// https://syzkaller.appspot.com/bug?id=a12a0d53e98be4a617f1e02e8ae91dc4a31525f8 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include static void kill_and_wait(int pid, int* status) { kill(pid, SIGKILL); while (waitpid(-1, status, 0) != pid) { } } static void sleep_ms(uint64_t ms) { usleep(ms * 1000); } static uint64_t current_time_ms(void) { struct timespec ts; if (clock_gettime(CLOCK_MONOTONIC, &ts)) exit(1); return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; } static void execute_one(); const char* program_name; void child() { execute_one(); exit(0); } static void execute_one(void); #define WAIT_FLAGS 0 static void loop(void) { int iter; for (iter = 0;; iter++) { int pid = fork(); if (pid < 0) exit(1); if (pid == 0) { execl(program_name, program_name, "child", NULL); exit(1); } int status = 0; uint64_t start = current_time_ms(); for (;;) { if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) break; sleep_ms(1); if (current_time_ms() - start < 5 * 1000) continue; kill_and_wait(pid, &status); break; } } } uint64_t r[1] = {0xffffffffffffffff}; void execute_one(void) { intptr_t res = 0; memcpy((void*)0x20000080, "/net/tcp/0/local\000", 17); res = syscall(SYS_openat, 0xffffffffffffff9cul, 0x20000080ul, 0x11ul, 1ul, 0ul); if (res != -1) r[0] = res; syscall(SYS_close, r[0]); memcpy((void*)0x20000440, "/dev/.empty\000", 12); syscall(SYS_openat, 0xffffffffffffff9cul, 0x20000440ul, 0xcul, 3ul, 0ul); memcpy((void*)0x20000480, "\x4f\x8f\x58\x2d\x41\xbd\x97\x30\xda\x7a\x37\x47\x79\x23\xf6\xc5\x5f" "\xa3\x57\x55\xbc\xbc\x23\xbf\xf0\x15\x6f\x4c\xca\x41\x33\x09\x97\xe6" "\x8d\x2d\x53\x24\xee\x2c\xbd\x61\x84\xfb\x46\xf1\x80\xab\x81\x83\xf7" "\xd2\xc7\x5d\x8b\x1d\xe7\xc7\x89\x24\xfe\x26\x81\x38\x4f\xb4\xb1\x45" "\xda\xac\x34\xa7\x73\x6b\x44\xc1\xe2\xf0\xee\x94\xe7\xee\x98\x66\xea" "\x38\xac\xdf\xbe\x61\xa3\x48\xc3\xed\x4a\xe8\xf0\xad\xf0\xea\x3d\xc9" "\xd3\x61\xe5\x73\x84\x9a\x92\x0f\x35\xe9\x99\x12\x69\x03\x5c\xc4\x91" "\x60\x19\x55\x8d\xaa\x18\x19\x6d\x4b\x52\x78\x84\x00\xeb\xf1\x12\xd3" "\xf7\x94\x95\x09\x84\x8b\x91\x0a\xc9\xa4\x3e\xa4\x27\x9c\x53\x3b\x6a" "\x99\xf6\xb5\x37\x0d\x86\x0f\x1e\x62\x87\xc6\xad\x5b\x4c\xbe\x77\xc4" "\x04\x07\xbf\x39\x3f\x5a\x8d\xce\xf0\xa3\x55\xbf\xbd\x02\xf1\x95\xc5" "\x07\x1b\x7e\x8c\x84\x4d\x1a\xf8\xf2\xac\xc2\xd3\x68\xb7\x96\x2f\x18" "\x9b\xf0\x37\x25\x2e\x8e\x4a\x10\xea\x50\x7e\x8b\x59\x78\xe1\xe7\xe8" "\x27\x16\xe7\x76\xa8\x7b\x67\x08\xeb\xf2\x81\xd6\xbf\xf3\xdb\x10\xff" "\x1d\x8f\x14\x15\xf5\x52\xcf\xda\x6a\x66\xc6\x72\x47\x7d\xc2\x6f\x6b" "\x42\x01\x4f\x90\x69\x75\x4b\x25\xc8\x4b\x4b\x03\x39\x2f\x5b\x28\x52" "\xeb\x0c\xfb\x8a\x32\xaa\x6a\xf1\x68\x9a\x90\xe4\xa1\x44\xc7\xc3\x0d" "\x92\xe0\xdd\x1b\xca\x04\x11\x40\xe3\x26\x66\x32\xee\x64\x3a\x0b\x3f" "\x8c\xc5\x27\x90\x59\xd1\x29\x97\xe5\xc7\xab\x4e\x46\x00\x19\xf8\x96" "\x61\xe9\x79\x2e\xae\x6f\xbd\x8b\xad\x71\x9c\xcd\x3c\x10\xec\xca\x95" "\x4b\x66\x48\xad\x5c\x2f\xd7\x36\x0f\x53\x97\x8b\xec\xff\x34\x05\xc5" "\xc3\xcc\xef\xdd\x16\x00\x00\x00\x00\x27\xb3\x3e\x90\x0a\x48\x55\x76" "\x00\x56\xa6\x44\xba\x59\xae\xb4\x82\xda\x82\x5c\xbb\xfb", 388); syscall(SYS_write, r[0], 0x20000480ul, 0xffffff21ul); } int main(int argc, char** argv) { syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); program_name = argv[0]; if (argc == 2 && strcmp(argv[1], "child") == 0) child(); loop(); return 0; }