| // KASAN: use-after-free Read in ccid2_hc_tx_packet_recv |
| // https://syzkaller.appspot.com/bug?id=31f032fe94df7aca6ce5d45455f6acefa26515e4 |
| // status:open |
| // autogenerated by syzkaller (http://github.com/google/syzkaller) |
| |
| #define _GNU_SOURCE |
| #include <arpa/inet.h> |
| #include <endian.h> |
| #include <errno.h> |
| #include <errno.h> |
| #include <errno.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <fcntl.h> |
| #include <fcntl.h> |
| #include <linux/if.h> |
| #include <linux/if_ether.h> |
| #include <linux/if_tun.h> |
| #include <linux/ip.h> |
| #include <linux/tcp.h> |
| #include <net/if_arp.h> |
| #include <sched.h> |
| #include <signal.h> |
| #include <stdarg.h> |
| #include <stdarg.h> |
| #include <stdarg.h> |
| #include <stdbool.h> |
| #include <stdbool.h> |
| #include <stdbool.h> |
| #include <stdio.h> |
| #include <stdio.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <sys/ioctl.h> |
| #include <sys/prctl.h> |
| #include <sys/resource.h> |
| #include <sys/stat.h> |
| #include <sys/stat.h> |
| #include <sys/stat.h> |
| #include <sys/syscall.h> |
| #include <sys/time.h> |
| #include <sys/types.h> |
| #include <sys/uio.h> |
| #include <sys/wait.h> |
| #include <unistd.h> |
| |
| __attribute__((noreturn)) static void doexit(int status) |
| { |
| volatile unsigned i; |
| syscall(__NR_exit_group, status); |
| for (i = 0;; i++) { |
| } |
| } |
| #include <errno.h> |
| #include <stdarg.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <string.h> |
| |
| const int kFailStatus = 67; |
| const int kRetryStatus = 69; |
| |
| static void fail(const char* msg, ...) |
| { |
| int e = errno; |
| va_list args; |
| va_start(args, msg); |
| vfprintf(stderr, msg, args); |
| va_end(args); |
| fprintf(stderr, " (errno %d)\n", e); |
| doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus); |
| } |
| |
| static void exitf(const char* msg, ...) |
| { |
| int e = errno; |
| va_list args; |
| va_start(args, msg); |
| vfprintf(stderr, msg, args); |
| va_end(args); |
| fprintf(stderr, " (errno %d)\n", e); |
| doexit(kRetryStatus); |
| } |
| |
| static void vsnprintf_check(char* str, size_t size, const char* format, |
| va_list args) |
| { |
| int rv; |
| |
| rv = vsnprintf(str, size, format, args); |
| if (rv < 0) |
| fail("tun: snprintf failed"); |
| if ((size_t)rv >= size) |
| fail("tun: string '%s...' doesn't fit into buffer", str); |
| } |
| |
| #define COMMAND_MAX_LEN 128 |
| #define PATH_PREFIX \ |
| "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin " |
| #define PATH_PREFIX_LEN (sizeof(PATH_PREFIX) - 1) |
| |
| static void execute_command(bool panic, const char* format, ...) |
| { |
| va_list args; |
| char command[PATH_PREFIX_LEN + COMMAND_MAX_LEN]; |
| int rv; |
| |
| va_start(args, format); |
| memcpy(command, PATH_PREFIX, PATH_PREFIX_LEN); |
| vsnprintf_check(command + PATH_PREFIX_LEN, COMMAND_MAX_LEN, format, args); |
| va_end(args); |
| rv = system(command); |
| if (rv) { |
| if (panic) |
| fail("command '%s' failed: %d", &command[0], rv); |
| } |
| } |
| |
| #define DEV_IPV4 "172.20.20.%d" |
| #define DEV_IPV6 "fe80::%02hx" |
| #define DEV_MAC "aa:aa:aa:aa:aa:%02hx" |
| |
| static void snprintf_check(char* str, size_t size, const char* format, ...) |
| { |
| va_list args; |
| |
| va_start(args, format); |
| vsnprintf_check(str, size, format, args); |
| va_end(args); |
| } |
| |
| static void initialize_netdevices(void) |
| { |
| unsigned i; |
| const char* devtypes[] = {"ip6gretap", "bridge", "vcan", "bond", "team"}; |
| const char* devnames[] = {"lo", |
