Created
April 21, 2021 11:47
-
-
Save bjackman/2928c4ff4cc89545f3993bddd9d5edb2 to your computer and use it in GitHub Desktop.
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Failed to load bpf_testmod.ko into the kernel: -8 | |
WARNING! Selftests relying on bpf_testmod.ko will be skipped. | |
libbpf: load bpf program failed: Permission denied | |
libbpf: -- BEGIN DUMP LOG --- | |
libbpf: | |
R1 type=ctx expected=fp | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
0: (79) r1 = *(u64 *)(r1 +0) | |
func 'bpf_lsm_bprm_committed_creds' arg0 has btf_id 1589 type STRUCT 'linux_binprm' | |
1: (7b) *(u64 *)(r10 -24) = r1 | |
; uint64_t args_size = bprm->argc & 0xFFFFFFF; | |
2: (61) r7 = *(u32 *)(r1 +88) | |
3: (b4) w1 = 0 | |
; int map_key = 0; | |
4: (63) *(u32 *)(r10 -4) = r1 | |
last_idx 4 first_idx 0 | |
regs=2 stack=0 before 3: (b4) w1 = 0 | |
5: (bf) r2 = r10 | |
; | |
6: (07) r2 += -4 | |
; void *buf = bpf_map_lookup_elem(&buf_map, &map_key); | |
7: (18) r1 = 0xffff8881075a4e00 | |
9: (85) call bpf_map_lookup_elem#1 | |
10: (7b) *(u64 *)(r10 -16) = r0 | |
11: (57) r7 &= 268435455 | |
12: (bf) r6 = r7 | |
; if (!buf) | |
13: (16) if w7 == 0x0 goto pc+18 | |
R0_w=map_value_or_null(id=1,off=0,ks=4,vs=4096,imm=0) R6_w=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R10=fp0 fp-8=mmmm???? fp-16_w=map_value_or_null fp-24_w=ptr_ | |
14: (79) r1 = *(u64 *)(r10 -16) | |
15: (15) if r1 == 0x0 goto pc+16 | |
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R6=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
16: (b4) w9 = 0 | |
17: (b7) r1 = 4096 | |
18: (bf) r8 = r6 | |
19: (05) goto pc+14 | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=inv4096 R2_w=inv(id=0,umax_value=268435455,var_off=(0x0; 0xfffffff)) R6_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv4096 R8_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9_w=inv0 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv4096 R8=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9=inv0 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 20 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=inv4096 R2_rw=invP4096 R6_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_rw=inv4096 R8_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9_w=inv0 R10=fp0 fp-8=mmmm???? fp-16_r=map_value fp-24_r=ptr_ | |
parent didn't have regs=4 stack=0 marks | |
last_idx 38 first_idx 15 | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
last_idx 26 first_idx 20 | |
regs=200 stack=0 before 25: (85) call bpf_probe_read_user#112 | |
regs=200 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=200 stack=0 before 23: (07) r3 += -4096 | |
regs=200 stack=0 before 22: (0f) r3 += r7 | |
regs=200 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=200 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=inv4096 R2_rw=invP4096 R6_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_rw=inv4096 R8_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9_rw=invP0 R10=fp0 fp-8=mmmm???? fp-16_r=map_value fp-24_r=ptr_ | |
parent didn't have regs=200 stack=0 marks | |
last_idx 38 first_idx 15 | |
regs=200 stack=0 before 38: (05) goto pc-19 | |
regs=200 stack=0 before 37: (b4) w2 = 4096 | |
regs=200 stack=0 before 36: (a5) if r8 < 0x1000 goto pc-17 | |
regs=200 stack=0 before 35: (bc) w2 = w8 | |
regs=200 stack=0 before 34: (bf) r7 = r1 | |
regs=200 stack=0 before 19: (05) goto pc+14 | |
regs=200 stack=0 before 18: (bf) r8 = r6 | |
regs=200 stack=0 before 17: (b7) r1 = 4096 | |
regs=200 stack=0 before 16: (b4) w9 = 0 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv8192 R6=inv(id=2,umin_value=4097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv4096 R8=inv(id=0,umax_value=268431359,var_off=(0x0; 0xfffffff)) R9=invP1 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv8192 R2_w=inv(id=0,umax_value=268431359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=4097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv8192 R8=inv(id=0,umin_value=4096,umax_value=268431359,var_off=(0x0; 0xfffffff)) R9=invP1 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=4097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv8192 R8=inv(id=0,umin_value=4096,umax_value=268431359,var_off=(0x0; 0xfffffff)) R9=invP1 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 31 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv12288 R6=inv(id=2,umin_value=8193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv8192 R8=inv(id=0,umax_value=268427263,var_off=(0x0; 0xfffffff)) R9=invP2 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv12288 R2_w=inv(id=0,umax_value=268427263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=8193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv12288 R8=inv(id=0,umin_value=4096,umax_value=268427263,var_off=(0x0; 0xfffffff)) R9=invP2 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=8193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv12288 R8=inv(id=0,umin_value=4096,umax_value=268427263,var_off=(0x0; 0xfffffff)) R9=invP2 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv16384 R6=inv(id=2,umin_value=12289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv12288 R8_w=inv(id=0,umax_value=268423167,var_off=(0x0; 0xfffffff)) R9_w=invP3 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv16384 R2_w=inv(id=0,umax_value=268423167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=12289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv16384 R8_w=inv(id=0,umin_value=4096,umax_value=268423167,var_off=(0x0; 0xfffffff)) R9_w=invP3 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=12289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv16384 R8_w=inv(id=0,umin_value=4096,umax_value=268423167,var_off=(0x0; 0xfffffff)) R9_w=invP3 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv20480 R6=inv(id=2,umin_value=16385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv16384 R8_w=inv(id=0,umax_value=268419071,var_off=(0x0; 0xfffffff)) R9_w=invP4 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv20480 R2=inv(id=0,umax_value=268419071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=16385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv20480 R8=inv(id=0,umin_value=4096,umax_value=268419071,var_off=(0x0; 0xfffffff)) R9=invP4 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=16385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv20480 R8=inv(id=0,umin_value=4096,umax_value=268419071,var_off=(0x0; 0xfffffff)) R9=invP4 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 36 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv24576 R6=inv(id=2,umin_value=20481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv20480 R8_w=inv(id=0,umax_value=268414975,var_off=(0x0; 0xfffffff)) R9_w=invP5 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv24576 R2_w=inv(id=0,umax_value=268414975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=20481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv24576 R8_w=inv(id=0,umin_value=4096,umax_value=268414975,var_off=(0x0; 0xfffffff)) R9_w=invP5 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=20481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv24576 R8_w=inv(id=0,umin_value=4096,umax_value=268414975,var_off=(0x0; 0xfffffff)) R9_w=invP5 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 36 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv28672 R6=inv(id=2,umin_value=24577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv24576 R8_w=inv(id=0,umax_value=268410879,var_off=(0x0; 0xfffffff)) R9_w=invP6 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv28672 R2_w=inv(id=0,umax_value=268410879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=24577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv28672 R8_w=inv(id=0,umin_value=4096,umax_value=268410879,var_off=(0x0; 0xfffffff)) R9_w=invP6 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=24577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv28672 R8_w=inv(id=0,umin_value=4096,umax_value=268410879,var_off=(0x0; 0xfffffff)) R9_w=invP6 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 36 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv32768 R6=inv(id=2,umin_value=28673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv28672 R8_w=inv(id=0,umax_value=268406783,var_off=(0x0; 0xfffffff)) R9_w=invP7 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv32768 R2_w=inv(id=0,umax_value=268406783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=28673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv32768 R8_w=inv(id=0,umin_value=4096,umax_value=268406783,var_off=(0x0; 0xfffffff)) R9_w=invP7 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=28673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv32768 R8_w=inv(id=0,umin_value=4096,umax_value=268406783,var_off=(0x0; 0xfffffff)) R9_w=invP7 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 36 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv36864 R6=inv(id=2,umin_value=32769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv32768 R8=inv(id=0,umax_value=268402687,var_off=(0x0; 0xfffffff)) R9=invP8 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv36864 R2_w=inv(id=0,umax_value=268402687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=32769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv36864 R8=inv(id=0,umin_value=4096,umax_value=268402687,var_off=(0x0; 0xfffffff)) R9=invP8 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=32769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv36864 R8=inv(id=0,umin_value=4096,umax_value=268402687,var_off=(0x0; 0xfffffff)) R9=invP8 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv40960 R6=inv(id=2,umin_value=36865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv36864 R8_w=inv(id=0,umax_value=268398591,var_off=(0x0; 0xfffffff)) R9_w=invP9 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv40960 R2_w=inv(id=0,umax_value=268398591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=36865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv40960 R8_w=inv(id=0,umin_value=4096,umax_value=268398591,var_off=(0x0; 0xfffffff)) R9_w=invP9 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=36865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv40960 R8_w=inv(id=0,umin_value=4096,umax_value=268398591,var_off=(0x0; 0xfffffff)) R9_w=invP9 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv45056 R6=inv(id=2,umin_value=40961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv40960 R8_w=inv(id=0,umax_value=268394495,var_off=(0x0; 0xfffffff)) R9_w=invP10 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv45056 R2_w=inv(id=0,umax_value=268394495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=40961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv45056 R8_w=inv(id=0,umin_value=4096,umax_value=268394495,var_off=(0x0; 0xfffffff)) R9_w=invP10 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=40961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv45056 R8_w=inv(id=0,umin_value=4096,umax_value=268394495,var_off=(0x0; 0xfffffff)) R9_w=invP10 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv49152 R6=inv(id=2,umin_value=45057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv45056 R8_w=inv(id=0,umax_value=268390399,var_off=(0x0; 0xfffffff)) R9_w=invP11 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv49152 R2_w=inv(id=0,umax_value=268390399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=45057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv49152 R8_w=inv(id=0,umin_value=4096,umax_value=268390399,var_off=(0x0; 0xfffffff)) R9_w=invP11 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=45057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv49152 R8_w=inv(id=0,umin_value=4096,umax_value=268390399,var_off=(0x0; 0xfffffff)) R9_w=invP11 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv53248 R6=inv(id=2,umin_value=49153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv49152 R8=inv(id=0,umax_value=268386303,var_off=(0x0; 0xfffffff)) R9=invP12 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv53248 R2_w=inv(id=0,umax_value=268386303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=49153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv53248 R8=inv(id=0,umin_value=4096,umax_value=268386303,var_off=(0x0; 0xfffffff)) R9=invP12 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=49153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv53248 R8=inv(id=0,umin_value=4096,umax_value=268386303,var_off=(0x0; 0xfffffff)) R9=invP12 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv57344 R6=inv(id=2,umin_value=53249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv53248 R8_w=inv(id=0,umax_value=268382207,var_off=(0x0; 0xfffffff)) R9_w=invP13 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv57344 R2_w=inv(id=0,umax_value=268382207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=53249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv57344 R8_w=inv(id=0,umin_value=4096,umax_value=268382207,var_off=(0x0; 0xfffffff)) R9_w=invP13 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=53249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv57344 R8_w=inv(id=0,umin_value=4096,umax_value=268382207,var_off=(0x0; 0xfffffff)) R9_w=invP13 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv61440 R6=inv(id=2,umin_value=57345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv57344 R8_w=inv(id=0,umax_value=268378111,var_off=(0x0; 0xfffffff)) R9_w=invP14 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv61440 R2_w=inv(id=0,umax_value=268378111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=57345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv61440 R8_w=inv(id=0,umin_value=4096,umax_value=268378111,var_off=(0x0; 0xfffffff)) R9_w=invP14 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=57345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv61440 R8_w=inv(id=0,umin_value=4096,umax_value=268378111,var_off=(0x0; 0xfffffff)) R9_w=invP14 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv65536 R6=inv(id=2,umin_value=61441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv61440 R8_w=inv(id=0,umax_value=268374015,var_off=(0x0; 0xfffffff)) R9_w=invP15 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv65536 R2_w=inv(id=0,umax_value=268374015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=61441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv65536 R8_w=inv(id=0,umin_value=4096,umax_value=268374015,var_off=(0x0; 0xfffffff)) R9_w=invP15 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=61441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv65536 R8_w=inv(id=0,umin_value=4096,umax_value=268374015,var_off=(0x0; 0xfffffff)) R9_w=invP15 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv69632 R6=inv(id=2,umin_value=65537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv65536 R8=inv(id=0,umax_value=268369919,var_off=(0x0; 0xfffffff)) R9=invP16 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv69632 R2_w=inv(id=0,umax_value=268369919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=65537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv69632 R8=inv(id=0,umin_value=4096,umax_value=268369919,var_off=(0x0; 0xfffffff)) R9=invP16 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=65537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv69632 R8=inv(id=0,umin_value=4096,umax_value=268369919,var_off=(0x0; 0xfffffff)) R9=invP16 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv73728 R6=inv(id=2,umin_value=69633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv69632 R8_w=inv(id=0,umax_value=268365823,var_off=(0x0; 0xfffffff)) R9_w=invP17 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv73728 R2_w=inv(id=0,umax_value=268365823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=69633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv73728 R8_w=inv(id=0,umin_value=4096,umax_value=268365823,var_off=(0x0; 0xfffffff)) R9_w=invP17 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=69633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv73728 R8_w=inv(id=0,umin_value=4096,umax_value=268365823,var_off=(0x0; 0xfffffff)) R9_w=invP17 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv77824 R6=inv(id=2,umin_value=73729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv73728 R8_w=inv(id=0,umax_value=268361727,var_off=(0x0; 0xfffffff)) R9_w=invP18 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv77824 R2_w=inv(id=0,umax_value=268361727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=73729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv77824 R8_w=inv(id=0,umin_value=4096,umax_value=268361727,var_off=(0x0; 0xfffffff)) R9_w=invP18 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=73729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv77824 R8_w=inv(id=0,umin_value=4096,umax_value=268361727,var_off=(0x0; 0xfffffff)) R9_w=invP18 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv81920 R6=inv(id=2,umin_value=77825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv77824 R8_w=inv(id=0,umax_value=268357631,var_off=(0x0; 0xfffffff)) R9_w=invP19 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv81920 R2_w=inv(id=0,umax_value=268357631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=77825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv81920 R8_w=inv(id=0,umin_value=4096,umax_value=268357631,var_off=(0x0; 0xfffffff)) R9_w=invP19 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=77825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv81920 R8_w=inv(id=0,umin_value=4096,umax_value=268357631,var_off=(0x0; 0xfffffff)) R9_w=invP19 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv86016 R6=inv(id=2,umin_value=81921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv81920 R8=inv(id=0,umax_value=268353535,var_off=(0x0; 0xfffffff)) R9=invP20 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv86016 R2_w=inv(id=0,umax_value=268353535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=81921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv86016 R8=inv(id=0,umin_value=4096,umax_value=268353535,var_off=(0x0; 0xfffffff)) R9=invP20 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=81921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv86016 R8=inv(id=0,umin_value=4096,umax_value=268353535,var_off=(0x0; 0xfffffff)) R9=invP20 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv90112 R6=inv(id=2,umin_value=86017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv86016 R8_w=inv(id=0,umax_value=268349439,var_off=(0x0; 0xfffffff)) R9_w=invP21 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv90112 R2_w=inv(id=0,umax_value=268349439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=86017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv90112 R8_w=inv(id=0,umin_value=4096,umax_value=268349439,var_off=(0x0; 0xfffffff)) R9_w=invP21 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=86017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv90112 R8_w=inv(id=0,umin_value=4096,umax_value=268349439,var_off=(0x0; 0xfffffff)) R9_w=invP21 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv94208 R6=inv(id=2,umin_value=90113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv90112 R8_w=inv(id=0,umax_value=268345343,var_off=(0x0; 0xfffffff)) R9_w=invP22 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv94208 R2_w=inv(id=0,umax_value=268345343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=90113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv94208 R8_w=inv(id=0,umin_value=4096,umax_value=268345343,var_off=(0x0; 0xfffffff)) R9_w=invP22 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=90113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv94208 R8_w=inv(id=0,umin_value=4096,umax_value=268345343,var_off=(0x0; 0xfffffff)) R9_w=invP22 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv98304 R6=inv(id=2,umin_value=94209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv94208 R8_w=inv(id=0,umax_value=268341247,var_off=(0x0; 0xfffffff)) R9_w=invP23 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv98304 R2_w=inv(id=0,umax_value=268341247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=94209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv98304 R8_w=inv(id=0,umin_value=4096,umax_value=268341247,var_off=(0x0; 0xfffffff)) R9_w=invP23 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=94209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv98304 R8_w=inv(id=0,umin_value=4096,umax_value=268341247,var_off=(0x0; 0xfffffff)) R9_w=invP23 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv102400 R6=inv(id=2,umin_value=98305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv98304 R8=inv(id=0,umax_value=268337151,var_off=(0x0; 0xfffffff)) R9=invP24 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv102400 R2_w=inv(id=0,umax_value=268337151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=98305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv102400 R8=inv(id=0,umin_value=4096,umax_value=268337151,var_off=(0x0; 0xfffffff)) R9=invP24 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=98305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv102400 R8=inv(id=0,umin_value=4096,umax_value=268337151,var_off=(0x0; 0xfffffff)) R9=invP24 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv106496 R6=inv(id=2,umin_value=102401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv102400 R8_w=inv(id=0,umax_value=268333055,var_off=(0x0; 0xfffffff)) R9_w=invP25 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv106496 R2_w=inv(id=0,umax_value=268333055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=102401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv106496 R8_w=inv(id=0,umin_value=4096,umax_value=268333055,var_off=(0x0; 0xfffffff)) R9_w=invP25 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=102401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv106496 R8_w=inv(id=0,umin_value=4096,umax_value=268333055,var_off=(0x0; 0xfffffff)) R9_w=invP25 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv110592 R6=inv(id=2,umin_value=106497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv106496 R8_w=inv(id=0,umax_value=268328959,var_off=(0x0; 0xfffffff)) R9_w=invP26 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv110592 R2_w=inv(id=0,umax_value=268328959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=106497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv110592 R8_w=inv(id=0,umin_value=4096,umax_value=268328959,var_off=(0x0; 0xfffffff)) R9_w=invP26 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=106497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv110592 R8_w=inv(id=0,umin_value=4096,umax_value=268328959,var_off=(0x0; 0xfffffff)) R9_w=invP26 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv114688 R6=inv(id=2,umin_value=110593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv110592 R8_w=inv(id=0,umax_value=268324863,var_off=(0x0; 0xfffffff)) R9_w=invP27 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv114688 R2_w=inv(id=0,umax_value=268324863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=110593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv114688 R8_w=inv(id=0,umin_value=4096,umax_value=268324863,var_off=(0x0; 0xfffffff)) R9_w=invP27 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=110593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv114688 R8_w=inv(id=0,umin_value=4096,umax_value=268324863,var_off=(0x0; 0xfffffff)) R9_w=invP27 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv118784 R6=inv(id=2,umin_value=114689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv114688 R8=inv(id=0,umax_value=268320767,var_off=(0x0; 0xfffffff)) R9=invP28 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv118784 R2_w=inv(id=0,umax_value=268320767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=114689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv118784 R8=inv(id=0,umin_value=4096,umax_value=268320767,var_off=(0x0; 0xfffffff)) R9=invP28 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=114689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv118784 R8=inv(id=0,umin_value=4096,umax_value=268320767,var_off=(0x0; 0xfffffff)) R9=invP28 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv122880 R6=inv(id=2,umin_value=118785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv118784 R8_w=inv(id=0,umax_value=268316671,var_off=(0x0; 0xfffffff)) R9_w=invP29 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv122880 R2_w=inv(id=0,umax_value=268316671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=118785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv122880 R8_w=inv(id=0,umin_value=4096,umax_value=268316671,var_off=(0x0; 0xfffffff)) R9_w=invP29 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=118785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv122880 R8_w=inv(id=0,umin_value=4096,umax_value=268316671,var_off=(0x0; 0xfffffff)) R9_w=invP29 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv126976 R6=inv(id=2,umin_value=122881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv122880 R8_w=inv(id=0,umax_value=268312575,var_off=(0x0; 0xfffffff)) R9_w=invP30 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv126976 R2_w=inv(id=0,umax_value=268312575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=122881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv126976 R8_w=inv(id=0,umin_value=4096,umax_value=268312575,var_off=(0x0; 0xfffffff)) R9_w=invP30 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=122881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv126976 R8_w=inv(id=0,umin_value=4096,umax_value=268312575,var_off=(0x0; 0xfffffff)) R9_w=invP30 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv131072 R6=inv(id=2,umin_value=126977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv126976 R8_w=inv(id=0,umax_value=268308479,var_off=(0x0; 0xfffffff)) R9_w=invP31 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv131072 R2_w=inv(id=0,umax_value=268308479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=126977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv131072 R8_w=inv(id=0,umin_value=4096,umax_value=268308479,var_off=(0x0; 0xfffffff)) R9_w=invP31 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=126977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv131072 R8_w=inv(id=0,umin_value=4096,umax_value=268308479,var_off=(0x0; 0xfffffff)) R9_w=invP31 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv135168 R6=inv(id=2,umin_value=131073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv131072 R8=inv(id=0,umax_value=268304383,var_off=(0x0; 0xfffffff)) R9=invP32 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv135168 R2_w=inv(id=0,umax_value=268304383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=131073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv135168 R8=inv(id=0,umin_value=4096,umax_value=268304383,var_off=(0x0; 0xfffffff)) R9=invP32 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=131073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv135168 R8=inv(id=0,umin_value=4096,umax_value=268304383,var_off=(0x0; 0xfffffff)) R9=invP32 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv139264 R6=inv(id=2,umin_value=135169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv135168 R8_w=inv(id=0,umax_value=268300287,var_off=(0x0; 0xfffffff)) R9_w=invP33 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv139264 R2_w=inv(id=0,umax_value=268300287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=135169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv139264 R8_w=inv(id=0,umin_value=4096,umax_value=268300287,var_off=(0x0; 0xfffffff)) R9_w=invP33 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=135169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv139264 R8_w=inv(id=0,umin_value=4096,umax_value=268300287,var_off=(0x0; 0xfffffff)) R9_w=invP33 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv143360 R6=inv(id=2,umin_value=139265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv139264 R8_w=inv(id=0,umax_value=268296191,var_off=(0x0; 0xfffffff)) R9_w=invP34 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv143360 R2_w=inv(id=0,umax_value=268296191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=139265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv143360 R8_w=inv(id=0,umin_value=4096,umax_value=268296191,var_off=(0x0; 0xfffffff)) R9_w=invP34 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=139265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv143360 R8_w=inv(id=0,umin_value=4096,umax_value=268296191,var_off=(0x0; 0xfffffff)) R9_w=invP34 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv147456 R6=inv(id=2,umin_value=143361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv143360 R8_w=inv(id=0,umax_value=268292095,var_off=(0x0; 0xfffffff)) R9_w=invP35 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv147456 R2_w=inv(id=0,umax_value=268292095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=143361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv147456 R8_w=inv(id=0,umin_value=4096,umax_value=268292095,var_off=(0x0; 0xfffffff)) R9_w=invP35 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=143361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv147456 R8_w=inv(id=0,umin_value=4096,umax_value=268292095,var_off=(0x0; 0xfffffff)) R9_w=invP35 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv151552 R6=inv(id=2,umin_value=147457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv147456 R8=inv(id=0,umax_value=268287999,var_off=(0x0; 0xfffffff)) R9=invP36 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv151552 R2_w=inv(id=0,umax_value=268287999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=147457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv151552 R8=inv(id=0,umin_value=4096,umax_value=268287999,var_off=(0x0; 0xfffffff)) R9=invP36 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=147457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv151552 R8=inv(id=0,umin_value=4096,umax_value=268287999,var_off=(0x0; 0xfffffff)) R9=invP36 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv155648 R6=inv(id=2,umin_value=151553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv151552 R8_w=inv(id=0,umax_value=268283903,var_off=(0x0; 0xfffffff)) R9_w=invP37 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv155648 R2_w=inv(id=0,umax_value=268283903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=151553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv155648 R8_w=inv(id=0,umin_value=4096,umax_value=268283903,var_off=(0x0; 0xfffffff)) R9_w=invP37 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=151553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv155648 R8_w=inv(id=0,umin_value=4096,umax_value=268283903,var_off=(0x0; 0xfffffff)) R9_w=invP37 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv159744 R6=inv(id=2,umin_value=155649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv155648 R8_w=inv(id=0,umax_value=268279807,var_off=(0x0; 0xfffffff)) R9_w=invP38 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv159744 R2_w=inv(id=0,umax_value=268279807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=155649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv159744 R8_w=inv(id=0,umin_value=4096,umax_value=268279807,var_off=(0x0; 0xfffffff)) R9_w=invP38 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=155649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv159744 R8_w=inv(id=0,umin_value=4096,umax_value=268279807,var_off=(0x0; 0xfffffff)) R9_w=invP38 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv163840 R6=inv(id=2,umin_value=159745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv159744 R8_w=inv(id=0,umax_value=268275711,var_off=(0x0; 0xfffffff)) R9_w=invP39 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv163840 R2_w=inv(id=0,umax_value=268275711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=159745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv163840 R8_w=inv(id=0,umin_value=4096,umax_value=268275711,var_off=(0x0; 0xfffffff)) R9_w=invP39 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=159745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv163840 R8_w=inv(id=0,umin_value=4096,umax_value=268275711,var_off=(0x0; 0xfffffff)) R9_w=invP39 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv167936 R6=inv(id=2,umin_value=163841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv163840 R8=inv(id=0,umax_value=268271615,var_off=(0x0; 0xfffffff)) R9=invP40 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv167936 R2_w=inv(id=0,umax_value=268271615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=163841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv167936 R8=inv(id=0,umin_value=4096,umax_value=268271615,var_off=(0x0; 0xfffffff)) R9=invP40 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=163841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv167936 R8=inv(id=0,umin_value=4096,umax_value=268271615,var_off=(0x0; 0xfffffff)) R9=invP40 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv172032 R6=inv(id=2,umin_value=167937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv167936 R8_w=inv(id=0,umax_value=268267519,var_off=(0x0; 0xfffffff)) R9_w=invP41 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv172032 R2_w=inv(id=0,umax_value=268267519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=167937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv172032 R8_w=inv(id=0,umin_value=4096,umax_value=268267519,var_off=(0x0; 0xfffffff)) R9_w=invP41 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=167937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv172032 R8_w=inv(id=0,umin_value=4096,umax_value=268267519,var_off=(0x0; 0xfffffff)) R9_w=invP41 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv176128 R6=inv(id=2,umin_value=172033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv172032 R8_w=inv(id=0,umax_value=268263423,var_off=(0x0; 0xfffffff)) R9_w=invP42 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv176128 R2_w=inv(id=0,umax_value=268263423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=172033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv176128 R8_w=inv(id=0,umin_value=4096,umax_value=268263423,var_off=(0x0; 0xfffffff)) R9_w=invP42 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=172033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv176128 R8_w=inv(id=0,umin_value=4096,umax_value=268263423,var_off=(0x0; 0xfffffff)) R9_w=invP42 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv180224 R6=inv(id=2,umin_value=176129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv176128 R8_w=inv(id=0,umax_value=268259327,var_off=(0x0; 0xfffffff)) R9_w=invP43 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv180224 R2_w=inv(id=0,umax_value=268259327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=176129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv180224 R8_w=inv(id=0,umin_value=4096,umax_value=268259327,var_off=(0x0; 0xfffffff)) R9_w=invP43 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=176129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv180224 R8_w=inv(id=0,umin_value=4096,umax_value=268259327,var_off=(0x0; 0xfffffff)) R9_w=invP43 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv184320 R6=inv(id=2,umin_value=180225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv180224 R8=inv(id=0,umax_value=268255231,var_off=(0x0; 0xfffffff)) R9=invP44 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv184320 R2_w=inv(id=0,umax_value=268255231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=180225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv184320 R8=inv(id=0,umin_value=4096,umax_value=268255231,var_off=(0x0; 0xfffffff)) R9=invP44 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=180225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv184320 R8=inv(id=0,umin_value=4096,umax_value=268255231,var_off=(0x0; 0xfffffff)) R9=invP44 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv188416 R6=inv(id=2,umin_value=184321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv184320 R8_w=inv(id=0,umax_value=268251135,var_off=(0x0; 0xfffffff)) R9_w=invP45 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv188416 R2_w=inv(id=0,umax_value=268251135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=184321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv188416 R8_w=inv(id=0,umin_value=4096,umax_value=268251135,var_off=(0x0; 0xfffffff)) R9_w=invP45 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=184321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv188416 R8_w=inv(id=0,umin_value=4096,umax_value=268251135,var_off=(0x0; 0xfffffff)) R9_w=invP45 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv192512 R6=inv(id=2,umin_value=188417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv188416 R8_w=inv(id=0,umax_value=268247039,var_off=(0x0; 0xfffffff)) R9_w=invP46 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv192512 R2_w=inv(id=0,umax_value=268247039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=188417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv192512 R8_w=inv(id=0,umin_value=4096,umax_value=268247039,var_off=(0x0; 0xfffffff)) R9_w=invP46 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=188417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv192512 R8_w=inv(id=0,umin_value=4096,umax_value=268247039,var_off=(0x0; 0xfffffff)) R9_w=invP46 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv196608 R6=inv(id=2,umin_value=192513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv192512 R8_w=inv(id=0,umax_value=268242943,var_off=(0x0; 0xfffffff)) R9_w=invP47 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv196608 R2_w=inv(id=0,umax_value=268242943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=192513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv196608 R8_w=inv(id=0,umin_value=4096,umax_value=268242943,var_off=(0x0; 0xfffffff)) R9_w=invP47 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=192513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv196608 R8_w=inv(id=0,umin_value=4096,umax_value=268242943,var_off=(0x0; 0xfffffff)) R9_w=invP47 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv200704 R6=inv(id=2,umin_value=196609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv196608 R8=inv(id=0,umax_value=268238847,var_off=(0x0; 0xfffffff)) R9=invP48 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv200704 R2_w=inv(id=0,umax_value=268238847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=196609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv200704 R8=inv(id=0,umin_value=4096,umax_value=268238847,var_off=(0x0; 0xfffffff)) R9=invP48 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=196609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv200704 R8=inv(id=0,umin_value=4096,umax_value=268238847,var_off=(0x0; 0xfffffff)) R9=invP48 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv204800 R6=inv(id=2,umin_value=200705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv200704 R8_w=inv(id=0,umax_value=268234751,var_off=(0x0; 0xfffffff)) R9_w=invP49 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv204800 R2_w=inv(id=0,umax_value=268234751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=200705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv204800 R8_w=inv(id=0,umin_value=4096,umax_value=268234751,var_off=(0x0; 0xfffffff)) R9_w=invP49 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=200705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv204800 R8_w=inv(id=0,umin_value=4096,umax_value=268234751,var_off=(0x0; 0xfffffff)) R9_w=invP49 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv208896 R6=inv(id=2,umin_value=204801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv204800 R8_w=inv(id=0,umax_value=268230655,var_off=(0x0; 0xfffffff)) R9_w=invP50 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv208896 R2_w=inv(id=0,umax_value=268230655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=204801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv208896 R8_w=inv(id=0,umin_value=4096,umax_value=268230655,var_off=(0x0; 0xfffffff)) R9_w=invP50 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=204801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv208896 R8_w=inv(id=0,umin_value=4096,umax_value=268230655,var_off=(0x0; 0xfffffff)) R9_w=invP50 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv212992 R6=inv(id=2,umin_value=208897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv208896 R8_w=inv(id=0,umax_value=268226559,var_off=(0x0; 0xfffffff)) R9_w=invP51 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv212992 R2_w=inv(id=0,umax_value=268226559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=208897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv212992 R8_w=inv(id=0,umin_value=4096,umax_value=268226559,var_off=(0x0; 0xfffffff)) R9_w=invP51 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=208897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv212992 R8_w=inv(id=0,umin_value=4096,umax_value=268226559,var_off=(0x0; 0xfffffff)) R9_w=invP51 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv217088 R6=inv(id=2,umin_value=212993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv212992 R8=inv(id=0,umax_value=268222463,var_off=(0x0; 0xfffffff)) R9=invP52 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv217088 R2_w=inv(id=0,umax_value=268222463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=212993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv217088 R8=inv(id=0,umin_value=4096,umax_value=268222463,var_off=(0x0; 0xfffffff)) R9=invP52 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=212993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv217088 R8=inv(id=0,umin_value=4096,umax_value=268222463,var_off=(0x0; 0xfffffff)) R9=invP52 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv221184 R6=inv(id=2,umin_value=217089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv217088 R8_w=inv(id=0,umax_value=268218367,var_off=(0x0; 0xfffffff)) R9_w=invP53 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv221184 R2_w=inv(id=0,umax_value=268218367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=217089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv221184 R8_w=inv(id=0,umin_value=4096,umax_value=268218367,var_off=(0x0; 0xfffffff)) R9_w=invP53 