Skip to content

Instantly share code, notes, and snippets.

@bjackman
Created April 21, 2021 11:47
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save bjackman/2928c4ff4cc89545f3993bddd9d5edb2 to your computer and use it in GitHub Desktop.
Save bjackman/2928c4ff4cc89545f3993bddd9d5edb2 to your computer and use it in GitHub Desktop.
This file has been truncated, but you can view the full file.
Failed to load bpf_testmod.ko into the kernel: -8
WARNING! Selftests relying on bpf_testmod.ko will be skipped.
libbpf: load bpf program failed: Permission denied
libbpf: -- BEGIN DUMP LOG ---
libbpf:
R1 type=ctx expected=fp
; int BPF_PROG(exec, struct linux_binprm *bprm) {
0: (79) r1 = *(u64 *)(r1 +0)
func 'bpf_lsm_bprm_committed_creds' arg0 has btf_id 1589 type STRUCT 'linux_binprm'
1: (7b) *(u64 *)(r10 -24) = r1
; uint64_t args_size = bprm->argc & 0xFFFFFFF;
2: (61) r7 = *(u32 *)(r1 +88)
3: (b4) w1 = 0
; int map_key = 0;
4: (63) *(u32 *)(r10 -4) = r1
last_idx 4 first_idx 0
regs=2 stack=0 before 3: (b4) w1 = 0
5: (bf) r2 = r10
;
6: (07) r2 += -4
; void *buf = bpf_map_lookup_elem(&buf_map, &map_key);
7: (18) r1 = 0xffff8881075a4e00
9: (85) call bpf_map_lookup_elem#1
10: (7b) *(u64 *)(r10 -16) = r0
11: (57) r7 &= 268435455
12: (bf) r6 = r7
; if (!buf)
13: (16) if w7 == 0x0 goto pc+18
R0_w=map_value_or_null(id=1,off=0,ks=4,vs=4096,imm=0) R6_w=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R10=fp0 fp-8=mmmm???? fp-16_w=map_value_or_null fp-24_w=ptr_
14: (79) r1 = *(u64 *)(r10 -16)
15: (15) if r1 == 0x0 goto pc+16
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R6=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv(id=2,umax_value=268435455,var_off=(0x0; 0xfffffff)) R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
16: (b4) w9 = 0
17: (b7) r1 = 4096
18: (bf) r8 = r6
19: (05) goto pc+14
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=inv4096 R2_w=inv(id=0,umax_value=268435455,var_off=(0x0; 0xfffffff)) R6_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv4096 R8_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9_w=inv0 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv4096 R8=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9=inv0 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 20
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=inv4096 R2_rw=invP4096 R6_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_rw=inv4096 R8_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9_w=inv0 R10=fp0 fp-8=mmmm???? fp-16_r=map_value fp-24_r=ptr_
parent didn't have regs=4 stack=0 marks
last_idx 38 first_idx 15
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
last_idx 26 first_idx 20
regs=200 stack=0 before 25: (85) call bpf_probe_read_user#112
regs=200 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=200 stack=0 before 23: (07) r3 += -4096
regs=200 stack=0 before 22: (0f) r3 += r7
regs=200 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=200 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
R0=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R1_w=inv4096 R2_rw=invP4096 R6_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_rw=inv4096 R8_w=inv(id=2,umin_value=4096,umax_value=268435455,var_off=(0x0; 0xfffffff)) R9_rw=invP0 R10=fp0 fp-8=mmmm???? fp-16_r=map_value fp-24_r=ptr_
parent didn't have regs=200 stack=0 marks
last_idx 38 first_idx 15
regs=200 stack=0 before 38: (05) goto pc-19
regs=200 stack=0 before 37: (b4) w2 = 4096
regs=200 stack=0 before 36: (a5) if r8 < 0x1000 goto pc-17
regs=200 stack=0 before 35: (bc) w2 = w8
regs=200 stack=0 before 34: (bf) r7 = r1
regs=200 stack=0 before 19: (05) goto pc+14
regs=200 stack=0 before 18: (bf) r8 = r6
regs=200 stack=0 before 17: (b7) r1 = 4096
regs=200 stack=0 before 16: (b4) w9 = 0
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv8192 R6=inv(id=2,umin_value=4097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv4096 R8=inv(id=0,umax_value=268431359,var_off=(0x0; 0xfffffff)) R9=invP1 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv8192 R2_w=inv(id=0,umax_value=268431359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=4097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv8192 R8=inv(id=0,umin_value=4096,umax_value=268431359,var_off=(0x0; 0xfffffff)) R9=invP1 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=4097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv8192 R8=inv(id=0,umin_value=4096,umax_value=268431359,var_off=(0x0; 0xfffffff)) R9=invP1 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 31
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv12288 R6=inv(id=2,umin_value=8193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv8192 R8=inv(id=0,umax_value=268427263,var_off=(0x0; 0xfffffff)) R9=invP2 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv12288 R2_w=inv(id=0,umax_value=268427263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=8193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv12288 R8=inv(id=0,umin_value=4096,umax_value=268427263,var_off=(0x0; 0xfffffff)) R9=invP2 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=8193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv12288 R8=inv(id=0,umin_value=4096,umax_value=268427263,var_off=(0x0; 0xfffffff)) R9=invP2 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv16384 R6=inv(id=2,umin_value=12289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv12288 R8_w=inv(id=0,umax_value=268423167,var_off=(0x0; 0xfffffff)) R9_w=invP3 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv16384 R2_w=inv(id=0,umax_value=268423167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=12289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv16384 R8_w=inv(id=0,umin_value=4096,umax_value=268423167,var_off=(0x0; 0xfffffff)) R9_w=invP3 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=12289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv16384 R8_w=inv(id=0,umin_value=4096,umax_value=268423167,var_off=(0x0; 0xfffffff)) R9_w=invP3 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv20480 R6=inv(id=2,umin_value=16385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv16384 R8_w=inv(id=0,umax_value=268419071,var_off=(0x0; 0xfffffff)) R9_w=invP4 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv20480 R2=inv(id=0,umax_value=268419071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=16385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv20480 R8=inv(id=0,umin_value=4096,umax_value=268419071,var_off=(0x0; 0xfffffff)) R9=invP4 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=16385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv20480 R8=inv(id=0,umin_value=4096,umax_value=268419071,var_off=(0x0; 0xfffffff)) R9=invP4 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 36
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv24576 R6=inv(id=2,umin_value=20481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv20480 R8_w=inv(id=0,umax_value=268414975,var_off=(0x0; 0xfffffff)) R9_w=invP5 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv24576 R2_w=inv(id=0,umax_value=268414975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=20481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv24576 R8_w=inv(id=0,umin_value=4096,umax_value=268414975,var_off=(0x0; 0xfffffff)) R9_w=invP5 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=20481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv24576 R8_w=inv(id=0,umin_value=4096,umax_value=268414975,var_off=(0x0; 0xfffffff)) R9_w=invP5 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 36
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv28672 R6=inv(id=2,umin_value=24577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv24576 R8_w=inv(id=0,umax_value=268410879,var_off=(0x0; 0xfffffff)) R9_w=invP6 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv28672 R2_w=inv(id=0,umax_value=268410879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=24577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv28672 R8_w=inv(id=0,umin_value=4096,umax_value=268410879,var_off=(0x0; 0xfffffff)) R9_w=invP6 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=24577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv28672 R8_w=inv(id=0,umin_value=4096,umax_value=268410879,var_off=(0x0; 0xfffffff)) R9_w=invP6 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 36
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv32768 R6=inv(id=2,umin_value=28673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv28672 R8_w=inv(id=0,umax_value=268406783,var_off=(0x0; 0xfffffff)) R9_w=invP7 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv32768 R2_w=inv(id=0,umax_value=268406783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=28673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv32768 R8_w=inv(id=0,umin_value=4096,umax_value=268406783,var_off=(0x0; 0xfffffff)) R9_w=invP7 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=28673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv32768 R8_w=inv(id=0,umin_value=4096,umax_value=268406783,var_off=(0x0; 0xfffffff)) R9_w=invP7 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 36
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv36864 R6=inv(id=2,umin_value=32769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv32768 R8=inv(id=0,umax_value=268402687,var_off=(0x0; 0xfffffff)) R9=invP8 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv36864 R2_w=inv(id=0,umax_value=268402687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=32769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv36864 R8=inv(id=0,umin_value=4096,umax_value=268402687,var_off=(0x0; 0xfffffff)) R9=invP8 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=32769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv36864 R8=inv(id=0,umin_value=4096,umax_value=268402687,var_off=(0x0; 0xfffffff)) R9=invP8 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv40960 R6=inv(id=2,umin_value=36865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv36864 R8_w=inv(id=0,umax_value=268398591,var_off=(0x0; 0xfffffff)) R9_w=invP9 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv40960 R2_w=inv(id=0,umax_value=268398591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=36865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv40960 R8_w=inv(id=0,umin_value=4096,umax_value=268398591,var_off=(0x0; 0xfffffff)) R9_w=invP9 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=36865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv40960 R8_w=inv(id=0,umin_value=4096,umax_value=268398591,var_off=(0x0; 0xfffffff)) R9_w=invP9 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv45056 R6=inv(id=2,umin_value=40961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv40960 R8_w=inv(id=0,umax_value=268394495,var_off=(0x0; 0xfffffff)) R9_w=invP10 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv45056 R2_w=inv(id=0,umax_value=268394495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=40961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv45056 R8_w=inv(id=0,umin_value=4096,umax_value=268394495,var_off=(0x0; 0xfffffff)) R9_w=invP10 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=40961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv45056 R8_w=inv(id=0,umin_value=4096,umax_value=268394495,var_off=(0x0; 0xfffffff)) R9_w=invP10 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv49152 R6=inv(id=2,umin_value=45057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv45056 R8_w=inv(id=0,umax_value=268390399,var_off=(0x0; 0xfffffff)) R9_w=invP11 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv49152 R2_w=inv(id=0,umax_value=268390399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=45057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv49152 R8_w=inv(id=0,umin_value=4096,umax_value=268390399,var_off=(0x0; 0xfffffff)) R9_w=invP11 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=45057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv49152 R8_w=inv(id=0,umin_value=4096,umax_value=268390399,var_off=(0x0; 0xfffffff)) R9_w=invP11 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv53248 R6=inv(id=2,umin_value=49153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv49152 R8=inv(id=0,umax_value=268386303,var_off=(0x0; 0xfffffff)) R9=invP12 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv53248 R2_w=inv(id=0,umax_value=268386303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=49153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv53248 R8=inv(id=0,umin_value=4096,umax_value=268386303,var_off=(0x0; 0xfffffff)) R9=invP12 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=49153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv53248 R8=inv(id=0,umin_value=4096,umax_value=268386303,var_off=(0x0; 0xfffffff)) R9=invP12 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv57344 R6=inv(id=2,umin_value=53249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv53248 R8_w=inv(id=0,umax_value=268382207,var_off=(0x0; 0xfffffff)) R9_w=invP13 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv57344 R2_w=inv(id=0,umax_value=268382207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=53249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv57344 R8_w=inv(id=0,umin_value=4096,umax_value=268382207,var_off=(0x0; 0xfffffff)) R9_w=invP13 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=53249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv57344 R8_w=inv(id=0,umin_value=4096,umax_value=268382207,var_off=(0x0; 0xfffffff)) R9_w=invP13 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv61440 R6=inv(id=2,umin_value=57345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv57344 R8_w=inv(id=0,umax_value=268378111,var_off=(0x0; 0xfffffff)) R9_w=invP14 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv61440 R2_w=inv(id=0,umax_value=268378111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=57345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv61440 R8_w=inv(id=0,umin_value=4096,umax_value=268378111,var_off=(0x0; 0xfffffff)) R9_w=invP14 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=57345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv61440 R8_w=inv(id=0,umin_value=4096,umax_value=268378111,var_off=(0x0; 0xfffffff)) R9_w=invP14 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv65536 R6=inv(id=2,umin_value=61441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv61440 R8_w=inv(id=0,umax_value=268374015,var_off=(0x0; 0xfffffff)) R9_w=invP15 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv65536 R2_w=inv(id=0,umax_value=268374015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=61441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv65536 R8_w=inv(id=0,umin_value=4096,umax_value=268374015,var_off=(0x0; 0xfffffff)) R9_w=invP15 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=61441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv65536 R8_w=inv(id=0,umin_value=4096,umax_value=268374015,var_off=(0x0; 0xfffffff)) R9_w=invP15 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv69632 R6=inv(id=2,umin_value=65537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv65536 R8=inv(id=0,umax_value=268369919,var_off=(0x0; 0xfffffff)) R9=invP16 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv69632 R2_w=inv(id=0,umax_value=268369919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=65537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv69632 R8=inv(id=0,umin_value=4096,umax_value=268369919,var_off=(0x0; 0xfffffff)) R9=invP16 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=65537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv69632 R8=inv(id=0,umin_value=4096,umax_value=268369919,var_off=(0x0; 0xfffffff)) R9=invP16 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv73728 R6=inv(id=2,umin_value=69633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv69632 R8_w=inv(id=0,umax_value=268365823,var_off=(0x0; 0xfffffff)) R9_w=invP17 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv73728 R2_w=inv(id=0,umax_value=268365823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=69633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv73728 R8_w=inv(id=0,umin_value=4096,umax_value=268365823,var_off=(0x0; 0xfffffff)) R9_w=invP17 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=69633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv73728 R8_w=inv(id=0,umin_value=4096,umax_value=268365823,var_off=(0x0; 0xfffffff)) R9_w=invP17 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv77824 R6=inv(id=2,umin_value=73729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv73728 R8_w=inv(id=0,umax_value=268361727,var_off=(0x0; 0xfffffff)) R9_w=invP18 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv77824 R2_w=inv(id=0,umax_value=268361727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=73729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv77824 R8_w=inv(id=0,umin_value=4096,umax_value=268361727,var_off=(0x0; 0xfffffff)) R9_w=invP18 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=73729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv77824 R8_w=inv(id=0,umin_value=4096,umax_value=268361727,var_off=(0x0; 0xfffffff)) R9_w=invP18 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv81920 R6=inv(id=2,umin_value=77825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv77824 R8_w=inv(id=0,umax_value=268357631,var_off=(0x0; 0xfffffff)) R9_w=invP19 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv81920 R2_w=inv(id=0,umax_value=268357631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=77825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv81920 R8_w=inv(id=0,umin_value=4096,umax_value=268357631,var_off=(0x0; 0xfffffff)) R9_w=invP19 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=77825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv81920 R8_w=inv(id=0,umin_value=4096,umax_value=268357631,var_off=(0x0; 0xfffffff)) R9_w=invP19 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv86016 R6=inv(id=2,umin_value=81921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv81920 R8=inv(id=0,umax_value=268353535,var_off=(0x0; 0xfffffff)) R9=invP20 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv86016 R2_w=inv(id=0,umax_value=268353535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=81921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv86016 R8=inv(id=0,umin_value=4096,umax_value=268353535,var_off=(0x0; 0xfffffff)) R9=invP20 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=81921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv86016 R8=inv(id=0,umin_value=4096,umax_value=268353535,var_off=(0x0; 0xfffffff)) R9=invP20 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv90112 R6=inv(id=2,umin_value=86017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv86016 R8_w=inv(id=0,umax_value=268349439,var_off=(0x0; 0xfffffff)) R9_w=invP21 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv90112 