| // INFO: rcu detected stall in ext4_filemap_fault |
| // https://syzkaller.appspot.com/bug?id=58b508ef80af6d889daab2ba9c31f736c452716f |
| // status:open |
| // autogenerated by syzkaller (https://github.com/google/syzkaller) |
| |
| #define _GNU_SOURCE |
| |
| #include <arpa/inet.h> |
| #include <dirent.h> |
| #include <endian.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <net/if.h> |
| #include <net/if_arp.h> |
| #include <netinet/in.h> |
| #include <pthread.h> |
| #include <sched.h> |
| #include <setjmp.h> |
| #include <signal.h> |
| #include <stdarg.h> |
| #include <stdbool.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/ioctl.h> |
| #include <sys/mman.h> |
| #include <sys/mount.h> |
| #include <sys/prctl.h> |
| #include <sys/resource.h> |
| #include <sys/socket.h> |
| #include <sys/stat.h> |
| #include <sys/syscall.h> |
| #include <sys/time.h> |
| #include <sys/types.h> |
| #include <sys/uio.h> |
| #include <sys/wait.h> |
| #include <time.h> |
| #include <unistd.h> |
| |
| #include <linux/capability.h> |
| #include <linux/futex.h> |
| #include <linux/if_addr.h> |
| #include <linux/if_ether.h> |
| #include <linux/if_link.h> |
| #include <linux/if_tun.h> |
| #include <linux/in6.h> |
| #include <linux/ip.h> |
| #include <linux/neighbour.h> |
| #include <linux/net.h> |
| #include <linux/netlink.h> |
| #include <linux/rtnetlink.h> |
| #include <linux/tcp.h> |
| #include <linux/veth.h> |
| |
| unsigned long long procid; |
| |
| static __thread int skip_segv; |
| static __thread jmp_buf segv_env; |
| |
| static void segv_handler(int sig, siginfo_t* info, void* ctx) |
| { |
| uintptr_t addr = (uintptr_t)info->si_addr; |
| const uintptr_t prog_start = 1 << 20; |
| const uintptr_t prog_end = 100 << 20; |
| if (__atomic_load_n(&skip_segv, __ATOMIC_RELAXED) && |
| (addr < prog_start || addr > prog_end)) { |
| _longjmp(segv_env, 1); |
| } |
| exit(sig); |
| } |
| |
| static void install_segv_handler(void) |
| { |
| struct sigaction sa; |
| memset(&sa, 0, sizeof(sa)); |
| sa.sa_handler = SIG_IGN; |
| syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8); |
| syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8); |
| memset(&sa, 0, sizeof(sa)); |
| sa.sa_sigaction = segv_handler; |
| sa.sa_flags = SA_NODEFER | SA_SIGINFO; |
| sigaction(SIGSEGV, &sa, NULL); |
| sigaction(SIGBUS, &sa, NULL); |
| } |
| |
| #define NONFAILING(...) \ |
| { \ |
| __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ |
| if (_setjmp(segv_env) == 0) { \ |
| __VA_ARGS__; \ |
| } \ |
| __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ |
| } |
| |
| static void sleep_ms(uint64_t ms) |
| { |
| usleep(ms * 1000); |
| } |
| |
| static uint64_t current_time_ms(void) |
| { |
| struct timespec ts; |
| if (clock_gettime(CLOCK_MONOTONIC, &ts)) |
| exit(1); |
| return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; |
| } |
| |
| static void use_temporary_dir(void) |
| { |
| char tmpdir_template[] = "./syzkaller.XXXXXX"; |
| char* tmpdir = mkdtemp(tmpdir_template); |
| if (!tmpdir) |
| exit(1); |
| if (chmod(tmpdir, 0777)) |
| exit(1); |
| if (chdir(tmpdir)) |
| exit(1); |
| } |
| |
| static void thread_start(void* (*fn)(void*), void* arg) |
| { |
| pthread_t th; |
| pthread_attr_t attr; |
| pthread_attr_init(&attr); |
| pthread_attr_setstacksize(&attr, 128 << 10); |
| int i; |
| for (i = 0; i < 100; i++) { |
| if (pthread_create(&th, &attr, fn, arg) == 0) { |
| pthread_attr_destroy(&attr); |
| return; |
| } |
| if (errno == EAGAIN) { |
| usleep(50); |
| continue; |
| } |
| break; |
| } |
| exit(1); |
| } |
| |
| typedef struct { |
| int state; |
| } event_t; |
| |
| static void event_init(event_t* ev) |
| { |
| ev->state = 0; |
| } |
| |
| static void event_reset(event_t* ev) |
| { |
| ev->state = 0; |
| } |
| |
| static void event_set(event_t* ev) |
| { |
| if (ev->state) |
| exit(1); |
| __atomic_store_n(&ev->state, 1, __ATOMIC_RELEASE); |
| syscall(SYS_futex, &ev->state, FUTEX_WAKE | FUTEX_PRIVATE_FLAG); |
| } |
| |
| static void event_wait(event_t* ev) |
| { |
| while (!__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE)) |
| syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, 0); |
| } |
| |
| static int event_isset(event_t* ev) |
| { |
| return __atomic_load_n(&ev->state, __ATOMIC_ACQUIRE); |
| } |
| |
| static int event_timedwait(event_t* ev, uint64_t timeout) |
| { |
| uint64_t start = current_time_ms(); |
| uint64_t now = start; |
| for (;;) { |
| uint64_t remain = timeout - (now - start); |
| struct timespec ts; |
| ts.tv_sec = remain / 1000; |
| ts.tv_nsec = (remain % 1000) * 1000 * 1000; |
| syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, &ts); |
| if (__atomic_load_n(&ev->state, __ATOMIC_RELAXED)) |
| return 1; |
| now = current_time_ms(); |
| if (now - start > timeout) |
| return 0; |
| } |
| } |
| |
| static bool write_file(const char* file, const char* what, ...) |
| { |
| char buf[1024]; |
| va_list args; |
| va_start(args, what); |
| vsnprintf(buf, sizeof(buf), what, args); |
| va_end(args); |
| buf[sizeof(buf) - 1] = 0; |
| int len = strlen(buf); |
| int fd = open(file, O_WRONLY | O_CLOEXEC); |
| if (fd == -1) |
| return false; |
| if (write(fd, buf, len) != len) { |
| int err = errno; |
| close(fd); |
| errno = err; |
| return false; |
| } |
| close(fd); |
| return true; |
| } |
| |
| static struct { |
| char* pos; |
| int nesting; |
| struct nlattr* nested[8]; |
| char buf[1024]; |
| } nlmsg; |
| |
| static void netlink_init(int typ, int flags, const void* data, int size) |
| { |
| memset(&nlmsg, 0, sizeof(nlmsg)); |
| struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg.buf; |
| hdr->nlmsg_type = typ; |
| hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags; |
| memcpy(hdr + 1, data, size); |
| nlmsg.pos = (char*)(hdr + 1) + NLMSG_ALIGN(size); |
| } |
| |
| static void netlink_attr(int typ, const void* data, int size) |
| { |
| struct nlattr* attr = (struct nlattr*)nlmsg.pos; |
| attr->nla_len = sizeof(*attr) + size; |
| attr->nla_type = typ; |
| memcpy(attr + 1, data, size); |
| nlmsg.pos += NLMSG_ALIGN(attr->nla_len); |
| } |
| |
| static void netlink_nest(int typ) |
| { |
| struct nlattr* attr = (struct nlattr*)nlmsg.pos; |
| attr->nla_type = typ; |
| nlmsg.pos += sizeof(*attr); |
| nlmsg.nested[nlmsg.nesting++] = attr; |
| } |
| |
| static void netlink_done(void) |
| { |
| struct nlattr* attr = nlmsg.nested[--nlmsg.nesting]; |
| attr->nla_len = nlmsg.pos - (char*)attr; |
| } |
| |
| static int netlink_send(int sock) |
| { |
| if (nlmsg.pos > nlmsg.buf + sizeof(nlmsg.buf) || nlmsg.nesting) |
| exit(1); |
| struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg.buf; |
| hdr->nlmsg_len = nlmsg.pos - nlmsg.buf; |
| struct sockaddr_nl addr; |
| memset(&addr, 0, sizeof(addr)); |
| addr.nl_family = AF_NETLINK; |
| unsigned n = sendto(sock, nlmsg.buf, hdr->nlmsg_len, 0, |
| (struct sockaddr*)&addr, sizeof(addr)); |
| if (n != hdr->nlmsg_len) |
| exit(1); |
| n = recv(sock, nlmsg.buf, sizeof(nlmsg.buf), 0); |
| if (n < sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr)) |
| exit(1); |
| if (hdr->nlmsg_type != NLMSG_ERROR) |
| exit(1); |
| return -((struct nlmsgerr*)(hdr + 1))->error; |
| } |
| |
| static void netlink_add_device_impl(const char* type, const char* name) |
| { |
| struct ifinfomsg hdr; |
| memset(&hdr, 0, sizeof(hdr)); |
| netlink_init(RTM_NEWLINK, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); |
| if (name) |
| netlink_attr(IFLA_IFNAME, name, strlen(name)); |
| netlink_nest(IFLA_LINKINFO); |
| netlink_attr(IFLA_INFO_KIND, type, strlen(type)); |
