// https://syzkaller.appspot.com/bug?id=2f153eeca30bc5836e7d646964dcc31e4a093897 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif uint64_t r[1] = {0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul, /*prot=*/7ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=*/0x32ul, /*fd=*/-1, /*offset=*/0ul); intptr_t res = 0; *(uint32_t*)0x20000100 = 6; *(uint32_t*)0x20000104 = 4; *(uint64_t*)0x20000108 = 0x20000200; memcpy((void*)0x20000200, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x85" "\x00\x00\x00\x76\x00\x00\x00\x95", 25); *(uint64_t*)0x20000110 = 0x200001c0; memcpy((void*)0x200001c0, "GPL\000", 4); *(uint32_t*)0x20000118 = 0; *(uint32_t*)0x2000011c = 0; *(uint64_t*)0x20000120 = 0; *(uint32_t*)0x20000128 = 0; *(uint32_t*)0x2000012c = 0; memset((void*)0x20000130, 0, 16); *(uint32_t*)0x20000140 = 0; *(uint32_t*)0x20000144 = 0; *(uint32_t*)0x20000148 = 0; *(uint32_t*)0x2000014c = 0; *(uint64_t*)0x20000150 = 0; *(uint32_t*)0x20000158 = 0; *(uint32_t*)0x2000015c = 0; *(uint64_t*)0x20000160 = 0; *(uint32_t*)0x20000168 = 0; *(uint32_t*)0x2000016c = 0; *(uint32_t*)0x20000170 = 0; *(uint32_t*)0x20000174 = 0; *(uint64_t*)0x20000178 = 0; *(uint64_t*)0x20000180 = 0; *(uint32_t*)0x20000188 = 0x10; *(uint32_t*)0x2000018c = 0; res = syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x20000100ul, /*size=*/0x80ul); if (res != -1) r[0] = res; *(uint32_t*)0x20000340 = r[0]; *(uint32_t*)0x20000344 = 0x2000000; *(uint32_t*)0x20000348 = 0; *(uint32_t*)0x2000034c = 0; *(uint64_t*)0x20000350 = 0; *(uint64_t*)0x20000358 = 0; *(uint32_t*)0x20000360 = 0; *(uint32_t*)0x20000364 = 0; *(uint32_t*)0x20000368 = 0; *(uint32_t*)0x2000036c = 0; *(uint64_t*)0x20000370 = 0; *(uint64_t*)0x20000378 = 0; *(uint32_t*)0x20000380 = 2; *(uint32_t*)0x20000384 = 0; *(uint32_t*)0x20000388 = 0; syscall(__NR_bpf, /*cmd=*/0xaul, /*arg=*/0x20000340ul, /*size=*/0x48ul); return 0; }