| "sit0", |
| "bridge0", |
| "vcan0", |
| "tunl0", |
| "gre0", |
| "gretap0", |
| "ip_vti0", |
| "ip6_vti0", |
| "ip6tnl0", |
| "ip6gre0", |
| "ip6gretap0", |
| "erspan0", |
| "bond0", |
| "veth0", |
| "veth1", |
| "team0", |
| "veth0_to_bridge", |
| "veth1_to_bridge", |
| "veth0_to_bond", |
| "veth1_to_bond", |
| "veth0_to_team", |
| "veth1_to_team"}; |
| const char* devmasters[] = {"bridge", "bond", "team"}; |
| |
| for (i = 0; i < sizeof(devtypes) / (sizeof(devtypes[0])); i++) |
| execute_command(0, "ip link add dev %s0 type %s", devtypes[i], devtypes[i]); |
| execute_command(0, "ip link add type veth"); |
| |
| for (i = 0; i < sizeof(devmasters) / (sizeof(devmasters[0])); i++) { |
| execute_command( |
| 0, "ip link add name %s_slave_0 type veth peer name veth0_to_%s", |
| devmasters[i], devmasters[i]); |
| execute_command( |
| 0, "ip link add name %s_slave_1 type veth peer name veth1_to_%s", |
| devmasters[i], devmasters[i]); |
| execute_command(0, "ip link set %s_slave_0 master %s0", devmasters[i], |
| devmasters[i]); |
| execute_command(0, "ip link set %s_slave_1 master %s0", devmasters[i], |
| devmasters[i]); |
| execute_command(0, "ip link set veth0_to_%s up", devmasters[i]); |
| execute_command(0, "ip link set veth1_to_%s up", devmasters[i]); |
| } |
| execute_command(0, "ip link set bridge_slave_0 up"); |
| execute_command(0, "ip link set bridge_slave_1 up"); |
| |
| for (i = 0; i < sizeof(devnames) / (sizeof(devnames[0])); i++) { |
| char addr[32]; |
| snprintf_check(addr, sizeof(addr), DEV_IPV4, i + 10); |
| execute_command(0, "ip -4 addr add %s/24 dev %s", addr, devnames[i]); |
| snprintf_check(addr, sizeof(addr), DEV_IPV6, i + 10); |
| execute_command(0, "ip -6 addr add %s/120 dev %s", addr, devnames[i]); |
| snprintf_check(addr, sizeof(addr), DEV_MAC, i + 10); |
| execute_command(0, "ip link set dev %s address %s", devnames[i], addr); |
| execute_command(0, "ip link set dev %s up", devnames[i]); |
| } |
| } |
| |
| static bool write_file(const char* file, const char* what, ...) |
| { |
| char buf[1024]; |
| va_list args; |
| va_start(args, what); |
| vsnprintf(buf, sizeof(buf), what, args); |
| va_end(args); |
| buf[sizeof(buf) - 1] = 0; |
| int len = strlen(buf); |
| |
| int fd = open(file, O_WRONLY | O_CLOEXEC); |
| if (fd == -1) |
| return false; |
| if (write(fd, buf, len) != len) { |
| int err = errno; |
| close(fd); |
| errno = err; |
| return false; |
| } |
| close(fd); |
| return true; |
| } |
| |
| static void loop(); |
| |
| static void sandbox_common() |
| { |
| prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); |
| setpgrp(); |
| setsid(); |
| |
| struct rlimit rlim; |
| rlim.rlim_cur = rlim.rlim_max = 160 << 20; |
| setrlimit(RLIMIT_AS, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 8 << 20; |
| setrlimit(RLIMIT_MEMLOCK, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 136 << 20; |
| setrlimit(RLIMIT_FSIZE, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 1 << 20; |
| setrlimit(RLIMIT_STACK, &rlim); |
| rlim.rlim_cur = rlim.rlim_max = 0; |
| setrlimit(RLIMIT_CORE, &rlim); |
| |
| if (unshare(CLONE_NEWNS)) { |
| } |
| if (unshare(CLONE_NEWIPC)) { |
| } |
| if (unshare(0x02000000)) { |
| } |
| if (unshare(CLONE_NEWUTS)) { |
| } |
| if (unshare(CLONE_SYSVSEM)) { |
| } |
| } |
| |
| static int do_sandbox_none(void) |
| { |
| if (unshare(CLONE_NEWPID)) { |
| } |
| int pid = fork(); |
| if (pid < 0) |
| fail("sandbox fork failed"); |
| if (pid) |
| return pid; |
| |
| sandbox_common(); |
| if (unshare(CLONE_NEWNET)) { |
| } |
| initialize_netdevices(); |
