// https://syzkaller.appspot.com/bug?id=5f8b10dadfd89722989607c79fcfdb0df30c4d01 // autogenerated by syzkaller (https://github.com/google/syzkaller) #define _GNU_SOURCE #include #include #include #include #include #include #include #include #ifndef __NR_bpf #define __NR_bpf 321 #endif #define BITMASK(bf_off, bf_len) (((1ull << (bf_len)) - 1) << (bf_off)) #define STORE_BY_BITMASK(type, htobe, addr, val, bf_off, bf_len) \ *(type*)(addr) = \ htobe((htobe(*(type*)(addr)) & ~BITMASK((bf_off), (bf_len))) | \ (((type)(val) << (bf_off)) & BITMASK((bf_off), (bf_len)))) uint64_t r[4] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}; int main(void) { syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul, /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul, /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/(intptr_t)-1, /*offset=*/0ul); const char* reason; (void)reason; intptr_t res = 0; if (write(1, "executing program\n", sizeof("executing program\n") - 1)) { } // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x0 (4 bytes) // ninsn: bytesize8 = 0xc (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00 85 00 00 00 75 00 00 00 18 01 00 00 20 64 6c 25 00 00 00 00 // 00 20 20 20 7b 1a f8 ff 00 00 00 00 bf a1 00 00 00 00 00 00 07 // 01 00 00 f8 ff ff ff b7 02 00 00 08 00 00 00 b7 03 00 00 00 00 // 00 00 85 00 00 00 0e 00 00 00 95} (length 0x59) // } // } // } // license: nil // loglev: int32 = 0xfffffffe (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x0 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x0 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x2000000000c0 = 0; *(uint32_t*)0x2000000000c4 = 0xc; *(uint64_t*)0x2000000000c8 = 0x200000000440; memcpy( (void*)0x200000000440, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x85\x00" "\x00\x00\x75\x00\x00\x00\x18\x01\x00\x00\x20\x64\x6c\x25\x00\x00\x00\x00" "\x00\x20\x20\x20\x7b\x1a\xf8\xff\x00\x00\x00\x00\xbf\xa1\x00\x00\x00\x00" "\x00\x00\x07\x01\x00\x00\xf8\xff\xff\xff\xb7\x02\x00\x00\x08\x00\x00\x00" "\xb7\x03\x00\x00\x00\x00\x00\x00\x85\x00\x00\x00\x0e\x00\x00\x00\x95", 89); *(uint64_t*)0x2000000000d0 = 0; *(uint32_t*)0x2000000000d8 = 0xfffffffe; *(uint32_t*)0x2000000000dc = 0; *(uint64_t*)0x2000000000e0 = 0; *(uint32_t*)0x2000000000e8 = 0; *(uint32_t*)0x2000000000ec = 0; memset((void*)0x2000000000f0, 0, 16); *(uint32_t*)0x200000000100 = 0; *(uint32_t*)0x200000000104 = 0; *(uint32_t*)0x200000000108 = -1; *(uint32_t*)0x20000000010c = 0; *(uint64_t*)0x200000000110 = 0; *(uint32_t*)0x200000000118 = 0; *(uint32_t*)0x20000000011c = 0; *(uint64_t*)0x200000000120 = 0; *(uint32_t*)0x200000000128 = 0; *(uint32_t*)0x20000000012c = 0; *(uint32_t*)0x200000000130 = -1; *(uint32_t*)0x200000000134 = 0; *(uint64_t*)0x200000000138 = 0; *(uint64_t*)0x200000000140 = 0; *(uint32_t*)0x200000000148 = 0; *(uint32_t*)0x20000000014c = 0; *(uint32_t*)0x200000000150 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x2000000000c0ul, /*size=*/0x94ul); // bpf$MAP_CREATE arguments: [ // cmd: const = 0x0 (8 bytes) // arg: ptr[in, bpf_map_create_arg] { // union bpf_map_create_arg { // base: bpf_map_create_arg_t[flags[bpf_map_type, int32], int32, int32, // int32, flags[map_flags, int32], const[0, int64]] { // type: