0;
>     uint64_t start = current_time_ms();
>     for (;;) {
>       if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
>         break;
>       sleep_ms(1);
>       if (current_time_ms() - start < 5000)
>         continue;
>       kill_and_wait(pid, &status);
>       break;
>     }
>   }
> }
>
> uint64_t r[4] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff,
>                  0x0};
>
> void execute_one(void) {
>   intptr_t res = 0;
>   res = syscall(__NR_socket, /*domain=*/0x11ul, /*type=*/3ul, /*proto=*/0x300);
>   if (res != -1)
>     r[0] = res;
>   *(uint32_t*)0x20006ffc = 0x200;
>   syscall(__NR_setsockopt, /*fd=*/r[0], /*level=*/0x107, /*optname=*/0xf,
>           /*optval=*/0x20006ffcul, /*optlen=*/0xe50fb6c50bc849c9ul);
>   res = syscall(__NR_socket, /*domain=*/0x10ul, /*type=*/3ul, /*proto=*/0);
>   if (res != -1)
>     r[1] = res;
>   *(uint64_t*)0x20001340 = 0;
>   *(uint32_t*)0x20001348 = 0;
>   *(uint64_t*)0x20001350 = 0x20000800;
>   *(uint64_t*)0x20000800 = 0;
>   *(uint64_t*)0x20000808 = 0;
>   *(uint64_t*)0x20000810 = 0;
>   *(uint64_t*)0x20000818 = 0;
>   *(uint64_t*)0x20000820 = 0;
>   *(uint64_t*)0x20000828 = 0;
>   *(uint64_t*)0x20000830 = 0x200001c0;
>   memcpy((void*)0x200001c0,
>          "\x8f\xc2\x86\x98\x2d\xf8\x34\x00\x25\x8d\x0b\xce\x45\x0d\xcb\x27\x3c"
>          "\x88\x0f\x76\x6d\x6d\x47\xbf\x05\xa0\x14\x6a\x7a\xb1\xcc\xa6\x71\x44"
>          "\x75\xe7\x55\xea\xe9\xcc\x4c\x43\x05",
>          43);
>   *(uint64_t*)0x20000838 = 0x2b;
>   *(uint64_t*)0x20000840 = 0;
>   *(uint64_t*)0x20000848 = 0;
>   *(uint64_t*)0x20000850 = 0;
>   *(uint64_t*)0x20000858 = 0;
>   *(uint64_t*)0x20000860 = 0;
>   *(uint64_t*)0x20000868 = 0;
>   *(uint64_t*)0x20001358 = 7;
>   *(uint64_t*)0x20001360 = 0;
>   *(uint64_t*)0x20001368 = 0;
>   *(uint32_t*)0x20001370 = 0;
>   *(uint32_t*)0x20001378 = 0;
>   *(uint64_t*)0x20001380 = 0;
>   *(uint32_t*)0x20001388 = 0;
>   *(uint64_t*)0x20001390 = 0;
>   *(uint64_t*)0x20001398 = 0;
>   *(uint64_t*)0x200013a0 = 0;
>   *(uint64_t*)0x200013a8 = 0;
>   *(uint32_t*)0x200013b0 = 0;
>   *(uint32_t*)0x200013b8 = 0;
>   *(uint64_t*)0x200013c0 = 0;
>   *(uint32_t*)0x200013c8 = 0;
>   *(uint64_t*)0x200013d0 = 0;
>   *(uint64_t*)0x200013d8 = 0;
>   *(uint64_t*)0x200013e0 = 0;
>   *(uint64_t*)0x200013e8 = 0;
>   *(uint32_t*)0x200013f0 = 0;
>   *(uint32_t*)0x200013f8 = 0;
>   syscall(__NR_sendmmsg, /*fd=*/r[0], /*mmsg=*/0x20001340ul, /*vlen=*/3ul,
>           /*f=*/0x40000ul);
>   res = syscall(__NR_socket, /*domain=*/0x10ul, /*type=*/0x803ul, /*proto=*/0);
>   if (res != -1)
>     r[2] = res;
>   memcpy((void*)0x20000700, "TIPCv2\000", 7);
>   syz_genetlink_get_family_id(/*name=*/0x20000700, /*fd=*/r[2]);
>   *(uint32_t*)0x20000200 = 0x14;
>   res = syscall(__NR_getsockname, /*fd=*/r[2], /*addr=*/0x20001480ul,
>                 /*addrlen=*/0x20000200ul);
>   if (res != -1)
>     r[3] = *(uint32_t*)0x20001484;
>   *(uint64_t*)0x20000000 = 0;
>   *(uint32_t*)0x20000008 = 0;
>   *(uint64_t*)0x20000010 = 0x20000140;
>   *(uint64_t*)0x20000140 = 0x20000500;
>   memcpy((void*)0x20000500,
>          "\x3c\x00\x00\x00\x10\x00\x01\x44\x00\xee\xff\xff\xff\xff\x07\x1a\xf7"
>          "\x00\x00\x00",
>          20);
>   *(uint32_t*)0x20000514 = r[3];
>   memcpy((void*)0x20000518,