R2_w=inv(id=0,umax_value=268349439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=86017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv90112 R8_w=inv(id=0,umin_value=4096,umax_value=268349439,var_off=(0x0; 0xfffffff)) R9_w=invP21 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=86017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv90112 R8_w=inv(id=0,umin_value=4096,umax_value=268349439,var_off=(0x0; 0xfffffff)) R9_w=invP21 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv94208 R6=inv(id=2,umin_value=90113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv90112 R8_w=inv(id=0,umax_value=268345343,var_off=(0x0; 0xfffffff)) R9_w=invP22 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv94208 R2_w=inv(id=0,umax_value=268345343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=90113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv94208 R8_w=inv(id=0,umin_value=4096,umax_value=268345343,var_off=(0x0; 0xfffffff)) R9_w=invP22 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=90113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv94208 R8_w=inv(id=0,umin_value=4096,umax_value=268345343,var_off=(0x0; 0xfffffff)) R9_w=invP22 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv98304 R6=inv(id=2,umin_value=94209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv94208 R8_w=inv(id=0,umax_value=268341247,var_off=(0x0; 0xfffffff)) R9_w=invP23 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv98304 R2_w=inv(id=0,umax_value=268341247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=94209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv98304 R8_w=inv(id=0,umin_value=4096,umax_value=268341247,var_off=(0x0; 0xfffffff)) R9_w=invP23 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=94209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv98304 R8_w=inv(id=0,umin_value=4096,umax_value=268341247,var_off=(0x0; 0xfffffff)) R9_w=invP23 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv102400 R6=inv(id=2,umin_value=98305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv98304 R8=inv(id=0,umax_value=268337151,var_off=(0x0; 0xfffffff)) R9=invP24 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv102400 R2_w=inv(id=0,umax_value=268337151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=98305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv102400 R8=inv(id=0,umin_value=4096,umax_value=268337151,var_off=(0x0; 0xfffffff)) R9=invP24 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=98305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv102400 R8=inv(id=0,umin_value=4096,umax_value=268337151,var_off=(0x0; 0xfffffff)) R9=invP24 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv106496 R6=inv(id=2,umin_value=102401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv102400 R8_w=inv(id=0,umax_value=268333055,var_off=(0x0; 0xfffffff)) R9_w=invP25 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv106496 R2_w=inv(id=0,umax_value=268333055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=102401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv106496 R8_w=inv(id=0,umin_value=4096,umax_value=268333055,var_off=(0x0; 0xfffffff)) R9_w=invP25 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=102401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv106496 R8_w=inv(id=0,umin_value=4096,umax_value=268333055,var_off=(0x0; 0xfffffff)) R9_w=invP25 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv110592 R6=inv(id=2,umin_value=106497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv106496 R8_w=inv(id=0,umax_value=268328959,var_off=(0x0; 0xfffffff)) R9_w=invP26 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv110592 R2_w=inv(id=0,umax_value=268328959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=106497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv110592 R8_w=inv(id=0,umin_value=4096,umax_value=268328959,var_off=(0x0; 0xfffffff)) R9_w=invP26 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=106497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv110592 R8_w=inv(id=0,umin_value=4096,umax_value=268328959,var_off=(0x0; 0xfffffff)) R9_w=invP26 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv114688 R6=inv(id=2,umin_value=110593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv110592 R8_w=inv(id=0,umax_value=268324863,var_off=(0x0; 0xfffffff)) R9_w=invP27 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv114688 R2_w=inv(id=0,umax_value=268324863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=110593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv114688 R8_w=inv(id=0,umin_value=4096,umax_value=268324863,var_off=(0x0; 0xfffffff)) R9_w=invP27 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=110593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv114688 R8_w=inv(id=0,umin_value=4096,umax_value=268324863,var_off=(0x0; 0xfffffff)) R9_w=invP27 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv118784 R6=inv(id=2,umin_value=114689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv114688 R8=inv(id=0,umax_value=268320767,var_off=(0x0; 0xfffffff)) R9=invP28 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv118784 R2_w=inv(id=0,umax_value=268320767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=114689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv118784 R8=inv(id=0,umin_value=4096,umax_value=268320767,var_off=(0x0; 0xfffffff)) R9=invP28 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=114689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv118784 R8=inv(id=0,umin_value=4096,umax_value=268320767,var_off=(0x0; 0xfffffff)) R9=invP28 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv122880 R6=inv(id=2,umin_value=118785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv118784 R8_w=inv(id=0,umax_value=268316671,var_off=(0x0; 0xfffffff)) R9_w=invP29 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv122880 R2_w=inv(id=0,umax_value=268316671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=118785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv122880 R8_w=inv(id=0,umin_value=4096,umax_value=268316671,var_off=(0x0; 0xfffffff)) R9_w=invP29 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=118785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv122880 R8_w=inv(id=0,umin_value=4096,umax_value=268316671,var_off=(0x0; 0xfffffff)) R9_w=invP29 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv126976 R6=inv(id=2,umin_value=122881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv122880 R8_w=inv(id=0,umax_value=268312575,var_off=(0x0; 0xfffffff)) R9_w=invP30 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv126976 R2_w=inv(id=0,umax_value=268312575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=122881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv126976 R8_w=inv(id=0,umin_value=4096,umax_value=268312575,var_off=(0x0; 0xfffffff)) R9_w=invP30 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=122881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv126976 R8_w=inv(id=0,umin_value=4096,umax_value=268312575,var_off=(0x0; 0xfffffff)) R9_w=invP30 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv131072 R6=inv(id=2,umin_value=126977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv126976 R8_w=inv(id=0,umax_value=268308479,var_off=(0x0; 0xfffffff)) R9_w=invP31 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv131072 R2_w=inv(id=0,umax_value=268308479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=126977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv131072 R8_w=inv(id=0,umin_value=4096,umax_value=268308479,var_off=(0x0; 0xfffffff)) R9_w=invP31 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=126977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv131072 R8_w=inv(id=0,umin_value=4096,umax_value=268308479,var_off=(0x0; 0xfffffff)) R9_w=invP31 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv135168 R6=inv(id=2,umin_value=131073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv131072 R8=inv(id=0,umax_value=268304383,var_off=(0x0; 0xfffffff)) R9=invP32 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv135168 R2_w=inv(id=0,umax_value=268304383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=131073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv135168 R8=inv(id=0,umin_value=4096,umax_value=268304383,var_off=(0x0; 0xfffffff)) R9=invP32 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=131073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv135168 R8=inv(id=0,umin_value=4096,umax_value=268304383,var_off=(0x0; 0xfffffff)) R9=invP32 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv139264 R6=inv(id=2,umin_value=135169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv135168 R8_w=inv(id=0,umax_value=268300287,var_off=(0x0; 0xfffffff)) R9_w=invP33 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv139264 R2_w=inv(id=0,umax_value=268300287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=135169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv139264 R8_w=inv(id=0,umin_value=4096,umax_value=268300287,var_off=(0x0; 0xfffffff)) R9_w=invP33 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=135169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv139264 R8_w=inv(id=0,umin_value=4096,umax_value=268300287,var_off=(0x0; 0xfffffff)) R9_w=invP33 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv143360 R6=inv(id=2,umin_value=139265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv139264 R8_w=inv(id=0,umax_value=268296191,var_off=(0x0; 0xfffffff)) R9_w=invP34 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv143360 R2_w=inv(id=0,umax_value=268296191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=139265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv143360 R8_w=inv(id=0,umin_value=4096,umax_value=268296191,var_off=(0x0; 0xfffffff)) R9_w=invP34 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=139265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv143360 R8_w=inv(id=0,umin_value=4096,umax_value=268296191,var_off=(0x0; 0xfffffff)) R9_w=invP34 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv147456 R6=inv(id=2,umin_value=143361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv143360 R8_w=inv(id=0,umax_value=268292095,var_off=(0x0; 0xfffffff)) R9_w=invP35 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv147456 R2_w=inv(id=0,umax_value=268292095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=143361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv147456 R8_w=inv(id=0,umin_value=4096,umax_value=268292095,var_off=(0x0; 0xfffffff)) R9_w=invP35 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=143361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv147456 R8_w=inv(id=0,umin_value=4096,umax_value=268292095,var_off=(0x0; 0xfffffff)) R9_w=invP35 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv151552 R6=inv(id=2,umin_value=147457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv147456 R8=inv(id=0,umax_value=268287999,var_off=(0x0; 0xfffffff)) R9=invP36 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv151552 R2_w=inv(id=0,umax_value=268287999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=147457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv151552 R8=inv(id=0,umin_value=4096,umax_value=268287999,var_off=(0x0; 0xfffffff)) R9=invP36 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=147457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv151552 R8=inv(id=0,umin_value=4096,umax_value=268287999,var_off=(0x0; 0xfffffff)) R9=invP36 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv155648 R6=inv(id=2,umin_value=151553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv151552 R8_w=inv(id=0,umax_value=268283903,var_off=(0x0; 0xfffffff)) R9_w=invP37 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv155648 R2_w=inv(id=0,umax_value=268283903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=151553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv155648 R8_w=inv(id=0,umin_value=4096,umax_value=268283903,var_off=(0x0; 0xfffffff)) R9_w=invP37 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=151553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv155648 R8_w=inv(id=0,umin_value=4096,umax_value=268283903,var_off=(0x0; 0xfffffff)) R9_w=invP37 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv159744 R6=inv(id=2,umin_value=155649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv155648 R8_w=inv(id=0,umax_value=268279807,var_off=(0x0; 0xfffffff)) R9_w=invP38 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv159744 R2_w=inv(id=0,umax_value=268279807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=155649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv159744 R8_w=inv(id=0,umin_value=4096,umax_value=268279807,var_off=(0x0; 0xfffffff)) R9_w=invP38 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=155649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv159744 R8_w=inv(id=0,umin_value=4096,umax_value=268279807,var_off=(0x0; 0xfffffff)) R9_w=invP38 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv163840 R6=inv(id=2,umin_value=159745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv159744 R8_w=inv(id=0,umax_value=268275711,var_off=(0x0; 0xfffffff)) R9_w=invP39 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv163840 R2_w=inv(id=0,umax_value=268275711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=159745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv163840 R8_w=inv(id=0,umin_value=4096,umax_value=268275711,var_off=(0x0; 0xfffffff)) R9_w=invP39 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=159745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv163840 R8_w=inv(id=0,umin_value=4096,umax_value=268275711,var_off=(0x0; 0xfffffff)) R9_w=invP39 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv167936 R6=inv(id=2,umin_value=163841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv163840 R8=inv(id=0,umax_value=268271615,var_off=(0x0; 0xfffffff)) R9=invP40 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv167936 R2_w=inv(id=0,umax_value=268271615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=163841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv167936 R8=inv(id=0,umin_value=4096,umax_value=268271615,var_off=(0x0; 0xfffffff)) R9=invP40 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=163841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv167936 R8=inv(id=0,umin_value=4096,umax_value=268271615,var_off=(0x0; 0xfffffff)) R9=invP40 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv172032 R6=inv(id=2,umin_value=167937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv167936 R8_w=inv(id=0,umax_value=268267519,var_off=(0x0; 0xfffffff)) R9_w=invP41 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv172032 R2_w=inv(id=0,umax_value=268267519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=167937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv172032 R8_w=inv(id=0,umin_value=4096,umax_value=268267519,var_off=(0x0; 0xfffffff)) R9_w=invP41 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=167937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv172032 R8_w=inv(id=0,umin_value=4096,umax_value=268267519,var_off=(0x0; 0xfffffff)) R9_w=invP41 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv176128 R6=inv(id=2,umin_value=172033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv172032 R8_w=inv(id=0,umax_value=268263423,var_off=(0x0; 0xfffffff)) R9_w=invP42 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv176128 R2_w=inv(id=0,umax_value=268263423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=172033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv176128 R8_w=inv(id=0,umin_value=4096,umax_value=268263423,var_off=(0x0; 0xfffffff)) R9_w=invP42 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=172033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv176128 R8_w=inv(id=0,umin_value=4096,umax_value=268263423,var_off=(0x0; 0xfffffff)) R9_w=invP42 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv180224 R6=inv(id=2,umin_value=176129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv176128 R8_w=inv(id=0,umax_value=268259327,var_off=(0x0; 0xfffffff)) R9_w=invP43 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv180224 R2_w=inv(id=0,umax_value=268259327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=176129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv180224 R8_w=inv(id=0,umin_value=4096,umax_value=268259327,var_off=(0x0; 0xfffffff)) R9_w=invP43 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=176129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv180224 R8_w=inv(id=0,umin_value=4096,umax_value=268259327,var_off=(0x0; 0xfffffff)) R9_w=invP43 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv184320 R6=inv(id=2,umin_value=180225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv180224 R8=inv(id=0,umax_value=268255231,var_off=(0x0; 0xfffffff)) R9=invP44 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv184320 R2_w=inv(id=0,umax_value=268255231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=180225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv184320 R8=inv(id=0,umin_value=4096,umax_value=268255231,var_off=(0x0; 0xfffffff)) R9=invP44 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=180225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv184320 R8=inv(id=0,umin_value=4096,umax_value=268255231,var_off=(0x0; 0xfffffff)) R9=invP44 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv188416 R6=inv(id=2,umin_value=184321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv184320 R8_w=inv(id=0,umax_value=268251135,var_off=(0x0; 0xfffffff)) R9_w=invP45 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv188416 R2_w=inv(id=0,umax_value=268251135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=184321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv188416 R8_w=inv(id=0,umin_value=4096,umax_value=268251135,var_off=(0x0; 0xfffffff)) R9_w=invP45 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=184321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv188416 R8_w=inv(id=0,umin_value=4096,umax_value=268251135,var_off=(0x0; 0xfffffff)) R9_w=invP45 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv192512 R6=inv(id=2,umin_value=188417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv188416 R8_w=inv(id=0,umax_value=268247039,var_off=(0x0; 0xfffffff)) R9_w=invP46 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv192512 R2_w=inv(id=0,umax_value=268247039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=188417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv192512 R8_w=inv(id=0,umin_value=4096,umax_value=268247039,var_off=(0x0; 0xfffffff)) R9_w=invP46 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=188417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv192512 R8_w=inv(id=0,umin_value=4096,umax_value=268247039,var_off=(0x0; 