// https://syzkaller.appspot.com/bug?id=2a65ad282bc55e4684de202c3081d0c341f48455 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static unsigned long long procid; struct fs_image_segment { void* data; uintptr_t size; uintptr_t offset; }; #define IMAGE_MAX_SEGMENTS 4096 #define IMAGE_MAX_SIZE (129 << 20) #define sys_memfd_create 319 static unsigned long fs_image_segment_check(unsigned long size, unsigned long nsegs, struct fs_image_segment* segs) { if (nsegs > IMAGE_MAX_SEGMENTS) nsegs = IMAGE_MAX_SEGMENTS; for (size_t i = 0; i < nsegs; i++) { if (segs[i].size > IMAGE_MAX_SIZE) segs[i].size = IMAGE_MAX_SIZE; segs[i].offset %= IMAGE_MAX_SIZE; if (segs[i].offset > IMAGE_MAX_SIZE - segs[i].size) segs[i].offset = IMAGE_MAX_SIZE - segs[i].size; if (size < segs[i].offset + segs[i].offset) size = segs[i].offset + segs[i].offset; } if (size > IMAGE_MAX_SIZE) size = IMAGE_MAX_SIZE; return size; } static int setup_loop_device(long unsigned size, long unsigned nsegs, struct fs_image_segment* segs, const char* loopname, int* memfd_p, int* loopfd_p) { int err = 0, loopfd = -1; size = fs_image_segment_check(size, nsegs, segs); int memfd = syscall(sys_memfd_create, "syzkaller", 0); if (memfd == -1) { err = errno; goto error; } if (ftruncate(memfd, size)) { err = errno; goto error_close_memfd; } for (size_t i = 0; i < nsegs; i++) { if (pwrite(memfd, segs[i].data, segs[i].size, segs[i].offset) < 0) { } } loopfd = open(loopname, O_RDWR); if (loopfd == -1) { err = errno; goto error_close_memfd; } if (ioctl(loopfd, LOOP_SET_FD, memfd)) { if (errno != EBUSY) { err = errno; goto error_close_loop; } ioctl(loopfd, LOOP_CLR_FD, 0); usleep(1000); if (ioctl(loopfd, LOOP_SET_FD, memfd)) { err = errno; goto error_close_loop; } } *memfd_p = memfd; *loopfd_p = loopfd; return 0; error_close_loop: close(loopfd); error_close_memfd: close(memfd); error: errno = err; return -1; } static long syz_mount_image(volatile long fsarg, volatile long dir, volatile unsigned long size, volatile unsigned long nsegs, volatile long segments, volatile long flags, volatile long optsarg) { struct fs_image_segment* segs = (struct fs_image_segment*)segments; int res = -1, err = 0, loopfd = -1, memfd = -1, need_loop_device = !!segs; char* mount_opts = (char*)optsarg; char* target = (char*)dir; char* fs = (char*)fsarg; char* source = NULL; char loopname[64]; if (need_loop_device) { memset(loopname, 0, sizeof(loopname)); snprintf(loopname, sizeof(loopname), "/dev/loop%llu", procid); if (setup_loop_device(size, nsegs, segs, loopname, &memfd, &loopfd) == -1) return -1; source = loopname; } mkdir(target, 0777); char opts[256]; memset(opts, 0, sizeof(opts)); if (strlen(mount_opts) > (sizeof(opts) - 32)) { } strncpy(opts, mount_opts, sizeof(opts) - 32); if (strcmp(fs, "iso9660") == 0) { flags |= MS_RDONLY; } else if (strncmp(fs, "ext", 3) == 0) { if (strstr(opts, "errors=panic") || strstr(opts, "errors=remount-ro") == 0) strcat(opts, ",errors=continue"); } else if (strcmp(fs, "xfs") == 0) { strcat(opts, ",nouuid"); } res = mount(source, target, fs, flags, opts); if (res == -1) { err = errno; goto error_clear_loop; } res = open(target, O_RDONLY | O_DIRECTORY); if (res == -1) { err = errno; } error_clear_loop: if (need_loop_device) { ioctl(loopfd, LOOP_CLR_FD, 0); close(loopfd); close(memfd); } errno = err; return res; } int main(void) { syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); memcpy((void*)0x20000000, "ext4\000", 5); memcpy((void*)0x20000100, "./file0\000", 8); *(uint64_t*)0x20000200 = 