>          "\x01\x00\x00\x00\x01\x00\x00\x00\x1c\x00\x12\x00\x0c\x00\x01\x00\x62"
>          "\x72\x69\x64\x67\x65",
>          22);
>   *(uint64_t*)0x20000148 = 0x3c;
>   *(uint64_t*)0x20000018 = 1;
>   *(uint64_t*)0x20000020 = 0;
>   *(uint64_t*)0x20000028 = 0;
>   *(uint32_t*)0x20000030 = 0;
>   syscall(__NR_sendmsg, /*fd=*/r[2], /*msg=*/0x20000000ul, /*f=*/0ul);
>   *(uint64_t*)0x200007c0 = 0;
>   *(uint32_t*)0x200007c8 = 0;
>   *(uint64_t*)0x200007d0 = 0x20000080;
>   *(uint64_t*)0x20000080 = 0x20000180;
>   memcpy((void*)0x20000180,
>          "\x60\x00\x00\x00\x24\x00\x0b\x0e\x00\x00\x00\x00\x00\x80\x00\x00\x00"
>          "\x00\x00\x00",
>          20);
>   *(uint32_t*)0x20000194 = r[3];
>   memcpy(
>       (void*)0x20000198,
>       "\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x45\x08\x00\x01\x00\x74\x62"
>       "\x66\x00\x34\x00\x02\x00\x08\x00\x06\x00\xa4\x23\x00\x00\x28\x00\x01",
>       35);
>   *(uint64_t*)0x20000088 = 0x60;
>   *(uint64_t*)0x200007d8 = 1;
>   *(uint64_t*)0x200007e0 = 0;
>   *(uint64_t*)0x200007e8 = 0;
>   *(uint32_t*)0x200007f0 = 0;
>   syscall(__NR_sendmsg, /*fd=*/r[1], /*msg=*/0x200007c0ul, /*f=*/0ul);
>   *(uint16_t*)0x20000040 = 0x11;
>   *(uint16_t*)0x20000042 = htobe16(0);
>   *(uint32_t*)0x20000044 = r[3];
>   *(uint16_t*)0x20000048 = 1;
>   *(uint8_t*)0x2000004a = 0;
>   *(uint8_t*)0x2000004b = 6;
>   memset((void*)0x2000004c, 170, 5);
>   *(uint8_t*)0x20000051 = 0;
>   memset((void*)0x20000052, 0, 2);
>   syscall(__NR_bind, /*fd=*/r[0], /*addr=*/0x20000040ul, /*addrlen=*/0x14ul);
>   memcpy((void*)0x20000280,
>          "\x41\x03\x09\x5c\xf2\x1d\x48\x04\x07\x02\x02\x00\xc5\x2c\xf7\xc2\x59"
>          "\x75\xe0\x05\xb0\x2f\x08\x00\xeb\x2b\x2f\xf0\xda\xc8\x89\x7c\x6b\x11"
>          "\x87\x77\xfa\xff\xff\xff\x30\x66\x09\x0c\xb6\x00\xc5\x47\x1d\x13\x0a"
>          "\x66\x32\x1a\x54\xe7\xdf\x30\x5f\x80\xa8\x81\x61\xb6\xfd\x8f\x24\x28"
>          "\x6a\x57\xc3\xfe\xff\xff",
>          74);
>   syscall(__NR_sendto, /*fd=*/r[0], /*buf=*/0x20000280ul, /*len=*/0x5c13ul,
>           /*f=*/0x806ul, /*addr=*/0ul, /*addrlen=*/0x2ful);
> }
> int main(void) {
>   syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul,
>           /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul);
>   syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul, /*prot=*/7ul,
>           /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul);
>   syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul,
>           /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul);
>   do_sandbox_none();
>   return 0;
> }
>
> =* repro.txt =*
> r0 = socket$packet(0x11, 0x3, 0x300)
> setsockopt$packet_int(r0, 0x107, 0xf,
> &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9)
> r1 = socket(0x10, 0x3, 0x0)
> sendmmsg$inet(r0, &(0x7f0000001340)=[{{0x0, 0x0,
> &(0x7f0000000800)=[{0x0}, {0x0}, {0x0},
> {&(0x7f00000001c0)="8fc286982df83400258d0bce450dcb273c880f766d6d47bf05a0146a7ab1cca6714475e755eae9cc4c4305",
> 0x2b}, {0x0}, {0x0}, {0x0}], 0x7}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0,
> 0x0}}], 0x3, 0x40000)
> r2 = socket(0x10, 0x803, 0x0)
> syz_genetlink_get_family_id$tipc2(&(0x7f0000000700), r2)
> getsockname$packet(r2, &(0x7f0000001480)={0x11, 0x0, <r3=>0x0, 0x1,
> 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
> sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0,
> &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c0000001000014400eeffffffff071af7000000",
> @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"],
> 0x3c}}, 0x0)
> sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0,
> &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="6000000024000b0e000000000080000000000000",
> @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000004508000100746266003400020008000600a4230000280001"],
> 0x60}}, 0x0)
> bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14)
> sendto$inet6(r0,
> &(0x7f0000000280)="4103095cf21d480407020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff",
> 0x5c13, 0x806, 0x0, 0x2f)
>
> See aslo https://gist.github.com/xrivendell7/865a5d95635b9dde886a3f3eb156b7f9
>
> BTW, I make a simple analysis for this bug, because there is a similar
> bug related to net/rose
> https://syzkaller.appspot.com/bug?extid=677921bcd8c3a67a3df3 do not
> respone so far, and in the same fuzzing instance, I aslo triggered bug
> titled "KASAN: null-ptr-deref Read in rose_transmit_link” and "KASAN:
> slab-use-after-free Read in mini_qdisc_pair_swap”. When analysis the
> repro.txt above, I notice this syscall
> getsockname$packet(r2, &(0x7f0000001480)={0x11, 0x0, <r3=>0x0, 0x1,
> 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
> the r3 socket is a AF_PACKET.
> and also in the repro.txt of bug “KASAN: slab-use-after-free Read in
> mini_qdisc_pair_swap” below:
> r0 = socket$nl_route(0x10, 0x3, 0x0)
> r1 = socket(0x11, 0x800000003, 0x0)
> bind(r1, &(0x7f0000000080)=@...eric={0x11,
> "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"},
> 0x80)
> getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, <r2=>0x0, 0x1,
> 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14)
> sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0,
> &(0x7f0000000180)={&(0x7f0000000200)=@...tfilter={0x3c, 0x2c, 0xd27,
> 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}, {0x2}},
> [@filter_kind_options=@...asic={{0xa}, {0xc, 0x2,
> [@TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0xffff}}]}}]}, 0x3c}}, 0x0)
> r3 = socket$nl_route(0x10, 0x3, 0x0)
> r4 = socket(0x11, 0x800000003, 0x0)
> bind(r4, &(0x7f0000000180)=@...eric={0x11,
> "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a08000000e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c65400"},
> 0x80)
> sendmsg$nl_route_sched(r0, &(0x7f0000000fc0)={&(0x7f0000000240)={0x10,
> 0x0, 0x0, 0x4}, 0xc,
> &(0x7f0000000f80)={&(0x7f0000000b80)=@...taction={0x3ec, 0x30, 0x800,
> 0x70bd25, 0x25dfdbfc, {}, [{0x3d8, 0x1, [@m_xt={0x298, 0x6, 0x0, 0x0,
> {{0x7}, {0x1b0, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x10f, 0x6, {0x1,
> 'filter\x00', 0x2, 0x81,
> "0f6a0e0e9afe6ddcc31e0e668f77ddf9119e50d18216aeb5aa9f203e3cc53be5b5e38b3bd07de80b47aefdbc0f9ccccfb2992b045d841cb60de6b62120e990b2dce06b27b76e8dc05282ff99b491baece2e95564344b923fc333ba942160fcfb32e390a058ac445fa3fdbf222646ad9017c991b55724092280ccf4e7587ed5488546b6d1b76d6266d776c5f4d3e271f54aa8c666f9869f1efbc141f93536baf54e445006cde67ae19b5a108d2b42d60258ad757bdb366664d51fefd60c0f34be08a4d782871a0fe790d97afcf333a1b0b2a8855831183d8158c4ad18f1abcf9157b95700ea"}},
> @TCA_IPT_TARG={0x4a, 0x6, {0x1ff, 'filter\x00', 0x0, 0xfff,