bpf_map_type = 0x7 (4 bytes) // ksize: int32 = 0x4 (4 bytes) // vsize: int32 = 0x18 (4 bytes) // max: int32 = 0x1 (4 bytes) // flags: map_flags = 0x0 (4 bytes) // inner: fd_bpf_map (resource) // node: int32 = 0x0 (4 bytes) // map_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // 00} (length 0x10) map_ifindex: ifindex (resource) btf_fd: fd_btf // (resource) btf_key_type_id: int32 = 0x0 (4 bytes) // btf_value_type_id: int32 = 0x0 (4 bytes) // btf_vmlinux_type_id: int32 = 0x0 (4 bytes) // map_extra: const = 0x0 (8 bytes) // value_type_btf_obj_fd: union // _bpf_map_create_arg_t[flags[bpf_map_type, int32], int32, int32, // int32, flags[map_flags, int32], const[0, // int64]]_value_type_btf_obj_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad1: union _bpf_map_create_arg_t[flags[bpf_map_type, int32], // int32, int32, int32, flags[map_flags, int32], const[0, // int64]]_pad1_wrapper { // value: const = 0x0 (4 bytes) // } // map_token_fd: union _bpf_map_create_arg_t[flags[bpf_map_type, // int32], int32, int32, int32, flags[map_flags, int32], const[0, // int64]]_map_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad2: union _bpf_map_create_arg_t[flags[bpf_map_type, int32], // int32, int32, int32, flags[map_flags, int32], const[0, // int64]]_pad2_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // } // size: len = 0x50 (8 bytes) // ] // returns fd_bpf_map *(uint32_t*)0x200000000280 = 7; *(uint32_t*)0x200000000284 = 4; *(uint32_t*)0x200000000288 = 0x18; *(uint32_t*)0x20000000028c = 1; *(uint32_t*)0x200000000290 = 0; *(uint32_t*)0x200000000294 = -1; *(uint32_t*)0x200000000298 = 0; memset((void*)0x20000000029c, 0, 16); *(uint32_t*)0x2000000002ac = 0; *(uint32_t*)0x2000000002b0 = -1; *(uint32_t*)0x2000000002b4 = 0; *(uint32_t*)0x2000000002b8 = 0; *(uint32_t*)0x2000000002bc = 0; *(uint64_t*)0x2000000002c0 = 0; *(uint32_t*)0x2000000002c8 = 0; *(uint32_t*)0x2000000002cc = 0; res = syscall(__NR_bpf, /*cmd=*/0ul, /*arg=*/0x200000000280ul, /*size=*/0x50ul); if (res != -1) r[0] = res; // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x11 (4 bytes) // ninsn: bytesize8 = 0x9 (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // union ANYUNION { // ANYBLOB: buffer: {18 00 00 00 00 00 00 01 00 00 00 00 00 00 00 // 00 18 12 00 00} (length 0x14) // } // union ANYUNION { // ANYRES32: ANYRES32 (resource) // } // union ANYUNION { // ANYBLOB: buffer: {00 00 00 00 00 00 00 00 b7 03 00 00 00 00 00 // 00 85 00 00 00 1b} (length 0x15) // } // } // } // license: nil // loglev: int32 = 0x0 (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x41000 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0x0 (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x200000000680 = 0x11; *(uint32_t*)0x200000000684 = 9; *(uint64_t*)0x200000000688 = 0x200000000440; memcpy((void*)0x200000000440, "\x18\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x18" "\x12\x00\x00", 20); *(uint32_t*)0x200000000454 = r[0]; memcpy((void*)0x200000000458, "\x00\x00\x00\x00\x00\x00\x00\x00\xb7\x03\x00\x00\x00\x00\x00\x00\x85" "\x00\x00\x00\x1b", 21); *(uint64_t*)0x200000000690 = 0; *(uint32_t*)0x200000000698 = 0; *(uint32_t*)0x20000000069c = 