// https://syzkaller.appspot.com/bug?id=978ae680d1ca9607d2c5ba63b734e3012a122ac4 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif #define BITMASK(bf_off, bf_len) (((1ull << (bf_len)) - 1) << (bf_off)) #define STORE_BY_BITMASK(type, htobe, addr, val, bf_off, bf_len) \ *(type*)(addr) = \ htobe((htobe(*(type*)(addr)) & ~BITMASK((bf_off), (bf_len))) | \ (((type)(val) << (bf_off)) & BITMASK((bf_off), (bf_len)))) static long syz_open_procfs(volatile long a0, volatile long a1) { char buf[128]; memset(buf, 0, sizeof(buf)); if (a0 == 0) { snprintf(buf, sizeof(buf), "/proc/self/%s", (char*)a1); } else if (a0 == -1) { snprintf(buf, sizeof(buf), "/proc/thread-self/%s", (char*)a1); } else { snprintf(buf, sizeof(buf), "/proc/self/task/%d/%s", (int)a0, (char*)a1); } int fd = open(buf, O_RDWR); if (fd == -1) fd = open(buf, O_RDONLY); return fd; } uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); const char* reason; (void)reason; intptr_t res = 0; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x0 (4 bytes) // ninsn: bytesize8 = 0x14 (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00 18 11 00 00} (length 0x14) // } // union ANYUNION { // ANYRES32: ANYRES32 (resource) // } // union ANYUNION { // ANYBLOB: buffer: {00 00 00 00 00 00 00 00 b7 08 00 00 00 00 00 // 00 7b 8a f8 ff 00 00 00 00 bf a2 00 00 00 00 00 00 07 02 00 00 // f8 ff ff ff b7 03 00 00 08 00 00 00 b7 04 00 00 00 00 00 00 85 // 00 00 00 01 00 00 00 18 01 00 00 20 75 6c 25 00 00 00 00 00 20 // 20 20 7b 1a f8 ff 00 00 00 00 bf a1 00 00 00 00 00 00 07 01 00 // 00 f8 ff ff ff b7 02 00 00 08 00 00 00 b7 03 00 00 00 00 00 20 // 85 00 00 00 04 00 00 00 95} (length 0x81) // } // } // } // license: nil // loglev: int32 = 0x0 (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x0 (4 bytes) // flags: bpf_prog_load_flags = 0x40 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x0 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x2000000000c0 = 0; *(uint32_t*)0x2000000000c4 = 0x14; *(uint64_t*)0x2000000000c8 = 0x200000000400; memcpy((void*)0x200000000400, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18" "\x11\x00\x00", 20); *(uint32_t*)0x200000000414 = -1; memcpy((void*)0x200000000418, "\x00\x00\x00\x00\x00\x00\x00\x00\xb7\x08\x00\x00\x00\x00\x00\x00\x7b" "\x8a\xf8\xff\x00\x00\x00\x00\xbf\xa2\x00\x00\x00\x00\x00\x00\x07\x02" "\x00\x00\xf8\xff\xff\xff\xb7\x03\x00\x00\x08\x00\x00\x00\xb7\x04\x00" "\x00\x00\x00\x00\x00\x85\x00\x00\x00\x01\x00\x00\x00\x18\x01\x00\x00" "\x20\x75\x6c\x25\x00\x00\x00\x00\x00\x20\x20\x20\x7b\x1a\xf8\xff\x00" "\x00\x00\x00\xbf\xa1\x00\x00\x00\x00\x00\x00\x07\x01\x00\x00\xf8\xff" "\xff\xff\xb7\x02\x00\x00\x08\x00\x00\x00\xb7\x03\x00\x00\x00\x00\x00" "\x20\x85\x00\x00\x00\x04\x00\x00\x00\x95", 129); *(uint64_t*)0x2000000000d0 = 0; *(uint32_t*)0x2000000000d8 = 0; *(uint32_t*)0x2000000000dc = 0; *(uint64_t*)0x2000000000e0 = 0; *(uint32_t*)0x2000000000e8 = 0; *(uint32_t*)0x2000000000ec = 0x40; memset((void*)0x2000000000f0, 0, 16); *(uint32_t*)0x200000000100 = 0; *(uint32_t*)0x200000000104 = 0; *(uint32_t*)0x200000000108 = -1; *(uint32_t*)0x20000000010c = 0; *(uint64_t*)0x200000000110 = 0; *(uint32_t*)0x200000000118 = 0; *(uint32_t*)0x20000000011c = 0; *(uint64_t*)0x200000000120 = 0; *(uint32_t*)0x200000000128 = 0; *(uint32_t*)0x20000000012c = 0; *(uint32_t*)0x200000000130 = 0; *(uint32_t*)0x200000000134 = 0; *(uint64_t*)0x200000000138 = 0; *(uint64_t*)0x200000000140 = 0; *(uint32_t*)0x200000000148 = 0; *(uint32_t*)0x20000000014c = 0; *(uint32_t*)0x200000000150 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x2000000000c0ul, /*size=*/0x94ul); // perf_event_open