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=217089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv221184 R8_w=inv(id=0,umin_value=4096,umax_value=268218367,var_off=(0x0; 0xfffffff)) R9_w=invP53 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv225280 R6=inv(id=2,umin_value=221185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv221184 R8_w=inv(id=0,umax_value=268214271,var_off=(0x0; 0xfffffff)) R9_w=invP54 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv225280 R2_w=inv(id=0,umax_value=268214271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=221185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv225280 R8_w=inv(id=0,umin_value=4096,umax_value=268214271,var_off=(0x0; 0xfffffff)) R9_w=invP54 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=221185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv225280 R8_w=inv(id=0,umin_value=4096,umax_value=268214271,var_off=(0x0; 0xfffffff)) R9_w=invP54 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv229376 R6=inv(id=2,umin_value=225281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv225280 R8_w=inv(id=0,umax_value=268210175,var_off=(0x0; 0xfffffff)) R9_w=invP55 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv229376 R2_w=inv(id=0,umax_value=268210175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=225281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv229376 R8_w=inv(id=0,umin_value=4096,umax_value=268210175,var_off=(0x0; 0xfffffff)) R9_w=invP55 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=225281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv229376 R8_w=inv(id=0,umin_value=4096,umax_value=268210175,var_off=(0x0; 0xfffffff)) R9_w=invP55 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv233472 R6=inv(id=2,umin_value=229377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv229376 R8=inv(id=0,umax_value=268206079,var_off=(0x0; 0xfffffff)) R9=invP56 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv233472 R2_w=inv(id=0,umax_value=268206079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=229377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv233472 R8=inv(id=0,umin_value=4096,umax_value=268206079,var_off=(0x0; 0xfffffff)) R9=invP56 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=229377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv233472 R8=inv(id=0,umin_value=4096,umax_value=268206079,var_off=(0x0; 0xfffffff)) R9=invP56 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv237568 R6=inv(id=2,umin_value=233473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv233472 R8_w=inv(id=0,umax_value=268201983,var_off=(0x0; 0xfffffff)) R9_w=invP57 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv237568 R2_w=inv(id=0,umax_value=268201983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=233473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv237568 R8_w=inv(id=0,umin_value=4096,umax_value=268201983,var_off=(0x0; 0xfffffff)) R9_w=invP57 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=233473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv237568 R8_w=inv(id=0,umin_value=4096,umax_value=268201983,var_off=(0x0; 0xfffffff)) R9_w=invP57 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv241664 R6=inv(id=2,umin_value=237569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv237568 R8_w=inv(id=0,umax_value=268197887,var_off=(0x0; 0xfffffff)) R9_w=invP58 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv241664 R2_w=inv(id=0,umax_value=268197887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=237569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv241664 R8_w=inv(id=0,umin_value=4096,umax_value=268197887,var_off=(0x0; 0xfffffff)) R9_w=invP58 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=237569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv241664 R8_w=inv(id=0,umin_value=4096,umax_value=268197887,var_off=(0x0; 0xfffffff)) R9_w=invP58 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv245760 R6=inv(id=2,umin_value=241665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv241664 R8_w=inv(id=0,umax_value=268193791,var_off=(0x0; 0xfffffff)) R9_w=invP59 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv245760 R2_w=inv(id=0,umax_value=268193791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=241665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv245760 R8_w=inv(id=0,umin_value=4096,umax_value=268193791,var_off=(0x0; 0xfffffff)) R9_w=invP59 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=241665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv245760 R8_w=inv(id=0,umin_value=4096,umax_value=268193791,var_off=(0x0; 0xfffffff)) R9_w=invP59 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv249856 R6=inv(id=2,umin_value=245761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv245760 R8=inv(id=0,umax_value=268189695,var_off=(0x0; 0xfffffff)) R9=invP60 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv249856 R2_w=inv(id=0,umax_value=268189695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=245761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv249856 R8=inv(id=0,umin_value=4096,umax_value=268189695,var_off=(0x0; 0xfffffff)) R9=invP60 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=245761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv249856 R8=inv(id=0,umin_value=4096,umax_value=268189695,var_off=(0x0; 0xfffffff)) R9=invP60 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv253952 R6=inv(id=2,umin_value=249857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv249856 R8_w=inv(id=0,umax_value=268185599,var_off=(0x0; 0xfffffff)) R9_w=invP61 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv253952 R2_w=inv(id=0,umax_value=268185599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=249857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv253952 R8_w=inv(id=0,umin_value=4096,umax_value=268185599,var_off=(0x0; 0xfffffff)) R9_w=invP61 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=249857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv253952 R8_w=inv(id=0,umin_value=4096,umax_value=268185599,var_off=(0x0; 0xfffffff)) R9_w=invP61 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv258048 R6=inv(id=2,umin_value=253953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv253952 R8_w=inv(id=0,umax_value=268181503,var_off=(0x0; 0xfffffff)) R9_w=invP62 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv258048 R2_w=inv(id=0,umax_value=268181503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=253953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv258048 R8_w=inv(id=0,umin_value=4096,umax_value=268181503,var_off=(0x0; 0xfffffff)) R9_w=invP62 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=253953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv258048 R8_w=inv(id=0,umin_value=4096,umax_value=268181503,var_off=(0x0; 0xfffffff)) R9_w=invP62 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv262144 R6=inv(id=2,umin_value=258049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv258048 R8_w=inv(id=0,umax_value=268177407,var_off=(0x0; 0xfffffff)) R9_w=invP63 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv262144 R2_w=inv(id=0,umax_value=268177407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=258049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv262144 R8_w=inv(id=0,umin_value=4096,umax_value=268177407,var_off=(0x0; 0xfffffff)) R9_w=invP63 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=258049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv262144 R8_w=inv(id=0,umin_value=4096,umax_value=268177407,var_off=(0x0; 0xfffffff)) R9_w=invP63 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv266240 R6=inv(id=2,umin_value=262145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv262144 R8=inv(id=0,umax_value=268173311,var_off=(0x0; 0xfffffff)) R9=invP64 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv266240 R2_w=inv(id=0,umax_value=268173311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=262145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv266240 R8=inv(id=0,umin_value=4096,umax_value=268173311,var_off=(0x0; 0xfffffff)) R9=invP64 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=262145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv266240 R8=inv(id=0,umin_value=4096,umax_value=268173311,var_off=(0x0; 0xfffffff)) R9=invP64 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv270336 R6=inv(id=2,umin_value=266241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv266240 R8_w=inv(id=0,umax_value=268169215,var_off=(0x0; 0xfffffff)) R9_w=invP65 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv270336 R2_w=inv(id=0,umax_value=268169215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=266241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv270336 R8_w=inv(id=0,umin_value=4096,umax_value=268169215,var_off=(0x0; 0xfffffff)) R9_w=invP65 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=266241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv270336 R8_w=inv(id=0,umin_value=4096,umax_value=268169215,var_off=(0x0; 0xfffffff)) R9_w=invP65 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv274432 R6=inv(id=2,umin_value=270337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv270336 R8_w=inv(id=0,umax_value=268165119,var_off=(0x0; 0xfffffff)) R9_w=invP66 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv274432 R2_w=inv(id=0,umax_value=268165119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=270337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv274432 R8_w=inv(id=0,umin_value=4096,umax_value=268165119,var_off=(0x0; 0xfffffff)) R9_w=invP66 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=270337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv274432 R8_w=inv(id=0,umin_value=4096,umax_value=268165119,var_off=(0x0; 0xfffffff)) R9_w=invP66 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv278528 R6=inv(id=2,umin_value=274433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv274432 R8_w=inv(id=0,umax_value=268161023,var_off=(0x0; 0xfffffff)) R9_w=invP67 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv278528 R2_w=inv(id=0,umax_value=268161023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=274433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv278528 R8_w=inv(id=0,umin_value=4096,umax_value=268161023,var_off=(0x0; 0xfffffff)) R9_w=invP67 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=274433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv278528 R8_w=inv(id=0,umin_value=4096,umax_value=268161023,var_off=(0x0; 0xfffffff)) R9_w=invP67 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv282624 R6=inv(id=2,umin_value=278529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv278528 R8=inv(id=0,umax_value=268156927,var_off=(0x0; 0xfffffff)) R9=invP68 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv282624 R2_w=inv(id=0,umax_value=268156927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=278529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv282624 R8=inv(id=0,umin_value=4096,umax_value=268156927,var_off=(0x0; 0xfffffff)) R9=invP68 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=278529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv282624 R8=inv(id=0,umin_value=4096,umax_value=268156927,var_off=(0x0; 0xfffffff)) R9=invP68 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv286720 R6=inv(id=2,umin_value=282625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv282624 R8_w=inv(id=0,umax_value=268152831,var_off=(0x0; 0xfffffff)) R9_w=invP69 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv286720 R2_w=inv(id=0,umax_value=268152831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=282625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv286720 R8_w=inv(id=0,umin_value=4096,umax_value=268152831,var_off=(0x0; 0xfffffff)) R9_w=invP69 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=282625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv286720 R8_w=inv(id=0,umin_value=4096,umax_value=268152831,var_off=(0x0; 0xfffffff)) R9_w=invP69 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv290816 R6=inv(id=2,umin_value=286721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv286720 R8_w=inv(id=0,umax_value=268148735,var_off=(0x0; 0xfffffff)) R9_w=invP70 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv290816 R2_w=inv(id=0,umax_value=268148735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=286721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv290816 R8_w=inv(id=0,umin_value=4096,umax_value=268148735,var_off=(0x0; 0xfffffff)) R9_w=invP70 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=286721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv290816 R8_w=inv(id=0,umin_value=4096,umax_value=268148735,var_off=(0x0; 0xfffffff)) R9_w=invP70 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv294912 R6=inv(id=2,umin_value=290817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv290816 R8_w=inv(id=0,umax_value=268144639,var_off=(0x0; 0xfffffff)) R9_w=invP71 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv294912 R2_w=inv(id=0,umax_value=268144639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=290817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv294912 R8_w=inv(id=0,umin_value=4096,umax_value=268144639,var_off=(0x0; 0xfffffff)) R9_w=invP71 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=290817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv294912 R8_w=inv(id=0,umin_value=4096,umax_value=268144639,var_off=(0x0; 0xfffffff)) R9_w=invP71 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv299008 R6=inv(id=2,umin_value=294913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv294912 R8=inv(id=0,umax_value=268140543,var_off=(0x0; 0xfffffff)) R9=invP72 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv299008 R2_w=inv(id=0,umax_value=268140543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=294913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv299008 R8=inv(id=0,umin_value=4096,umax_value=268140543,var_off=(0x0; 0xfffffff)) R9=invP72 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=294913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv299008 R8=inv(id=0,umin_value=4096,umax_value=268140543,var_off=(0x0; 0xfffffff)) R9=invP72 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv303104 R6=inv(id=2,umin_value=299009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv299008 R8_w=inv(id=0,umax_value=268136447,var_off=(0x0; 0xfffffff)) R9_w=invP73 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv303104 R2_w=inv(id=0,umax_value=268136447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=299009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv303104 R8_w=inv(id=0,umin_value=4096,umax_value=268136447,var_off=(0x0; 0xfffffff)) R9_w=invP73 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=299009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv303104 R8_w=inv(id=0,umin_value=4096,umax_value=268136447,var_off=(0x0; 0xfffffff)) R9_w=invP73 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv307200 R6=inv(id=2,umin_value=303105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv303104 R8_w=inv(id=0,umax_value=268132351,var_off=(0x0; 0xfffffff)) R9_w=invP74 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv307200 R2_w=inv(id=0,umax_value=268132351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=303105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv307200 R8_w=inv(id=0,umin_value=4096,umax_value=268132351,var_off=(0x0; 0xfffffff)) R9_w=invP74 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=303105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv307200 R8_w=inv(id=0,umin_value=4096,umax_value=268132351,var_off=(0x0; 0xfffffff)) R9_w=invP74 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv311296 R6=inv(id=2,umin_value=307201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv307200 R8_w=inv(id=0,umax_value=268128255,var_off=(0x0; 0xfffffff)) R9_w=invP75 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv311296 R2_w=inv(id=0,umax_value=268128255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=307201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv311296 R8_w=inv(id=0,umin_value=4096,umax_value=268128255,var_off=(0x0; 0xfffffff)) R9_w=invP75 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=307201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv311296 R8_w=inv(id=0,umin_value=4096,umax_value=268128255,var_off=(0x0; 0xfffffff)) R9_w=invP75 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv315392 R6=inv(id=2,umin_value=311297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv311296 R8=inv(id=0,umax_value=268124159,var_off=(0x0; 0xfffffff)) R9=invP76 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv315392 R2_w=inv(id=0,umax_value=268124159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=311297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv315392 R8=inv(id=0,umin_value=4096,umax_value=268124159,var_off=(0x0; 0xfffffff)) R9=invP76 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=311297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv315392 R8=inv(id=0,umin_value=4096,umax_value=268124159,var_off=(0x0; 0xfffffff)) R9=invP76 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv319488 R6=inv(id=2,umin_value=315393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv315392 R8_w=inv(id=0,umax_value=268120063,var_off=(0x0; 0xfffffff)) R9_w=invP77 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv319488 R2_w=inv(id=0,umax_value=268120063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=315393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv319488 R8_w=inv(id=0,umin_value=4096,umax_value=268120063,var_off=(0x0; 0xfffffff)) R9_w=invP77 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=315393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv319488 R8_w=inv(id=0,umin_value=4096,umax_value=268120063,var_off=(0x0; 0xfffffff)) R9_w=invP77 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv323584 R6=inv(id=2,umin_value=319489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv319488 R8_w=inv(id=0,umax_value=268115967,var_off=(0x0; 0xfffffff)) R9_w=invP78 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv323584 R2_w=inv(id=0,umax_value=268115967,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=319489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv323584 R8_w=inv(id=0,umin_value=4096,umax_value=268115967,var_off=(0x0; 0xfffffff)) R9_w=invP78 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=319489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv323584 R8_w=inv(id=0,umin_value=4096,umax_value=268115967,var_off=(0x0; 0xfffffff)) R9_w=invP78 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv327680 R6=inv(id=2,umin_value=323585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv323584 R8_w=inv(id=0,umax_value=268111871,var_off=(0x0; 0xfffffff)) R9_w=invP79 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv327680 R2_w=inv(id=0,umax_value=268111871,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=323585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv327680 R8_w=inv(id=0,umin_value=4096,umax_value=268111871,var_off=(0x0; 0xfffffff)) R9_w=invP79 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=323585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv327680 R8_w=inv(id=0,umin_value=4096,umax_value=268111871,var_off=(0x0; 0xfffffff)) R9_w=invP79 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv331776 R6=inv(id=2,umin_value=327681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv327680 R8=inv(id=0,umax_value=268107775,var_off=(0x0; 0xfffffff)) R9=invP80 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv331776 R2_w=inv(id=0,umax_value=268107775,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=327681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv331776 R8=inv(id=0,umin_value=4096,umax_value=268107775,var_off=(0x0; 0xfffffff)) R9=invP80 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=327681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv331776 R8=inv(id=0,umin_value=4096,umax_value=268107775,var_off=(0x0; 0xfffffff)) R9=invP80 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv335872 R6=inv(id=2,umin_value=331777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv331776 R8_w=inv(id=0,umax_value=268103679,var_off=(0x0; 0xfffffff)) R9_w=invP81 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv335872 R2_w=inv(id=0,umax_value=268103679,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=331777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv335872 R8_w=inv(id=0,umin_value=4096,umax_value=268103679,var_off=(0x0; 0xfffffff)) R9_w=invP81 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=331777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv335872 R8_w=inv(id=0,umin_value=4096,umax_value=268103679,var_off=(0x0; 0xfffffff)) R9_w=invP81 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv339968 R6=inv(id=2,umin_value=335873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv335872 R8_w=inv(id=0,umax_value=268099583,var_off=(0x0; 0xfffffff)) R9_w=invP82 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv339968 R2_w=inv(id=0,umax_value=268099583,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=335873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv339968 R8_w=inv(id=0,umin_value=4096,umax_value=268099583,var_off=(0x0; 0xfffffff)) R9_w=invP82 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=335873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv339968 R8_w=inv(id=0,umin_value=4096,umax_value=268099583,var_off=(0x0; 0xfffffff)) R9_w=invP82 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv344064 R6=inv(id=2,umin_value=339969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv339968 R8_w=inv(id=0,umax_value=268095487,var_off=(0x0; 0xfffffff)) R9_w=invP83 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv344064 R2_w=inv(id=0,umax_value=268095487,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=339969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv344064 R8_w=inv(id=0,umin_value=4096,umax_value=268095487,var_off=(0x0; 0xfffffff)) R9_w=invP83 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=339969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv344064 R8_w=inv(id=0,umin_value=4096,umax_value=268095487,var_off=(0x0; 0xfffffff)) R9_w=invP83 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv348160 R6=inv(id=2,umin_value=344065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv344064 R8=inv(id=0,umax_value=268091391,var_off=(0x0; 0xfffffff)) R9=invP84 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv348160 R2_w=inv(id=0,umax_value=268091391,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=344065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv348160 R8=inv(id=0,umin_value=4096,umax_value=268091391,var_off=(0x0; 0xfffffff)) R9=invP84 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=344065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv348160 R8=inv(id=0,umin_value=4096,umax_value=268091391,var_off=(0x0; 0xfffffff)) R9=invP84 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv352256 R6=inv(id=2,umin_value=348161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv348160 R8_w=inv(id=0,umax_value=268087295,var_off=(0x0; 0xfffffff)) R9_w=invP85 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv352256 R2_w=inv(id=0,umax_value=268087295,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=348161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv352256 R8_w=inv(id=0,umin_value=4096,umax_value=268087295,var_off=(0x0; 0xfffffff)) R9_w=invP85 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=348161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv352256 R8_w=inv(id=0,umin_value=4096,umax_value=268087295,var_off=(0x0; 0xfffffff)) R9_w=invP85 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv356352 R6=inv(id=2,umin_value=352257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv352256 R8_w=inv(id=0,umax_value=268083199,var_off=(0x0; 0xfffffff)) R9_w=invP86 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv356352 R2_w=inv(id=0,umax_value=268083199,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=352257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv356352 R8_w=inv(id=0,umin_value=4096,umax_value=268083199,var_off=(0x0; 0xfffffff)) R9_w=invP86 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=352257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv356352 R8_w=inv(id=0,umin_value=4096,umax_value=268083199,var_off=(0x0; 0xfffffff)) R9_w=invP86 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv360448 R6=inv(id=2,umin_value=356353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv356352 R8_w=inv(id=0,umax_value=268079103,var_off=(0x0; 0xfffffff)) R9_w=invP87 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv360448 R2_w=inv(id=0,umax_value=268079103,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=356353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv360448 R8_w=inv(id=0,umin_value=4096,umax_value=268079103,var_off=(0x0; 0xfffffff)) R9_w=invP87 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=356353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv360448 R8_w=inv(id=0,umin_value=4096,umax_value=268079103,var_off=(0x0; 0xfffffff)) R9_w=invP87 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv364544 R6=inv(id=2,umin_value=360449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv360448 R8=inv(id=0,umax_value=268075007,var_off=(0x0; 0xfffffff)) R9=invP88 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv364544 R2_w=inv(id=0,umax_value=268075007,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=360449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv364544 R8=inv(id=0,umin_value=4096,umax_value=268075007,var_off=(0x0; 0xfffffff)) R9=invP88 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=360449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv364544 R8=inv(id=0,umin_value=4096,umax_value=268075007,var_off=(0x0; 0xfffffff)) R9=invP88 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv368640 R6=inv(id=2,umin_value=364545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv364544 R8_w=inv(id=0,umax_value=268070911,var_off=(0x0; 0xfffffff)) R9_w=invP89 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv368640 R2_w=inv(id=0,umax_value=268070911,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=364545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv368640 R8_w=inv(id=0,umin_value=4096,umax_value=268070911,var_off=(0x0; 0xfffffff)) R9_w=invP89 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=364545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv368640 R8_w=inv(id=0,umin_value=4096,umax_value=268070911,var_off=(0x0; 0xfffffff)) R9_w=invP89 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv372736 R6=inv(id=2,umin_value=368641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv368640 R8_w=inv(id=0,umax_value=268066815,var_off=(0x0; 0xfffffff)) R9_w=invP90 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv372736 R2_w=inv(id=0,umax_value=268066815,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=368641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv372736 R8_w=inv(id=0,umin_value=4096,umax_value=268066815,var_off=(0x0; 0xfffffff)) R9_w=invP90 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=368641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv372736 R8_w=inv(id=0,umin_value=4096,umax_value=268066815,var_off=(0x0; 0xfffffff)) R9_w=invP90 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv376832 R6=inv(id=2,umin_value=372737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv372736 R8_w=inv(id=0,umax_value=268062719,var_off=(0x0; 0xfffffff)) R9_w=invP91 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv376832 R2_w=inv(id=0,umax_value=268062719,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=372737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv376832 R8_w=inv(id=0,umin_value=4096,umax_value=268062719,var_off=(0x0; 0xfffffff)) R9_w=invP91 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=372737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv376832 R8_w=inv(id=0,umin_value=4096,umax_value=268062719,var_off=(0x0; 0xfffffff)) R9_w=invP91 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv380928 R6=inv(id=2,umin_value=376833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv376832 R8=inv(id=0,umax_value=268058623,var_off=(0x0; 0xfffffff)) R9=invP92 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv380928 R2_w=inv(id=0,umax_value=268058623,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=376833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv380928 R8=inv(id=0,umin_value=4096,umax_value=268058623,var_off=(0x0; 0xfffffff)) R9=invP92 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=376833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv380928 R8=inv(id=0,umin_value=4096,umax_value=268058623,var_off=(0x0; 0xfffffff)) R9=invP92 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv385024 R6=inv(id=2,umin_value=380929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv380928 R8_w=inv(id=0,umax_value=268054527,var_off=(0x0; 0xfffffff)) R9_w=invP93 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv385024 R2_w=inv(id=0,umax_value=268054527,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=380929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv385024 R8_w=inv(id=0,umin_value=4096,umax_value=268054527,var_off=(0x0; 0xfffffff)) R9_w=invP93 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=380929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv385024 R8_w=inv(id=0,umin_value=4096,umax_value=268054527,var_off=(0x0; 0xfffffff)) R9_w=invP93 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv389120 R6=inv(id=2,umin_value=385025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv385024 R8_w=inv(id=0,umax_value=268050431,var_off=(0x0; 0xfffffff)) R9_w=invP94 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv389120 R2_w=inv(id=0,umax_value=268050431,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=385025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv389120 R8_w=inv(id=0,umin_value=4096,umax_value=268050431,var_off=(0x0; 0xfffffff)) R9_w=invP94 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=385025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv389120 R8_w=inv(id=0,umin_value=4096,umax_value=268050431,var_off=(0x0; 0xfffffff)) R9_w=invP94 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv393216 R6=inv(id=2,umin_value=389121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv389120 R8_w=inv(id=0,umax_value=268046335,var_off=(0x0; 0xfffffff)) R9_w=invP95 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv393216 R2_w=inv(id=0,umax_value=268046335,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=389121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv393216 R8_w=inv(id=0,umin_value=4096,umax_value=268046335,var_off=(0x0; 0xfffffff)) R9_w=invP95 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=389121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv393216 R8_w=inv(id=0,umin_value=4096,umax_value=268046335,var_off=(0x0; 0xfffffff)) R9_w=invP95 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv397312 R6=inv(id=2,umin_value=393217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv393216 R8=inv(id=0,umax_value=268042239,var_off=(0x0; 0xfffffff)) R9=invP96 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv397312 R2_w=inv(id=0,umax_value=268042239,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=393217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv397312 R8=inv(id=0,umin_value=4096,umax_value=268042239,var_off=(0x0; 0xfffffff)) R9=invP96 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=393217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv397312 R8=inv(id=0,umin_value=4096,umax_value=268042239,var_off=(0x0; 0xfffffff)) R9=invP96 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv401408 R6=inv(id=2,umin_value=397313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv397312 R8_w=inv(id=0,umax_value=268038143,var_off=(0x0; 0xfffffff)) R9_w=invP97 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv401408 R2_w=inv(id=0,umax_value=268038143,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=397313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv401408 R8_w=inv(id=0,umin_value=4096,umax_value=268038143,var_off=(0x0; 0xfffffff)) R9_w=invP97 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=397313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv401408 R8_w=inv(id=0,umin_value=4096,umax_value=268038143,var_off=(0x0; 0xfffffff)) R9_w=invP97 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv405504 R6=inv(id=2,umin_value=401409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv401408 R8_w=inv(id=0,umax_value=268034047,var_off=(0x0; 0xfffffff)) R9_w=invP98 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv405504 R2_w=inv(id=0,umax_value=268034047,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=401409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv405504 R8_w=inv(id=0,umin_value=4096,umax_value=268034047,var_off=(0x0; 0xfffffff)) R9_w=invP98 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=401409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv405504 R8_w=inv(id=0,umin_value=4096,umax_value=268034047,var_off=(0x0; 0xfffffff)) R9_w=invP98 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv409600 R6=inv(id=2,umin_value=405505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv405504 R8_w=inv(id=0,umax_value=268029951,var_off=(0x0; 0xfffffff)) R9_w=invP99 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv409600 R2_w=inv(id=0,umax_value=268029951,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=405505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv409600 R8_w=inv(id=0,umin_value=4096,umax_value=268029951,var_off=(0x0; 0xfffffff)) R9_w=invP99 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=405505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv409600 R8_w=inv(id=0,umin_value=4096,umax_value=268029951,var_off=(0x0; 0xfffffff)) R9_w=invP99 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv413696 R6=inv(id=2,umin_value=409601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv409600 R8=inv(id=0,umax_value=268025855,var_off=(0x0; 0xfffffff)) R9=invP100 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv413696 R2_w=inv(id=0,umax_value=268025855,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=409601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv413696 R8=inv(id=0,umin_value=4096,umax_value=268025855,var_off=(0x0; 0xfffffff)) R9=invP100 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=409601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv413696 R8=inv(id=0,umin_value=4096,umax_value=268025855,var_off=(0x0; 0xfffffff)) R9=invP100 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv417792 R6=inv(id=2,umin_value=413697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv413696 R8_w=inv(id=0,umax_value=268021759,var_off=(0x0; 0xfffffff)) R9_w=invP101 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv417792 R2_w=inv(id=0,umax_value=268021759,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=413697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv417792 R8_w=inv(id=0,umin_value=4096,umax_value=268021759,var_off=(0x0; 0xfffffff)) R9_w=invP101 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=413697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv417792 R8_w=inv(id=0,umin_value=4096,umax_value=268021759,var_off=(0x0; 0xfffffff)) R9_w=invP101 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv421888 R6=inv(id=2,umin_value=417793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv417792 R8_w=inv(id=0,umax_value=268017663,var_off=(0x0; 0xfffffff)) R9_w=invP102 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv421888 R2_w=inv(id=0,umax_value=268017663,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=417793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv421888 R8_w=inv(id=0,umin_value=4096,umax_value=268017663,var_off=(0x0; 0xfffffff)) R9_w=invP102 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=417793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv421888 R8_w=inv(id=0,umin_value=4096,umax_value=268017663,var_off=(0x0; 0xfffffff)) R9_w=invP102 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv425984 R6=inv(id=2,umin_value=421889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv421888 R8_w=inv(id=0,umax_value=268013567,var_off=(0x0; 0xfffffff)) R9_w=invP103 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv425984 R2_w=inv(id=0,umax_value=268013567,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=421889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv425984 R8_w=inv(id=0,umin_value=4096,umax_value=268013567,var_off=(0x0; 0xfffffff)) R9_w=invP103 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=421889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv425984 R8_w=inv(id=0,umin_value=4096,umax_value=268013567,var_off=(0x0; 0xfffffff)) R9_w=invP103 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv430080 R6=inv(id=2,umin_value=425985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv425984 R8=inv(id=0,umax_value=268009471,var_off=(0x0; 0xfffffff)) R9=invP104 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv430080 R2_w=inv(id=0,umax_value=268009471,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=425985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv430080 R8=inv(id=0,umin_value=4096,umax_value=268009471,var_off=(0x0; 0xfffffff)) R9=invP104 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=425985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv430080 R8=inv(id=0,umin_value=4096,umax_value=268009471,var_off=(0x0; 0xfffffff)) R9=invP104 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv434176 R6=inv(id=2,umin_value=430081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv430080 R8_w=inv(id=0,umax_value=268005375,var_off=(0x0; 0xfffffff)) R9_w=invP105 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv434176 R2_w=inv(id=0,umax_value=268005375,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=430081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv434176 R8_w=inv(id=0,umin_value=4096,umax_value=268005375,var_off=(0x0; 0xfffffff)) R9_w=invP105 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=430081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv434176 R8_w=inv(id=0,umin_value=4096,umax_value=268005375,var_off=(0x0; 0xfffffff)) R9_w=invP105 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv438272 R6=inv(id=2,umin_value=434177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv434176 R8_w=inv(id=0,umax_value=268001279,var_off=(0x0; 0xfffffff)) R9_w=invP106 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv438272 R2_w=inv(id=0,umax_value=268001279,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=434177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv438272 R8_w=inv(id=0,umin_value=4096,umax_value=268001279,var_off=(0x0; 0xfffffff)) R9_w=invP106 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=434177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv438272 R8_w=inv(id=0,umin_value=4096,umax_value=268001279,var_off=(0x0; 0xfffffff)) R9_w=invP106 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv442368 R6=inv(id=2,umin_value=438273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv438272 R8_w=inv(id=0,umax_value=267997183,var_off=(0x0; 0xfffffff)) R9_w=invP107 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv442368 R2_w=inv(id=0,umax_value=267997183,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=438273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv442368 R8_w=inv(id=0,umin_value=4096,umax_value=267997183,var_off=(0x0; 0xfffffff)) R9_w=invP107 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=438273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv442368 R8_w=inv(id=0,umin_value=4096,umax_value=267997183,var_off=(0x0; 0xfffffff)) R9_w=invP107 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv446464 R6=inv(id=2,umin_value=442369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv442368 R8=inv(id=0,umax_value=267993087,var_off=(0x0; 0xfffffff)) R9=invP108 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv446464 R2_w=inv(id=0,umax_value=267993087,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=442369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv446464 R8=inv(id=0,umin_value=4096,umax_value=267993087,var_off=(0x0; 0xfffffff)) R9=invP108 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=442369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv446464 R8=inv(id=0,umin_value=4096,umax_value=267993087,var_off=(0x0; 0xfffffff)) R9=invP108 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv450560 R6=inv(id=2,umin_value=446465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv446464 R8_w=inv(id=0,umax_value=267988991,var_off=(0x0; 0xfffffff)) R9_w=invP109 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv450560 R2_w=inv(id=0,umax_value=267988991,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=446465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv450560 R8_w=inv(id=0,umin_value=4096,umax_value=267988991,var_off=(0x0; 0xfffffff)) R9_w=invP109 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=446465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv450560 R8_w=inv(id=0,umin_value=4096,umax_value=267988991,var_off=(0x0; 0xfffffff)) R9_w=invP109 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv454656 R6=inv(id=2,umin_value=450561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv450560 R8_w=inv(id=0,umax_value=267984895,var_off=(0x0; 0xfffffff)) R9_w=invP110 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv454656 R2_w=inv(id=0,umax_value=267984895,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=450561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv454656 R8_w=inv(id=0,umin_value=4096,umax_value=267984895,var_off=(0x0; 0xfffffff)) R9_w=invP110 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=450561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv454656 R8_w=inv(id=0,umin_value=4096,umax_value=267984895,var_off=(0x0; 0xfffffff)) R9_w=invP110 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv458752 R6=inv(id=2,umin_value=454657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv454656 