// https://syzkaller.appspot.com/bug?id=c9bad779c66fb840f87ed1dfeeaf4a0175de218f // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* ctx) { uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; if (__atomic_load_n(&skip_segv, __ATOMIC_RELAXED) && (addr < prog_start || addr > prog_end)) { _longjmp(segv_env, 1); } exit(sig); } static void install_segv_handler(void) { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) \ { \ __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ if (_setjmp(segv_env) == 0) { \ __VA_ARGS__; \ } \ __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ } uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); install_segv_handler(); intptr_t res = 0; res = syscall(__NR_socket, 0xaul, 1ul, 0); if (res != -1) r[0] = res; NONFAILING(*(uint16_t*)0x20000180 = 0xa); NONFAILING(*(uint16_t*)0x20000182 = htobe16(0x4e22)); NONFAILING(*(uint32_t*)0x20000184 = htobe32(0)); NONFAILING(*(uint64_t*)0x20000188 = htobe64(0)); NONFAILING(*(uint64_t*)0x20000190 = htobe64(1)); NONFAILING(*(uint32_t*)0x20000198 = 0); syscall(__NR_bind, r[0], 0x20000180ul, 0x1cul); syscall(__NR_listen, r[0], 7); res = syscall(__NR_socket, 0xaul, 1ul, 0); if (res != -1) r[1] = res; NONFAILING(*(uint16_t*)0x20b63fe4 = 0xa); NONFAILING(*(uint16_t*)0x20b63fe6 = htobe16(0x4e22)); NONFAILING(*(uint32_t*)0x20b63fe8 = htobe32(0)); NONFAILING(*(uint8_t*)0x20b63fec = 0); NONFAILING(*(uint8_t*)0x20b63fed = 0); NONFAILING(*(uint8_t*)0x20b63fee = 0); NONFAILING(*(uint8_t*)0x20b63fef = 0); NONFAILING(*(uint8_t*)0x20b63ff0 = 0); NONFAILING(*(uint8_t*)0x20b63ff1 = 0); NONFAILING(*(uint8_t*)0x20b63ff2 = 0); NONFAILING(*(uint8_t*)0x20b63ff3 = 0); NONFAILING(*(uint8_t*)0x20b63ff4 = 0); NONFAILING(*(uint8_t*)0x20b63ff5 = 0); NONFAILING(*(uint8_t*)0x20b63ff6 = 0); NONFAILING(*(uint8_t*)0x20b63ff7 = 0); NONFAILING(*(uint8_t*)0x20b63ff8 = 0); NONFAILING(*(uint8_t*)0x20b63ff9 = 0); NONFAILING(*(uint8_t*)0x20b63ffa = 0); NONFAILING(*(uint8_t*)0x20b63ffb = 0); NONFAILING(*(uint32_t*)0x20b63ffc = 0); syscall(__NR_sendto, r[1], 0ul, 0ul, 0x20004005ul, 0x20b63fe4ul, 0x1cul); res = syscall(__NR_socket, 0x10ul, 3ul, 4); if (res != -1) r[2] = res; NONFAILING(*(uint64_t*)0x20000140 = 0x20000080); NONFAILING(memcpy( (void*)0x20000080, "\x58\x00\x00\x00\x14\x00\x19\x23\x40\x83\x4b\x80\x04\x0d\x8c\x56\x0a\x06" "\x7f\x02\x00\xff\x00\x00\x00\x00\x00\x00\x00\x00\x58\x00\x0b\x48\x24\xca" "\x94\x5f\x64\x00\x94\x00\xff\x03\x25\x01\x0e\xbc\x00\x00\x00\x00\x00\x00" "\x00\x80\x00\xf0\xff\xfe\xff\xe8\x09\x00\x53\x00\xff\xf5\xdd\x00\x00\x00" "\x10\x00\x01\x00\x07\x0c\x10\x00\x00\x00\x01\x00\x00\x00\x00\x00", 88)); NONFAILING(*(uint64_t*)0x20000148 = 0x58); syscall(__NR_writev, r[2], 0x20000140ul, 1ul); return 0; }