0x20010000; memcpy((void*)0x20010000, "\x20\x00\x00\x00\x00\x02\x00\x00\x19\x00\x00\x00\x90\x01\x00\x00\x0f" "\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x06\x00\x00\x00\x00\x00" "\x08\x00\x00\x80\x00\x00\x20\x00\x00\x00\xd5\xf4\x65\x5f\xd5\xf4\x65" "\x5f\x01\x00\xff\xff\x53\xef\x01\x00\x01\x00\x00\x00\xd4\xf4\x65\x5f" "\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x0b" "\x00\x00\x00\x00\x04\x00\x00\x08\x00\x00\x00\xd2\xc2\x00\x00\x12\x03", 102); *(uint64_t*)0x20000208 = 0x66; *(uint64_t*)0x20000210 = 0x400; *(uint64_t*)0x20000218 = 0x20010100; memcpy((void*)0x20010100, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x91\xb7\x3e\xf4\xb8\xd9\x44\xc4\xbe\x6a\xea\xa0" "\xd6\xc4\x7e\x6c\x01\x00\x40", 31); *(uint64_t*)0x20000220 = 0x1f; *(uint64_t*)0x20000228 = 0x4e0; *(uint64_t*)0x20000230 = 0x20010300; memcpy((void*)0x20010300, "\x03\x00\x00\x00\x04", 5); *(uint64_t*)0x20000238 = 5; *(uint64_t*)0x20000240 = 0x640; *(uint64_t*)0x20000248 = 0x20010400; memcpy((void*)0x20010400, "\x02\x00\x00\x00\x03\x00\x00\x00\x04\x00\x00\x00" "\x19\x00\x0f\x00\x03\x00\x04\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x0f\x00\x2e\x69", 32); *(uint64_t*)0x20000250 = 0x20; *(uint64_t*)0x20000258 = 0x1000; *(uint64_t*)0x20000260 = 0x20012600; memcpy((void*)0x20012600, "\xed\x41\x00\x00\x00\x10\x00\x00\xd4\xf4\x65\x5f" "\xd5\xf4\x65\x5f\xd5\xf4\x65\x5f\x00\x00\x00\x00" "\x00\x00\x04\x00\x80", 29); *(uint64_t*)0x20000268 = 0x1d; *(uint64_t*)0x20000270 = 0x4400; *(uint64_t*)0x20000278 = 0x20012800; memcpy((void*)0x20012800, "\x80\x81\x00\x00\x00\x18\x00\x00\xd4\xf4\x65\x5f\xd4\xf4\x65\x5f\xd4" "\xf4\x65\x5f\x00\x00\x00\x00\x00\x00\x01\x00\x80\x00\x00\x00\x10\x00" "\x08\x00\x00\x00\x00\x00\x0a\xf3\x01\x00\x04\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x02\x00\x00\x00\x30", 61); *(uint64_t*)0x20000280 = 0x3d; *(uint64_t*)0x20000288 = 0x4800; *(uint64_t*)0x20000290 = 0x20012a00; memcpy((void*)0x20012a00, "\x80\x81\x00\x00\x00\x18\x00\x00\xd4\xf4\x65\x5f\xd4\xf4\x65\x5f\xd4" "\xf4\x65\x5f\x00\x00\x00\x00\x00\x00\x01\x00\x80\x00\x00\x00\x10\x00" "\x08\x00\x00\x00\x00\x00\x0a\xf3\x01\x00\x04\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x02\x00\x00\x00\x40", 61); *(uint64_t*)0x20000298 = 0x3d; *(uint64_t*)0x200002a0 = 0x4c00; *(uint64_t*)0x200002a8 = 0x200003c0; memcpy((void*)0x200003c0, "\x11\x1f\xc0\xd9\x01\x00\x00\x00\x80\x3a\x09\x00\x80\x3a\x01\x01\x00" "\x00\x80\x49\x03\xd0\x7b\xdc\x55\xf4\x47\x9f\x2e\x9a\x1b\x96\xd1\xc8" "\x8b\x9c\xd7\x9c\x61\xcd\xde\x87\x26\x79\x59\x2b\x0b\x0f\x09\x0a\xba" "\xe6\x4d\xc2\xc4\x3c\x60\x7b\xc9\xec\x6d\x20\x5c\x85\x63\x19\x03\x7d" "\x00\x00\x00\x00\x00\x00\xdb\x05\xaf\x48\x87\x14\xdf\x31\x43\x05\xa8" "\xc0\x86\x0d\xb7\xfa\x3d\xff\x6e\x97\xe3\x3b\xff\x01\x4f\x02\xa8\x9d" "\x31\xe3\x0f\x7d\x59\xfb\x76\xa6\x6d\x02\x53\x0b\xfa\xb7\xff\xe3\xe0" "\x4c\x28\x9d\x45\xe4\x86\x5b\x76\x0b\xf7\xc2\xa5\xad\xe6\x45\xc8\x59" "\xd4\x0c\xb7\x22\x98\x07\x42\xc1\x45\xe7\xeb\x52\x81\x1e\xab\x79\xb5" "\xf3\xad\x99\xf6\x07\xb5\xb8\x09\x56\x20\x0b\xf8\x00\x00\x00\x00\x00" "\x00", 171); *(uint64_t*)0x200002b0 = 0xab; *(uint64_t*)0x200002b8 = 0x30000; *(uint64_t*)0x200002c0 = 0x20013f00; memcpy((void*)0x20013f00, "\x27\x19\xc0\xd9\x01", 5); *(uint64_t*)0x200002c8 = 5; *(uint64_t*)0x200002d0 = 0x40000; syz_mount_image(0x20000000, 0x20000100, 0x200000, 9, 0x20000200, 0, 0x20014a00); memcpy((void*)0x200000c0, "./file0\000", 8); memcpy((void*)0x20000140, "trusted.overlay.redirect\000", 25); syscall(__NR_setxattr, 0x200000c0ul, 0x20000140ul, 0ul, 0ul, 0ul); return 0; }