// https://syzkaller.appspot.com/bug?id=3e99f9b4ca4807bb541159f3cd1c0776f6598ee8 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #define BITMASK_LEN(type, bf_len) (type)((1ull << (bf_len)) - 1) #define BITMASK_LEN_OFF(type, bf_off, bf_len) \ (type)(BITMASK_LEN(type, (bf_len)) << (bf_off)) #define STORE_BY_BITMASK(type, addr, val, bf_off, bf_len) \ if ((bf_off) == 0 && (bf_len) == 0) { \ *(type*)(addr) = (type)(val); \ } else { \ type new_val = *(type*)(addr); \ new_val &= ~BITMASK_LEN_OFF(type, (bf_off), (bf_len)); \ new_val |= ((type)(val)&BITMASK_LEN(type, (bf_len))) << (bf_off); \ *(type*)(addr) = new_val; \ } static void execute_one(); extern unsigned long long procid; void loop() { while (1) { execute_one(); } } uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; void execute_one() { long res = 0; res = syscall(__NR_socket, 0x26, 5, 0); if (res != -1) r[0] = res; *(uint16_t*)0x20000000 = 0x26; memcpy((void*)0x20000002, "\x68\x61\x73\x68\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 14); *(uint32_t*)0x20000010 = 0; *(uint32_t*)0x20000014 = 0; memcpy((void*)0x20000018, "\x73\x68\x61\x33\x2d\x33\x38\x34\x2d\x67\x65\x6e\x65\x72\x69\x63\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 64); syscall(__NR_bind, r[0], 0x20000000, 0x58); res = syscall(__NR_accept, r[0], 0, 0); if (res != -1) r[1] = res; *(uint64_t*)0x20477000 = 0x20000080; *(uint16_t*)0x20000080 = 0x1d; *(uint32_t*)0x20000084 = 0; *(uint32_t*)0x20000088 = 0; *(uint32_t*)0x2000008c = 0; *(uint32_t*)0x20477008 = 0x10; *(uint64_t*)0x20477010 = 0x20000240; *(uint64_t*)0x20000240 = 0x200001c0; STORE_BY_BITMASK(uint32_t, 0x200001c0, 0, 0, 29); STORE_BY_BITMASK(uint32_t, 0x200001c0, 0, 29, 1); STORE_BY_BITMASK(uint32_t, 0x200001c0, 0, 30, 1); STORE_BY_BITMASK(uint32_t, 0x200001c0, 0, 31, 1); *(uint8_t*)0x200001c4 = 0; *(uint8_t*)0x200001c5 = 0; *(uint8_t*)0x200001c6 = 0; *(uint8_t*)0x200001c7 = 0; memcpy((void*)0x200001c8, "\xb5\xa4\x19\xfb\x5d\xf1\x28\xc8\x3a\xd9\x43\x03\x62\xa2\x2a\x5a\xbf" "\x1e\x41\x23\xef\xcc\xc6\x41\x60\x2c\x2d\xa3\x63\x0b\x58\xd0\x47\x66" "\xc5\x8b\x25\x4f\xf2\xa9\x65\xcc\xb2\x26\xc8\xc7\x35\x5c\x33\x30\x6c" "\x99\xad\xaa\x0a\xa5\x90\x06\xf8\xdc\x9b\x01\xb7\x37", 64); *(uint64_t*)0x20000248 = 0xff89; *(uint64_t*)0x20477018 = 1; *(uint64_t*)0x20477020 = 0; *(uint64_t*)0x20477028 = 0; *(uint32_t*)0x20477030 = 0; syscall(__NR_sendmsg, r[1], 0x20477000, 0); } int main() { syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); for (;;) { loop(); } }