| loop(); |
| doexit(1); |
| } |
| |
| static int inject_fault(int nth) |
| { |
| int fd; |
| char buf[16]; |
| |
| fd = open("/proc/thread-self/fail-nth", O_RDWR); |
| if (fd == -1) |
| exitf("failed to open /proc/thread-self/fail-nth"); |
| sprintf(buf, "%d", nth + 1); |
| if (write(fd, buf, strlen(buf)) != (ssize_t)strlen(buf)) |
| exitf("failed to write /proc/thread-self/fail-nth"); |
| return fd; |
| } |
| |
| static void execute_one(); |
| extern unsigned long long procid; |
| |
| void loop() |
| { |
| while (1) { |
| execute_one(); |
| } |
| } |
| |
| uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; |
| unsigned long long procid; |
| void execute_one() |
| { |
| long res = 0; |
| res = syscall(__NR_socket, 0xa, 6, 0); |
| if (res != -1) |
| r[0] = res; |
| *(uint16_t*)0x20000000 = 0xa; |
| *(uint16_t*)0x20000002 = htobe16(0x4e23); |
| *(uint32_t*)0x20000004 = 0; |
| *(uint8_t*)0x20000008 = 0; |
| *(uint8_t*)0x20000009 = 0; |
| *(uint8_t*)0x2000000a = 0; |
| *(uint8_t*)0x2000000b = 0; |
| *(uint8_t*)0x2000000c = 0; |
| *(uint8_t*)0x2000000d = 0; |
| *(uint8_t*)0x2000000e = 0; |
| *(uint8_t*)0x2000000f = 0; |
| *(uint8_t*)0x20000010 = 0; |
| *(uint8_t*)0x20000011 = 0; |
| *(uint8_t*)0x20000012 = 0; |
| *(uint8_t*)0x20000013 = 0; |
| *(uint8_t*)0x20000014 = 0; |
| *(uint8_t*)0x20000015 = 0; |
| *(uint8_t*)0x20000016 = 0; |
| *(uint8_t*)0x20000017 = 0; |
| *(uint32_t*)0x20000018 = 0; |
| syscall(__NR_bind, r[0], 0x20000000, 0x1c); |
| syscall(__NR_listen, r[0], 0x5eb857); |
| res = syscall(__NR_socket, 2, 6, 0); |
| if (res != -1) |
| r[1] = res; |
| *(uint16_t*)0x20772000 = 2; |
| *(uint16_t*)0x20772002 = htobe16(0x4e23); |
| *(uint32_t*)0x20772004 = htobe32(0); |
| *(uint8_t*)0x20772008 = 0; |
| *(uint8_t*)0x20772009 = 0; |
| *(uint8_t*)0x2077200a = 0; |
| *(uint8_t*)0x2077200b = 0; |
| *(uint8_t*)0x2077200c = 0; |
| *(uint8_t*)0x2077200d = 0; |
| *(uint8_t*)0x2077200e = 0; |
| *(uint8_t*)0x2077200f = 0; |
| syscall(__NR_connect, r[1], 0x20772000, 0x10); |
| *(uint32_t*)0x20752ffc = 0x10; |
| res = syscall(__NR_accept4, r[0], 0x20975000, 0x20752ffc, 0); |
| if (res != -1) |
| r[2] = res; |
| *(uint64_t*)0x20000400 = 0; |
| *(uint32_t*)0x20000408 = 0; |
| *(uint64_t*)0x20000410 = 0x20002140; |
| *(uint64_t*)0x20000418 = 0x18f; |
| *(uint64_t*)0x20000420 = 0x20000080; |
| *(uint64_t*)0x20000428 = 0; |
| *(uint32_t*)0x20000430 = 0; |
| *(uint32_t*)0x20000438 = 0; |
| syscall(__NR_sendmmsg, r[2], 0x20000400, 0x4f, 0); |
| *(uint16_t*)0x20000080 = 2; |
| *(uint16_t*)0x20000082 = htobe16(0); |
| *(uint8_t*)0x20000084 = 0xac; |
| *(uint8_t*)0x20000085 = 0x14; |
| *(uint8_t*)0x20000086 = 0x14; |
| *(uint8_t*)0x20000087 = 0; |
| *(uint8_t*)0x20000088 = 0; |
| *(uint8_t*)0x20000089 = 0; |
| *(uint8_t*)0x2000008a = 0; |
| *(uint8_t*)0x2000008b = 0; |
| *(uint8_t*)0x2000008c = 0; |
| *(uint8_t*)0x2000008d = 0; |
| *(uint8_t*)0x2000008e = 0; |
| *(uint8_t*)0x2000008f = 0; |
| syscall(__NR_sendto, r[1], 0x20000040, 0, 0, 0x20000080, 0x10); |
| write_file("/sys/kernel/debug/failslab/ignore-gfp-wait", "N"); |
| write_file("/sys/kernel/debug/fail_futex/ignore-private", "N"); |
| inject_fault(13); |
| syscall(__NR_sendmmsg, r[2], 0x20000c00, 0x4000000000001e6, 0); |
| } |
| |
| int main() |
| { |
| syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); |
| for (procid = 0; procid < 8; procid++) { |
| if (fork() == 0) { |
| for (;;) { |
| int pid = do_sandbox_none(); |
| int status = 0; |
| while (waitpid(pid, &status, __WALL) != pid) { |
| } |
| } |
| } |
| } |
| sleep(1000000); |
| return 0; |
| } |