// https://syzkaller.appspot.com/bug?id=8b456d9f4b011cb98abfcc9264b55420ad6f9ab0 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* uctx) { uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; if (__atomic_load_n(&skip_segv, __ATOMIC_RELAXED) && (addr < prog_start || addr > prog_end)) { _longjmp(segv_env, 1); } doexit(sig); for (;;) { } } static void install_segv_handler() { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) \ { \ __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ if (_setjmp(segv_env) == 0) { \ __VA_ARGS__; \ } \ __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ } static uintptr_t syz_open_dev(uintptr_t a0, uintptr_t a1, uintptr_t a2) { if (a0 == 0xc || a0 == 0xb) { char buf[128]; sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, (uint8_t)a2); return open(buf, O_RDWR, 0); } else { char buf[1024]; char* hash; NONFAILING(strncpy(buf, (char*)a0, sizeof(buf))); buf[sizeof(buf) - 1] = 0; while ((hash = strchr(buf, '#'))) { *hash = '0' + (char)(a1 % 10); a1 /= 10; } return open(buf, a2, 0); } } #ifndef __NR_memfd_create #define __NR_memfd_create 319 #endif long r[15]; void loop() { memset(r, -1, sizeof(r)); r[0] = syscall(__NR_mmap, 0x20000000ul, 0xfff000ul, 0x3ul, 0x32ul, 0xfffffffffffffffful, 0x0ul); NONFAILING(memcpy((void*)0x20ee1000, "\x2f\x64\x65\x76\x2f\x6c\x6f\x6f\x70\x23\x00", 11)); r[2] = syz_open_dev(0x20ee1000ul, 0x0ul, 0x2ul); NONFAILING(memcpy((void*)0x20000000, "\xff\xf8", 2)); r[4] = syscall(__NR_memfd_create, 0x20000000ul, 0x2ul); NONFAILING(*(uint64_t*)0x20b4efe0 = (uint64_t)0x2064d000); NONFAILING(*(uint64_t*)0x20b4efe8 = (uint64_t)0x0); NONFAILING(*(uint64_t*)0x20b4eff0 = (uint64_t)0x20e04f4f); NONFAILING(*(uint64_t*)0x20b4eff8 = (uint64_t)0xb1); NONFAILING(memcpy( (void*)0x20e04f4f, "\x69\x7d\x06\x0c\xf9\xd8\xbc\x6d\xf3\xc8\x51\x00\x11\x43\x8b\xa2" "\x4e\xa2\xb2\x26\x10\xaa\xb4\xd2\xb6\xdc\xe4\xf2\xaa\x43\xff\xa8" "\xa9\xfa\x8a\x9e\x94\x2b\x2d\x65\x90\xea\xf4\x9c\xf0\xe3\xfd\x23" "\x85\x81\x42\xe0\x29\x53\xdf\xc6\x5f\xde\x3b\xb8\x56\x5c\xcf\x35" "\xc5\x5f\xc2\x48\xd0\xad\x6c\x47\x3f\x76\x63\x55\xd2\x2a\x9d\x2f" "\x43\xf4\x49\x3c\xd5\x07\xf9\x19\xab\x87\x3a\xa3\xc9\xfb\x28\x8f" "\x4a\xe3\xa1\x34\xda\x84\x40\xae\xee\x57\xd6\x4a\x2a\x47\x14\x2d" "\x56\x92\x64\xdd\x9e\xc1\xfa\x49\x25\x33\xe8\x14\x53\xf1\xad\x1d" "\xae\x61\xd9\xbe\x13\xe0\x70\xac\x9d\x36\xf4\x33\xc0\xf1\x2a\xe8" "\xd5\x6a\xf7\xfb\x38\x01\xa8\x29\xa6\x26\xa8\x7b\x14\x23\x5f\x44" "\xc2\x86\x51\xbf\x99\xa7\x80\x82\x94\x96\x57\xf7\x4b\x04\x8a\xe1" "\xca", 177)); r[10] = syscall(__NR_pwritev, r[4], 0x20b4efe0ul, 0x2ul, 0x80fcul); r[11] = syscall(__NR_ioctl, r[2], 0x4c00ul, r[4]); NONFAILING(memcpy((void*)0x20000000, "\x2f\x64\x65\x76\x2f\x6c\x6f\x6f\x70\x23\x00", 11)); r[13] = syz_open_dev(0x20000000ul, 0x0ul, 0x2ul); r[14] = syscall(__NR_fallocate, r[13], 0x11ul, 0x800ul, 0x44400005ul); } int main() { install_segv_handler(); loop(); return 0; }