// https://syzkaller.appspot.com/bug?id=4eb45dcd2b14bf4454c0d136ce3d0889b102f7ad // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include uint64_t r[4] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); intptr_t res = 0; memcpy((void*)0x20000080, "./bus\000", 6); syscall(__NR_creat, 0x20000080, 0); res = syscall(__NR_pipe, 0x20000380); if (res != -1) { r[0] = *(uint32_t*)0x20000380; r[1] = *(uint32_t*)0x20000384; } res = syscall(__NR_socket, 2, 1, 0); if (res != -1) r[2] = res; *(uint32_t*)0x20000080 = 1; syscall(__NR_setsockopt, r[2], 6, 0x10000000013, 0x20000080, 4); *(uint32_t*)0x20788ffc = 1; syscall(__NR_setsockopt, r[2], 6, 0x14, 0x20788ffc, 0xfdf6); *(uint16_t*)0x20000000 = 2; *(uint16_t*)0x20000002 = htobe16(0); *(uint8_t*)0x20000004 = 0xac; *(uint8_t*)0x20000005 = 0x14; *(uint8_t*)0x20000006 = 0x14; *(uint8_t*)0x20000007 = 0xaa; syscall(__NR_connect, r[2], 0x20000000, 0x10); memcpy((void*)0x20000100, "\xcc", 1); syscall(__NR_sendto, r[2], 0x20000100, 0xffffffffffffff3d, 0, 0, 0); syscall(__NR_splice, r[2], 0, r[1], 0, 0x11001, 0); memcpy((void*)0x20000040, "./bus\000", 6); res = syscall(__NR_open, 0x20000040, 0x8c082, 0x31); if (res != -1) r[3] = res; syscall(__NR_splice, r[0], 0, r[3], 0, 0xffffffff, 0); return 0; }