| } |
| |
| static void netlink_add_device(int sock, const char* type, const char* name) |
| { |
| netlink_add_device_impl(type, name); |
| netlink_done(); |
| int err = netlink_send(sock); |
| (void)err; |
| } |
| |
| static void netlink_add_veth(int sock, const char* name, const char* peer) |
| { |
| netlink_add_device_impl("veth", name); |
| netlink_nest(IFLA_INFO_DATA); |
| netlink_nest(VETH_INFO_PEER); |
| nlmsg.pos += sizeof(struct ifinfomsg); |
| netlink_attr(IFLA_IFNAME, peer, strlen(peer)); |
| netlink_done(); |
| netlink_done(); |
| netlink_done(); |
| int err = netlink_send(sock); |
| (void)err; |
| } |
| |
| static void netlink_add_hsr(int sock, const char* name, const char* slave1, |
| const char* slave2) |
| { |
| netlink_add_device_impl("hsr", name); |
| netlink_nest(IFLA_INFO_DATA); |
| int ifindex1 = if_nametoindex(slave1); |
| netlink_attr(IFLA_HSR_SLAVE1, &ifindex1, sizeof(ifindex1)); |
| int ifindex2 = if_nametoindex(slave2); |
| netlink_attr(IFLA_HSR_SLAVE2, &ifindex2, sizeof(ifindex2)); |
| netlink_done(); |
| netlink_done(); |
| int err = netlink_send(sock); |
| (void)err; |
| } |
| |
| static void netlink_device_change(int sock, const char* name, bool up, |
| const char* master, const void* mac, |
| int macsize) |
| { |
| struct ifinfomsg hdr; |
| memset(&hdr, 0, sizeof(hdr)); |
| if (up) |
| hdr.ifi_flags = hdr.ifi_change = IFF_UP; |
| netlink_init(RTM_NEWLINK, 0, &hdr, sizeof(hdr)); |
| netlink_attr(IFLA_IFNAME, name, strlen(name)); |
| if (master) { |
| int ifindex = if_nametoindex(master); |
| netlink_attr(IFLA_MASTER, &ifindex, sizeof(ifindex)); |
| } |
| if (macsize) |
| netlink_attr(IFLA_ADDRESS, mac, macsize); |
| int err = netlink_send(sock); |
| (void)err; |
| } |
| |
| static int netlink_add_addr(int sock, const char* dev, const void* addr, |
| int addrsize) |
| { |
| struct ifaddrmsg hdr; |
| memset(&hdr, 0, sizeof(hdr)); |
| hdr.ifa_family = addrsize == 4 ? AF_INET : AF_INET6; |
| hdr.ifa_prefixlen = addrsize == 4 ? 24 : 120; |
| hdr.ifa_scope = RT_SCOPE_UNIVERSE; |
| hdr.ifa_index = if_nametoindex(dev); |
| netlink_init(RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr, sizeof(hdr)); |
| netlink_attr(IFA_LOCAL, addr, addrsize); |
| netlink_attr(IFA_ADDRESS, addr, addrsize); |
| return netlink_send(sock); |
| } |
| |
| static void netlink_add_addr4(int sock, const char* dev, const char* addr) |
| { |
| struct in_addr in_addr; |
| inet_pton(AF_INET, addr, &in_addr); |
| int err = netlink_add_addr(sock, dev, &in_addr, sizeof(in_addr)); |
| (void)err; |
| } |
| |
| static void netlink_add_addr6(int sock, const char* dev, const char* addr) |
| { |
| struct in6_addr in6_addr; |
| inet_pton(AF_INET6, addr, &in6_addr); |
| int err = netlink_add_addr(sock, dev, &in6_addr, sizeof(in6_addr)); |
| (void)err; |
| } |
| |
| static void netlink_add_neigh(int sock, const char* name, const void* addr, |
| int addrsize, const void* mac, int macsize) |
| { |
| struct ndmsg hdr; |
| memset(&hdr, 0, sizeof(hdr)); |
| hdr.ndm_family = addrsize == 4 ? AF_INET : AF_INET6; |
| hdr.ndm_ifindex = if_nametoindex(name); |
| hdr.ndm_state = NUD_PERMANENT; |
| netlink_init(RTM_NEWNEIGH, NLM_F_EXCL | NLM_F_CREATE, &hdr, sizeof(hdr)); |
| netlink_attr(NDA_DST, addr, addrsize); |
| netlink_attr(NDA_LLADDR, mac, macsize); |
| int err = netlink_send(sock); |
| (void)err; |
| } |
| |
| static int tunfd = -1; |
| static int tun_frags_enabled; |
| #define SYZ_TUN_MAX_PACKET_SIZE 1000 |
| |
| #define TUN_IFACE "syz_tun" |
| |
| #define LOCAL_MAC 0xaaaaaaaaaaaa |
| #define REMOTE_MAC 0xaaaaaaaaaabb |
| |
| #define LOCAL_IPV4 "172.20.20.170" |
| #define REMOTE_IPV4 "172.20.20.187" |
| |
| #define LOCAL_IPV6 "fe80::aa" |
| #define REMOTE_IPV6 "fe80::bb" |
| |
| #define IFF_NAPI 0x0010 |
| #define IFF_NAPI_FRAGS 0x0020 |
| |
| static void initialize_tun(void) |
| { |
| tunfd = open("/dev/net/tun", O_RDWR | O_NONBLOCK); |
| if (tunfd == -1) { |
| printf("tun: can't open /dev/net/tun: please enable CONFIG_TUN=y\n"); |
| printf("otherwise fuzzing or reproducing might not work as intended\n"); |
| return; |
| } |
| const int kTunFd = 240; |
| if (dup2(tunfd, kTunFd) < 0) |
| exit(1); |
| close(tunfd); |
| tunfd = kTunFd; |
| struct ifreq ifr; |
| memset(&ifr, 0, sizeof(ifr)); |
| strncpy(ifr.ifr_name, TUN_IFACE, IFNAMSIZ); |
| ifr.ifr_flags = IFF_TAP | IFF_NO_PI | IFF_NAPI | IFF_NAPI_FRAGS; |
| if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0) { |
| ifr.ifr_flags = IFF_TAP | IFF_NO_PI; |
| if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0) |
| exit(1); |
| } |
| if (ioctl(tunfd, TUNGETIFF, (void*)&ifr) < 0) |
| exit(1); |
| tun_frags_enabled = (ifr.ifr_flags & IFF_NAPI_FRAGS) != 0; |
| char sysctl[64]; |
| sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/accept_dad", TUN_IFACE); |
| write_file(sysctl, "0"); |
| sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/router_solicitations", TUN_IFACE); |
| write_file(sysctl, "0"); |
| int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); |
| if (sock == -1) |
| exit(1); |
| netlink_add_addr4(sock, TUN_IFACE, LOCAL_IPV4); |
| netlink_add_addr6(sock, TUN_IFACE, LOCAL_IPV6); |
| uint64_t macaddr = REMOTE_MAC; |
| struct in_addr in_addr; |
| inet_pton(AF_INET, REMOTE_IPV4, &in_addr); |
| netlink_add_neigh(sock, TUN_IFACE, &in_addr, sizeof(in_addr), &macaddr, |
| ETH_ALEN); |
| struct in6_addr in6_addr; |
| inet_pton(AF_INET6, REMOTE_IPV6, &in6_addr); |
| netlink_add_neigh(sock, TUN_IFACE, &in6_addr, sizeof(in6_addr), &macaddr, |
| ETH_ALEN); |
| macaddr = LOCAL_MAC; |
| netlink_device_change(sock, TUN_IFACE, true, 0, &macaddr, ETH_ALEN); |
| close(sock); |
| } |
| |
| #define DEV_IPV4 "172.20.20.%d" |
| #define DEV_IPV6 "fe80::%02x" |
| #define DEV_MAC 0x00aaaaaaaaaa |
| static void initialize_netdevices(void) |
| { |
| char netdevsim[16]; |
| sprintf(netdevsim, "netdevsim%d", (int)procid); |
| struct { |
| const char* type; |
| const char* dev; |
| } devtypes[] = { |
| {"ip6gretap", "ip6gretap0"}, {"bridge", "bridge0"}, |
| {"vcan", "vcan0"}, {"bond", "bond0"}, |
| {"team", "team0"}, {"dummy", "dummy0"}, |
| {"nlmon", "nlmon0"}, {"caif", "caif0"}, |
| {"batadv", "batadv0"}, {"vxcan", "vxcan1"}, |
| {"netdevsim", netdevsim}, {"veth", 0}, |
| }; |
| const char* devmasters[] = {"bridge", "bond", "team"}; |
| struct { |
| const char* name; |
| int macsize; |
| bool noipv6; |
| } devices[] = { |
| {"lo", ETH_ALEN}, |
| {"sit0", 0}, |
| {"bridge0", ETH_ALEN}, |
| {"vcan0", 0, true}, |
| {"tunl0", 0}, |
| {"gre0", 0}, |
| {"gretap0", ETH_ALEN}, |
| {"ip_vti0", 0}, |
| {"ip6_vti0", 0}, |
| {"ip6tnl0", 0}, |
| {"ip6gre0", 0}, |
| {"ip6gretap0", ETH_ALEN}, |
| {"erspan0", ETH_ALEN}, |
| {"bond0", ETH_ALEN}, |
| {"veth0", ETH_ALEN}, |
| {"veth1", ETH_ALEN}, |
| {"team0", ETH_ALEN}, |
| {"veth0_to_bridge", ETH_ALEN}, |
| {"veth1_to_bridge", ETH_ALEN}, |
| {"veth0_to_bond", ETH_ALEN}, |
| {"veth1_to_bond", ETH_ALEN}, |
| {"veth0_to_team", ETH_ALEN}, |
| {"veth1_to_team", ETH_ALEN}, |
| {"veth0_to_hsr", ETH_ALEN}, |
| {"veth1_to_hsr", ETH_ALEN}, |
| {"hsr0", 0}, |
| {"dummy0", ETH_ALEN}, |
| {"nlmon0", 0}, |
| {"vxcan1", 0, true}, |
| {"caif0", ETH_ALEN}, |
| {"batadv0", ETH_ALEN}, |
| {netdevsim, ETH_ALEN}, |
| }; |
| int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); |
| if (sock == -1) |
| exit(1); |
| unsigned i; |
| for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) |
| netlink_add_device(sock, devtypes[i].type, devtypes[i].dev); |
| for (i = 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) { |