0; *(uint64_t*)0x2000000006a0 = 0; *(uint32_t*)0x2000000006a8 = 0x41000; *(uint32_t*)0x2000000006ac = 0; memset((void*)0x2000000006b0, 0, 16); *(uint32_t*)0x2000000006c0 = 0; *(uint32_t*)0x2000000006c4 = 0; *(uint32_t*)0x2000000006c8 = 0; *(uint32_t*)0x2000000006cc = 0; *(uint64_t*)0x2000000006d0 = 0; *(uint32_t*)0x2000000006d8 = 0; *(uint32_t*)0x2000000006dc = 0; *(uint64_t*)0x2000000006e0 = 0; *(uint32_t*)0x2000000006e8 = 0; *(uint32_t*)0x2000000006ec = 0; *(uint32_t*)0x2000000006f0 = 0; *(uint32_t*)0x2000000006f4 = 0; *(uint64_t*)0x2000000006f8 = 0; *(uint64_t*)0x200000000700 = 0; *(uint32_t*)0x200000000708 = 0; *(uint32_t*)0x20000000070c = 0; *(uint32_t*)0x200000000710 = 0; syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x200000000680ul, /*size=*/0x94ul); // perf_event_open arguments: [ // attr: ptr[in, perf_event_attr] { // perf_event_attr { // type: perf_event_type = 0x1 (4 bytes) // size: len = 0x80 (4 bytes) // config0: int8 = 0x2 (1 bytes) // config1: int8 = 0x0 (1 bytes) // config2: int8 = 0x0 (1 bytes) // config3: int8 = 0x0 (1 bytes) // config4: const = 0x0 (4 bytes) // sample_freq: int64 = 0x1 (8 bytes) // sample_type: perf_sample_type = 0xa16ae (8 bytes) // read_format: perf_read_format = 0x9 (8 bytes) // disabled: int64 = 0x0 (0 bytes) // inherit: int64 = 0x1 (0 bytes) // pinned: int64 = 0x1 (0 bytes) // exclusive: int64 = 0x1 (0 bytes) // exclude_user: int64 = 0x0 (0 bytes) // exclude_kernel: int64 = 0x0 (0 bytes) // exclude_hv: int64 = 0x0 (0 bytes) // exclude_idle: int64 = 0x0 (0 bytes) // mmap: int64 = 0x1 (0 bytes) // comm: int64 = 0x0 (0 bytes) // freq: int64 = 0x0 (0 bytes) // inherit_stat: int64 = 0x1 (0 bytes) // enable_on_exec: int64 = 0x0 (0 bytes) // task: int64 = 0x1 (0 bytes) // watermark: int64 = 0x0 (0 bytes) // precise_ip: int64 = 0x1 (0 bytes) // mmap_data: int64 = 0x0 (0 bytes) // sample_id_all: int64 = 0x0 (0 bytes) // exclude_host: int64 = 0x0 (0 bytes) // exclude_guest: int64 = 0x0 (0 bytes) // exclude_callchain_kernel: int64 = 0x0 (0 bytes) // exclude_callchain_user: int64 = 0x0 (0 bytes) // mmap2: int64 = 0x0 (0 bytes) // comm_exec: int64 = 0x1 (0 bytes) // use_clockid: int64 = 0x0 (0 bytes) // context_switch: int64 = 0x1 (0 bytes) // write_backward: int64 = 0x1 (0 bytes) // namespaces: int64 = 0x1 (0 bytes) // ksymbol: int64 = 0x1 (0 bytes) // bpf_event: int64 = 0x1 (0 bytes) // aux_output: int64 = 0x0 (0 bytes) // cgroup: int64 = 0x1 (0 bytes) // text_poke: int64 = 0x0 (0 bytes) // build_id: int64 = 0x1 (0 bytes) // inherit_thread: int64 = 0x0 (0 bytes) // remove_on_exec: int64 = 0x0 (0 bytes) // sigtrap: int64 = 0x0 (0 bytes) // __reserved_1: const = 0x0 (8 bytes) // wakeup_events: int32 = 0x1 (4 bytes) // bp_type: perf_bp_type = 0x2 (4 bytes) // bp_config: union perf_bp_config { // perf_bp: perf_bp { // bp_addr: nil // bp_len: perf_bp_lens = 0x8 (8 bytes) // } // } // branch_sample_type: perf_branch_sample_type = 0x90 (8 bytes) // sample_regs_user: int64 = 0xa4 (8 bytes) // sample_stack_user: int32 = 0x2 (4 bytes) // clockid: clock_type = 0x1 (4 bytes) // sample_regs_intr: int64 = 0xa1 (8 bytes) // aux_watermark: int32 = 0x9b9b (4 bytes) // sample_max_stack: int16 = 0x8 (2 bytes) // __reserved_2: const = 0x0 (2 bytes) // aux_sample_size: int32 = 0x0 (4 bytes) // __reserved_3: const = 0x0 (4 bytes) // sig_data: int64 = 0x8 (8 bytes) // } // } // pid: pid (resource) // cpu: intptr = 0xffffffffffffffff (8 bytes) // group: fd_perf (resource) // flags: perf_flags = 0x1 (8 bytes) // ] // returns fd_perf *(uint32_t*)0x2000000004c0 = 1; *(uint32_t*)0x2000000004c4 = 0x80; *(uint8_t*)0x2000000004c8 = 2; *(uint8_t*)0x2000000004c9 = 0; *(uint8_t*)0x2000000004ca = 0; *(uint8_t*)0x2000000004cb = 0; *(uint32_t*)0x2000000004cc = 0; *(uint64_t*)0x2000000004d0 = 1; *(uint64_t*)0x2000000004d8 = 0xa16ae; *(uint64_t*)0x2000000004e0 = 9; STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 0, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 1, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 2, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 3, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 4, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 5, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 6, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 7, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 8, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 9, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 10, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 11, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 12, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 13, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 14, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 15, 2); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 17, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 18, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 19, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 20, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 21, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 22, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 23, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 24, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 25, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 26, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 27, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 28, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 29, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 30, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 31, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 32, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 33, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 1, 34, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 35, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 36, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 37, 1); STORE_BY_BITMASK(uint64_t, , 0x2000000004e8, 0, 38, 26); *(uint32_t*)0x2000000004f0 = 1; *(uint32_t*)0x2000000004f4 = 2; *(uint64_t*)0x2000000004f8 = 0; *(uint64_t*)0x200000000500 = 8; *(uint64_t*)0x200000000508 = 0x90; *(uint64_t*)0x200000000510 = 0xa4; *(uint32_t*)0x200000000518 = 2; *(uint32_t*)0x20000000051c = 1; *(uint64_t*)0x200000000520 = 0xa1; *(uint32_t*)0x200000000528 = 0x9b9b; *(uint16_t*)0x20000000052c = 8; *(uint16_t*)0x20000000052e = 