// https://syzkaller.appspot.com/bug?id=6dcd14a729df98f989c7b76d254226ae67084efd // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } #include #include const int kFailStatus = 67; const int kRetryStatus = 69; static void fail(const char* msg, ...) { int e = errno; va_list args; va_start(args, msg); vfprintf(stderr, msg, args); va_end(args); fprintf(stderr, " (errno %d)\n", e); doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus); } #define BITMASK_LEN(type, bf_len) (type)((1ull << (bf_len)) - 1) #define BITMASK_LEN_OFF(type, bf_off, bf_len) \ (type)(BITMASK_LEN(type, (bf_len)) << (bf_off)) #define STORE_BY_BITMASK(type, addr, val, bf_off, bf_len) \ if ((bf_off) == 0 && (bf_len) == 0) { \ *(type*)(addr) = (type)(val); \ } else { \ type new_val = *(type*)(addr); \ new_val &= ~BITMASK_LEN_OFF(type, (bf_off), (bf_len)); \ new_val |= ((type)(val)&BITMASK_LEN(type, (bf_len))) << (bf_off); \ *(type*)(addr) = new_val; \ } struct csum_inet { uint32_t acc; }; static void csum_inet_init(struct csum_inet* csum) { csum->acc = 0; } static void csum_inet_update(struct csum_inet* csum, const uint8_t* data, size_t length) { if (length == 0) return; size_t i; for (i = 0; i < length - 1; i += 2) csum->acc += *(uint16_t*)&data[i]; if (length & 1) csum->acc += (uint16_t)data[length - 1]; while (csum->acc > 0xffff) csum->acc = (csum->acc & 0xffff) + (csum->acc >> 16); } static uint16_t csum_inet_digest(struct csum_inet* csum) { return ~csum->acc; } static uintptr_t syz_open_dev(uintptr_t a0, uintptr_t a1, uintptr_t a2) { if (a0 == 0xc || a0 == 0xb) { char buf[128]; sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, (uint8_t)a2); return open(buf, O_RDWR, 0); } else { char buf[1024]; char* hash; strncpy(buf, (char*)a0, sizeof(buf)); buf[sizeof(buf) - 1] = 0; while ((hash = strchr(buf, '#'))) { *hash = '0' + (char)(a1 % 10); a1 /= 10; } return open(buf, a2, 0); } } static void loop(); static void sandbox_common() { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); setpgrp(); setsid(); struct rlimit rlim; rlim.rlim_cur = rlim.rlim_max = 128 << 20; setrlimit(RLIMIT_AS, &rlim); rlim.rlim_cur = rlim.rlim_max = 8 << 20; setrlimit(RLIMIT_MEMLOCK, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_FSIZE, &rlim); rlim.rlim_cur = rlim.rlim_max = 1 << 20; setrlimit(RLIMIT_STACK, &rlim); rlim.rlim_cur = rlim.rlim_max = 0; setrlimit(RLIMIT_CORE, &rlim); #define CLONE_NEWCGROUP 0x02000000 if (unshare(CLONE_NEWNS)) { } if (unshare(CLONE_NEWIPC)) { } if (unshare(CLONE_NEWCGROUP)) { } if (unshare(CLONE_NEWUTS)) { } if (unshare(CLONE_SYSVSEM)) { } } static int do_sandbox_none(int executor_pid, bool enable_tun) { if (unshare(CLONE_NEWPID)) { } int pid = fork(); if (pid < 0) fail("sandbox fork failed"); if (pid) return pid; sandbox_common(); if (unshare(CLONE_NEWNET)) { } loop(); doexit(1); } static void test(); void loop() { while (1) { test(); } } long r[1]; uint64_t procid; void test() { memset(r, -1, sizeof(r)); syscall(__NR_mmap, 0x20000000, 0xfff000, 3, 0x32, -1, 0); memcpy((void*)0x20d72ff7, "/dev/sg#", 9); r[0] = syz_open_dev(0x20d72ff7, 0, 0x2000000002); *(uint8_t*)0x20428f7a = 0; *(uint8_t*)0x20428f7b = 0; *(uint16_t*)0x20428f7c = 0; *(uint16_t*)0x20428f7e = 0; *(uint16_t*)0x20428f80 = 0; *(uint16_t*)0x20428f82 = 0; STORE_BY_BITMASK(uint8_t, 0x20428f84, 7, 0, 4); STORE_BY_BITMASK(uint8_t, 0x20428f84, 4, 4, 4); STORE_BY_BITMASK(uint8_t, 0x20428f85, 0, 0, 2); STORE_BY_BITMASK(uint8_t, 0x20428f85, 0, 2, 6); *(uint16_t*)0x20428f86 = htobe16(0x30); *(uint16_t*)0x20428f88 = 0; *(uint16_t*)0x20428f8a = htobe16(0); *(uint8_t*)0x20428f8c = 0; *(uint8_t*)0x20428f8d = 0; *(uint16_t*)0x20428f8e = 0; *(uint32_t*)0x20428f90 = htobe32(0xe0000002); *(uint32_t*)0x20428f94 = htobe32(0xe0000001); *(uint8_t*)0x20428f98 = 7; *(uint8_t*)0x20428f99 = 7; *(uint8_t*)0x20428f9a = 0; *(uint32_t*)0x20428f9b = htobe32(-1); *(uint16_t*)0x20428fa0 = 0; *(uint16_t*)0x20428fa2 = 0; *(uint32_t*)0x20428fa4 = 0x42424242; *(uint32_t*)0x20428fa8 = 0x42424242; STORE_BY_BITMASK(uint8_t, 0x20428fac, 0, 0, 1); STORE_BY_BITMASK(uint8_t, 0x20428fac, 0, 1, 3); STORE_BY_BITMASK(uint8_t, 0x20428fac, 5, 4, 4); *(uint8_t*)0x20428fad = 0; *(uint16_t*)0x20428fae = htobe16(0); *(uint16_t*)0x20428fb0 = 0; *(uint16_t*)0x20428fb2 = htobe16(0); struct csum_inet csum_1; csum_inet_init(&csum_1); csum_inet_update(&csum_1, (const uint8_t*)0x20428f90, 4); csum_inet_update(&csum_1, (const uint8_t*)0x20428f94, 4); uint16_t csum_1_chunk_2 = 0x600; csum_inet_update(&csum_1, (const uint8_t*)&csum_1_chunk_2, 2); uint16_t csum_1_chunk_3 = 0x1400; csum_inet_update(&csum_1, (const uint8_t*)&csum_1_chunk_3, 2); csum_inet_update(&csum_1, (const uint8_t*)0x20428fa0, 20); *(uint16_t*)0x20428fb0 = csum_inet_digest(&csum_1); struct csum_inet csum_2; csum_inet_init(&csum_2); csum_inet_update(&csum_2, (const uint8_t*)0x20428f84, 28); *(uint16_t*)0x20428f8e = csum_inet_digest(&csum_2); syscall(__NR_write, r[0], 0x20428f7a, 0x3a); *(uint64_t*)0x203f8f70 = 0x20adff12; *(uint64_t*)0x203f8f78 = 0xee; syscall(__NR_readv, r[0], 0x203f8f70, 1); } int main() { for (procid = 0; procid < 8; procid++) { if (fork() == 0) { for (;;) { int pid = do_sandbox_none(procid, false); int status = 0; while (waitpid(pid, &status, __WALL) != pid) { } } } } sleep(1000000); return 0; }