| char master[32], slave0[32], veth0[32], slave1[32], veth1[32]; |
| sprintf(slave0, "%s_slave_0", devmasters[i]); |
| sprintf(veth0, "veth0_to_%s", devmasters[i]); |
| netlink_add_veth(sock, slave0, veth0); |
| sprintf(slave1, "%s_slave_1", devmasters[i]); |
| sprintf(veth1, "veth1_to_%s", devmasters[i]); |
| netlink_add_veth(sock, slave1, veth1); |
| sprintf(master, "%s0", devmasters[i]); |
| netlink_device_change(sock, slave0, false, master, 0, 0); |
| netlink_device_change(sock, slave1, false, master, 0, 0); |
| } |
| netlink_device_change(sock, "bridge_slave_0", true, 0, 0, 0); |
| netlink_device_change(sock, "bridge_slave_1", true, 0, 0, 0); |
| netlink_add_veth(sock, "hsr_slave_0", "veth0_to_hsr"); |
| netlink_add_veth(sock, "hsr_slave_1", "veth1_to_hsr"); |
| netlink_add_hsr(sock, "hsr0", "hsr_slave_0", "hsr_slave_1"); |
| netlink_device_change(sock, "hsr_slave_0", true, 0, 0, 0); |
| netlink_device_change(sock, "hsr_slave_1", true, 0, 0, 0); |
| for (i = 0; i < sizeof(devices) / (sizeof(devices[0])); i++) { |
| char addr[32]; |
| sprintf(addr, DEV_IPV4, i + 10); |
| netlink_add_addr4(sock, devices[i].name, addr); |
| if (!devices[i].noipv6) { |
| sprintf(addr, DEV_IPV6, i + 10); |
| netlink_add_addr6(sock, devices[i].name, addr); |
| } |
| uint64_t macaddr = DEV_MAC + ((i + 10ull) << 40); |
| netlink_device_change(sock, devices[i].name, true, 0, &macaddr, |
| devices[i].macsize); |
| } |
| close(sock); |
| } |
| static void initialize_netdevices_init(void) |
| { |
| int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); |
| if (sock == -1) |
| exit(1); |
| struct { |
| const char* type; |
| int macsize; |
| bool noipv6; |
| bool noup; |
| } devtypes[] = { |
| {"nr", 7, true}, {"rose", 5, true, true}, |
| }; |
| unsigned i; |
| for (i = 0; i < sizeof(devtypes) / sizeof(devtypes[0]); i++) { |
| char dev[32], addr[32]; |
| sprintf(dev, "%s%d", devtypes[i].type, (int)procid); |
| sprintf(addr, "172.30.%d.%d", i, (int)procid + 1); |
| netlink_add_addr4(sock, dev, addr); |
| if (!devtypes[i].noipv6) { |
| sprintf(addr, "fe88::%02x:%02x", i, (int)procid + 1); |
| netlink_add_addr6(sock, dev, addr); |
| } |
| int macsize = devtypes[i].macsize; |
| uint64_t macaddr = 0xbbbbbb + |
| ((unsigned long long)i << (8 * (macsize - 2))) + |
| (procid << (8 * (macsize - 1))); |
| netlink_device_change(sock, dev, !devtypes[i].noup, 0, &macaddr, macsize); |
| } |
| close(sock); |
| } |
| |
| static int read_tun(char* data, int size) |
| { |
| if (tunfd < 0) |
| return -1; |
| int rv = read(tunfd, data, size); |
| if (rv < 0) { |
| if (errno == EAGAIN) |
| return -1; |
| if (errno == EBADFD) |
| return -1; |
| exit(1); |
| } |
| return rv; |
| } |
| |
| static void flush_tun() |
| { |
| char data[SYZ_TUN_MAX_PACKET_SIZE]; |
| while (read_tun(&data[0], sizeof(data)) != -1) { |
| } |
| } |
| |
| static long syz_open_dev(volatile long a0, volatile long a1, volatile long a2) |
| { |
| if (a0 == 0xc || a0 == 0xb) { |
| char buf[128]; |
| sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, |
| (uint8_t)a2); |
| return open(buf, O_RDWR, 0); |
| } else { |
| char buf[1024]; |
| char* hash; |
| NONFAILING(strncpy(buf, (char*)a0, sizeof(buf) - 1)); |
| buf[sizeof(buf) - 1] = 0; |
| while ((hash = strchr(buf, '#'))) { |
| *hash = '0' + (char)(a1 % 10); |
| a1 /= 10; |
| } |
| return open(buf, a2, 0); |
| } |
| } |
| |
| static long syz_open_procfs(volatile long a0, volatile long a1) |
| { |
| char buf[128]; |
| memset(buf, 0, sizeof(buf)); |
| if (a0 == 0) { |
| NONFAILING(snprintf(buf, sizeof(buf), "/proc/self/%s", (char*)a1)); |
| } else if (a0 == -1) { |
| NONFAILING(snprintf(buf, sizeof(buf), "/proc/thread-self/%s", (char*)a1)); |
| } else { |
| NONFAILING(snprintf(buf, sizeof(buf), "/proc/self/task/%d/%s", (int)a0, |
| (char*)a1)); |
| } |
| int fd = open(buf, O_RDWR); |
| if (fd == -1) |
| fd = open(buf, O_RDONLY); |
| return fd; |
| } |
| |
| #define XT_TABLE_SIZE 1536 |
| #define XT_MAX_ENTRIES 10 |
| |
| struct xt_counters { |
| uint64_t pcnt, bcnt; |
| }; |
| |
| struct ipt_getinfo { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int hook_entry[5]; |
| unsigned int underflow[5]; |
| unsigned int num_entries; |
| unsigned int size; |
| }; |
| |
| struct ipt_get_entries { |
| char name[32]; |
| unsigned int size; |
| void* entrytable[XT_TABLE_SIZE / sizeof(void*)]; |
| }; |
| |
| struct ipt_replace { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int num_entries; |
| unsigned int size; |
| unsigned int hook_entry[5]; |
| unsigned int underflow[5]; |
| unsigned int num_counters; |
| struct xt_counters* counters; |
| char entrytable[XT_TABLE_SIZE]; |
| }; |
| |
| struct ipt_table_desc { |
| const char* name; |
| struct ipt_getinfo info; |
| struct ipt_replace replace; |
| }; |
| |
| static struct ipt_table_desc ipv4_tables[] = { |
| {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, |
| {.name = "raw"}, {.name = "security"}, |
| }; |
| |
| static struct ipt_table_desc ipv6_tables[] = { |
| {.name = "filter"}, {.name = "nat"}, {.name = "mangle"}, |
| {.name = "raw"}, {.name = "security"}, |
| }; |
| |
| #define IPT_BASE_CTL 64 |
| #define IPT_SO_SET_REPLACE (IPT_BASE_CTL) |
| #define IPT_SO_GET_INFO (IPT_BASE_CTL) |
| #define IPT_SO_GET_ENTRIES (IPT_BASE_CTL + 1) |
| |
| struct arpt_getinfo { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int hook_entry[3]; |
| unsigned int underflow[3]; |
| unsigned int num_entries; |
| unsigned int size; |
| }; |
| |
| struct arpt_get_entries { |
| char name[32]; |
| unsigned int size; |
| void* entrytable[XT_TABLE_SIZE / sizeof(void*)]; |
| }; |
| |
| struct arpt_replace { |
| char name[32]; |
| unsigned int valid_hooks; |
| unsigned int num_entries; |
| unsigned int size; |
| unsigned int hook_entry[3]; |
| unsigned int underflow[3]; |
| unsigned int num_counters; |
| struct xt_counters* counters; |
| char entrytable[XT_TABLE_SIZE]; |
| }; |
| |
| struct arpt_table_desc { |
| const char* name; |
| struct arpt_getinfo info; |
| struct arpt_replace replace; |
| }; |
| |
| static struct arpt_table_desc arpt_tables[] = { |
| {.name = "filter"}, |
| }; |
| |
| #define ARPT_BASE_CTL 96 |
| #define ARPT_SO_SET_REPLACE (ARPT_BASE_CTL) |
| #define ARPT_SO_GET_INFO (ARPT_BASE_CTL) |
| #define ARPT_SO_GET_ENTRIES (ARPT_BASE_CTL + 1) |
| |
| static void checkpoint_iptables(struct ipt_table_desc* tables, int num_tables, |
| int family, int level) |
| { |
| struct ipt_get_entries entries; |
| socklen_t optlen; |
| int fd, i; |
| fd = socket(family, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < num_tables; i++) { |
| struct ipt_table_desc* table = &tables[i]; |
| strcpy(table->info.name, table->name); |
| strcpy(table->replace.name, table->name); |
| optlen = sizeof(table->info); |
| if (getsockopt(fd, level, IPT_SO_GET_INFO, &table->info, &optlen)) { |
| switch (errno) { |
| case EPERM: |
| case ENOENT: |
| case ENOPROTOOPT: |
| continue; |
| } |
| exit(1); |
| } |
| if (table->info.size > sizeof(table->replace.entrytable)) |
| exit(1); |
| if (table->info.num_entries > XT_MAX_ENTRIES) |
| exit(1); |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; |
| if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| table->replace.valid_hooks = table->info.valid_hooks; |
| table->replace.num_entries = table->info.num_entries; |
| table->replace.size = table->info.size; |
| memcpy(table->replace.hook_entry, table->info.hook_entry, |
| sizeof(table->replace.hook_entry)); |
| memcpy(table->replace.underflow, table->info.underflow, |
| sizeof(table->replace.underflow)); |
