// https://syzkaller.appspot.com/bug?id=6ebdcf8b382e79788943bc3292640283d68fba29 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include static uintptr_t syz_open_dev(uintptr_t a0, uintptr_t a1, uintptr_t a2) { if (a0 == 0xc || a0 == 0xb) { char buf[128]; sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, (uint8_t)a2); return open(buf, O_RDWR, 0); } else { char buf[1024]; char* hash; strncpy(buf, (char*)a0, sizeof(buf)); buf[sizeof(buf) - 1] = 0; while ((hash = strchr(buf, '#'))) { *hash = '0' + (char)(a1 % 10); a1 /= 10; } return open(buf, a2, 0); } } static void test(); void loop() { while (1) { test(); } } long r[15]; void test() { memset(r, -1, sizeof(r)); r[0] = syscall(__NR_mmap, 0x20000000ul, 0xfff000ul, 0x3ul, 0x32ul, 0xfffffffffffffffful, 0x0ul); memcpy((void*)0x20aa5000, "\x2f\x64\x65\x76\x2f\x6e\x65\x74\x2f\x74\x75\x6e\x00", 13); r[2] = syz_open_dev(0x20aa5000ul, 0x0ul, 0x0ul); memcpy((void*)0x20982fd8, "\x66\x4a\x16\x0d\x6a\xcf\x43\x8a\x58\x23" "\x87\x65\x9b\x60\x9a\x60", 16); *(uint32_t*)0x20982fe8 = (uint32_t)0x4000002080000001; *(uint32_t*)0x20982fec = (uint32_t)0x4; *(uint64_t*)0x20982ff0 = (uint64_t)0x20012fe8; *(uint32_t*)0x20012fe8 = (uint32_t)0x0; *(uint32_t*)0x20012fec = (uint32_t)0x0; *(uint32_t*)0x20012ff0 = (uint32_t)0xa420; *(uint32_t*)0x20012ff4 = (uint32_t)0x0; *(uint32_t*)0x20012ff8 = (uint32_t)0x81c7; *(uint16_t*)0x20012ffc = (uint16_t)0x5; *(uint16_t*)0x20012ffe = (uint16_t)0xa55; r[14] = syscall(__NR_ioctl, r[2], 0x400454caul, 0x20982fd8ul); } int main() { loop(); return 0; }