0xfffffff)) R9_w=invP46 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv196608 R6=inv(id=2,umin_value=192513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv192512 R8_w=inv(id=0,umax_value=268242943,var_off=(0x0; 0xfffffff)) R9_w=invP47 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv196608 R2_w=inv(id=0,umax_value=268242943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=192513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv196608 R8_w=inv(id=0,umin_value=4096,umax_value=268242943,var_off=(0x0; 0xfffffff)) R9_w=invP47 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=192513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv196608 R8_w=inv(id=0,umin_value=4096,umax_value=268242943,var_off=(0x0; 0xfffffff)) R9_w=invP47 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv200704 R6=inv(id=2,umin_value=196609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv196608 R8=inv(id=0,umax_value=268238847,var_off=(0x0; 0xfffffff)) R9=invP48 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv200704 R2_w=inv(id=0,umax_value=268238847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=196609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv200704 R8=inv(id=0,umin_value=4096,umax_value=268238847,var_off=(0x0; 0xfffffff)) R9=invP48 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=196609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv200704 R8=inv(id=0,umin_value=4096,umax_value=268238847,var_off=(0x0; 0xfffffff)) R9=invP48 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv204800 R6=inv(id=2,umin_value=200705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv200704 R8_w=inv(id=0,umax_value=268234751,var_off=(0x0; 0xfffffff)) R9_w=invP49 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv204800 R2_w=inv(id=0,umax_value=268234751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=200705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv204800 R8_w=inv(id=0,umin_value=4096,umax_value=268234751,var_off=(0x0; 0xfffffff)) R9_w=invP49 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=200705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv204800 R8_w=inv(id=0,umin_value=4096,umax_value=268234751,var_off=(0x0; 0xfffffff)) R9_w=invP49 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv208896 R6=inv(id=2,umin_value=204801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv204800 R8_w=inv(id=0,umax_value=268230655,var_off=(0x0; 0xfffffff)) R9_w=invP50 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv208896 R2_w=inv(id=0,umax_value=268230655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=204801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv208896 R8_w=inv(id=0,umin_value=4096,umax_value=268230655,var_off=(0x0; 0xfffffff)) R9_w=invP50 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=204801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv208896 R8_w=inv(id=0,umin_value=4096,umax_value=268230655,var_off=(0x0; 0xfffffff)) R9_w=invP50 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv212992 R6=inv(id=2,umin_value=208897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv208896 R8_w=inv(id=0,umax_value=268226559,var_off=(0x0; 0xfffffff)) R9_w=invP51 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv212992 R2_w=inv(id=0,umax_value=268226559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=208897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv212992 R8_w=inv(id=0,umin_value=4096,umax_value=268226559,var_off=(0x0; 0xfffffff)) R9_w=invP51 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=208897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv212992 R8_w=inv(id=0,umin_value=4096,umax_value=268226559,var_off=(0x0; 0xfffffff)) R9_w=invP51 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv217088 R6=inv(id=2,umin_value=212993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv212992 R8=inv(id=0,umax_value=268222463,var_off=(0x0; 0xfffffff)) R9=invP52 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv217088 R2_w=inv(id=0,umax_value=268222463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=212993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv217088 R8=inv(id=0,umin_value=4096,umax_value=268222463,var_off=(0x0; 0xfffffff)) R9=invP52 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=212993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv217088 R8=inv(id=0,umin_value=4096,umax_value=268222463,var_off=(0x0; 0xfffffff)) R9=invP52 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv221184 R6=inv(id=2,umin_value=217089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv217088 R8_w=inv(id=0,umax_value=268218367,var_off=(0x0; 0xfffffff)) R9_w=invP53 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv221184 R2_w=inv(id=0,umax_value=268218367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=217089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv221184 R8_w=inv(id=0,umin_value=4096,umax_value=268218367,var_off=(0x0; 0xfffffff)) R9_w=invP53 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=217089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv221184 R8_w=inv(id=0,umin_value=4096,umax_value=268218367,var_off=(0x0; 0xfffffff)) R9_w=invP53 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv225280 R6=inv(id=2,umin_value=221185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv221184 R8_w=inv(id=0,umax_value=268214271,var_off=(0x0; 0xfffffff)) R9_w=invP54 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv225280 R2_w=inv(id=0,umax_value=268214271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=221185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv225280 R8_w=inv(id=0,umin_value=4096,umax_value=268214271,var_off=(0x0; 0xfffffff)) R9_w=invP54 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=221185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv225280 R8_w=inv(id=0,umin_value=4096,umax_value=268214271,var_off=(0x0; 0xfffffff)) R9_w=invP54 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv229376 R6=inv(id=2,umin_value=225281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv225280 R8_w=inv(id=0,umax_value=268210175,var_off=(0x0; 0xfffffff)) R9_w=invP55 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv229376 R2_w=inv(id=0,umax_value=268210175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=225281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv229376 R8_w=inv(id=0,umin_value=4096,umax_value=268210175,var_off=(0x0; 0xfffffff)) R9_w=invP55 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=225281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv229376 R8_w=inv(id=0,umin_value=4096,umax_value=268210175,var_off=(0x0; 0xfffffff)) R9_w=invP55 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv233472 R6=inv(id=2,umin_value=229377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv229376 R8=inv(id=0,umax_value=268206079,var_off=(0x0; 0xfffffff)) R9=invP56 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv233472 R2_w=inv(id=0,umax_value=268206079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=229377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv233472 R8=inv(id=0,umin_value=4096,umax_value=268206079,var_off=(0x0; 0xfffffff)) R9=invP56 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=229377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv233472 R8=inv(id=0,umin_value=4096,umax_value=268206079,var_off=(0x0; 0xfffffff)) R9=invP56 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv237568 R6=inv(id=2,umin_value=233473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv233472 R8_w=inv(id=0,umax_value=268201983,var_off=(0x0; 0xfffffff)) R9_w=invP57 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv237568 R2_w=inv(id=0,umax_value=268201983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=233473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv237568 R8_w=inv(id=0,umin_value=4096,umax_value=268201983,var_off=(0x0; 0xfffffff)) R9_w=invP57 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=233473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv237568 R8_w=inv(id=0,umin_value=4096,umax_value=268201983,var_off=(0x0; 0xfffffff)) R9_w=invP57 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv241664 R6=inv(id=2,umin_value=237569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv237568 R8_w=inv(id=0,umax_value=268197887,var_off=(0x0; 0xfffffff)) R9_w=invP58 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv241664 R2_w=inv(id=0,umax_value=268197887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=237569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv241664 R8_w=inv(id=0,umin_value=4096,umax_value=268197887,var_off=(0x0; 0xfffffff)) R9_w=invP58 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=237569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv241664 R8_w=inv(id=0,umin_value=4096,umax_value=268197887,var_off=(0x0; 0xfffffff)) R9_w=invP58 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv245760 R6=inv(id=2,umin_value=241665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv241664 R8_w=inv(id=0,umax_value=268193791,var_off=(0x0; 0xfffffff)) R9_w=invP59 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv245760 R2_w=inv(id=0,umax_value=268193791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=241665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv245760 R8_w=inv(id=0,umin_value=4096,umax_value=268193791,var_off=(0x0; 0xfffffff)) R9_w=invP59 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=241665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv245760 R8_w=inv(id=0,umin_value=4096,umax_value=268193791,var_off=(0x0; 0xfffffff)) R9_w=invP59 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv249856 R6=inv(id=2,umin_value=245761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv245760 R8=inv(id=0,umax_value=268189695,var_off=(0x0; 0xfffffff)) R9=invP60 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv249856 R2_w=inv(id=0,umax_value=268189695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=245761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv249856 R8=inv(id=0,umin_value=4096,umax_value=268189695,var_off=(0x0; 0xfffffff)) R9=invP60 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=245761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv249856 R8=inv(id=0,umin_value=4096,umax_value=268189695,var_off=(0x0; 0xfffffff)) R9=invP60 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv253952 R6=inv(id=2,umin_value=249857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv249856 R8_w=inv(id=0,umax_value=268185599,var_off=(0x0; 0xfffffff)) R9_w=invP61 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv253952 R2_w=inv(id=0,umax_value=268185599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=249857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv253952 R8_w=inv(id=0,umin_value=4096,umax_value=268185599,var_off=(0x0; 0xfffffff)) R9_w=invP61 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=249857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv253952 R8_w=inv(id=0,umin_value=4096,umax_value=268185599,var_off=(0x0; 0xfffffff)) R9_w=invP61 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv258048 R6=inv(id=2,umin_value=253953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv253952 R8_w=inv(id=0,umax_value=268181503,var_off=(0x0; 0xfffffff)) R9_w=invP62 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv258048 R2_w=inv(id=0,umax_value=268181503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=253953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv258048 R8_w=inv(id=0,umin_value=4096,umax_value=268181503,var_off=(0x0; 0xfffffff)) R9_w=invP62 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=253953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv258048 R8_w=inv(id=0,umin_value=4096,umax_value=268181503,var_off=(0x0; 0xfffffff)) R9_w=invP62 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv262144 R6=inv(id=2,umin_value=258049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv258048 R8_w=inv(id=0,umax_value=268177407,var_off=(0x0; 0xfffffff)) R9_w=invP63 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv262144 R2_w=inv(id=0,umax_value=268177407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=258049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv262144 R8_w=inv(id=0,umin_value=4096,umax_value=268177407,var_off=(0x0; 0xfffffff)) R9_w=invP63 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=258049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv262144 R8_w=inv(id=0,umin_value=4096,umax_value=268177407,var_off=(0x0; 0xfffffff)) R9_w=invP63 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv266240 R6=inv(id=2,umin_value=262145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv262144 R8=inv(id=0,umax_value=268173311,var_off=(0x0; 0xfffffff)) R9=invP64 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv266240 R2_w=inv(id=0,umax_value=268173311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=262145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv266240 R8=inv(id=0,umin_value=4096,umax_value=268173311,var_off=(0x0; 0xfffffff)) R9=invP64 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=262145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv266240 R8=inv(id=0,umin_value=4096,umax_value=268173311,var_off=(0x0; 0xfffffff)) R9=invP64 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv270336 R6=inv(id=2,umin_value=266241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv266240 R8_w=inv(id=0,umax_value=268169215,var_off=(0x0; 0xfffffff)) R9_w=invP65 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv270336 R2_w=inv(id=0,umax_value=268169215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=266241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv270336 R8_w=inv(id=0,umin_value=4096,umax_value=268169215,var_off=(0x0; 0xfffffff)) R9_w=invP65 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=266241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv270336 R8_w=inv(id=0,umin_value=4096,umax_value=268169215,var_off=(0x0; 0xfffffff)) R9_w=invP65 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv274432 R6=inv(id=2,umin_value=270337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv270336 R8_w=inv(id=0,umax_value=268165119,var_off=(0x0; 0xfffffff)) R9_w=invP66 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv274432 R2_w=inv(id=0,umax_value=268165119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=270337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv274432 R8_w=inv(id=0,umin_value=4096,umax_value=268165119,var_off=(0x0; 0xfffffff)) R9_w=invP66 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=270337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv274432 R8_w=inv(id=0,umin_value=4096,umax_value=268165119,var_off=(0x0; 0xfffffff)) R9_w=invP66 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv278528 R6=inv(id=2,umin_value=274433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv274432 R8_w=inv(id=0,umax_value=268161023,var_off=(0x0; 0xfffffff)) R9_w=invP67 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv278528 R2_w=inv(id=0,umax_value=268161023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=274433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv278528 R8_w=inv(id=0,umin_value=4096,umax_value=268161023,var_off=(0x0; 0xfffffff)) R9_w=invP67 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=274433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv278528 R8_w=inv(id=0,umin_value=4096,umax_value=268161023,var_off=(0x0; 0xfffffff)) R9_w=invP67 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv282624 R6=inv(id=2,umin_value=278529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv278528 R8=inv(id=0,umax_value=268156927,var_off=(0x0; 0xfffffff)) R9=invP68 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv282624 R2_w=inv(id=0,umax_value=268156927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=278529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv282624 R8=inv(id=0,umin_value=4096,umax_value=268156927,var_off=(0x0; 0xfffffff)) R9=invP68 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=278529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv282624 R8=inv(id=0,umin_value=4096,umax_value=268156927,var_off=(0x0; 0xfffffff)) R9=invP68 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv286720 R6=inv(id=2,umin_value=282625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv282624 R8_w=inv(id=0,umax_value=268152831,var_off=(0x0; 0xfffffff)) R9_w=invP69 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv286720 R2_w=inv(id=0,umax_value=268152831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=282625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv286720 R8_w=inv(id=0,umin_value=4096,umax_value=268152831,var_off=(0x0; 0xfffffff)) R9_w=invP69 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=282625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv286720 R8_w=inv(id=0,umin_value=4096,umax_value=268152831,var_off=(0x0; 0xfffffff)) R9_w=invP69 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv290816 R6=inv(id=2,umin_value=286721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv286720 R8_w=inv(id=0,umax_value=268148735,var_off=(0x0; 0xfffffff)) R9_w=invP70 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv290816 R2_w=inv(id=0,umax_value=268148735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=286721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv290816 R8_w=inv(id=0,umin_value=4096,umax_value=268148735,var_off=(0x0; 0xfffffff)) R9_w=invP70 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=286721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv290816 R8_w=inv(id=0,umin_value=4096,umax_value=268148735,var_off=(0x0; 0xfffffff)) R9_w=invP70 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv294912 R6=inv(id=2,umin_value=290817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv290816 R8_w=inv(id=0,umax_value=268144639,var_off=(0x0; 0xfffffff)) R9_w=invP71 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv294912 R2_w=inv(id=0,umax_value=268144639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=290817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv294912 R8_w=inv(id=0,umin_value=4096,umax_value=268144639,var_off=(0x0; 0xfffffff)) R9_w=invP71 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=290817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv294912 R8_w=inv(id=0,umin_value=4096,umax_value=268144639,var_off=(0x0; 0xfffffff)) R9_w=invP71 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv299008 R6=inv(id=2,umin_value=294913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv294912 R8=inv(id=0,umax_value=268140543,var_off=(0x0; 0xfffffff)) R9=invP72 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv299008 R2_w=inv(id=0,umax_value=268140543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=294913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv299008 