// https://syzkaller.appspot.com/bug?id=d08ea349b0f5568ef4245948a83eab7ce4d7ec40 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include uint64_t r[6] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul); syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul); intptr_t res = 0; res = syscall(__NR_socket, 0x10ul, 3ul, 0); if (res != -1) r[0] = res; res = syscall(__NR_socketpair, 1ul, 1ul, 0, 0x20000080ul); if (res != -1) r[1] = *(uint32_t*)0x20000084; memcpy((void*)0x20000000, "lo\000\000\000\000\000\000\000\000\000\000\000\000\000\000", 16); res = syscall(__NR_ioctl, r[1], 0x8933, 0x20000000ul); if (res != -1) r[2] = *(uint32_t*)0x20000010; *(uint64_t*)0x20000000 = 0; *(uint32_t*)0x20000008 = 0; *(uint64_t*)0x20000010 = 0x20000780; *(uint64_t*)0x20000780 = 0x20000480; memcpy((void*)0x20000480, "\x48\x00\x00\x00\x24\x00\x0b\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x60" "\x00\x00\x00", 20); *(uint32_t*)0x20000494 = r[2]; memcpy((void*)0x20000498, "\x00\x00\x00\x00\xff\xff\xff\xff\x00\x00\x00\x00\x09\x00\x01\x00\x70" "\x72\x69\x6f\x00\x00\x00\x00\x18\x00\x02\x00\x04", 29); *(uint64_t*)0x20000788 = 0x48; *(uint64_t*)0x20000018 = 1; *(uint64_t*)0x20000020 = 0; *(uint64_t*)0x20000028 = 0; *(uint32_t*)0x20000030 = 0; syscall(__NR_sendmsg, r[0], 0x20000000ul, 0ul); res = syscall(__NR_socket, 0x10ul, 3ul, 0); if (res != -1) r[3] = res; res = syscall(__NR_socket, 0x11ul, 0x800000003ul, 0); if (res != -1) r[4] = res; *(uint16_t*)0x20000080 = 0x11; memcpy((void*)0x20000082, "\x00\x00\x01\x00\x00\x00\x00\x00\x08\x00\x44\x94\x4e\xeb\xa7\x1a\x49" "\x76\xe2\x52\x92\x2c\xb1\x8f\x6e\x2e\x2a\xba\x00\x00\x00\x01\x2e\x0b" "\x38\x36\x00\x54\x04\xb0\xe0\x30\x1a\x4c\xe8\x75\xf2\xe3\xff\x5f\x16" "\x3e\xe3\x40\xb7\x67\x95\x00\x80\x00\x00\x00\x00\x00\x00\x01\x01\x01" "\x3c\x58\x11\x03\x9e\x15\x77\x50\x27\xec\xce\x66\xfd\x79\x2b\xbf\x0e" "\x5b\xf5\xff\x1b\x08\x16\xf3\xf6\xdb\x1c\x00\x01\x00\x00\x00\x00\x00" "\x00\x00\x49\x74\x00\x00\x00\x00\x00\x00\x00\x06\xad\x8e\x5e\xcc\x32" "\x6d\x3a\x09\xff\xc2\xc6\x54", 126); syscall(__NR_bind, r[4], 0x20000080ul, 0x80ul); *(uint32_t*)0x20000140 = 0x67; res = syscall(__NR_getsockname, r[4], 0x20000040ul, 0x20000140ul); if (res != -1) r[5] = *(uint32_t*)0x20000044; *(uint64_t*)0x20000340 = 0; *(uint32_t*)0x20000348 = 0; *(uint64_t*)0x20000350 = 0x20000280; *(uint64_t*)0x20000280 = 0x20000180; memcpy((void*)0x20000180, "\x84\x00\x00\x00\x2c\x00\x27\x0d\x00\x15\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00", 20); *(uint32_t*)0x20000194 = r[5]; memcpy( (void*)0x20000198, "\x00\x00\x00\x00\x00\x00\x00\x00\x08\x00\x00\x00\x08\x00\x01\x00\x75\x33" "\x32\x00\x58\x00\x02\x00\x54\x00\x05\x00\x00\x00\x04\x8b\xcb\x07\xbd\xac" "\x2e\xbd\x53\x30\x1b\x0d\x07\xb9\xa2\x40\xc2\x13\x75\xa3\xf9\x4b\x5f", 53); *(uint64_t*)0x20000288 = 0x84; *(uint64_t*)0x20000358 = 1; *(uint64_t*)0x20000360 = 0; *(uint64_t*)0x20000368 = 0; *(uint32_t*)0x20000370 = 0; syscall(__NR_sendmsg, r[3], 0x20000340ul, 0ul); return 0; }