R8_w=inv(id=0,umax_value=267980799,var_off=(0x0; 0xfffffff)) R9_w=invP111 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv458752 R2_w=inv(id=0,umax_value=267980799,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=454657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv458752 R8_w=inv(id=0,umin_value=4096,umax_value=267980799,var_off=(0x0; 0xfffffff)) R9_w=invP111 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=454657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv458752 R8_w=inv(id=0,umin_value=4096,umax_value=267980799,var_off=(0x0; 0xfffffff)) R9_w=invP111 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv462848 R6=inv(id=2,umin_value=458753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv458752 R8=inv(id=0,umax_value=267976703,var_off=(0x0; 0xfffffff)) R9=invP112 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv462848 R2_w=inv(id=0,umax_value=267976703,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=458753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv462848 R8=inv(id=0,umin_value=4096,umax_value=267976703,var_off=(0x0; 0xfffffff)) R9=invP112 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=458753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv462848 R8=inv(id=0,umin_value=4096,umax_value=267976703,var_off=(0x0; 0xfffffff)) R9=invP112 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv466944 R6=inv(id=2,umin_value=462849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv462848 R8_w=inv(id=0,umax_value=267972607,var_off=(0x0; 0xfffffff)) R9_w=invP113 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv466944 R2_w=inv(id=0,umax_value=267972607,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=462849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv466944 R8_w=inv(id=0,umin_value=4096,umax_value=267972607,var_off=(0x0; 0xfffffff)) R9_w=invP113 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=462849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv466944 R8_w=inv(id=0,umin_value=4096,umax_value=267972607,var_off=(0x0; 0xfffffff)) R9_w=invP113 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv471040 R6=inv(id=2,umin_value=466945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv466944 R8_w=inv(id=0,umax_value=267968511,var_off=(0x0; 0xfffffff)) R9_w=invP114 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv471040 R2_w=inv(id=0,umax_value=267968511,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=466945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv471040 R8_w=inv(id=0,umin_value=4096,umax_value=267968511,var_off=(0x0; 0xfffffff)) R9_w=invP114 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=466945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv471040 R8_w=inv(id=0,umin_value=4096,umax_value=267968511,var_off=(0x0; 0xfffffff)) R9_w=invP114 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv475136 R6=inv(id=2,umin_value=471041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv471040 R8_w=inv(id=0,umax_value=267964415,var_off=(0x0; 0xfffffff)) R9_w=invP115 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv475136 R2_w=inv(id=0,umax_value=267964415,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=471041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv475136 R8_w=inv(id=0,umin_value=4096,umax_value=267964415,var_off=(0x0; 0xfffffff)) R9_w=invP115 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=471041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv475136 R8_w=inv(id=0,umin_value=4096,umax_value=267964415,var_off=(0x0; 0xfffffff)) R9_w=invP115 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv479232 R6=inv(id=2,umin_value=475137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv475136 R8=inv(id=0,umax_value=267960319,var_off=(0x0; 0xfffffff)) R9=invP116 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv479232 R2_w=inv(id=0,umax_value=267960319,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=475137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv479232 R8=inv(id=0,umin_value=4096,umax_value=267960319,var_off=(0x0; 0xfffffff)) R9=invP116 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=475137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv479232 R8=inv(id=0,umin_value=4096,umax_value=267960319,var_off=(0x0; 0xfffffff)) R9=invP116 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv483328 R6=inv(id=2,umin_value=479233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv479232 R8_w=inv(id=0,umax_value=267956223,var_off=(0x0; 0xfffffff)) R9_w=invP117 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv483328 R2_w=inv(id=0,umax_value=267956223,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=479233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv483328 R8_w=inv(id=0,umin_value=4096,umax_value=267956223,var_off=(0x0; 0xfffffff)) R9_w=invP117 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=479233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv483328 R8_w=inv(id=0,umin_value=4096,umax_value=267956223,var_off=(0x0; 0xfffffff)) R9_w=invP117 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv487424 R6=inv(id=2,umin_value=483329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv483328 R8_w=inv(id=0,umax_value=267952127,var_off=(0x0; 0xfffffff)) R9_w=invP118 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv487424 R2_w=inv(id=0,umax_value=267952127,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=483329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv487424 R8_w=inv(id=0,umin_value=4096,umax_value=267952127,var_off=(0x0; 0xfffffff)) R9_w=invP118 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=483329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv487424 R8_w=inv(id=0,umin_value=4096,umax_value=267952127,var_off=(0x0; 0xfffffff)) R9_w=invP118 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv491520 R6=inv(id=2,umin_value=487425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv487424 R8_w=inv(id=0,umax_value=267948031,var_off=(0x0; 0xfffffff)) R9_w=invP119 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv491520 R2_w=inv(id=0,umax_value=267948031,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=487425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv491520 R8_w=inv(id=0,umin_value=4096,umax_value=267948031,var_off=(0x0; 0xfffffff)) R9_w=invP119 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=487425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv491520 R8_w=inv(id=0,umin_value=4096,umax_value=267948031,var_off=(0x0; 0xfffffff)) R9_w=invP119 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv495616 R6=inv(id=2,umin_value=491521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv491520 R8=inv(id=0,umax_value=267943935,var_off=(0x0; 0xfffffff)) R9=invP120 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv495616 R2_w=inv(id=0,umax_value=267943935,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=491521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv495616 R8=inv(id=0,umin_value=4096,umax_value=267943935,var_off=(0x0; 0xfffffff)) R9=invP120 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=491521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv495616 R8=inv(id=0,umin_value=4096,umax_value=267943935,var_off=(0x0; 0xfffffff)) R9=invP120 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv499712 R6=inv(id=2,umin_value=495617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv495616 R8_w=inv(id=0,umax_value=267939839,var_off=(0x0; 0xfffffff)) R9_w=invP121 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv499712 R2_w=inv(id=0,umax_value=267939839,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=495617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv499712 R8_w=inv(id=0,umin_value=4096,umax_value=267939839,var_off=(0x0; 0xfffffff)) R9_w=invP121 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=495617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv499712 R8_w=inv(id=0,umin_value=4096,umax_value=267939839,var_off=(0x0; 0xfffffff)) R9_w=invP121 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv503808 R6=inv(id=2,umin_value=499713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv499712 R8_w=inv(id=0,umax_value=267935743,var_off=(0x0; 0xfffffff)) R9_w=invP122 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv503808 R2_w=inv(id=0,umax_value=267935743,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=499713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv503808 R8_w=inv(id=0,umin_value=4096,umax_value=267935743,var_off=(0x0; 0xfffffff)) R9_w=invP122 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=499713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv503808 R8_w=inv(id=0,umin_value=4096,umax_value=267935743,var_off=(0x0; 0xfffffff)) R9_w=invP122 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv507904 R6=inv(id=2,umin_value=503809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv503808 R8_w=inv(id=0,umax_value=267931647,var_off=(0x0; 0xfffffff)) R9_w=invP123 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv507904 R2_w=inv(id=0,umax_value=267931647,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=503809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv507904 R8_w=inv(id=0,umin_value=4096,umax_value=267931647,var_off=(0x0; 0xfffffff)) R9_w=invP123 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=503809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv507904 R8_w=inv(id=0,umin_value=4096,umax_value=267931647,var_off=(0x0; 0xfffffff)) R9_w=invP123 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv512000 R6=inv(id=2,umin_value=507905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv507904 R8=inv(id=0,umax_value=267927551,var_off=(0x0; 0xfffffff)) R9=invP124 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv512000 R2_w=inv(id=0,umax_value=267927551,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=507905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv512000 R8=inv(id=0,umin_value=4096,umax_value=267927551,var_off=(0x0; 0xfffffff)) R9=invP124 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=507905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv512000 R8=inv(id=0,umin_value=4096,umax_value=267927551,var_off=(0x0; 0xfffffff)) R9=invP124 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv516096 R6=inv(id=2,umin_value=512001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv512000 R8_w=inv(id=0,umax_value=267923455,var_off=(0x0; 0xfffffff)) R9_w=invP125 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv516096 R2_w=inv(id=0,umax_value=267923455,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=512001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv516096 R8_w=inv(id=0,umin_value=4096,umax_value=267923455,var_off=(0x0; 0xfffffff)) R9_w=invP125 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=512001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv516096 R8_w=inv(id=0,umin_value=4096,umax_value=267923455,var_off=(0x0; 0xfffffff)) R9_w=invP125 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv520192 R6=inv(id=2,umin_value=516097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv516096 R8_w=inv(id=0,umax_value=267919359,var_off=(0x0; 0xfffffff)) R9_w=invP126 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv520192 R2_w=inv(id=0,umax_value=267919359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=516097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv520192 R8_w=inv(id=0,umin_value=4096,umax_value=267919359,var_off=(0x0; 0xfffffff)) R9_w=invP126 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=516097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv520192 R8_w=inv(id=0,umin_value=4096,umax_value=267919359,var_off=(0x0; 0xfffffff)) R9_w=invP126 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv524288 R6=inv(id=2,umin_value=520193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv520192 R8_w=inv(id=0,umax_value=267915263,var_off=(0x0; 0xfffffff)) R9_w=invP127 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv524288 R2_w=inv(id=0,umax_value=267915263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=520193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv524288 R8_w=inv(id=0,umin_value=4096,umax_value=267915263,var_off=(0x0; 0xfffffff)) R9_w=invP127 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=520193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv524288 R8_w=inv(id=0,umin_value=4096,umax_value=267915263,var_off=(0x0; 0xfffffff)) R9_w=invP127 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv528384 R6=inv(id=2,umin_value=524289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv524288 R8=inv(id=0,umax_value=267911167,var_off=(0x0; 0xfffffff)) R9=invP128 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv528384 R2_w=inv(id=0,umax_value=267911167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=524289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv528384 R8=inv(id=0,umin_value=4096,umax_value=267911167,var_off=(0x0; 0xfffffff)) R9=invP128 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=524289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv528384 R8=inv(id=0,umin_value=4096,umax_value=267911167,var_off=(0x0; 0xfffffff)) R9=invP128 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv532480 R6=inv(id=2,umin_value=528385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv528384 R8_w=inv(id=0,umax_value=267907071,var_off=(0x0; 0xfffffff)) R9_w=invP129 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv532480 R2_w=inv(id=0,umax_value=267907071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=528385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv532480 R8_w=inv(id=0,umin_value=4096,umax_value=267907071,var_off=(0x0; 0xfffffff)) R9_w=invP129 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=528385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv532480 R8_w=inv(id=0,umin_value=4096,umax_value=267907071,var_off=(0x0; 0xfffffff)) R9_w=invP129 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv536576 R6=inv(id=2,umin_value=532481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv532480 R8_w=inv(id=0,umax_value=267902975,var_off=(0x0; 0xfffffff)) R9_w=invP130 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv536576 R2_w=inv(id=0,umax_value=267902975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=532481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv536576 R8_w=inv(id=0,umin_value=4096,umax_value=267902975,var_off=(0x0; 0xfffffff)) R9_w=invP130 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=532481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv536576 R8_w=inv(id=0,umin_value=4096,umax_value=267902975,var_off=(0x0; 0xfffffff)) R9_w=invP130 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv540672 R6=inv(id=2,umin_value=536577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv536576 R8_w=inv(id=0,umax_value=267898879,var_off=(0x0; 0xfffffff)) R9_w=invP131 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv540672 R2_w=inv(id=0,umax_value=267898879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=536577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv540672 R8_w=inv(id=0,umin_value=4096,umax_value=267898879,var_off=(0x0; 0xfffffff)) R9_w=invP131 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=536577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv540672 R8_w=inv(id=0,umin_value=4096,umax_value=267898879,var_off=(0x0; 0xfffffff)) R9_w=invP131 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv544768 R6=inv(id=2,umin_value=540673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv540672 R8=inv(id=0,umax_value=267894783,var_off=(0x0; 0xfffffff)) R9=invP132 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv544768 R2_w=inv(id=0,umax_value=267894783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=540673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv544768 R8=inv(id=0,umin_value=4096,umax_value=267894783,var_off=(0x0; 0xfffffff)) R9=invP132 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=540673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv544768 R8=inv(id=0,umin_value=4096,umax_value=267894783,var_off=(0x0; 0xfffffff)) R9=invP132 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv548864 R6=inv(id=2,umin_value=544769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv544768 R8_w=inv(id=0,umax_value=267890687,var_off=(0x0; 0xfffffff)) R9_w=invP133 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv548864 R2_w=inv(id=0,umax_value=267890687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=544769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv548864 R8_w=inv(id=0,umin_value=4096,umax_value=267890687,var_off=(0x0; 0xfffffff)) R9_w=invP133 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=544769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv548864 R8_w=inv(id=0,umin_value=4096,umax_value=267890687,var_off=(0x0; 0xfffffff)) R9_w=invP133 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv552960 R6=inv(id=2,umin_value=548865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv548864 R8_w=inv(id=0,umax_value=267886591,var_off=(0x0; 0xfffffff)) R9_w=invP134 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv552960 R2_w=inv(id=0,umax_value=267886591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=548865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv552960 R8_w=inv(id=0,umin_value=4096,umax_value=267886591,var_off=(0x0; 0xfffffff)) R9_w=invP134 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=548865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv552960 R8_w=inv(id=0,umin_value=4096,umax_value=267886591,var_off=(0x0; 0xfffffff)) R9_w=invP134 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv557056 R6=inv(id=2,umin_value=552961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv552960 R8_w=inv(id=0,umax_value=267882495,var_off=(0x0; 0xfffffff)) R9_w=invP135 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv557056 R2_w=inv(id=0,umax_value=267882495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=552961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv557056 R8_w=inv(id=0,umin_value=4096,umax_value=267882495,var_off=(0x0; 0xfffffff)) R9_w=invP135 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=552961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv557056 R8_w=inv(id=0,umin_value=4096,umax_value=267882495,var_off=(0x0; 0xfffffff)) R9_w=invP135 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv561152 R6=inv(id=2,umin_value=557057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv557056 R8=inv(id=0,umax_value=267878399,var_off=(0x0; 0xfffffff)) R9=invP136 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv561152 R2_w=inv(id=0,umax_value=267878399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=557057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv561152 R8=inv(id=0,umin_value=4096,umax_value=267878399,var_off=(0x0; 0xfffffff)) R9=invP136 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=557057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv561152 R8=inv(id=0,umin_value=4096,umax_value=267878399,var_off=(0x0; 0xfffffff)) R9=invP136 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv565248 R6=inv(id=2,umin_value=561153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv561152 R8_w=inv(id=0,umax_value=267874303,var_off=(0x0; 0xfffffff)) R9_w=invP137 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv565248 R2_w=inv(id=0,umax_value=267874303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=561153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv565248 R8_w=inv(id=0,umin_value=4096,umax_value=267874303,var_off=(0x0; 0xfffffff)) R9_w=invP137 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=561153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv565248 R8_w=inv(id=0,umin_value=4096,umax_value=267874303,var_off=(0x0; 0xfffffff)) R9_w=invP137 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv569344 R6=inv(id=2,umin_value=565249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv565248 R8_w=inv(id=0,umax_value=267870207,var_off=(0x0; 0xfffffff)) R9_w=invP138 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv569344 R2_w=inv(id=0,umax_value=267870207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=565249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv569344 R8_w=inv(id=0,umin_value=4096,umax_value=267870207,var_off=(0x0; 0xfffffff)) R9_w=invP138 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=565249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv569344 R8_w=inv(id=0,umin_value=4096,umax_value=267870207,var_off=(0x0; 0xfffffff)) R9_w=invP138 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv573440 R6=inv(id=2,umin_value=569345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv569344 R8_w=inv(id=0,umax_value=267866111,var_off=(0x0; 0xfffffff)) R9_w=invP139 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv573440 R2_w=inv(id=0,umax_value=267866111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=569345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv573440 R8_w=inv(id=0,umin_value=4096,umax_value=267866111,var_off=(0x0; 0xfffffff)) R9_w=invP139 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=569345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv573440 R8_w=inv(id=0,umin_value=4096,umax_value=267866111,var_off=(0x0; 0xfffffff)) R9_w=invP139 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv577536 R6=inv(id=2,umin_value=573441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv573440 R8=inv(id=0,umax_value=267862015,var_off=(0x0; 0xfffffff)) R9=invP140 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv577536 R2_w=inv(id=0,umax_value=267862015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=573441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv577536 R8=inv(id=0,umin_value=4096,umax_value=267862015,var_off=(0x0; 0xfffffff)) R9=invP140 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=573441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv577536 R8=inv(id=0,umin_value=4096,umax_value=267862015,var_off=(0x0; 0xfffffff)) R9=invP140 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv581632 R6=inv(id=2,umin_value=577537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv577536 R8_w=inv(id=0,umax_value=267857919,var_off=(0x0; 0xfffffff)) R9_w=invP141 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv581632 R2_w=inv(id=0,umax_value=267857919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=577537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv581632 R8_w=inv(id=0,umin_value=4096,umax_value=267857919,var_off=(0x0; 0xfffffff)) R9_w=invP141 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=577537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv581632 R8_w=inv(id=0,umin_value=4096,umax_value=267857919,var_off=(0x0; 0xfffffff)) R9_w=invP141 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv585728 R6=inv(id=2,umin_value=581633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv581632 R8_w=inv(id=0,umax_value=267853823,var_off=(0x0; 0xfffffff)) R9_w=invP142 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv585728 R2_w=inv(id=0,umax_value=267853823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=581633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv585728 R8_w=inv(id=0,umin_value=4096,umax_value=267853823,var_off=(0x0; 0xfffffff)) R9_w=invP142 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=581633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv585728 R8_w=inv(id=0,umin_value=4096,umax_value=267853823,var_off=(0x0; 0xfffffff)) R9_w=invP142 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv589824 R6=inv(id=2,umin_value=585729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv585728 R8_w=inv(id=0,umax_value=267849727,var_off=(0x0; 0xfffffff)) R9_w=invP143 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv589824 R2_w=inv(id=0,umax_value=267849727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=585729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv589824 R8_w=inv(id=0,umin_value=4096,umax_value=267849727,var_off=(0x0; 0xfffffff)) R9_w=invP143 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=585729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv589824 R8_w=inv(id=0,umin_value=4096,umax_value=267849727,var_off=(0x0; 0xfffffff)) R9_w=invP143 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv593920 R6=inv(id=2,umin_value=589825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv589824 R8=inv(id=0,umax_value=267845631,var_off=(0x0; 0xfffffff)) R9=invP144 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv593920 R2_w=inv(id=0,umax_value=267845631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=589825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv593920 R8=inv(id=0,umin_value=4096,umax_value=267845631,var_off=(0x0; 0xfffffff)) R9=invP144 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=589825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv593920 R8=inv(id=0,umin_value=4096,umax_value=267845631,var_off=(0x0; 0xfffffff)) R9=invP144 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv598016 R6=inv(id=2,umin_value=593921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv593920 R8_w=inv(id=0,umax_value=267841535,var_off=(0x0; 0xfffffff)) R9_w=invP145 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv598016 R2_w=inv(id=0,umax_value=267841535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=593921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv598016 R8_w=inv(id=0,umin_value=4096,umax_value=267841535,var_off=(0x0; 0xfffffff)) R9_w=invP145 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=593921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv598016 R8_w=inv(id=0,umin_value=4096,umax_value=267841535,var_off=(0x0; 0xfffffff)) R9_w=invP145 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv602112 R6=inv(id=2,umin_value=598017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv598016 R8_w=inv(id=0,umax_value=267837439,var_off=(0x0; 0xfffffff)) R9_w=invP146 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv602112 R2_w=inv(id=0,umax_value=267837439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=598017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv602112 R8_w=inv(id=0,umin_value=4096,umax_value=267837439,var_off=(0x0; 0xfffffff)) R9_w=invP146 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=598017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv602112 R8_w=inv(id=0,umin_value=4096,umax_value=267837439,var_off=(0x0; 0xfffffff)) R9_w=invP146 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv606208 R6=inv(id=2,umin_value=602113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv602112 R8_w=inv(id=0,umax_value=267833343,var_off=(0x0; 0xfffffff)) R9_w=invP147 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv606208 R2_w=inv(id=0,umax_value=267833343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=602113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv606208 R8_w=inv(id=0,umin_value=4096,umax_value=267833343,var_off=(0x0; 0xfffffff)) R9_w=invP147 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=602113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv606208 R8_w=inv(id=0,umin_value=4096,umax_value=267833343,var_off=(0x0; 0xfffffff)) R9_w=invP147 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv610304 R6=inv(id=2,umin_value=606209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv606208 R8=inv(id=0,umax_value=267829247,var_off=(0x0; 0xfffffff)) R9=invP148 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv610304 R2_w=inv(id=0,umax_value=267829247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=606209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv610304 R8=inv(id=0,umin_value=4096,umax_value=267829247,var_off=(0x0; 0xfffffff)) R9=invP148 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=606209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv610304 R8=inv(id=0,umin_value=4096,umax_value=267829247,var_off=(0x0; 0xfffffff)) R9=invP148 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv614400 R6=inv(id=2,umin_value=610305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv610304 R8_w=inv(id=0,umax_value=267825151,var_off=(0x0; 0xfffffff)) R9_w=invP149 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv614400 R2_w=inv(id=0,umax_value=267825151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=610305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv614400 R8_w=inv(id=0,umin_value=4096,umax_value=267825151,var_off=(0x0; 0xfffffff)) R9_w=invP149 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=610305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv614400 R8_w=inv(id=0,umin_value=4096,umax_value=267825151,var_off=(0x0; 0xfffffff)) R9_w=invP149 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv618496 R6=inv(id=2,umin_value=614401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv614400 R8_w=inv(id=0,umax_value=267821055,var_off=(0x0; 0xfffffff)) R9_w=invP150 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv618496 R2_w=inv(id=0,umax_value=267821055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=614401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv618496 R8_w=inv(id=0,umin_value=4096,umax_value=267821055,var_off=(0x0; 0xfffffff)) R9_w=invP150 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=614401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv618496 R8_w=inv(id=0,umin_value=4096,umax_value=267821055,var_off=(0x0; 0xfffffff)) R9_w=invP150 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv622592 R6=inv(id=2,umin_value=618497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv618496 R8_w=inv(id=0,umax_value=267816959,var_off=(0x0; 0xfffffff)) R9_w=invP151 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv622592 R2_w=inv(id=0,umax_value=267816959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=618497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv622592 R8_w=inv(id=0,umin_value=4096,umax_value=267816959,var_off=(0x0; 0xfffffff)) R9_w=invP151 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=618497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv622592 R8_w=inv(id=0,umin_value=4096,umax_value=267816959,var_off=(0x0; 0xfffffff)) R9_w=invP151 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv626688 R6=inv(id=2,umin_value=622593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv622592 R8=inv(id=0,umax_value=267812863,var_off=(0x0; 0xfffffff)) R9=invP152 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv626688 R2_w=inv(id=0,umax_value=267812863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=622593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv626688 R8=inv(id=0,umin_value=4096,umax_value=267812863,var_off=(0x0; 0xfffffff)) R9=invP152 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=622593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv626688 R8=inv(id=0,umin_value=4096,umax_value=267812863,var_off=(0x0; 0xfffffff)) R9=invP152 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv630784 R6=inv(id=2,umin_value=626689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv626688 R8_w=inv(id=0,umax_value=267808767,var_off=(0x0; 0xfffffff)) R9_w=invP153 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv630784 R2_w=inv(id=0,umax_value=267808767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=626689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv630784 R8_w=inv(id=0,umin_value=4096,umax_value=267808767,var_off=(0x0; 0xfffffff)) R9_w=invP153 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=626689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv630784 R8_w=inv(id=0,umin_value=4096,umax_value=267808767,var_off=(0x0; 0xfffffff)) R9_w=invP153 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv634880 R6=inv(id=2,umin_value=630785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv630784 R8_w=inv(id=0,umax_value=267804671,var_off=(0x0; 0xfffffff)) R9_w=invP154 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv634880 R2_w=inv(id=0,umax_value=267804671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=630785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv634880 R8_w=inv(id=0,umin_value=4096,umax_value=267804671,var_off=(0x0; 0xfffffff)) R9_w=invP154 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=630785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv634880 R8_w=inv(id=0,umin_value=4096,umax_value=267804671,var_off=(0x0; 0xfffffff)) R9_w=invP154 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv638976 R6=inv(id=2,umin_value=634881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv634880 R8_w=inv(id=0,umax_value=267800575,var_off=(0x0; 0xfffffff)) R9_w=invP155 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv638976 R2_w=inv(id=0,umax_value=267800575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=634881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv638976 R8_w=inv(id=0,umin_value=4096,umax_value=267800575,var_off=(0x0; 0xfffffff)) R9_w=invP155 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=634881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv638976 R8_w=inv(id=0,umin_value=4096,umax_value=267800575,var_off=(0x0; 0xfffffff)) R9_w=invP155 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv643072 R6=inv(id=2,umin_value=638977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv638976 R8=inv(id=0,umax_value=267796479,var_off=(0x0; 0xfffffff)) R9=invP156 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv643072 R2_w=inv(id=0,umax_value=267796479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=638977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv643072 R8=inv(id=0,umin_value=4096,umax_value=267796479,var_off=(0x0; 0xfffffff)) R9=invP156 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=638977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv643072 R8=inv(id=0,umin_value=4096,umax_value=267796479,var_off=(0x0; 0xfffffff)) R9=invP156 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv647168 R6=inv(id=2,umin_value=643073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv643072 R8_w=inv(id=0,umax_value=267792383,var_off=(0x0; 0xfffffff)) R9_w=invP157 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv647168 R2_w=inv(id=0,umax_value=267792383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=643073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv647168 R8_w=inv(id=0,umin_value=4096,umax_value=267792383,var_off=(0x0; 0xfffffff)) R9_w=invP157 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=643073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv647168 R8_w=inv(id=0,umin_value=4096,umax_value=267792383,var_off=(0x0; 0xfffffff)) R9_w=invP157 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv651264 R6=inv(id=2,umin_value=647169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv647168 R8_w=inv(id=0,umax_value=267788287,var_off=(0x0; 0xfffffff)) R9_w=invP158 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv651264 R2_w=inv(id=0,umax_value=267788287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=647169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv651264 R8_w=inv(id=0,umin_value=4096,umax_value=267788287,var_off=(0x0; 0xfffffff)) R9_w=invP158 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=647169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv651264 R8_w=inv(id=0,umin_value=4096,umax_value=267788287,var_off=(0x0; 0xfffffff)) R9_w=invP158 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv655360 R6=inv(id=2,umin_value=651265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv651264 R8_w=inv(id=0,umax_value=267784191,var_off=(0x0; 0xfffffff)) R9_w=invP159 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv655360 R2_w=inv(id=0,umax_value=267784191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=651265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv655360 R8_w=inv(id=0,umin_value=4096,umax_value=267784191,var_off=(0x0; 0xfffffff)) R9_w=invP159 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=651265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv655360 R8_w=inv(id=0,umin_value=4096,umax_value=267784191,var_off=(0x0; 0xfffffff)) R9_w=invP159 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv659456 R6=inv(id=2,umin_value=655361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv655360 R8=inv(id=0,umax_value=267780095,var_off=(0x0; 0xfffffff)) R9=invP160 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv659456 R2_w=inv(id=0,umax_value=267780095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=655361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv659456 R8=inv(id=0,umin_value=4096,umax_value=267780095,var_off=(0x0; 0xfffffff)) R9=invP160 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=655361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv659456 R8=inv(id=0,umin_value=4096,umax_value=267780095,var_off=(0x0; 0xfffffff)) R9=invP160 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv663552 R6=inv(id=2,umin_value=659457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv659456 R8_w=inv(id=0,umax_value=267775999,var_off=(0x0; 0xfffffff)) R9_w=invP161 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv663552 R2_w=inv(id=0,umax_value=267775999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=659457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv663552 R8_w=inv(id=0,umin_value=4096,umax_value=267775999,var_off=(0x0; 0xfffffff)) R9_w=invP161 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=659457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv663552 R8_w=inv(id=0,umin_value=4096,umax_value=267775999,var_off=(0x0; 0xfffffff)) R9_w=invP161 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv667648 R6=inv(id=2,umin_value=663553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv663552 R8_w=inv(id=0,umax_value=267771903,var_off=(0x0; 0xfffffff)) R9_w=invP162 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv667648 R2_w=inv(id=0,umax_value=267771903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=663553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv667648 R8_w=inv(id=0,umin_value=4096,umax_value=267771903,var_off=(0x0; 0xfffffff)) R9_w=invP162 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=663553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv667648 R8_w=inv(id=0,umin_value=4096,umax_value=267771903,var_off=(0x0; 0xfffffff)) R9_w=invP162 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv671744 R6=inv(id=2,umin_value=667649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv667648 R8_w=inv(id=0,umax_value=267767807,var_off=(0x0; 0xfffffff)) R9_w=invP163 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv671744 R2_w=inv(id=0,umax_value=267767807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=667649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv671744 R8_w=inv(id=0,umin_value=4096,umax_value=267767807,var_off=(0x0; 0xfffffff)) R9_w=invP163 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=667649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv671744 R8_w=inv(id=0,umin_value=4096,umax_value=267767807,var_off=(0x0; 0xfffffff)) R9_w=invP163 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv675840 R6=inv(id=2,umin_value=671745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv671744 R8=inv(id=0,umax_value=267763711,var_off=(0x0; 0xfffffff)) R9=invP164 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv675840 R2_w=inv(id=0,umax_value=267763711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=671745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv675840 R8=inv(id=0,umin_value=4096,umax_value=267763711,var_off=(0x0; 0xfffffff)) R9=invP164 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=671745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv675840 R8=inv(id=0,umin_value=4096,umax_value=267763711,var_off=(0x0; 0xfffffff)) R9=invP164 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv679936 R6=inv(id=2,umin_value=675841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv675840 R8_w=inv(id=0,umax_value=267759615,var_off=(0x0; 0xfffffff)) R9_w=invP165 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv679936 R2_w=inv(id=0,umax_value=267759615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=675841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv679936 R8_w=inv(id=0,umin_value=4096,umax_value=267759615,var_off=(0x0; 0xfffffff)) R9_w=invP165 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=675841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv679936 R8_w=inv(id=0,umin_value=4096,umax_value=267759615,var_off=(0x0; 0xfffffff)) R9_w=invP165 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv684032 R6=inv(id=2,umin_value=679937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv679936 R8_w=inv(id=0,umax_value=267755519,var_off=(0x0; 0xfffffff)) R9_w=invP166 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv684032 R2_w=inv(id=0,umax_value=267755519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=679937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv684032 R8_w=inv(id=0,umin_value=4096,umax_value=267755519,var_off=(0x0; 0xfffffff)) R9_w=invP166 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=679937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv684032 R8_w=inv(id=0,umin_value=4096,umax_value=267755519,var_off=(0x0; 0xfffffff)) R9_w=invP166 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv688128 R6=inv(id=2,umin_value=684033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv684032 R8_w=inv(id=0,umax_value=267751423,var_off=(0x0; 0xfffffff)) R9_w=invP167 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv688128 R2_w=inv(id=0,umax_value=267751423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=684033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv688128 R8_w=inv(id=0,umin_value=4096,umax_value=267751423,var_off=(0x0; 0xfffffff)) R9_w=invP167 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=684033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv688128 R8_w=inv(id=0,umin_value=4096,umax_value=267751423,var_off=(0x0; 0xfffffff)) R9_w=invP167 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv692224 R6=inv(id=2,umin_value=688129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv688128 R8=inv(id=0,umax_value=267747327,var_off=(0x0; 0xfffffff)) R9=invP168 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv692224 R2_w=inv(id=0,umax_value=267747327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=688129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv692224 