// https://syzkaller.appspot.com/bug?id=5f8b10dadfd89722989607c79fcfdb0df30c4d01 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif #define BITMASK(bf_off, bf_len) (((1ull << (bf_len)) - 1) << (bf_off)) #define STORE_BY_BITMASK(type, htobe, addr, val, bf_off, bf_len) \ *(type*)(addr) = \ htobe((htobe(*(type*)(addr)) & ~BITMASK((bf_off), (bf_len))) | \ (((type)(val) << (bf_off)) & BITMASK((bf_off), (bf_len)))) static long syz_open_procfs(volatile long a0, volatile long a1) { char buf[128]; memset(buf, 0, sizeof(buf)); if (a0 == 0) { snprintf(buf, sizeof(buf), "/proc/self/%s", (char*)a1); } else if (a0 == -1) { snprintf(buf, sizeof(buf), "/proc/thread-self/%s", (char*)a1); } else { snprintf(buf, sizeof(buf), "/proc/self/task/%d/%s", (int)a0, (char*)a1); } int fd = open(buf, O_RDWR); if (fd == -1) fd = open(buf, O_RDONLY); return fd; } uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); const char* reason; (void)reason; intptr_t res = 0; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x0 (4 bytes) // ninsn: bytesize8 = 0xc (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00 85 00 00 00 75 00 00 00 18 01 00 00 20 64 6c 25 00 00 00 00 // 00 20 20 20 7b 1a f8 ff 00 00 00 00 bf a1 00 00 00 00 00 00 07 // 01 00 00 f8 ff ff ff b7 02 00 00 08 00 00 00 b7 03 00 00 00 00 // 00 00 85 00 00 00 0e 00 00 00 95} (length 0x59) // } // } // } // license: nil // loglev: int32 = 0xfffffffe (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x0 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x0 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x2000000000c0 = 0; *(uint32_t*)0x2000000000c4 = 0xc; *(uint64_t*)0x2000000000c8 = 0x200000000440; memcpy( (void*)0x200000000440, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x85\x00" "\x00\x00\x75\x00\x00\x00\x18\x01\x00\x00\x20\x64\x6c\x25\x00\x00\x00\x00" "\x00\x20\x20\x20\x7b\x1a\xf8\xff\x00\x00\x00\x00\xbf\xa1\x00\x00\x00\x00" "\x00\x00\x07\x01\x00\x00\xf8\xff\xff\xff\xb7\x02\x00\x00\x08\x00\x00\x00" "\xb7\x03\x00\x00\x00\x00\x00\x00\x85\x00\x00\x00\x0e\x00\x00\x00\x95", 89); *(uint64_t*)0x2000000000d0 = 0; *(uint32_t*)0x2000000000d8 = 0xfffffffe; *(uint32_t*)0x2000000000dc = 0; *(uint64_t*)0x2000000000e0 = 0; *(uint32_t*)0x2000000000e8 = 0; *(uint32_t*)0x2000000000ec = 0; memset((void*)0x2000000000f0, 0, 16); *(uint32_t*)0x200000000100 = 0; *(uint32_t*)0x200000000104 = 0; *(uint32_t*)0x200000000108 = -1; *(uint32_t*)0x20000000010c = 0; *(uint64_t*)0x200000000110 = 0; *(uint32_t*)0x200000000118 = 0; *(uint32_t*)0x20000000011c = 0; *(uint64_t*)0x200000000120 = 0; *(uint32_t*)0x200000000128 = 0; *(uint32_t*)0x20000000012c = 0; *(uint32_t*)0x200000000130 = -1; *(uint32_t*)0x200000000134 = 0; *(uint64_t*)0x200000000138 = 0; *(uint64_t*)0x200000000140 = 0; *(uint32_t*)0x200000000148 = 0; *(uint32_t*)0x20000000014c = 0; *(uint32_t*)0x200000000150 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x2000000000c0ul, /*size=*/0x94ul); // perf_event_open arguments: [ // attr: ptr[in, perf_event_attr] { // perf_event_attr { // type: perf_event_type = 0x5 (4 bytes) // size: len = 0x80 (4 bytes) // config0: int8 = 0x0 (1 bytes) // config1: int8 = 0x0 (1 bytes) // config2: int8 = 0x1 (1 bytes) // config3: int8 = 0x0 (1 bytes) // config4: const = 0x0 (4 bytes) // sample_freq: int64 = 0x10000005 (8 bytes) // sample_type: perf_sample_type = 0x5a4 (8 bytes) // read_format: perf_read_format = 0x0 (8 bytes) // disabled: int64 = 0x0 (0 bytes) // inherit: int64 = 0x0 (0 bytes) // pinned: int64 = 0x0 (0 bytes) // exclusive: int64 = 0x0 (0 bytes) // exclude_user: int64 = 0x0 (0 bytes) // exclude_kernel: int64 = 0x0 (0 bytes) // exclude_hv: int64 = 0x0 (0 bytes) // exclude_idle: int64 = 0x0 (0 bytes) // mmap: int64 = 0x0 (0 bytes) // comm: int64 = 0x0 (0 bytes) // freq: int64 = 0x0 (0 bytes) // inherit_stat: int64 = 0x0 (0 