| memcpy(table->replace.entrytable, entries.entrytable, table->info.size); |
| } |
| close(fd); |
| } |
| |
| static void reset_iptables(struct ipt_table_desc* tables, int num_tables, |
| int family, int level) |
| { |
| struct xt_counters counters[XT_MAX_ENTRIES]; |
| struct ipt_get_entries entries; |
| struct ipt_getinfo info; |
| socklen_t optlen; |
| int fd, i; |
| fd = socket(family, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < num_tables; i++) { |
| struct ipt_table_desc* table = &tables[i]; |
| if (table->info.valid_hooks == 0) |
| continue; |
| memset(&info, 0, sizeof(info)); |
| strcpy(info.name, table->name); |
| optlen = sizeof(info); |
| if (getsockopt(fd, level, IPT_SO_GET_INFO, &info, &optlen)) |
| exit(1); |
| if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; |
| if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| if (memcmp(table->replace.entrytable, entries.entrytable, |
| table->info.size) == 0) |
| continue; |
| } |
| table->replace.num_counters = info.num_entries; |
| table->replace.counters = counters; |
| optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + |
| table->replace.size; |
| if (setsockopt(fd, level, IPT_SO_SET_REPLACE, &table->replace, optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| static void checkpoint_arptables(void) |
| { |
| struct arpt_get_entries entries; |
| socklen_t optlen; |
| unsigned i; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { |
| struct arpt_table_desc* table = &arpt_tables[i]; |
| strcpy(table->info.name, table->name); |
| strcpy(table->replace.name, table->name); |
| optlen = sizeof(table->info); |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &table->info, &optlen)) { |
| switch (errno) { |
| case EPERM: |
| case ENOENT: |
| case ENOPROTOOPT: |
| continue; |
| } |
| exit(1); |
| } |
| if (table->info.size > sizeof(table->replace.entrytable)) |
| exit(1); |
| if (table->info.num_entries > XT_MAX_ENTRIES) |
| exit(1); |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size; |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| table->replace.valid_hooks = table->info.valid_hooks; |
| table->replace.num_entries = table->info.num_entries; |
| table->replace.size = table->info.size; |
| memcpy(table->replace.hook_entry, table->info.hook_entry, |
| sizeof(table->replace.hook_entry)); |
| memcpy(table->replace.underflow, table->info.underflow, |
| sizeof(table->replace.underflow)); |
| memcpy(table->replace.entrytable, entries.entrytable, table->info.size); |
| } |
| close(fd); |
| } |
| |
| static void reset_arptables() |
| { |
| struct xt_counters counters[XT_MAX_ENTRIES]; |
| struct arpt_get_entries entries; |
| struct arpt_getinfo info; |
| socklen_t optlen; |
| unsigned i; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) { |
| struct arpt_table_desc* table = &arpt_tables[i]; |
| if (table->info.valid_hooks == 0) |
| continue; |
| memset(&info, 0, sizeof(info)); |
| strcpy(info.name, table->name); |
| optlen = sizeof(info); |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &info, &optlen)) |
| exit(1); |
| if (memcmp(&table->info, &info, sizeof(table->info)) == 0) { |
| memset(&entries, 0, sizeof(entries)); |
| strcpy(entries.name, table->name); |
| entries.size = table->info.size; |
| optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size; |
| if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen)) |
| exit(1); |
| if (memcmp(table->replace.entrytable, entries.entrytable, |
| table->info.size) == 0) |
| continue; |
| } else { |
| } |
| table->replace.num_counters = info.num_entries; |
| table->replace.counters = counters; |
| optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) + |
| table->replace.size; |
| if (setsockopt(fd, SOL_IP, ARPT_SO_SET_REPLACE, &table->replace, optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| #define NF_BR_NUMHOOKS 6 |
| #define EBT_TABLE_MAXNAMELEN 32 |
| #define EBT_CHAIN_MAXNAMELEN 32 |
| #define EBT_BASE_CTL 128 |
| #define EBT_SO_SET_ENTRIES (EBT_BASE_CTL) |
| #define EBT_SO_GET_INFO (EBT_BASE_CTL) |
| #define EBT_SO_GET_ENTRIES (EBT_SO_GET_INFO + 1) |
| #define EBT_SO_GET_INIT_INFO (EBT_SO_GET_ENTRIES + 1) |
| #define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO + 1) |
| |
| struct ebt_replace { |
| char name[EBT_TABLE_MAXNAMELEN]; |
| unsigned int valid_hooks; |
| unsigned int nentries; |
| unsigned int entries_size; |
| struct ebt_entries* hook_entry[NF_BR_NUMHOOKS]; |
| unsigned int num_counters; |
| struct ebt_counter* counters; |
| char* entries; |
| }; |
| |
| struct ebt_entries { |
| unsigned int distinguisher; |
| char name[EBT_CHAIN_MAXNAMELEN]; |
| unsigned int counter_offset; |
| int policy; |
| unsigned int nentries; |
| char data[0] __attribute__((aligned(__alignof__(struct ebt_replace)))); |
| }; |
| |
| struct ebt_table_desc { |
| const char* name; |
| struct ebt_replace replace; |
| char entrytable[XT_TABLE_SIZE]; |
| }; |
| |
| static struct ebt_table_desc ebt_tables[] = { |
| {.name = "filter"}, {.name = "nat"}, {.name = "broute"}, |
| }; |
| |
| static void checkpoint_ebtables(void) |
| { |
| socklen_t optlen; |
| unsigned i; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { |
| struct ebt_table_desc* table = &ebt_tables[i]; |
| strcpy(table->replace.name, table->name); |
| optlen = sizeof(table->replace); |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_INFO, &table->replace, |
| &optlen)) { |
| switch (errno) { |
| case EPERM: |
| case ENOENT: |
| case ENOPROTOOPT: |
| continue; |
| } |
| exit(1); |
| } |
| if (table->replace.entries_size > sizeof(table->entrytable)) |
| exit(1); |
| table->replace.num_counters = 0; |
| table->replace.entries = table->entrytable; |
| optlen = sizeof(table->replace) + table->replace.entries_size; |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_ENTRIES, &table->replace, |
| &optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| static void reset_ebtables() |
| { |
| struct ebt_replace replace; |
| char entrytable[XT_TABLE_SIZE]; |
| socklen_t optlen; |
| unsigned i, j, h; |
| int fd; |
| fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); |
| if (fd == -1) { |
| switch (errno) { |
| case EAFNOSUPPORT: |
| case ENOPROTOOPT: |
| return; |
| } |
| exit(1); |
| } |
| for (i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) { |
| struct ebt_table_desc* table = &ebt_tables[i]; |
| if (table->replace.valid_hooks == 0) |
| continue; |
| memset(&replace, 0, sizeof(replace)); |
| strcpy(replace.name, table->name); |
| optlen = sizeof(replace); |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_INFO, &replace, &optlen)) |
| exit(1); |
| replace.num_counters = 0; |
| table->replace.entries = 0; |
| for (h = 0; h < NF_BR_NUMHOOKS; h++) |
| table->replace.hook_entry[h] = 0; |
| if (memcmp(&table->replace, &replace, sizeof(table->replace)) == 0) { |
| memset(&entrytable, 0, sizeof(entrytable)); |
| replace.entries = entrytable; |
| optlen = sizeof(replace) + replace.entries_size; |
| if (getsockopt(fd, SOL_IP, EBT_SO_GET_ENTRIES, &replace, &optlen)) |
| exit(1); |
| if (memcmp(table->entrytable, entrytable, replace.entries_size) == 0) |
| continue; |
| } |
| for (j = 0, h = 0; h < NF_BR_NUMHOOKS; h++) { |
| if (table->replace.valid_hooks & (1 << h)) { |
| table->replace.hook_entry[h] = |
| (struct ebt_entries*)table->entrytable + j; |
| j++; |
| } |
| } |
| table->replace.entries = table->entrytable; |
| optlen = sizeof(table->replace) + table->replace.entries_size; |
| if (setsockopt(fd, SOL_IP, EBT_SO_SET_ENTRIES, &table->replace, optlen)) |
| exit(1); |
| } |
| close(fd); |
| } |