R8=inv(id=0,umin_value=4096,umax_value=267747327,var_off=(0x0; 0xfffffff)) R9=invP168 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=688129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv692224 R8=inv(id=0,umin_value=4096,umax_value=267747327,var_off=(0x0; 0xfffffff)) R9=invP168 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv696320 R6=inv(id=2,umin_value=692225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv692224 R8_w=inv(id=0,umax_value=267743231,var_off=(0x0; 0xfffffff)) R9_w=invP169 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv696320 R2_w=inv(id=0,umax_value=267743231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=692225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv696320 R8_w=inv(id=0,umin_value=4096,umax_value=267743231,var_off=(0x0; 0xfffffff)) R9_w=invP169 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=692225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv696320 R8_w=inv(id=0,umin_value=4096,umax_value=267743231,var_off=(0x0; 0xfffffff)) R9_w=invP169 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv700416 R6=inv(id=2,umin_value=696321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv696320 R8_w=inv(id=0,umax_value=267739135,var_off=(0x0; 0xfffffff)) R9_w=invP170 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv700416 R2_w=inv(id=0,umax_value=267739135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=696321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv700416 R8_w=inv(id=0,umin_value=4096,umax_value=267739135,var_off=(0x0; 0xfffffff)) R9_w=invP170 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=696321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv700416 R8_w=inv(id=0,umin_value=4096,umax_value=267739135,var_off=(0x0; 0xfffffff)) R9_w=invP170 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv704512 R6=inv(id=2,umin_value=700417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv700416 R8_w=inv(id=0,umax_value=267735039,var_off=(0x0; 0xfffffff)) R9_w=invP171 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv704512 R2_w=inv(id=0,umax_value=267735039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=700417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv704512 R8_w=inv(id=0,umin_value=4096,umax_value=267735039,var_off=(0x0; 0xfffffff)) R9_w=invP171 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=700417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv704512 R8_w=inv(id=0,umin_value=4096,umax_value=267735039,var_off=(0x0; 0xfffffff)) R9_w=invP171 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv708608 R6=inv(id=2,umin_value=704513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv704512 R8=inv(id=0,umax_value=267730943,var_off=(0x0; 0xfffffff)) R9=invP172 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv708608 R2_w=inv(id=0,umax_value=267730943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=704513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv708608 R8=inv(id=0,umin_value=4096,umax_value=267730943,var_off=(0x0; 0xfffffff)) R9=invP172 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=704513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv708608 R8=inv(id=0,umin_value=4096,umax_value=267730943,var_off=(0x0; 0xfffffff)) R9=invP172 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv712704 R6=inv(id=2,umin_value=708609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv708608 R8_w=inv(id=0,umax_value=267726847,var_off=(0x0; 0xfffffff)) R9_w=invP173 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv712704 R2_w=inv(id=0,umax_value=267726847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=708609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv712704 R8_w=inv(id=0,umin_value=4096,umax_value=267726847,var_off=(0x0; 0xfffffff)) R9_w=invP173 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=708609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv712704 R8_w=inv(id=0,umin_value=4096,umax_value=267726847,var_off=(0x0; 0xfffffff)) R9_w=invP173 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv716800 R6=inv(id=2,umin_value=712705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv712704 R8_w=inv(id=0,umax_value=267722751,var_off=(0x0; 0xfffffff)) R9_w=invP174 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv716800 R2_w=inv(id=0,umax_value=267722751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=712705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv716800 R8_w=inv(id=0,umin_value=4096,umax_value=267722751,var_off=(0x0; 0xfffffff)) R9_w=invP174 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=712705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv716800 R8_w=inv(id=0,umin_value=4096,umax_value=267722751,var_off=(0x0; 0xfffffff)) R9_w=invP174 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv720896 R6=inv(id=2,umin_value=716801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv716800 R8_w=inv(id=0,umax_value=267718655,var_off=(0x0; 0xfffffff)) R9_w=invP175 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv720896 R2_w=inv(id=0,umax_value=267718655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=716801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv720896 R8_w=inv(id=0,umin_value=4096,umax_value=267718655,var_off=(0x0; 0xfffffff)) R9_w=invP175 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=716801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv720896 R8_w=inv(id=0,umin_value=4096,umax_value=267718655,var_off=(0x0; 0xfffffff)) R9_w=invP175 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv724992 R6=inv(id=2,umin_value=720897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv720896 R8=inv(id=0,umax_value=267714559,var_off=(0x0; 0xfffffff)) R9=invP176 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv724992 R2_w=inv(id=0,umax_value=267714559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=720897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv724992 R8=inv(id=0,umin_value=4096,umax_value=267714559,var_off=(0x0; 0xfffffff)) R9=invP176 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=720897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv724992 R8=inv(id=0,umin_value=4096,umax_value=267714559,var_off=(0x0; 0xfffffff)) R9=invP176 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv729088 R6=inv(id=2,umin_value=724993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv724992 R8_w=inv(id=0,umax_value=267710463,var_off=(0x0; 0xfffffff)) R9_w=invP177 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv729088 R2_w=inv(id=0,umax_value=267710463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=724993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv729088 R8_w=inv(id=0,umin_value=4096,umax_value=267710463,var_off=(0x0; 0xfffffff)) R9_w=invP177 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=724993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv729088 R8_w=inv(id=0,umin_value=4096,umax_value=267710463,var_off=(0x0; 0xfffffff)) R9_w=invP177 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv733184 R6=inv(id=2,umin_value=729089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv729088 R8_w=inv(id=0,umax_value=267706367,var_off=(0x0; 0xfffffff)) R9_w=invP178 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv733184 R2_w=inv(id=0,umax_value=267706367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=729089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv733184 R8_w=inv(id=0,umin_value=4096,umax_value=267706367,var_off=(0x0; 0xfffffff)) R9_w=invP178 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=729089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv733184 R8_w=inv(id=0,umin_value=4096,umax_value=267706367,var_off=(0x0; 0xfffffff)) R9_w=invP178 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv737280 R6=inv(id=2,umin_value=733185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv733184 R8_w=inv(id=0,umax_value=267702271,var_off=(0x0; 0xfffffff)) R9_w=invP179 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv737280 R2_w=inv(id=0,umax_value=267702271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=733185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv737280 R8_w=inv(id=0,umin_value=4096,umax_value=267702271,var_off=(0x0; 0xfffffff)) R9_w=invP179 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=733185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv737280 R8_w=inv(id=0,umin_value=4096,umax_value=267702271,var_off=(0x0; 0xfffffff)) R9_w=invP179 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv741376 R6=inv(id=2,umin_value=737281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv737280 R8=inv(id=0,umax_value=267698175,var_off=(0x0; 0xfffffff)) R9=invP180 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv741376 R2_w=inv(id=0,umax_value=267698175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=737281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv741376 R8=inv(id=0,umin_value=4096,umax_value=267698175,var_off=(0x0; 0xfffffff)) R9=invP180 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=737281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv741376 R8=inv(id=0,umin_value=4096,umax_value=267698175,var_off=(0x0; 0xfffffff)) R9=invP180 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv745472 R6=inv(id=2,umin_value=741377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv741376 R8_w=inv(id=0,umax_value=267694079,var_off=(0x0; 0xfffffff)) R9_w=invP181 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv745472 R2_w=inv(id=0,umax_value=267694079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=741377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv745472 R8_w=inv(id=0,umin_value=4096,umax_value=267694079,var_off=(0x0; 0xfffffff)) R9_w=invP181 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=741377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv745472 R8_w=inv(id=0,umin_value=4096,umax_value=267694079,var_off=(0x0; 0xfffffff)) R9_w=invP181 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv749568 R6=inv(id=2,umin_value=745473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv745472 R8_w=inv(id=0,umax_value=267689983,var_off=(0x0; 0xfffffff)) R9_w=invP182 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv749568 R2_w=inv(id=0,umax_value=267689983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=745473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv749568 R8_w=inv(id=0,umin_value=4096,umax_value=267689983,var_off=(0x0; 0xfffffff)) R9_w=invP182 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=745473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv749568 R8_w=inv(id=0,umin_value=4096,umax_value=267689983,var_off=(0x0; 0xfffffff)) R9_w=invP182 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv753664 R6=inv(id=2,umin_value=749569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv749568 R8_w=inv(id=0,umax_value=267685887,var_off=(0x0; 0xfffffff)) R9_w=invP183 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv753664 R2_w=inv(id=0,umax_value=267685887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=749569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv753664 R8_w=inv(id=0,umin_value=4096,umax_value=267685887,var_off=(0x0; 0xfffffff)) R9_w=invP183 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=749569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv753664 R8_w=inv(id=0,umin_value=4096,umax_value=267685887,var_off=(0x0; 0xfffffff)) R9_w=invP183 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv757760 R6=inv(id=2,umin_value=753665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv753664 R8=inv(id=0,umax_value=267681791,var_off=(0x0; 0xfffffff)) R9=invP184 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv757760 R2_w=inv(id=0,umax_value=267681791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=753665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv757760 R8=inv(id=0,umin_value=4096,umax_value=267681791,var_off=(0x0; 0xfffffff)) R9=invP184 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=753665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv757760 R8=inv(id=0,umin_value=4096,umax_value=267681791,var_off=(0x0; 0xfffffff)) R9=invP184 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv761856 R6=inv(id=2,umin_value=757761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv757760 R8_w=inv(id=0,umax_value=267677695,var_off=(0x0; 0xfffffff)) R9_w=invP185 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv761856 R2_w=inv(id=0,umax_value=267677695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=757761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv761856 R8_w=inv(id=0,umin_value=4096,umax_value=267677695,var_off=(0x0; 0xfffffff)) R9_w=invP185 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=757761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv761856 R8_w=inv(id=0,umin_value=4096,umax_value=267677695,var_off=(0x0; 0xfffffff)) R9_w=invP185 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv765952 R6=inv(id=2,umin_value=761857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv761856 R8_w=inv(id=0,umax_value=267673599,var_off=(0x0; 0xfffffff)) R9_w=invP186 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv765952 R2_w=inv(id=0,umax_value=267673599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=761857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv765952 R8_w=inv(id=0,umin_value=4096,umax_value=267673599,var_off=(0x0; 0xfffffff)) R9_w=invP186 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=761857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv765952 R8_w=inv(id=0,umin_value=4096,umax_value=267673599,var_off=(0x0; 0xfffffff)) R9_w=invP186 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv770048 R6=inv(id=2,umin_value=765953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv765952 R8_w=inv(id=0,umax_value=267669503,var_off=(0x0; 0xfffffff)) R9_w=invP187 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv770048 R2_w=inv(id=0,umax_value=267669503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=765953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv770048 R8_w=inv(id=0,umin_value=4096,umax_value=267669503,var_off=(0x0; 0xfffffff)) R9_w=invP187 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=765953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv770048 R8_w=inv(id=0,umin_value=4096,umax_value=267669503,var_off=(0x0; 0xfffffff)) R9_w=invP187 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv774144 R6=inv(id=2,umin_value=770049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv770048 R8=inv(id=0,umax_value=267665407,var_off=(0x0; 0xfffffff)) R9=invP188 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv774144 R2_w=inv(id=0,umax_value=267665407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=770049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv774144 R8=inv(id=0,umin_value=4096,umax_value=267665407,var_off=(0x0; 0xfffffff)) R9=invP188 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=770049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv774144 R8=inv(id=0,umin_value=4096,umax_value=267665407,var_off=(0x0; 0xfffffff)) R9=invP188 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv778240 R6=inv(id=2,umin_value=774145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv774144 R8_w=inv(id=0,umax_value=267661311,var_off=(0x0; 0xfffffff)) R9_w=invP189 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv778240 R2_w=inv(id=0,umax_value=267661311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=774145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv778240 R8_w=inv(id=0,umin_value=4096,umax_value=267661311,var_off=(0x0; 0xfffffff)) R9_w=invP189 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=774145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv778240 R8_w=inv(id=0,umin_value=4096,umax_value=267661311,var_off=(0x0; 0xfffffff)) R9_w=invP189 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv782336 R6=inv(id=2,umin_value=778241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv778240 R8_w=inv(id=0,umax_value=267657215,var_off=(0x0; 0xfffffff)) R9_w=invP190 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv782336 R2_w=inv(id=0,umax_value=267657215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=778241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv782336 R8_w=inv(id=0,umin_value=4096,umax_value=267657215,var_off=(0x0; 0xfffffff)) R9_w=invP190 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=778241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv782336 R8_w=inv(id=0,umin_value=4096,umax_value=267657215,var_off=(0x0; 0xfffffff)) R9_w=invP190 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv786432 R6=inv(id=2,umin_value=782337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv782336 R8_w=inv(id=0,umax_value=267653119,var_off=(0x0; 0xfffffff)) R9_w=invP191 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv786432 R2_w=inv(id=0,umax_value=267653119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=782337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv786432 R8_w=inv(id=0,umin_value=4096,umax_value=267653119,var_off=(0x0; 0xfffffff)) R9_w=invP191 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=782337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv786432 R8_w=inv(id=0,umin_value=4096,umax_value=267653119,var_off=(0x0; 0xfffffff)) R9_w=invP191 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv790528 R6=inv(id=2,umin_value=786433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv786432 R8=inv(id=0,umax_value=267649023,var_off=(0x0; 0xfffffff)) R9=invP192 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv790528 R2_w=inv(id=0,umax_value=267649023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=786433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv790528 R8=inv(id=0,umin_value=4096,umax_value=267649023,var_off=(0x0; 0xfffffff)) R9=invP192 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=786433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv790528 R8=inv(id=0,umin_value=4096,umax_value=267649023,var_off=(0x0; 0xfffffff)) R9=invP192 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv794624 R6=inv(id=2,umin_value=790529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv790528 R8_w=inv(id=0,umax_value=267644927,var_off=(0x0; 0xfffffff)) R9_w=invP193 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv794624 R2_w=inv(id=0,umax_value=267644927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=790529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv794624 R8_w=inv(id=0,umin_value=4096,umax_value=267644927,var_off=(0x0; 0xfffffff)) R9_w=invP193 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=790529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv794624 R8_w=inv(id=0,umin_value=4096,umax_value=267644927,var_off=(0x0; 0xfffffff)) R9_w=invP193 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv798720 R6=inv(id=2,umin_value=794625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv794624 R8_w=inv(id=0,umax_value=267640831,var_off=(0x0; 0xfffffff)) R9_w=invP194 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv798720 R2_w=inv(id=0,umax_value=267640831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=794625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv798720 R8_w=inv(id=0,umin_value=4096,umax_value=267640831,var_off=(0x0; 0xfffffff)) R9_w=invP194 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=794625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv798720 R8_w=inv(id=0,umin_value=4096,umax_value=267640831,var_off=(0x0; 0xfffffff)) R9_w=invP194 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv802816 R6=inv(id=2,umin_value=798721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv798720 R8_w=inv(id=0,umax_value=267636735,var_off=(0x0; 0xfffffff)) R9_w=invP195 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv802816 R2_w=inv(id=0,umax_value=267636735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=798721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv802816 R8_w=inv(id=0,umin_value=4096,umax_value=267636735,var_off=(0x0; 0xfffffff)) R9_w=invP195 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=798721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv802816 R8_w=inv(id=0,umin_value=4096,umax_value=267636735,var_off=(0x0; 0xfffffff)) R9_w=invP195 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv806912 R6=inv(id=2,umin_value=802817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv802816 R8=inv(id=0,umax_value=267632639,var_off=(0x0; 0xfffffff)) R9=invP196 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv806912 R2_w=inv(id=0,umax_value=267632639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=802817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv806912 R8=inv(id=0,umin_value=4096,umax_value=267632639,var_off=(0x0; 0xfffffff)) R9=invP196 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=802817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv806912 R8=inv(id=0,umin_value=4096,umax_value=267632639,var_off=(0x0; 0xfffffff)) R9=invP196 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv811008 R6=inv(id=2,umin_value=806913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv806912 R8_w=inv(id=0,umax_value=267628543,var_off=(0x0; 0xfffffff)) R9_w=invP197 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv811008 R2_w=inv(id=0,umax_value=267628543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=806913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv811008 R8_w=inv(id=0,umin_value=4096,umax_value=267628543,var_off=(0x0; 0xfffffff)) R9_w=invP197 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=806913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv811008 R8_w=inv(id=0,umin_value=4096,umax_value=267628543,var_off=(0x0; 0xfffffff)) R9_w=invP197 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv815104 R6=inv(id=2,umin_value=811009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv811008 R8_w=inv(id=0,umax_value=267624447,var_off=(0x0; 0xfffffff)) R9_w=invP198 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv815104 R2_w=inv(id=0,umax_value=267624447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=811009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv815104 R8_w=inv(id=0,umin_value=4096,umax_value=267624447,var_off=(0x0; 0xfffffff)) R9_w=invP198 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=811009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv815104 R8_w=inv(id=0,umin_value=4096,umax_value=267624447,var_off=(0x0; 0xfffffff)) R9_w=invP198 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv819200 R6=inv(id=2,umin_value=815105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv815104 R8_w=inv(id=0,umax_value=267620351,var_off=(0x0; 0xfffffff)) R9_w=invP199 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv819200 R2_w=inv(id=0,umax_value=267620351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=815105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv819200 R8_w=inv(id=0,umin_value=4096,umax_value=267620351,var_off=(0x0; 0xfffffff)) R9_w=invP199 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=815105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv819200 R8_w=inv(id=0,umin_value=4096,umax_value=267620351,var_off=(0x0; 0xfffffff)) R9_w=invP199 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv823296 R6=inv(id=2,umin_value=819201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv819200 R8=inv(id=0,umax_value=267616255,var_off=(0x0; 0xfffffff)) R9=invP200 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv823296 R2_w=inv(id=0,umax_value=267616255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=819201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv823296 R8=inv(id=0,umin_value=4096,umax_value=267616255,var_off=(0x0; 0xfffffff)) R9=invP200 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=819201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv823296 R8=inv(id=0,umin_value=4096,umax_value=267616255,var_off=(0x0; 0xfffffff)) R9=invP200 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv827392 R6=inv(id=2,umin_value=823297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv823296 R8_w=inv(id=0,umax_value=267612159,var_off=(0x0; 0xfffffff)) R9_w=invP201 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv827392 R2_w=inv(id=0,umax_value=267612159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=823297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv827392 R8_w=inv(id=0,umin_value=4096,umax_value=267612159,var_off=(0x0; 0xfffffff)) R9_w=invP201 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=823297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv827392 R8_w=inv(id=0,umin_value=4096,umax_value=267612159,var_off=(0x0; 0xfffffff)) R9_w=invP201 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv831488 R6=inv(id=2,umin_value=827393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv827392 R8_w=inv(id=0,umax_value=267608063,var_off=(0x0; 0xfffffff)) R9_w=invP202 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv831488 R2_w=inv(id=0,umax_value=267608063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=827393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv831488 R8_w=inv(id=0,umin_value=4096,umax_value=267608063,var_off=(0x0; 0xfffffff)) R9_w=invP202 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=827393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv831488 R8_w=inv(id=0,umin_value=4096,umax_value=267608063,var_off=(0x0; 0xfffffff)) R9_w=invP202 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv835584 R6=inv(id=2,umin_value=831489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv831488 R8_w=inv(id=0,umax_value=267603967,var_off=(0x0; 0xfffffff)) R9_w=invP203 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv835584 R2_w=inv(id=0,umax_value=267603967,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=831489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv835584 R8_w=inv(id=0,umin_value=4096,umax_value=267603967,var_off=(0x0; 0xfffffff)) R9_w=invP203 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=831489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv835584 R8_w=inv(id=0,umin_value=4096,umax_value=267603967,var_off=(0x0; 0xfffffff)) R9_w=invP203 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv839680 R6=inv(id=2,umin_value=835585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv835584 R8=inv(id=0,umax_value=267599871,var_off=(0x0; 0xfffffff)) R9=invP204 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv839680 R2_w=inv(id=0,umax_value=267599871,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=835585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv839680 R8=inv(id=0,umin_value=4096,umax_value=267599871,var_off=(0x0; 0xfffffff)) R9=invP204 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=835585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv839680 R8=inv(id=0,umin_value=4096,umax_value=267599871,var_off=(0x0; 0xfffffff)) R9=invP204 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv843776 R6=inv(id=2,umin_value=839681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv839680 R8_w=inv(id=0,umax_value=267595775,var_off=(0x0; 0xfffffff)) R9_w=invP205 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv843776 R2_w=inv(id=0,umax_value=267595775,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=839681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv843776 R8_w=inv(id=0,umin_value=4096,umax_value=267595775,var_off=(0x0; 0xfffffff)) R9_w=invP205 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=839681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv843776 R8_w=inv(id=0,umin_value=4096,umax_value=267595775,var_off=(0x0; 0xfffffff)) R9_w=invP205 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv847872 R6=inv(id=2,umin_value=843777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv843776 R8_w=inv(id=0,umax_value=267591679,var_off=(0x0; 0xfffffff)) R9_w=invP206 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv847872 R2_w=inv(id=0,umax_value=267591679,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=843777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv847872 R8_w=inv(id=0,umin_value=4096,umax_value=267591679,var_off=(0x0; 0xfffffff)) R9_w=invP206 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=843777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv847872 R8_w=inv(id=0,umin_value=4096,umax_value=267591679,var_off=(0x0; 0xfffffff)) R9_w=invP206 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv851968 R6=inv(id=2,umin_value=847873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv847872 R8_w=inv(id=0,umax_value=267587583,var_off=(0x0; 0xfffffff)) R9_w=invP207 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv851968 R2_w=inv(id=0,umax_value=267587583,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=847873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv851968 R8_w=inv(id=0,umin_value=4096,umax_value=267587583,var_off=(0x0; 0xfffffff)) R9_w=invP207 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=847873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv851968 R8_w=inv(id=0,umin_value=4096,umax_value=267587583,var_off=(0x0; 0xfffffff)) R9_w=invP207 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv856064 R6=inv(id=2,umin_value=851969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv851968 R8=inv(id=0,umax_value=267583487,var_off=(0x0; 0xfffffff)) R9=invP208 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv856064 R2_w=inv(id=0,umax_value=267583487,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=851969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv856064 R8=inv(id=0,umin_value=4096,umax_value=267583487,var_off=(0x0; 0xfffffff)) R9=invP208 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=851969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv856064 R8=inv(id=0,umin_value=4096,umax_value=267583487,var_off=(0x0; 0xfffffff)) R9=invP208 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv860160 R6=inv(id=2,umin_value=856065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv856064 R8_w=inv(id=0,umax_value=267579391,var_off=(0x0; 0xfffffff)) R9_w=invP209 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv860160 R2_w=inv(id=0,umax_value=267579391,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=856065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv860160 R8_w=inv(id=0,umin_value=4096,umax_value=267579391,var_off=(0x0; 0xfffffff)) R9_w=invP209 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=856065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv860160 R8_w=inv(id=0,umin_value=4096,umax_value=267579391,var_off=(0x0; 0xfffffff)) R9_w=invP209 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv864256 R6=inv(id=2,umin_value=860161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv860160 R8_w=inv(id=0,umax_value=267575295,var_off=(0x0; 0xfffffff)) R9_w=invP210 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv864256 R2_w=inv(id=0,umax_value=267575295,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=860161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv864256 R8_w=inv(id=0,umin_value=4096,umax_value=267575295,var_off=(0x0; 0xfffffff)) R9_w=invP210 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=860161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv864256 R8_w=inv(id=0,umin_value=4096,umax_value=267575295,var_off=(0x0; 0xfffffff)) R9_w=invP210 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv868352 R6=inv(id=2,umin_value=864257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv864256 R8_w=inv(id=0,umax_value=267571199,var_off=(0x0; 0xfffffff)) R9_w=invP211 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv868352 R2_w=inv(id=0,umax_value=267571199,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=864257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv868352 R8_w=inv(id=0,umin_value=4096,umax_value=267571199,var_off=(0x0; 0xfffffff)) R9_w=invP211 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=864257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv868352 R8_w=inv(id=0,umin_value=4096,umax_value=267571199,var_off=(0x0; 0xfffffff)) R9_w=invP211 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv872448 R6=inv(id=2,umin_value=868353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv868352 R8=inv(id=0,umax_value=267567103,var_off=(0x0; 0xfffffff)) R9=invP212 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv872448 R2_w=inv(id=0,umax_value=267567103,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=868353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv872448 R8=inv(id=0,umin_value=4096,umax_value=267567103,var_off=(0x0; 0xfffffff)) R9=invP212 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=868353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv872448 R8=inv(id=0,umin_value=4096,umax_value=267567103,var_off=(0x0; 0xfffffff)) R9=invP212 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv876544 R6=inv(id=2,umin_value=872449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv872448 R8_w=inv(id=0,umax_value=267563007,var_off=(0x0; 0xfffffff)) R9_w=invP213 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv876544 R2_w=inv(id=0,umax_value=267563007,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=872449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv876544 R8_w=inv(id=0,umin_value=4096,umax_value=267563007,var_off=(0x0; 0xfffffff)) R9_w=invP213 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=872449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv876544 R8_w=inv(id=0,umin_value=4096,umax_value=267563007,var_off=(0x0; 0xfffffff)) R9_w=invP213 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv880640 R6=inv(id=2,umin_value=876545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv876544 R8_w=inv(id=0,umax_value=267558911,var_off=(0x0; 0xfffffff)) R9_w=invP214 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv880640 R2_w=inv(id=0,umax_value=267558911,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=876545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv880640 R8_w=inv(id=0,umin_value=4096,umax_value=267558911,var_off=(0x0; 0xfffffff)) R9_w=invP214 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=876545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv880640 R8_w=inv(id=0,umin_value=4096,umax_value=267558911,var_off=(0x0; 0xfffffff)) R9_w=invP214 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv884736 R6=inv(id=2,umin_value=880641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv880640 R8_w=inv(id=0,umax_value=267554815,var_off=(0x0; 0xfffffff)) R9_w=invP215 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv884736 R2_w=inv(id=0,umax_value=267554815,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=880641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv884736 R8_w=inv(id=0,umin_value=4096,umax_value=267554815,var_off=(0x0; 0xfffffff)) R9_w=invP215 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=880641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv884736 R8_w=inv(id=0,umin_value=4096,umax_value=267554815,var_off=(0x0; 0xfffffff)) R9_w=invP215 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv888832 R6=inv(id=2,umin_value=884737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv884736 R8=inv(id=0,umax_value=267550719,var_off=(0x0; 0xfffffff)) R9=invP216 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv888832 R2_w=inv(id=0,umax_value=267550719,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=884737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv888832 R8=inv(id=0,umin_value=4096,umax_value=267550719,var_off=(0x0; 0xfffffff)) R9=invP216 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=884737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv888832 R8=inv(id=0,umin_value=4096,umax_value=267550719,var_off=(0x0; 0xfffffff)) R9=invP216 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv892928 R6=inv(id=2,umin_value=888833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv888832 R8_w=inv(id=0,umax_value=267546623,var_off=(0x0; 0xfffffff)) R9_w=invP217 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv892928 R2_w=inv(id=0,umax_value=267546623,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=888833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv892928 R8_w=inv(id=0,umin_value=4096,umax_value=267546623,var_off=(0x0; 0xfffffff)) R9_w=invP217 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=888833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv892928 R8_w=inv(id=0,umin_value=4096,umax_value=267546623,var_off=(0x0; 0xfffffff)) R9_w=invP217 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv897024 R6=inv(id=2,umin_value=892929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv892928 R8_w=inv(id=0,umax_value=267542527,var_off=(0x0; 0xfffffff)) R9_w=invP218 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv897024 R2_w=inv(id=0,umax_value=267542527,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=892929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv897024 R8_w=inv(id=0,umin_value=4096,umax_value=267542527,var_off=(0x0; 0xfffffff)) R9_w=invP218 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=892929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv897024 R8_w=inv(id=0,umin_value=4096,umax_value=267542527,var_off=(0x0; 0xfffffff)) R9_w=invP218 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv901120 R6=inv(id=2,umin_value=897025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv897024 R8_w=inv(id=0,umax_value=267538431,var_off=(0x0; 0xfffffff)) R9_w=invP219 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv901120 R2_w=inv(id=0,umax_value=267538431,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=897025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv901120 R8_w=inv(id=0,umin_value=4096,umax_value=267538431,var_off=(0x0; 0xfffffff)) R9_w=invP219 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=897025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv901120 R8_w=inv(id=0,umin_value=4096,umax_value=267538431,var_off=(0x0; 0xfffffff)) R9_w=invP219 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv905216 R6=inv(id=2,umin_value=901121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv901120 R8=inv(id=0,umax_value=267534335,var_off=(0x0; 0xfffffff)) R9=invP220 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv905216 R2_w=inv(id=0,umax_value=267534335,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=901121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv905216 R8=inv(id=0,umin_value=4096,umax_value=267534335,var_off=(0x0; 0xfffffff)) R9=invP220 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=901121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv905216 R8=inv(id=0,umin_value=4096,umax_value=267534335,var_off=(0x0; 0xfffffff)) R9=invP220 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv909312 R6=inv(id=2,umin_value=905217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv905216 R8_w=inv(id=0,umax_value=267530239,var_off=(0x0; 0xfffffff)) R9_w=invP221 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv909312 R2_w=inv(id=0,umax_value=267530239,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=905217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv909312 R8_w=inv(id=0,umin_value=4096,umax_value=267530239,var_off=(0x0; 0xfffffff)) R9_w=invP221 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=905217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv909312 R8_w=inv(id=0,umin_value=4096,umax_value=267530239,var_off=(0x0; 0xfffffff)) R9_w=invP221 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv913408 R6=inv(id=2,umin_value=909313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv909312 R8_w=inv(id=0,umax_value=267526143,var_off=(0x0; 0xfffffff)) R9_w=invP222 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv913408 R2_w=inv(id=0,umax_value=267526143,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=909313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv913408 R8_w=inv(id=0,umin_value=4096,umax_value=267526143,var_off=(0x0; 0xfffffff)) R9_w=invP222 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=909313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv913408 R8_w=inv(id=0,umin_value=4096,umax_value=267526143,var_off=(0x0; 0xfffffff)) R9_w=invP222 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv917504 R6=inv(id=2,umin_value=913409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv913408 R8_w=inv(id=0,umax_value=267522047,var_off=(0x0; 0xfffffff)) R9_w=invP223 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv917504 R2_w=inv(id=0,umax_value=267522047,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=913409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv917504 R8_w=inv(id=0,umin_value=4096,umax_value=267522047,var_off=(0x0; 0xfffffff)) R9_w=invP223 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=913409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv917504 R8_w=inv(id=0,umin_value=4096,umax_value=267522047,var_off=(0x0; 0xfffffff)) R9_w=invP223 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv921600 R6=inv(id=2,umin_value=917505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv917504 R8=inv(id=0,umax_value=267517951,var_off=(0x0; 0xfffffff)) R9=invP224 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv921600 R2_w=inv(id=0,umax_value=267517951,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=917505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv921600 R8=inv(id=0,umin_value=4096,umax_value=267517951,var_off=(0x0; 0xfffffff)) R9=invP224 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=917505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv921600 R8=inv(id=0,umin_value=4096,umax_value=267517951,var_off=(0x0; 0xfffffff)) R9=invP224 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv925696 R6=inv(id=2,umin_value=921601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv921600 R8_w=inv(id=0,umax_value=267513855,var_off=(0x0; 0xfffffff)) R9_w=invP225 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv925696 R2_w=inv(id=0,umax_value=267513855,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=921601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv925696 R8_w=inv(id=0,umin_value=4096,umax_value=267513855,var_off=(0x0; 0xfffffff)) R9_w=invP225 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=921601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv925696 