bytes) // enable_on_exec: int64 = 0x0 (0 bytes) // task: int64 = 0x0 (0 bytes) // watermark: int64 = 0x0 (0 bytes) // precise_ip: int64 = 0x0 (0 bytes) // mmap_data: int64 = 0x0 (0 bytes) // sample_id_all: int64 = 0x0 (0 bytes) // exclude_host: int64 = 0x0 (0 bytes) // exclude_guest: int64 = 0x0 (0 bytes) // exclude_callchain_kernel: int64 = 0x0 (0 bytes) // exclude_callchain_user: int64 = 0x0 (0 bytes) // mmap2: int64 = 0x0 (0 bytes) // comm_exec: int64 = 0x0 (0 bytes) // use_clockid: int64 = 0x0 (0 bytes) // context_switch: int64 = 0x0 (0 bytes) // write_backward: int64 = 0x0 (0 bytes) // namespaces: int64 = 0x0 (0 bytes) // ksymbol: int64 = 0x0 (0 bytes) // bpf_event: int64 = 0x0 (0 bytes) // aux_output: int64 = 0x0 (0 bytes) // cgroup: int64 = 0x0 (0 bytes) // text_poke: int64 = 0x0 (0 bytes) // build_id: int64 = 0x0 (0 bytes) // inherit_thread: int64 = 0x0 (0 bytes) // remove_on_exec: int64 = 0x0 (0 bytes) // sigtrap: int64 = 0x0 (0 bytes) // __reserved_1: const = 0x0 (8 bytes) // wakeup_events: int32 = 0x0 (4 bytes) // bp_type: perf_bp_type = 0x3 (4 bytes) // bp_config: union perf_bp_config { // perf_bp: perf_bp { // bp_addr: ptr[out, int8] { // int8 = 0x0 (1 bytes) // } // bp_len: perf_bp_lens = 0x4 (8 bytes) // } // } // branch_sample_type: perf_branch_sample_type = 0x11540 (8 bytes) // sample_regs_user: int64 = 0x0 (8 bytes) // sample_stack_user: int32 = 0x0 (4 bytes) // clockid: clock_type = 0x0 (4 bytes) // sample_regs_intr: int64 = 0x0 (8 bytes) // aux_watermark: int32 = 0x0 (4 bytes) // sample_max_stack: int16 = 0x0 (2 bytes) // __reserved_2: const = 0x0 (2 bytes) // aux_sample_size: int32 = 0x0 (4 bytes) // __reserved_3: const = 0x0 (4 bytes) // sig_data: int64 = 0x2 (8 bytes) // } // } // pid: pid (resource) // cpu: intptr = 0xffffffffffffffff (8 bytes) // group: fd_perf (resource) // flags: perf_flags = 0xb (8 bytes) // ] // returns fd_perf *(uint32_t*)0x200000000100 = 5; *(uint32_t*)0x200000000104 = 0x80; *(uint8_t*)0x200000000108 = 0; *(uint8_t*)0x200000000109 = 0; *(uint8_t*)0x20000000010a = 1; *(uint8_t*)0x20000000010b = 0; *(uint32_t*)0x20000000010c = 0; *(uint64_t*)0x200000000110 = 0x10000005; *(uint64_t*)0x200000000118 = 0x5a4; *(uint64_t*)0x200000000120 = 0; STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 0, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 1, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 2, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 3, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 4, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 5, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 6, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 7, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 8, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 9, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 10, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 11, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 12, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 13, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 14, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 15, 2); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 17, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 18, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 19, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 20, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 21, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 22, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 23, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 24, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 25, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 26, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 27, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 28, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 29, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 30, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 31, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 32, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 33, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 34, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 35, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 36, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 37, 1); STORE_BY_BITMASK(uint64_t, , 0x200000000128, 0, 38, 26); *(uint32_t*)0x200000000130 = 0; *(uint32_t*)0x200000000134 = 3; *(uint64_t*)0x200000000138 = 0x200000000300; *(uint64_t*)0x200000000140 = 4; *(uint64_t*)0x200000000148 = 0x11540; *(uint64_t*)0x200000000150 = 0; *(uint32_t*)0x200000000158 = 0; *(uint32_t*)0x20000000015c = 0; *(uint64_t*)0x200000000160 = 0; *(uint32_t*)0x200000000168 = 0; *(uint16_t*)0x20000000016c = 0; *(uint16_t*)0x20000000016e = 0; *(uint32_t*)0x200000000170 = 0; *(uint32_t*)0x200000000174 = 0; *(uint64_t*)0x200000000178 = 2; res = syscall( __NR_perf_event_open, /*attr=*/0x200000000100ul, /*pid=*/0, /*cpu=*/(intptr_t)-1, /*group=*/(intptr_t)-1, /*flags=PERF_FLAG_FD_CLOEXEC|PERF_FLAG_FD_OUTPUT|PERF_FLAG_FD_NO_GROUP*/ 0xbul); for (int i = 0; i < 32; i++) { syscall( __NR_perf_event_open, /*attr=*/0x200000000100ul, /*pid=*/0, /*cpu=*/(intptr_t)-1, /*group=*/(intptr_t)-1, /*flags=PERF_FLAG_FD_CLOEXEC|PERF_FLAG_FD_OUTPUT|PERF_FLAG_FD_NO_GROUP*/ 0xbul); } if (res != -1) r[0] = res; // bpf$MAP_CREATE arguments: [ // cmd: const = 0x0 (8 bytes) // arg: ptr[in, bpf_map_create_arg] { // union bpf_map_create_arg { // base: bpf_map_create_arg_t[flags[bpf_map_type, int32], int32, int32, // int32, flags[map_flags, int32], const[0, int64]] { // type: bpf_map_type = 0x7 (4 bytes) // ksize: int32 = 0x4 (4 bytes) // vsize: int32 = 0x18 (4 bytes) // max: int32 = 0x1 (4 bytes) // flags: map_flags = 0x0 (4 bytes) // inner: fd_bpf_map (resource) // node: int32 = 0x0 (4 bytes) // map_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00} (length 0x10) map_ifindex: ifindex (resource) btf_fd: fd_btf // (resource) btf_key_type_id: int32 = 0x0 (4 bytes) // btf_value_type_id: int32 = 0x0 (4 bytes) // btf_vmlinux_type_id: int32 = 0x0 (4 bytes) // map_extra: const = 0x0 (8 bytes) // value_type_btf_obj_fd: union // _bpf_map_create_arg_t[flags[bpf_map_type, int32], int32, int32, // int32, flags[map_flags, int32], const[0, // int64]]_value_type_btf_obj_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad1: union _bpf_map_create_arg_t[flags[bpf_map_type, int32], // int32, int32, int32, flags[map_flags, int32], const[0, // int64]]_pad1_wrapper { // value: const = 0x0 (4 bytes) // } // map_token_fd: union _bpf_map_create_arg_t[flags[bpf_map_type, // int32], int32, int32, int32, flags[map_flags, int32], const[0, // int64]]_map_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad2: union _bpf_map_create_arg_t[flags[bpf_map_type, int32], // int32, int32, int32, flags[map_flags, int32], const[0, // int64]]_pad2_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // } // size: len = 0x50 (8 bytes) // ] // returns fd_bpf_map *(uint32_t*)0x200000000280 = 7; *(uint32_t*)0x200000000284 = 4; *(uint32_t*)0x200000000288 = 0x18; *(uint32_t*)0x20000000028c = 1; *(uint32_t*)0x200000000290 = 0; *(uint32_t*)0x200000000294 = -1; *(uint32_t*)0x200000000298 = 0; memset((void*)0x20000000029c, 0, 16); *(uint32_t*)0x2000000002ac = 0; *(uint32_t*)0x2000000002b0 = -1; *(uint32_t*)0x2000000002b4 = 0; *(uint32_t*)0x2000000002b8 = 0; *(uint32_t*)0x2000000002bc = 0; *(uint64_t*)0x2000000002c0 = 0; *(uint32_t*)0x2000000002c8 = 0; *(uint32_t*)0x2000000002cc = 0; res = syscall(__NR_bpf, /*cmd=*/0ul, /*arg=*/0x200000000280ul, /*size=*/0x50ul); if (res != -1) r[1] = res; // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x11 (4 bytes) // ninsn: bytesize8 = 0x9 (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {18 00 00 00 00 00 00 01 00 00 00 00 00 00 00 // 00 18 12 00 00} (length 0x14) // } // union ANYUNION { // ANYRES32: ANYRES32 (resource) // } // union ANYUNION { // ANYBLOB: buffer: {00 00 00 00 00 00 00 00 b7 03 00 00 00 00 00 // 00 85 00 00 00 1b} (length 0x15) // } // } // } // license: nil // loglev: int32 = 0x0 (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x41000 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x0 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x200000000680 = 0x11; *(uint32_t*)0x200000000684 = 9; *(uint64_t*)0x200000000688 = 0x200000000440; memcpy((void*)0x200000000440, "\x18\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x18" "\x12\x00\x00", 20); *(uint32_t*)0x200000000454 = r[1]; memcpy((void*)0x200000000458, "\x00\x00\x00\x00\x00\x00\x00\x00\xb7\x03\x00\x00\x00\x00\x00\x00\x85" "\x00\x00\x00\x1b", 21); *(uint64_t*)0x200000000690 = 0; *(uint32_t*)0x200000000698 = 0; *(uint32_t*)0x20000000069c = 0; *(uint64_t*)0x2000000006a0 = 0; *(uint32_t*)0x2000000006a8 = 0x41000; *(uint32_t*)0x2000000006ac = 0; memset((void*)0x2000000006b0, 0, 16); *(uint32_t*)0x2000000006c0 = 0; *(uint32_t*)0x2000000006c4 = 0; *(uint32_t*)0x2000000006c8 = 0; *(uint32_t*)0x2000000006cc = 0; *(uint64_t*)0x2000000006d0 = 0; *(uint32_t*)0x2000000006d8 = 0; *(uint32_t*)0x2000000006dc = 0; *(uint64_t*)0x2000000006e0 = 0; *(uint32_t*)0x2000000006e8 = 0; *(uint32_t*)0x2000000006ec = 0; *(uint32_t*)0x2000000006f0 = 0; *(uint32_t*)0x2000000006f4 = 0; *(uint64_t*)0x2000000006f8 = 0; *(uint64_t*)0x200000000700 = 0; *(uint32_t*)0x200000000708 = 0; *(uint32_t*)0x20000000070c = 0; *(uint32_t*)0x200000000710 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x200000000680ul, /*size=*/0x94ul); // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x7 (4 bytes) // ninsn: bytesize8 = 0xc (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // } // } // license: ptr[in, buffer] { // buffer: {47 50 4c 00} (length 0x4) // } // loglev: int32 = 0x0 (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x0 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x24 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x2000000005c0 = 7; *(uint32_t*)0x2000000005c4 = 0xc; *(uint64_t*)0x2000000005c8 = 0x200000000440; *(uint64_t*)0x2000000005d0 = 0x200000000240; memcpy((void*)0x200000000240, "GPL\000", 4); *(uint32_t*)0x2000000005d8 = 0; *(uint32_t*)0x2000000005dc = 0; *(uint64_t*)0x2000000005e0 = 0; *(uint32_t*)0x2000000005e8 = 0; *(uint32_t*)0x2000000005ec = 0; memset((void*)0x2000000005f0, 0, 16); *(uint32_t*)0x200000000600 = 0; *(uint32_t*)0x200000000604 = 0x24; *(uint32_t*)0x200000000608 = -1; *(uint32_t*)0x20000000060c = 0; *(uint64_t*)0x200000000610 = 0; *(uint32_t*)0x200000000618 = 0; *(uint32_t*)0x20000000061c = 0; *(uint64_t*)0x200000000620 = 0; *(uint32_t*)0x200000000628 = 0; *(uint32_t*)0x20000000062c = 0; *(uint32_t*)0x200000000630 = 0; *(uint32_t*)0x200000000634 = 0; *(uint64_t*)0x200000000638 = 0; *(uint64_t*)0x200000000640 = 0; *(uint32_t*)0x200000000648 = 0; *(uint32_t*)0x20000000064c = 0; *(uint32_t*)0x200000000650 = 0; res = syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x2000000005c0ul, /*size=*/0x94ul); if (res != -1) r[2] = res; // ioctl$PERF_EVENT_IOC_SET_BPF arguments: [ // fd: fd_perf (resource) // cmd: const = 0x40042408 (4 bytes) // prog: fd_bpf_prog (resource) // ] syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x40042408, /*prog=*/r[2]); // syz_open_procfs$namespace arguments: [ // pid: pid (resource) // file: ptr[in, buffer] { // buffer: {6e 73 2f 69 70 63 00} (length 0x7) // } // ] // returns fd_namespace memcpy((void*)0x200000000300, "ns/ipc\000", 7); syz_open_procfs(/*pid=*/0, /*file=*/0x200000000300); return 0; }