R8=inv(id=0,umin_value=4096,umax_value=268140543,var_off=(0x0; 0xfffffff)) R9=invP72 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=294913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv299008 R8=inv(id=0,umin_value=4096,umax_value=268140543,var_off=(0x0; 0xfffffff)) R9=invP72 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv303104 R6=inv(id=2,umin_value=299009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv299008 R8_w=inv(id=0,umax_value=268136447,var_off=(0x0; 0xfffffff)) R9_w=invP73 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv303104 R2_w=inv(id=0,umax_value=268136447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=299009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv303104 R8_w=inv(id=0,umin_value=4096,umax_value=268136447,var_off=(0x0; 0xfffffff)) R9_w=invP73 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=299009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv303104 R8_w=inv(id=0,umin_value=4096,umax_value=268136447,var_off=(0x0; 0xfffffff)) R9_w=invP73 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv307200 R6=inv(id=2,umin_value=303105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv303104 R8_w=inv(id=0,umax_value=268132351,var_off=(0x0; 0xfffffff)) R9_w=invP74 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv307200 R2_w=inv(id=0,umax_value=268132351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=303105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv307200 R8_w=inv(id=0,umin_value=4096,umax_value=268132351,var_off=(0x0; 0xfffffff)) R9_w=invP74 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=303105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv307200 R8_w=inv(id=0,umin_value=4096,umax_value=268132351,var_off=(0x0; 0xfffffff)) R9_w=invP74 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv311296 R6=inv(id=2,umin_value=307201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv307200 R8_w=inv(id=0,umax_value=268128255,var_off=(0x0; 0xfffffff)) R9_w=invP75 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv311296 R2_w=inv(id=0,umax_value=268128255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=307201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv311296 R8_w=inv(id=0,umin_value=4096,umax_value=268128255,var_off=(0x0; 0xfffffff)) R9_w=invP75 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=307201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv311296 R8_w=inv(id=0,umin_value=4096,umax_value=268128255,var_off=(0x0; 0xfffffff)) R9_w=invP75 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv315392 R6=inv(id=2,umin_value=311297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv311296 R8=inv(id=0,umax_value=268124159,var_off=(0x0; 0xfffffff)) R9=invP76 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv315392 R2_w=inv(id=0,umax_value=268124159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=311297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv315392 R8=inv(id=0,umin_value=4096,umax_value=268124159,var_off=(0x0; 0xfffffff)) R9=invP76 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=311297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv315392 R8=inv(id=0,umin_value=4096,umax_value=268124159,var_off=(0x0; 0xfffffff)) R9=invP76 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv319488 R6=inv(id=2,umin_value=315393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv315392 R8_w=inv(id=0,umax_value=268120063,var_off=(0x0; 0xfffffff)) R9_w=invP77 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv319488 R2_w=inv(id=0,umax_value=268120063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=315393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv319488 R8_w=inv(id=0,umin_value=4096,umax_value=268120063,var_off=(0x0; 0xfffffff)) R9_w=invP77 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=315393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv319488 R8_w=inv(id=0,umin_value=4096,umax_value=268120063,var_off=(0x0; 0xfffffff)) R9_w=invP77 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv323584 R6=inv(id=2,umin_value=319489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv319488 R8_w=inv(id=0,umax_value=268115967,var_off=(0x0; 0xfffffff)) R9_w=invP78 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv323584 R2_w=inv(id=0,umax_value=268115967,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=319489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv323584 R8_w=inv(id=0,umin_value=4096,umax_value=268115967,var_off=(0x0; 0xfffffff)) R9_w=invP78 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=319489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv323584 R8_w=inv(id=0,umin_value=4096,umax_value=268115967,var_off=(0x0; 0xfffffff)) R9_w=invP78 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv327680 R6=inv(id=2,umin_value=323585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv323584 R8_w=inv(id=0,umax_value=268111871,var_off=(0x0; 0xfffffff)) R9_w=invP79 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv327680 R2_w=inv(id=0,umax_value=268111871,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=323585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv327680 R8_w=inv(id=0,umin_value=4096,umax_value=268111871,var_off=(0x0; 0xfffffff)) R9_w=invP79 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=323585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv327680 R8_w=inv(id=0,umin_value=4096,umax_value=268111871,var_off=(0x0; 0xfffffff)) R9_w=invP79 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv331776 R6=inv(id=2,umin_value=327681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv327680 R8=inv(id=0,umax_value=268107775,var_off=(0x0; 0xfffffff)) R9=invP80 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv331776 R2_w=inv(id=0,umax_value=268107775,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=327681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv331776 R8=inv(id=0,umin_value=4096,umax_value=268107775,var_off=(0x0; 0xfffffff)) R9=invP80 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=327681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv331776 R8=inv(id=0,umin_value=4096,umax_value=268107775,var_off=(0x0; 0xfffffff)) R9=invP80 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv335872 R6=inv(id=2,umin_value=331777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv331776 R8_w=inv(id=0,umax_value=268103679,var_off=(0x0; 0xfffffff)) R9_w=invP81 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv335872 R2_w=inv(id=0,umax_value=268103679,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=331777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv335872 R8_w=inv(id=0,umin_value=4096,umax_value=268103679,var_off=(0x0; 0xfffffff)) R9_w=invP81 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=331777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv335872 R8_w=inv(id=0,umin_value=4096,umax_value=268103679,var_off=(0x0; 0xfffffff)) R9_w=invP81 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv339968 R6=inv(id=2,umin_value=335873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv335872 R8_w=inv(id=0,umax_value=268099583,var_off=(0x0; 0xfffffff)) R9_w=invP82 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv339968 R2_w=inv(id=0,umax_value=268099583,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=335873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv339968 R8_w=inv(id=0,umin_value=4096,umax_value=268099583,var_off=(0x0; 0xfffffff)) R9_w=invP82 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=335873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv339968 R8_w=inv(id=0,umin_value=4096,umax_value=268099583,var_off=(0x0; 0xfffffff)) R9_w=invP82 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv344064 R6=inv(id=2,umin_value=339969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv339968 R8_w=inv(id=0,umax_value=268095487,var_off=(0x0; 0xfffffff)) R9_w=invP83 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv344064 R2_w=inv(id=0,umax_value=268095487,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=339969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv344064 R8_w=inv(id=0,umin_value=4096,umax_value=268095487,var_off=(0x0; 0xfffffff)) R9_w=invP83 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=339969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv344064 R8_w=inv(id=0,umin_value=4096,umax_value=268095487,var_off=(0x0; 0xfffffff)) R9_w=invP83 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv348160 R6=inv(id=2,umin_value=344065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv344064 R8=inv(id=0,umax_value=268091391,var_off=(0x0; 0xfffffff)) R9=invP84 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv348160 R2_w=inv(id=0,umax_value=268091391,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=344065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv348160 R8=inv(id=0,umin_value=4096,umax_value=268091391,var_off=(0x0; 0xfffffff)) R9=invP84 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=344065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv348160 R8=inv(id=0,umin_value=4096,umax_value=268091391,var_off=(0x0; 0xfffffff)) R9=invP84 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv352256 R6=inv(id=2,umin_value=348161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv348160 R8_w=inv(id=0,umax_value=268087295,var_off=(0x0; 0xfffffff)) R9_w=invP85 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv352256 R2_w=inv(id=0,umax_value=268087295,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=348161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv352256 R8_w=inv(id=0,umin_value=4096,umax_value=268087295,var_off=(0x0; 0xfffffff)) R9_w=invP85 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=348161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv352256 R8_w=inv(id=0,umin_value=4096,umax_value=268087295,var_off=(0x0; 0xfffffff)) R9_w=invP85 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv356352 R6=inv(id=2,umin_value=352257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv352256 R8_w=inv(id=0,umax_value=268083199,var_off=(0x0; 0xfffffff)) R9_w=invP86 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv356352 R2_w=inv(id=0,umax_value=268083199,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=352257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv356352 R8_w=inv(id=0,umin_value=4096,umax_value=268083199,var_off=(0x0; 0xfffffff)) R9_w=invP86 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=352257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv356352 R8_w=inv(id=0,umin_value=4096,umax_value=268083199,var_off=(0x0; 0xfffffff)) R9_w=invP86 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv360448 R6=inv(id=2,umin_value=356353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv356352 R8_w=inv(id=0,umax_value=268079103,var_off=(0x0; 0xfffffff)) R9_w=invP87 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv360448 R2_w=inv(id=0,umax_value=268079103,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=356353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv360448 R8_w=inv(id=0,umin_value=4096,umax_value=268079103,var_off=(0x0; 0xfffffff)) R9_w=invP87 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=356353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv360448 R8_w=inv(id=0,umin_value=4096,umax_value=268079103,var_off=(0x0; 0xfffffff)) R9_w=invP87 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv364544 R6=inv(id=2,umin_value=360449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv360448 R8=inv(id=0,umax_value=268075007,var_off=(0x0; 0xfffffff)) R9=invP88 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv364544 R2_w=inv(id=0,umax_value=268075007,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=360449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv364544 R8=inv(id=0,umin_value=4096,umax_value=268075007,var_off=(0x0; 0xfffffff)) R9=invP88 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=360449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv364544 R8=inv(id=0,umin_value=4096,umax_value=268075007,var_off=(0x0; 0xfffffff)) R9=invP88 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv368640 R6=inv(id=2,umin_value=364545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv364544 R8_w=inv(id=0,umax_value=268070911,var_off=(0x0; 0xfffffff)) R9_w=invP89 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv368640 R2_w=inv(id=0,umax_value=268070911,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=364545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv368640 R8_w=inv(id=0,umin_value=4096,umax_value=268070911,var_off=(0x0; 0xfffffff)) R9_w=invP89 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=364545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv368640 R8_w=inv(id=0,umin_value=4096,umax_value=268070911,var_off=(0x0; 0xfffffff)) R9_w=invP89 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv372736 R6=inv(id=2,umin_value=368641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv368640 R8_w=inv(id=0,umax_value=268066815,var_off=(0x0; 0xfffffff)) R9_w=invP90 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv372736 R2_w=inv(id=0,umax_value=268066815,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=368641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv372736 R8_w=inv(id=0,umin_value=4096,umax_value=268066815,var_off=(0x0; 0xfffffff)) R9_w=invP90 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=368641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv372736 R8_w=inv(id=0,umin_value=4096,umax_value=268066815,var_off=(0x0; 0xfffffff)) R9_w=invP90 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv376832 R6=inv(id=2,umin_value=372737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv372736 R8_w=inv(id=0,umax_value=268062719,var_off=(0x0; 0xfffffff)) R9_w=invP91 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv376832 R2_w=inv(id=0,umax_value=268062719,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=372737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv376832 R8_w=inv(id=0,umin_value=4096,umax_value=268062719,var_off=(0x0; 0xfffffff)) R9_w=invP91 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=372737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv376832 R8_w=inv(id=0,umin_value=4096,umax_value=268062719,var_off=(0x0; 0xfffffff)) R9_w=invP91 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv380928 R6=inv(id=2,umin_value=376833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv376832 R8=inv(id=0,umax_value=268058623,var_off=(0x0; 0xfffffff)) R9=invP92 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv380928 R2_w=inv(id=0,umax_value=268058623,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=376833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv380928 R8=inv(id=0,umin_value=4096,umax_value=268058623,var_off=(0x0; 0xfffffff)) R9=invP92 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=376833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv380928 R8=inv(id=0,umin_value=4096,umax_value=268058623,var_off=(0x0; 0xfffffff)) R9=invP92 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv385024 R6=inv(id=2,umin_value=380929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv380928 R8_w=inv(id=0,umax_value=268054527,var_off=(0x0; 0xfffffff)) R9_w=invP93 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv385024 R2_w=inv(id=0,umax_value=268054527,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=380929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv385024 R8_w=inv(id=0,umin_value=4096,umax_value=268054527,var_off=(0x0; 0xfffffff)) R9_w=invP93 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=380929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv385024 R8_w=inv(id=0,umin_value=4096,umax_value=268054527,var_off=(0x0; 0xfffffff)) R9_w=invP93 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv389120 R6=inv(id=2,umin_value=385025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv385024 R8_w=inv(id=0,umax_value=268050431,var_off=(0x0; 0xfffffff)) R9_w=invP94 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv389120 R2_w=inv(id=0,umax_value=268050431,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=385025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv389120 R8_w=inv(id=0,umin_value=4096,umax_value=268050431,var_off=(0x0; 0xfffffff)) R9_w=invP94 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=385025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv389120 R8_w=inv(id=0,umin_value=4096,umax_value=268050431,var_off=(0x0; 0xfffffff)) R9_w=invP94 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv393216 R6=inv(id=2,umin_value=389121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv389120 R8_w=inv(id=0,umax_value=268046335,var_off=(0x0; 0xfffffff)) R9_w=invP95 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv393216 R2_w=inv(id=0,umax_value=268046335,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=389121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv393216 R8_w=inv(id=0,umin_value=4096,umax_value=268046335,var_off=(0x0; 0xfffffff)) R9_w=invP95 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=389121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv393216 R8_w=inv(id=0,umin_value=4096,umax_value=268046335,var_off=(0x0; 0xfffffff)) R9_w=invP95 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv397312 R6=inv(id=2,umin_value=393217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv393216 R8=inv(id=0,umax_value=268042239,var_off=(0x0; 0xfffffff)) R9=invP96 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv397312 R2_w=inv(id=0,umax_value=268042239,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=393217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv397312 R8=inv(id=0,umin_value=4096,umax_value=268042239,var_off=(0x0; 0xfffffff)) R9=invP96 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=393217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv397312 R8=inv(id=0,umin_value=4096,umax_value=268042239,var_off=(0x0; 0xfffffff)) R9=invP96 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv401408 R6=inv(id=2,umin_value=397313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv397312 R8_w=inv(id=0,umax_value=268038143,var_off=(0x0; 0xfffffff)) R9_w=invP97 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv401408 R2_w=inv(id=0,umax_value=268038143,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=397313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv401408 R8_w=inv(id=0,umin_value=4096,umax_value=268038143,var_off=(0x0; 0xfffffff)) R9_w=invP97 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=397313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv401408 R8_w=inv(id=0,umin_value=4096,umax_value=268038143,var_off=(0x0; 0xfffffff)) R9_w=invP97 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv405504 