arguments: [ // attr: ptr[in, perf_event_attr] { // perf_event_attr { // type: perf_event_type = 0x5 (4 bytes) // size: len = 0x80 (4 bytes) // config0: int8 = 0x0 (1 bytes) // config1: int8 = 0x0 (1 bytes) // config2: int8 = 0x0 (1 bytes) // config3: int8 = 0x0 (1 bytes) // config4: const = 0x0 (4 bytes) // sample_freq: int64 = 0x5 (8 bytes) // sample_type: perf_sample_type = 0x0 (8 bytes) // read_format: perf_read_format = 0x0 (8 bytes) // disabled: int64 = 0x0 (0 bytes) // inherit: int64 = 0x0 (0 bytes) // pinned: int64 = 0x0 (0 bytes) // exclusive: int64 = 0x0 (0 bytes) // exclude_user: int64 = 0x0 (0 bytes) // exclude_kernel: int64 = 0x0 (0 bytes) // exclude_hv: int64 = 0x0 (0 bytes) // exclude_idle: int64 = 0x0 (0 bytes) // mmap: int64 = 0x0 (0 bytes) // comm: int64 = 0x0 (0 bytes) // freq: int64 = 0x0 (0 bytes) // inherit_stat: int64 = 0x0 (0 bytes) // enable_on_exec: int64 = 0x0 (0 bytes) // task: int64 = 0x0 (0 bytes) // watermark: int64 = 0x0 (0 bytes) // precise_ip: int64 = 0x0 (0 bytes) // mmap_data: int64 = 0x0 (0 bytes) // sample_id_all: int64 = 0x0 (0 bytes) // exclude_host: int64 = 0x0 (0 bytes) // exclude_guest: int64 = 0x0 (0 bytes) // exclude_callchain_kernel: int64 = 0x0 (0 bytes) // exclude_callchain_user: int64 = 0x0 (0 bytes) // mmap2: int64 = 0x0 (0 bytes) // comm_exec: int64 = 0x0 (0 bytes) // use_clockid: int64 = 0x0 (0 bytes) // context_switch: int64 = 0x0 (0 bytes) // write_backward: int64 = 0x0 (0 bytes) // namespaces: int64 = 0x0 (0 bytes) // ksymbol: int64 = 0x0 (0 bytes) // bpf_event: int64 = 0x0 (0 bytes) // aux_output: int64 = 0x0 (0 bytes) // cgroup: int64 = 0x0 (0 bytes) // text_poke: int64 = 0x0 (0 bytes) // build_id: int64 = 0x0 (0 bytes) // inherit_thread: int64 = 0x0 (0 bytes) // remove_on_exec: int64 = 0x0 (0 bytes) // sigtrap: int64 = 0x0 (0 bytes) // __reserved_1: const = 0x0 (8 bytes) // wakeup_events: int32 = 0x0 (4 bytes) // bp_type: perf_bp_type = 0x3 (4 bytes) // bp_config: union perf_bp_config { // perf_bp: perf_bp { // bp_addr: ptr[out, int8] { // int8 = 0x0 (1 bytes) // } // bp_len: perf_bp_lens = 0x4 (8 bytes) // } // } // branch_sample_type: perf_branch_sample_type = 0x4044 (8 bytes) // sample_regs_user: int64 = 0x0 (8 bytes) // sample_stack_user: int32 = 0x0 (4 bytes) // clockid: clock_type = 0x0 (4 bytes) // sample_regs_intr: int64 = 0x0 (8 bytes) // aux_watermark: int32 = 0x0 (4 bytes) // sample_max_stack: int16 = 0x0 (2 bytes) // __reserved_2: const = 0x0 (2 bytes) // aux_sample_size: int32 = 0x0 (4 bytes) // __reserved_3: const = 0x0 (4 bytes) // sig_data: int64 = 0x0 (8 bytes) // } // } // pid: pid (resource) // cpu: intptr = 0xffffffffffffffff (8 bytes) // group: fd_perf (resource) // flags: perf_flags = 0xb (8 bytes) // ] // returns fd_perf *(uint32_t*)0x200000000100 = 5; *(uint32_t*)0x200000000104 = 0x80; *(uint8_t*)0x200000000108 = 0; *(uint8_t*)0x200000000109 = 0; *(uint8_t*)0x20000000010a = 0; *(uint8_t*)0x20000000010b = 0; *(uint32_t*)0x20000000010c = 0; *(uint64_t*)0x200000000110 = 5; *(uint64_t*)0x200000000118 = 0; *(uint64_t*)0x200000000120 = 0; STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 0, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 1, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 2, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 3, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 4, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 5, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 6, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 7, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 8, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 9, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 10, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 11, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 12, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 13, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 14, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 15, 2); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 17, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 18, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 19, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 20, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 21, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 22, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 23, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 24, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 25, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 26, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 27, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 28, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 29, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 30, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 31, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 32, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 33, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 34, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 35, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 36, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 37, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 38, 26); *(uint32_t*)0x200000000130 = 0; *(uint32_t*)0x200000000134 = 3; *(uint64_t*)0x200000000138 = 0x200000000300; *(uint64_t*)0x200000000140 = 4; *(uint64_t*)0x200000000148 = 0x4044; *(uint64_t*)0x200000000150 = 0; *(uint32_t*)0x200000000158 = 0; *(uint32_t*)0x20000000015c = 0; *(uint64_t*)0x200000000160 = 0; *(uint32_t*)0x200000000168 = 0; *(uint16_t*)0x20000000016c = 0; *(uint16_t*)0x20000000016e = 0; *(uint32_t*)0x200000000170 = 0; *(uint32_t*)0x200000000174 = 0; *(uint64_t*)0x200000000178 = 0; res = syscall( __NR_perf_event_open, /*attr=*/0x200000000100ul, /*pid=*/0, /*cpu=*/(intptr_t)-1, /*group=*/(intptr_t)-1, /*flags=PERF_FLAG_FD_CLOEXEC|PERF_FLAG_FD_OUTPUT|PERF_FLAG_FD_NO_GROUP*/ 0xbul); if (res != -1) r[0] = res; // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x11 (4 bytes) // ninsn: bytesize8 = 0x5 (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {18 00 00 00 fe ff ff ff 00 00 00 00 00 04 00 // 00 85 10 00 00 02 00 00 00 85 00 00 00 23 00 00 00 95 00 00 00 // 00 00 00 00} (length 0x28) // } // } // } // license: nil // loglev: int32 = 0xfffffffe (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x727c45cd4283345 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x4 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x2000000000c0 = 0x11; *(uint32_t*)0x2000000000c4 = 5; *(uint64_t*)0x2000000000c8 = 0x200000000440; memcpy((void*)0x200000000440, "\x18\x00\x00\x00\xfe\xff\xff\xff\x00\x00\x00\x00\x00\x04\x00\x00\x85" "\x10\x00\x00\x02\x00\x00\x00\x85\x00\x00\x00\x23\x00\x00\x00\x95\x00" "\x00\x00\x00\x00\x00\x00", 40); *(uint64_t*)0x2000000000d0 = 0; *(uint32_t*)0x2000000000d8 = 0xfffffffe; *(uint32_t*)0x2000000000dc = 0; *(uint64_t*)0x2000000000e0 = 0; *(uint32_t*)0x2000000000e8 = 0xd4283345; *(uint32_t*)0x2000000000ec = 0; memset((void*)0x2000000000f0, 0, 16); *(uint32_t*)0x200000000100 = 0; *(uint32_t*)0x200000000104 = 4; *(uint32_t*)0x200000000108 = -1; *(uint32_t*)0x20000000010c = 0; *(uint64_t*)0x200000000110 = 0; *(uint32_t*)0x200000000118 = 0; *(uint32_t*)0x20000000011c = 0; *(uint64_t*)0x200000000120 = 0; *(uint32_t*)0x200000000128 = 0; *(uint32_t*)0x20000000012c = 0; *(uint32_t*)0x200000000130 = 0; *(uint32_t*)0x200000000134 = 0; *(uint64_t*)0x200000000138 = 0; *(uint64_t*)0x200000000140 = 0; *(uint32_t*)0x200000000148 = 0; *(uint32_t*)0x20000000014c = 0; *(uint32_t*)0x200000000150 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x2000000000c0ul, /*size=*/0x94ul); // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x7 (4 bytes) // ninsn: bytesize8 = 0xc (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // } // } // license: ptr[in, buffer] { // buffer: {47 50 4c 00} (length 0x4) // } // loglev: int32 = 0x0 (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x40f00 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x24 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x2000000005c0 = 7; *(uint32_t*)0x2000000005c4 = 0xc; *(uint64_t*)0x2000000005c8 = 0x200000000440; *(uint64_t*)0x2000000005d0 = 0x200000000240; memcpy((void*)0x200000000240, "GPL\000", 4); *(uint32_t*)0x2000000005d8 = 0; *(uint32_t*)0x2000000005dc = 0; *(uint64_t*)0x2000000005e0 = 0; *(uint32_t*)0x2000000005e8 = 0x40f00; *(uint32_t*)0x2000000005ec = 0; memset((void*)0x2000000005f0, 0, 16); *(uint32_t*)0x200000000600 = 0; *(uint32_t*)0x200000000604 = 0x24; *(uint32_t*)0x200000000608 = -1; *(uint32_t*)0x20000000060c = 0; *(uint64_t*)0x200000000610 = 0; *(uint32_t*)0x200000000618 = 0; *(uint32_t*)0x20000000061c = 0; *(uint64_t*)0x200000000620 = 0; *(uint32_t*)0x200000000628 = 0; *(uint32_t*)0x20000000062c = 0; *(uint32_t*)0x200000000630 = 0; *(uint32_t*)0x200000000634 = 0; *(uint64_t*)0x200000000638 = 0; *(uint64_t*)0x200000000640 = 0; *(uint32_t*)0x200000000648 = 0; *(uint32_t*)0x20000000064c = 0; *(uint32_t*)0x200000000650 = 0; res = syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x2000000005c0ul, /*size=*/0x94ul); if (res != -1) r[1] = res; // ioctl$PERF_EVENT_IOC_SET_BPF arguments: [ // fd: fd_perf (resource) // cmd: const = 0x40042408 (4 bytes) // prog: fd_bpf_prog (resource) // ] syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x40042408, /*prog=*/r[1]); // syz_open_procfs$namespace arguments: [ // pid: pid (resource) // file: ptr[in, buffer] { // buffer: {6e 73 2f 69 70 63 00} (length 0x7) // } // ] // returns fd_namespace memcpy((void*)0x200000000300, "ns/ipc\000", 7); syz_open_procfs(/*pid=*/0, /*file=*/0x200000000300); // bpf$BPF_PROG_TEST_RUN arguments: [ // cmd: const = 0x1c (8 bytes) // arg: ptr[in, bpf_test_prog_arg] { // bpf_test_prog_arg { // prog: fd_bpf_prog (resource) // retval: const = 0x4 (4 bytes) // insizedata: len = 0x29 (4 bytes) // outsizedata: len = 0x0 (4 bytes) // indata: nil // outdata: nil // repeat: int32 = 0x0 (4 bytes) // dur: const = 0x0 (4 bytes) // insizectx: len = 0x0 (4 bytes) // outsizectx: len = 0x0 (4 bytes) // inctx: nil // outctx: nil // flags: bpf_prog_test_run_flags = 0x0 (4 bytes) // cpu: const = 0x0 (4 bytes) // batch_size: int32 = 0x0 (4 bytes) // pad = 0x0 (4 bytes) // } // } // size: len = 0x50 (8 bytes) // ] *(uint32_t*)0x2000000002c0 = -1; *(uint32_t*)0x2000000002c4 = 4; *(uint32_t*)0x2000000002c8 = 0x29; *(uint32_t*)0x2000000002cc = 0; *(uint64_t*)0x2000000002d0 = 0; *(uint64_t*)0x2000000002d8 = 0; *(uint32_t*)0x2000000002e0 = 0; *(uint32_t*)0x2000000002e4 = 0; *(uint32_t*)0x2000000002e8 = 0; *(uint32_t*)0x2000000002ec = 0; *(uint64_t*)0x2000000002f0 = 0; *(uint64_t*)0x2000000002f8 = 0; *(uint32_t*)0x200000000300 = 0; *(uint32_t*)0x200000000304 = 0; *(uint32_t*)0x200000000308 = 0; syscall(__NR_bpf, /*cmd=*/0x1cul, /*arg=*/0x2000000002c0ul, /*size=*/0x50ul); return 0; }