R8_w=inv(id=0,umin_value=4096,umax_value=267513855,var_off=(0x0; 0xfffffff)) R9_w=invP225 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv929792 R6=inv(id=2,umin_value=925697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv925696 R8_w=inv(id=0,umax_value=267509759,var_off=(0x0; 0xfffffff)) R9_w=invP226 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv929792 R2_w=inv(id=0,umax_value=267509759,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=925697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv929792 R8_w=inv(id=0,umin_value=4096,umax_value=267509759,var_off=(0x0; 0xfffffff)) R9_w=invP226 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=925697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv929792 R8_w=inv(id=0,umin_value=4096,umax_value=267509759,var_off=(0x0; 0xfffffff)) R9_w=invP226 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv933888 R6=inv(id=2,umin_value=929793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv929792 R8_w=inv(id=0,umax_value=267505663,var_off=(0x0; 0xfffffff)) R9_w=invP227 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv933888 R2_w=inv(id=0,umax_value=267505663,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=929793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv933888 R8_w=inv(id=0,umin_value=4096,umax_value=267505663,var_off=(0x0; 0xfffffff)) R9_w=invP227 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=929793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv933888 R8_w=inv(id=0,umin_value=4096,umax_value=267505663,var_off=(0x0; 0xfffffff)) R9_w=invP227 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv937984 R6=inv(id=2,umin_value=933889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv933888 R8=inv(id=0,umax_value=267501567,var_off=(0x0; 0xfffffff)) R9=invP228 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv937984 R2_w=inv(id=0,umax_value=267501567,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=933889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv937984 R8=inv(id=0,umin_value=4096,umax_value=267501567,var_off=(0x0; 0xfffffff)) R9=invP228 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=933889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv937984 R8=inv(id=0,umin_value=4096,umax_value=267501567,var_off=(0x0; 0xfffffff)) R9=invP228 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv942080 R6=inv(id=2,umin_value=937985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv937984 R8_w=inv(id=0,umax_value=267497471,var_off=(0x0; 0xfffffff)) R9_w=invP229 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv942080 R2_w=inv(id=0,umax_value=267497471,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=937985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv942080 R8_w=inv(id=0,umin_value=4096,umax_value=267497471,var_off=(0x0; 0xfffffff)) R9_w=invP229 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=937985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv942080 R8_w=inv(id=0,umin_value=4096,umax_value=267497471,var_off=(0x0; 0xfffffff)) R9_w=invP229 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv946176 R6=inv(id=2,umin_value=942081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv942080 R8_w=inv(id=0,umax_value=267493375,var_off=(0x0; 0xfffffff)) R9_w=invP230 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv946176 R2_w=inv(id=0,umax_value=267493375,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=942081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv946176 R8_w=inv(id=0,umin_value=4096,umax_value=267493375,var_off=(0x0; 0xfffffff)) R9_w=invP230 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=942081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv946176 R8_w=inv(id=0,umin_value=4096,umax_value=267493375,var_off=(0x0; 0xfffffff)) R9_w=invP230 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv950272 R6=inv(id=2,umin_value=946177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv946176 R8_w=inv(id=0,umax_value=267489279,var_off=(0x0; 0xfffffff)) R9_w=invP231 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv950272 R2_w=inv(id=0,umax_value=267489279,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=946177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv950272 R8_w=inv(id=0,umin_value=4096,umax_value=267489279,var_off=(0x0; 0xfffffff)) R9_w=invP231 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=946177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv950272 R8_w=inv(id=0,umin_value=4096,umax_value=267489279,var_off=(0x0; 0xfffffff)) R9_w=invP231 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv954368 R6=inv(id=2,umin_value=950273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv950272 R8=inv(id=0,umax_value=267485183,var_off=(0x0; 0xfffffff)) R9=invP232 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv954368 R2_w=inv(id=0,umax_value=267485183,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=950273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv954368 R8=inv(id=0,umin_value=4096,umax_value=267485183,var_off=(0x0; 0xfffffff)) R9=invP232 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=950273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv954368 R8=inv(id=0,umin_value=4096,umax_value=267485183,var_off=(0x0; 0xfffffff)) R9=invP232 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv958464 R6=inv(id=2,umin_value=954369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv954368 R8_w=inv(id=0,umax_value=267481087,var_off=(0x0; 0xfffffff)) R9_w=invP233 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv958464 R2_w=inv(id=0,umax_value=267481087,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=954369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv958464 R8_w=inv(id=0,umin_value=4096,umax_value=267481087,var_off=(0x0; 0xfffffff)) R9_w=invP233 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=954369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv958464 R8_w=inv(id=0,umin_value=4096,umax_value=267481087,var_off=(0x0; 0xfffffff)) R9_w=invP233 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv962560 R6=inv(id=2,umin_value=958465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv958464 R8_w=inv(id=0,umax_value=267476991,var_off=(0x0; 0xfffffff)) R9_w=invP234 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv962560 R2_w=inv(id=0,umax_value=267476991,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=958465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv962560 R8_w=inv(id=0,umin_value=4096,umax_value=267476991,var_off=(0x0; 0xfffffff)) R9_w=invP234 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=958465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv962560 R8_w=inv(id=0,umin_value=4096,umax_value=267476991,var_off=(0x0; 0xfffffff)) R9_w=invP234 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv966656 R6=inv(id=2,umin_value=962561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv962560 R8_w=inv(id=0,umax_value=267472895,var_off=(0x0; 0xfffffff)) R9_w=invP235 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv966656 R2_w=inv(id=0,umax_value=267472895,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=962561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv966656 R8_w=inv(id=0,umin_value=4096,umax_value=267472895,var_off=(0x0; 0xfffffff)) R9_w=invP235 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=962561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv966656 R8_w=inv(id=0,umin_value=4096,umax_value=267472895,var_off=(0x0; 0xfffffff)) R9_w=invP235 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv970752 R6=inv(id=2,umin_value=966657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv966656 R8=inv(id=0,umax_value=267468799,var_off=(0x0; 0xfffffff)) R9=invP236 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv970752 R2_w=inv(id=0,umax_value=267468799,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=966657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv970752 R8=inv(id=0,umin_value=4096,umax_value=267468799,var_off=(0x0; 0xfffffff)) R9=invP236 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=966657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv970752 R8=inv(id=0,umin_value=4096,umax_value=267468799,var_off=(0x0; 0xfffffff)) R9=invP236 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv974848 R6=inv(id=2,umin_value=970753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv970752 R8_w=inv(id=0,umax_value=267464703,var_off=(0x0; 0xfffffff)) R9_w=invP237 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv974848 R2_w=inv(id=0,umax_value=267464703,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=970753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv974848 R8_w=inv(id=0,umin_value=4096,umax_value=267464703,var_off=(0x0; 0xfffffff)) R9_w=invP237 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=970753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv974848 R8_w=inv(id=0,umin_value=4096,umax_value=267464703,var_off=(0x0; 0xfffffff)) R9_w=invP237 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv978944 R6=inv(id=2,umin_value=974849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv974848 R8_w=inv(id=0,umax_value=267460607,var_off=(0x0; 0xfffffff)) R9_w=invP238 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv978944 R2_w=inv(id=0,umax_value=267460607,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=974849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv978944 R8_w=inv(id=0,umin_value=4096,umax_value=267460607,var_off=(0x0; 0xfffffff)) R9_w=invP238 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=974849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv978944 R8_w=inv(id=0,umin_value=4096,umax_value=267460607,var_off=(0x0; 0xfffffff)) R9_w=invP238 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv983040 R6=inv(id=2,umin_value=978945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv978944 R8_w=inv(id=0,umax_value=267456511,var_off=(0x0; 0xfffffff)) R9_w=invP239 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv983040 R2_w=inv(id=0,umax_value=267456511,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=978945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv983040 R8_w=inv(id=0,umin_value=4096,umax_value=267456511,var_off=(0x0; 0xfffffff)) R9_w=invP239 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=978945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv983040 R8_w=inv(id=0,umin_value=4096,umax_value=267456511,var_off=(0x0; 0xfffffff)) R9_w=invP239 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv987136 R6=inv(id=2,umin_value=983041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv983040 R8=inv(id=0,umax_value=267452415,var_off=(0x0; 0xfffffff)) R9=invP240 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv987136 R2_w=inv(id=0,umax_value=267452415,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=983041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv987136 R8=inv(id=0,umin_value=4096,umax_value=267452415,var_off=(0x0; 0xfffffff)) R9=invP240 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=983041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv987136 R8=inv(id=0,umin_value=4096,umax_value=267452415,var_off=(0x0; 0xfffffff)) R9=invP240 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv991232 R6=inv(id=2,umin_value=987137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv987136 R8_w=inv(id=0,umax_value=267448319,var_off=(0x0; 0xfffffff)) R9_w=invP241 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv991232 R2_w=inv(id=0,umax_value=267448319,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=987137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv991232 R8_w=inv(id=0,umin_value=4096,umax_value=267448319,var_off=(0x0; 0xfffffff)) R9_w=invP241 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=987137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv991232 R8_w=inv(id=0,umin_value=4096,umax_value=267448319,var_off=(0x0; 0xfffffff)) R9_w=invP241 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv995328 R6=inv(id=2,umin_value=991233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv991232 R8_w=inv(id=0,umax_value=267444223,var_off=(0x0; 0xfffffff)) R9_w=invP242 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv995328 R2_w=inv(id=0,umax_value=267444223,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=991233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv995328 R8_w=inv(id=0,umin_value=4096,umax_value=267444223,var_off=(0x0; 0xfffffff)) R9_w=invP242 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=991233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv995328 R8_w=inv(id=0,umin_value=4096,umax_value=267444223,var_off=(0x0; 0xfffffff)) R9_w=invP242 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv999424 R6=inv(id=2,umin_value=995329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv995328 R8_w=inv(id=0,umax_value=267440127,var_off=(0x0; 0xfffffff)) R9_w=invP243 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv999424 R2_w=inv(id=0,umax_value=267440127,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=995329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv999424 R8_w=inv(id=0,umin_value=4096,umax_value=267440127,var_off=(0x0; 0xfffffff)) R9_w=invP243 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=995329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv999424 R8_w=inv(id=0,umin_value=4096,umax_value=267440127,var_off=(0x0; 0xfffffff)) R9_w=invP243 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1003520 R6=inv(id=2,umin_value=999425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv999424 R8=inv(id=0,umax_value=267436031,var_off=(0x0; 0xfffffff)) R9=invP244 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1003520 R2_w=inv(id=0,umax_value=267436031,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=999425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1003520 R8=inv(id=0,umin_value=4096,umax_value=267436031,var_off=(0x0; 0xfffffff)) R9=invP244 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=999425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1003520 R8=inv(id=0,umin_value=4096,umax_value=267436031,var_off=(0x0; 0xfffffff)) R9=invP244 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1007616 R6=inv(id=2,umin_value=1003521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1003520 R8_w=inv(id=0,umax_value=267431935,var_off=(0x0; 0xfffffff)) R9_w=invP245 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1007616 R2_w=inv(id=0,umax_value=267431935,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1003521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1007616 R8_w=inv(id=0,umin_value=4096,umax_value=267431935,var_off=(0x0; 0xfffffff)) R9_w=invP245 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1003521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1007616 R8_w=inv(id=0,umin_value=4096,umax_value=267431935,var_off=(0x0; 0xfffffff)) R9_w=invP245 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1011712 R6=inv(id=2,umin_value=1007617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1007616 R8_w=inv(id=0,umax_value=267427839,var_off=(0x0; 0xfffffff)) R9_w=invP246 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1011712 R2_w=inv(id=0,umax_value=267427839,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1007617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1011712 R8_w=inv(id=0,umin_value=4096,umax_value=267427839,var_off=(0x0; 0xfffffff)) R9_w=invP246 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1007617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1011712 R8_w=inv(id=0,umin_value=4096,umax_value=267427839,var_off=(0x0; 0xfffffff)) R9_w=invP246 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1015808 R6=inv(id=2,umin_value=1011713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1011712 R8_w=inv(id=0,umax_value=267423743,var_off=(0x0; 0xfffffff)) R9_w=invP247 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1015808 R2_w=inv(id=0,umax_value=267423743,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1011713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1015808 R8_w=inv(id=0,umin_value=4096,umax_value=267423743,var_off=(0x0; 0xfffffff)) R9_w=invP247 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1011713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1015808 R8_w=inv(id=0,umin_value=4096,umax_value=267423743,var_off=(0x0; 0xfffffff)) R9_w=invP247 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1019904 R6=inv(id=2,umin_value=1015809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1015808 R8=inv(id=0,umax_value=267419647,var_off=(0x0; 0xfffffff)) R9=invP248 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1019904 R2_w=inv(id=0,umax_value=267419647,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1015809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1019904 R8=inv(id=0,umin_value=4096,umax_value=267419647,var_off=(0x0; 0xfffffff)) R9=invP248 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1015809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1019904 R8=inv(id=0,umin_value=4096,umax_value=267419647,var_off=(0x0; 0xfffffff)) R9=invP248 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1024000 R6=inv(id=2,umin_value=1019905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1019904 R8_w=inv(id=0,umax_value=267415551,var_off=(0x0; 0xfffffff)) R9_w=invP249 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1024000 R2_w=inv(id=0,umax_value=267415551,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1019905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1024000 R8_w=inv(id=0,umin_value=4096,umax_value=267415551,var_off=(0x0; 0xfffffff)) R9_w=invP249 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1019905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1024000 R8_w=inv(id=0,umin_value=4096,umax_value=267415551,var_off=(0x0; 0xfffffff)) R9_w=invP249 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1028096 R6=inv(id=2,umin_value=1024001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1024000 R8_w=inv(id=0,umax_value=267411455,var_off=(0x0; 0xfffffff)) R9_w=invP250 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1028096 R2_w=inv(id=0,umax_value=267411455,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1024001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1028096 R8_w=inv(id=0,umin_value=4096,umax_value=267411455,var_off=(0x0; 0xfffffff)) R9_w=invP250 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1024001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1028096 R8_w=inv(id=0,umin_value=4096,umax_value=267411455,var_off=(0x0; 0xfffffff)) R9_w=invP250 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1032192 R6=inv(id=2,umin_value=1028097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1028096 R8_w=inv(id=0,umax_value=267407359,var_off=(0x0; 0xfffffff)) R9_w=invP251 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1032192 R2_w=inv(id=0,umax_value=267407359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1028097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1032192 R8_w=inv(id=0,umin_value=4096,umax_value=267407359,var_off=(0x0; 0xfffffff)) R9_w=invP251 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1028097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1032192 R8_w=inv(id=0,umin_value=4096,umax_value=267407359,var_off=(0x0; 0xfffffff)) R9_w=invP251 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1036288 R6=inv(id=2,umin_value=1032193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1032192 R8=inv(id=0,umax_value=267403263,var_off=(0x0; 0xfffffff)) R9=invP252 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1036288 R2_w=inv(id=0,umax_value=267403263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1032193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1036288 R8=inv(id=0,umin_value=4096,umax_value=267403263,var_off=(0x0; 0xfffffff)) R9=invP252 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1032193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1036288 R8=inv(id=0,umin_value=4096,umax_value=267403263,var_off=(0x0; 0xfffffff)) R9=invP252 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1040384 R6=inv(id=2,umin_value=1036289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1036288 R8_w=inv(id=0,umax_value=267399167,var_off=(0x0; 0xfffffff)) R9_w=invP253 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1040384 R2_w=inv(id=0,umax_value=267399167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1036289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1040384 R8_w=inv(id=0,umin_value=4096,umax_value=267399167,var_off=(0x0; 0xfffffff)) R9_w=invP253 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1036289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1040384 R8_w=inv(id=0,umin_value=4096,umax_value=267399167,var_off=(0x0; 0xfffffff)) R9_w=invP253 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1044480 R6=inv(id=2,umin_value=1040385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1040384 R8_w=inv(id=0,umax_value=267395071,var_off=(0x0; 0xfffffff)) R9_w=invP254 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1044480 R2_w=inv(id=0,umax_value=267395071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1040385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1044480 R8_w=inv(id=0,umin_value=4096,umax_value=267395071,var_off=(0x0; 0xfffffff)) R9_w=invP254 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1040385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1044480 R8_w=inv(id=0,umin_value=4096,umax_value=267395071,var_off=(0x0; 0xfffffff)) R9_w=invP254 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1048576 R6=inv(id=2,umin_value=1044481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1044480 R8_w=inv(id=0,umax_value=267390975,var_off=(0x0; 0xfffffff)) R9_w=invP255 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1048576 R2_w=inv(id=0,umax_value=267390975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1044481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1048576 R8_w=inv(id=0,umin_value=4096,umax_value=267390975,var_off=(0x0; 0xfffffff)) R9_w=invP255 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1044481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1048576 R8_w=inv(id=0,umin_value=4096,umax_value=267390975,var_off=(0x0; 0xfffffff)) R9_w=invP255 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1052672 R6=inv(id=2,umin_value=1048577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1048576 R8=inv(id=0,umax_value=267386879,var_off=(0x0; 0xfffffff)) R9=invP256 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1052672 R2_w=inv(id=0,umax_value=267386879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1048577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1052672 R8=inv(id=0,umin_value=4096,umax_value=267386879,var_off=(0x0; 0xfffffff)) R9=invP256 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1048577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1052672 R8=inv(id=0,umin_value=4096,umax_value=267386879,var_off=(0x0; 0xfffffff)) R9=invP256 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1056768 R6=inv(id=2,umin_value=1052673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1052672 R8_w=inv(id=0,umax_value=267382783,var_off=(0x0; 0xfffffff)) R9_w=invP257 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1056768 R2_w=inv(id=0,umax_value=267382783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1052673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1056768 R8_w=inv(id=0,umin_value=4096,umax_value=267382783,var_off=(0x0; 0xfffffff)) R9_w=invP257 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1052673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1056768 R8_w=inv(id=0,umin_value=4096,umax_value=267382783,var_off=(0x0; 0xfffffff)) R9_w=invP257 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1060864 R6=inv(id=2,umin_value=1056769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1056768 R8_w=inv(id=0,umax_value=267378687,var_off=(0x0; 0xfffffff)) R9_w=invP258 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1060864 R2_w=inv(id=0,umax_value=267378687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1056769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1060864 R8_w=inv(id=0,umin_value=4096,umax_value=267378687,var_off=(0x0; 0xfffffff)) R9_w=invP258 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1056769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1060864 R8_w=inv(id=0,umin_value=4096,umax_value=267378687,var_off=(0x0; 0xfffffff)) R9_w=invP258 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1064960 R6=inv(id=2,umin_value=1060865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1060864 R8_w=inv(id=0,umax_value=267374591,var_off=(0x0; 0xfffffff)) R9_w=invP259 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1064960 R2_w=inv(id=0,umax_value=267374591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1060865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1064960 R8_w=inv(id=0,umin_value=4096,umax_value=267374591,var_off=(0x0; 0xfffffff)) R9_w=invP259 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1060865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1064960 R8_w=inv(id=0,umin_value=4096,umax_value=267374591,var_off=(0x0; 0xfffffff)) R9_w=invP259 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1069056 R6=inv(id=2,umin_value=1064961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1064960 R8=inv(id=0,umax_value=267370495,var_off=(0x0; 0xfffffff)) R9=invP260 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1069056 R2_w=inv(id=0,umax_value=267370495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1064961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1069056 R8=inv(id=0,umin_value=4096,umax_value=267370495,var_off=(0x0; 0xfffffff)) R9=invP260 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1064961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1069056 R8=inv(id=0,umin_value=4096,umax_value=267370495,var_off=(0x0; 0xfffffff)) R9=invP260 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1073152 R6=inv(id=2,umin_value=1069057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1069056 R8_w=inv(id=0,umax_value=267366399,var_off=(0x0; 0xfffffff)) R9_w=invP261 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1073152 R2_w=inv(id=0,umax_value=267366399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1069057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1073152 R8_w=inv(id=0,umin_value=4096,umax_value=267366399,var_off=(0x0; 0xfffffff)) R9_w=invP261 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1069057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1073152 R8_w=inv(id=0,umin_value=4096,umax_value=267366399,var_off=(0x0; 0xfffffff)) R9_w=invP261 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1077248 R6=inv(id=2,umin_value=1073153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1073152 R8_w=inv(id=0,umax_value=267362303,var_off=(0x0; 0xfffffff)) R9_w=invP262 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1077248 R2_w=inv(id=0,umax_value=267362303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1073153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1077248 R8_w=inv(id=0,umin_value=4096,umax_value=267362303,var_off=(0x0; 0xfffffff)) R9_w=invP262 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1073153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1077248 R8_w=inv(id=0,umin_value=4096,umax_value=267362303,var_off=(0x0; 0xfffffff)) R9_w=invP262 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1081344 R6=inv(id=2,umin_value=1077249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1077248 R8_w=inv(id=0,umax_value=267358207,var_off=(0x0; 0xfffffff)) R9_w=invP263 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1081344 R2_w=inv(id=0,umax_value=267358207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1077249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1081344 R8_w=inv(id=0,umin_value=4096,umax_value=267358207,var_off=(0x0; 0xfffffff)) R9_w=invP263 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1077249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1081344 R8_w=inv(id=0,umin_value=4096,umax_value=267358207,var_off=(0x0; 0xfffffff)) R9_w=invP263 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1085440 R6=inv(id=2,umin_value=1081345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1081344 R8=inv(id=0,umax_value=267354111,var_off=(0x0; 0xfffffff)) R9=invP264 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1085440 R2_w=inv(id=0,umax_value=267354111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1081345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1085440 R8=inv(id=0,umin_value=4096,umax_value=267354111,var_off=(0x0; 0xfffffff)) R9=invP264 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1081345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1085440 R8=inv(id=0,umin_value=4096,umax_value=267354111,var_off=(0x0; 0xfffffff)) R9=invP264 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1089536 R6=inv(id=2,umin_value=1085441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1085440 R8_w=inv(id=0,umax_value=267350015,var_off=(0x0; 0xfffffff)) R9_w=invP265 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1089536 R2_w=inv(id=0,umax_value=267350015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1085441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1089536 R8_w=inv(id=0,umin_value=4096,umax_value=267350015,var_off=(0x0; 0xfffffff)) R9_w=invP265 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1085441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1089536 R8_w=inv(id=0,umin_value=4096,umax_value=267350015,var_off=(0x0; 0xfffffff)) R9_w=invP265 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1093632 R6=inv(id=2,umin_value=1089537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1089536 R8_w=inv(id=0,umax_value=267345919,var_off=(0x0; 0xfffffff)) R9_w=invP266 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1093632 R2_w=inv(id=0,umax_value=267345919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1089537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1093632 R8_w=inv(id=0,umin_value=4096,umax_value=267345919,var_off=(0x0; 0xfffffff)) R9_w=invP266 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1089537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1093632 R8_w=inv(id=0,umin_value=4096,umax_value=267345919,var_off=(0x0; 0xfffffff)) R9_w=invP266 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1097728 R6=inv(id=2,umin_value=1093633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1093632 R8_w=inv(id=0,umax_value=267341823,var_off=(0x0; 0xfffffff)) R9_w=invP267 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1097728 R2_w=inv(id=0,umax_value=267341823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1093633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1097728 R8_w=inv(id=0,umin_value=4096,umax_value=267341823,var_off=(0x0; 0xfffffff)) R9_w=invP267 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1093633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1097728 R8_w=inv(id=0,umin_value=4096,umax_value=267341823,var_off=(0x0; 0xfffffff)) R9_w=invP267 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1101824 R6=inv(id=2,umin_value=1097729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1097728 R8=inv(id=0,umax_value=267337727,var_off=(0x0; 0xfffffff)) R9=invP268 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1101824 R2_w=inv(id=0,umax_value=267337727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1097729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1101824 R8=inv(id=0,umin_value=4096,umax_value=267337727,var_off=(0x0; 0xfffffff)) R9=invP268 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1097729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1101824 R8=inv(id=0,umin_value=4096,umax_value=267337727,var_off=(0x0; 0xfffffff)) R9=invP268 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1105920 R6=inv(id=2,umin_value=1101825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1101824 R8_w=inv(id=0,umax_value=267333631,var_off=(0x0; 0xfffffff)) R9_w=invP269 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1105920 R2_w=inv(id=0,umax_value=267333631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1101825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1105920 R8_w=inv(id=0,umin_value=4096,umax_value=267333631,var_off=(0x0; 0xfffffff)) R9_w=invP269 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1101825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1105920 R8_w=inv(id=0,umin_value=4096,umax_value=267333631,var_off=(0x0; 0xfffffff)) R9_w=invP269 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1110016 R6=inv(id=2,umin_value=1105921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1105920 R8_w=inv(id=0,umax_value=267329535,var_off=(0x0; 0xfffffff)) R9_w=invP270 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1110016 R2_w=inv(id=0,umax_value=267329535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1105921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1110016 R8_w=inv(id=0,umin_value=4096,umax_value=267329535,var_off=(0x0; 0xfffffff)) R9_w=invP270 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1105921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1110016 R8_w=inv(id=0,umin_value=4096,umax_value=267329535,var_off=(0x0; 0xfffffff)) R9_w=invP270 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1114112 R6=inv(id=2,umin_value=1110017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1110016 R8_w=inv(id=0,umax_value=267325439,var_off=(0x0; 0xfffffff)) R9_w=invP271 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1114112 R2_w=inv(id=0,umax_value=267325439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1110017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1114112 R8_w=inv(id=0,umin_value=4096,umax_value=267325439,var_off=(0x0; 0xfffffff)) R9_w=invP271 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1110017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1114112 R8_w=inv(id=0,umin_value=4096,umax_value=267325439,var_off=(0x0; 0xfffffff)) R9_w=invP271 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1118208 R6=inv(id=2,umin_value=1114113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1114112 R8=inv(id=0,umax_value=267321343,var_off=(0x0; 0xfffffff)) R9=invP272 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1118208 R2_w=inv(id=0,umax_value=267321343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1114113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1118208 R8=inv(id=0,umin_value=4096,umax_value=267321343,var_off=(0x0; 0xfffffff)) R9=invP272 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1114113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1118208 R8=inv(id=0,umin_value=4096,umax_value=267321343,var_off=(0x0; 0xfffffff)) R9=invP272 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1122304 R6=inv(id=2,umin_value=1118209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1118208 R8_w=inv(id=0,umax_value=267317247,var_off=(0x0; 0xfffffff)) R9_w=invP273 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1122304 R2_w=inv(id=0,umax_value=267317247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1118209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1122304 R8_w=inv(id=0,umin_value=4096,umax_value=267317247,var_off=(0x0; 0xfffffff)) R9_w=invP273 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1118209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1122304 R8_w=inv(id=0,umin_value=4096,umax_value=267317247,var_off=(0x0; 0xfffffff)) R9_w=invP273 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1126400 R6=inv(id=2,umin_value=1122305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1122304 R8_w=inv(id=0,umax_value=267313151,var_off=(0x0; 0xfffffff)) R9_w=invP274 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1126400 R2_w=inv(id=0,umax_value=267313151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1122305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1126400 R8_w=inv(id=0,umin_value=4096,umax_value=267313151,var_off=(0x0; 0xfffffff)) R9_w=invP274 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1122305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1126400 R8_w=inv(id=0,umin_value=4096,umax_value=267313151,var_off=(0x0; 0xfffffff)) R9_w=invP274 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1130496 R6=inv(id=2,umin_value=1126401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1126400 R8_w=inv(id=0,umax_value=267309055,var_off=(0x0; 0xfffffff)) R9_w=invP275 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1130496 R2_w=inv(id=0,umax_value=267309055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1126401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1130496 R8_w=inv(id=0,umin_value=4096,umax_value=267309055,var_off=(0x0; 0xfffffff)) R9_w=invP275 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1126401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1130496 R8_w=inv(id=0,umin_value=4096,umax_value=267309055,var_off=(0x0; 0xfffffff)) R9_w=invP275 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1134592 R6=inv(id=2,umin_value=1130497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1130496 R8=inv(id=0,umax_value=267304959,var_off=(0x0; 0xfffffff)) R9=invP276 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1134592 R2_w=inv(id=0,umax_value=267304959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1130497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1134592 R8=inv(id=0,umin_value=4096,umax_value=267304959,var_off=(0x0; 0xfffffff)) R9=invP276 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1130497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1134592 R8=inv(id=0,umin_value=4096,umax_value=267304959,var_off=(0x0; 0xfffffff)) R9=invP276 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1138688 R6=inv(id=2,umin_value=1134593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1134592 R8_w=inv(id=0,umax_value=267300863,var_off=(0x0; 0xfffffff)) R9_w=invP277 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1138688 R2_w=inv(id=0,umax_value=267300863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1134593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1138688 R8_w=inv(id=0,umin_value=4096,umax_value=267300863,var_off=(0x0; 0xfffffff)) R9_w=invP277 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1134593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1138688 R8_w=inv(id=0,umin_value=4096,umax_value=267300863,var_off=(0x0; 0xfffffff)) R9_w=invP277 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1142784 R6=inv(id=2,umin_value=1138689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1138688 R8_w=inv(id=0,umax_value=267296767,var_off=(0x0; 0xfffffff)) R9_w=invP278 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1142784 R2_w=inv(id=0,umax_value=267296767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1138689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1142784 R8_w=inv(id=0,umin_value=4096,umax_value=267296767,var_off=(0x0; 0xfffffff)) R9_w=invP278 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1138689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1142784 R8_w=inv(id=0,umin_value=4096,umax_value=267296767,var_off=(0x0; 0xfffffff)) R9_w=invP278 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1146880 R6=inv(id=2,umin_value=1142785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1142784 R8_w=inv(id=0,umax_value=267292671,var_off=(0x0; 0xfffffff)) R9_w=invP279 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1146880 R2_w=inv(id=0,umax_value=267292671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1142785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1146880 R8_w=inv(id=0,umin_value=4096,umax_value=267292671,var_off=(0x0; 0xfffffff)) R9_w=invP279 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1142785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1146880 R8_w=inv(id=0,umin_value=4096,umax_value=267292671,var_off=(0x0; 0xfffffff)) R9_w=invP279 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1150976 R6=inv(id=2,umin_value=1146881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1146880 R8=inv(id=0,umax_value=267288575,var_off=(0x0; 0xfffffff)) R9=invP280 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1150976 R2_w=inv(id=0,umax_value=267288575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1146881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1150976 R8=inv(id=0,umin_value=4096,umax_value=267288575,var_off=(0x0; 0xfffffff)) R9=invP280 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1146881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1150976 R8=inv(id=0,umin_value=4096,umax_value=267288575,var_off=(0x0; 0xfffffff)) R9=invP280 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1155072 R6=inv(id=2,umin_value=1150977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1150976 R8_w=inv(id=0,umax_value=267284479,var_off=(0x0; 0xfffffff)) R9_w=invP281 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1155072 R2_w=inv(id=0,umax_value=267284479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1150977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1155072 R8_w=inv(id=0,umin_value=4096,umax_value=267284479,var_off=(0x0; 0xfffffff)) R9_w=invP281 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1150977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1155072 R8_w=inv(id=0,umin_value=4096,umax_value=267284479,var_off=(0x0; 0xfffffff)) R9_w=invP281 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1159168 R6=inv(id=2,umin_value=1155073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1155072 R8_w=inv(id=0,umax_value=267280383,var_off=(0x0; 0xfffffff)) R9_w=invP282 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1159168 R2_w=inv(id=0,umax_value=267280383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1155073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1159168 R8_w=inv(id=0,umin_value=4096,umax_value=267280383,var_off=(0x0; 0xfffffff)) R9_w=invP282 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1155073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1159168 R8_w=inv(id=0,umin_value=4096,umax_value=267280383,var_off=(0x0; 0xfffffff)) R9_w=invP282 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1163264 R6=inv(id=2,umin_value=1159169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1159168 