1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
4 */
5
6#define _GNU_SOURCE
7#include <unistd.h>
8#include <errno.h>
9#include <string.h>
10#include <stdio.h>
11#include <stdlib.h>
12#include <stdbool.h>
13#include <fcntl.h>
14#include <time.h>
15#include <sys/wait.h>
16#include <sys/mount.h>
17#include <sys/stat.h>
18#include <sys/types.h>
19#include <sys/io.h>
20#include <sys/ioctl.h>
21#include <sys/reboot.h>
22#include <sys/utsname.h>
23#include <sys/sendfile.h>
24#include <sys/sysmacros.h>
25#include <sys/random.h>
26#include <linux/random.h>
27#include <linux/version.h>
28
29__attribute__((noreturn)) static void poweroff(void)
30{
31	fflush(stdout);
32	fflush(stderr);
33	reboot(RB_AUTOBOOT);
34	sleep(30);
35	fprintf(stderr, "\x1b[37m\x1b[41m\x1b[1mFailed to power off!!!\x1b[0m\n");
36	exit(1);
37}
38
39static void panic(const char *what)
40{
41	fprintf(stderr, "\n\n\x1b[37m\x1b[41m\x1b[1mSOMETHING WENT HORRIBLY WRONG\x1b[0m\n\n    \x1b[31m\x1b[1m%s: %s\x1b[0m\n\n\x1b[37m\x1b[44m\x1b[1mPower off...\x1b[0m\n\n", what, strerror(errno));
42	poweroff();
43}
44
45#define pretty_message(msg) puts("\x1b[32m\x1b[1m" msg "\x1b[0m")
46
47static void print_banner(void)
48{
49	struct utsname utsname;
50	int len;
51
52	if (uname(&utsname) < 0)
53		panic("uname");
54
55	len = strlen("    WireGuard Test Suite on       ") + strlen(utsname.sysname) + strlen(utsname.release) + strlen(utsname.machine);
56	printf("\x1b[45m\x1b[33m\x1b[1m%*.s\x1b[0m\n\x1b[45m\x1b[33m\x1b[1m    WireGuard Test Suite on %s %s %s    \x1b[0m\n\x1b[45m\x1b[33m\x1b[1m%*.s\x1b[0m\n\n", len, "", utsname.sysname, utsname.release, utsname.machine, len, "");
57}
58
59static void seed_rng(void)
60{
61	int bits = 256, fd;
62
63	if (!getrandom(NULL, 0, GRND_NONBLOCK))
64		return;
65	pretty_message("[+] Fake seeding RNG...");
66	fd = open("/dev/random", O_WRONLY);
67	if (fd < 0)
68		panic("open(random)");
69	if (ioctl(fd, RNDADDTOENTCNT, &bits) < 0)
70		panic("ioctl(RNDADDTOENTCNT)");
71	close(fd);
72}
73
74static void set_time(void)
75{
76	if (time(NULL))
77		return;
78	pretty_message("[+] Setting fake time...");
79	if (stime(&(time_t){1433512680}) < 0)
80		panic("settimeofday()");
81}
82
83static void mount_filesystems(void)
84{
85	pretty_message("[+] Mounting filesystems...");
86	mkdir("/dev", 0755);
87	mkdir("/proc", 0755);
88	mkdir("/sys", 0755);
89	mkdir("/tmp", 0755);
90	mkdir("/run", 0755);
91	mkdir("/var", 0755);
92	if (mount("none", "/dev", "devtmpfs", 0, NULL))
93		panic("devtmpfs mount");
94	if (mount("none", "/proc", "proc", 0, NULL))
95		panic("procfs mount");
96	if (mount("none", "/sys", "sysfs", 0, NULL))
97		panic("sysfs mount");
98	if (mount("none", "/tmp", "tmpfs", 0, NULL))
99		panic("tmpfs mount");
100	if (mount("none", "/run", "tmpfs", 0, NULL))
101		panic("tmpfs mount");
102	if (mount("none", "/sys/kernel/debug", "debugfs", 0, NULL))
103		; /* Not a problem if it fails.*/
104	if (symlink("/run", "/var/run"))
105		panic("run symlink");
106	if (symlink("/proc/self/fd", "/dev/fd"))
107		panic("fd symlink");
108}
109
110static void enable_logging(void)
111{
112	int fd;
113	pretty_message("[+] Enabling logging...");
114	fd = open("/proc/sys/kernel/printk", O_WRONLY);
115	if (fd >= 0) {
116		if (write(fd, "9\n", 2) != 2)
117			panic("write(printk)");
118		close(fd);
119	}
120	fd = open("/proc/sys/debug/exception-trace", O_WRONLY);
121	if (fd >= 0) {
122		if (write(fd, "1\n", 2) != 2)
123			panic("write(exception-trace)");
124		close(fd);
125	}
126}
127
128static void kmod_selftests(void)
129{
130	FILE *file;
131	char line[2048], *start, *pass;
132	bool success = true;
133	pretty_message("[+] Module self-tests:");
134	file = fopen("/proc/kmsg", "r");
135	if (!file)
