// https://syzkaller.appspot.com/bug?id=60d46fd4863952897cbf67c6b1bcc8b20ec7bde6 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifndef SYS_compat_50_mknod #define SYS_compat_50_mknod 14 #endif #ifndef SYS_ioctl #define SYS_ioctl 54 #endif #ifndef SYS_mmap #define SYS_mmap 197 #endif #ifndef SYS_open #define SYS_open 5 #endif #ifndef SYS_sendto #define SYS_sendto 133 #endif static unsigned long long procid; static void kill_and_wait(int pid, int* status) { kill(pid, SIGKILL); while (waitpid(-1, status, 0) != pid) { } } static void sleep_ms(uint64_t ms) { usleep(ms * 1000); } static uint64_t current_time_ms(void) { struct timespec ts; if (clock_gettime(CLOCK_MONOTONIC, &ts)) exit(1); return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; } static void execute_one(void); #define WAIT_FLAGS 0 static void loop(void) { int iter = 0; for (;; iter++) { int pid = fork(); if (pid < 0) exit(1); if (pid == 0) { execute_one(); exit(0); } int status = 0; uint64_t start = current_time_ms(); for (;;) { if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) break; sleep_ms(1); if (current_time_ms() - start < 5000) continue; kill_and_wait(pid, &status); break; } } } uint64_t r[1] = {0xffffffffffffffff}; void execute_one(void) { intptr_t res = 0; memcpy((void*)0x200000c0, "./file0\000", 8); syscall(SYS_compat_50_mknod, 0x200000c0ul, 0x2000ul, 0x17fc); memcpy((void*)0x20000000, "./file0\000", 8); res = syscall(SYS_open, 0x20000000ul, 0ul, 0ul); if (res != -1) r[0] = res; memcpy((void*)0x20000040, "\xc6\xeb\xf8\x25\x4f\xde\xab\x8b\x37\xf0\x17\xc2\x04\x92\x33\xaf\x08" "\x76\xfe\xad\x1f\x4b\x64\xb3\x6f\x4d\x37\xd0\xbc\xe6\x85\x54\xc2\x7d" "\x4d\x1c\x4e\x65\xe3\x53\x83\x7e\x60\x9c\x5d\x42\x8b\xb9\xfa\x8f\x81" "\x72\x5e\xf4\x27\x43\x26\xaf\x5e\xc1\xbe\x65\xc1\xd8\x20\x28\x74\xc5" "\x94\xa7\xd2\x30\xd7\xde\xa1\x90\x17\x41\xf6\x3d\xb1\x84\x83\xbe\xea" "\x56\x76\x63\x88\x92\xb7\x7a\x76\x90\x9d\xba\xe8\x02\x21\x1a\xe7\x10" "\x5c\x3e\xe8\x90\xf1\xa1\x35\x41\xba\x37\x49\x11\x5e\x00\x13\x50\xc5" "\x65\xa9\x2d\x75\xc0\x9e\xe8\xa1\x0a\x43\x3d\x7b\xd6\x7f\x18\x6f\x39" "\x7d\x47\x64\xe7\xe6\x89\x41\x66\x7f\x0f\x73\x92\x90\xd9\xfa\x34\x24" "\x32\x9a\x8e\x0e\x09\x81\xb7\x45\x37\x9d\x22\x93\x2b\x95\x17\x48\x56" "\xb6\x8b\x68\xe4\x97\x6e\xcb\xfd\xe4\x08\xa2\x08\x0d\xa2\x89\xc7\xcf" "\x97\x87\x25\x43\x44\x27\x40\x01\x79\x67\x1d\x61\x90\xc6\xb1\x7e\x2a" "\xe9\xb2\x5f\x3d\x73\x57\xc8\x7c\xac\x61\xc7\xf4\xd9\x2c", 218); syscall(SYS_sendto, -1, 0x20000040ul, 0xdaul, 4ul, 0ul, 0ul); *(uint32_t*)0x20000040 = 0x13ae4701; syscall(SYS_ioctl, r[0], 0x8010427aul, 0x20000040ul); } int main(void) { syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 3ul, 0x1012ul, -1, 0ul, 0ul); for (procid = 0; procid < 6; procid++) { if (fork() == 0) { loop(); } } sleep(1000000); return 0; }