// https://syzkaller.appspot.com/bug?id=de24bb052989af7a72e7bf51895242e5c0fbda94 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } #include #include #include #include #include const int kFailStatus = 67; const int kRetryStatus = 69; static void exitf(const char* msg, ...) { int e = errno; va_list args; va_start(args, msg); vfprintf(stderr, msg, args); va_end(args); fprintf(stderr, " (errno %d)\n", e); doexit(kRetryStatus); } #define BITMASK_LEN(type, bf_len) (type)((1ull << (bf_len)) - 1) #define BITMASK_LEN_OFF(type, bf_off, bf_len) \ (type)(BITMASK_LEN(type, (bf_len)) << (bf_off)) #define STORE_BY_BITMASK(type, addr, val, bf_off, bf_len) \ if ((bf_off) == 0 && (bf_len) == 0) { \ *(type*)(addr) = (type)(val); \ } else { \ type new_val = *(type*)(addr); \ new_val &= ~BITMASK_LEN_OFF(type, (bf_off), (bf_len)); \ new_val |= ((type)(val)&BITMASK_LEN(type, (bf_len))) << (bf_off); \ *(type*)(addr) = new_val; \ } static uintptr_t syz_fuseblk_mount(uintptr_t a0, uintptr_t a1, uintptr_t a2, uintptr_t a3, uintptr_t a4, uintptr_t a5, uintptr_t a6, uintptr_t a7) { uint64_t target = a0; uint64_t blkdev = a1; uint64_t mode = a2; uint64_t uid = a3; uint64_t gid = a4; uint64_t maxread = a5; uint64_t blksize = a6; uint64_t flags = a7; int fd = open("/dev/fuse", O_RDWR); if (fd == -1) return fd; if (syscall(SYS_mknodat, AT_FDCWD, blkdev, S_IFBLK, makedev(7, 199))) return fd; char buf[256]; sprintf(buf, "fd=%d,user_id=%ld,group_id=%ld,rootmode=0%o", fd, (long)uid, (long)gid, (unsigned)mode & ~3u); if (maxread != 0) sprintf(buf + strlen(buf), ",max_read=%ld", (long)maxread); if (blksize != 0) sprintf(buf + strlen(buf), ",blksize=%ld", (long)blksize); if (mode & 1) strcat(buf, ",default_permissions"); if (mode & 2) strcat(buf, ",allow_other"); syscall(SYS_mount, blkdev, target, "fuseblk", flags, buf); return fd; } static bool write_file(const char* file, const char* what, ...) { char buf[1024]; va_list args; va_start(args, what); vsnprintf(buf, sizeof(buf), what, args); va_end(args); buf[sizeof(buf) - 1] = 0; int len = strlen(buf); int fd = open(file, O_WRONLY | O_CLOEXEC); if (fd == -1) return false; if (write(fd, buf, len) != len) { int err = errno; close(fd); errno = err; return false; } close(fd); return true; } static int inject_fault(int nth) { int fd; char buf[16]; fd = open("/proc/thread-self/fail-nth", O_RDWR); if (fd == -1) exitf("failed to open /proc/thread-self/fail-nth"); sprintf(buf, "%d", nth + 1); if (write(fd, buf, strlen(buf)) != (ssize_t)strlen(buf)) exitf("failed to write /proc/thread-self/fail-nth"); return fd; } static void execute_one(); extern unsigned long long procid; void loop() { while (1) { execute_one(); } } struct thread_t { int created, running, call; pthread_t th; }; static struct thread_t threads[16]; static void execute_call(int call); static int running; static void* thr(void* arg) { struct thread_t* th = (struct thread_t*)arg; for (;;) { while (!__atomic_load_n(&th->running, __ATOMIC_ACQUIRE)) syscall(SYS_futex, &th->running, FUTEX_WAIT, 0, 0); execute_call(th->call); __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); __atomic_store_n(&th->running, 0, __ATOMIC_RELEASE); syscall(SYS_futex, &th->running, FUTEX_WAKE); } return 0; } static void execute(int num_calls) { int call, thread; running = 0; for (call = 0; call < num_calls; call++) { for (thread = 0; thread < sizeof(threads) / sizeof(threads[0]); thread++) { struct thread_t* th = &threads[thread]; if (!th->created) { th->created = 1; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setstacksize(&attr, 128 << 10); pthread_create(&th->th, &attr, thr, th); } if (!__atomic_load_n(&th->running, __ATOMIC_ACQUIRE)) { th->call = call; __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); __atomic_store_n(&th->running, 1, __ATOMIC_RELEASE); syscall(SYS_futex, &th->running, FUTEX_WAKE); struct timespec ts; ts.tv_sec = 0; ts.tv_nsec = 20 * 1000 * 1000; syscall(SYS_futex, &th->running, FUTEX_WAIT, 1, &ts); if (running) usleep((call == num_calls - 1) ? 10000 : 1000); break; } } } } void execute_call(int call) { switch (call) { case 0: *(uint32_t*)0x20348f88 = 2; *(uint32_t*)0x20348f8c = 0x70; *(uint8_t*)0x20348f90 = 0xe6; *(uint8_t*)0x20348f91 = 0; *(uint8_t*)0x20348f92 = 0; *(uint8_t*)0x20348f93 = 0; *(uint32_t*)0x20348f94 = 0; *(uint64_t*)0x20348f98 = 0; *(uint64_t*)0x20348fa0 = 0; *(uint64_t*)0x20348fa8 = 0; STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 0, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 1, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 2, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 3, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 4, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 5, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 6, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 7, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 8, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 9, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 10, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 11, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 12, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 13, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 14, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 15, 2); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 17, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 18, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 19, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 20, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 21, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 22, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 23, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 24, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 25, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 26, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 27, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 28, 1); STORE_BY_BITMASK(uint64_t, 0x20348fb0, 0, 29, 35); *(uint32_t*)0x20348fb8 = 0; *(uint32_t*)0x20348fbc = 0; *(uint64_t*)0x20348fc0 = 0x20000000; *(uint64_t*)0x20348fc8 = 0; *(uint64_t*)0x20348fd0 = 0; *(uint64_t*)0x20348fd8 = 0; *(uint32_t*)0x20348fe0 = 0; *(uint32_t*)0x20348fe4 = 0; *(uint64_t*)0x20348fe8 = 0; *(uint32_t*)0x20348ff0 = 0; *(uint16_t*)0x20348ff4 = 0; *(uint16_t*)0x20348ff6 = 0; syscall(__NR_perf_event_open, 0x20348f88, 0, 0, -1, 0); break; case 1: memcpy((void*)0x20000080, "./file0", 8); memcpy((void*)0x200000c0, "./file0", 8); write_file("/sys/kernel/debug/failslab/ignore-gfp-wait", "N"); write_file("/sys/kernel/debug/fail_futex/ignore-private", "N"); inject_fault(83); syz_fuseblk_mount(0x20000080, 0x200000c0, 0xa000, 0, 0, 0, 0, 0); break; case 2: memcpy((void*)0x20000040, "./file0", 8); syscall(__NR_creat, 0x20000040, 0); break; } } void execute_one() { execute(3); } int main() { syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); for (;;) { loop(); } }