0; *(uint32_t*)0x200000000530 = 0; *(uint32_t*)0x200000000534 = 0; *(uint64_t*)0x200000000538 = 8; res = syscall(__NR_perf_event_open, /*attr=*/0x2000000004c0ul, /*pid=*/0, /*cpu=*/(intptr_t)-1, /*group=*/(intptr_t)-1, /*flags=PERF_FLAG_FD_NO_GROUP*/ 1ul); if (res != -1) r[1] = res; // bpf$PROG_LOAD arguments: [ // cmd: const = 0x5 (8 bytes) // arg: ptr[in, bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], fd_bpf_prog[opt]]] { // bpf_prog_t[flags[bpf_prog_type, int32], bpf_prog_attach_types, // bpf_btf_id[opt], fd_bpf_prog[opt]] { // type: bpf_prog_type = 0x7 (4 bytes) // ninsn: bytesize8 = 0xc (4 bytes) // insns: ptr[inout, array[ANYUNION]] { // array[ANYUNION] { // } // } // license: ptr[in, buffer] { // buffer: {47 50 4c 00} (length 0x4) // } // loglev: int32 = 0x9 (4 bytes) // logsize: len = 0x0 (4 bytes) // log: nil // kern_version: bpf_kern_version = 0x0 (4 bytes) // flags: bpf_prog_load_flags = 0x0 (4 bytes) // prog_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) prog_ifindex: ifindex (resource) expected_attach_type: // union bpf_prog_attach_types { // fallback: bpf_attach_types = 0xb (4 bytes) // } // btf_fd: fd_btf (resource) // func_info_rec_size: const = 0x0 (4 bytes) // func_info: nil // func_info_cnt: len = 0x0 (4 bytes) // line_info_rec_size: const = 0x0 (4 bytes) // line_info: nil // line_info_cnt: len = 0x0 (4 bytes) // attach_btf_id: bpf_btf_id (resource) // attach_prog_fd: fd_bpf_prog (resource) // core_relo_cnt: len = 0x0 (4 bytes) // fd_array: nil // core_relos: nil // core_relo_rec_size: const = 0x0 (4 bytes) // log_true_size: int32 = 0x0 (4 bytes) // prog_token_fd: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_prog_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_prog_t[flags[bpf_prog_type, int32], // bpf_prog_attach_types, bpf_btf_id[opt], // fd_bpf_prog[opt]]_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x94 (8 bytes) // ] // returns fd_bpf_prog *(uint32_t*)0x200000000300 = 7; *(uint32_t*)0x200000000304 = 0xc; *(uint64_t*)0x200000000308 = 0x200000000440; *(uint64_t*)0x200000000310 = 0x200000000240; memcpy((void*)0x200000000240, "GPL\000", 4); *(uint32_t*)0x200000000318 = 9; *(uint32_t*)0x20000000031c = 0; *(uint64_t*)0x200000000320 = 0; *(uint32_t*)0x200000000328 = 0; *(uint32_t*)0x20000000032c = 0; memset((void*)0x200000000330, 0, 16); *(uint32_t*)0x200000000340 = 0; *(uint32_t*)0x200000000344 = 0xb; *(uint32_t*)0x200000000348 = -1; *(uint32_t*)0x20000000034c = 0; *(uint64_t*)0x200000000350 = 0; *(uint32_t*)0x200000000358 = 0; *(uint32_t*)0x20000000035c = 0; *(uint64_t*)0x200000000360 = 0; *(uint32_t*)0x200000000368 = 0; *(uint32_t*)0x20000000036c = 0; *(uint32_t*)0x200000000370 = 0; *(uint32_t*)0x200000000374 = 0; *(uint64_t*)0x200000000378 = 0; *(uint64_t*)0x200000000380 = 0; *(uint32_t*)0x200000000388 = 0; *(uint32_t*)0x20000000038c = 0; *(uint32_t*)0x200000000390 = 0; res = syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x200000000300ul, /*size=*/0x94ul); if (res != -1) r[2] = res; // ioctl$PERF_EVENT_IOC_SET_BPF arguments: [ // fd: fd_perf (resource) // cmd: const = 0x40042408 (4 bytes) // prog: fd_bpf_prog (resource) // ] syscall(__NR_ioctl, /*fd=*/r[1], /*cmd=*/0x40042408, /*prog=*/r[2]); // bpf$MAP_CREATE_CONST_STR