R6=inv(id=2,umin_value=401409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv401408 R8_w=inv(id=0,umax_value=268034047,var_off=(0x0; 0xfffffff)) R9_w=invP98 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv405504 R2_w=inv(id=0,umax_value=268034047,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=401409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv405504 R8_w=inv(id=0,umin_value=4096,umax_value=268034047,var_off=(0x0; 0xfffffff)) R9_w=invP98 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=401409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv405504 R8_w=inv(id=0,umin_value=4096,umax_value=268034047,var_off=(0x0; 0xfffffff)) R9_w=invP98 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv409600 R6=inv(id=2,umin_value=405505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv405504 R8_w=inv(id=0,umax_value=268029951,var_off=(0x0; 0xfffffff)) R9_w=invP99 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv409600 R2_w=inv(id=0,umax_value=268029951,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=405505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv409600 R8_w=inv(id=0,umin_value=4096,umax_value=268029951,var_off=(0x0; 0xfffffff)) R9_w=invP99 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=405505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv409600 R8_w=inv(id=0,umin_value=4096,umax_value=268029951,var_off=(0x0; 0xfffffff)) R9_w=invP99 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv413696 R6=inv(id=2,umin_value=409601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv409600 R8=inv(id=0,umax_value=268025855,var_off=(0x0; 0xfffffff)) R9=invP100 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv413696 R2_w=inv(id=0,umax_value=268025855,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=409601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv413696 R8=inv(id=0,umin_value=4096,umax_value=268025855,var_off=(0x0; 0xfffffff)) R9=invP100 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=409601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv413696 R8=inv(id=0,umin_value=4096,umax_value=268025855,var_off=(0x0; 0xfffffff)) R9=invP100 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv417792 R6=inv(id=2,umin_value=413697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv413696 R8_w=inv(id=0,umax_value=268021759,var_off=(0x0; 0xfffffff)) R9_w=invP101 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv417792 R2_w=inv(id=0,umax_value=268021759,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=413697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv417792 R8_w=inv(id=0,umin_value=4096,umax_value=268021759,var_off=(0x0; 0xfffffff)) R9_w=invP101 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=413697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv417792 R8_w=inv(id=0,umin_value=4096,umax_value=268021759,var_off=(0x0; 0xfffffff)) R9_w=invP101 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv421888 R6=inv(id=2,umin_value=417793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv417792 R8_w=inv(id=0,umax_value=268017663,var_off=(0x0; 0xfffffff)) R9_w=invP102 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv421888 R2_w=inv(id=0,umax_value=268017663,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=417793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv421888 R8_w=inv(id=0,umin_value=4096,umax_value=268017663,var_off=(0x0; 0xfffffff)) R9_w=invP102 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=417793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv421888 R8_w=inv(id=0,umin_value=4096,umax_value=268017663,var_off=(0x0; 0xfffffff)) R9_w=invP102 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv425984 R6=inv(id=2,umin_value=421889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv421888 R8_w=inv(id=0,umax_value=268013567,var_off=(0x0; 0xfffffff)) R9_w=invP103 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv425984 R2_w=inv(id=0,umax_value=268013567,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=421889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv425984 R8_w=inv(id=0,umin_value=4096,umax_value=268013567,var_off=(0x0; 0xfffffff)) R9_w=invP103 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=421889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv425984 R8_w=inv(id=0,umin_value=4096,umax_value=268013567,var_off=(0x0; 0xfffffff)) R9_w=invP103 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv430080 R6=inv(id=2,umin_value=425985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv425984 R8=inv(id=0,umax_value=268009471,var_off=(0x0; 0xfffffff)) R9=invP104 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv430080 R2_w=inv(id=0,umax_value=268009471,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=425985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv430080 R8=inv(id=0,umin_value=4096,umax_value=268009471,var_off=(0x0; 0xfffffff)) R9=invP104 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=425985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv430080 R8=inv(id=0,umin_value=4096,umax_value=268009471,var_off=(0x0; 0xfffffff)) R9=invP104 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv434176 R6=inv(id=2,umin_value=430081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv430080 R8_w=inv(id=0,umax_value=268005375,var_off=(0x0; 0xfffffff)) R9_w=invP105 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv434176 R2_w=inv(id=0,umax_value=268005375,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=430081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv434176 R8_w=inv(id=0,umin_value=4096,umax_value=268005375,var_off=(0x0; 0xfffffff)) R9_w=invP105 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=430081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv434176 R8_w=inv(id=0,umin_value=4096,umax_value=268005375,var_off=(0x0; 0xfffffff)) R9_w=invP105 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv438272 R6=inv(id=2,umin_value=434177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv434176 R8_w=inv(id=0,umax_value=268001279,var_off=(0x0; 0xfffffff)) R9_w=invP106 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv438272 R2_w=inv(id=0,umax_value=268001279,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=434177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv438272 R8_w=inv(id=0,umin_value=4096,umax_value=268001279,var_off=(0x0; 0xfffffff)) R9_w=invP106 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=434177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv438272 R8_w=inv(id=0,umin_value=4096,umax_value=268001279,var_off=(0x0; 0xfffffff)) R9_w=invP106 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv442368 R6=inv(id=2,umin_value=438273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv438272 R8_w=inv(id=0,umax_value=267997183,var_off=(0x0; 0xfffffff)) R9_w=invP107 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv442368 R2_w=inv(id=0,umax_value=267997183,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=438273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv442368 R8_w=inv(id=0,umin_value=4096,umax_value=267997183,var_off=(0x0; 0xfffffff)) R9_w=invP107 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=438273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv442368 R8_w=inv(id=0,umin_value=4096,umax_value=267997183,var_off=(0x0; 0xfffffff)) R9_w=invP107 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv446464 R6=inv(id=2,umin_value=442369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv442368 R8=inv(id=0,umax_value=267993087,var_off=(0x0; 0xfffffff)) R9=invP108 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv446464 R2_w=inv(id=0,umax_value=267993087,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=442369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv446464 R8=inv(id=0,umin_value=4096,umax_value=267993087,var_off=(0x0; 0xfffffff)) R9=invP108 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=442369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv446464 R8=inv(id=0,umin_value=4096,umax_value=267993087,var_off=(0x0; 0xfffffff)) R9=invP108 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv450560 R6=inv(id=2,umin_value=446465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv446464 R8_w=inv(id=0,umax_value=267988991,var_off=(0x0; 0xfffffff)) R9_w=invP109 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv450560 R2_w=inv(id=0,umax_value=267988991,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=446465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv450560 R8_w=inv(id=0,umin_value=4096,umax_value=267988991,var_off=(0x0; 0xfffffff)) R9_w=invP109 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=446465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv450560 R8_w=inv(id=0,umin_value=4096,umax_value=267988991,var_off=(0x0; 0xfffffff)) R9_w=invP109 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv454656 R6=inv(id=2,umin_value=450561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv450560 R8_w=inv(id=0,umax_value=267984895,var_off=(0x0; 0xfffffff)) R9_w=invP110 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv454656 R2_w=inv(id=0,umax_value=267984895,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=450561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv454656 R8_w=inv(id=0,umin_value=4096,umax_value=267984895,var_off=(0x0; 0xfffffff)) R9_w=invP110 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=450561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv454656 R8_w=inv(id=0,umin_value=4096,umax_value=267984895,var_off=(0x0; 0xfffffff)) R9_w=invP110 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv458752 R6=inv(id=2,umin_value=454657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv454656 R8_w=inv(id=0,umax_value=267980799,var_off=(0x0; 0xfffffff)) R9_w=invP111 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv458752 R2_w=inv(id=0,umax_value=267980799,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=454657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv458752 R8_w=inv(id=0,umin_value=4096,umax_value=267980799,var_off=(0x0; 0xfffffff)) R9_w=invP111 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=454657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv458752 R8_w=inv(id=0,umin_value=4096,umax_value=267980799,var_off=(0x0; 0xfffffff)) R9_w=invP111 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv462848 R6=inv(id=2,umin_value=458753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv458752 R8=inv(id=0,umax_value=267976703,var_off=(0x0; 0xfffffff)) R9=invP112 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv462848 R2_w=inv(id=0,umax_value=267976703,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=458753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv462848 R8=inv(id=0,umin_value=4096,umax_value=267976703,var_off=(0x0; 0xfffffff)) R9=invP112 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=458753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv462848 R8=inv(id=0,umin_value=4096,umax_value=267976703,var_off=(0x0; 0xfffffff)) R9=invP112 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv466944 R6=inv(id=2,umin_value=462849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv462848 R8_w=inv(id=0,umax_value=267972607,var_off=(0x0; 0xfffffff)) R9_w=invP113 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv466944 R2_w=inv(id=0,umax_value=267972607,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=462849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv466944 R8_w=inv(id=0,umin_value=4096,umax_value=267972607,var_off=(0x0; 0xfffffff)) R9_w=invP113 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=462849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv466944 R8_w=inv(id=0,umin_value=4096,umax_value=267972607,var_off=(0x0; 0xfffffff)) R9_w=invP113 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv471040 R6=inv(id=2,umin_value=466945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv466944 R8_w=inv(id=0,umax_value=267968511,var_off=(0x0; 0xfffffff)) R9_w=invP114 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv471040 R2_w=inv(id=0,umax_value=267968511,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=466945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv471040 R8_w=inv(id=0,umin_value=4096,umax_value=267968511,var_off=(0x0; 0xfffffff)) R9_w=invP114 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=466945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv471040 R8_w=inv(id=0,umin_value=4096,umax_value=267968511,var_off=(0x0; 0xfffffff)) R9_w=invP114 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv475136 R6=inv(id=2,umin_value=471041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv471040 R8_w=inv(id=0,umax_value=267964415,var_off=(0x0; 0xfffffff)) R9_w=invP115 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv475136 R2_w=inv(id=0,umax_value=267964415,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=471041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv475136 R8_w=inv(id=0,umin_value=4096,umax_value=267964415,var_off=(0x0; 0xfffffff)) R9_w=invP115 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=471041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv475136 R8_w=inv(id=0,umin_value=4096,umax_value=267964415,var_off=(0x0; 0xfffffff)) R9_w=invP115 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv479232 R6=inv(id=2,umin_value=475137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv475136 R8=inv(id=0,umax_value=267960319,var_off=(0x0; 0xfffffff)) R9=invP116 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv479232 R2_w=inv(id=0,umax_value=267960319,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=475137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv479232 R8=inv(id=0,umin_value=4096,umax_value=267960319,var_off=(0x0; 0xfffffff)) R9=invP116 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=475137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv479232 R8=inv(id=0,umin_value=4096,umax_value=267960319,var_off=(0x0; 0xfffffff)) R9=invP116 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv483328 R6=inv(id=2,umin_value=479233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv479232 R8_w=inv(id=0,umax_value=267956223,var_off=(0x0; 0xfffffff)) R9_w=invP117 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv483328 R2_w=inv(id=0,umax_value=267956223,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=479233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv483328 R8_w=inv(id=0,umin_value=4096,umax_value=267956223,var_off=(0x0; 0xfffffff)) R9_w=invP117 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=479233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv483328 R8_w=inv(id=0,umin_value=4096,umax_value=267956223,var_off=(0x0; 0xfffffff)) R9_w=invP117 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv487424 R6=inv(id=2,umin_value=483329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv483328 R8_w=inv(id=0,umax_value=267952127,var_off=(0x0; 0xfffffff)) R9_w=invP118 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv487424 R2_w=inv(id=0,umax_value=267952127,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=483329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv487424 R8_w=inv(id=0,umin_value=4096,umax_value=267952127,var_off=(0x0; 0xfffffff)) R9_w=invP118 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=483329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv487424 R8_w=inv(id=0,umin_value=4096,umax_value=267952127,var_off=(0x0; 0xfffffff)) R9_w=invP118 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv491520 R6=inv(id=2,umin_value=487425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv487424 R8_w=inv(id=0,umax_value=267948031,var_off=(0x0; 0xfffffff)) R9_w=invP119 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv491520 R2_w=inv(id=0,umax_value=267948031,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=487425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv491520 R8_w=inv(id=0,umin_value=4096,umax_value=267948031,var_off=(0x0; 0xfffffff)) R9_w=invP119 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=487425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv491520 R8_w=inv(id=0,umin_value=4096,umax_value=267948031,var_off=(0x0; 0xfffffff)) R9_w=invP119 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv495616 R6=inv(id=2,umin_value=491521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv491520 R8=inv(id=0,umax_value=267943935,var_off=(0x0; 0xfffffff)) R9=invP120 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv495616 R2_w=inv(id=0,umax_value=267943935,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=491521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv495616 R8=inv(id=0,umin_value=4096,umax_value=267943935,var_off=(0x0; 0xfffffff)) R9=invP120 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=491521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv495616 R8=inv(id=0,umin_value=4096,umax_value=267943935,var_off=(0x0; 0xfffffff)) R9=invP120 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv499712 R6=inv(id=2,umin_value=495617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv495616 R8_w=inv(id=0,umax_value=267939839,var_off=(0x0; 0xfffffff)) R9_w=invP121 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv499712 R2_w=inv(id=0,umax_value=267939839,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=495617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv499712 R8_w=inv(id=0,umin_value=4096,umax_value=267939839,var_off=(0x0; 0xfffffff)) R9_w=invP121 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=495617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv499712 R8_w=inv(id=0,umin_value=4096,umax_value=267939839,var_off=(0x0; 0xfffffff)) R9_w=invP121 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv503808 R6=inv(id=2,umin_value=499713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv499712 R8_w=inv(id=0,umax_value=267935743,var_off=(0x0; 0xfffffff)) R9_w=invP122 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv503808 R2_w=inv(id=0,umax_value=267935743,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=499713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv503808 R8_w=inv(id=0,umin_value=4096,umax_value=267935743,var_off=(0x0; 0xfffffff)) R9_w=invP122 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=499713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv503808 R8_w=inv(id=0,umin_value=4096,umax_value=267935743,var_off=(0x0; 0xfffffff)) R9_w=invP122 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv507904 R6=inv(id=2,umin_value=503809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv503808 R8_w=inv(id=0,umax_value=267931647,var_off=(0x0; 0xfffffff)) R9_w=invP123 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv507904 R2_w=inv(id=0,umax_value=267931647,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=503809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv507904 