// https://syzkaller.appspot.com/bug?id=8fba766ebc0cb4586325380ed578c469fa92de44 // autogenerated by syzkaller (http://github.com/google/syzkaller) #define _GNU_SOURCE #include #include __attribute__((noreturn)) static void doexit(int status) { volatile unsigned i; syscall(__NR_exit_group, status); for (i = 0;; i++) { } } #include #include #include #include #include #include #include const int kFailStatus = 67; const int kRetryStatus = 69; static void fail(const char* msg, ...) { int e = errno; va_list args; va_start(args, msg); vfprintf(stderr, msg, args); va_end(args); fprintf(stderr, " (errno %d)\n", e); doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus); } static void use_temporary_dir() { char tmpdir_template[] = "./syzkaller.XXXXXX"; char* tmpdir = mkdtemp(tmpdir_template); if (!tmpdir) fail("failed to mkdtemp"); if (chmod(tmpdir, 0777)) fail("failed to chmod"); if (chdir(tmpdir)) fail("failed to chdir"); } long r[13]; void loop() { memset(r, -1, sizeof(r)); r[0] = syscall(__NR_mmap, 0x20000000ul, 0xfff000ul, 0x3ul, 0x32ul, 0xfffffffffffffffful, 0x0ul); memcpy((void*)0x20000ff7, "\x2f\x64\x65\x76\x2f\x6b\x76\x6d\x00", 9); r[2] = syscall(__NR_openat, 0xffffffffffffff9cul, 0x20000ff7ul, 0x0ul, 0x0ul); r[3] = syscall(__NR_ioctl, r[2], 0xae01ul, 0x0ul); r[4] = syscall(__NR_ioctl, r[3], 0xae41ul, 0x0ul); *(uint32_t*)0x20001000 = (uint32_t)0x0; *(uint32_t*)0x20001004 = (uint32_t)0x3; *(uint64_t*)0x20001008 = (uint64_t)0x0; *(uint64_t*)0x20001010 = (uint64_t)0x2000; *(uint64_t*)0x20001018 = (uint64_t)0x20000000; r[10] = syscall(__NR_ioctl, r[3], 0x4020ae46ul, 0x20001000ul); r[11] = syscall(__NR_ioctl, r[4], 0xae80ul, 0x0ul); r[12] = syscall(__NR_ioctl, r[4], 0xae80ul, 0x0ul); } int main() { use_temporary_dir(); loop(); return 0; }