// https://syzkaller.appspot.com/bug?id=cb8a0dfeeb7bb8f7a85c587a0bb021a7c5f8ab6d // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); const char* reason; (void)reason; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } *(uint32_t*)0x2000002a0fb8 = 9; *(uint32_t*)0x2000002a0fbc = 4; *(uint64_t*)0x2000002a0fc0 = 0x2000000003c0; memcpy((void*)0x2000000003c0, "\x85\x00\x00\x00\x7a\x00\x00\x00\x15\x00\x00\x00\x00\x00\x00\x00\x45" "\x00\x00\x00\xff\xff\xff\xff\x95\x00\x00\x00\x00\x00\x00\x00", 32); *(uint64_t*)0x2000002a0fc8 = 0x200000000140; memcpy((void*)0x200000000140, "GPL\000", 4); *(uint32_t*)0x2000002a0fd0 = 4; *(uint32_t*)0x2000002a0fd4 = 0x99; *(uint64_t*)0x2000002a0fd8 = 0x200000000180; *(uint32_t*)0x2000002a0fe0 = 0; *(uint32_t*)0x2000002a0fe4 = 0; memset((void*)0x2000002a0fe8, 0, 16); *(uint32_t*)0x2000002a0ff8 = 0; *(uint32_t*)0x2000002a0ffc = 0; *(uint32_t*)0x2000002a1000 = -1; *(uint32_t*)0x2000002a1004 = 8; *(uint64_t*)0x2000002a1008 = 0; *(uint32_t*)0x2000002a1010 = 0; *(uint32_t*)0x2000002a1014 = 0x10; *(uint64_t*)0x2000002a1018 = 0; *(uint32_t*)0x2000002a1020 = 0; *(uint32_t*)0x2000002a1024 = 0; *(uint32_t*)0x2000002a1028 = -1; *(uint32_t*)0x2000002a102c = 0; *(uint64_t*)0x2000002a1030 = 0; *(uint64_t*)0x2000002a1038 = 0; *(uint32_t*)0x2000002a1040 = 0x10; *(uint32_t*)0x2000002a1044 = 0; *(uint32_t*)0x2000002a1048 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x2000002a0fb8ul, /*size=*/0x45ul); return 0; }