// https://syzkaller.appspot.com/bug?id=dff959993aab54549f2673720bc00be19226bc01 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif uint64_t r[1] = {0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul, /*prot=*/7ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); intptr_t res = 0; *(uint32_t*)0x20000040 = 3; *(uint32_t*)0x20000044 = 4; *(uint64_t*)0x20000048 = 0x20000180; memcpy((void*)0x20000180, "\x18\x02\x00\x00\x00\x00\x00\x87\x00\x00\x00\x00\x00\x00\x00\x00\x85" "\x00\x00\x00\x53\x00\x00\x00\x95", 25); *(uint64_t*)0x20000050 = 0x20000000; memcpy((void*)0x20000000, "GPL\000", 4); *(uint32_t*)0x20000058 = 0; *(uint32_t*)0x2000005c = 0; *(uint64_t*)0x20000060 = 0; *(uint32_t*)0x20000068 = 0; *(uint32_t*)0x2000006c = 0; memset((void*)0x20000070, 0, 16); *(uint32_t*)0x20000080 = 0; *(uint32_t*)0x20000084 = 0x25; *(uint32_t*)0x20000088 = -1; *(uint32_t*)0x2000008c = 8; *(uint64_t*)0x20000090 = 0; *(uint32_t*)0x20000098 = 0; *(uint32_t*)0x2000009c = 0x10; *(uint64_t*)0x200000a0 = 0; *(uint32_t*)0x200000a8 = 0; *(uint32_t*)0x200000ac = 0; *(uint32_t*)0x200000b0 = 0; *(uint32_t*)0x200000b4 = 0; *(uint64_t*)0x200000b8 = 0; *(uint64_t*)0x200000c0 = 0; *(uint32_t*)0x200000c8 = 0x10; *(uint32_t*)0x200000cc = 0; res = syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x20000040ul, /*size=*/0x80ul); if (res != -1) r[0] = res; *(uint32_t*)0x20000080 = r[0]; *(uint32_t*)0x20000084 = 0x2a0; *(uint32_t*)0x20000088 = 0xe; *(uint32_t*)0x2000008c = 0; *(uint64_t*)0x20000090 = 0x20000200; memcpy((void*)0x20000200, "\x9e\x36\xd4\x48\xb3\x88\xdd\x96\x5f\x7a\x33\x12\x77\x9a", 14); *(uint64_t*)0x20000098 = 0; *(uint32_t*)0x200000a0 = 0x1ba6; *(uint32_t*)0x200000a4 = 0xe8030000; *(uint32_t*)0x200000a8 = 0; *(uint32_t*)0x200000ac = 0; *(uint64_t*)0x200000b0 = 0; *(uint64_t*)0x200000b8 = 0; *(uint32_t*)0x200000c0 = 0; *(uint32_t*)0x200000c4 = 0; *(uint32_t*)0x200000c8 = 0; syscall(__NR_bpf, /*cmd=*/0xaul, /*arg=*/0x20000080ul, /*size=*/0x48ul); return 0; }