// https://syzkaller.appspot.com/bug?id=2b6a5e7ed9c189aadc974fc5ff168b131c005947 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } #include #include #include #include #include const int kFailStatus = 67; const int kRetryStatus = 69; static void fail(const char* msg, ...) { int e = errno; va_list args; va_start(args, msg); vfprintf(stderr, msg, args); va_end(args); fprintf(stderr, " (errno %d)\n", e); doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus); } static __thread int skip_segv; static __thread jmp_buf segv_env; static void segv_handler(int sig, siginfo_t* info, void* uctx) { uintptr_t addr = (uintptr_t)info->si_addr; const uintptr_t prog_start = 1 << 20; const uintptr_t prog_end = 100 << 20; if (__atomic_load_n(&skip_segv, __ATOMIC_RELAXED) && (addr < prog_start || addr > prog_end)) { _longjmp(segv_env, 1); } doexit(sig); } static void install_segv_handler() { struct sigaction sa; memset(&sa, 0, sizeof(sa)); sa.sa_handler = SIG_IGN; syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); memset(&sa, 0, sizeof(sa)); sa.sa_sigaction = segv_handler; sa.sa_flags = SA_NODEFER | SA_SIGINFO; sigaction(SIGSEGV, &sa, NULL); sigaction(SIGBUS, &sa, NULL); } #define NONFAILING(...) \ { \ __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ if (_setjmp(segv_env) == 0) { \ __VA_ARGS__; \ } \ __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ } static void loop(); static void sandbox_common() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); setpgrp(); setsid(); struct rlimit rlim; rlim.rlim_cur = rlim.rlim_max = 128 << 20; setrlimit(RLIMIT_AS, &rlim); rlim.rlim_cur = rlim.rlim_max = 8 << 20; setrlimit(RLIMIT_MEMLOCK, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_FSIZE, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_STACK, &rlim); rlim.rlim_cur = rlim.rlim_max = 0; setrlimit(RLIMIT_CORE, &rlim); #define CLONE_NEWCGROUP 0x02000000 unshare(CLONE_NEWNS); unshare(CLONE_NEWIPC); unshare(CLONE_NEWCGROUP); unshare(CLONE_NEWNET); unshare(CLONE_NEWUTS); unshare(CLONE_SYSVSEM); } static int do_sandbox_none(int executor_pid, bool enable_tun) { unshare(CLONE_NEWPID); int pid = fork(); if (pid < 0) fail("sandbox fork failed"); if (pid) return pid; sandbox_common(); loop(); doexit(1); } static void test(); void loop() { while (1) { test(); } } struct thread_t { int created, running, call; pthread_t th; }; static struct thread_t threads[16]; static void execute_call(int call); static int running; static int collide; static void* thr(void* arg) { struct thread_t* th = (struct thread_t*)arg; for (;;) { while (!__atomic_load_n(&th->running, __ATOMIC_ACQUIRE)) syscall(SYS_futex, &th->running, FUTEX_WAIT, 0, 0); execute_call(th->call); __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); __atomic_store_n(&th->running, 0, __ATOMIC_RELEASE); syscall(SYS_futex, &th->running, FUTEX_WAKE); } return 0; } static void execute(int num_calls) { int call, thread; running = 0; for (call = 0; call < num_calls; call++) { for (thread = 0; thread < sizeof(threads) / sizeof(threads[0]); thread++) { struct thread_t* th = &threads[thread]; if (!th->created) { th->created = 1; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setstacksize(&attr, 128 << 10); pthread_create(&th->th, &attr, thr, th); } if (!