| |
| static void checkpoint_net_namespace(void) |
| { |
| checkpoint_ebtables(); |
| checkpoint_arptables(); |
| checkpoint_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), |
| AF_INET, SOL_IP); |
| checkpoint_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), |
| AF_INET6, SOL_IPV6); |
| } |
| |
| static void reset_net_namespace(void) |
| { |
| reset_ebtables(); |
| reset_arptables(); |
| reset_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]), |
| AF_INET, SOL_IP); |
| reset_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]), |
| AF_INET6, SOL_IPV6); |
| } |
| |
| static void setup_cgroups() |
| { |
| if (mkdir("/syzcgroup", 0777)) { |
| } |
| if (mkdir("/syzcgroup/unified", 0777)) { |
| } |
| if (mount("none", "/syzcgroup/unified", "cgroup2", 0, NULL)) { |
| } |
| if (chmod("/syzcgroup/unified", 0777)) { |
| } |
| write_file("/syzcgroup/unified/cgroup.subtree_control", |
| "+cpu +memory +io +pids +rdma"); |
| if (mkdir("/syzcgroup/cpu", 0777)) { |
| } |
| if (mount("none", "/syzcgroup/cpu", "cgroup", 0, |
| "cpuset,cpuacct,perf_event,hugetlb")) { |
| } |
| write_file("/syzcgroup/cpu/cgroup.clone_children", "1"); |
| if (chmod("/syzcgroup/cpu", 0777)) { |
| } |
| if (mkdir("/syzcgroup/net", 0777)) { |
| } |
| if (mount("none", "/syzcgroup/net", "cgroup", 0, |
| "net_cls,net_prio,devices,freezer")) { |
| } |
| if (chmod("/syzcgroup/net", 0777)) { |
| } |
| } |
| |
| static void setup_cgroups_loop() |
| { |
| int pid = getpid(); |
| char file[128]; |
| char cgroupdir[64]; |
| snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); |
| if (mkdir(cgroupdir, 0777)) { |
| } |
| snprintf(file, sizeof(file), "%s/pids.max", cgroupdir); |
| write_file(file, "32"); |
| snprintf(file, sizeof(file), "%s/memory.low", cgroupdir); |
| write_file(file, "%d", 298 << 20); |
| snprintf(file, sizeof(file), "%s/memory.high", cgroupdir); |
| write_file(file, "%d", 299 << 20); |
| snprintf(file, sizeof(file), "%s/memory.max", cgroupdir); |
| write_file(file, "%d", 300 << 20); |
| snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); |
| write_file(file, "%d", pid); |
| snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); |
| if (mkdir(cgroupdir, 0777)) { |
| } |
| snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); |
| write_file(file, "%d", pid); |
| snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); |
| if (mkdir(cgroupdir, 0777)) { |
| } |
| snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir); |
| write_file(file, "%d", pid); |
| } |
| |
| static void setup_cgroups_test() |
| { |
| char cgroupdir[64]; |
| snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid); |
| if (symlink(cgroupdir, "./cgroup")) { |
| } |
| snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid); |
| if (symlink(cgroupdir, "./cgroup.cpu")) { |
| } |
| snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid); |
| if (symlink(cgroupdir, "./cgroup.net")) { |
| } |
| } |
| |
| void initialize_cgroups() |
| { |
| if (mkdir("./syz-tmp/newroot/syzcgroup", 0700)) |
| exit(1); |
| if (mkdir("./syz-tmp/newroot/syzcgroup/unified", 0700)) |
| exit(1); |
| if (mkdir("./syz-tmp/newroot/syzcgroup/cpu", 0700)) |
| exit(1); |
| if (mkdir("./syz-tmp/newroot/syzcgroup/net", 0700)) |
| exit(1); |
| unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; |
| if (mount("/syzcgroup/unified", "./syz-tmp/newroot/syzcgroup/unified", NULL, |
| bind_mount_flags, NULL)) { |
| } |
| if (mount("/syzcgroup/cpu", "./syz-tmp/newroot/syzcgroup/cpu", NULL, |
| bind_mount_flags, NULL)) { |
| } |
| if (mount("/syzcgroup/net", "./syz-tmp/newroot/syzcgroup/net", NULL, |
| bind_mount_flags, NULL)) { |
| } |
| } |
| |
| static void setup_common() |
| { |
| if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) { |
| } |
| setup_cgroups(); |
| } |
| |
| static void loop(); |
| |
| static void sandbox_common() |
| { |
| prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); |
| setpgrp(); |
| setsid(); |
| struct rlimit rlim; |
| rlim.rlim_cur = rlim.rlim_max = (200 << 20); |
| setrlimit(RLIMIT_AS, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 32 << 20; |
| setrlimit(RLIMIT_MEMLOCK, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 136 << 20; |
| setrlimit(RLIMIT_FSIZE, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 1 << 20; |
| setrlimit(RLIMIT_STACK, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 0; |
| setrlimit(RLIMIT_CORE, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 256; |
| setrlimit(RLIMIT_NOFILE, &rlim); |
| if (unshare(CLONE_NEWNS)) { |
| } |
| if (unshare(CLONE_NEWIPC)) { |
| } |
| if (unshare(0x02000000)) { |
| } |
| if (unshare(CLONE_NEWUTS)) { |
| } |
| if (unshare(CLONE_SYSVSEM)) { |
| } |
| typedef struct { |
| const char* name; |
| const char* value; |
| } sysctl_t; |
| static const sysctl_t sysctls[] = { |
| {"/proc/sys/kernel/shmmax", "16777216"}, |
| {"/proc/sys/kernel/shmall", "536870912"}, |
| {"/proc/sys/kernel/shmmni", "1024"}, |
| {"/proc/sys/kernel/msgmax", "8192"}, |
| {"/proc/sys/kernel/msgmni", "1024"}, |
| {"/proc/sys/kernel/msgmnb", "1024"}, |
| {"/proc/sys/kernel/sem", "1024 1048576 500 1024"}, |
| }; |
| unsigned i; |
| for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++) |
| write_file(sysctls[i].name, sysctls[i].value); |
| } |
| |
| int wait_for_loop(int pid) |
| { |
| if (pid < 0) |
| exit(1); |
| int status = 0; |
| while (waitpid(-1, &status, __WALL) != pid) { |
| } |
| return WEXITSTATUS(status); |
| } |
| |
| static void drop_caps(void) |
| { |
| struct __user_cap_header_struct cap_hdr = {}; |
| struct __user_cap_data_struct cap_data[2] = {}; |
| cap_hdr.version = _LINUX_CAPABILITY_VERSION_3; |
| cap_hdr.pid = getpid(); |
| if (syscall(SYS_capget, &cap_hdr, &cap_data)) |
| exit(1); |
| const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE); |
| cap_data[0].effective &= ~drop; |
| cap_data[0].permitted &= ~drop; |
| cap_data[0].inheritable &= ~drop; |
| if (syscall(SYS_capset, &cap_hdr, &cap_data)) |
| exit(1); |
| } |
| |
| static int real_uid; |
| static int real_gid; |
| __attribute__((aligned(64 << 10))) static char sandbox_stack[1 << 20]; |
| |
| static int namespace_sandbox_proc(void* arg) |
| { |
| sandbox_common(); |
| write_file("/proc/self/setgroups", "deny"); |
| if (!write_file("/proc/self/uid_map", "0 %d 1\n", real_uid)) |
| exit(1); |
| if (!write_file("/proc/self/gid_map", "0 %d 1\n", real_gid)) |
| exit(1); |
| initialize_netdevices_init(); |
| if (unshare(CLONE_NEWNET)) |
| exit(1); |
| initialize_tun(); |
| initialize_netdevices(); |
| if (mkdir("./syz-tmp", 0777)) |
| exit(1); |
| if (mount("", "./syz-tmp", "tmpfs", 0, NULL)) |
| exit(1); |
| if (mkdir("./syz-tmp/newroot", 0777)) |
| exit(1); |
| if (mkdir("./syz-tmp/newroot/dev", 0700)) |
| exit(1); |
| unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE; |
| if (mount("/dev", "./syz-tmp/newroot/dev", NULL, bind_mount_flags, NULL)) |
| exit(1); |
| if (mkdir("./syz-tmp/newroot/proc", 0700)) |
| exit(1); |
| if (mount(NULL, "./syz-tmp/newroot/proc", "proc", 0, NULL)) |
| exit(1); |
| if (mkdir("./syz-tmp/newroot/selinux", 0700)) |
| exit(1); |
| const char* selinux_path = "./syz-tmp/newroot/selinux"; |
| if (mount("/selinux", selinux_path, NULL, bind_mount_flags, NULL)) { |
| if (errno != ENOENT) |
| exit(1); |
| if (mount("/sys/fs/selinux", selinux_path, NULL, bind_mount_flags, NULL) && |
| errno != ENOENT) |
| exit(1); |
| } |
| if (mkdir("./syz-tmp/newroot/sys", 0700)) |
| exit(1); |
| if (mount("/sys", "./syz-tmp/newroot/sys", 0, bind_mount_flags, NULL)) |
| exit(1); |
