// https://syzkaller.appspot.com/bug?id=5735d842f7ea3ed9220aca64952ac4aba7ba741c // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } #include #include #include #include #include static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* uctx) { uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; if (__atomic_load_n(&skip_segv, __ATOMIC_RELAXED) && (addr < prog_start || addr > prog_end)) { _longjmp(segv_env, 1); } doexit(sig); } static void install_segv_handler() { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) \ { \ __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ if (_setjmp(segv_env) == 0) { \ __VA_ARGS__; \ } \ __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ } static uintptr_t syz_open_procfs(uintptr_t a0, uintptr_t a1) { char buf[128]; memset(buf, 0, sizeof(buf)); if (a0 == 0) { NONFAILING(snprintf(buf, sizeof(buf), "/proc/self/%s", (char*)a1)); } else if (a0 == (uintptr_t)-1) { NONFAILING(snprintf(buf, sizeof(buf), "/proc/thread-self/%s", (char*)a1)); } else { NONFAILING(snprintf(buf, sizeof(buf), "/proc/self/task/%d/%s", (int)a0, (char*)a1)); } int fd = open(buf, O_RDWR); if (fd == -1) fd = open(buf, O_RDONLY); return fd; } static void execute_one(); extern unsigned long long procid; void loop() { while (1) { execute_one(); } } struct thread_t { int created, running, call; pthread_t th; }; static struct thread_t threads[16]; static void execute_call(int call); static int running; static void* thr(void* arg) { struct thread_t* th = (struct thread_t*)arg; for (;;) { while (!__atomic_load_n(&th->running, __ATOMIC_ACQUIRE)) syscall(SYS_futex, &th->running, FUTEX_WAIT, 0, 0); execute_call(th->call); __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); __atomic_store_n(&th->running, 0, __ATOMIC_RELEASE); syscall(SYS_futex, &th->running, FUTEX_WAKE); } return 0; } static void execute(int num_calls) { int call, thread; running = 0; for (call = 0; call < num_calls; call++) { for (thread = 0; thread < sizeof(threads) / sizeof(threads[0]); thread++) { struct thread_t* th = &threads[thread]; if (!th->created) { th->created = 1; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setstacksize(&attr, 128 << 10); pthread_create(&th->th, &attr, thr, th); } if (!__atomic_load_n(&th->running, __ATOMIC_ACQUIRE)) { th->call = call; __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); __atomic_store_n(&th->running, 1, __ATOMIC_RELEASE); syscall(SYS_futex, &th->running, FUTEX_WAKE); struct timespec ts; ts.tv_sec = 0; ts.tv_nsec = 20 * 1000 * 1000; syscall(SYS_futex, &th->running, FUTEX_WAIT, 1, &ts); if (running) usleep((call == num_calls - 1) ? 10000 : 1000); break; } } } } #ifndef __NR_userfaultfd #define __NR_userfaultfd 323 #endif uint64_t r[6] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}; void execute_call(int call) { long res; switch (call) { case 0: syscall(__NR_socket, 0x10, 3, 0); break; case 1: syscall(__NR_mmap, 0x20011000, 0x3000, 4, 0x32, -1, 0); break; case 2: res = syscall(__NR_userfaultfd, 0); if (res != -1) r[0] = res; break; case 3: NONFAILING(*(uint64_t*)0x20000fe8 = 0xaa); NONFAILING(*(uint64_t*)0x20000ff0 = 0); NONFAILING(*(uint64_t*)0x20000ff8 = 0); syscall(__NR_ioctl, r[0], 0xc018aa3f, 0x20000fe8); break; case 4: syscall(__NR_epoll_create1, 0x80000); break; case 5: NONFAILING(*(uint64_t*)0x20000000 = 0x20012000); NONFAILING(*(uint64_t*)0x20000008 = 0x2000); NONFAILING(*(uint64_t*)0x20000010 = 1); NONFAILING(*(uint64_t*)0x20000018 = 0); syscall(__NR_ioctl, r[0], 0xc020aa00, 0x20000000); break; case 6: res = syscall(__NR_socket, 2, 1, 0); if (res != -1) r[1] = res; break; case 7: res = syscall(__NR_dup, r[1]); if (res != -1) r[2] = res; break; case 8: