// https://syzkaller.appspot.com/bug?id=01383b29d139cf9c9f9d9bd6e9947474ffe657a6 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include uint64_t r[1] = {0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul, /*prot=*/7ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); intptr_t res = 0; syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0xa000ul, /*prot=*/6ul, /*flags=*/0x2172ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mremap, /*addr=*/0x20005000ul, /*len=*/0x4000ul, /*newlen=*/0x1000ul, /*flags=*/0ul, /*newaddr=*/0x20003000ul); res = syscall(__NR_pipe, /*pipefd=*/0x20000080ul); if (res != -1) r[0] = *(uint32_t*)0x20000084; *(uint64_t*)0x200000c0 = 0x20000180; memcpy((void*)0x20000180, "\x77\x69\x0a\xdd\xcf\xbe\x1f\xbb\x66\xec", 10); *(uint64_t*)0x200000c8 = 0xff3b; syscall(__NR_vmsplice, /*fd=*/r[0], /*vec=*/0x200000c0ul, /*vlen=*/1ul, /*f=*/1ul); return 0; }