// https://syzkaller.appspot.com/bug?id=e2dc9aea0465d1eea101bb24cb463e2a7efe7d17 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } #include #include const int kFailStatus = 67; const int kRetryStatus = 69; static void fail(const char* msg, ...) { int e = errno; va_list args; va_start(args, msg); vfprintf(stderr, msg, args); va_end(args); fprintf(stderr, " (errno %d)\n", e); doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus); } static uint64_t current_time_ms() { struct timespec ts; if (clock_gettime(CLOCK_MONOTONIC, &ts)) fail("clock_gettime failed"); return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; } static void test(); void loop() { int iter; for (iter = 0;; iter++) { int pid = fork(); if (pid < 0) fail("loop fork failed"); if (pid == 0) { prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); setpgrp(); test(); doexit(0); } int status = 0; uint64_t start = current_time_ms(); for (;;) { int res = waitpid(-1, &status, __WALL | WNOHANG); if (res == pid) break; usleep(1000); if (current_time_ms() - start > 5 * 1000) { kill(-pid, SIGKILL); kill(pid, SIGKILL); while (waitpid(-1, &status, __WALL) != pid) { } break; } } } } long r[4]; uint64_t procid; void test() { memset(r, -1, sizeof(r)); syscall(__NR_mmap, 0x20000000, 0xfff000, 0x3, 0x32, 0xffffffff, 0x0); *(uint16_t*)0x20320fa8 = 0x26; memcpy((void*)0x20320faa, "\x61\x65\x61\x64\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 14); *(uint32_t*)0x20320fb8 = 0x0; *(uint32_t*)0x20320fbc = 0x0; memcpy((void*)0x20320fc0, "\x72\x66\x63\x37\x35\x33\x39\x28\x63\x74\x72\x2d\x63\x61\x6d" "\x65\x6c\x6c\x69\x61\x2d\x61\x65\x73\x6e\x69\x2d\x61\x76\x78" "\x32\x2c\x67\x68\x61\x73\x68\x2d\x63\x6c\x6d\x75\x6c\x6e\x69" "\x29\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00", 64); syscall(__NR_bind, 0xffffffff, 0x20320fa8, 0x58); r[0] = syscall(__NR_socket, 0x0, 0x5, 0x0); *(uint32_t*)0x20ab2000 = 0x4; syscall(__NR_getsockopt, r[0], 0x84, 0x8, 0x20d9dffc, 0x20ab2000); r[1] = syscall(__NR_socket, 0x26, 0x5, 0x0); *(uint16_t*)0x20ab5000 = 0x26; memcpy((void*)0x20ab5002, "\x61\x65\x61\x64\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 14); *(uint32_t*)0x20ab5010 = 0x0; *(uint32_t*)0x20ab5014 = 0x0; memcpy((void*)0x20ab5018, "\x67\x63\x6d\x28\x74\x77\x6f\x66\x69\x73\x68\x29\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00", 64); syscall(__NR_bind, r[1], 0x20ab5000, 0x58); memcpy((void*)0x204f7000, "\x64\x9c\x47\xad\x46\x39\x0d\xc8\x6d\xae" "\x79\xfa\x40\x9d\x4d\x54", 16); syscall(__NR_setsockopt, r[1], 0x117, 0x1, 0x204f7000, 0x10); r[2] = syscall(__NR_accept, r[1], 0x0, 0x0); *(uint64_t*)0x20e7dfc8 = 0x0; *(uint32_t*)0x20e7dfd0 = 0x0; *(uint64_t*)0x20e7dfd8 = 0x20e5ef90; *(uint64_t*)0x20e7dfe0 = 0x1; *(uint64_t*)0x20e7dfe8 = 0x20a93000; *(uint64_t*)0x20e7dff0 = 0x0; *(uint32_t*)0x20e7dff8 = 0x0; *(uint64_t*)0x20e5ef90 = 0x20205000; *(uint64_t*)0x20e5ef98 = 0x59; memcpy((void*)0x20205000, "\x08\x18\x15\xc3\xc0\xce\xc0\xf5\x66\x77\xed\x7a\x8e\xa6\xab" "\x38\xb0\xdd\x68\xdc\x50\x0d\xbe\x29\xff\xd7\x79\x69\x56\xa3" "\x60\x7f\xf1\xa3\x7c\xdf\xa8\xf0\xe4\x09\xdb\x54\x2a\xd1\xbe" "\x8a\x54\xe9\xb9\x6c\xf9\x39\xb0\xad\xe2\xdf\x0d\x31\xdf\x77" "\x6e\x89\xf3\xfb\x6f\xfa\x43\x78\xd2\xa1\x27\xaa\x21\xbe\x5b" "\x00\x78\xf0\xa9\xa6\xda\xa7\x83\x8d\x25\x2f\xf9\xea\x1d", 89); syscall(__NR_sendmsg, r[2], 0x20e7dfc8, 0x20000000); *(uint64_t*)0x20b2f000 = 0x208e8000; *(uint32_t*)0x20b2f008 = 0x10; *(uint64_t*)0x20b2f010 = 0x20030fa0; *(uint64_t*)0x20b2f018 = 0x1; *(uint64_t*)0x20b2f020 = 0x20590000; *(uint64_t*)0x20b2f028 = 0x0; *(uint32_t*)0x20b2f030 = 0x0; *(uint64_t*)0x20030fa0 = 0x20588f73; *(uint64_t*)0x20030fa8 = 0x8d; syscall(__NR_recvmsg, r[2], 0x20b2f000, 0x0); syscall(__NR_setsockopt, 0xffffffff, 0x0, 0x0, 0x20000f96, 0x0); r[3] = syscall(__NR_socket, 0x2, 0x1, 0x0); *(uint16_t*)0x2092fff0 = 0x2; *(uint16_t*)0x2092fff2 = htobe16(0x4e20 + procid * 0x4ul); *(uint32_t*)0x2092fff4 = htobe32(0x0); *(uint8_t*)0x2092fff8 = 0x0; *(uint8_t*)0x2092fff9 = 0x0; *(uint8_t*)0x2092fffa = 0x0; *(uint8_t*)0x2092fffb = 0x0; *(uint8_t*)0x2092fffc = 0x0; *(uint8_t*)0x2092fffd = 0x0; *(uint8_t*)0x2092fffe = 0x0; *(uint8_t*)0x2092ffff = 0x0; syscall(__NR_sendto, r[3], 0x2092f000, 0x0, 0x0, 0x2092fff0, 0x10); *(uint32_t*)0x20938852 = 0x14; syscall(__NR_getpeername, 0xffffffff, 0x20938fec, 0x20938852); *(uint16_t*)0x20c6cfa8 = 0x26; memcpy((void*)0x20c6cfaa, "\x73\x6b\x63\x69\x70\x68\x65\x72\x00\x00\x00\x00\x00\x00", 14); *(uint32_t*)0x20c6cfb8 = 0x0; *(uint32_t*)0x20c6cfbc = 0x0; memcpy((void*)0x20c6cfc0, "\x70\x63\x62\x63\x28\x61\x65\x73\x29\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00", 64); syscall(__NR_bind, 0xffffffff, 0x20c6cfa8, 0x58); syscall(__NR_socketpair, 0x3, 0x7, 0xf0, 0x20000ff8); *(uint32_t*)0x203bcffc = 0x4; syscall(__NR_getsockopt, 0xffffffff, 0x101, 0x2, 0x20906000, 0x203bcffc); } int main() { int i; for (i = 0; i < 8; i++) { if (fork() == 0) { procid = i; loop(); return 0; } } sleep(1000000); return 0; }