arguments: [ // cmd: const = 0x0 (8 bytes) // arg: ptr[in, bpf_map_create_arg_t[const[BPF_MAP_TYPE_ARRAY, int32], // const[4, int32], const[8, int32], const[1, int32], // const[BPF_F_RDONLY_PROG, int32], const[0, int64]]] { // bpf_map_create_arg_t[const[BPF_MAP_TYPE_ARRAY, int32], const[4, // int32], const[8, int32], const[1, int32], const[BPF_F_RDONLY_PROG, // int32], const[0, int64]] { // type: const = 0x2 (4 bytes) // ksize: const = 0x4 (4 bytes) // vsize: const = 0x8 (4 bytes) // max: const = 0x1 (4 bytes) // flags: const = 0x80 (4 bytes) // inner: fd_bpf_map (resource) // node: int32 = 0x100 (4 bytes) // map_name: buffer: {00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00} // (length 0x10) map_ifindex: ifindex (resource) btf_fd: fd_btf // (resource) btf_key_type_id: int32 = 0x0 (4 bytes) btf_value_type_id: // int32 = 0x0 (4 bytes) btf_vmlinux_type_id: int32 = 0x0 (4 bytes) // map_extra: const = 0x0 (8 bytes) // value_type_btf_obj_fd: union // _bpf_map_create_arg_t[const[BPF_MAP_TYPE_ARRAY, int32], const[4, // int32], const[8, int32], const[1, int32], const[BPF_F_RDONLY_PROG, // int32], const[0, int64]]_value_type_btf_obj_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad1: union _bpf_map_create_arg_t[const[BPF_MAP_TYPE_ARRAY, int32], // const[4, int32], const[8, int32], const[1, int32], // const[BPF_F_RDONLY_PROG, int32], const[0, int64]]_pad1_wrapper { // value: const = 0x0 (4 bytes) // } // map_token_fd: union _bpf_map_create_arg_t[const[BPF_MAP_TYPE_ARRAY, // int32], const[4, int32], const[8, int32], const[1, int32], // const[BPF_F_RDONLY_PROG, int32], const[0, // int64]]_map_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad2: union _bpf_map_create_arg_t[const[BPF_MAP_TYPE_ARRAY, int32], // const[4, int32], const[8, int32], const[1, int32], // const[BPF_F_RDONLY_PROG, int32], const[0, int64]]_pad2_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x50 (8 bytes) // ] // returns fd_bpf_const_str_map *(uint32_t*)0x200000000000 = 2; *(uint32_t*)0x200000000004 = 4; *(uint32_t*)0x200000000008 = 8; *(uint32_t*)0x20000000000c = 1; *(uint32_t*)0x200000000010 = 0x80; *(uint32_t*)0x200000000014 = 0; *(uint32_t*)0x200000000018 = 0x100; memset((void*)0x20000000001c, 0, 16); *(uint32_t*)0x20000000002c = 0; *(uint32_t*)0x200000000030 = -1; *(uint32_t*)0x200000000034 = 0; *(uint32_t*)0x200000000038 = 0; *(uint32_t*)0x20000000003c = 0; *(uint64_t*)0x200000000040 = 0; *(uint32_t*)0x200000000048 = 0; *(uint32_t*)0x20000000004c = 0; syscall(__NR_bpf, /*cmd=*/0ul, /*arg=*/0x200000000000ul, /*size=*/0x50ul); // bpf$BPF_BTF_LOAD arguments: [ // cmd: const = 0x12 (8 bytes) // arg: ptr[in, bpf_btf_load] { // bpf_btf_load { // btf: ptr[in, bpf_btf_program] { // bpf_btf_program { // header: btf_header { // magic: const = 0xeb9f (2 bytes) // version: const = 0x1 (1 bytes) // flags: const = 0x0 (1 bytes) // hdr_len: const = 0x18 (4 bytes) // type_off: const = 0x0 (4 bytes) // type_len: bytesize = 0xc (4 bytes) // str_off: bytesize = 0xc (4 bytes) // str_len: bytesize = 0x6 (4 bytes) // types: array[btf_type] { // union btf_type { // union: btf_type_struct_t[BTF_KIND_UNION] { // name_off: int32 = 0x4 (4 