136		panic("fopen(kmsg)");
137	if (fcntl(fileno(file), F_SETFL, O_NONBLOCK) < 0)
138		panic("fcntl(kmsg, nonblock)");
139	while (fgets(line, sizeof(line), file)) {
140		start = strstr(line, "wireguard: ");
141		if (!start)
142			continue;
143		start += 11;
144		*strchrnul(start, '\n') = '\0';
145		if (strstr(start, "www.wireguard.com"))
146			break;
147		pass = strstr(start, ": pass");
148		if (!pass || pass[6] != '\0') {
149			success = false;
150			printf(" \x1b[31m*  %s\x1b[0m\n", start);
151		} else
152			printf(" \x1b[32m*  %s\x1b[0m\n", start);
153	}
154	fclose(file);
155	if (!success) {
156		puts("\x1b[31m\x1b[1m[-] Tests failed! \u2639\x1b[0m");
157		poweroff();
158	}
159}
160
161static void launch_tests(void)
162{
163	char cmdline[4096], *success_dev;
164	int status, fd;
165	pid_t pid;
166
167	pretty_message("[+] Launching tests...");
168	pid = fork();
169	if (pid == -1)
170		panic("fork");
171	else if (pid == 0) {
172		execl("/init.sh", "init", NULL);
173		panic("exec");
174	}
175	if (waitpid(pid, &status, 0) < 0)
176		panic("waitpid");
177	if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
178		pretty_message("[+] Tests successful! :-)");
179		fd = open("/proc/cmdline", O_RDONLY);
180		if (fd < 0)
181			panic("open(/proc/cmdline)");
182		if (read(fd, cmdline, sizeof(cmdline) - 1) <= 0)
183			panic("read(/proc/cmdline)");
184		cmdline[sizeof(cmdline) - 1] = '\0';
185		for (success_dev = strtok(cmdline, " \n"); success_dev; success_dev = strtok(NULL, " \n")) {
186			if (strncmp(success_dev, "wg.success=", 11))
187				continue;
188			memcpy(success_dev + 11 - 5, "/dev/", 5);
189			success_dev += 11 - 5;
190			break;
191		}
192		if (!success_dev || !strlen(success_dev))
193			panic("Unable to find success device");
194
195		fd = open(success_dev, O_WRONLY);
196		if (fd < 0)
197			panic("open(success_dev)");
198		if (write(fd, "success\n", 8) != 8)
199			panic("write(success_dev)");
200		close(fd);
201	} else {
202		const char *why = "unknown cause";
203		int what = -1;
204
205		if (WIFEXITED(status)) {
206			why = "exit code";
207			what = WEXITSTATUS(status);
208		} else if (WIFSIGNALED(status)) {
209			why = "signal";
210			what = WTERMSIG(status);
211		}
212		printf("\x1b[31m\x1b[1m[-] Tests failed with %s %d! \u2639\x1b[0m\n", why, what);
213	}
214}
215
216static void ensure_console(void)
217{
218	for (unsigned int i = 0; i < 1000; ++i) {
219		int fd = open("/dev/console", O_RDWR);
220		if (fd < 0) {
221			usleep(50000);
222			continue;
223		}
224		dup2(fd, 0);
225		dup2(fd, 1);
226		dup2(fd, 2);
227		close(fd);
228		if (write(1, "\0\0\0\0\n", 5) == 5)
229			return;
230	}
231	panic("Unable to open console device");
232}
233
234static void clear_leaks(void)
235{
236	int fd;
237
238	fd = open("/sys/kernel/debug/kmemleak", O_WRONLY);
239	if (fd < 0)
240		return;
241	pretty_message("[+] Starting memory leak detection...");
242	write(fd, "clear\n", 5);
243	close(fd);
244}
245
246static void check_leaks(void)
247{
248	int fd;
249
250	fd = open("/sys/kernel/debug/kmemleak", O_WRONLY);
251	if (fd < 0)
252		return;
253	pretty_message("[+] Scanning for memory leaks...");
254	sleep(2); /* Wait for any grace periods. */
255	write(fd, "scan\n", 5);
256	close(fd);
257
258	fd = open("/sys/kernel/debug/kmemleak", O_RDONLY);
259	if (fd < 0)
260		return;
261	if (sendfile(1, fd, NULL, 0x7ffff000) > 0)
262		panic("Memory leaks encountered");
263	close(fd);
264}
265
266int main(int argc, char *argv[])
267{
268	ensure_console();
269	print_banner();
270	mount_filesystems();
271	seed_rng();
272	set_time();
273	kmod_selftests();
274	enable_logging();
275	clear_leaks();
276	launch_tests();
277	check_leaks();
278	poweroff();
279	return 1;
280}
281