| initialize_cgroups(); |
| if (mkdir("./syz-tmp/pivot", 0777)) |
| exit(1); |
| if (syscall(SYS_pivot_root, "./syz-tmp", "./syz-tmp/pivot")) { |
| if (chdir("./syz-tmp")) |
| exit(1); |
| } else { |
| if (chdir("/")) |
| exit(1); |
| if (umount2("./pivot", MNT_DETACH)) |
| exit(1); |
| } |
| if (chroot("./newroot")) |
| exit(1); |
| if (chdir("/")) |
| exit(1); |
| drop_caps(); |
| loop(); |
| exit(1); |
| } |
| |
| static int do_sandbox_namespace(void) |
| { |
| int pid; |
| setup_common(); |
| real_uid = getuid(); |
| real_gid = getgid(); |
| mprotect(sandbox_stack, 4096, PROT_NONE); |
| pid = |
| clone(namespace_sandbox_proc, &sandbox_stack[sizeof(sandbox_stack) - 64], |
| CLONE_NEWUSER | CLONE_NEWPID, 0); |
| return wait_for_loop(pid); |
| } |
| |
| #define FS_IOC_SETFLAGS _IOW('f', 2, long) |
| static void remove_dir(const char* dir) |
| { |
| DIR* dp; |
| struct dirent* ep; |
| int iter = 0; |
| retry: |
| while (umount2(dir, MNT_DETACH) == 0) { |
| } |
| dp = opendir(dir); |
| if (dp == NULL) { |
| if (errno == EMFILE) { |
| exit(1); |
| } |
| exit(1); |
| } |
| while ((ep = readdir(dp))) { |
| if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) |
| continue; |
| char filename[FILENAME_MAX]; |
| snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); |
| while (umount2(filename, MNT_DETACH) == 0) { |
| } |
| struct stat st; |
| if (lstat(filename, &st)) |
| exit(1); |
| if (S_ISDIR(st.st_mode)) { |
| remove_dir(filename); |
| continue; |
| } |
| int i; |
| for (i = 0;; i++) { |
| if (unlink(filename) == 0) |
| break; |
| if (errno == EPERM) { |
| int fd = open(filename, O_RDONLY); |
| if (fd != -1) { |
| long flags = 0; |
| if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) |
| close(fd); |
| continue; |
| } |
| } |
| if (errno == EROFS) { |
| break; |
| } |
| if (errno != EBUSY || i > 100) |
| exit(1); |
| if (umount2(filename, MNT_DETACH)) |
| exit(1); |
| } |
| } |
| closedir(dp); |
| int i; |
| for (i = 0;; i++) { |
| if (rmdir(dir) == 0) |
| break; |
| if (i < 100) { |
| if (errno == EPERM) { |
| int fd = open(dir, O_RDONLY); |
| if (fd != -1) { |
| long flags = 0; |
| if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) |
| close(fd); |
| continue; |
| } |
| } |
| if (errno == EROFS) { |
| break; |
| } |
| if (errno == EBUSY) { |
| if (umount2(dir, MNT_DETACH)) |
| exit(1); |
| continue; |
| } |
| if (errno == ENOTEMPTY) { |
| if (iter < 100) { |
| iter++; |
| goto retry; |
| } |
| } |
| } |
| exit(1); |
| } |
| } |
| |
| static void kill_and_wait(int pid, int* status) |
| { |
| kill(-pid, SIGKILL); |
| kill(pid, SIGKILL); |
| int i; |
| for (i = 0; i < 100; i++) { |
| if (waitpid(-1, status, WNOHANG | __WALL) == pid) |
| return; |
| usleep(1000); |
| } |
| DIR* dir = opendir("/sys/fs/fuse/connections"); |
| if (dir) { |
| for (;;) { |
| struct dirent* ent = readdir(dir); |
| if (!ent) |
| break; |
| if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) |
| continue; |
| char abort[300]; |
| snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", |
| ent->d_name); |
| int fd = open(abort, O_WRONLY); |
| if (fd == -1) { |
| continue; |
| } |
| if (write(fd, abort, 1) < 0) { |
| } |
| close(fd); |
| } |
| closedir(dir); |
| } else { |
| } |
| while (waitpid(-1, status, __WALL) != pid) { |
| } |
| } |
| |
| static void setup_loop() |
| { |
| setup_cgroups_loop(); |
| checkpoint_net_namespace(); |
| } |
| |
| static void reset_loop() |
| { |
| reset_net_namespace(); |
| } |
| |
| static void setup_test() |
| { |
| prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); |
| setpgrp(); |
| setup_cgroups_test(); |
| write_file("/proc/self/oom_score_adj", "1000"); |
| flush_tun(); |
| } |
| |
| static void close_fds() |
| { |
| int fd; |
| for (fd = 3; fd < 30; fd++) |
| close(fd); |
| } |
| |
| static void setup_binfmt_misc() |
| { |
| if (mount(0, "/proc/sys/fs/binfmt_misc", "binfmt_misc", 0, 0)) { |
| } |
| write_file("/proc/sys/fs/binfmt_misc/register", ":syz0:M:0:\x01::./file0:"); |
| write_file("/proc/sys/fs/binfmt_misc/register", |
| ":syz1:M:1:\x02::./file0:POC"); |
| } |
| |
| struct thread_t { |
| int created, call; |
| event_t ready, done; |
| }; |
| |
| static struct thread_t threads[16]; |
| static void execute_call(int call); |
| static int running; |
| |
| static void* thr(void* arg) |
| { |
| struct thread_t* th = (struct thread_t*)arg; |
| for (;;) { |
| event_wait(&th->ready); |
| event_reset(&th->ready); |
| execute_call(th->call); |
| __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); |
| event_set(&th->done); |
| } |
| return 0; |
| } |
| |
| static void execute_one(void) |
| { |
| int i, call, thread; |
| int collide = 0; |
| again: |
| for (call = 0; call < 37; call++) { |
| for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); |
| thread++) { |
| struct thread_t* th = &threads[thread]; |
| if (!th->created) { |
| th->created = 1; |
| event_init(&th->ready); |
| event_init(&th->done); |
| event_set(&th->done); |
| thread_start(thr, th); |
| } |
| if (!event_isset(&th->done)) |
| continue; |
| event_reset(&th->done); |
| th->call = call; |
| __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); |
| event_set(&th->ready); |
| if (collide && (call % 2) == 0) |
| break; |
| event_timedwait(&th->done, 45); |
| break; |
| } |
| } |
| for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) |
| sleep_ms(1); |
| close_fds(); |
| if (!collide) { |
| collide = 1; |
| goto again; |
| } |
| } |
| |
| static void execute_one(void); |
| |
| #define WAIT_FLAGS __WALL |
| |
| static void loop(void) |
| { |
| setup_loop(); |
| int iter; |
| for (iter = 0;; iter++) { |
| char cwdbuf[32]; |
| sprintf(cwdbuf, "./%d", iter); |
| if (mkdir(cwdbuf, 0777)) |
| exit(1); |
| reset_loop(); |
| int pid = fork(); |
| if (pid < 0) |
| exit(1); |
| if (pid == 0) { |
| if (chdir(cwdbuf)) |
| exit(1); |
| setup_test(); |
| execute_one(); |
| exit(0); |
| } |
| int status = 0; |
| uint64_t start = current_time_ms(); |
| for (;;) { |
| if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) |
| break; |
| sleep_ms(1); |
| if (current_time_ms() - start < 5 * 1000) |
| continue; |
| kill_and_wait(pid, &status); |
| break; |
| } |
| remove_dir(cwdbuf); |
| } |
| } |
| |
| #ifndef __NR_memfd_create |
| #define __NR_memfd_create 319 |
| #endif |
| |
| uint64_t r[14] = {0xffffffffffffffff, |
| 0x0, |
| 0x0, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0xffffffffffffffff, |
| 0x0, |
| 0x0}; |
| |
| void execute_call(int call) |
| { |
| intptr_t res; |
| switch (call) { |
| case 0: |
| res = syscall(__NR_eventfd2, 0, 0); |
| if (res != -1) |
| r[0] = res; |
| break; |
| case 1: |
| res = syscall(__NR_fcntl, r[0], 0x10, 0x20000000); |
| if (res != -1) |
| NONFAILING(r[1] = *(uint32_t*)0x20000004); |
| break; |
| case 2: |
| syscall(__NR_fcntl, r[0], 9, 0); |
| break; |
| case 3: |
| res = syscall(__NR_getpgid, r[1]); |
| if (res != -1) |
| r[2] = res; |
| break; |
| case 4: |
| NONFAILING(memcpy((void*)0x20000080, |
| "\000\000\000&y\311\353\000\000\000\000\000 \000\000", |
| 15)); |
| res = syz_open_procfs(r[2], 0x20000080); |
| if (res != -1) |
| r[3] = res; |
| break; |
| case 5: |
| NONFAILING(*(uint64_t*)0x20002340 = 0x20002380); |
| NONFAILING(*(uint64_t*)0x20002348 = 0x1000); |
| syscall(__NR_readv, r[3], 0x20002340, 1); |
| break; |
| case 6: |
| syscall(__NR_readv, r[3], 0x20000580, 0x25b); |
| break; |
| case 7: |
| res = syscall(__NR_openat, 0xffffffffffffff9c, 0, 0, 0); |
| if (res != -1) |
| r[4] = res; |
| break; |
| case 8: |
| res = syscall(__NR_socket, 2, 0x80000, 6); |