bytes) // info_vlen: len = 0x0 (2 bytes) // info_pad: const = 0x0 (1 bytes) // info_typ: const = 0x5 (0 bytes) // info_kflag: int8 = 0x1 (1 bytes) // size: int32 = 0xffff6ebe (4 bytes) // fields: array[btf_member] { // } // } // } // } // } // strings: bpf_btf_strings { // z0: const = 0x0 (1 bytes) // data: array[bpf_btf_strings_elem] { // bpf_btf_strings_elem = 0x30 (1 bytes) // bpf_btf_strings_elem = 0x30 (1 bytes) // bpf_btf_strings_elem = 0x30 (1 bytes) // bpf_btf_strings_elem = 0x2e (1 bytes) // } // z1: const = 0x0 (1 bytes) // } // } // } // btf_log_buf: nil // btf_size: bytesize = 0x2a (4 bytes) // btf_log_size: bytesize = 0x0 (4 bytes) // btf_log_level: int32 = 0x1 (4 bytes) // btf_log_true_size: int32 = 0x3 (4 bytes) // btf_flags: btf_load_flags = 0x0 (4 bytes) // btf_token_fd: union _bpf_btf_load_btf_token_fd_wrapper { // void: buffer: {} (length 0x0) // } // pad: union _bpf_btf_load_pad_wrapper { // value: const = 0x0 (4 bytes) // } // } // } // size: len = 0x28 (8 bytes) // ] // returns fd_btf *(uint64_t*)0x200000000300 = 0x200000000200; *(uint16_t*)0x200000000200 = 0xeb9f; *(uint8_t*)0x200000000202 = 1; *(uint8_t*)0x200000000203 = 0; *(uint32_t*)0x200000000204 = 0x18; *(uint32_t*)0x200000000208 = 0; *(uint32_t*)0x20000000020c = 0xc; *(uint32_t*)0x200000000210 = 0xc; *(uint32_t*)0x200000000214 = 6; *(uint32_t*)0x200000000218 = 4; *(uint16_t*)0x20000000021c = 0; *(uint8_t*)0x20000000021e = 0; STORE_BY_BITMASK(uint8_t, , 0x20000000021f, 5, 0, 7); STORE_BY_BITMASK(uint8_t, , 0x20000000021f, 1, 7, 1); *(uint32_t*)0x200000000220 = 0xffff6ebe; *(uint8_t*)0x200000000224 = 0; *(uint8_t*)0x200000000225 = 0x30; *(uint8_t*)0x200000000226 = 0x30; *(uint8_t*)0x200000000227 = 0x30; *(uint8_t*)0x200000000228 = 0x2e; *(uint8_t*)0x200000000229 = 0; *(uint64_t*)0x200000000308 = 0; *(uint32_t*)0x200000000310 = 0x2a; *(uint32_t*)0x200000000314 = 0; *(uint32_t*)0x200000000318 = 1; *(uint32_t*)0x20000000031c = 3; *(uint32_t*)0x200000000320 = 0; *(uint32_t*)0x200000000324 = 0; res = syscall(__NR_bpf, /*cmd=*/0x12ul, /*arg=*/0x200000000300ul, /*size=*/0x28ul); if (res != -1) r[3] = res; // bpf$BPF_GET_MAP_INFO arguments: [ // cmd: const = 0xf (8 bytes) // arg: ptr[in, bpf_get_map_info_arg] { // bpf_get_map_info_arg { // prog: fd_bpf_map (resource) // len: len = 0x2c (4 bytes) // info: ptr[out, bpf_map_info] { // bpf_map_info { // type: int32 = 0x0 (4 bytes) // id: bpf_map_id (resource) // key_size: int32 = 0x0 (4 bytes) // value_size: int32 = 0x0 (4 bytes) // max_entries: int32 = 0x0 (4 bytes) // map_flags: int32 = 0x0 (4 bytes) // name: buffer: (DirOut) // ifindex: ifindex (resource) // btf_vmlinux_value_type_id: int32 = 0x0 (4 bytes) // netns_dev: int64 = 0x0 (8 bytes) // netns_ino: int64 = 0x0 (8 bytes) // btf_id: int32 = 0x0 (4 bytes) // btf_key_type_id: int32 = 0x0 (4 bytes) // btf_value_type_id: int32 = 0x0 (4 bytes) // pad = 0x0 (4 bytes) // map_extra: align64[int64] { // v: int64 = 0x0 (8 bytes) // } // } // } // } // } // size: len = 0x10 (8 bytes) // ] *(uint32_t*)0x200000000080 = r[3]; *(uint32_t*)0x200000000084 = 0x2c; *(uint64_t*)0x200000000088 = 0x200000000000; syscall(__NR_bpf, /*cmd=*/0xful, /*arg=*/0x200000000080ul, /*size=*/0x10ul); return 0; }