// https://syzkaller.appspot.com/bug?id=e48fdcd9d25cab1e0c62c19a498b12c1e39898ce // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #define BITMASK(bf_off, bf_len) (((1ull << (bf_len)) - 1) << (bf_off)) #define STORE_BY_BITMASK(type, htobe, addr, val, bf_off, bf_len) \ *(type*)(addr) = \ htobe((htobe(*(type*)(addr)) & ~BITMASK((bf_off), (bf_len))) | \ (((type)(val) << (bf_off)) & BITMASK((bf_off), (bf_len)))) static bool write_file(const char* file, const char* what, ...) { char buf[1024]; va_list args; va_start(args, what); vsnprintf(buf, sizeof(buf), what, args); va_end(args); buf[sizeof(buf) - 1] = 0; int len = strlen(buf); int fd = open(file, O_WRONLY | O_CLOEXEC); if (fd == -1) return false; if (write(fd, buf, len) != len) { int err = errno; close(fd); errno = err; return false; } close(fd); return true; } static int inject_fault(int nth) { int fd; fd = open("/proc/thread-self/fail-nth", O_RDWR); if (fd == -1) exit(1); char buf[16]; sprintf(buf, "%d", nth); if (write(fd, buf, strlen(buf)) != (ssize_t)strlen(buf)) exit(1); return fd; } static void setup_fault() { static struct { const char* file; const char* val; bool fatal; } files[] = { {"/sys/kernel/debug/failslab/ignore-gfp-wait", "N", true}, {"/sys/kernel/debug/fail_futex/ignore-private", "N", false}, {"/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", "N", false}, {"/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", "N", false}, {"/sys/kernel/debug/fail_page_alloc/min-order", "0", false}, }; unsigned i; for (i = 0; i < sizeof(files) / sizeof(files[0]); i++) { if (!write_file(files[i].file, files[i].val)) { if (files[i].fatal) exit(1); } } } uint64_t r[1] = {0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); setup_fault(); intptr_t res = 0; res = syscall(__NR_socket, 0x10ul, 3ul, 0); if (res != -1) r[0] = res; *(uint64_t*)0x20000080 = 0; *(uint32_t*)0x20000088 = 0; *(uint64_t*)0x20000090 = 0x20000280; *(uint64_t*)0x20000280 = 0x200003c0; *(uint32_t*)0x200003c0 = 0x3c; *(uint16_t*)0x200003c4 = 0x10; *(uint16_t*)0x200003c6 = 0x401; *(uint32_t*)0x200003c8 = 0; *(uint32_t*)0x200003cc = 0; *(uint8_t*)0x200003d0 = 0; *(uint8_t*)0x200003d1 = 0; *(uint16_t*)0x200003d2 = 0; *(uint32_t*)0x200003d4 = 0; *(uint32_t*)0x200003d8 = 0; *(uint32_t*)0x200003dc = 0; *(uint16_t*)0x200003e0 = 0x14; STORE_BY_BITMASK(uint16_t, , 0x200003e2, 0x12, 0, 14); STORE_BY_BITMASK(uint16_t, , 0x200003e3, 0, 6, 1); STORE_BY_BITMASK(uint16_t, , 0x200003e3, 1, 7, 1); *(uint16_t*)0x200003e4 = 0xb; *(uint16_t*)0x200003e6 = 1; memcpy((void*)0x200003e8, "batadv\000", 7); *(uint16_t*)0x200003f0 = 4; STORE_BY_BITMASK(uint16_t, , 0x200003f2, 2, 0, 14); STORE_BY_BITMASK(uint16_t, , 0x200003f3, 0, 6, 1); STORE_BY_BITMASK(uint16_t, , 0x200003f3, 1, 7, 1); *(uint16_t*)0x200003f4 = 8; *(uint16_t*)0x200003f6 = 0xa; *(uint32_t*)0x200003f8 = 0; *(uint64_t*)0x20000288 = 0x3c; *(uint64_t*)0x20000098 = 1; *(uint64_t*)0x200000a0 = 0; *(uint64_t*)0x200000a8 = 0; *(uint32_t*)0x200000b0 = 0; inject_fault(10); syscall(__NR_sendmsg, r[0], 0x20000080ul, 0ul); return 0; }