// https://syzkaller.appspot.com/bug?id=81def6cbb5fbac9e86cb529131e43694bdaa7316 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 3ul, 0x32ul, -1, 0); intptr_t res = 0; res = syscall(__NR_socket, 0x26ul, 5ul, 0ul); if (res != -1) r[0] = res; *(uint16_t*)0x20000240 = 0x26; memcpy((void*)0x20000242, "aead\000\000\000\000\000\000\000\000\000\000", 14); *(uint32_t*)0x20000250 = 0; *(uint32_t*)0x20000254 = 0; memcpy((void*)0x20000258, "pcrypt(generic-gcm-aesni)" "\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000\000\000\000\000\000\000\000\000\000" "\000\000\000", 64); syscall(__NR_bind, r[0], 0x20000240ul, 0x58ul); res = syscall(__NR_socket, 0xaul, 1ul, 0ul); if (res != -1) r[1] = res; res = syscall(__NR_socket, 0xaul, 1ul, 0ul); if (res != -1) r[2] = res; *(uint16_t*)0x20000040 = 0xa; *(uint16_t*)0x20000042 = htobe16(0x4e22); *(uint32_t*)0x20000044 = htobe32(0); memcpy((void*)0x20000048, "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", 16); *(uint32_t*)0x20000058 = 0; syscall(__NR_bind, r[2], 0x20000040ul, 0x1cul); syscall(__NR_listen, r[2], 0); *(uint16_t*)0x20000280 = 0xa; *(uint16_t*)0x20000282 = htobe16(0x4e22); *(uint32_t*)0x20000284 = htobe32(0); *(uint64_t*)0x20000288 = htobe64(0); *(uint64_t*)0x20000290 = htobe64(1); *(uint32_t*)0x20000298 = 0; syscall(__NR_sendto, r[1], 0ul, 0ul, 0x20000004ul, 0x20000280ul, 0x1cul); memcpy((void*)0x20000080, "tls\000", 4); syscall(__NR_setsockopt, r[1], 6ul, 0x1ful, 0x20000080ul, 0x152ul); *(uint16_t*)0x20000100 = 0x303; *(uint16_t*)0x20000102 = 0x33; memcpy((void*)0x20000104, "\000\000\000\000\000\000\000\000", 8); memcpy((void*)0x2000010c, "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", 16); memcpy((void*)0x2000011c, "\x20\x04\x01\x00", 4); memcpy((void*)0x20000120, "\000\000\000\000\000\000\000\000", 8); syscall(__NR_setsockopt, r[1], 0x11aul, 1ul, 0x20000100ul, 0x28ul); syscall(__NR_sendto, r[1], 0x200005c0ul, 0xe0fffffful, 0ul, 0ul, 0xd8ul); return 0; }