R8_w=inv(id=0,umax_value=267276287,var_off=(0x0; 0xfffffff)) R9_w=invP283 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1163264 R2_w=inv(id=0,umax_value=267276287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1159169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1163264 R8_w=inv(id=0,umin_value=4096,umax_value=267276287,var_off=(0x0; 0xfffffff)) R9_w=invP283 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1159169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1163264 R8_w=inv(id=0,umin_value=4096,umax_value=267276287,var_off=(0x0; 0xfffffff)) R9_w=invP283 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1167360 R6=inv(id=2,umin_value=1163265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1163264 R8=inv(id=0,umax_value=267272191,var_off=(0x0; 0xfffffff)) R9=invP284 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1167360 R2_w=inv(id=0,umax_value=267272191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1163265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1167360 R8=inv(id=0,umin_value=4096,umax_value=267272191,var_off=(0x0; 0xfffffff)) R9=invP284 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1163265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1167360 R8=inv(id=0,umin_value=4096,umax_value=267272191,var_off=(0x0; 0xfffffff)) R9=invP284 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1171456 R6=inv(id=2,umin_value=1167361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1167360 R8_w=inv(id=0,umax_value=267268095,var_off=(0x0; 0xfffffff)) R9_w=invP285 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1171456 R2_w=inv(id=0,umax_value=267268095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1167361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1171456 R8_w=inv(id=0,umin_value=4096,umax_value=267268095,var_off=(0x0; 0xfffffff)) R9_w=invP285 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1167361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1171456 R8_w=inv(id=0,umin_value=4096,umax_value=267268095,var_off=(0x0; 0xfffffff)) R9_w=invP285 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1175552 R6=inv(id=2,umin_value=1171457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1171456 R8_w=inv(id=0,umax_value=267263999,var_off=(0x0; 0xfffffff)) R9_w=invP286 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1175552 R2_w=inv(id=0,umax_value=267263999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1171457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1175552 R8_w=inv(id=0,umin_value=4096,umax_value=267263999,var_off=(0x0; 0xfffffff)) R9_w=invP286 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1171457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1175552 R8_w=inv(id=0,umin_value=4096,umax_value=267263999,var_off=(0x0; 0xfffffff)) R9_w=invP286 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1179648 R6=inv(id=2,umin_value=1175553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1175552 R8_w=inv(id=0,umax_value=267259903,var_off=(0x0; 0xfffffff)) R9_w=invP287 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1179648 R2_w=inv(id=0,umax_value=267259903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1175553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1179648 R8_w=inv(id=0,umin_value=4096,umax_value=267259903,var_off=(0x0; 0xfffffff)) R9_w=invP287 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1175553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1179648 R8_w=inv(id=0,umin_value=4096,umax_value=267259903,var_off=(0x0; 0xfffffff)) R9_w=invP287 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1183744 R6=inv(id=2,umin_value=1179649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1179648 R8=inv(id=0,umax_value=267255807,var_off=(0x0; 0xfffffff)) R9=invP288 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1183744 R2_w=inv(id=0,umax_value=267255807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1179649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1183744 R8=inv(id=0,umin_value=4096,umax_value=267255807,var_off=(0x0; 0xfffffff)) R9=invP288 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1179649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1183744 R8=inv(id=0,umin_value=4096,umax_value=267255807,var_off=(0x0; 0xfffffff)) R9=invP288 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1187840 R6=inv(id=2,umin_value=1183745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1183744 R8_w=inv(id=0,umax_value=267251711,var_off=(0x0; 0xfffffff)) R9_w=invP289 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1187840 R2_w=inv(id=0,umax_value=267251711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1183745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1187840 R8_w=inv(id=0,umin_value=4096,umax_value=267251711,var_off=(0x0; 0xfffffff)) R9_w=invP289 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1183745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1187840 R8_w=inv(id=0,umin_value=4096,umax_value=267251711,var_off=(0x0; 0xfffffff)) R9_w=invP289 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1191936 R6=inv(id=2,umin_value=1187841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1187840 R8_w=inv(id=0,umax_value=267247615,var_off=(0x0; 0xfffffff)) R9_w=invP290 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1191936 R2_w=inv(id=0,umax_value=267247615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1187841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1191936 R8_w=inv(id=0,umin_value=4096,umax_value=267247615,var_off=(0x0; 0xfffffff)) R9_w=invP290 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1187841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1191936 R8_w=inv(id=0,umin_value=4096,umax_value=267247615,var_off=(0x0; 0xfffffff)) R9_w=invP290 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1196032 R6=inv(id=2,umin_value=1191937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1191936 R8_w=inv(id=0,umax_value=267243519,var_off=(0x0; 0xfffffff)) R9_w=invP291 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1196032 R2_w=inv(id=0,umax_value=267243519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1191937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1196032 R8_w=inv(id=0,umin_value=4096,umax_value=267243519,var_off=(0x0; 0xfffffff)) R9_w=invP291 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1191937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1196032 R8_w=inv(id=0,umin_value=4096,umax_value=267243519,var_off=(0x0; 0xfffffff)) R9_w=invP291 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1200128 R6=inv(id=2,umin_value=1196033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1196032 R8=inv(id=0,umax_value=267239423,var_off=(0x0; 0xfffffff)) R9=invP292 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1200128 R2_w=inv(id=0,umax_value=267239423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1196033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1200128 R8=inv(id=0,umin_value=4096,umax_value=267239423,var_off=(0x0; 0xfffffff)) R9=invP292 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1196033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1200128 R8=inv(id=0,umin_value=4096,umax_value=267239423,var_off=(0x0; 0xfffffff)) R9=invP292 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1204224 R6=inv(id=2,umin_value=1200129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1200128 R8_w=inv(id=0,umax_value=267235327,var_off=(0x0; 0xfffffff)) R9_w=invP293 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1204224 R2_w=inv(id=0,umax_value=267235327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1200129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1204224 R8_w=inv(id=0,umin_value=4096,umax_value=267235327,var_off=(0x0; 0xfffffff)) R9_w=invP293 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1200129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1204224 R8_w=inv(id=0,umin_value=4096,umax_value=267235327,var_off=(0x0; 0xfffffff)) R9_w=invP293 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1208320 R6=inv(id=2,umin_value=1204225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1204224 R8_w=inv(id=0,umax_value=267231231,var_off=(0x0; 0xfffffff)) R9_w=invP294 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1208320 R2_w=inv(id=0,umax_value=267231231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1204225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1208320 R8_w=inv(id=0,umin_value=4096,umax_value=267231231,var_off=(0x0; 0xfffffff)) R9_w=invP294 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1204225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1208320 R8_w=inv(id=0,umin_value=4096,umax_value=267231231,var_off=(0x0; 0xfffffff)) R9_w=invP294 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1212416 R6=inv(id=2,umin_value=1208321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1208320 R8_w=inv(id=0,umax_value=267227135,var_off=(0x0; 0xfffffff)) R9_w=invP295 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1212416 R2_w=inv(id=0,umax_value=267227135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1208321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1212416 R8_w=inv(id=0,umin_value=4096,umax_value=267227135,var_off=(0x0; 0xfffffff)) R9_w=invP295 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1208321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1212416 R8_w=inv(id=0,umin_value=4096,umax_value=267227135,var_off=(0x0; 0xfffffff)) R9_w=invP295 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1216512 R6=inv(id=2,umin_value=1212417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1212416 R8=inv(id=0,umax_value=267223039,var_off=(0x0; 0xfffffff)) R9=invP296 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1216512 R2_w=inv(id=0,umax_value=267223039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1212417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1216512 R8=inv(id=0,umin_value=4096,umax_value=267223039,var_off=(0x0; 0xfffffff)) R9=invP296 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1212417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1216512 R8=inv(id=0,umin_value=4096,umax_value=267223039,var_off=(0x0; 0xfffffff)) R9=invP296 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1220608 R6=inv(id=2,umin_value=1216513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1216512 R8_w=inv(id=0,umax_value=267218943,var_off=(0x0; 0xfffffff)) R9_w=invP297 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1220608 R2_w=inv(id=0,umax_value=267218943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1216513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1220608 R8_w=inv(id=0,umin_value=4096,umax_value=267218943,var_off=(0x0; 0xfffffff)) R9_w=invP297 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1216513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1220608 R8_w=inv(id=0,umin_value=4096,umax_value=267218943,var_off=(0x0; 0xfffffff)) R9_w=invP297 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1224704 R6=inv(id=2,umin_value=1220609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1220608 R8_w=inv(id=0,umax_value=267214847,var_off=(0x0; 0xfffffff)) R9_w=invP298 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1224704 R2_w=inv(id=0,umax_value=267214847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1220609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1224704 R8_w=inv(id=0,umin_value=4096,umax_value=267214847,var_off=(0x0; 0xfffffff)) R9_w=invP298 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1220609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1224704 R8_w=inv(id=0,umin_value=4096,umax_value=267214847,var_off=(0x0; 0xfffffff)) R9_w=invP298 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1228800 R6=inv(id=2,umin_value=1224705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1224704 R8_w=inv(id=0,umax_value=267210751,var_off=(0x0; 0xfffffff)) R9_w=invP299 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1228800 R2_w=inv(id=0,umax_value=267210751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1224705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1228800 R8_w=inv(id=0,umin_value=4096,umax_value=267210751,var_off=(0x0; 0xfffffff)) R9_w=invP299 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1224705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1228800 R8_w=inv(id=0,umin_value=4096,umax_value=267210751,var_off=(0x0; 0xfffffff)) R9_w=invP299 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1232896 R6=inv(id=2,umin_value=1228801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1228800 R8=inv(id=0,umax_value=267206655,var_off=(0x0; 0xfffffff)) R9=invP300 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1232896 R2_w=inv(id=0,umax_value=267206655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1228801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1232896 R8=inv(id=0,umin_value=4096,umax_value=267206655,var_off=(0x0; 0xfffffff)) R9=invP300 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1228801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1232896 R8=inv(id=0,umin_value=4096,umax_value=267206655,var_off=(0x0; 0xfffffff)) R9=invP300 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1236992 R6=inv(id=2,umin_value=1232897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1232896 R8_w=inv(id=0,umax_value=267202559,var_off=(0x0; 0xfffffff)) R9_w=invP301 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1236992 R2_w=inv(id=0,umax_value=267202559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1232897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1236992 R8_w=inv(id=0,umin_value=4096,umax_value=267202559,var_off=(0x0; 0xfffffff)) R9_w=invP301 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1232897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1236992 R8_w=inv(id=0,umin_value=4096,umax_value=267202559,var_off=(0x0; 0xfffffff)) R9_w=invP301 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1241088 R6=inv(id=2,umin_value=1236993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1236992 R8_w=inv(id=0,umax_value=267198463,var_off=(0x0; 0xfffffff)) R9_w=invP302 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1241088 R2_w=inv(id=0,umax_value=267198463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1236993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1241088 R8_w=inv(id=0,umin_value=4096,umax_value=267198463,var_off=(0x0; 0xfffffff)) R9_w=invP302 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1236993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1241088 R8_w=inv(id=0,umin_value=4096,umax_value=267198463,var_off=(0x0; 0xfffffff)) R9_w=invP302 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1245184 R6=inv(id=2,umin_value=1241089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1241088 R8_w=inv(id=0,umax_value=267194367,var_off=(0x0; 0xfffffff)) R9_w=invP303 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1245184 R2_w=inv(id=0,umax_value=267194367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1241089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1245184 R8_w=inv(id=0,umin_value=4096,umax_value=267194367,var_off=(0x0; 0xfffffff)) R9_w=invP303 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1241089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1245184 R8_w=inv(id=0,umin_value=4096,umax_value=267194367,var_off=(0x0; 0xfffffff)) R9_w=invP303 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1249280 R6=inv(id=2,umin_value=1245185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1245184 R8=inv(id=0,umax_value=267190271,var_off=(0x0; 0xfffffff)) R9=invP304 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1249280 R2_w=inv(id=0,umax_value=267190271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1245185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1249280 R8=inv(id=0,umin_value=4096,umax_value=267190271,var_off=(0x0; 0xfffffff)) R9=invP304 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1245185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1249280 R8=inv(id=0,umin_value=4096,umax_value=267190271,var_off=(0x0; 0xfffffff)) R9=invP304 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1253376 R6=inv(id=2,umin_value=1249281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1249280 R8_w=inv(id=0,umax_value=267186175,var_off=(0x0; 0xfffffff)) R9_w=invP305 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1253376 R2_w=inv(id=0,umax_value=267186175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1249281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1253376 R8_w=inv(id=0,umin_value=4096,umax_value=267186175,var_off=(0x0; 0xfffffff)) R9_w=invP305 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1249281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1253376 R8_w=inv(id=0,umin_value=4096,umax_value=267186175,var_off=(0x0; 0xfffffff)) R9_w=invP305 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1257472 R6=inv(id=2,umin_value=1253377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1253376 R8_w=inv(id=0,umax_value=267182079,var_off=(0x0; 0xfffffff)) R9_w=invP306 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1257472 R2_w=inv(id=0,umax_value=267182079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1253377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1257472 R8_w=inv(id=0,umin_value=4096,umax_value=267182079,var_off=(0x0; 0xfffffff)) R9_w=invP306 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1253377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1257472 R8_w=inv(id=0,umin_value=4096,umax_value=267182079,var_off=(0x0; 0xfffffff)) R9_w=invP306 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1261568 R6=inv(id=2,umin_value=1257473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1257472 R8_w=inv(id=0,umax_value=267177983,var_off=(0x0; 0xfffffff)) R9_w=invP307 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1261568 R2_w=inv(id=0,umax_value=267177983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1257473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1261568 R8_w=inv(id=0,umin_value=4096,umax_value=267177983,var_off=(0x0; 0xfffffff)) R9_w=invP307 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1257473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1261568 R8_w=inv(id=0,umin_value=4096,umax_value=267177983,var_off=(0x0; 0xfffffff)) R9_w=invP307 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1265664 R6=inv(id=2,umin_value=1261569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1261568 R8=inv(id=0,umax_value=267173887,var_off=(0x0; 0xfffffff)) R9=invP308 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1265664 R2_w=inv(id=0,umax_value=267173887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1261569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1265664 R8=inv(id=0,umin_value=4096,umax_value=267173887,var_off=(0x0; 0xfffffff)) R9=invP308 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1261569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1265664 R8=inv(id=0,umin_value=4096,umax_value=267173887,var_off=(0x0; 0xfffffff)) R9=invP308 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1269760 R6=inv(id=2,umin_value=1265665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1265664 R8_w=inv(id=0,umax_value=267169791,var_off=(0x0; 0xfffffff)) R9_w=invP309 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1269760 R2_w=inv(id=0,umax_value=267169791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1265665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1269760 R8_w=inv(id=0,umin_value=4096,umax_value=267169791,var_off=(0x0; 0xfffffff)) R9_w=invP309 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1265665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1269760 R8_w=inv(id=0,umin_value=4096,umax_value=267169791,var_off=(0x0; 0xfffffff)) R9_w=invP309 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1273856 R6=inv(id=2,umin_value=1269761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1269760 R8_w=inv(id=0,umax_value=267165695,var_off=(0x0; 0xfffffff)) R9_w=invP310 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1273856 R2_w=inv(id=0,umax_value=267165695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1269761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1273856 R8_w=inv(id=0,umin_value=4096,umax_value=267165695,var_off=(0x0; 0xfffffff)) R9_w=invP310 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1269761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1273856 R8_w=inv(id=0,umin_value=4096,umax_value=267165695,var_off=(0x0; 0xfffffff)) R9_w=invP310 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1277952 R6=inv(id=2,umin_value=1273857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1273856 R8_w=inv(id=0,umax_value=267161599,var_off=(0x0; 0xfffffff)) R9_w=invP311 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1277952 R2_w=inv(id=0,umax_value=267161599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1273857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1277952 R8_w=inv(id=0,umin_value=4096,umax_value=267161599,var_off=(0x0; 0xfffffff)) R9_w=invP311 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1273857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1277952 R8_w=inv(id=0,umin_value=4096,umax_value=267161599,var_off=(0x0; 0xfffffff)) R9_w=invP311 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1282048 R6=inv(id=2,umin_value=1277953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1277952 R8=inv(id=0,umax_value=267157503,var_off=(0x0; 0xfffffff)) R9=invP312 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1282048 R2_w=inv(id=0,umax_value=267157503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1277953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1282048 R8=inv(id=0,umin_value=4096,umax_value=267157503,var_off=(0x0; 0xfffffff)) R9=invP312 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1277953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1282048 R8=inv(id=0,umin_value=4096,umax_value=267157503,var_off=(0x0; 0xfffffff)) R9=invP312 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1286144 R6=inv(id=2,umin_value=1282049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1282048 R8_w=inv(id=0,umax_value=267153407,var_off=(0x0; 0xfffffff)) R9_w=invP313 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1286144 R2_w=inv(id=0,umax_value=267153407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1282049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1286144 R8_w=inv(id=0,umin_value=4096,umax_value=267153407,var_off=(0x0; 0xfffffff)) R9_w=invP313 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1282049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1286144 R8_w=inv(id=0,umin_value=4096,umax_value=267153407,var_off=(0x0; 0xfffffff)) R9_w=invP313 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1290240 R6=inv(id=2,umin_value=1286145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1286144 R8_w=inv(id=0,umax_value=267149311,var_off=(0x0; 0xfffffff)) R9_w=invP314 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1290240 R2_w=inv(id=0,umax_value=267149311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1286145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1290240 R8_w=inv(id=0,umin_value=4096,umax_value=267149311,var_off=(0x0; 0xfffffff)) R9_w=invP314 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1286145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1290240 R8_w=inv(id=0,umin_value=4096,umax_value=267149311,var_off=(0x0; 0xfffffff)) R9_w=invP314 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1294336 R6=inv(id=2,umin_value=1290241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1290240 R8_w=inv(id=0,umax_value=267145215,var_off=(0x0; 0xfffffff)) R9_w=invP315 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1294336 R2_w=inv(id=0,umax_value=267145215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1290241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1294336 R8_w=inv(id=0,umin_value=4096,umax_value=267145215,var_off=(0x0; 0xfffffff)) R9_w=invP315 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1290241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1294336 R8_w=inv(id=0,umin_value=4096,umax_value=267145215,var_off=(0x0; 0xfffffff)) R9_w=invP315 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1298432 R6=inv(id=2,umin_value=1294337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1294336 R8=inv(id=0,umax_value=267141119,var_off=(0x0; 0xfffffff)) R9=invP316 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1298432 R2_w=inv(id=0,umax_value=267141119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1294337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1298432 R8=inv(id=0,umin_value=4096,umax_value=267141119,var_off=(0x0; 0xfffffff)) R9=invP316 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1294337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1298432 R8=inv(id=0,umin_value=4096,umax_value=267141119,var_off=(0x0; 0xfffffff)) R9=invP316 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1302528 R6=inv(id=2,umin_value=1298433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1298432 R8_w=inv(id=0,umax_value=267137023,var_off=(0x0; 0xfffffff)) R9_w=invP317 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1302528 R2_w=inv(id=0,umax_value=267137023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1298433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1302528 R8_w=inv(id=0,umin_value=4096,umax_value=267137023,var_off=(0x0; 0xfffffff)) R9_w=invP317 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1298433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1302528 R8_w=inv(id=0,umin_value=4096,umax_value=267137023,var_off=(0x0; 0xfffffff)) R9_w=invP317 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1306624 R6=inv(id=2,umin_value=1302529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1302528 R8_w=inv(id=0,umax_value=267132927,var_off=(0x0; 0xfffffff)) R9_w=invP318 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1306624 R2_w=inv(id=0,umax_value=267132927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1302529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1306624 R8_w=inv(id=0,umin_value=4096,umax_value=267132927,var_off=(0x0; 0xfffffff)) R9_w=invP318 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1302529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1306624 R8_w=inv(id=0,umin_value=4096,umax_value=267132927,var_off=(0x0; 0xfffffff)) R9_w=invP318 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1310720 R6=inv(id=2,umin_value=1306625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1306624 R8_w=inv(id=0,umax_value=267128831,var_off=(0x0; 0xfffffff)) R9_w=invP319 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1310720 R2_w=inv(id=0,umax_value=267128831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1306625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1310720 R8_w=inv(id=0,umin_value=4096,umax_value=267128831,var_off=(0x0; 0xfffffff)) R9_w=invP319 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1306625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1310720 R8_w=inv(id=0,umin_value=4096,umax_value=267128831,var_off=(0x0; 0xfffffff)) R9_w=invP319 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1314816 R6=inv(id=2,umin_value=1310721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1310720 R8=inv(id=0,umax_value=267124735,var_off=(0x0; 0xfffffff)) R9=invP320 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1314816 R2_w=inv(id=0,umax_value=267124735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1310721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1314816 R8=inv(id=0,umin_value=4096,umax_value=267124735,var_off=(0x0; 0xfffffff)) R9=invP320 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1310721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1314816 R8=inv(id=0,umin_value=4096,umax_value=267124735,var_off=(0x0; 0xfffffff)) R9=invP320 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1318912 R6=inv(id=2,umin_value=1314817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1314816 R8_w=inv(id=0,umax_value=267120639,var_off=(0x0; 0xfffffff)) R9_w=invP321 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1318912 R2_w=inv(id=0,umax_value=267120639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1314817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1318912 R8_w=inv(id=0,umin_value=4096,umax_value=267120639,var_off=(0x0; 0xfffffff)) R9_w=invP321 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1314817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1318912 R8_w=inv(id=0,umin_value=4096,umax_value=267120639,var_off=(0x0; 0xfffffff)) R9_w=invP321 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1323008 R6=inv(id=2,umin_value=1318913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1318912 R8_w=inv(id=0,umax_value=267116543,var_off=(0x0; 0xfffffff)) R9_w=invP322 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1323008 R2_w=inv(id=0,umax_value=267116543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1318913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1323008 R8_w=inv(id=0,umin_value=4096,umax_value=267116543,var_off=(0x0; 0xfffffff)) R9_w=invP322 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1318913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1323008 R8_w=inv(id=0,umin_value=4096,umax_value=267116543,var_off=(0x0; 0xfffffff)) R9_w=invP322 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1327104 R6=inv(id=2,umin_value=1323009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1323008 R8_w=inv(id=0,umax_value=267112447,var_off=(0x0; 0xfffffff)) R9_w=invP323 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1327104 R2_w=inv(id=0,umax_value=267112447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1323009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1327104 R8_w=inv(id=0,umin_value=4096,umax_value=267112447,var_off=(0x0; 0xfffffff)) R9_w=invP323 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1323009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1327104 R8_w=inv(id=0,umin_value=4096,umax_value=267112447,var_off=(0x0; 0xfffffff)) R9_w=invP323 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1331200 R6=inv(id=2,umin_value=1327105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1327104 R8=inv(id=0,umax_value=267108351,var_off=(0x0; 0xfffffff)) R9=invP324 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1331200 R2_w=inv(id=0,umax_value=267108351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1327105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1331200 R8=inv(id=0,umin_value=4096,umax_value=267108351,var_off=(0x0; 0xfffffff)) R9=invP324 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1327105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1331200 R8=inv(id=0,umin_value=4096,umax_value=267108351,var_off=(0x0; 0xfffffff)) R9=invP324 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1335296 R6=inv(id=2,umin_value=1331201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1331200 R8_w=inv(id=0,umax_value=267104255,var_off=(0x0; 0xfffffff)) R9_w=invP325 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1335296 R2_w=inv(id=0,umax_value=267104255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1331201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1335296 R8_w=inv(id=0,umin_value=4096,umax_value=267104255,var_off=(0x0; 0xfffffff)) R9_w=invP325 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1331201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1335296 R8_w=inv(id=0,umin_value=4096,umax_value=267104255,var_off=(0x0; 0xfffffff)) R9_w=invP325 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1339392 R6=inv(id=2,umin_value=1335297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1335296 R8_w=inv(id=0,umax_value=267100159,var_off=(0x0; 0xfffffff)) R9_w=invP326 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1339392 R2_w=inv(id=0,umax_value=267100159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1335297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1339392 R8_w=inv(id=0,umin_value=4096,umax_value=267100159,var_off=(0x0; 0xfffffff)) R9_w=invP326 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1335297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1339392 R8_w=inv(id=0,umin_value=4096,umax_value=267100159,var_off=(0x0; 0xfffffff)) R9_w=invP326 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1343488 R6=inv(id=2,umin_value=1339393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1339392 R8_w=inv(id=0,umax_value=267096063,var_off=(0x0; 0xfffffff)) R9_w=invP327 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1343488 R2_w=inv(id=0,umax_value=267096063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1339393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1343488 R8_w=inv(id=0,umin_value=4096,umax_value=267096063,var_off=(0x0; 0xfffffff)) R9_w=invP327 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1339393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1343488 R8_w=inv(id=0,umin_value=4096,umax_value=267096063,var_off=(0x0; 0xfffffff)) R9_w=invP327 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1347584 R6=inv(id=2,umin_value=1343489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1343488 R8=inv(id=0,umax_value=267091967,var_off=(0x0; 0xfffffff)) R9=invP328 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1347584 R2_w=inv(id=0,umax_value=267091967,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1343489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1347584 R8=inv(id=0,umin_value=4096,umax_value=267091967,var_off=(0x0; 0xfffffff)) R9=invP328 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1343489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1347584 R8=inv(id=0,umin_value=4096,umax_value=267091967,var_off=(0x0; 0xfffffff)) R9=invP328 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1351680 R6=inv(id=2,umin_value=1347585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1347584 R8_w=inv(id=0,umax_value=267087871,var_off=(0x0; 0xfffffff)) R9_w=invP329 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1351680 R2_w=inv(id=0,umax_value=267087871,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1347585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1351680 R8_w=inv(id=0,umin_value=4096,umax_value=267087871,var_off=(0x0; 0xfffffff)) R9_w=invP329 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1347585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1351680 R8_w=inv(id=0,umin_value=4096,umax_value=267087871,var_off=(0x0; 0xfffffff)) R9_w=invP329 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1355776 R6=inv(id=2,umin_value=1351681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1351680 R8_w=inv(id=0,umax_value=267083775,var_off=(0x0; 0xfffffff)) R9_w=invP330 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1355776 R2_w=inv(id=0,umax_value=267083775,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1351681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1355776 R8_w=inv(id=0,umin_value=4096,umax_value=267083775,var_off=(0x0; 0xfffffff)) R9_w=invP330 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1351681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1355776 R8_w=inv(id=0,umin_value=4096,umax_value=267083775,var_off=(0x0; 0xfffffff)) R9_w=invP330 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1359872 R6=inv(id=2,umin_value=1355777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1355776 R8_w=inv(id=0,umax_value=267079679,var_off=(0x0; 0xfffffff)) R9_w=invP331 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1359872 R2_w=inv(id=0,umax_value=267079679,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1355777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1359872 R8_w=inv(id=0,umin_value=4096,umax_value=267079679,var_off=(0x0; 0xfffffff)) R9_w=invP331 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1355777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1359872 R8_w=inv(id=0,umin_value=4096,umax_value=267079679,var_off=(0x0; 0xfffffff)) R9_w=invP331 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1363968 R6=inv(id=2,umin_value=1359873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1359872 R8=inv(id=0,umax_value=267075583,var_off=(0x0; 0xfffffff)) R9=invP332 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1363968 R2_w=inv(id=0,umax_value=267075583,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1359873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1363968 R8=inv(id=0,umin_value=4096,umax_value=267075583,var_off=(0x0; 0xfffffff)) R9=invP332 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1359873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1363968 R8=inv(id=0,umin_value=4096,umax_value=267075583,var_off=(0x0; 0xfffffff)) R9=invP332 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1368064 R6=inv(id=2,umin_value=1363969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1363968 R8_w=inv(id=0,umax_value=267071487,var_off=(0x0; 0xfffffff)) R9_w=invP333 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1368064 R2_w=inv(id=0,umax_value=267071487,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1363969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1368064 R8_w=inv(id=0,umin_value=4096,umax_value=267071487,var_off=(0x0; 0xfffffff)) R9_w=invP333 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1363969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1368064 R8_w=inv(id=0,umin_value=4096,umax_value=267071487,var_off=(0x0; 0xfffffff)) R9_w=invP333 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1372160 R6=inv(id=2,umin_value=1368065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1368064 R8_w=inv(id=0,umax_value=267067391,var_off=(0x0; 0xfffffff)) R9_w=invP334 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1372160 R2_w=inv(id=0,umax_value=267067391,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1368065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1372160 R8_w=inv(id=0,umin_value=4096,umax_value=267067391,var_off=(0x0; 0xfffffff)) R9_w=invP334 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1368065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1372160 R8_w=inv(id=0,umin_value=4096,umax_value=267067391,var_off=(0x0; 0xfffffff)) R9_w=invP334 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1376256 R6=inv(id=2,umin_value=1372161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1372160 R8_w=inv(id=0,umax_value=267063295,var_off=(0x0; 0xfffffff)) R9_w=invP335 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1376256 R2_w=inv(id=0,umax_value=267063295,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1372161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1376256 R8_w=inv(id=0,umin_value=4096,umax_value=267063295,var_off=(0x0; 0xfffffff)) R9_w=invP335 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1372161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1376256 R8_w=inv(id=0,umin_value=4096,umax_value=267063295,var_off=(0x0; 0xfffffff)) R9_w=invP335 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1380352 R6=inv(id=2,umin_value=1376257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1376256 R8=inv(id=0,umax_value=267059199,var_off=(0x0; 0xfffffff)) R9=invP336 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1380352 R2_w=inv(id=0,umax_value=267059199,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1376257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1380352 R8=inv(id=0,umin_value=4096,umax_value=267059199,var_off=(0x0; 0xfffffff)) R9=invP336 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1376257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1380352 R8=inv(id=0,umin_value=4096,umax_value=267059199,var_off=(0x0; 0xfffffff)) R9=invP336 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1384448 R6=inv(id=2,umin_value=1380353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1380352 R8_w=inv(id=0,umax_value=267055103,var_off=(0x0; 0xfffffff)) R9_w=invP337 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1384448 R2_w=inv(id=0,umax_value=267055103,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1380353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1384448 R8_w=inv(id=0,umin_value=4096,umax_value=267055103,var_off=(0x0; 0xfffffff)) R9_w=invP337 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1380353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1384448 R8_w=inv(id=0,umin_value=4096,umax_value=267055103,var_off=(0x0; 0xfffffff)) R9_w=invP337 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1388544 R6=inv(id=2,umin_value=1384449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1384448 R8_w=inv(id=0,umax_value=267051007,var_off=(0x0; 0xfffffff)) R9_w=invP338 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1388544 R2_w=inv(id=0,umax_value=267051007,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1384449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1388544 R8_w=inv(id=0,umin_value=4096,umax_value=267051007,var_off=(0x0; 0xfffffff)) R9_w=invP338 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1384449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1388544 R8_w=inv(id=0,umin_value=4096,umax_value=267051007,var_off=(0x0; 0xfffffff)) R9_w=invP338 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1392640 R6=inv(id=2,umin_value=1388545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1388544 R8_w=inv(id=0,umax_value=267046911,var_off=(0x0; 0xfffffff)) R9_w=invP339 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1392640 R2_w=inv(id=0,umax_value=267046911,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1388545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1392640 R8_w=inv(id=0,umin_value=4096,umax_value=267046911,var_off=(0x0; 0xfffffff)) R9_w=invP339 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1388545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1392640 R8_w=inv(id=0,umin_value=4096,umax_value=267046911,var_off=(0x0; 0xfffffff)) R9_w=invP339 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1396736 R6=inv(id=2,umin_value=1392641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1392640 R8=inv(id=0,umax_value=267042815,var_off=(0x0; 0xfffffff)) R9=invP340 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1396736 