// autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); const char* reason; (void)reason; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0xc (4 bytes) // ninsn: bytesize8 = 0x6 (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {e5 ff ff ff ff ff ff ff 71 11 46 00 00 00 00 // 00 85 10 00 00 02 00 00 00 85 00 00 00 2a 00 00 00 95 00 00 00 // 00 00 00 00 95 00 a5 05 00 00 00 00} (length 0x30) // } // } // } // license: ptr[in, buffer] { // buffer: {47 50 4c 00} (length 0x4) // } // loglev: int32 = 0x5 (4 bytes) // logsize: len = 0x29e (4 bytes) // log: ptr[out, buffer] { // buffer: (DirOut) // } // kern_version: bpf_kern_version = 0x0 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x0 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x6 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x10 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x10 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x70 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x200000000440 = 0xc; *(uint32_t*)0x200000000444 = 6; *(uint64_t*)0x200000000448 = 0x200000000000; memcpy((void*)0x200000000000, "\xe5\xff\xff\xff\xff\xff\xff\xff\x71\x11\x46\x00\x00\x00\x00\x00\x85" "\x10\x00\x00\x02\x00\x00\x00\x85\x00\x00\x00\x2a\x00\x00\x00\x95\x00" "\x00\x00\x00\x00\x00\x00\x95\x00\xa5\x05\x00\x00\x00\x00", 48); *(uint64_t*)0x200000000450 = 0x200000000080; memcpy((void*)0x200000000080, "GPL\000", 4); *(uint32_t*)0x200000000458 = 5; *(uint32_t*)0x20000000045c = 0x29e; *(uint64_t*)0x200000000460 = 0x20000000cf3d; *(uint32_t*)0x200000000468 = 0; *(uint32_t*)0x20000000046c = 0; memset((void*)0x200000000470, 0, 16); *(uint32_t*)0x200000000480 = 0; *(uint32_t*)0x200000000484 = 0; *(uint32_t*)0x200000000488 = -1; *(uint32_t*)0x20000000048c = 6; *(uint64_t*)0x200000000490 = 0; *(uint32_t*)0x200000000498 = 0; *(uint32_t*)0x20000000049c = 0x10; *(uint64_t*)0x2000000004a0 = 0; *(uint32_t*)0x2000000004a8 = 0; *(uint32_t*)0x2000000004ac = 0; *(uint32_t*)0x2000000004b0 = -1; *(uint32_t*)0x2000000004b4 = 0; *(uint64_t*)0x2000000004b8 = 0; *(uint64_t*)0x2000000004c0 = 0; *(uint32_t*)0x2000000004c8 = 0x10; *(uint32_t*)0x2000000004cc = 0; *(uint32_t*)0x2000000004d0 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x200000000440ul, /*size=*/0x70ul); return 0; }