// https://syzkaller.appspot.com/bug?id=81def6cbb5fbac9e86cb529131e43694bdaa7316
// autogenerated by syzkaller (https://github.com/google/syzkaller)

#define _GNU_SOURCE

#include <endian.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <unistd.h>

uint64_t r[5] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff,
                 0xffffffffffffffff, 0xffffffffffffffff};

int main(void)
{
  syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
  syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul);
  syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
  intptr_t res = 0;
  res = syscall(__NR_socket, 0x26ul, 5ul, 0);
  if (res != -1)
    r[0] = res;
  *(uint16_t*)0x20000000 = 0x26;
  memcpy((void*)0x20000002, "aead\000\000\000\000\000\000\000\000\000\000", 14);
  *(uint32_t*)0x20000010 = 0;
  *(uint32_t*)0x20000014 = 0;
  memcpy((void*)0x20000018, "pcrypt(generic-gcm-aesni)"
                            "\000\000\000\000\000\000\000\000\000\000\000\000"
                            "\000\000\000\000\000\000\000\000\000\000\000\000"
                            "\000\000\000\000\000\000\000\000\000\000\000\000"
                            "\000\000\000",
         64);
  syscall(__NR_bind, r[0], 0x20000000ul, 0x58ul);
  memcpy((void*)0x20002000, "./bus\000", 6);
  res = syscall(__NR_open, 0x20002000ul, 0x141042ul, 0ul);
  if (res != -1)
    r[1] = res;
  syscall(__NR_ftruncate, r[1], 0x2007ffful);
  memcpy((void*)0x20000140, "./bus\000", 6);
  res = syscall(__NR_open, 0x20000140ul, 0ul, 0ul);
  if (res != -1)
    r[2] = res;
  res = syscall(__NR_socket, 0xaul, 1ul, 0);
  if (res != -1)
    r[3] = res;
  *(uint16_t*)0x20000040 = 0xa;
  *(uint16_t*)0x20000042 = htobe16(0x4e22);
  *(uint32_t*)0x20000044 = htobe32(0);
  memcpy((void*)0x20000048,
         "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000",
         16);
  *(uint32_t*)0x20000058 = 0;
  syscall(__NR_bind, r[3], 0x20000040ul, 0x1cul);
  syscall(__NR_listen, r[3], 0);
  res = syscall(__NR_socket, 0xaul, 1ul, 0);
  if (res != -1)
    r[4] = res;
  *(uint16_t*)0x20000280 = 0xa;
  *(uint16_t*)0x20000282 = htobe16(0x4e22);
  *(uint32_t*)0x20000284 = htobe32(0);
  *(uint64_t*)0x20000288 = htobe64(0);
  *(uint64_t*)0x20000290 = htobe64(1);
  *(uint32_t*)0x20000298 = 0;
  syscall(__NR_sendto, r[4], 0ul, 0ul, 0x20000004ul, 0x20000280ul, 0x1cul);
  memcpy((void*)0x20000080, "tls\000", 4);
  syscall(__NR_setsockopt, r[4], 6, 0x1f, 0x20000080ul, 0x152ul);
  *(uint16_t*)0x20000100 = 0x303;
  *(uint16_t*)0x20000102 = 0x33;
  memcpy((void*)0x20000104, "\000\000\000\000\000\000\000\000", 8);
  memcpy((void*)0x2000010c,
         "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000",
         16);
  memcpy((void*)0x2000011c, "\x20\x04\x01\x00", 4);
  memcpy((void*)0x20000120, "\x06\x00\x00\x00\x00\x00\x00\x00", 8);
  syscall(__NR_setsockopt, r[4], 0x11a, 1, 0x20000100ul, 0x28ul);
  syscall(__NR_sendfile, r[4], r[2], 0ul, 0x800100020001ul);
  return 0;
}