| if (res != -1) |
| r[5] = res; |
| break; |
| case 9: |
| syscall(__NR_syncfs, r[5]); |
| break; |
| case 10: |
| NONFAILING(*(uint32_t*)0x200000c0 = 0x21); |
| syscall(__NR_setsockopt, r[5], 6, 0x19, 0x200000c0, 0xffffffed); |
| break; |
| case 11: |
| NONFAILING(*(uint32_t*)0x20000180 = 0x7f); |
| syscall(__NR_setsockopt, r[5], 1, 0x3f, 0x20000180, 0xfffffffffffffe7d); |
| break; |
| case 12: |
| syz_open_dev(0, 0, 0); |
| break; |
| case 13: |
| NONFAILING(memcpy((void*)0x20000240, "/dev/keychord\000", 14)); |
| syscall(__NR_openat, 0xffffffffffffff9c, 0x20000240, 0x80000, 0); |
| break; |
| case 14: |
| syscall(__NR_clone, 0x20207ffd, 0, 0x9999999999999999, 0, -1); |
| break; |
| case 15: |
| syscall(__NR_socket, 0xf, 0x80005, 9); |
| break; |
| case 16: |
| NONFAILING(memcpy((void*)0x20000500, "./bus\000", 6)); |
| res = syscall(__NR_open, 0x20000500, 0x141042, 0); |
| if (res != -1) |
| r[6] = res; |
| break; |
| case 17: |
| syscall(__NR_close, r[6]); |
| break; |
| case 18: |
| NONFAILING(memcpy((void*)0x200001c0, "/dev/loop#\000", 11)); |
| res = syz_open_dev(0x200001c0, 0x5c, 0x105082); |
| if (res != -1) |
| r[7] = res; |
| break; |
| case 19: |
| NONFAILING(memcpy((void*)0x20000140, "/dev/keychord\000", 14)); |
| res = syscall(__NR_memfd_create, 0x20000140, 0); |
| if (res != -1) |
| r[8] = res; |
| break; |
| case 20: |
| NONFAILING(*(uint64_t*)0x20000440 = 0); |
| NONFAILING(*(uint64_t*)0x20000448 = 0); |
| syscall(__NR_pwritev, r[8], 0x20000440, 1, 0x81003); |
| break; |
| case 21: |
| syscall(__NR_ioctl, r[7], 0x4c00, r[8]); |
| break; |
| case 22: |
| NONFAILING(memcpy( |
| (void*)0x20003380, |
| "\x7f\x45\x4c\x46\x00\x00\x02\xff\x05\x00\x00\x00\x00\x00\xe4\xff\x03" |
| "\x00\x3f\x00\x00\x01\x00\x00\xdf\x02\x00\x02\x38\x00\x00\x00\xcf\x00" |
| "\x00\x00\xff\x03\x00\x00\x06\x00\x20\x00\x01\x00\xff\xff\x06\x00\x65" |
| "\x00\x00\x00\x00\x00\xc3\xf6\x3e\x2d\x80\xd1\x00\x00\x00\x00\x02\x00" |
| "\x00\x00\x61\x83\x1c\xaa\x05\x00\x00\x00\xe0\xff\xff\xff\x01\x00\x00" |
| "\x80\x03\x00\x00\x00\x00\x00\x01\x00\xf7\x02\x32\x73\x7b\x4b\xc3\xb0" |
| "\xdb\x3a\x10\x64\x67\x7f\x2b\x6e\x88\x47\xff\xe9\x6c\x0a\xaa\x2d\xd7" |
| "\x60\x06\xcb\xdb\xbd\xe0\x1a\x29\x75\x55\x77\xb2\x0c\x74\x33\x6d\x6f" |
| "\xbe\x27\x07\x85\x26\x3d\x3c\x3d\xc0\x23\xaf\x79\x67\x4f\x33\x50\x4f" |
| "\xf6\xc4\xf5\xb7\x8b\x67\x80\x0a\x16\x6f\x96\x40\xc0\x4b\xa6\x50\x31" |
| "\xc7\xa1\x59\x4e\x6c\x23\x66\xaf\x4c\xb5\x44\xbb\x53\x88\xa8\x6d\x9f" |
| "\x17\xd7\x6f\x3c\x5b\xe0\xc3\x09\x44\x89\x79\x94\x12\x32\xff\xe0\x90" |
| "\x1d\x28\x09\x80\xa2\x32\xb5\x33\xb2\x9c\xc0\x36\x3e\xdc\x99\x20\x69" |
| "\xca\xd1\x89\xbd\x08\xe8\x69\x83\xd8\x94\x76\x7b\x70\xc3\x51\x0b\x6c" |
| "\x70\x7e\xb4\xc9\xb2\x37\xda\xeb\xed\x2f\xe8\xce\xcc\x52\xbf\x9a\xfb" |
| "\x2f\xb4\x3c\xea\x06\x6b\x87\x60\x84\xae\x7a\xee\x74\xcf\x2b\xc6\x81" |
| "\x85\x5b\x32\x52\xa7\x10\x2a\x3b\xb5\x0d\xb2\xb3\x88\x05\x34\x53\xd4" |
| "\xdb\xe6\x5f\x7e\xb6\xe2\x98\x0b\x90\x94\x32\xde\xcd\x8f\xe9\x79\x79" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\xa5\x91\x2b\x57\xfd\x46\x9d\xad\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x64\x55\x43\xa9\x65\x0c\x9c\x8a\x4d" |
| "\xc8\x26\x11\x38\x05\x24\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x78\xb7" |
| "\xcc\xb7\x3e\x0e\x86\x28\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x07\x00\x00\x02\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7d" |
| "\x7a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\xe2\x69\x2f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\xee\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x30\x36\x5f\xf2\x06\x32\x65\x95\x5c\x6b\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x2f\x92\xf2\x1a\xf8\xb4\x99\x69\x51" |
| "\xe1\xd7\x38\xfd\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\xfe\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00" |
| "\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\x7f" |
| "\xb2\x44\x2b\x7c\xc8\x04\x16\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\xbe\xa2\x67\x0f\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x52\xc4\x0c\x2c\xcb\xc6\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\xb2\xa4\x41\x26\x00\x00\x00\x00\x00\x00\x00\xe1\xff\x00\x00\x00\x00" |
| "\x00\x7e\xb2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x25\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\xf0\xff\xff\xff\xff\x69\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x84" |
| "\x58\xee\x93\x5b\x00\xc4\xc9\x7f\xd6\x6a\x00\x00\x00\x00\xd4\x5b\xf1" |
| "\x3c\xf7\x4b\x32\x81\x00\x00\x00\x74\x8b\x6f\x44\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x8b\xb7\x60" |
| "\x3f\x5a\xce\xe7\xe0\x55\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x21\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x40\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa1\x66\xfb\x6a\xc9\x2f\x76" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00" |
| "\x40\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x20" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\xb7\xe5\x2e\x91\x1c\x16\x6c\x16\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x04\x1a\x2e\xc7\x03\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x09\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" |
| "\x00\x00\x00\x00\x00\x00\xdc\xe6\x87\x39\x58\xd2\x76\x06\xfc\x76\x83" |
| "\xc7\x7a\x9b\xf7\x7c\x2d\x40\x8b\xb1\x0b\x1a\xff\xfd\x26\xbe\xb4\x90" |
| "\xa4\xea\x6c\xd0\x93\x9f\xef\xee\x1e\x2f\x9e\x13\xb6\xb4\xe8\xfd\xda" |
| "\x74\x6f\xd1\xda\xcd\x00\x53\x11\x74\x41\xe4\xef\x38\x9b\x69\xad\xc7" |
| "\x92\xdf\xac\x2f\x83\x4d\xf8\xa8\xbb\x04\x5d\x28\x55\xd2\xdd\x2a\x8e" |
| "\xcc\xf5\x44\xbf\x87\x44\x57\x48\xd6\xeb\xa0\xba\xf2\xa6\x67\x44\xb2" |
| "\xb8\xe7\x61\xdc\xd4\x33\xac\x54\x78\xd8\xa4\x0a\xbd\x94\xbb\x7d\x87" |
| "\x39\x1e\xa0\xcd\x34\x3a\x0c\xd4\xf9\xf1\x3f\x48\xb9\xb9\x57\x31\x6b" |
| "\x89\xd7\x0b\xc5\xd1\x2e\x33\x44\xd7\xd6\x1b\x7f\x13\x2c\x94\xa8\x13" |
| "\x7a\x21\x3b\x35\xd6\xc4\x57\x43\xcc\xc8\x5f\x82\x5f\x0a\x15\x84\xe6" |
| "\xad\xc3\x8c\x3a\x36\x33\x4f\xd2\x52\xec\x6e\xec\x89\x99\x21\xa0\xe7" |
| "\x51\xa4\x60\xe9\x25\x78\xe5\x00\x00\x00\x00\x00\x00\x9d\x38\x92\x4f" |
| "\x54\xb4\xa0\xd5\x73\x5a\x64\xc3\xbf\x88\xb2\xff\x3b\x9c\x1c\xef\xaa" |
| "\xa6\xc8\x2e\x60\x1a\xd1\x14\x2a\x76\xba\xf9\x01\x7a\xab\x3c\x55\x07" |
| "\xd8\x53\x22\xd8\xf7\x3c\x62\x7b\x52\x99\xa8\xf2\x5f\x1a\x78\xe3\xb3" |
| "\xa9\x4c\x47\xfc\xe5\x18\x29\x14\xbd\x3b\x2b\x78\x3e\x0f\x6c\xb7\x4f" |
| "\xae\x9e\xd7\x9c\x12\x15\x87\x09\x4e\x17\x87\xfa\x24\xd1\x4a\x6a\x06" |
| "\x87\x8e\xfa\x91\xa8\x07\x33\x28\x42\x93\x99\x12\xb0\xbe\x7f\xc8\xee" |
| "\x83\xcf\xf7\x2d\xfc\x6d\xe6\xfd\xe8\xd9\x6d\x0e\xf2\x3c\xe7\xdb\xbb" |
| "\x19\xd1\x8c\x33\xf5\xa1\xe9\xac\xd0\x0a\xda\xca\xe1\xc2\xab\x32\xb8" |
| "\xb2\x0b\xf0\x24\xb2\xa9\x70\x29\x5d\x6c\x97\xac\xd8\x44\x41\xee\xb9" |
| "\x07\x94\x1b\x77\x6d\x39\x44\x39\x72\x3c\x5b\x97\xc1\x5a\xa4\x0c\x0d" |
| "\x8b\x99\x3d\x83\xcf\x15\x7e\xb8\xa3\x80\x3f\xd5\x3a\xc5\xb5\x83\xdb" |
| "\x64\x09\x5e\x30\xd1\xdb\xb6\x8b\x8e\x87\xd5\x80\xb9\x5a\xee\xcf\x2d" |
| "\xcc\x76\x08\xb9\x28\x51\x92\x27\x80\xfd\x41\x8f\x3c\x5d\xee\xaf\xe2" |
| "\x4f\x64\x48\xfe\x36\x65\xf7\xa5\x28\x5d\x83\x19\xd2\x60\xd6\xf6\xb9" |
| "\xaf\x2c\x86\xd9\xb1\x2b\x06\x2c\xe8\xd8\x28\xf8\xe9\x4a\xf0\xb6\x9c" |
| "\xc0\xf1\x1b\x4a\x4c\x47\x46\x7b\xb2\x36\x61\xc6\x50\x1a\xd8\xb8\x05" |
| "\x5a\xde\xc7\x54\x60\x24\x7c\xff\x3e\xc0\xbb\xe7\xef\x65\x0c\x6b\x44" |
| "\x24\x6f\x17\x68\x39\xf4\x5b\xd3\x0c\xee\xa4\x7b\x36\xca\x59\x25\x07" |
