// https://syzkaller.appspot.com/bug?id=a2374a5541e385c5b4b098b85ac20ab37346c705 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include static uintptr_t syz_open_dev(uintptr_t a0, uintptr_t a1, uintptr_t a2) { if (a0 == 0xc || a0 == 0xb) { char buf[128]; sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, (uint8_t)a2); return open(buf, O_RDWR, 0); } else { char buf[1024]; char* hash; strncpy(buf, (char*)a0, sizeof(buf) - 1); buf[sizeof(buf) - 1] = 0; while ((hash = strchr(buf, '#'))) { *hash = '0' + (char)(a1 % 10); a1 /= 10; } return open(buf, a2, 0); } } static void execute_one(); extern unsigned long long procid; void loop() { while (1) { execute_one(); } } #ifndef __NR_memfd_create #define __NR_memfd_create 319 #endif uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; void execute_one() { long res = 0; memcpy((void*)0x20000140, "/dev/loop#", 11); res = syz_open_dev(0x20000140, 0, 0x8000); if (res != -1) r[0] = res; memcpy((void*)0x20000380, "\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x76\x8e" "\x05\xf7\xc1\x55\xad\x7d\xc6\x94\x7c\x57\x3e\x5a\x69\x24\x4e\x76\x38" "\x2c\x0a\xa6\x3d\x57\x5e\xa3\x59\x7f\x8b\x17\x28\x27\x7e\xf7\x6b\x30" "\x54\x4d\x7b\xa9\x2d\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f\x7b\x34\x51" "\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8b\x52\x41\xda\x89\x45\x66\x6e\x00" "\x73\xc2\x5a\x62\x01\x00\x4d\xbe\xa3\x7a\xab\xd3\xeb\x98\x88\xc4\xc6" "\x29\x41\x9f\x50\x93\x7a\x68\x48\xe0\xd2\x81\xdb\xee\x56\x8c\x4d\xe9" "\xa0\x36\xc2\x6f\x19\x22\xf6\x49\x71\xd4\xdf\x97\xfb\xab\x04\xe8\xce" "\x49\x38\xb3\x1d\xcf\x25\x9b\x4b\xc6\x09\x01\xe1\x86\x61\xfa\xb8\xfb" "\x29\x88\xcd\x2b\xc2\x60\xc2\xf5\x72\x35\x3e\x6b\xb0\xa0\x02\xfc\x16" "\x4d\x4f\x18\x9b\x06\x80\x62\xd1\x01\x00\x00\x00\x00\x00\x00\x00\x40" "\x0c\x0c\x4c\xa5\x7b\x54\x6b\x94\x30\x17\x2e\xa5\x36\x2e\xe0\x14\x1b" "\x3d\xf0\x6a\xd2\x35\xe8\x15\xd8\x9e\xea\xd3\xd9\x47\x34\x09\xc0\x9c" "\x2e\x27\xa9\x52\x33\x7a\x24\xf2\x01\x88\xc0\x13\x12\x3c\xc0\x31\x6a" "\x33\xd8\xb4\x43\x45\x37\x73\xe4\xa0\x9e\xdd\x80\x31\x12\x4d\xee\x13" "\xce\x9c\x75\x28\x8f\x2e\xc8\x33\xc7\xe6\x6a\xf5\xb1\x9a\x00\x00\x00" "\x00\x00\x00\x00", 276); res = syscall(__NR_memfd_create, 0x20000380, 0); if (res != -1) r[1] = res; *(uint64_t*)0x20000340 = 0x200001c0; memcpy((void*)0x200001c0, "'", 1); *(uint64_t*)0x20000348 = 1; syscall(__NR_pwritev, r[1], 0x20000340, 1, 0x81806); syscall(__NR_ioctl, r[0], 0x4c00, r[1]); syscall(__NR_ioctl, r[0], 0x4c06, r[0]); } int main() { syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); for (;;) { loop(); } }