// https://syzkaller.appspot.com/bug?id=583b200c0464331b3f9cf1d67566de0834f916d6 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif uint64_t r[1] = {0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1, /*offset=*/0ul); const char* reason; (void)reason; intptr_t res = 0; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } *(uint32_t*)0x200003c0 = 1; *(uint32_t*)0x200003c4 = 5; *(uint32_t*)0x200003c8 = 2; *(uint32_t*)0x200003cc = 4; *(uint32_t*)0x200003d0 = 5; *(uint32_t*)0x200003d4 = -1; *(uint32_t*)0x200003d8 = 0; memset((void*)0x200003dc, 0, 16); *(uint32_t*)0x200003ec = 0; *(uint32_t*)0x200003f0 = -1; *(uint32_t*)0x200003f4 = 0; *(uint32_t*)0x200003f8 = 0; *(uint32_t*)0x200003fc = 0; *(uint64_t*)0x20000400 = 0; *(uint32_t*)0x20000408 = 0; *(uint32_t*)0x2000040c = 0; res = syscall(__NR_bpf, /*cmd=*/0ul, /*arg=*/0x200003c0ul, /*size=*/0x48ul); if (res != -1) r[0] = res; *(uint32_t*)0x20000180 = 0x11; *(uint32_t*)0x20000184 = 0x14; *(uint64_t*)0x20000188 = 0x20000040; memcpy((void*)0x20000040, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18" "\x11\x00\x00", 20); *(uint32_t*)0x20000054 = r[0]; memcpy((void*)0x20000058, "\x00\x00\x00\x00\x00\x00\x00\x00\xb7\x08\x00\x00\xff\x7f\x00\x00\x7b" "\x8a\xf8\xff\x00\x00\x00\x00\xbf\xa2\x00\x00\x00\x00\x00\x00\x07\x02" "\x00\x00\xf8\xff\xff\xff\xb7\x03\x00\x00\x08\x00\x00\x00\xb7\x04\x00" "\x00\x00\x00\x00\x00\x85\x00\x00\x00\x03\x00\x00\x00\x18\x01\x00\x00" "\x25\x20\x73\x25\x00\x00\x00\x00\x00\x20\x20\x20\x7b\x1a\xf8\xff\x00" "\x00\x00\x00\xbf\xa1\x00\x00\x00\x00\x00\x00\x07\x01\x00\x00\xf8\xff" "\xff\xff\xb7\x02\x00\x00\x08\x00\x00\x00\xb7\x03\x00\x00\x00\x00\x00" "\x00\x85\x00\x00\x00\x06\x00\x00\x00\x95", 129); *(uint64_t*)0x20000190 = 0x20000100; memcpy((void*)0x20000100, "GPL\000", 4); *(uint32_t*)0x20000198 = 0; *(uint32_t*)0x2000019c = 0; *(uint64_t*)0x200001a0 = 0; *(uint32_t*)0x200001a8 = 0; *(uint32_t*)0x200001ac = 0; memset((void*)0x200001b0, 0, 16); *(uint32_t*)0x200001c0 = 0; *(uint32_t*)0x200001c4 = 0; *(uint32_t*)0x200001c8 = -1; *(uint32_t*)0x200001cc = 0; *(uint64_t*)0x200001d0 = 0; *(uint32_t*)0x200001d8 = 0; *(uint32_t*)0x200001dc = 0; *(uint64_t*)0x200001e0 = 0; *(uint32_t*)0x200001e8 = 0; *(uint32_t*)0x200001ec = 0; *(uint32_t*)0x200001f0 = 0; *(uint32_t*)0x200001f4 = 0; *(uint64_t*)0x200001f8 = 0; *(uint64_t*)0x20000200 = 0; *(uint32_t*)0x20000208 = 0; *(uint32_t*)0x2000020c = 0; *(uint32_t*)0x20000210 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x20000180ul, /*size=*/0x90ul); return 0; }