NONFAILING(*(uint32_t*)0x20012ffc = 4); syscall(__NR_getsockopt, r[2], 6, 0x1f, 0x20000040, 0x20012ffc); break; case 9: NONFAILING(*(uint64_t*)0x20000080 = 0x20338000); NONFAILING(*(uint64_t*)0x20000088 = 0x3000); NONFAILING(*(uint64_t*)0x20000090 = 0); NONFAILING(*(uint64_t*)0x20000098 = 0); syscall(__NR_ioctl, -1, 0xc020aa00, 0x20000080); break; case 10: NONFAILING(*(uint32_t*)0x20000200 = 0); NONFAILING(*(uint16_t*)0x20000204 = 2); NONFAILING(*(uint16_t*)0x20000206 = htobe16(0x4e20)); NONFAILING(*(uint8_t*)0x20000208 = 0xac); NONFAILING(*(uint8_t*)0x20000209 = 0x14); NONFAILING(*(uint8_t*)0x2000020a = 0x14); NONFAILING(*(uint8_t*)0x2000020b = 0xbb); NONFAILING(*(uint8_t*)0x2000020c = 0); NONFAILING(*(uint8_t*)0x2000020d = 0); NONFAILING(*(uint8_t*)0x2000020e = 0); NONFAILING(*(uint8_t*)0x2000020f = 0); NONFAILING(*(uint8_t*)0x20000210 = 0); NONFAILING(*(uint8_t*)0x20000211 = 0); NONFAILING(*(uint8_t*)0x20000212 = 0); NONFAILING(*(uint8_t*)0x20000213 = 0); NONFAILING(*(uint32_t*)0x20000284 = 2); NONFAILING(*(uint32_t*)0x20000288 = 8); NONFAILING(*(uint32_t*)0x2000028c = 5); NONFAILING(*(uint32_t*)0x20000290 = 0x80); NONFAILING(*(uint32_t*)0x20000294 = 0xfffffff9); NONFAILING(*(uint32_t*)0x200002c0 = 0x98); res = syscall(__NR_getsockopt, r[2], 0x84, 0xf, 0x20000200, 0x200002c0); if (res != -1) NONFAILING(r[3] = *(uint32_t*)0x20000200); break; case 11: NONFAILING(*(uint32_t*)0x20000300 = r[3]); NONFAILING(*(uint32_t*)0x20000304 = 8); NONFAILING(*(uint32_t*)0x20000340 = 8); syscall(__NR_getsockopt, r[2], 0x84, 0x13, 0x20000300, 0x20000340); break; case 12: syscall(__NR_mmap, 0x20000000, 0xfff000, 3, 0x4000000000000032, r[0], 0); break; case 13: res = syscall(__NR_userfaultfd, 0); if (res != -1) r[4] = res; break; case 14: syscall(__NR_getdents, r[2], 0x20000380, 0x81); break; case 15: NONFAILING(*(uint64_t*)0x20006000 = 0xaa); NONFAILING(*(uint64_t*)0x20006008 = 0); NONFAILING(*(uint64_t*)0x20006010 = 0); syscall(__NR_ioctl, r[4], 0xc018aa3f, 0x20006000); break; case 16: NONFAILING(memcpy((void*)0x200000c0, "tls", 4)); syscall(__NR_setsockopt, r[2], 6, 0x1f, 0x200000c0, 4); break; case 17: NONFAILING(memcpy((void*)0x20000100, "\x66\x69\x6c\x74\x65\x72\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00", 32)); NONFAILING(*(uint32_t*)0x20000120 = 0); NONFAILING(*(uint32_t*)0x20000124 = 0); NONFAILING(*(uint32_t*)0x20000128 = 0); NONFAILING(*(uint32_t*)0x2000012c = 0); NONFAILING(*(uint32_t*)0x20000130 = 0); NONFAILING(*(uint32_t*)0x20000134 = 0); NONFAILING(*(uint32_t*)0x20000138 = 0); NONFAILING(*(uint32_t*)0x2000013c = 0); NONFAILING(*(uint32_t*)0x20000140 = 0); NONFAILING(*(uint32_t*)0x20000180 = 0x44); syscall(__NR_getsockopt, r[1], 0, 0x60, 0x20000100, 0x20000180); break; case 18: NONFAILING(memcpy( (void*)0x200001c0, "\x67\x72\x65\x30\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 16)); NONFAILING(*(uint16_t*)0x200001d0 = 0xa200); syscall(__NR_ioctl, r[2], 0x400454ca, 0x200001c0); break; case 19: NONFAILING(memcpy((void*)0x200002c0, "\x2f\x65\x78\x65\x00\x00\x00\x00\x00\x04\x09\x00\x4b\xdd" "\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0f\x79\x80" "\x58\x43\x9e\xd5\x54\xfa\x07\x00\x4a\xde\xe9\x01\xd2\xda" "\x75\xaf\x1f\x02\x00\x02\x00\x00\x00\xa0\x71\x39\xf4\x82" "\xac\xe3\x65\x4c", 60)); res = syz_open_procfs(0, 0x200002c0); if (res != -1) r[5] = res; break; case 20: syscall(__NR_fcntl, r[5], 4, 0x4000); break; case 21: syscall(__NR_mmap, 0x20000000, 0xb36000, 3, 0x8031, -1, 0); break; case 22: syscall(__NR_read, r[5], 0x20000200, 0x8000); break; } } void execute_one() { execute(23); } int main() { syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); install_segv_handler(); for (;;) { loop(); } }