// https://syzkaller.appspot.com/bug?id=2c2730c5bfc930926519b6ca5edd1c5052e84418 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include static long syz_open_dev(volatile long a0, volatile long a1, volatile long a2) { if (a0 == 0xc || a0 == 0xb) { char buf[128]; sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1, (uint8_t)a2); return open(buf, O_RDWR, 0); } else { char buf[1024]; char* hash; strncpy(buf, (char*)a0, sizeof(buf) - 1); buf[sizeof(buf) - 1] = 0; while ((hash = strchr(buf, '#'))) { *hash = '0' + (char)(a1 % 10); a1 /= 10; } return open(buf, a2, 0); } } uint64_t r[4] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); intptr_t res = 0; res = syscall(__NR_socket, 1ul, 2ul, 0); if (res != -1) r[0] = res; *(uint16_t*)0x200006c0 = 1; memcpy( (void*)0x200006c2, "\351\037q\211Y\036\2223aK\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", 108); syscall(__NR_bind, r[0], 0x200006c0ul, 0x6eul); *(uint32_t*)0x200001c0 = -1; syscall(__NR_ioctl, r[0], 0x8901, 0x200001c0ul); *(uint64_t*)0x20000000 = 2; syscall(__NR_ioctl, r[0], 0x5452, 0x20000000ul); res = syscall(__NR_socket, 1ul, 2ul, 0); if (res != -1) r[1] = res; *(uint16_t*)0x20000080 = 1; memcpy( (void*)0x20000082, "\351\037q\211Y\036\2223aK\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", 108); syscall(__NR_connect, r[1], 0x20000080ul, 0x6eul); syscall(__NR_sendmmsg, r[1], 0x20002dc0ul, 0x307017fdb7a66cbul, 0x3ec0ul); memcpy((void*)0x20000000, "/dev/input/event#\000", 18); res = -1; res = syz_open_dev(0x20000000, 0, 0); if (res != -1) r[2] = res; *(uint64_t*)0x20000000 = 0xe9; syscall(__NR_ioctl, r[2], 0x5452, 0x20000000ul); memcpy((void*)0x20000000, "/dev/input/event#\000", 18); res = -1; res = syz_open_dev(0x20000000, 0, 0x20002); if (res != -1) r[3] = res; *(uint64_t*)0x2004d000 = 0; *(uint64_t*)0x2004d008 = 0x2710; *(uint16_t*)0x2004d010 = 0; *(uint16_t*)0x2004d012 = 1; *(uint32_t*)0x2004d014 = 0; syscall(__NR_write, r[3], 0x2004d000ul, 0x79ul); return 0; }