blob: 5eafb654c0e7abc2be6fda79611ab13404347b0d [file] [log] [blame]
// kernel BUG at security/keys/keyring.c:LINE!
// https://syzkaller.appspot.com/bug?id=0ff802f116b4025f7bd19147a37c28dcfbb9a571
// status:open
// autogenerated by syzkaller (https://github.com/google/syzkaller)
#define _GNU_SOURCE
#include <endian.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <unistd.h>
uint64_t r[3] = {0x0, 0xffffffffffffffff, 0x0};
int main(void)
{
syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0);
long res = 0;
memcpy((void*)0x20000100, "keyring", 8);
memcpy((void*)0x20000140, "syz", 3);
*(uint8_t*)0x20000143 = 0;
*(uint8_t*)0x20000144 = 0;
res = syscall(__NR_add_key, 0x20000100, 0x20000140, 0, 0, 0xfffffffb);
if (res != -1)
r[0] = res;
syscall(__NR_keyctl, 5, r[0], 0x4042000);
res = syscall(__NR_socketpair, 1, 3, 0, 0x200016c0);
if (res != -1)
r[1] = *(uint32_t*)0x200016c0;
*(uint32_t*)0x20cab000 = 0xc;
res = syscall(__NR_getsockopt, r[1], 1, 0x11, 0x20caaffb, 0x20cab000);
if (res != -1)
r[2] = *(uint32_t*)0x20caafff;
syscall(__NR_setresuid, r[2], 0, 0);
memcpy((void*)0x200000c0, "user", 5);
memcpy((void*)0x20000180, "syz", 3);
*(uint8_t*)0x20000183 = 0x23;
*(uint8_t*)0x20000184 = 0;
memcpy((void*)0x200001c0, "[/keyringbdevselinux%&", 23);
syscall(__NR_request_key, 0x200000c0, 0x20000180, 0x200001c0, r[0]);
return 0;
}