R8_w=inv(id=0,umin_value=4096,umax_value=267931647,var_off=(0x0; 0xfffffff)) R9_w=invP123 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=503809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv507904 R8_w=inv(id=0,umin_value=4096,umax_value=267931647,var_off=(0x0; 0xfffffff)) R9_w=invP123 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv512000 R6=inv(id=2,umin_value=507905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv507904 R8=inv(id=0,umax_value=267927551,var_off=(0x0; 0xfffffff)) R9=invP124 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv512000 R2_w=inv(id=0,umax_value=267927551,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=507905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv512000 R8=inv(id=0,umin_value=4096,umax_value=267927551,var_off=(0x0; 0xfffffff)) R9=invP124 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=507905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv512000 R8=inv(id=0,umin_value=4096,umax_value=267927551,var_off=(0x0; 0xfffffff)) R9=invP124 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv516096 R6=inv(id=2,umin_value=512001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv512000 R8_w=inv(id=0,umax_value=267923455,var_off=(0x0; 0xfffffff)) R9_w=invP125 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv516096 R2_w=inv(id=0,umax_value=267923455,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=512001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv516096 R8_w=inv(id=0,umin_value=4096,umax_value=267923455,var_off=(0x0; 0xfffffff)) R9_w=invP125 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=512001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv516096 R8_w=inv(id=0,umin_value=4096,umax_value=267923455,var_off=(0x0; 0xfffffff)) R9_w=invP125 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv520192 R6=inv(id=2,umin_value=516097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv516096 R8_w=inv(id=0,umax_value=267919359,var_off=(0x0; 0xfffffff)) R9_w=invP126 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv520192 R2_w=inv(id=0,umax_value=267919359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=516097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv520192 R8_w=inv(id=0,umin_value=4096,umax_value=267919359,var_off=(0x0; 0xfffffff)) R9_w=invP126 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=516097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv520192 R8_w=inv(id=0,umin_value=4096,umax_value=267919359,var_off=(0x0; 0xfffffff)) R9_w=invP126 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv524288 R6=inv(id=2,umin_value=520193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv520192 R8_w=inv(id=0,umax_value=267915263,var_off=(0x0; 0xfffffff)) R9_w=invP127 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv524288 R2_w=inv(id=0,umax_value=267915263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=520193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv524288 R8_w=inv(id=0,umin_value=4096,umax_value=267915263,var_off=(0x0; 0xfffffff)) R9_w=invP127 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=520193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv524288 R8_w=inv(id=0,umin_value=4096,umax_value=267915263,var_off=(0x0; 0xfffffff)) R9_w=invP127 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv528384 R6=inv(id=2,umin_value=524289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv524288 R8=inv(id=0,umax_value=267911167,var_off=(0x0; 0xfffffff)) R9=invP128 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv528384 R2_w=inv(id=0,umax_value=267911167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=524289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv528384 R8=inv(id=0,umin_value=4096,umax_value=267911167,var_off=(0x0; 0xfffffff)) R9=invP128 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=524289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv528384 R8=inv(id=0,umin_value=4096,umax_value=267911167,var_off=(0x0; 0xfffffff)) R9=invP128 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv532480 R6=inv(id=2,umin_value=528385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv528384 R8_w=inv(id=0,umax_value=267907071,var_off=(0x0; 0xfffffff)) R9_w=invP129 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv532480 R2_w=inv(id=0,umax_value=267907071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=528385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv532480 R8_w=inv(id=0,umin_value=4096,umax_value=267907071,var_off=(0x0; 0xfffffff)) R9_w=invP129 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=528385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv532480 R8_w=inv(id=0,umin_value=4096,umax_value=267907071,var_off=(0x0; 0xfffffff)) R9_w=invP129 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv536576 R6=inv(id=2,umin_value=532481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv532480 R8_w=inv(id=0,umax_value=267902975,var_off=(0x0; 0xfffffff)) R9_w=invP130 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv536576 R2_w=inv(id=0,umax_value=267902975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=532481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv536576 R8_w=inv(id=0,umin_value=4096,umax_value=267902975,var_off=(0x0; 0xfffffff)) R9_w=invP130 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=532481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv536576 R8_w=inv(id=0,umin_value=4096,umax_value=267902975,var_off=(0x0; 0xfffffff)) R9_w=invP130 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv540672 R6=inv(id=2,umin_value=536577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv536576 R8_w=inv(id=0,umax_value=267898879,var_off=(0x0; 0xfffffff)) R9_w=invP131 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv540672 R2_w=inv(id=0,umax_value=267898879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=536577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv540672 R8_w=inv(id=0,umin_value=4096,umax_value=267898879,var_off=(0x0; 0xfffffff)) R9_w=invP131 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=536577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv540672 R8_w=inv(id=0,umin_value=4096,umax_value=267898879,var_off=(0x0; 0xfffffff)) R9_w=invP131 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv544768 R6=inv(id=2,umin_value=540673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv540672 R8=inv(id=0,umax_value=267894783,var_off=(0x0; 0xfffffff)) R9=invP132 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv544768 R2_w=inv(id=0,umax_value=267894783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=540673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv544768 R8=inv(id=0,umin_value=4096,umax_value=267894783,var_off=(0x0; 0xfffffff)) R9=invP132 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=540673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv544768 R8=inv(id=0,umin_value=4096,umax_value=267894783,var_off=(0x0; 0xfffffff)) R9=invP132 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv548864 R6=inv(id=2,umin_value=544769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv544768 R8_w=inv(id=0,umax_value=267890687,var_off=(0x0; 0xfffffff)) R9_w=invP133 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv548864 R2_w=inv(id=0,umax_value=267890687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=544769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv548864 R8_w=inv(id=0,umin_value=4096,umax_value=267890687,var_off=(0x0; 0xfffffff)) R9_w=invP133 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=544769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv548864 R8_w=inv(id=0,umin_value=4096,umax_value=267890687,var_off=(0x0; 0xfffffff)) R9_w=invP133 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv552960 R6=inv(id=2,umin_value=548865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv548864 R8_w=inv(id=0,umax_value=267886591,var_off=(0x0; 0xfffffff)) R9_w=invP134 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv552960 R2_w=inv(id=0,umax_value=267886591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=548865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv552960 R8_w=inv(id=0,umin_value=4096,umax_value=267886591,var_off=(0x0; 0xfffffff)) R9_w=invP134 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=548865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv552960 R8_w=inv(id=0,umin_value=4096,umax_value=267886591,var_off=(0x0; 0xfffffff)) R9_w=invP134 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv557056 R6=inv(id=2,umin_value=552961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv552960 R8_w=inv(id=0,umax_value=267882495,var_off=(0x0; 0xfffffff)) R9_w=invP135 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv557056 R2_w=inv(id=0,umax_value=267882495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=552961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv557056 R8_w=inv(id=0,umin_value=4096,umax_value=267882495,var_off=(0x0; 0xfffffff)) R9_w=invP135 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=552961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv557056 R8_w=inv(id=0,umin_value=4096,umax_value=267882495,var_off=(0x0; 0xfffffff)) R9_w=invP135 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv561152 R6=inv(id=2,umin_value=557057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv557056 R8=inv(id=0,umax_value=267878399,var_off=(0x0; 0xfffffff)) R9=invP136 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv561152 R2_w=inv(id=0,umax_value=267878399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=557057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv561152 R8=inv(id=0,umin_value=4096,umax_value=267878399,var_off=(0x0; 0xfffffff)) R9=invP136 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=557057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv561152 R8=inv(id=0,umin_value=4096,umax_value=267878399,var_off=(0x0; 0xfffffff)) R9=invP136 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv565248 R6=inv(id=2,umin_value=561153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv561152 R8_w=inv(id=0,umax_value=267874303,var_off=(0x0; 0xfffffff)) R9_w=invP137 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv565248 R2_w=inv(id=0,umax_value=267874303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=561153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv565248 R8_w=inv(id=0,umin_value=4096,umax_value=267874303,var_off=(0x0; 0xfffffff)) R9_w=invP137 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=561153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv565248 R8_w=inv(id=0,umin_value=4096,umax_value=267874303,var_off=(0x0; 0xfffffff)) R9_w=invP137 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv569344 R6=inv(id=2,umin_value=565249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv565248 R8_w=inv(id=0,umax_value=267870207,var_off=(0x0; 0xfffffff)) R9_w=invP138 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv569344 R2_w=inv(id=0,umax_value=267870207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=565249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv569344 R8_w=inv(id=0,umin_value=4096,umax_value=267870207,var_off=(0x0; 0xfffffff)) R9_w=invP138 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=565249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv569344 R8_w=inv(id=0,umin_value=4096,umax_value=267870207,var_off=(0x0; 0xfffffff)) R9_w=invP138 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv573440 R6=inv(id=2,umin_value=569345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv569344 R8_w=inv(id=0,umax_value=267866111,var_off=(0x0; 0xfffffff)) R9_w=invP139 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv573440 R2_w=inv(id=0,umax_value=267866111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=569345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv573440 R8_w=inv(id=0,umin_value=4096,umax_value=267866111,var_off=(0x0; 0xfffffff)) R9_w=invP139 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=569345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv573440 R8_w=inv(id=0,umin_value=4096,umax_value=267866111,var_off=(0x0; 0xfffffff)) R9_w=invP139 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv577536 R6=inv(id=2,umin_value=573441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv573440 R8=inv(id=0,umax_value=267862015,var_off=(0x0; 0xfffffff)) R9=invP140 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv577536 R2_w=inv(id=0,umax_value=267862015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=573441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv577536 R8=inv(id=0,umin_value=4096,umax_value=267862015,var_off=(0x0; 0xfffffff)) R9=invP140 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=573441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv577536 R8=inv(id=0,umin_value=4096,umax_value=267862015,var_off=(0x0; 0xfffffff)) R9=invP140 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv581632 R6=inv(id=2,umin_value=577537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv577536 R8_w=inv(id=0,umax_value=267857919,var_off=(0x0; 0xfffffff)) R9_w=invP141 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv581632 R2_w=inv(id=0,umax_value=267857919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=577537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv581632 R8_w=inv(id=0,umin_value=4096,umax_value=267857919,var_off=(0x0; 0xfffffff)) R9_w=invP141 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=577537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv581632 R8_w=inv(id=0,umin_value=4096,umax_value=267857919,var_off=(0x0; 0xfffffff)) R9_w=invP141 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv585728 R6=inv(id=2,umin_value=581633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv581632 R8_w=inv(id=0,umax_value=267853823,var_off=(0x0; 0xfffffff)) R9_w=invP142 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv585728 R2_w=inv(id=0,umax_value=267853823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=581633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv585728 R8_w=inv(id=0,umin_value=4096,umax_value=267853823,var_off=(0x0; 0xfffffff)) R9_w=invP142 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=581633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv585728 R8_w=inv(id=0,umin_value=4096,umax_value=267853823,var_off=(0x0; 0xfffffff)) R9_w=invP142 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv589824 R6=inv(id=2,umin_value=585729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv585728 R8_w=inv(id=0,umax_value=267849727,var_off=(0x0; 0xfffffff)) R9_w=invP143 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv589824 R2_w=inv(id=0,umax_value=267849727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=585729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv589824 R8_w=inv(id=0,umin_value=4096,umax_value=267849727,var_off=(0x0; 0xfffffff)) R9_w=invP143 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=585729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv589824 R8_w=inv(id=0,umin_value=4096,umax_value=267849727,var_off=(0x0; 0xfffffff)) R9_w=invP143 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv593920 R6=inv(id=2,umin_value=589825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv589824 R8=inv(id=0,umax_value=267845631,var_off=(0x0; 0xfffffff)) R9=invP144 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv593920 R2_w=inv(id=0,umax_value=267845631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=589825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv593920 R8=inv(id=0,umin_value=4096,umax_value=267845631,var_off=(0x0; 0xfffffff)) R9=invP144 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=589825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv593920 R8=inv(id=0,umin_value=4096,umax_value=267845631,var_off=(0x0; 0xfffffff)) R9=invP144 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv598016 R6=inv(id=2,umin_value=593921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv593920 R8_w=inv(id=0,umax_value=267841535,var_off=(0x0; 0xfffffff)) R9_w=invP145 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv598016 R2_w=inv(id=0,umax_value=267841535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=593921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv598016 R8_w=inv(id=0,umin_value=4096,umax_value=267841535,var_off=(0x0; 0xfffffff)) R9_w=invP145 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=593921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv598016 R8_w=inv(id=0,umin_value=4096,umax_value=267841535,var_off=(0x0; 0xfffffff)) R9_w=invP145 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv602112 R6=inv(id=2,umin_value=598017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv598016 R8_w=inv(id=0,umax_value=267837439,var_off=(0x0; 0xfffffff)) R9_w=invP146 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv602112 R2_w=inv(id=0,umax_value=267837439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=598017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv602112 R8_w=inv(id=0,umin_value=4096,umax_value=267837439,var_off=(0x0; 0xfffffff)) R9_w=invP146 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=598017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv602112 R8_w=inv(id=0,umin_value=4096,umax_value=267837439,var_off=(0x0; 0xfffffff)) R9_w=invP146 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv606208 R6=inv(id=2,umin_value=602113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv602112 R8_w=inv(id=0,umax_value=267833343,var_off=(0x0; 0xfffffff)) R9_w=invP147 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv606208 R2_w=inv(id=0,umax_value=267833343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=602113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv606208 R8_w=inv(id=0,umin_value=4096,umax_value=267833343,var_off=(0x0; 0xfffffff)) R9_w=invP147 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=602113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv606208 R8_w=inv(id=0,umin_value=4096,umax_value=267833343,var_off=(0x0; 0xfffffff)) R9_w=invP147 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv610304 R6=inv(id=2,umin_value=606209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv606208 R8=inv(id=0,umax_value=267829247,var_off=(0x0; 0xfffffff)) R9=invP148 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv610304 R2_w=inv(id=0,umax_value=267829247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=606209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv610304 R8=inv(id=0,umin_value=4096,umax_value=267829247,var_off=(0x0; 0xfffffff)) R9=invP148 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=606209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv610304 R8=inv(id=0,umin_value=4096,umax_value=267829247,var_off=(0x0; 