R2_w=inv(id=0,umax_value=267042815,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1392641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1396736 R8=inv(id=0,umin_value=4096,umax_value=267042815,var_off=(0x0; 0xfffffff)) R9=invP340 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1392641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1396736 R8=inv(id=0,umin_value=4096,umax_value=267042815,var_off=(0x0; 0xfffffff)) R9=invP340 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1400832 R6=inv(id=2,umin_value=1396737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1396736 R8_w=inv(id=0,umax_value=267038719,var_off=(0x0; 0xfffffff)) R9_w=invP341 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1400832 R2_w=inv(id=0,umax_value=267038719,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1396737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1400832 R8_w=inv(id=0,umin_value=4096,umax_value=267038719,var_off=(0x0; 0xfffffff)) R9_w=invP341 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1396737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1400832 R8_w=inv(id=0,umin_value=4096,umax_value=267038719,var_off=(0x0; 0xfffffff)) R9_w=invP341 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1404928 R6=inv(id=2,umin_value=1400833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1400832 R8_w=inv(id=0,umax_value=267034623,var_off=(0x0; 0xfffffff)) R9_w=invP342 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1404928 R2_w=inv(id=0,umax_value=267034623,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1400833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1404928 R8_w=inv(id=0,umin_value=4096,umax_value=267034623,var_off=(0x0; 0xfffffff)) R9_w=invP342 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1400833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1404928 R8_w=inv(id=0,umin_value=4096,umax_value=267034623,var_off=(0x0; 0xfffffff)) R9_w=invP342 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1409024 R6=inv(id=2,umin_value=1404929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1404928 R8_w=inv(id=0,umax_value=267030527,var_off=(0x0; 0xfffffff)) R9_w=invP343 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1409024 R2_w=inv(id=0,umax_value=267030527,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1404929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1409024 R8_w=inv(id=0,umin_value=4096,umax_value=267030527,var_off=(0x0; 0xfffffff)) R9_w=invP343 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1404929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1409024 R8_w=inv(id=0,umin_value=4096,umax_value=267030527,var_off=(0x0; 0xfffffff)) R9_w=invP343 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1413120 R6=inv(id=2,umin_value=1409025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1409024 R8=inv(id=0,umax_value=267026431,var_off=(0x0; 0xfffffff)) R9=invP344 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1413120 R2_w=inv(id=0,umax_value=267026431,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1409025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1413120 R8=inv(id=0,umin_value=4096,umax_value=267026431,var_off=(0x0; 0xfffffff)) R9=invP344 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1409025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1413120 R8=inv(id=0,umin_value=4096,umax_value=267026431,var_off=(0x0; 0xfffffff)) R9=invP344 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1417216 R6=inv(id=2,umin_value=1413121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1413120 R8_w=inv(id=0,umax_value=267022335,var_off=(0x0; 0xfffffff)) R9_w=invP345 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1417216 R2_w=inv(id=0,umax_value=267022335,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1413121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1417216 R8_w=inv(id=0,umin_value=4096,umax_value=267022335,var_off=(0x0; 0xfffffff)) R9_w=invP345 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1413121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1417216 R8_w=inv(id=0,umin_value=4096,umax_value=267022335,var_off=(0x0; 0xfffffff)) R9_w=invP345 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1421312 R6=inv(id=2,umin_value=1417217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1417216 R8_w=inv(id=0,umax_value=267018239,var_off=(0x0; 0xfffffff)) R9_w=invP346 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1421312 R2_w=inv(id=0,umax_value=267018239,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1417217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1421312 R8_w=inv(id=0,umin_value=4096,umax_value=267018239,var_off=(0x0; 0xfffffff)) R9_w=invP346 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1417217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1421312 R8_w=inv(id=0,umin_value=4096,umax_value=267018239,var_off=(0x0; 0xfffffff)) R9_w=invP346 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1425408 R6=inv(id=2,umin_value=1421313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1421312 R8_w=inv(id=0,umax_value=267014143,var_off=(0x0; 0xfffffff)) R9_w=invP347 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1425408 R2_w=inv(id=0,umax_value=267014143,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1421313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1425408 R8_w=inv(id=0,umin_value=4096,umax_value=267014143,var_off=(0x0; 0xfffffff)) R9_w=invP347 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1421313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1425408 R8_w=inv(id=0,umin_value=4096,umax_value=267014143,var_off=(0x0; 0xfffffff)) R9_w=invP347 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1429504 R6=inv(id=2,umin_value=1425409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1425408 R8=inv(id=0,umax_value=267010047,var_off=(0x0; 0xfffffff)) R9=invP348 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1429504 R2_w=inv(id=0,umax_value=267010047,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1425409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1429504 R8=inv(id=0,umin_value=4096,umax_value=267010047,var_off=(0x0; 0xfffffff)) R9=invP348 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1425409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1429504 R8=inv(id=0,umin_value=4096,umax_value=267010047,var_off=(0x0; 0xfffffff)) R9=invP348 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1433600 R6=inv(id=2,umin_value=1429505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1429504 R8_w=inv(id=0,umax_value=267005951,var_off=(0x0; 0xfffffff)) R9_w=invP349 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1433600 R2_w=inv(id=0,umax_value=267005951,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1429505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1433600 R8_w=inv(id=0,umin_value=4096,umax_value=267005951,var_off=(0x0; 0xfffffff)) R9_w=invP349 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1429505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1433600 R8_w=inv(id=0,umin_value=4096,umax_value=267005951,var_off=(0x0; 0xfffffff)) R9_w=invP349 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1437696 R6=inv(id=2,umin_value=1433601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1433600 R8_w=inv(id=0,umax_value=267001855,var_off=(0x0; 0xfffffff)) R9_w=invP350 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1437696 R2_w=inv(id=0,umax_value=267001855,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1433601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1437696 R8_w=inv(id=0,umin_value=4096,umax_value=267001855,var_off=(0x0; 0xfffffff)) R9_w=invP350 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1433601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1437696 R8_w=inv(id=0,umin_value=4096,umax_value=267001855,var_off=(0x0; 0xfffffff)) R9_w=invP350 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1441792 R6=inv(id=2,umin_value=1437697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1437696 R8_w=inv(id=0,umax_value=266997759,var_off=(0x0; 0xfffffff)) R9_w=invP351 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1441792 R2_w=inv(id=0,umax_value=266997759,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1437697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1441792 R8_w=inv(id=0,umin_value=4096,umax_value=266997759,var_off=(0x0; 0xfffffff)) R9_w=invP351 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1437697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1441792 R8_w=inv(id=0,umin_value=4096,umax_value=266997759,var_off=(0x0; 0xfffffff)) R9_w=invP351 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1445888 R6=inv(id=2,umin_value=1441793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1441792 R8=inv(id=0,umax_value=266993663,var_off=(0x0; 0xfffffff)) R9=invP352 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1445888 R2_w=inv(id=0,umax_value=266993663,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1441793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1445888 R8=inv(id=0,umin_value=4096,umax_value=266993663,var_off=(0x0; 0xfffffff)) R9=invP352 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1441793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1445888 R8=inv(id=0,umin_value=4096,umax_value=266993663,var_off=(0x0; 0xfffffff)) R9=invP352 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1449984 R6=inv(id=2,umin_value=1445889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1445888 R8_w=inv(id=0,umax_value=266989567,var_off=(0x0; 0xfffffff)) R9_w=invP353 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1449984 R2_w=inv(id=0,umax_value=266989567,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1445889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1449984 R8_w=inv(id=0,umin_value=4096,umax_value=266989567,var_off=(0x0; 0xfffffff)) R9_w=invP353 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1445889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1449984 R8_w=inv(id=0,umin_value=4096,umax_value=266989567,var_off=(0x0; 0xfffffff)) R9_w=invP353 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1454080 R6=inv(id=2,umin_value=1449985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1449984 R8_w=inv(id=0,umax_value=266985471,var_off=(0x0; 0xfffffff)) R9_w=invP354 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1454080 R2_w=inv(id=0,umax_value=266985471,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1449985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1454080 R8_w=inv(id=0,umin_value=4096,umax_value=266985471,var_off=(0x0; 0xfffffff)) R9_w=invP354 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1449985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1454080 R8_w=inv(id=0,umin_value=4096,umax_value=266985471,var_off=(0x0; 0xfffffff)) R9_w=invP354 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1458176 R6=inv(id=2,umin_value=1454081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1454080 R8_w=inv(id=0,umax_value=266981375,var_off=(0x0; 0xfffffff)) R9_w=invP355 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1458176 R2_w=inv(id=0,umax_value=266981375,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1454081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1458176 R8_w=inv(id=0,umin_value=4096,umax_value=266981375,var_off=(0x0; 0xfffffff)) R9_w=invP355 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1454081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1458176 R8_w=inv(id=0,umin_value=4096,umax_value=266981375,var_off=(0x0; 0xfffffff)) R9_w=invP355 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1462272 R6=inv(id=2,umin_value=1458177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1458176 R8=inv(id=0,umax_value=266977279,var_off=(0x0; 0xfffffff)) R9=invP356 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1462272 R2_w=inv(id=0,umax_value=266977279,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1458177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1462272 R8=inv(id=0,umin_value=4096,umax_value=266977279,var_off=(0x0; 0xfffffff)) R9=invP356 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1458177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1462272 R8=inv(id=0,umin_value=4096,umax_value=266977279,var_off=(0x0; 0xfffffff)) R9=invP356 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1466368 R6=inv(id=2,umin_value=1462273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1462272 R8_w=inv(id=0,umax_value=266973183,var_off=(0x0; 0xfffffff)) R9_w=invP357 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1466368 R2_w=inv(id=0,umax_value=266973183,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1462273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1466368 R8_w=inv(id=0,umin_value=4096,umax_value=266973183,var_off=(0x0; 0xfffffff)) R9_w=invP357 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1462273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1466368 R8_w=inv(id=0,umin_value=4096,umax_value=266973183,var_off=(0x0; 0xfffffff)) R9_w=invP357 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1470464 R6=inv(id=2,umin_value=1466369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1466368 R8_w=inv(id=0,umax_value=266969087,var_off=(0x0; 0xfffffff)) R9_w=invP358 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1470464 R2_w=inv(id=0,umax_value=266969087,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1466369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1470464 R8_w=inv(id=0,umin_value=4096,umax_value=266969087,var_off=(0x0; 0xfffffff)) R9_w=invP358 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1466369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1470464 R8_w=inv(id=0,umin_value=4096,umax_value=266969087,var_off=(0x0; 0xfffffff)) R9_w=invP358 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1474560 R6=inv(id=2,umin_value=1470465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1470464 R8_w=inv(id=0,umax_value=266964991,var_off=(0x0; 0xfffffff)) R9_w=invP359 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1474560 R2_w=inv(id=0,umax_value=266964991,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1470465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1474560 R8_w=inv(id=0,umin_value=4096,umax_value=266964991,var_off=(0x0; 0xfffffff)) R9_w=invP359 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1470465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1474560 R8_w=inv(id=0,umin_value=4096,umax_value=266964991,var_off=(0x0; 0xfffffff)) R9_w=invP359 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1478656 R6=inv(id=2,umin_value=1474561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1474560 R8=inv(id=0,umax_value=266960895,var_off=(0x0; 0xfffffff)) R9=invP360 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1478656 R2_w=inv(id=0,umax_value=266960895,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1474561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1478656 R8=inv(id=0,umin_value=4096,umax_value=266960895,var_off=(0x0; 0xfffffff)) R9=invP360 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1474561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1478656 R8=inv(id=0,umin_value=4096,umax_value=266960895,var_off=(0x0; 0xfffffff)) R9=invP360 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1482752 R6=inv(id=2,umin_value=1478657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1478656 R8_w=inv(id=0,umax_value=266956799,var_off=(0x0; 0xfffffff)) R9_w=invP361 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1482752 R2_w=inv(id=0,umax_value=266956799,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1478657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1482752 R8_w=inv(id=0,umin_value=4096,umax_value=266956799,var_off=(0x0; 0xfffffff)) R9_w=invP361 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1478657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1482752 R8_w=inv(id=0,umin_value=4096,umax_value=266956799,var_off=(0x0; 0xfffffff)) R9_w=invP361 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1486848 R6=inv(id=2,umin_value=1482753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1482752 R8_w=inv(id=0,umax_value=266952703,var_off=(0x0; 0xfffffff)) R9_w=invP362 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1486848 R2_w=inv(id=0,umax_value=266952703,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1482753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1486848 R8_w=inv(id=0,umin_value=4096,umax_value=266952703,var_off=(0x0; 0xfffffff)) R9_w=invP362 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1482753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1486848 R8_w=inv(id=0,umin_value=4096,umax_value=266952703,var_off=(0x0; 0xfffffff)) R9_w=invP362 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1490944 R6=inv(id=2,umin_value=1486849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1486848 R8_w=inv(id=0,umax_value=266948607,var_off=(0x0; 0xfffffff)) R9_w=invP363 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1490944 R2_w=inv(id=0,umax_value=266948607,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1486849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1490944 R8_w=inv(id=0,umin_value=4096,umax_value=266948607,var_off=(0x0; 0xfffffff)) R9_w=invP363 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1486849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1490944 R8_w=inv(id=0,umin_value=4096,umax_value=266948607,var_off=(0x0; 0xfffffff)) R9_w=invP363 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1495040 R6=inv(id=2,umin_value=1490945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1490944 R8=inv(id=0,umax_value=266944511,var_off=(0x0; 0xfffffff)) R9=invP364 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1495040 R2_w=inv(id=0,umax_value=266944511,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1490945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1495040 R8=inv(id=0,umin_value=4096,umax_value=266944511,var_off=(0x0; 0xfffffff)) R9=invP364 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1490945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1495040 R8=inv(id=0,umin_value=4096,umax_value=266944511,var_off=(0x0; 0xfffffff)) R9=invP364 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1499136 R6=inv(id=2,umin_value=1495041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1495040 R8_w=inv(id=0,umax_value=266940415,var_off=(0x0; 0xfffffff)) R9_w=invP365 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1499136 R2_w=inv(id=0,umax_value=266940415,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1495041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1499136 R8_w=inv(id=0,umin_value=4096,umax_value=266940415,var_off=(0x0; 0xfffffff)) R9_w=invP365 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1495041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1499136 R8_w=inv(id=0,umin_value=4096,umax_value=266940415,var_off=(0x0; 0xfffffff)) R9_w=invP365 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1503232 R6=inv(id=2,umin_value=1499137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1499136 R8_w=inv(id=0,umax_value=266936319,var_off=(0x0; 0xfffffff)) R9_w=invP366 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1503232 R2_w=inv(id=0,umax_value=266936319,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1499137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1503232 R8_w=inv(id=0,umin_value=4096,umax_value=266936319,var_off=(0x0; 0xfffffff)) R9_w=invP366 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1499137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1503232 R8_w=inv(id=0,umin_value=4096,umax_value=266936319,var_off=(0x0; 0xfffffff)) R9_w=invP366 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1507328 R6=inv(id=2,umin_value=1503233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1503232 R8_w=inv(id=0,umax_value=266932223,var_off=(0x0; 0xfffffff)) R9_w=invP367 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1507328 R2_w=inv(id=0,umax_value=266932223,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1503233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1507328 R8_w=inv(id=0,umin_value=4096,umax_value=266932223,var_off=(0x0; 0xfffffff)) R9_w=invP367 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1503233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1507328 R8_w=inv(id=0,umin_value=4096,umax_value=266932223,var_off=(0x0; 0xfffffff)) R9_w=invP367 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1511424 R6=inv(id=2,umin_value=1507329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1507328 R8=inv(id=0,umax_value=266928127,var_off=(0x0; 0xfffffff)) R9=invP368 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1511424 R2_w=inv(id=0,umax_value=266928127,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1507329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1511424 R8=inv(id=0,umin_value=4096,umax_value=266928127,var_off=(0x0; 0xfffffff)) R9=invP368 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1507329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1511424 R8=inv(id=0,umin_value=4096,umax_value=266928127,var_off=(0x0; 0xfffffff)) R9=invP368 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1515520 R6=inv(id=2,umin_value=1511425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1511424 R8_w=inv(id=0,umax_value=266924031,var_off=(0x0; 0xfffffff)) R9_w=invP369 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1515520 R2_w=inv(id=0,umax_value=266924031,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1511425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1515520 R8_w=inv(id=0,umin_value=4096,umax_value=266924031,var_off=(0x0; 0xfffffff)) R9_w=invP369 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1511425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1515520 R8_w=inv(id=0,umin_value=4096,umax_value=266924031,var_off=(0x0; 0xfffffff)) R9_w=invP369 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1519616 R6=inv(id=2,umin_value=1515521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1515520 R8_w=inv(id=0,umax_value=266919935,var_off=(0x0; 0xfffffff)) R9_w=invP370 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1519616 R2_w=inv(id=0,umax_value=266919935,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1515521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1519616 R8_w=inv(id=0,umin_value=4096,umax_value=266919935,var_off=(0x0; 0xfffffff)) R9_w=invP370 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1515521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1519616 R8_w=inv(id=0,umin_value=4096,umax_value=266919935,var_off=(0x0; 0xfffffff)) R9_w=invP370 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1523712 R6=inv(id=2,umin_value=1519617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1519616 R8_w=inv(id=0,umax_value=266915839,var_off=(0x0; 0xfffffff)) R9_w=invP371 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1523712 R2_w=inv(id=0,umax_value=266915839,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1519617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1523712 R8_w=inv(id=0,umin_value=4096,umax_value=266915839,var_off=(0x0; 0xfffffff)) R9_w=invP371 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1519617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1523712 R8_w=inv(id=0,umin_value=4096,umax_value=266915839,var_off=(0x0; 0xfffffff)) R9_w=invP371 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1527808 R6=inv(id=2,umin_value=1523713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1523712 R8=inv(id=0,umax_value=266911743,var_off=(0x0; 0xfffffff)) R9=invP372 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1527808 R2_w=inv(id=0,umax_value=266911743,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1523713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1527808 R8=inv(id=0,umin_value=4096,umax_value=266911743,var_off=(0x0; 0xfffffff)) R9=invP372 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1523713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1527808 R8=inv(id=0,umin_value=4096,umax_value=266911743,var_off=(0x0; 0xfffffff)) R9=invP372 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1531904 R6=inv(id=2,umin_value=1527809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1527808 R8_w=inv(id=0,umax_value=266907647,var_off=(0x0; 0xfffffff)) R9_w=invP373 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1531904 R2_w=inv(id=0,umax_value=266907647,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1527809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1531904 R8_w=inv(id=0,umin_value=4096,umax_value=266907647,var_off=(0x0; 0xfffffff)) R9_w=invP373 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1527809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1531904 R8_w=inv(id=0,umin_value=4096,umax_value=266907647,var_off=(0x0; 0xfffffff)) R9_w=invP373 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1536000 R6=inv(id=2,umin_value=1531905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1531904 R8_w=inv(id=0,umax_value=266903551,var_off=(0x0; 0xfffffff)) R9_w=invP374 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1536000 R2_w=inv(id=0,umax_value=266903551,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1531905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1536000 R8_w=inv(id=0,umin_value=4096,umax_value=266903551,var_off=(0x0; 0xfffffff)) R9_w=invP374 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1531905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1536000 R8_w=inv(id=0,umin_value=4096,umax_value=266903551,var_off=(0x0; 0xfffffff)) R9_w=invP374 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1540096 R6=inv(id=2,umin_value=1536001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1536000 R8_w=inv(id=0,umax_value=266899455,var_off=(0x0; 0xfffffff)) R9_w=invP375 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1540096 R2_w=inv(id=0,umax_value=266899455,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1536001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1540096 R8_w=inv(id=0,umin_value=4096,umax_value=266899455,var_off=(0x0; 0xfffffff)) R9_w=invP375 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1536001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1540096 R8_w=inv(id=0,umin_value=4096,umax_value=266899455,var_off=(0x0; 0xfffffff)) R9_w=invP375 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1544192 R6=inv(id=2,umin_value=1540097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1540096 R8=inv(id=0,umax_value=266895359,var_off=(0x0; 0xfffffff)) R9=invP376 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1544192 R2_w=inv(id=0,umax_value=266895359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1540097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1544192 R8=inv(id=0,umin_value=4096,umax_value=266895359,var_off=(0x0; 0xfffffff)) R9=invP376 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1540097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1544192 R8=inv(id=0,umin_value=4096,umax_value=266895359,var_off=(0x0; 0xfffffff)) R9=invP376 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1548288 R6=inv(id=2,umin_value=1544193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1544192 R8_w=inv(id=0,umax_value=266891263,var_off=(0x0; 0xfffffff)) R9_w=invP377 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1548288 R2_w=inv(id=0,umax_value=266891263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1544193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1548288 R8_w=inv(id=0,umin_value=4096,umax_value=266891263,var_off=(0x0; 0xfffffff)) R9_w=invP377 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1544193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1548288 R8_w=inv(id=0,umin_value=4096,umax_value=266891263,var_off=(0x0; 0xfffffff)) R9_w=invP377 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1552384 R6=inv(id=2,umin_value=1548289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1548288 R8_w=inv(id=0,umax_value=266887167,var_off=(0x0; 0xfffffff)) R9_w=invP378 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1552384 R2_w=inv(id=0,umax_value=266887167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1548289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1552384 R8_w=inv(id=0,umin_value=4096,umax_value=266887167,var_off=(0x0; 0xfffffff)) R9_w=invP378 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1548289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1552384 R8_w=inv(id=0,umin_value=4096,umax_value=266887167,var_off=(0x0; 0xfffffff)) R9_w=invP378 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1556480 R6=inv(id=2,umin_value=1552385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1552384 R8_w=inv(id=0,umax_value=266883071,var_off=(0x0; 0xfffffff)) R9_w=invP379 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1556480 R2_w=inv(id=0,umax_value=266883071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1552385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1556480 R8_w=inv(id=0,umin_value=4096,umax_value=266883071,var_off=(0x0; 0xfffffff)) R9_w=invP379 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1552385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1556480 R8_w=inv(id=0,umin_value=4096,umax_value=266883071,var_off=(0x0; 0xfffffff)) R9_w=invP379 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1560576 R6=inv(id=2,umin_value=1556481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1556480 R8=inv(id=0,umax_value=266878975,var_off=(0x0; 0xfffffff)) R9=invP380 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1560576 R2_w=inv(id=0,umax_value=266878975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1556481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1560576 R8=inv(id=0,umin_value=4096,umax_value=266878975,var_off=(0x0; 0xfffffff)) R9=invP380 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1556481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1560576 R8=inv(id=0,umin_value=4096,umax_value=266878975,var_off=(0x0; 0xfffffff)) R9=invP380 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1564672 R6=inv(id=2,umin_value=1560577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1560576 R8_w=inv(id=0,umax_value=266874879,var_off=(0x0; 0xfffffff)) R9_w=invP381 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1564672 R2_w=inv(id=0,umax_value=266874879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1560577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1564672 R8_w=inv(id=0,umin_value=4096,umax_value=266874879,var_off=(0x0; 0xfffffff)) R9_w=invP381 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1560577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1564672 R8_w=inv(id=0,umin_value=4096,umax_value=266874879,var_off=(0x0; 0xfffffff)) R9_w=invP381 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1568768 R6=inv(id=2,umin_value=1564673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1564672 R8_w=inv(id=0,umax_value=266870783,var_off=(0x0; 0xfffffff)) R9_w=invP382 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1568768 R2_w=inv(id=0,umax_value=266870783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1564673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1568768 R8_w=inv(id=0,umin_value=4096,umax_value=266870783,var_off=(0x0; 0xfffffff)) R9_w=invP382 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1564673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1568768 R8_w=inv(id=0,umin_value=4096,umax_value=266870783,var_off=(0x0; 0xfffffff)) R9_w=invP382 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1572864 R6=inv(id=2,umin_value=1568769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1568768 R8_w=inv(id=0,umax_value=266866687,var_off=(0x0; 0xfffffff)) R9_w=invP383 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1572864 R2_w=inv(id=0,umax_value=266866687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1568769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1572864 R8_w=inv(id=0,umin_value=4096,umax_value=266866687,var_off=(0x0; 0xfffffff)) R9_w=invP383 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1568769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1572864 R8_w=inv(id=0,umin_value=4096,umax_value=266866687,var_off=(0x0; 0xfffffff)) R9_w=invP383 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1576960 R6=inv(id=2,umin_value=1572865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1572864 R8=inv(id=0,umax_value=266862591,var_off=(0x0; 0xfffffff)) R9=invP384 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1576960 R2_w=inv(id=0,umax_value=266862591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1572865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1576960 R8=inv(id=0,umin_value=4096,umax_value=266862591,var_off=(0x0; 0xfffffff)) R9=invP384 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1572865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1576960 R8=inv(id=0,umin_value=4096,umax_value=266862591,var_off=(0x0; 0xfffffff)) R9=invP384 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1581056 R6=inv(id=2,umin_value=1576961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1576960 R8_w=inv(id=0,umax_value=266858495,var_off=(0x0; 0xfffffff)) R9_w=invP385 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1581056 R2_w=inv(id=0,umax_value=266858495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1576961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1581056 R8_w=inv(id=0,umin_value=4096,umax_value=266858495,var_off=(0x0; 0xfffffff)) R9_w=invP385 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1576961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1581056 R8_w=inv(id=0,umin_value=4096,umax_value=266858495,var_off=(0x0; 0xfffffff)) R9_w=invP385 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1585152 R6=inv(id=2,umin_value=1581057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1581056 R8_w=inv(id=0,umax_value=266854399,var_off=(0x0; 0xfffffff)) R9_w=invP386 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1585152 R2_w=inv(id=0,umax_value=266854399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1581057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1585152 R8_w=inv(id=0,umin_value=4096,umax_value=266854399,var_off=(0x0; 0xfffffff)) R9_w=invP386 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1581057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1585152 R8_w=inv(id=0,umin_value=4096,umax_value=266854399,var_off=(0x0; 0xfffffff)) R9_w=invP386 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1589248 R6=inv(id=2,umin_value=1585153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1585152 R8_w=inv(id=0,umax_value=266850303,var_off=(0x0; 0xfffffff)) R9_w=invP387 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1589248 R2_w=inv(id=0,umax_value=266850303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1585153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1589248 R8_w=inv(id=0,umin_value=4096,umax_value=266850303,var_off=(0x0; 0xfffffff)) R9_w=invP387 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1585153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1589248 R8_w=inv(id=0,umin_value=4096,umax_value=266850303,var_off=(0x0; 0xfffffff)) R9_w=invP387 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1593344 R6=inv(id=2,umin_value=1589249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1589248 R8=inv(id=0,umax_value=266846207,var_off=(0x0; 0xfffffff)) R9=invP388 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1593344 R2_w=inv(id=0,umax_value=266846207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1589249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1593344 R8=inv(id=0,umin_value=4096,umax_value=266846207,var_off=(0x0; 0xfffffff)) R9=invP388 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1589249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1593344 R8=inv(id=0,umin_value=4096,umax_value=266846207,var_off=(0x0; 0xfffffff)) R9=invP388 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1597440 R6=inv(id=2,umin_value=1593345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1593344 R8_w=inv(id=0,umax_value=266842111,var_off=(0x0; 0xfffffff)) R9_w=invP389 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1597440 R2_w=inv(id=0,umax_value=266842111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1593345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1597440 R8_w=inv(id=0,umin_value=4096,umax_value=266842111,var_off=(0x0; 0xfffffff)) R9_w=invP389 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1593345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1597440 R8_w=inv(id=0,umin_value=4096,umax_value=266842111,var_off=(0x0; 0xfffffff)) R9_w=invP389 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1601536 R6=inv(id=2,umin_value=1597441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1597440 R8_w=inv(id=0,umax_value=266838015,var_off=(0x0; 0xfffffff)) R9_w=invP390 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1601536 R2_w=inv(id=0,umax_value=266838015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1597441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1601536 R8_w=inv(id=0,umin_value=4096,umax_value=266838015,var_off=(0x0; 0xfffffff)) R9_w=invP390 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1597441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1601536 R8_w=inv(id=0,umin_value=4096,umax_value=266838015,var_off=(0x0; 0xfffffff)) R9_w=invP390 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1605632 R6=inv(id=2,umin_value=1601537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1601536 R8_w=inv(id=0,umax_value=266833919,var_off=(0x0; 0xfffffff)) R9_w=invP391 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1605632 R2_w=inv(id=0,umax_value=266833919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1601537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1605632 R8_w=inv(id=0,umin_value=4096,umax_value=266833919,var_off=(0x0; 0xfffffff)) R9_w=invP391 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1601537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1605632 R8_w=inv(id=0,umin_value=4096,umax_value=266833919,var_off=(0x0; 0xfffffff)) R9_w=invP391 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1609728 R6=inv(id=2,umin_value=1605633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1605632 R8=inv(id=0,umax_value=266829823,var_off=(0x0; 0xfffffff)) R9=invP392 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1609728 R2_w=inv(id=0,umax_value=266829823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1605633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1609728 R8=inv(id=0,umin_value=4096,umax_value=266829823,var_off=(0x0; 0xfffffff)) R9=invP392 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1605633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1609728 R8=inv(id=0,umin_value=4096,umax_value=266829823,var_off=(0x0; 0xfffffff)) R9=invP392 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1613824 R6=inv(id=2,umin_value=1609729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1609728 R8_w=inv(id=0,umax_value=266825727,var_off=(0x0; 0xfffffff)) R9_w=invP393 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1613824 R2_w=inv(id=0,umax_value=266825727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1609729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1613824 R8_w=inv(id=0,umin_value=4096,umax_value=266825727,var_off=(0x0; 0xfffffff)) R9_w=invP393 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1609729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1613824 R8_w=inv(id=0,umin_value=4096,umax_value=266825727,var_off=(0x0; 0xfffffff)) R9_w=invP393 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1617920 R6=inv(id=2,umin_value=1613825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1613824 R8_w=inv(id=0,umax_value=266821631,var_off=(0x0; 0xfffffff)) R9_w=invP394 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1617920 R2_w=inv(id=0,umax_value=266821631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1613825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1617920 R8_w=inv(id=0,umin_value=4096,umax_value=266821631,var_off=(0x0; 0xfffffff)) R9_w=invP394 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1613825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1617920 R8_w=inv(id=0,umin_value=4096,umax_value=266821631,var_off=(0x0; 0xfffffff)) R9_w=invP394 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1622016 R6=inv(id=2,umin_value=1617921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1617920 R8_w=inv(id=0,umax_value=266817535,var_off=(0x0; 0xfffffff)) R9_w=invP395 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1622016 R2_w=inv(id=0,umax_value=266817535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1617921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1622016 R8_w=inv(id=0,umin_value=4096,umax_value=266817535,var_off=(0x0; 0xfffffff)) R9_w=invP395 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1617921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1622016 R8_w=inv(id=0,umin_value=4096,umax_value=266817535,var_off=(0x0; 0xfffffff)) R9_w=invP395 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1626112 R6=inv(id=2,umin_value=1622017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1622016 R8=inv(id=0,umax_value=266813439,var_off=(0x0; 0xfffffff)) R9=invP396 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1626112 R2_w=inv(id=0,umax_value=266813439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1622017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1626112 R8=inv(id=0,umin_value=4096,umax_value=266813439,var_off=(0x0; 0xfffffff)) R9=invP396 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1622017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1626112 R8=inv(id=0,umin_value=4096,umax_value=266813439,var_off=(0x0; 0xfffffff)) R9=invP396 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1630208 R6=inv(id=2,umin_value=1626113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1626112 R8_w=inv(id=0,umax_value=266809343,var_off=(0x0; 0xfffffff)) R9_w=invP397 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1630208 R2_w=inv(id=0,umax_value=266809343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1626113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1630208 R8_w=inv(id=0,umin_value=4096,umax_value=266809343,var_off=(0x0; 