> "218cac2617fc60c1ab2a4db8719d2d06f442070848ab99e8745c05db95b2ffa0"}},
> @TCA_IPT_TARG={0x46, 0x6, {0x0, 'mangle\x00', 0x0, 0x8000,
> "602fb37f5a77780427fe2d2b98797d28cd1b381186073dedb8845115"}},
> @TCA_IPT_HOOK={0x8, 0x2, 0x4}]}, {0xc2, 0x6,
> "5f6c37010c0403cc9b6816f199e64cbd31209b4f9ae1ef492ccf689a4bf45834ebc4b552a254c39ea0145114b3ab87ae5902b061ff0d7d0884c4ef3898c749a30087dd7a337ab1029659c7aded68b95b1d70d2f1e0160a7be432ca197cd9d9ab377f84fccba0de883f107e5bb42d49acedfc21ebbbba51340fa03a8d8256f88597ab465c3e05aa4b95283104da7f194717b52cf3a42a62763d9f5e3903e2b6eae1ff4dbadab08f9d7cbe8424e35d6eee461472fe778afa2cc012cc17862c"},
> {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x4, 0x2}}}}, @m_ct={0x13c, 0x14,
> 0x0, 0x0, {{0x7}, {0x4c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1,
> {0x400, 0xfffffe01, 0x4, 0x5, 0x3ff}}, @TCA_CT_NAT_IPV6_MIN={0x14,
> 0xb, @dev={0xfe, 0x80, '\x00', 0x42}}, @TCA_CT_LABELS_MASK={0x14, 0x8,
> "13b512d82312f916d67fdbd5b16d3237"}, @TCA_CT_ACTION={0x6, 0x3,
> 0x23}]}, {0xcb, 0x6,
> "cf98aefc95d61dfa6782891a5719a3b681816fb6c044d6c8d89eff2059c7964d8e81f7039162904b509c86c781358268a18d72be977577b1537729daf78cf6ef23a4ff31ebb423f245d3b450010d037143aaf848f11f3bb849900ef8c1e358fb30568cc604e194a413ba6a7e22051d17d6f912153ca7a2a592831f1bd6fc25da70cde15360d10a034504727bc06a576479cde3cd6b5905dbcce6c631d2b0f476a1a9373d37cf20c8b32da1111379ca5897892f996fd80252607fc19370ff7aee4b20c486a04cc7"},
> {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}]}]}, 0x3ec}, 0x1, 0x0,
> 0x0, 0x40000}, 0x200580c0)
> getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, <r5=>0x0, 0x1,
> 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14)
> sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0,
> &(0x7f0000000080)={&(0x7f0000000040)=@...tclass={0x24, 0x29, 0x1, 0x0,
> 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0)
> pipe(&(0x7f0000000200)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff})
> r8 = socket$inet_udp(0x2, 0x2, 0x0)
> setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0,
> &(0x7f0000000000)={@...st2}, 0x14)
> close(r8)
> socket$inet(0x10, 0x2, 0x0)
> r9 = socket(0x11, 0x800000003, 0x0)
> bind(r9, &(0x7f0000000080)=@...eric={0x11,
> "0000010000000000080025944eeba71a4976e252922c000000002aba000000012e0b3836005404b0e0301a4ce875f2e0ff5f163ee340b7679500800000000000000101013c5891039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"},
> 0x80)
> getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, <r10=>0x0, 0x1,
> 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14)
> sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0,
> 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7",
> @ANYRES32=r10, @ANYBLOB="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"],
> 0x3}}, 0x0)
> write$binfmt_misc(r7, &(0x7f0000000000)=ANY=[], 0xfffffecc)
> splice(r6, 0x0, r8, 0x0, 0x4ffe0, 0x0)
>
> notice the similar getsockname$packet(r4, &(0x7f0000000000)={0x11,
> 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) also
> related to net/rose.
> So I believe it maybe also the same bug realted to net/rose
> AF_PACKET/PF_PACKET socket cluster.
> If such a security warning is indeed caused, I think it is necessary
> to fix it quickly.
>
> I hope it helps.
> Best regards.
> xingwei Lee

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