// https://syzkaller.appspot.com/bug?id=e48fdcd9d25cab1e0c62c19a498b12c1e39898ce // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include static bool write_file(const char* file, const char* what, ...) { char buf[1024]; va_list args; va_start(args, what); vsnprintf(buf, sizeof(buf), what, args); va_end(args); buf[sizeof(buf) - 1] = 0; int len = strlen(buf); int fd = open(file, O_WRONLY | O_CLOEXEC); if (fd == -1) return false; if (write(fd, buf, len) != len) { int err = errno; close(fd); errno = err; return false; } close(fd); return true; } static int inject_fault(int nth) { int fd; fd = open("/proc/thread-self/fail-nth", O_RDWR); if (fd == -1) exit(1); char buf[16]; sprintf(buf, "%d", nth); if (write(fd, buf, strlen(buf)) != (ssize_t)strlen(buf)) exit(1); return fd; } static void setup_fault() { static struct { const char* file; const char* val; bool fatal; } files[] = { {"/sys/kernel/debug/failslab/ignore-gfp-wait", "N", true}, {"/sys/kernel/debug/fail_futex/ignore-private", "N", false}, {"/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", "N", false}, {"/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", "N", false}, {"/sys/kernel/debug/fail_page_alloc/min-order", "0", false}, }; unsigned i; for (i = 0; i < sizeof(files) / sizeof(files[0]); i++) { if (!write_file(files[i].file, files[i].val)) { if (files[i].fatal) exit(1); } } } uint64_t r[1] = {0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); setup_fault(); intptr_t res = 0; res = syscall(__NR_socket, 0x10ul, 0x8000000803ul, 0); if (res != -1) r[0] = res; *(uint64_t*)0x20000140 = 0; *(uint32_t*)0x20000148 = 0; *(uint64_t*)0x20000150 = 0x20000000; *(uint64_t*)0x20000000 = 0x20000340; memcpy((void*)0x20000340, "\xcc\x00\x00\x00\x10\x00\x01\x04\x98\x00\x00\x00\xfc\xdb\x29\x74\x00" "\x00\x00\x00", 20); *(uint32_t*)0x20000354 = 0; memcpy((void*)0x20000358, "\x01\x00\x01\x00\x0a\x2a\x04\x00\x9c\x00\x12\x80\x0b\x00\x01\x00\x62" "\x61\x74\x61\x64\x76\x00\x00\x8c\x00\x02\x80\x0c\x00\x01\x00\x42\x41" "\x54\x4d\x41\x4e\x5f\x56\x0d\x00\x01\x00\x42\x41\x54\x4d\x41\x4e\x5f" "\x49\x56\x00\x00\x00\x0c\x00\x01\x00\x42\x41\x54\x4d\x41\x4e\x5f\x56" "\x0c\x00\x01\x00\x42\x41\x54\x4d\x41\x4e\x5f\x56\x0c\x00\x01\x00\x42" "\x41\x54\x4d\x41\x4e\x5f\x56\x0c\x00\x01\x00\x42\x41\x54\x4d\x41\x4e" "\x5f\x56\x0d\x00\x01\x00\x42\x41\x54\x4d\x41\x4e\x5f\x49\x56\x00\x00" "\x00\x0c\x00\x01\x00\x42\x41\x54\x4d\x41\x4e\x5f\x56\x0d\x00\x01\x00" "\x42\x41\x54\x4d\x41\x4e\x5f\x49\x56\x00\x00\x00\x0d\x00\x01\x00\x42" "\x41\x54\x4d\x41\x4e\x5f\x49\x56\x00\x00\x00\x08\x00\x05\x00", 168); *(uint32_t*)0x20000400 = 0; *(uint32_t*)0x20000404 = -1; *(uint64_t*)0x20000008 = 0xcc; *(uint64_t*)0x20000158 = 1; *(uint64_t*)0x20000160 = 0; *(uint64_t*)0x20000168 = 0; *(uint32_t*)0x20000170 = 0; inject_fault(11); syscall(__NR_sendmsg, r[0], 0x20000140ul, 0ul); return 0; }