// https://syzkaller.appspot.com/bug?id=71f1799a38fda2be91d90da3c2269736ea310ab4 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include const int kInitNetNsFd = 201; static long syz_init_net_socket(volatile long domain, volatile long type, volatile long proto) { return syscall(__NR_socket, domain, type, proto); } uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); intptr_t res = 0; syz_init_net_socket(0x24, 2, 0); syscall(__NR_socket, 0x11ul, 3ul, 0); memcpy((void*)0x20000040, "/dev/kvm\000", 9); res = syscall(__NR_openat, 0xffffffffffffff9cul, 0x20000040ul, 0ul, 0ul); if (res != -1) r[0] = res; res = syscall(__NR_ioctl, r[0], 0xae01, 0ul); if (res != -1) r[1] = res; res = syscall(__NR_ioctl, r[1], 0xae41, 0ul); if (res != -1) r[2] = res; *(uint64_t*)0x20000000 = r[2]; *(uint64_t*)0x20000008 = -1; sprintf((char*)0x20000010, "0x%016llx", (long long)-1); syscall(__NR_ioctl, r[2], 0x4048aecb, 0x20000000ul); *(uint64_t*)0x20000000 = r[2]; *(uint64_t*)0x20000008 = -1; sprintf((char*)0x20000010, "0x%016llx", (long long)-1); syscall(__NR_ioctl, r[2], 0x4048aecb, 0x20000000ul); return 0; }