| // KMSAN: uninit-value in aesti_encrypt |
| // https://syzkaller.appspot.com/bug?id=9e9babd01df34db0c4d4dbde8ca57a0380e6db0b |
| // status:open |
| // autogenerated by syzkaller (https://github.com/google/syzkaller) |
| |
| #define _GNU_SOURCE |
| |
| #include <endian.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <unistd.h> |
| |
| uint64_t r[1] = {0xffffffffffffffff}; |
| |
| int main(void) |
| { |
| syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); |
| intptr_t res = 0; |
| syscall(__NR_mmap, 0x20000000, 0xe7e000, 2, 0x31, -1, 0); |
| res = syscall(__NR_socket, 0xa, 1, 0); |
| if (res != -1) |
| r[0] = res; |
| *(uint32_t*)0x20000000 = 1; |
| syscall(__NR_setsockopt, r[0], 6, 0x13, 0x20000000, 4); |
| *(uint16_t*)0x20000100 = 0xa; |
| *(uint16_t*)0x20000102 = htobe16(0); |
| *(uint32_t*)0x20000104 = htobe32(0); |
| memcpy((void*)0x20000108, |
| "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000", |
| 16); |
| *(uint32_t*)0x20000118 = 0; |
| syscall(__NR_connect, r[0], 0x20000100, 0x1c); |
| memcpy((void*)0x20000540, "tls\000", 4); |
| syscall(__NR_setsockopt, r[0], 6, 0x1f, 0x20000540, 4); |
| *(uint16_t*)0x20000040 = 0x304; |
| *(uint16_t*)0x20000042 = 0x35; |
| memcpy((void*)0x20000044, "\x26\xe7\x14\xaf\x36\x6d\xe3\xd7", 8); |
| memcpy((void*)0x2000004c, |
| "\xd2\xbf\x8e\xa9\x6a\x10\xc1\x30\xe3\x37\x2e\x1b\xb6\x8e\xcd\xdb", |
| 16); |
| memcpy((void*)0x2000005c, "\x56\x7f\x44\xf2", 4); |
| memcpy((void*)0x20000060, "\x8c\x0f\xb0\xeb\xef\x26\xde\x10", 8); |
| syscall(__NR_setsockopt, r[0], 0x11a, 1, 0x20000040, 0x28); |
| syscall(__NR_sendto, r[0], 0x200005c0, 0xffffffffffffff7f, 0, 0, 0xfffffd56); |
| return 0; |
| } |