| "\x35\x15\xfb\xaf\x49\x19\x1e\x40\xc6\xd4\x8f\xd9\x2b\xd2\xe4\x30\x0a" |
| "\x60\x4c\xd8\x6f\xc9\x00\x4d\xc0\xc6\x47\x3b\x06\xb3\xfb\x5c\x60\x2c" |
| "\x1f\xd7\x5c\x04\x21\xd0\xae\x6c\x45\xeb\x7b\xa3\x09\xfb\xf0\x01\x43" |
| "\x2a\xa1\x24\x8b\xe9\x8c\x05\xb2\xe3\x84\x0a\xd9\x12\xab\x0f\x05\x22" |
| "\xce\x6c\xcc\xe3\xe3\x4b\x49\xc4\x40\x33\x2b\x7b\xe0\x99\x00\x00\x00" |
| "\xcc\x41\xd7\x24\x8b\x34\x85\xe1\xb3\xf7\xee\x39\x89\x00\x0b\x1b\xd7" |
| "\x32\x1b\x84\x61\x0e\x7b\xd5\x39\x7d\x68\xa5\xa3\xc6\x19\x8a\x3e\x10" |
| "\xb3\x26\xbd\xbc\x40\xc4\x4e\x5b\xfa\x52\xba\x52\xdb\x27\x04\x39\xf4" |
| "\x5c\xc9\x07\xe1\x3d\xb3\xdd\xbb\x68\xac\x88\xdf\x74\x93\xbf\xc0\xa1" |
| "\x42\xb2\xc9\xb9\xba\x84\x89\x23\x9e\x89\x17\xdf\x89\x21\x38\x24\x69" |
| "\x05\x96\xbc\x5c\x0a\xcf\x6e\x89\xd6\xce\x9a\x34\xbd\x22\xd5\xe5\xd4" |
| "\xf6\x20\xfd\x21\x66\xdb\x75\x20\x8d\x4b\x91\x03\xd7\x64\x0b\x96\x5e" |
| "\x96\x95\x14\xbf\x61\xf4\x30\x96\x95\xb8\xa8\x63\x84\x31\x3c\x58\xd8" |
| "\x9a\x4f\x6b\x2b\x6e\x55\xf2\xb5\x72\xe2\xd2\x75\x41\x72\x27\x2c\x1a" |
| "\x24\xb5\xf5\x48\x04\x49\x66\x4b\x71\xf9\xfb\x60\x8d\xc2\xc1\xa0\x1c" |
| "\x23\x8b\x39\xd6\xf9\x92\x3d\x2f\xe8\x02\x00\xaa\xf9\x65\xf6\x56\x0b" |
| "\x30\xf6\x24\xee\x3e\xc6\x83\x91\x1a\x9c\x8d\x6e\x2c\x28\x8d\xdc\x6c" |
| "\x74\x0d\xbf\x26\x3e\xdc\xc2\x03\x0e\x7a\x90\x6a\xda\x0b\x6f\xd0\x30" |
| "\x96\x2c\x9b\x18\xc6\x1d\xc5\x83\x0c\x72\x05\x13\xcc\x95\x07\x02\x02" |
| "\x0f\xc0\x48\xac\x7a\x53\x27\x20\x30\xd2\xdb\x72\x44\x48\x06\x19\x15" |
| "\xa6\xe1\xdd\x2f\x4f\x11\x6e\xf0\xea\x5b\x17\xdd\x7d\x50\x4e\xb1\xea" |
| "\xcd\x39\x83\x66\x5b\xb4\x11\x94\x3b\x94\xec\xd1\x68\x76\x79\x04\xa7" |
| "\x5b\xe5\xf0\x3f\x35\xc1\x87\xf3\x1a\x6c\x73\x1f\x92\xbc\x7a\xb6\x29" |
| "\xbe\xad\xcb\xc6\x5a\x2a\x43\x57\x40\x89\xb2\x8b\xca\xc0\x52\xfc\xa0" |
| "\x86\x91\x9e\x0b\x79\x08\xcd\x3a\x94\x34\xd7\x2f\xf1\x71\xb3\x6f\xd7" |
| "\xff\x10\x73\x41\x07\x36\xe6\xd1\xf0\x94\x58\xf1\xfe\x41\xa5\x65\xdb" |
| "\xe5\x0b\xa2\xd4\x57\x28\x31\x89\xc5\xf8\xbd\x33\x90\xd0\x7f\x17\xcf" |
| "\xda\x89\x1a\xd7\xdd\x04\x9b\x66\xf2\xae\xf7\x4b\xe5\x72\x49\x5d\x3d" |
| "\xfc\x25\xec\xc7\xf0\xad\xb7\x85\x2d\x7d\xee\x44\xe6\xd9\x4d\xab\x92" |
| "\x4d\xee\xfc\x0f\xe7\xfd\xfd\x1b\xc0\x39\xc6\x89\x8b\xe1\x92\xdc\x68" |
| "\x9e\x50\x39\xab\x60\x29\x07\x11\xf5\x30\x6d\xaf\x50\x60\xa7\x33\x17" |
| "\x00\x64\x7d\xd5\xf4\xb2\xd0\x93\x2c\x5c\x1d\x7f\xa2\x94\xc5\x86\xaf" |
| "\xd4\xa2\xf5\x8d\x8b\x5a\x07\x5c\x02\xdc\x6a\xdd\xdb\x5f\xfd\xfc\x9d" |
| "\xe8\xd4\x19\x2b\x10\x5a\x2e\x3e\x54\x25\x89\xb0\x84\x66\xeb\x0c\x9f" |
| "\x34\x4e\x4b\x82\xd0\xb1\xb0\xa3\x92\x7b\x04\x70\x46\x59\x07\x50\x0d" |
| "\x2c\x5d\x9e\x9c\x28\x4e\x36\x18\x02\xf0\x3f\xf7\x0a\x1e\xec\x5d\x19" |
| "\xc1\x99\x9e\xa4\x58\x21\x2a\x15\x9f\x75\x43\xa7\xa8\x54\x24\xa8\xc7" |
| "\x3d\x5d\x2c\xa6\x16\x7a\xa3\x63\x3f\x72\xaf\x23\x8f\xe5\x55\x86\xf8" |
| "\x4e\x2b\x87\x11\x3b\x34\x0c\x33\xd0\x5e\x83\xf1\xe3\x0b\x77\x1f\x0e" |
| "\x92\xd1\x87\x50\xda\x5f\x46\x11\x74\x75\x66\xb6\xc2\x9d\xd6\x5a\xa9" |
| "\xe2\x0c\xaa\x16\xd8\x20\x8c\xa7\x30\x5d\x90\x9b\x00\x7b\x31\xc8\xbd" |
| "\x82\x89\x35\x99\x4b\xbc\x0a\x95\x10\x12\x78\xa2\xb7\xdf\xfa\x1a\x34" |
| "\x34\xbd\x3e\x99\x6f\x04\x87\x1c\x9a\x6d\x05\x1f\x3d\x16\xd3\x8d\x70" |
| "\x42\xf6\xdb\x82\x68\x31\x66\xaf\xe1\xa6\xde\x79\xa0\x0c\x2c\xe3\xd3" |
| "\x85\x3b\x1b\x9c\x6a\xa9\xf9\x7b\x1c\x83\xa5\x84\x67\xf1\x9d\x03\x32" |
| "\x3b\x67\xb7\x0a\x80\x90\xc1\x94\x34\x0d\xc4\x9d\xe1\x97\xc4\xab\xb1" |
| "\xdf\x1a\x28\xeb\x30\xd3\x3d\xb4\x3c\x00\x9f\x11\x99\x79\x5d\x92\x9a" |
| "\xaf\x86\x10\x87\x0d\x1a\xf3\x29\xfe\x89\x5a\x87\x93\x9c\x87\xcf\x4d" |
| "\xdb\x45\x7b\x07\x22\xf0\x36\x8c\x11\x9d\xfb\x71\xc5\xb5\xfd\x30\x86" |
| "\x9f\xe1\x10\xe6\x21\xa4\x26\x8c\xe5\xbf\x17\xc3\x25\xee\xb2\x42\xe4" |
| "\x58\x67\xba\x56\x02\x3c\xfc\xd2\xc6\x89\xc9\xd6\x14\x23\xcd\x67\x76" |
| "\x3e\x9a\xfd\x1b\xd1\xea\x03\x78\x92\x11\x97\x8c\x00\x17\x2a\x5f\xbc" |
| "\x97\x1b\x31\x4d\xff\x45\x5b\x11\xe0\x5a\xf3\xe0\xa5\x6d\xf8\x5b\xc4" |
| "\x04\xf1\x30\xd8\x6f\xc7\x64\x51\x8d\xc3\x44\x13\x8e\xd2\xf3\x1e\xaf" |
| "\xfe\x7a\x60\x92\xce\x5a\x42\xe7\x87\x5f\x4b\xe0\xcd\xcd\xd7\x83\x21" |
| "\x18\xad\x64\x76\xbc\x41\x76\xee\xc8\xa2\x67\x0d\xce\x6a\x38\x6f\x3f" |
| "\x9a\xec\x8b\xa9\xe5\x25\x71\x73\x9c\x9e", |
| 4141)); |
| syscall(__NR_write, r[4], 0x20003380, 0xc98); |
| break; |
| case 23: |
| res = syscall(__NR_socket, 2, 2, 0x88); |
| if (res != -1) |
| r[9] = res; |
| break; |
| case 24: |
| NONFAILING(memcpy((void*)0x20000000, |
| "\x11\xdc\xa5\x05\x5e\x0b\xcf\xe4\x7b\xf0\x70", 11)); |
| syscall(__NR_ioctl, r[9], 0x1000008912, 0x20000000); |
| break; |
| case 25: |
| syscall(__NR_mmap, 0x20001000, 0xa000, 0x800002, 0x30, r[9], 0); |
| break; |
| case 26: |
| syscall(__NR_socketpair, 1, 2, 0, 0); |
| break; |
| case 27: |
| syscall(__NR_fcntl, r[6], 4, 0); |
| break; |
| case 28: |
| res = syscall(__NR_pipe, 0x200003c0); |
| if (res != -1) { |
| NONFAILING(r[10] = *(uint32_t*)0x200003c0); |
| NONFAILING(r[11] = *(uint32_t*)0x200003c4); |
| } |
| break; |
| case 29: |
| syscall(__NR_write, r[11], 0x200001c0, 0x526987c9); |
| break; |
| case 30: |
| NONFAILING(memcpy((void*)0x20000040, "./bus\000", 6)); |
| res = syscall(__NR_lstat, 0x20000040, 0x200018c0); |
| if (res != -1) |
| NONFAILING(r[12] = *(uint32_t*)0x200018cc); |
| break; |
| case 31: |
| res = syscall(__NR_fstat, r[0], 0x20000680); |
| if (res != -1) |
| NONFAILING(r[13] = *(uint32_t*)0x20000690); |
| break; |
| case 32: |
| NONFAILING(*(uint32_t*)0x20001800 = 0xa0); |
| NONFAILING(*(uint8_t*)0x20001804 = 0x19); |
| NONFAILING(*(uint16_t*)0x20001805 = 1); |
| NONFAILING(*(uint64_t*)0x20001807 = 0x40); |
| NONFAILING(*(uint8_t*)0x2000180f = 0); |
| NONFAILING(*(uint32_t*)0x20001810 = 1); |
| NONFAILING(*(uint64_t*)0x20001814 = 6); |
| NONFAILING(*(uint32_t*)0x2000181c = 0x10014); |
| NONFAILING(*(uint32_t*)0x20001820 = r[12]); |
| NONFAILING(*(uint32_t*)0x20001824 = r[13]); |
| NONFAILING(*(uint64_t*)0x20001828 = 0x442); |
| NONFAILING(*(uint64_t*)0x20001830 = 0x10000); |
| NONFAILING(*(uint64_t*)0x20001838 = 0x100000000); |
| NONFAILING(*(uint64_t*)0x20001840 = 9); |
| NONFAILING(*(uint64_t*)0x20001848 = 4); |
| NONFAILING(*(uint64_t*)0x20001850 = 6); |
| NONFAILING(*(uint64_t*)0x20001858 = 0); |
| NONFAILING(*(uint64_t*)0x20001860 = 0); |
| NONFAILING(*(uint64_t*)0x20001868 = 3); |
| NONFAILING(*(uint64_t*)0x20001870 = 0x1f); |
| NONFAILING(*(uint64_t*)0x20001878 = 4); |
| NONFAILING(*(uint64_t*)0x20001880 = 0); |
| NONFAILING(*(uint64_t*)0x20001888 = 3); |
| NONFAILING(*(uint64_t*)0x20001890 = 0); |
| NONFAILING(*(uint64_t*)0x20001898 = 0); |
| syscall(__NR_write, -1, 0x20001800, 0xa0); |
| break; |
| case 33: |
| syscall(__NR_getsockopt, -1, 0, 0x23, 0x20000640, 0); |
| break; |
| case 34: |
| NONFAILING(*(uint64_t*)0x20000400 = 0x200002c0); |
| NONFAILING(*(uint64_t*)0x20000408 = 0xa3); |
| NONFAILING(*(uint64_t*)0x20000410 = 0x20006d00); |
| NONFAILING(*(uint64_t*)0x20000418 = 0x1000); |
| NONFAILING(*(uint64_t*)0x20000420 = 0); |
| NONFAILING(*(uint64_t*)0x20000428 = 0); |
| syscall(__NR_readv, r[6], 0x20000400, 3); |
| break; |
| case 35: |
| syscall(__NR_read, r[10], 0x20000700, 0xffffffc9); |
| break; |
| case 36: |
| syscall(__NR_sendfile, r[7], r[8], 0, 0x180003); |
| break; |
| } |
| } |
| int main(void) |
| { |
| syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); |
| setup_binfmt_misc(); |
| install_segv_handler(); |
| for (procid = 0; procid < 6; procid++) { |
| if (fork() == 0) { |
| use_temporary_dir(); |
| do_sandbox_namespace(); |
| } |
| } |
| sleep(1000000); |
| return 0; |
| } |