// https://syzkaller.appspot.com/bug?id=8f063539d4ecf1faf3132624b57a641e923ee25a // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); long res = 0; *(uint32_t*)0x20000440 = 0; *(uint16_t*)0x20000448 = 0xa; *(uint16_t*)0x2000044a = htobe16(0x4e22); *(uint32_t*)0x2000044c = 0; *(uint8_t*)0x20000450 = -1; *(uint8_t*)0x20000451 = 1; *(uint8_t*)0x20000452 = 0; *(uint8_t*)0x20000453 = 0; *(uint8_t*)0x20000454 = 0; *(uint8_t*)0x20000455 = 0; *(uint8_t*)0x20000456 = 0; *(uint8_t*)0x20000457 = 0; *(uint8_t*)0x20000458 = 0; *(uint8_t*)0x20000459 = 0; *(uint8_t*)0x2000045a = 0; *(uint8_t*)0x2000045b = 0; *(uint8_t*)0x2000045c = 0; *(uint8_t*)0x2000045d = 0; *(uint8_t*)0x2000045e = 0; *(uint8_t*)0x2000045f = 1; *(uint32_t*)0x20000460 = 0xfff; *(uint16_t*)0x200004c8 = 0; *(uint16_t*)0x200004ca = 0xc62; syscall(__NR_setsockopt, -1, 0x84, 0x1f, 0x20000440, 0x90); memcpy((void*)0x200000c0, "/dev/kvm", 9); res = syscall(__NR_openat, 0xffffffffffffff9c, 0x200000c0, 0, 0); if (res != -1) r[0] = res; res = syscall(__NR_ioctl, r[0], 0xae01, 0); if (res != -1) r[1] = res; res = syscall(__NR_ioctl, r[1], 0xae41, 0); if (res != -1) r[2] = res; syscall(__NR_ioctl, r[2], 0x4080aebf, 0x20000100); return 0; }