0xfffffff)) R9=invP148 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv614400 R6=inv(id=2,umin_value=610305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv610304 R8_w=inv(id=0,umax_value=267825151,var_off=(0x0; 0xfffffff)) R9_w=invP149 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv614400 R2_w=inv(id=0,umax_value=267825151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=610305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv614400 R8_w=inv(id=0,umin_value=4096,umax_value=267825151,var_off=(0x0; 0xfffffff)) R9_w=invP149 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=610305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv614400 R8_w=inv(id=0,umin_value=4096,umax_value=267825151,var_off=(0x0; 0xfffffff)) R9_w=invP149 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv618496 R6=inv(id=2,umin_value=614401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv614400 R8_w=inv(id=0,umax_value=267821055,var_off=(0x0; 0xfffffff)) R9_w=invP150 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv618496 R2_w=inv(id=0,umax_value=267821055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=614401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv618496 R8_w=inv(id=0,umin_value=4096,umax_value=267821055,var_off=(0x0; 0xfffffff)) R9_w=invP150 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=614401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv618496 R8_w=inv(id=0,umin_value=4096,umax_value=267821055,var_off=(0x0; 0xfffffff)) R9_w=invP150 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv622592 R6=inv(id=2,umin_value=618497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv618496 R8_w=inv(id=0,umax_value=267816959,var_off=(0x0; 0xfffffff)) R9_w=invP151 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv622592 R2_w=inv(id=0,umax_value=267816959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=618497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv622592 R8_w=inv(id=0,umin_value=4096,umax_value=267816959,var_off=(0x0; 0xfffffff)) R9_w=invP151 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=618497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv622592 R8_w=inv(id=0,umin_value=4096,umax_value=267816959,var_off=(0x0; 0xfffffff)) R9_w=invP151 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv626688 R6=inv(id=2,umin_value=622593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv622592 R8=inv(id=0,umax_value=267812863,var_off=(0x0; 0xfffffff)) R9=invP152 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv626688 R2_w=inv(id=0,umax_value=267812863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=622593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv626688 R8=inv(id=0,umin_value=4096,umax_value=267812863,var_off=(0x0; 0xfffffff)) R9=invP152 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=622593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv626688 R8=inv(id=0,umin_value=4096,umax_value=267812863,var_off=(0x0; 0xfffffff)) R9=invP152 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv630784 R6=inv(id=2,umin_value=626689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv626688 R8_w=inv(id=0,umax_value=267808767,var_off=(0x0; 0xfffffff)) R9_w=invP153 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv630784 R2_w=inv(id=0,umax_value=267808767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=626689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv630784 R8_w=inv(id=0,umin_value=4096,umax_value=267808767,var_off=(0x0; 0xfffffff)) R9_w=invP153 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=626689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv630784 R8_w=inv(id=0,umin_value=4096,umax_value=267808767,var_off=(0x0; 0xfffffff)) R9_w=invP153 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv634880 R6=inv(id=2,umin_value=630785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv630784 R8_w=inv(id=0,umax_value=267804671,var_off=(0x0; 0xfffffff)) R9_w=invP154 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv634880 R2_w=inv(id=0,umax_value=267804671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=630785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv634880 R8_w=inv(id=0,umin_value=4096,umax_value=267804671,var_off=(0x0; 0xfffffff)) R9_w=invP154 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=630785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv634880 R8_w=inv(id=0,umin_value=4096,umax_value=267804671,var_off=(0x0; 0xfffffff)) R9_w=invP154 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv638976 R6=inv(id=2,umin_value=634881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv634880 R8_w=inv(id=0,umax_value=267800575,var_off=(0x0; 0xfffffff)) R9_w=invP155 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv638976 R2_w=inv(id=0,umax_value=267800575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=634881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv638976 R8_w=inv(id=0,umin_value=4096,umax_value=267800575,var_off=(0x0; 0xfffffff)) R9_w=invP155 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=634881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv638976 R8_w=inv(id=0,umin_value=4096,umax_value=267800575,var_off=(0x0; 0xfffffff)) R9_w=invP155 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv643072 R6=inv(id=2,umin_value=638977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv638976 R8=inv(id=0,umax_value=267796479,var_off=(0x0; 0xfffffff)) R9=invP156 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv643072 R2_w=inv(id=0,umax_value=267796479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=638977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv643072 R8=inv(id=0,umin_value=4096,umax_value=267796479,var_off=(0x0; 0xfffffff)) R9=invP156 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=638977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv643072 R8=inv(id=0,umin_value=4096,umax_value=267796479,var_off=(0x0; 0xfffffff)) R9=invP156 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv647168 R6=inv(id=2,umin_value=643073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv643072 R8_w=inv(id=0,umax_value=267792383,var_off=(0x0; 0xfffffff)) R9_w=invP157 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv647168 R2_w=inv(id=0,umax_value=267792383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=643073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv647168 R8_w=inv(id=0,umin_value=4096,umax_value=267792383,var_off=(0x0; 0xfffffff)) R9_w=invP157 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=643073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv647168 R8_w=inv(id=0,umin_value=4096,umax_value=267792383,var_off=(0x0; 0xfffffff)) R9_w=invP157 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv651264 R6=inv(id=2,umin_value=647169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv647168 R8_w=inv(id=0,umax_value=267788287,var_off=(0x0; 0xfffffff)) R9_w=invP158 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv651264 R2_w=inv(id=0,umax_value=267788287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=647169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv651264 R8_w=inv(id=0,umin_value=4096,umax_value=267788287,var_off=(0x0; 0xfffffff)) R9_w=invP158 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=647169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv651264 R8_w=inv(id=0,umin_value=4096,umax_value=267788287,var_off=(0x0; 0xfffffff)) R9_w=invP158 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv655360 R6=inv(id=2,umin_value=651265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv651264 R8_w=inv(id=0,umax_value=267784191,var_off=(0x0; 0xfffffff)) R9_w=invP159 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv655360 R2_w=inv(id=0,umax_value=267784191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=651265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv655360 R8_w=inv(id=0,umin_value=4096,umax_value=267784191,var_off=(0x0; 0xfffffff)) R9_w=invP159 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=651265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv655360 R8_w=inv(id=0,umin_value=4096,umax_value=267784191,var_off=(0x0; 0xfffffff)) R9_w=invP159 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv659456 R6=inv(id=2,umin_value=655361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv655360 R8=inv(id=0,umax_value=267780095,var_off=(0x0; 0xfffffff)) R9=invP160 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv659456 R2_w=inv(id=0,umax_value=267780095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=655361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv659456 R8=inv(id=0,umin_value=4096,umax_value=267780095,var_off=(0x0; 0xfffffff)) R9=invP160 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=655361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv659456 R8=inv(id=0,umin_value=4096,umax_value=267780095,var_off=(0x0; 0xfffffff)) R9=invP160 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv663552 R6=inv(id=2,umin_value=659457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv659456 R8_w=inv(id=0,umax_value=267775999,var_off=(0x0; 0xfffffff)) R9_w=invP161 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv663552 R2_w=inv(id=0,umax_value=267775999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=659457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv663552 R8_w=inv(id=0,umin_value=4096,umax_value=267775999,var_off=(0x0; 0xfffffff)) R9_w=invP161 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=659457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv663552 R8_w=inv(id=0,umin_value=4096,umax_value=267775999,var_off=(0x0; 0xfffffff)) R9_w=invP161 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv667648 R6=inv(id=2,umin_value=663553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv663552 R8_w=inv(id=0,umax_value=267771903,var_off=(0x0; 0xfffffff)) R9_w=invP162 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv667648 R2_w=inv(id=0,umax_value=267771903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=663553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv667648 R8_w=inv(id=0,umin_value=4096,umax_value=267771903,var_off=(0x0; 0xfffffff)) R9_w=invP162 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=663553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv667648 R8_w=inv(id=0,umin_value=4096,umax_value=267771903,var_off=(0x0; 0xfffffff)) R9_w=invP162 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv671744 R6=inv(id=2,umin_value=667649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv667648 R8_w=inv(id=0,umax_value=267767807,var_off=(0x0; 0xfffffff)) R9_w=invP163 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv671744 R2_w=inv(id=0,umax_value=267767807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=667649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv671744 R8_w=inv(id=0,umin_value=4096,umax_value=267767807,var_off=(0x0; 0xfffffff)) R9_w=invP163 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=667649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv671744 R8_w=inv(id=0,umin_value=4096,umax_value=267767807,var_off=(0x0; 0xfffffff)) R9_w=invP163 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv675840 R6=inv(id=2,umin_value=671745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv671744 R8=inv(id=0,umax_value=267763711,var_off=(0x0; 0xfffffff)) R9=invP164 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv675840 R2_w=inv(id=0,umax_value=267763711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=671745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv675840 R8=inv(id=0,umin_value=4096,umax_value=267763711,var_off=(0x0; 0xfffffff)) R9=invP164 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=671745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv675840 R8=inv(id=0,umin_value=4096,umax_value=267763711,var_off=(0x0; 0xfffffff)) R9=invP164 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv679936 R6=inv(id=2,umin_value=675841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv675840 R8_w=inv(id=0,umax_value=267759615,var_off=(0x0; 0xfffffff)) R9_w=invP165 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv679936 R2_w=inv(id=0,umax_value=267759615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=675841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv679936 R8_w=inv(id=0,umin_value=4096,umax_value=267759615,var_off=(0x0; 0xfffffff)) R9_w=invP165 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=675841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv679936 R8_w=inv(id=0,umin_value=4096,umax_value=267759615,var_off=(0x0; 0xfffffff)) R9_w=invP165 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv684032 R6=inv(id=2,umin_value=679937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv679936 R8_w=inv(id=0,umax_value=267755519,var_off=(0x0; 0xfffffff)) R9_w=invP166 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv684032 R2_w=inv(id=0,umax_value=267755519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=679937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv684032 R8_w=inv(id=0,umin_value=4096,umax_value=267755519,var_off=(0x0; 0xfffffff)) R9_w=invP166 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=679937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv684032 R8_w=inv(id=0,umin_value=4096,umax_value=267755519,var_off=(0x0; 0xfffffff)) R9_w=invP166 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv688128 R6=inv(id=2,umin_value=684033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv684032 R8_w=inv(id=0,umax_value=267751423,var_off=(0x0; 0xfffffff)) R9_w=invP167 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv688128 R2_w=inv(id=0,umax_value=267751423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=684033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv688128 R8_w=inv(id=0,umin_value=4096,umax_value=267751423,var_off=(0x0; 0xfffffff)) R9_w=invP167 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=684033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv688128 R8_w=inv(id=0,umin_value=4096,umax_value=267751423,var_off=(0x0; 0xfffffff)) R9_w=invP167 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv692224 R6=inv(id=2,umin_value=688129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv688128 R8=inv(id=0,umax_value=267747327,var_off=(0x0; 0xfffffff)) R9=invP168 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv692224 R2_w=inv(id=0,umax_value=267747327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=688129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv692224 R8=inv(id=0,umin_value=4096,umax_value=267747327,var_off=(0x0; 0xfffffff)) R9=invP168 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=688129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv692224 R8=inv(id=0,umin_value=4096,umax_value=267747327,var_off=(0x0; 0xfffffff)) R9=invP168 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv696320 R6=inv(id=2,umin_value=692225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv692224 R8_w=inv(id=0,umax_value=267743231,var_off=(0x0; 0xfffffff)) R9_w=invP169 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv696320 R2_w=inv(id=0,umax_value=267743231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=692225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv696320 R8_w=inv(id=0,umin_value=4096,umax_value=267743231,var_off=(0x0; 0xfffffff)) R9_w=invP169 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=692225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv696320 R8_w=inv(id=0,umin_value=4096,umax_value=267743231,var_off=(0x0; 0xfffffff)) R9_w=invP169 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv700416 R6=inv(id=2,umin_value=696321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv696320 R8_w=inv(id=0,umax_value=267739135,var_off=(0x0; 0xfffffff)) R9_w=invP170 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv700416 R2_w=inv(id=0,umax_value=267739135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=696321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv700416 R8_w=inv(id=0,umin_value=4096,umax_value=267739135,var_off=(0x0; 0xfffffff)) R9_w=invP170 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=696321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv700416 R8_w=inv(id=0,umin_value=4096,umax_value=267739135,var_off=(0x0; 0xfffffff)) R9_w=invP170 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv704512 R6=inv(id=2,umin_value=700417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv700416 R8_w=inv(id=0,umax_value=267735039,var_off=(0x0; 0xfffffff)) R9_w=invP171 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv704512 R2_w=inv(id=0,umax_value=267735039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=700417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv704512 R8_w=inv(id=0,umin_value=4096,umax_value=267735039,var_off=(0x0; 0xfffffff)) R9_w=invP171 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=700417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv704512 R8_w=inv(id=0,umin_value=4096,umax_value=267735039,var_off=(0x0; 0xfffffff)) R9_w=invP171 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv708608 R6=inv(id=2,umin_value=704513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv704512 R8=inv(id=0,umax_value=267730943,var_off=(0x0; 0xfffffff)) R9=invP172 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv708608 R2_w=inv(id=0,umax_value=267730943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=704513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv708608 R8=inv(id=0,umin_value=4096,umax_value=267730943,var_off=(0x0; 0xfffffff)) R9=invP172 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=704513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv708608 R8=inv(id=0,umin_value=4096,umax_value=267730943,var_off=(0x0; 0xfffffff)) R9=invP172 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv712704 R6=inv(id=2,umin_value=708609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv708608 R8_w=inv(id=0,umax_value=267726847,var_off=(0x0; 0xfffffff)) R9_w=invP173 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv712704 R2_w=inv(id=0,umax_value=267726847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=708609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv712704 R8_w=inv(id=0,umin_value=4096,umax_value=267726847,var_off=(0x0; 0xfffffff)) R9_w=invP173 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=708609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv712704 R8_w=inv(id=0,umin_value=4096,umax_value=267726847,var_off=(0x0; 0xfffffff)) R9_w=invP173 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv716800 R6=inv(id=2,umin_value=712705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv712704 R8_w=inv(id=0,umax_value=267722751,var_off=(0x0; 0xfffffff)) R9_w=invP174 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv716800 