// https://syzkaller.appspot.com/bug?id=5a34035b13d7f4215357b46093ca6d5c45c93f93 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include static long syz_open_dev(volatile long a0, volatile long a1, volatile long a2) { if (a0 == 0xc || a0 == 0xb) { char buf[128]; sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, (uint8_t)a2); return open(buf, O_RDWR, 0); } else { unsigned long nb = a1; char buf[1024]; char* hash; strncpy(buf, (char*)a0, sizeof(buf) - 1); buf[sizeof(buf) - 1] = 0; while ((hash = strchr(buf, '#'))) { *hash = '0' + (char)(nb % 10); nb /= 10; } return open(buf, a2 & ~O_CREAT, 0); } } uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); const char* reason; (void)reason; intptr_t res = 0; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } // syz_open_dev$loop arguments: [ // dev: ptr[in, buffer] { // buffer: {2f 64 65 76 2f 6c 6f 6f 70 23 00} (length 0xb) // } // id: intptr = 0x7 (8 bytes) // flags: open_flags = 0x180862 (8 bytes) // ] // returns fd_loop memcpy((void*)0x200000000240, "/dev/loop#\000", 11); res = -1; res = syz_open_dev( /*dev=*/0x200000000240, /*id=*/7, /*flags=O_NONBLOCK|O_CREAT|O_CLOEXEC|O_RDWR|0x100020*/ 0x180862); if (res != -1) r[0] = res; // openat$sysfs arguments: [ // fd: const = 0xffffffffffffff9c (8 bytes) // dir: ptr[in, buffer] { // buffer: {2f 73 79 73 2f 6b 65 72 6e 65 6c 2f 66 73 63 61 70 73} // (length 0x12) // } // flags: open_flags = 0x40000 (4 bytes) // mode: open_mode = 0x2d (2 bytes) // ] // returns fd memcpy((void*)0x200000000000, "/sys/kernel/fscaps", 18); res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*dir=*/0x200000000000ul, /*flags=O_NOATIME*/ 0x40000, /*mode=S_IXOTH|S_IROTH|S_IXGRP|S_IRGRP*/ 0x2d); if (res != -1) r[1] = res; // ioctl$LOOP_CONFIGURE arguments: [ // fd: fd_loop (resource) // cmd: const = 0x4c0a (4 bytes) // arg: ptr[in, loop_config] { // loop_config { // fd: fd_loop (resource) // block_size: int32 = 0x0 (4 bytes) // info: loop_info64 { // lo_device: const = 0x0 (8 bytes) // lo_inode: const = 0x0 (8 bytes) // lo_rdevice: const = 0x0 (8 bytes) // lo_offset: int64 = 0x4 (8 bytes) // lo_sizelimit: int64 = 0x4000000000000ffd (8 bytes) // lo_number: const = 0x0 (4 bytes) // lo_enc_type: lo_encrypt_type = 0x0 (4 bytes) // lo_enc_key_size: int32 = 0x1e (4 bytes) // lo_flags: lo_flags = 0xc (4 bytes) // lo_file_name: buffer: {fa f9 83 17 e5 a1 14 99 89 fc 8d be 43 ea // 6a cc 96 e3 a2 50 3d c3 ff 03 e3 7d 58 12 70 ba d0 09 9c eb dc 25 // f5 ab 60 c9 e6 d6 80 f9 85 88 1a 7b ed a9 d6 90 98 c8 b5 34 46 4c // 51 6b dd 8a 0f 35} (length 0x40) lo_crypt_name: buffer: {32 09 cc // 26 f7 06 1a 74 df 34 40 07 00 08 00 00 23 4b 30 c5 09 97 d3 be d1 // 09 ff 21 76 ff 7b fe 55 cd 4a 5d 83 cd 4a 52 4b d3 ff e7 0c 7f 3f // 80 0b 2f 7b 6a a5 8d c5 0a 1f ca ed 1e 83 1f a7 9a} (length 0x40) // lo_enc_key: buffer: {67 52 37 60 fd 40 f7 8d 2c fc 03 d8 1a 8c a5 // 5b a1 39 c0 18 02 c4 da e4 16 2e 43 ac 61 b7 ad 33} (length 0x20) // lo_init: array[int64] { // int64 = 0x2 (8 bytes) // int64 = 0x400000000007 (8 bytes) // } // } // reserved: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00 00} (length 0x40) // } // } // ] *(uint32_t*)0x200000000380 = r[1]; *(uint32_t*)0x200000000384 = 0; *(uint64_t*)0x200000000388 = 0; *(uint64_t*)0x200000000390 = 0; *(uint64_t*)0x200000000398 = 0; *(uint64_t*)0x2000000003a0 = 4; *(uint64_t*)0x2000000003a8 = 0x4000000000000ffd; *(uint32_t*)0x2000000003b0 = 0; *(uint32_t*)0x2000000003b4 = 0; *(uint32_t*)0x2000000003b8 = 0x1e; *(uint32_t*)0x2000000003bc = 0xc; memcpy((void*)0x2000000003c0, "\xfa\xf9\x83\x17\xe5\xa1\x14\x99\x89\xfc\x8d\xbe\x43\xea\x6a\xcc\x96" "\xe3\xa2\x50\x3d\xc3\xff\x03\xe3\x7d\x58\x12\x70\xba\xd0\x09\x9c\xeb" "\xdc\x25\xf5\xab\x60\xc9\xe6\xd6\x80\xf9\x85\x88\x1a\x7b\xed\xa9\xd6" "\x90\x98\xc8\xb5\x34\x46\x4c\x51\x6b\xdd\x8a\x0f\x35", 64); memcpy((void*)0x200000000400, "\x32\x09\xcc\x26\xf7\x06\x1a\x74\xdf\x34\x40\x07\x00\x08\x00\x00\x23" "\x4b\x30\xc5\x09\x97\xd3\xbe\xd1\x09\xff\x21\x76\xff\x7b\xfe\x55\xcd" "\x4a\x5d\x83\xcd\x4a\x52\x4b\xd3\xff\xe7\x0c\x7f\x3f\x80\x0b\x2f\x7b" "\x6a\xa5\x8d\xc5\x0a\x1f\xca\xed\x1e\x83\x1f\xa7\x9a", 64); memcpy((void*)0x200000000440, "\x67\x52\x37\x60\xfd\x40\xf7\x8d\x2c\xfc\x03\xd8\x1a\x8c\xa5\x5b\xa1" "\x39\xc0\x18\x02\xc4\xda\xe4\x16\x2e\x43\xac\x61\xb7\xad\x33", 32); *(uint64_t*)0x200000000460 = 2; *(uint64_t*)0x200000000468 = 0x400000000007; memset((void*)0x200000000470, 0, 64); syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x4c0a, /*arg=*/0x200000000380ul); // ioctl$LOOP_CHANGE_FD arguments: [ // fd: fd_loop (resource) // cmd: const = 0x4c06 (4 bytes) // arg: fd (resource) // ] syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x4c06, /*arg=*/r[1]); return 0; }