// autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif uint64_t r[1] = {0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); const char* reason; (void)reason; intptr_t res = 0; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0xc (4 bytes) // ninsn: bytesize8 = 0x8 (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00 18 02 00 00} (length 0x14) // } // union ANYUNION { // ANYRES32: ANYRES32 (resource) // } // union ANYUNION { // ANYBLOB: buffer: {00 00 00 00 00 00 00 00 b7 03 00 00 00 00 00 // 00 85 00 00 00 0d 00 00 00 b7 00 00 00 00 00 00 00 95} (length // 0x21) // } // } // } // license: ptr[in, buffer] { // buffer: {47 50 4c 00} (length 0x4) // } // loglev: int32 = 0x0 (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x0 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x1b (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x200000000680 = 0xc; *(uint32_t*)0x200000000684 = 8; *(uint64_t*)0x200000000688 = 0x200000000d80; memcpy((void*)0x200000000d80, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18" "\x02\x00\x00", 20); *(uint32_t*)0x200000000d94 = -1; memcpy((void*)0x200000000d98, "\x00\x00\x00\x00\x00\x00\x00\x00\xb7\x03\x00\x00\x00\x00\x00\x00\x85" "\x00\x00\x00\x0d\x00\x00\x00\xb7\x00\x00\x00\x00\x00\x00\x00\x95", 33); *(uint64_t*)0x200000000690 = 0x2000000000c0; memcpy((void*)0x2000000000c0, "GPL\000", 4); *(uint32_t*)0x200000000698 = 0; *(uint32_t*)0x20000000069c = 0; *(uint64_t*)0x2000000006a0 = 0; *(uint32_t*)0x2000000006a8 = 0; *(uint32_t*)0x2000000006ac = 0; memset((void*)0x2000000006b0, 0, 16); *(uint32_t*)0x2000000006c0 = 0; *(uint32_t*)0x2000000006c4 = 0x1b; *(uint32_t*)0x2000000006c8 = 0; *(uint32_t*)0x2000000006cc = 0; *(uint64_t*)0x2000000006d0 = 0; *(uint32_t*)0x2000000006d8 = 0; *(uint32_t*)0x2000000006dc = 0; *(uint64_t*)0x2000000006e0 = 0; *(uint32_t*)0x2000000006e8 = 0; *(uint32_t*)0x2000000006ec = 0; *(uint32_t*)0x2000000006f0 = 0; *(uint32_t*)0x2000000006f4 = 0; *(uint64_t*)0x2000000006f8 = 0; *(uint64_t*)0x200000000700 = 0; *(uint32_t*)0x200000000708 = 0; *(uint32_t*)0x20000000070c = 0; *(uint32_t*)0x200000000710 = 0; res = syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x200000000680ul, /*size=*/0x94ul); if (res != -1) r[0] = res; // bpf$BPF_PROG_TEST_RUN arguments: [ // cmd: const = 0xa (8 bytes) // arg: ptr[in, bpf_test_prog_arg] { // bpf_test_prog_arg { // prog: fd_bpf_prog (resource) // retval: const = 0x3e8 (4 bytes) // insizedata: len = 0xe (4 bytes) // outsizedata: len = 0x0 (4 bytes) // indata: ptr[in, buffer] { // buffer: {c1 df 07 00 00 00 d3 0a 29 8e e6 88 65 58} (length 0xe) // } // outdata: nil // repeat: int32 = 0x3ff (4 bytes) // dur: const = 0x0 (4 bytes) // insizectx: len = 0x0 (4 bytes) // outsizectx: len = 0x0 (4 bytes) // inctx: nil // outctx: nil // flags: bpf_prog_test_run_flags = 0x4 (4 bytes) // cpu: const = 0x0 (4 bytes) // batch_size: int32 = 0x0 (4 bytes) // pad = 0x0 (4 bytes) // } // } // size: len = 0x50 (8 bytes) // ] *(uint32_t*)0x2000000003c0 = r[0]; *(uint32_t*)0x2000000003c4 = 0x3e8; *(uint32_t*)0x2000000003c8 = 0xe; *(uint32_t*)0x2000000003cc = 0; *(uint64_t*)0x2000000003d0 = 0x200000000000; memcpy((void*)0x200000000000, "\xc1\xdf\x07\x00\x00\x00\xd3\x0a\x29\x8e\xe6\x88\x65\x58", 14); *(uint64_t*)0x2000000003d8 = 0; *(uint32_t*)0x2000000003e0 = 0x3ff; *(uint32_t*)0x2000000003e4 = 0; *(uint32_t*)0x2000000003e8 = 0; *(uint32_t*)0x2000000003ec = 0; *(uint64_t*)0x2000000003f0 = 0; *(uint64_t*)0x2000000003f8 = 0; *(uint32_t*)0x200000000400 = 4; *(uint32_t*)0x200000000404 = 0; *(uint32_t*)0x200000000408 = 0; syscall(__NR_bpf, /*cmd=*/0xaul, /*arg=*/0x2000000003c0ul, /*size=*/0x50ul); return 0; }