0xfffffff)) R9_w=invP397 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1626113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1630208 R8_w=inv(id=0,umin_value=4096,umax_value=266809343,var_off=(0x0; 0xfffffff)) R9_w=invP397 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1634304 R6=inv(id=2,umin_value=1630209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1630208 R8_w=inv(id=0,umax_value=266805247,var_off=(0x0; 0xfffffff)) R9_w=invP398 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1634304 R2_w=inv(id=0,umax_value=266805247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1630209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1634304 R8_w=inv(id=0,umin_value=4096,umax_value=266805247,var_off=(0x0; 0xfffffff)) R9_w=invP398 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1630209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1634304 R8_w=inv(id=0,umin_value=4096,umax_value=266805247,var_off=(0x0; 0xfffffff)) R9_w=invP398 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1638400 R6=inv(id=2,umin_value=1634305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1634304 R8_w=inv(id=0,umax_value=266801151,var_off=(0x0; 0xfffffff)) R9_w=invP399 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1638400 R2_w=inv(id=0,umax_value=266801151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1634305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1638400 R8_w=inv(id=0,umin_value=4096,umax_value=266801151,var_off=(0x0; 0xfffffff)) R9_w=invP399 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1634305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1638400 R8_w=inv(id=0,umin_value=4096,umax_value=266801151,var_off=(0x0; 0xfffffff)) R9_w=invP399 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1642496 R6=inv(id=2,umin_value=1638401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1638400 R8=inv(id=0,umax_value=266797055,var_off=(0x0; 0xfffffff)) R9=invP400 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1642496 R2_w=inv(id=0,umax_value=266797055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1638401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1642496 R8=inv(id=0,umin_value=4096,umax_value=266797055,var_off=(0x0; 0xfffffff)) R9=invP400 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1638401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1642496 R8=inv(id=0,umin_value=4096,umax_value=266797055,var_off=(0x0; 0xfffffff)) R9=invP400 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1646592 R6=inv(id=2,umin_value=1642497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1642496 R8_w=inv(id=0,umax_value=266792959,var_off=(0x0; 0xfffffff)) R9_w=invP401 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1646592 R2_w=inv(id=0,umax_value=266792959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1642497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1646592 R8_w=inv(id=0,umin_value=4096,umax_value=266792959,var_off=(0x0; 0xfffffff)) R9_w=invP401 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1642497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1646592 R8_w=inv(id=0,umin_value=4096,umax_value=266792959,var_off=(0x0; 0xfffffff)) R9_w=invP401 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1650688 R6=inv(id=2,umin_value=1646593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1646592 R8_w=inv(id=0,umax_value=266788863,var_off=(0x0; 0xfffffff)) R9_w=invP402 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1650688 R2_w=inv(id=0,umax_value=266788863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1646593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1650688 R8_w=inv(id=0,umin_value=4096,umax_value=266788863,var_off=(0x0; 0xfffffff)) R9_w=invP402 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1646593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1650688 R8_w=inv(id=0,umin_value=4096,umax_value=266788863,var_off=(0x0; 0xfffffff)) R9_w=invP402 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1654784 R6=inv(id=2,umin_value=1650689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1650688 R8_w=inv(id=0,umax_value=266784767,var_off=(0x0; 0xfffffff)) R9_w=invP403 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1654784 R2_w=inv(id=0,umax_value=266784767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1650689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1654784 R8_w=inv(id=0,umin_value=4096,umax_value=266784767,var_off=(0x0; 0xfffffff)) R9_w=invP403 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1650689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1654784 R8_w=inv(id=0,umin_value=4096,umax_value=266784767,var_off=(0x0; 0xfffffff)) R9_w=invP403 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1658880 R6=inv(id=2,umin_value=1654785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1654784 R8=inv(id=0,umax_value=266780671,var_off=(0x0; 0xfffffff)) R9=invP404 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1658880 R2_w=inv(id=0,umax_value=266780671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1654785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1658880 R8=inv(id=0,umin_value=4096,umax_value=266780671,var_off=(0x0; 0xfffffff)) R9=invP404 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1654785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1658880 R8=inv(id=0,umin_value=4096,umax_value=266780671,var_off=(0x0; 0xfffffff)) R9=invP404 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1662976 R6=inv(id=2,umin_value=1658881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1658880 R8_w=inv(id=0,umax_value=266776575,var_off=(0x0; 0xfffffff)) R9_w=invP405 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1662976 R2_w=inv(id=0,umax_value=266776575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1658881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1662976 R8_w=inv(id=0,umin_value=4096,umax_value=266776575,var_off=(0x0; 0xfffffff)) R9_w=invP405 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1658881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1662976 R8_w=inv(id=0,umin_value=4096,umax_value=266776575,var_off=(0x0; 0xfffffff)) R9_w=invP405 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1667072 R6=inv(id=2,umin_value=1662977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1662976 R8_w=inv(id=0,umax_value=266772479,var_off=(0x0; 0xfffffff)) R9_w=invP406 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1667072 R2_w=inv(id=0,umax_value=266772479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1662977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1667072 R8_w=inv(id=0,umin_value=4096,umax_value=266772479,var_off=(0x0; 0xfffffff)) R9_w=invP406 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1662977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1667072 R8_w=inv(id=0,umin_value=4096,umax_value=266772479,var_off=(0x0; 0xfffffff)) R9_w=invP406 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1671168 R6=inv(id=2,umin_value=1667073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1667072 R8_w=inv(id=0,umax_value=266768383,var_off=(0x0; 0xfffffff)) R9_w=invP407 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1671168 R2_w=inv(id=0,umax_value=266768383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1667073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1671168 R8_w=inv(id=0,umin_value=4096,umax_value=266768383,var_off=(0x0; 0xfffffff)) R9_w=invP407 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1667073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1671168 R8_w=inv(id=0,umin_value=4096,umax_value=266768383,var_off=(0x0; 0xfffffff)) R9_w=invP407 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1675264 R6=inv(id=2,umin_value=1671169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1671168 R8=inv(id=0,umax_value=266764287,var_off=(0x0; 0xfffffff)) R9=invP408 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1675264 R2_w=inv(id=0,umax_value=266764287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1671169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1675264 R8=inv(id=0,umin_value=4096,umax_value=266764287,var_off=(0x0; 0xfffffff)) R9=invP408 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1671169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1675264 R8=inv(id=0,umin_value=4096,umax_value=266764287,var_off=(0x0; 0xfffffff)) R9=invP408 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1679360 R6=inv(id=2,umin_value=1675265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1675264 R8_w=inv(id=0,umax_value=266760191,var_off=(0x0; 0xfffffff)) R9_w=invP409 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1679360 R2_w=inv(id=0,umax_value=266760191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1675265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1679360 R8_w=inv(id=0,umin_value=4096,umax_value=266760191,var_off=(0x0; 0xfffffff)) R9_w=invP409 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1675265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1679360 R8_w=inv(id=0,umin_value=4096,umax_value=266760191,var_off=(0x0; 0xfffffff)) R9_w=invP409 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1683456 R6=inv(id=2,umin_value=1679361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1679360 R8_w=inv(id=0,umax_value=266756095,var_off=(0x0; 0xfffffff)) R9_w=invP410 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1683456 R2_w=inv(id=0,umax_value=266756095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1679361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1683456 R8_w=inv(id=0,umin_value=4096,umax_value=266756095,var_off=(0x0; 0xfffffff)) R9_w=invP410 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1679361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1683456 R8_w=inv(id=0,umin_value=4096,umax_value=266756095,var_off=(0x0; 0xfffffff)) R9_w=invP410 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1687552 R6=inv(id=2,umin_value=1683457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1683456 R8_w=inv(id=0,umax_value=266751999,var_off=(0x0; 0xfffffff)) R9_w=invP411 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1687552 R2_w=inv(id=0,umax_value=266751999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1683457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1687552 R8_w=inv(id=0,umin_value=4096,umax_value=266751999,var_off=(0x0; 0xfffffff)) R9_w=invP411 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1683457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1687552 R8_w=inv(id=0,umin_value=4096,umax_value=266751999,var_off=(0x0; 0xfffffff)) R9_w=invP411 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1691648 R6=inv(id=2,umin_value=1687553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1687552 R8=inv(id=0,umax_value=266747903,var_off=(0x0; 0xfffffff)) R9=invP412 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1691648 R2_w=inv(id=0,umax_value=266747903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1687553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1691648 R8=inv(id=0,umin_value=4096,umax_value=266747903,var_off=(0x0; 0xfffffff)) R9=invP412 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1687553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1691648 R8=inv(id=0,umin_value=4096,umax_value=266747903,var_off=(0x0; 0xfffffff)) R9=invP412 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1695744 R6=inv(id=2,umin_value=1691649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1691648 R8_w=inv(id=0,umax_value=266743807,var_off=(0x0; 0xfffffff)) R9_w=invP413 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1695744 R2_w=inv(id=0,umax_value=266743807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1691649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1695744 R8_w=inv(id=0,umin_value=4096,umax_value=266743807,var_off=(0x0; 0xfffffff)) R9_w=invP413 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1691649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1695744 R8_w=inv(id=0,umin_value=4096,umax_value=266743807,var_off=(0x0; 0xfffffff)) R9_w=invP413 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1699840 R6=inv(id=2,umin_value=1695745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1695744 R8_w=inv(id=0,umax_value=266739711,var_off=(0x0; 0xfffffff)) R9_w=invP414 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1699840 R2_w=inv(id=0,umax_value=266739711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1695745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1699840 R8_w=inv(id=0,umin_value=4096,umax_value=266739711,var_off=(0x0; 0xfffffff)) R9_w=invP414 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1695745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1699840 R8_w=inv(id=0,umin_value=4096,umax_value=266739711,var_off=(0x0; 0xfffffff)) R9_w=invP414 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1703936 R6=inv(id=2,umin_value=1699841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1699840 R8_w=inv(id=0,umax_value=266735615,var_off=(0x0; 0xfffffff)) R9_w=invP415 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1703936 R2_w=inv(id=0,umax_value=266735615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1699841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1703936 R8_w=inv(id=0,umin_value=4096,umax_value=266735615,var_off=(0x0; 0xfffffff)) R9_w=invP415 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1699841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1703936 R8_w=inv(id=0,umin_value=4096,umax_value=266735615,var_off=(0x0; 0xfffffff)) R9_w=invP415 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1708032 R6=inv(id=2,umin_value=1703937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1703936 R8=inv(id=0,umax_value=266731519,var_off=(0x0; 0xfffffff)) R9=invP416 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1708032 R2_w=inv(id=0,umax_value=266731519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1703937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1708032 R8=inv(id=0,umin_value=4096,umax_value=266731519,var_off=(0x0; 0xfffffff)) R9=invP416 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1703937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1708032 R8=inv(id=0,umin_value=4096,umax_value=266731519,var_off=(0x0; 0xfffffff)) R9=invP416 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1712128 R6=inv(id=2,umin_value=1708033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1708032 R8_w=inv(id=0,umax_value=266727423,var_off=(0x0; 0xfffffff)) R9_w=invP417 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1712128 R2_w=inv(id=0,umax_value=266727423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1708033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1712128 R8_w=inv(id=0,umin_value=4096,umax_value=266727423,var_off=(0x0; 0xfffffff)) R9_w=invP417 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1708033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1712128 R8_w=inv(id=0,umin_value=4096,umax_value=266727423,var_off=(0x0; 0xfffffff)) R9_w=invP417 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1716224 R6=inv(id=2,umin_value=1712129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1712128 R8_w=inv(id=0,umax_value=266723327,var_off=(0x0; 0xfffffff)) R9_w=invP418 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1716224 R2_w=inv(id=0,umax_value=266723327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1712129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1716224 R8_w=inv(id=0,umin_value=4096,umax_value=266723327,var_off=(0x0; 0xfffffff)) R9_w=invP418 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1712129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1716224 R8_w=inv(id=0,umin_value=4096,umax_value=266723327,var_off=(0x0; 0xfffffff)) R9_w=invP418 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1720320 R6=inv(id=2,umin_value=1716225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1716224 R8_w=inv(id=0,umax_value=266719231,var_off=(0x0; 0xfffffff)) R9_w=invP419 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1720320 R2_w=inv(id=0,umax_value=266719231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1716225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1720320 R8_w=inv(id=0,umin_value=4096,umax_value=266719231,var_off=(0x0; 0xfffffff)) R9_w=invP419 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1716225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1720320 R8_w=inv(id=0,umin_value=4096,umax_value=266719231,var_off=(0x0; 0xfffffff)) R9_w=invP419 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1724416 R6=inv(id=2,umin_value=1720321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1720320 R8=inv(id=0,umax_value=266715135,var_off=(0x0; 0xfffffff)) R9=invP420 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1724416 R2_w=inv(id=0,umax_value=266715135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1720321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1724416 R8=inv(id=0,umin_value=4096,umax_value=266715135,var_off=(0x0; 0xfffffff)) R9=invP420 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1720321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1724416 R8=inv(id=0,umin_value=4096,umax_value=266715135,var_off=(0x0; 0xfffffff)) R9=invP420 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1728512 R6=inv(id=2,umin_value=1724417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1724416 R8_w=inv(id=0,umax_value=266711039,var_off=(0x0; 0xfffffff)) R9_w=invP421 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1728512 R2_w=inv(id=0,umax_value=266711039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1724417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1728512 R8_w=inv(id=0,umin_value=4096,umax_value=266711039,var_off=(0x0; 0xfffffff)) R9_w=invP421 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1724417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1728512 R8_w=inv(id=0,umin_value=4096,umax_value=266711039,var_off=(0x0; 0xfffffff)) R9_w=invP421 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1732608 R6=inv(id=2,umin_value=1728513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1728512 R8_w=inv(id=0,umax_value=266706943,var_off=(0x0; 0xfffffff)) R9_w=invP422 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1732608 R2_w=inv(id=0,umax_value=266706943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1728513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1732608 R8_w=inv(id=0,umin_value=4096,umax_value=266706943,var_off=(0x0; 0xfffffff)) R9_w=invP422 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1728513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1732608 R8_w=inv(id=0,umin_value=4096,umax_value=266706943,var_off=(0x0; 0xfffffff)) R9_w=invP422 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1736704 R6=inv(id=2,umin_value=1732609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1732608 R8_w=inv(id=0,umax_value=266702847,var_off=(0x0; 0xfffffff)) R9_w=invP423 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1736704 R2_w=inv(id=0,umax_value=266702847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1732609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1736704 R8_w=inv(id=0,umin_value=4096,umax_value=266702847,var_off=(0x0; 0xfffffff)) R9_w=invP423 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1732609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1736704 R8_w=inv(id=0,umin_value=4096,umax_value=266702847,var_off=(0x0; 0xfffffff)) R9_w=invP423 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1740800 R6=inv(id=2,umin_value=1736705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1736704 R8=inv(id=0,umax_value=266698751,var_off=(0x0; 0xfffffff)) R9=invP424 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1740800 R2_w=inv(id=0,umax_value=266698751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1736705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1740800 R8=inv(id=0,umin_value=4096,umax_value=266698751,var_off=(0x0; 0xfffffff)) R9=invP424 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1736705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1740800 R8=inv(id=0,umin_value=4096,umax_value=266698751,var_off=(0x0; 0xfffffff)) R9=invP424 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1744896 R6=inv(id=2,umin_value=1740801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1740800 R8_w=inv(id=0,umax_value=266694655,var_off=(0x0; 0xfffffff)) R9_w=invP425 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1744896 R2_w=inv(id=0,umax_value=266694655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1740801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1744896 R8_w=inv(id=0,umin_value=4096,umax_value=266694655,var_off=(0x0; 0xfffffff)) R9_w=invP425 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1740801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1744896 R8_w=inv(id=0,umin_value=4096,umax_value=266694655,var_off=(0x0; 0xfffffff)) R9_w=invP425 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1748992 R6=inv(id=2,umin_value=1744897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1744896 R8_w=inv(id=0,umax_value=266690559,var_off=(0x0; 0xfffffff)) R9_w=invP426 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1748992 R2_w=inv(id=0,umax_value=266690559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1744897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1748992 R8_w=inv(id=0,umin_value=4096,umax_value=266690559,var_off=(0x0; 0xfffffff)) R9_w=invP426 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1744897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1748992 R8_w=inv(id=0,umin_value=4096,umax_value=266690559,var_off=(0x0; 0xfffffff)) R9_w=invP426 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1753088 R6=inv(id=2,umin_value=1748993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1748992 R8_w=inv(id=0,umax_value=266686463,var_off=(0x0; 0xfffffff)) R9_w=invP427 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1753088 R2_w=inv(id=0,umax_value=266686463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1748993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1753088 R8_w=inv(id=0,umin_value=4096,umax_value=266686463,var_off=(0x0; 0xfffffff)) R9_w=invP427 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1748993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1753088 R8_w=inv(id=0,umin_value=4096,umax_value=266686463,var_off=(0x0; 0xfffffff)) R9_w=invP427 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1757184 R6=inv(id=2,umin_value=1753089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1753088 R8=inv(id=0,umax_value=266682367,var_off=(0x0; 0xfffffff)) R9=invP428 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1757184 R2_w=inv(id=0,umax_value=266682367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1753089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1757184 R8=inv(id=0,umin_value=4096,umax_value=266682367,var_off=(0x0; 0xfffffff)) R9=invP428 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1753089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1757184 R8=inv(id=0,umin_value=4096,umax_value=266682367,var_off=(0x0; 0xfffffff)) R9=invP428 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1761280 R6=inv(id=2,umin_value=1757185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1757184 R8_w=inv(id=0,umax_value=266678271,var_off=(0x0; 0xfffffff)) R9_w=invP429 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1761280 R2_w=inv(id=0,umax_value=266678271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1757185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1761280 R8_w=inv(id=0,umin_value=4096,umax_value=266678271,var_off=(0x0; 0xfffffff)) R9_w=invP429 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1757185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1761280 R8_w=inv(id=0,umin_value=4096,umax_value=266678271,var_off=(0x0; 0xfffffff)) R9_w=invP429 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1765376 R6=inv(id=2,umin_value=1761281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1761280 R8_w=inv(id=0,umax_value=266674175,var_off=(0x0; 0xfffffff)) R9_w=invP430 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1765376 R2_w=inv(id=0,umax_value=266674175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1761281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1765376 R8_w=inv(id=0,umin_value=4096,umax_value=266674175,var_off=(0x0; 0xfffffff)) R9_w=invP430 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1761281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1765376 R8_w=inv(id=0,umin_value=4096,umax_value=266674175,var_off=(0x0; 0xfffffff)) R9_w=invP430 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1769472 R6=inv(id=2,umin_value=1765377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1765376 R8_w=inv(id=0,umax_value=266670079,var_off=(0x0; 0xfffffff)) R9_w=invP431 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1769472 R2_w=inv(id=0,umax_value=266670079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1765377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1769472 R8_w=inv(id=0,umin_value=4096,umax_value=266670079,var_off=(0x0; 0xfffffff)) R9_w=invP431 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1765377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1769472 R8_w=inv(id=0,umin_value=4096,umax_value=266670079,var_off=(0x0; 0xfffffff)) R9_w=invP431 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1773568 R6=inv(id=2,umin_value=1769473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1769472 R8=inv(id=0,umax_value=266665983,var_off=(0x0; 0xfffffff)) R9=invP432 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1773568 R2_w=inv(id=0,umax_value=266665983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1769473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1773568 R8=inv(id=0,umin_value=4096,umax_value=266665983,var_off=(0x0; 0xfffffff)) R9=invP432 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1769473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1773568 R8=inv(id=0,umin_value=4096,umax_value=266665983,var_off=(0x0; 0xfffffff)) R9=invP432 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1777664 R6=inv(id=2,umin_value=1773569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1773568 R8_w=inv(id=0,umax_value=266661887,var_off=(0x0; 0xfffffff)) R9_w=invP433 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1777664 R2_w=inv(id=0,umax_value=266661887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1773569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1777664 R8_w=inv(id=0,umin_value=4096,umax_value=266661887,var_off=(0x0; 0xfffffff)) R9_w=invP433 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1773569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1777664 R8_w=inv(id=0,umin_value=4096,umax_value=266661887,var_off=(0x0; 0xfffffff)) R9_w=invP433 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1781760 R6=inv(id=2,umin_value=1777665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1777664 R8_w=inv(id=0,umax_value=266657791,var_off=(0x0; 0xfffffff)) R9_w=invP434 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1781760 R2_w=inv(id=0,umax_value=266657791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1777665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1781760 R8_w=inv(id=0,umin_value=4096,umax_value=266657791,var_off=(0x0; 0xfffffff)) R9_w=invP434 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1777665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1781760 R8_w=inv(id=0,umin_value=4096,umax_value=266657791,var_off=(0x0; 0xfffffff)) R9_w=invP434 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1785856 R6=inv(id=2,umin_value=1781761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1781760 R8_w=inv(id=0,umax_value=266653695,var_off=(0x0; 0xfffffff)) R9_w=invP435 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1785856 R2_w=inv(id=0,umax_value=266653695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1781761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1785856 R8_w=inv(id=0,umin_value=4096,umax_value=266653695,var_off=(0x0; 0xfffffff)) R9_w=invP435 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1781761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1785856 R8_w=inv(id=0,umin_value=4096,umax_value=266653695,var_off=(0x0; 0xfffffff)) R9_w=invP435 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1789952 R6=inv(id=2,umin_value=1785857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1785856 R8=inv(id=0,umax_value=266649599,var_off=(0x0; 0xfffffff)) R9=invP436 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1789952 R2_w=inv(id=0,umax_value=266649599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1785857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1789952 R8=inv(id=0,umin_value=4096,umax_value=266649599,var_off=(0x0; 0xfffffff)) R9=invP436 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1785857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1789952 R8=inv(id=0,umin_value=4096,umax_value=266649599,var_off=(0x0; 0xfffffff)) R9=invP436 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1794048 R6=inv(id=2,umin_value=1789953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1789952 R8_w=inv(id=0,umax_value=266645503,var_off=(0x0; 0xfffffff)) R9_w=invP437 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1794048 R2_w=inv(id=0,umax_value=266645503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1789953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1794048 R8_w=inv(id=0,umin_value=4096,umax_value=266645503,var_off=(0x0; 0xfffffff)) R9_w=invP437 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1789953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1794048 R8_w=inv(id=0,umin_value=4096,umax_value=266645503,var_off=(0x0; 0xfffffff)) R9_w=invP437 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1798144 R6=inv(id=2,umin_value=1794049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1794048 R8_w=inv(id=0,umax_value=266641407,var_off=(0x0; 0xfffffff)) R9_w=invP438 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1798144 R2_w=inv(id=0,umax_value=266641407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1794049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1798144 R8_w=inv(id=0,umin_value=4096,umax_value=266641407,var_off=(0x0; 0xfffffff)) R9_w=invP438 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1794049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1798144 R8_w=inv(id=0,umin_value=4096,umax_value=266641407,var_off=(0x0; 0xfffffff)) R9_w=invP438 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1802240 R6=inv(id=2,umin_value=1798145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1798144 R8_w=inv(id=0,umax_value=266637311,var_off=(0x0; 0xfffffff)) R9_w=invP439 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1802240 R2_w=inv(id=0,umax_value=266637311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1798145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1802240 R8_w=inv(id=0,umin_value=4096,umax_value=266637311,var_off=(0x0; 0xfffffff)) R9_w=invP439 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1798145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1802240 R8_w=inv(id=0,umin_value=4096,umax_value=266637311,var_off=(0x0; 0xfffffff)) R9_w=invP439 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1806336 R6=inv(id=2,umin_value=1802241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1802240 R8=inv(id=0,umax_value=266633215,var_off=(0x0; 0xfffffff)) R9=invP440 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1806336 R2_w=inv(id=0,umax_value=266633215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1802241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1806336 R8=inv(id=0,umin_value=4096,umax_value=266633215,var_off=(0x0; 0xfffffff)) R9=invP440 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1802241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1806336 R8=inv(id=0,umin_value=4096,umax_value=266633215,var_off=(0x0; 0xfffffff)) R9=invP440 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1810432 R6=inv(id=2,umin_value=1806337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1806336 R8_w=inv(id=0,umax_value=266629119,var_off=(0x0; 0xfffffff)) R9_w=invP441 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1810432 R2_w=inv(id=0,umax_value=266629119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1806337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1810432 R8_w=inv(id=0,umin_value=4096,umax_value=266629119,var_off=(0x0; 0xfffffff)) R9_w=invP441 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1806337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1810432 R8_w=inv(id=0,umin_value=4096,umax_value=266629119,var_off=(0x0; 0xfffffff)) R9_w=invP441 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1814528 R6=inv(id=2,umin_value=1810433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1810432 R8_w=inv(id=0,umax_value=266625023,var_off=(0x0; 0xfffffff)) R9_w=invP442 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1814528 R2_w=inv(id=0,umax_value=266625023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1810433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1814528 R8_w=inv(id=0,umin_value=4096,umax_value=266625023,var_off=(0x0; 0xfffffff)) R9_w=invP442 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1810433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1814528 R8_w=inv(id=0,umin_value=4096,umax_value=266625023,var_off=(0x0; 0xfffffff)) R9_w=invP442 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1818624 R6=inv(id=2,umin_value=1814529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1814528 R8_w=inv(id=0,umax_value=266620927,var_off=(0x0; 0xfffffff)) R9_w=invP443 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1818624 R2_w=inv(id=0,umax_value=266620927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1814529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1818624 R8_w=inv(id=0,umin_value=4096,umax_value=266620927,var_off=(0x0; 0xfffffff)) R9_w=invP443 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1814529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1818624 R8_w=inv(id=0,umin_value=4096,umax_value=266620927,var_off=(0x0; 0xfffffff)) R9_w=invP443 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1822720 R6=inv(id=2,umin_value=1818625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1818624 R8=inv(id=0,umax_value=266616831,var_off=(0x0; 0xfffffff)) R9=invP444 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1822720 R2_w=inv(id=0,umax_value=266616831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1818625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1822720 R8=inv(id=0,umin_value=4096,umax_value=266616831,var_off=(0x0; 0xfffffff)) R9=invP444 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1818625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1822720 R8=inv(id=0,umin_value=4096,umax_value=266616831,var_off=(0x0; 0xfffffff)) R9=invP444 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1826816 R6=inv(id=2,umin_value=1822721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1822720 R8_w=inv(id=0,umax_value=266612735,var_off=(0x0; 0xfffffff)) R9_w=invP445 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1826816 R2_w=inv(id=0,umax_value=266612735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1822721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1826816 R8_w=inv(id=0,umin_value=4096,umax_value=266612735,var_off=(0x0; 0xfffffff)) R9_w=invP445 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1822721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1826816 R8_w=inv(id=0,umin_value=4096,umax_value=266612735,var_off=(0x0; 0xfffffff)) R9_w=invP445 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1830912 R6=inv(id=2,umin_value=1826817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1826816 R8_w=inv(id=0,umax_value=266608639,var_off=(0x0; 0xfffffff)) R9_w=invP446 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1830912 R2_w=inv(id=0,umax_value=266608639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1826817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1830912 R8_w=inv(id=0,umin_value=4096,umax_value=266608639,var_off=(0x0; 0xfffffff)) R9_w=invP446 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1826817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1830912 R8_w=inv(id=0,umin_value=4096,umax_value=266608639,var_off=(0x0; 0xfffffff)) R9_w=invP446 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1835008 R6=inv(id=2,umin_value=1830913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1830912 R8_w=inv(id=0,umax_value=266604543,var_off=(0x0; 0xfffffff)) R9_w=invP447 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1835008 R2_w=inv(id=0,umax_value=266604543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1830913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1835008 R8_w=inv(id=0,umin_value=4096,umax_value=266604543,var_off=(0x0; 0xfffffff)) R9_w=invP447 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1830913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1835008 R8_w=inv(id=0,umin_value=4096,umax_value=266604543,var_off=(0x0; 0xfffffff)) R9_w=invP447 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1839104 R6=inv(id=2,umin_value=1835009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1835008 R8=inv(id=0,umax_value=266600447,var_off=(0x0; 0xfffffff)) R9=invP448 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1839104 R2_w=inv(id=0,umax_value=266600447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1835009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1839104 R8=inv(id=0,umin_value=4096,umax_value=266600447,var_off=(0x0; 0xfffffff)) R9=invP448 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1835009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1839104 R8=inv(id=0,umin_value=4096,umax_value=266600447,var_off=(0x0; 0xfffffff)) R9=invP448 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1843200 R6=inv(id=2,umin_value=1839105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1839104 R8_w=inv(id=0,umax_value=266596351,var_off=(0x0; 0xfffffff)) R9_w=invP449 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1843200 R2_w=inv(id=0,umax_value=266596351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1839105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1843200 R8_w=inv(id=0,umin_value=4096,umax_value=266596351,var_off=(0x0; 0xfffffff)) R9_w=invP449 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1839105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1843200 R8_w=inv(id=0,umin_value=4096,umax_value=266596351,var_off=(0x0; 0xfffffff)) R9_w=invP449 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1847296 R6=inv(id=2,umin_value=1843201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1843200 R8_w=inv(id=0,umax_value=266592255,var_off=(0x0; 0xfffffff)) R9_w=invP450 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1847296 R2_w=inv(id=0,umax_value=266592255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1843201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1847296 R8_w=inv(id=0,umin_value=4096,umax_value=266592255,var_off=(0x0; 0xfffffff)) R9_w=invP450 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1843201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1847296 R8_w=inv(id=0,umin_value=4096,umax_value=266592255,var_off=(0x0; 0xfffffff)) R9_w=invP450 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0_w=inv(id=0) R1_w=inv1851392 R6=inv(id=2,umin_value=1847297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1847296 R8_w=inv(id=0,umax_value=266588159,var_off=(0x0; 0xfffffff)) R9_w=invP451 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0_w=inv(id=0) R1_w=inv1851392 R2_w=inv(id=0,umax_value=266588159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1847297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1851392 R8_w=inv(id=0,umin_value=4096,umax_value=266588159,var_off=(0x0; 0xfffffff)) R9_w=invP451 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1847297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1851392 R8_w=inv(id=0,umin_value=4096,umax_value=266588159,var_off=(0x0; 0xfffffff)) R9_w=invP451 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) | |
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24) | |
regs=4 stack=0 before 38: (05) goto pc-19 | |
regs=4 stack=0 before 37: (b4) w2 = 4096 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
26: (26) if w9 > 0x1fe goto pc+5 | |
; | |
27: (07) r8 += -4096 | |
28: (bf) r1 = r7 | |
29: (07) r1 += 4096 | |
30: (04) w9 += 1 | |
; for (int i = 0; i < 512 && offset < args_size; i++) { | |
31: (ad) if r7 < r6 goto pc+2 | |
from 31 to 34: R0=inv(id=0) R1=inv1855488 R6=inv(id=2,umin_value=1851393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1851392 R8=inv(id=0,umax_value=266584063,var_off=(0x0; 0xfffffff)) R9=invP452 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
; int BPF_PROG(exec, struct linux_binprm *bprm) { | |
34: (bf) r7 = r1 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
35: (bc) w2 = w8 | |
36: (a5) if r8 < 0x1000 goto pc-17 | |
R0=inv(id=0) R1=inv1855488 R2_w=inv(id=0,umax_value=266584063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1851393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1855488 R8=inv(id=0,umin_value=4096,umax_value=266584063,var_off=(0x0; 0xfffffff)) R9=invP452 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
37: (b4) w2 = 4096 | |
38: (05) goto pc-19 | |
; void *src = (void *)(char *)bprm->p + offset; | |
20: (79) r1 = *(u64 *)(r10 -24) | |
21: (79) r3 = *(u64 *)(r1 +24) | |
; uint64_t read_size = args_size - offset; | |
22: (0f) r3 += r7 | |
23: (07) r3 += -4096 | |
; (void) bpf_probe_read_user(buf, read_size, src); | |
24: (79) r1 = *(u64 *)(r10 -16) | |
25: (85) call bpf_probe_read_user#112 | |
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1851393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1855488 R8=inv(id=0,umin_value=4096,umax_value=266584063,var_off=(0x0; 0xfffffff)) R9=invP452 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_ | |
last_idx 25 first_idx 34 | |
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16) | |
regs=4 stack=0 before 23: (07) r3 += -4096 | |
regs=4 stack=0 before 22: (0f) r3 += r7 | |
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment