| // KASAN: slab-out-of-bounds Read in tls_push_record |
| // https://syzkaller.appspot.com/bug?id=c362601f055ed0d3b7878f3880f4c96c29e82af1 |
| // status:open |
| // autogenerated by syzkaller (https://github.com/google/syzkaller) |
| |
| #define _GNU_SOURCE |
| |
| #include <endian.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <stdarg.h> |
| #include <stdbool.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/stat.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <unistd.h> |
| |
| static bool write_file(const char* file, const char* what, ...) |
| { |
| char buf[1024]; |
| va_list args; |
| va_start(args, what); |
| vsnprintf(buf, sizeof(buf), what, args); |
| va_end(args); |
| buf[sizeof(buf) - 1] = 0; |
| int len = strlen(buf); |
| int fd = open(file, O_WRONLY | O_CLOEXEC); |
| if (fd == -1) |
| return false; |
| if (write(fd, buf, len) != len) { |
| int err = errno; |
| close(fd); |
| errno = err; |
| return false; |
| } |
| close(fd); |
| return true; |
| } |
| |
| static int inject_fault(int nth) |
| { |
| int fd; |
| fd = open("/proc/thread-self/fail-nth", O_RDWR); |
| if (fd == -1) |
| exit(1); |
| char buf[16]; |
| sprintf(buf, "%d", nth + 1); |
| if (write(fd, buf, strlen(buf)) != (ssize_t)strlen(buf)) |
| exit(1); |
| return fd; |
| } |
| |
| uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; |
| |
| int main(void) |
| { |
| syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); |
| long res = 0; |
| res = syscall(__NR_socket, 0xa, 1, 0); |
| if (res != -1) |
| r[0] = res; |
| res = syscall(__NR_socket, 0xa, 1, 0); |
| if (res != -1) |
| r[1] = res; |
| *(uint16_t*)0x20000040 = 0xa; |
| *(uint16_t*)0x20000042 = htobe16(0x4e22); |
| *(uint32_t*)0x20000044 = htobe32(0); |
| memcpy((void*)0x20000048, |
| "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", |
| 16); |
| *(uint32_t*)0x20000058 = 0; |
| syscall(__NR_bind, r[1], 0x20000040, 0x1c); |
| syscall(__NR_listen, r[1], 0); |
| *(uint16_t*)0x20000080 = 0xa; |
| *(uint16_t*)0x20000082 = htobe16(0x4e22); |
| *(uint32_t*)0x20000084 = htobe32(0); |
| *(uint64_t*)0x20000088 = htobe64(0); |
| *(uint64_t*)0x20000090 = htobe64(1); |
| *(uint32_t*)0x20000098 = 0; |
| syscall(__NR_sendto, r[0], 0, 0, 0x20000004, 0x20000080, 0x1c); |
| memcpy((void*)0x20000080, "tls\000", 4); |
| syscall(__NR_setsockopt, r[0], 6, 0x1f, 0x20000080, 0x152); |
| *(uint16_t*)0x20000100 = 0x303; |
| *(uint16_t*)0x20000102 = 0x33; |
| syscall(__NR_setsockopt, r[0], 0x11a, 1, 0x20000100, 0x28); |
| syscall(__NR_mmap, 0x200be000, 0x3000, 0, 0x100132, -1, 0); |
| write_file("/sys/kernel/debug/failslab/ignore-gfp-wait", "N"); |
| write_file("/sys/kernel/debug/fail_futex/ignore-private", "N"); |
| write_file("/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", "N"); |
| write_file("/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", "N"); |
| write_file("/sys/kernel/debug/fail_page_alloc/min-order", "0"); |
| inject_fault(0); |
| syscall(__NR_sendto, r[0], 0x200005c0, 0xe0ffffff, 0, 0, 0xd8); |
| return 0; |
| } |