On Fri, Jul 14, 2017 at 11:11 AM, <
r.ky...@gmail.com> wrote:
>
> Hi!
>
> I have trying to fuzz /dev/binder in qemu, linux kernel is 4.6.7 x86_64.
>
> I use qemu with gdb server enabled.
> In gdb I have 2 breakpoints: binder_open and binder_ioctl
>
> In .cfg file I enable same 2 syscalls:
>
> "enable_syscalls": ["openat$binder", "ioctl$BINDER_WRITE_READ"]
>
> After I run syz-manager, binder_open is breaks into gdb and this is OK.
> binder_ioctl breakpoint is not raising ever!
> and i see many binder_mmap calls.
>
> Can I disable binder_mmap calls, and why binder_ioctl is not calls?
Hi,
binder_mmap come from mmap. Mmap is always enabled because syzkaller
uses it to allocate memory. It's not harmful, even useful -- more
coverage for binder code. So let's put it aside.
Re ioctl. I suspect it's becaue fuzzer does not have permissions to do
the ioctl. Try to set "sandbox": "none" manager config parameter.
Do you mind contributing this description to syzkaller later?
> Thanks.
>
> Here is my binder.txt file in syzkaller/sys:
>
> include <uapi/linux/android/binder.h>
>
> resource fd_binder[fd]
>
> openat$binder(fd const[AT_FDCWD], file ptr[in, string["/dev/binder"]], flags flags[open_flags], mode const[0]) fd_binder
>
> ioctl$BINDER_WRITE_READ(fd fd_binder, cmd const[BINDER_WRITE_READ], arg ptr[in, binder_write_read])
>
> binder_write_read {
> write_size int64
> write_consumed int64
> write_buffer int64
>
> read_size int64
> read_consumed int64
> read_buffer int64
> }
>
> --