blob: 8275aa72d1c13f71b093ff11be0e80058c21f5e4 [file] [log] [blame]
// KMSAN: uninit-value in aesti_encrypt
// https://syzkaller.appspot.com/bug?id=9e9babd01df34db0c4d4dbde8ca57a0380e6db0b
// status:open
// autogenerated by syzkaller (https://github.com/google/syzkaller)
#define _GNU_SOURCE
#include <endian.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <unistd.h>
uint64_t r[1] = {0xffffffffffffffff};
int main(void)
{
syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0);
intptr_t res = 0;
syscall(__NR_mmap, 0x20000000, 0xe7e000, 2, 0x31, -1, 0);
res = syscall(__NR_socket, 0xa, 1, 0);
if (res != -1)
r[0] = res;
*(uint32_t*)0x20000000 = 1;
syscall(__NR_setsockopt, r[0], 6, 0x13, 0x20000000, 4);
*(uint16_t*)0x20000100 = 0xa;
*(uint16_t*)0x20000102 = htobe16(0);
*(uint32_t*)0x20000104 = htobe32(0);
memcpy((void*)0x20000108,
"\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000",
16);
*(uint32_t*)0x20000118 = 0;
syscall(__NR_connect, r[0], 0x20000100, 0x1c);
memcpy((void*)0x20000540, "tls\000", 4);
syscall(__NR_setsockopt, r[0], 6, 0x1f, 0x20000540, 4);
*(uint16_t*)0x20000040 = 0x304;
*(uint16_t*)0x20000042 = 0x35;
memcpy((void*)0x20000044, "\x26\xe7\x14\xaf\x36\x6d\xe3\xd7", 8);
memcpy((void*)0x2000004c,
"\xd2\xbf\x8e\xa9\x6a\x10\xc1\x30\xe3\x37\x2e\x1b\xb6\x8e\xcd\xdb",
16);
memcpy((void*)0x2000005c, "\x56\x7f\x44\xf2", 4);
memcpy((void*)0x20000060, "\x8c\x0f\xb0\xeb\xef\x26\xde\x10", 8);
syscall(__NR_setsockopt, r[0], 0x11a, 1, 0x20000040, 0x28);
syscall(__NR_sendto, r[0], 0x200005c0, 0xffffffffffffff7f, 0, 0, 0xfffffd56);
return 0;
}