__atomic_load_n(&th->running, __ATOMIC_ACQUIRE)) { th->call = call; __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); __atomic_store_n(&th->running, 1, __ATOMIC_RELEASE); syscall(SYS_futex, &th->running, FUTEX_WAKE); if (collide && call % 2) break; struct timespec ts; ts.tv_sec = 0; ts.tv_nsec = 20 * 1000 * 1000; syscall(SYS_futex, &th->running, FUTEX_WAIT, 1, &ts); if (running) usleep((call == num_calls - 1) ? 10000 : 1000); break; } } } } long r[3]; uint64_t procid; void execute_call(int call) { switch (call) { case 0: syscall(__NR_mmap, 0x20000000, 0xfff000, 3, 0x32, -1, 0); break; case 1: syscall(__NR_socket, 2, 1, 0); break; case 2: NONFAILING(memcpy((void*)0x20002ff2, "/selinux/load", 14)); syscall(__NR_openat, 0xffffffffffffff9c, 0x20002ff2, 2, 0); break; case 3: syscall(__NR_clone, 0x20000, 0x20000000, 0x20000000, 0x20000000, 0x20000000); break; case 4: NONFAILING(memcpy((void*)0x20000000, "/dev/rfkill", 12)); syscall(__NR_openat, 0xffffffffffffff9c, 0x20000000, 0x400, 0); break; case 5: NONFAILING(memcpy((void*)0x209a9000, "/dev/kvm", 9)); r[0] = syscall(__NR_openat, 0xffffffffffffff9c, 0x209a9000, 0, 0); break; case 6: r[1] = syscall(__NR_ioctl, r[0], 0xae01, 0); break; case 7: r[2] = syscall(__NR_ioctl, r[1], 0xae41, 0); break; case 8: syscall(__NR_clock_gettime, 0, 0x20000000); break; case 9: NONFAILING(*(uint32_t*)0x20bf7000 = 0x10005); NONFAILING(*(uint32_t*)0x20bf7004 = 0); NONFAILING(*(uint64_t*)0x20bf7008 = 0); NONFAILING(*(uint64_t*)0x20bf7010 = 0x2000); NONFAILING(*(uint64_t*)0x20bf7018 = 0x20000000); syscall(__NR_ioctl, r[1], 0x4020ae46, 0x20bf7000); break; case 10: syscall(__NR_ioctl, r[2], 0xaeb7); break; case 11: syscall(__NR_ioctl, r[2], 0xae80, 0); break; case 12: syscall(__NR_ioctl, r[2], 0xae80, 0); break; case 13: NONFAILING(*(uint64_t*)0x207f3000 = 0x20920fa0); NONFAILING(*(uint32_t*)0x207f3008 = 0x60); NONFAILING(*(uint64_t*)0x207f3010 = 0x20fda000); NONFAILING(*(uint64_t*)0x207f3018 = 0); NONFAILING(*(uint64_t*)0x207f3020 = 0x20920f9c); NONFAILING(*(uint64_t*)0x207f3028 = 0x10); NONFAILING(*(uint32_t*)0x207f3030 = 0); NONFAILING(*(uint16_t*)0x20920fa0 = 0x27); NONFAILING(*(uint32_t*)0x20920fa4 = 0); NONFAILING(*(uint32_t*)0x20920fa8 = 0); NONFAILING(*(uint32_t*)0x20920fac = 0); NONFAILING(*(uint8_t*)0x20920fb0 = 0); NONFAILING(*(uint8_t*)0x20920fb1 = 0); NONFAILING(memcpy((void*)0x20920fb2, "\x18\x14\x14\x56\x80\xff\xff\xff\xff\xff\xff\x78\x91\x00" "\x00\x76\xe4\x31\x08\xf5\x6b\xbd\x95\x05\x4d\x6b\x05\x00" "\x00\xbe\xbc\x48\xe8\xd8\xcd\xa3\xd6\x81\xfc\x48\x2e\x6e" "\x97\x09\x00\x00\x00\x00\x00\x00\xda\x03\x03\xcc\x20\x8a" "\x6e\x4b\xf8\x2e\xff\x4d\x04", 63)); NONFAILING(*(uint64_t*)0x20920ff8 = 0); NONFAILING(*(uint64_t*)0x20920f9c = 0x10); NONFAILING(*(uint32_t*)0x20920fa4 = 0x29); NONFAILING(*(uint32_t*)0x20920fa8 = 0x3b); syscall(__NR_sendmsg, -1, 0x207f3000, 0); break; } } void test() { memset(r, -1, sizeof(r)); execute(14); collide = 1; execute(14); } int main() { for (procid = 0; procid < 8; procid++) { if (fork() == 0) { install_segv_handler(); for (;;) { int pid = do_sandbox_none(procid, false); int status = 0; while (waitpid(pid, &status, __WALL) != pid) { } } } } sleep(1000000); return 0; }