// https://syzkaller.appspot.com/bug?id=d767177245c54af614d5241159cce56995eef0db // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } #include #include #include #include #include #include #include const int kFailStatus = 67; const int kRetryStatus = 69; static void fail(const char* msg, ...) { int e = errno; va_list args; va_start(args, msg); vfprintf(stderr, msg, args); va_end(args); fprintf(stderr, " (errno %d)\n", e); doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus); } static void use_temporary_dir() { char tmpdir_template[] = "./syzkaller.XXXXXX"; char* tmpdir = mkdtemp(tmpdir_template); if (!tmpdir) fail("failed to mkdtemp"); if (chmod(tmpdir, 0777)) fail("failed to chmod"); if (chdir(tmpdir)) fail("failed to chdir"); } static void test(); void loop() { while (1) { test(); } } long r[29]; void* thr(void* arg) { switch ((long)arg) { case 0: r[0] = syscall(__NR_mmap, 0x20000000ul, 0x59e000ul, 0x3ul, 0x32ul, 0xfffffffffffffffful, 0x0ul); break; case 1: r[1] = syscall(__NR_socket, 0x26ul, 0x5ul, 0x0ul); break; case 2: *(uint16_t*)0x20000000 = (uint16_t)0x26; memcpy((void*)0x20000002, "\x73\x6b\x63\x69\x70\x68\x65\x72\x00\x00\x00\x00\x00\x00", 14); *(uint32_t*)0x20000010 = (uint32_t)0x0; *(uint32_t*)0x20000014 = (uint32_t)0x0; memcpy((void*)0x20000018, "\x63\x68\x61\x63\x68\x61\x32\x30\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00", 64); r[7] = syscall(__NR_bind, r[1], 0x20000000ul, 0x58ul); break; case 3: r[8] = syscall(__NR_accept, r[1], 0x0ul, 0x0ul); break; case 4: memcpy((void*)0x2007ff6f, "\x9f\xa0\x29\x1e\x41\x79\x7c\x3d\x71\x85" "\x4a\x9f\xe2\xcd\x85\x86\x74\xc8\x29\x88" "\x34\x8b\x5c\xa3\xa6\x10\x3d\x5c\xa1\xcb" "\x9e\xef", 32); r[10] = syscall(__NR_setsockopt, r[1], 0x117ul, 0x1ul, 0x2007ff6ful, 0x20ul); break; case 5: *(uint64_t*)0x2008dfc8 = (uint64_t)0x200eafe4; *(uint32_t*)0x2008dfd0 = (uint32_t)0x1c; *(uint64_t*)0x2008dfd8 = (uint64_t)0x20216000; *(uint64_t*)0x2008dfe0 = (uint64_t)0x5; *(uint64_t*)0x2008dfe8 = (uint64_t)0x20216000; *(uint64_t*)0x2008dff0 = (uint64_t)0x0; *(uint32_t*)0x2008dff8 = (uint32_t)0x3; *(uint64_t*)0x20216000 = (uint64_t)0x20216000; *(uint64_t*)0x20216008 = (uint64_t)0x0; *(uint64_t*)0x20216010 = (uint64_t)0x20216000; *(uint64_t*)0x20216018 = (uint64_t)0x0; *(uint64_t*)0x20216020 = (uint64_t)0x20123f7b; *(uint64_t*)0x20216028 = (uint64_t)0x0; *(uint64_t*)0x20216030 = (uint64_t)0x20176000; *(uint64_t*)0x20216038 = (uint64_t)0x0; *(uint64_t*)0x20216040 = (uint64_t)0x20216f27; *(uint64_t*)0x20216048 = (uint64_t)0xd9; r[28] = syscall(__NR_recvmsg, r[8], 0x2008dfc8ul, 0x40010101ul); break; } return 0; } void test() { long i; pthread_t th[12]; memset(r, -1, sizeof(r)); srand(getpid()); for (i = 0; i < 6; i++) { pthread_create(&th[i], 0, thr, (void*)i); usleep(rand() % 10000); } for (i = 0; i < 6; i++) { pthread_create(&th[6 + i], 0, thr, (void*)i); if (rand() % 2) usleep(rand() % 10000); } usleep(rand() % 100000); } int main() { int i; for (i = 0; i < 8; i++) { if (fork() == 0) { use_temporary_dir(); loop(); return 0; } } sleep(1000000); return 0; }