R2_w=inv(id=0,umax_value=267722751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=712705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv716800 R8_w=inv(id=0,umin_value=4096,umax_value=267722751,var_off=(0x0; 0xfffffff)) R9_w=invP174 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=712705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv716800 R8_w=inv(id=0,umin_value=4096,umax_value=267722751,var_off=(0x0; 0xfffffff)) R9_w=invP174 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv720896 R6=inv(id=2,umin_value=716801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv716800 R8_w=inv(id=0,umax_value=267718655,var_off=(0x0; 0xfffffff)) R9_w=invP175 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv720896 R2_w=inv(id=0,umax_value=267718655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=716801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv720896 R8_w=inv(id=0,umin_value=4096,umax_value=267718655,var_off=(0x0; 0xfffffff)) R9_w=invP175 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=716801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv720896 R8_w=inv(id=0,umin_value=4096,umax_value=267718655,var_off=(0x0; 0xfffffff)) R9_w=invP175 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv724992 R6=inv(id=2,umin_value=720897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv720896 R8=inv(id=0,umax_value=267714559,var_off=(0x0; 0xfffffff)) R9=invP176 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv724992 R2_w=inv(id=0,umax_value=267714559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=720897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv724992 R8=inv(id=0,umin_value=4096,umax_value=267714559,var_off=(0x0; 0xfffffff)) R9=invP176 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=720897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv724992 R8=inv(id=0,umin_value=4096,umax_value=267714559,var_off=(0x0; 0xfffffff)) R9=invP176 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv729088 R6=inv(id=2,umin_value=724993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv724992 R8_w=inv(id=0,umax_value=267710463,var_off=(0x0; 0xfffffff)) R9_w=invP177 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv729088 R2_w=inv(id=0,umax_value=267710463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=724993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv729088 R8_w=inv(id=0,umin_value=4096,umax_value=267710463,var_off=(0x0; 0xfffffff)) R9_w=invP177 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=724993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv729088 R8_w=inv(id=0,umin_value=4096,umax_value=267710463,var_off=(0x0; 0xfffffff)) R9_w=invP177 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv733184 R6=inv(id=2,umin_value=729089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv729088 R8_w=inv(id=0,umax_value=267706367,var_off=(0x0; 0xfffffff)) R9_w=invP178 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv733184 R2_w=inv(id=0,umax_value=267706367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=729089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv733184 R8_w=inv(id=0,umin_value=4096,umax_value=267706367,var_off=(0x0; 0xfffffff)) R9_w=invP178 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=729089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv733184 R8_w=inv(id=0,umin_value=4096,umax_value=267706367,var_off=(0x0; 0xfffffff)) R9_w=invP178 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv737280 R6=inv(id=2,umin_value=733185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv733184 R8_w=inv(id=0,umax_value=267702271,var_off=(0x0; 0xfffffff)) R9_w=invP179 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv737280 R2_w=inv(id=0,umax_value=267702271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=733185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv737280 R8_w=inv(id=0,umin_value=4096,umax_value=267702271,var_off=(0x0; 0xfffffff)) R9_w=invP179 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=733185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv737280 R8_w=inv(id=0,umin_value=4096,umax_value=267702271,var_off=(0x0; 0xfffffff)) R9_w=invP179 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv741376 R6=inv(id=2,umin_value=737281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv737280 R8=inv(id=0,umax_value=267698175,var_off=(0x0; 0xfffffff)) R9=invP180 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv741376 R2_w=inv(id=0,umax_value=267698175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=737281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv741376 R8=inv(id=0,umin_value=4096,umax_value=267698175,var_off=(0x0; 0xfffffff)) R9=invP180 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=737281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv741376 R8=inv(id=0,umin_value=4096,umax_value=267698175,var_off=(0x0; 0xfffffff)) R9=invP180 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv745472 R6=inv(id=2,umin_value=741377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv741376 R8_w=inv(id=0,umax_value=267694079,var_off=(0x0; 0xfffffff)) R9_w=invP181 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv745472 R2_w=inv(id=0,umax_value=267694079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=741377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv745472 R8_w=inv(id=0,umin_value=4096,umax_value=267694079,var_off=(0x0; 0xfffffff)) R9_w=invP181 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=741377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv745472 R8_w=inv(id=0,umin_value=4096,umax_value=267694079,var_off=(0x0; 0xfffffff)) R9_w=invP181 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv749568 R6=inv(id=2,umin_value=745473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv745472 R8_w=inv(id=0,umax_value=267689983,var_off=(0x0; 0xfffffff)) R9_w=invP182 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv749568 R2_w=inv(id=0,umax_value=267689983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=745473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv749568 R8_w=inv(id=0,umin_value=4096,umax_value=267689983,var_off=(0x0; 0xfffffff)) R9_w=invP182 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=745473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv749568 R8_w=inv(id=0,umin_value=4096,umax_value=267689983,var_off=(0x0; 0xfffffff)) R9_w=invP182 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv753664 R6=inv(id=2,umin_value=749569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv749568 R8_w=inv(id=0,umax_value=267685887,var_off=(0x0; 0xfffffff)) R9_w=invP183 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv753664 R2_w=inv(id=0,umax_value=267685887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=749569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv753664 R8_w=inv(id=0,umin_value=4096,umax_value=267685887,var_off=(0x0; 0xfffffff)) R9_w=invP183 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=749569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv753664 R8_w=inv(id=0,umin_value=4096,umax_value=267685887,var_off=(0x0; 0xfffffff)) R9_w=invP183 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv757760 R6=inv(id=2,umin_value=753665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv753664 R8=inv(id=0,umax_value=267681791,var_off=(0x0; 0xfffffff)) R9=invP184 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv757760 R2_w=inv(id=0,umax_value=267681791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=753665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv757760 R8=inv(id=0,umin_value=4096,umax_value=267681791,var_off=(0x0; 0xfffffff)) R9=invP184 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=753665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv757760 R8=inv(id=0,umin_value=4096,umax_value=267681791,var_off=(0x0; 0xfffffff)) R9=invP184 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv761856 R6=inv(id=2,umin_value=757761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv757760 R8_w=inv(id=0,umax_value=267677695,var_off=(0x0; 0xfffffff)) R9_w=invP185 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv761856 R2_w=inv(id=0,umax_value=267677695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=757761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv761856 R8_w=inv(id=0,umin_value=4096,umax_value=267677695,var_off=(0x0; 0xfffffff)) R9_w=invP185 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=757761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv761856 R8_w=inv(id=0,umin_value=4096,umax_value=267677695,var_off=(0x0; 0xfffffff)) R9_w=invP185 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv765952 R6=inv(id=2,umin_value=761857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv761856 R8_w=inv(id=0,umax_value=267673599,var_off=(0x0; 0xfffffff)) R9_w=invP186 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv765952 R2_w=inv(id=0,umax_value=267673599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=761857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv765952 R8_w=inv(id=0,umin_value=4096,umax_value=267673599,var_off=(0x0; 0xfffffff)) R9_w=invP186 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=761857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv765952 R8_w=inv(id=0,umin_value=4096,umax_value=267673599,var_off=(0x0; 0xfffffff)) R9_w=invP186 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv770048 R6=inv(id=2,umin_value=765953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv765952 R8_w=inv(id=0,umax_value=267669503,var_off=(0x0; 0xfffffff)) R9_w=invP187 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv770048 R2_w=inv(id=0,umax_value=267669503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=765953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv770048 R8_w=inv(id=0,umin_value=4096,umax_value=267669503,var_off=(0x0; 0xfffffff)) R9_w=invP187 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=765953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv770048 R8_w=inv(id=0,umin_value=4096,umax_value=267669503,var_off=(0x0; 0xfffffff)) R9_w=invP187 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv774144 R6=inv(id=2,umin_value=770049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv770048 R8=inv(id=0,umax_value=267665407,var_off=(0x0; 0xfffffff)) R9=invP188 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv774144 R2_w=inv(id=0,umax_value=267665407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=770049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv774144 R8=inv(id=0,umin_value=4096,umax_value=267665407,var_off=(0x0; 0xfffffff)) R9=invP188 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=770049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv774144 R8=inv(id=0,umin_value=4096,umax_value=267665407,var_off=(0x0; 0xfffffff)) R9=invP188 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv778240 R6=inv(id=2,umin_value=774145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv774144 R8_w=inv(id=0,umax_value=267661311,var_off=(0x0; 0xfffffff)) R9_w=invP189 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv778240 R2_w=inv(id=0,umax_value=267661311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=774145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv778240 R8_w=inv(id=0,umin_value=4096,umax_value=267661311,var_off=(0x0; 0xfffffff)) R9_w=invP189 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=774145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv778240 R8_w=inv(id=0,umin_value=4096,umax_value=267661311,var_off=(0x0; 0xfffffff)) R9_w=invP189 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv782336 R6=inv(id=2,umin_value=778241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv778240 R8_w=inv(id=0,umax_value=267657215,var_off=(0x0; 0xfffffff)) R9_w=invP190 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv782336 R2_w=inv(id=0,umax_value=267657215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=778241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv782336 R8_w=inv(id=0,umin_value=4096,umax_value=267657215,var_off=(0x0; 0xfffffff)) R9_w=invP190 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=778241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv782336 R8_w=inv(id=0,umin_value=4096,umax_value=267657215,var_off=(0x0; 0xfffffff)) R9_w=invP190 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv786432 R6=inv(id=2,umin_value=782337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv782336 R8_w=inv(id=0,umax_value=267653119,var_off=(0x0; 0xfffffff)) R9_w=invP191 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv786432 R2_w=inv(id=0,umax_value=267653119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=782337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv786432 R8_w=inv(id=0,umin_value=4096,umax_value=267653119,var_off=(0x0; 0xfffffff)) R9_w=invP191 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=782337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv786432 R8_w=inv(id=0,umin_value=4096,umax_value=267653119,var_off=(0x0; 0xfffffff)) R9_w=invP191 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv790528 R6=inv(id=2,umin_value=786433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv786432 R8=inv(id=0,umax_value=267649023,var_off=(0x0; 0xfffffff)) R9=invP192 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv790528 R2_w=inv(id=0,umax_value=267649023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=786433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv790528 R8=inv(id=0,umin_value=4096,umax_value=267649023,var_off=(0x0; 0xfffffff)) R9=invP192 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=786433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv790528 R8=inv(id=0,umin_value=4096,umax_value=267649023,var_off=(0x0; 0xfffffff)) R9=invP192 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv794624 R6=inv(id=2,umin_value=790529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv790528 R8_w=inv(id=0,umax_value=267644927,var_off=(0x0; 0xfffffff)) R9_w=invP193 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv794624 R2_w=inv(id=0,umax_value=267644927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=790529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv794624 R8_w=inv(id=0,umin_value=4096,umax_value=267644927,var_off=(0x0; 0xfffffff)) R9_w=invP193 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=790529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv794624 R8_w=inv(id=0,umin_value=4096,umax_value=267644927,var_off=(0x0; 0xfffffff)) R9_w=invP193 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv798720 R6=inv(id=2,umin_value=794625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv794624 R8_w=inv(id=0,umax_value=267640831,var_off=(0x0; 0xfffffff)) R9_w=invP194 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv798720 R2_w=inv(id=0,umax_value=267640831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=794625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv798720 R8_w=inv(id=0,umin_value=4096,umax_value=267640831,var_off=(0x0; 0xfffffff)) R9_w=invP194 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=794625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv798720 R8_w=inv(id=0,umin_value=4096,umax_value=267640831,var_off=(0x0; 0xfffffff)) R9_w=invP194 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv802816 R6=inv(id=2,umin_value=798721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv798720 R8_w=inv(id=0,umax_value=267636735,var_off=(0x0; 0xfffffff)) R9_w=invP195 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv802816 R2_w=inv(id=0,umax_value=267636735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=798721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv802816 R8_w=inv(id=0,umin_value=4096,umax_value=267636735,var_off=(0x0; 0xfffffff)) R9_w=invP195 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=798721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv802816 R8_w=inv(id=0,umin_value=4096,umax_value=267636735,var_off=(0x0; 0xfffffff)) R9_w=invP195 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv806912 R6=inv(id=2,umin_value=802817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv802816 R8=inv(id=0,umax_value=267632639,var_off=(0x0; 0xfffffff)) R9=invP196 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv806912 R2_w=inv(id=0,umax_value=267632639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=802817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv806912 R8=inv(id=0,umin_value=4096,umax_value=267632639,var_off=(0x0; 0xfffffff)) R9=invP196 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=802817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv806912 R8=inv(id=0,umin_value=4096,umax_value=267632639,var_off=(0x0; 0xfffffff)) R9=invP196 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv811008 R6=inv(id=2,umin_value=806913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv806912 R8_w=inv(id=0,umax_value=267628543,var_off=(0x0; 0xfffffff)) R9_w=invP197 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv811008 R2_w=inv(id=0,umax_value=267628543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=806913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv811008 R8_w=inv(id=0,umin_value=4096,umax_value=267628543,var_off=(0x0; 0xfffffff)) R9_w=invP197 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=806913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv811008 R8_w=inv(id=0,umin_value=4096,umax_value=267628543,var_off=(0x0; 0xfffffff)) R9_w=invP197 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv815104 R6=inv(id=2,umin_value=811009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv811008 R8_w=inv(id=0,umax_value=267624447,var_off=(0x0; 0xfffffff)) R9_w=invP198 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv815104 R2_w=inv(id=0,umax_value=267624447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=811009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv815104 R8_w=inv(id=0,umin_value=4096,umax_value=267624447,var_off=(0x0; 0xfffffff)) R9_w=invP198 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=811009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv815104 R8_w=inv(id=0,umin_value=4096,umax_value=267624447,var_off=(0x0; 0xfffffff)) R9_w=invP198 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv819200 R6=inv(id=2,umin_value=815105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv815104 R8_w=inv(id=0,umax_value=267620351,var_off=(0x0; 0xfffffff)) R9_w=invP199 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv819200 R2_w=inv(id=0,umax_value=267620351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=815105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv819200 R8_w=inv(id=0,umin_value=4096,umax_value=267620351,var_off=(0x0; 0xfffffff)) R9_w=invP199 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=815105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv819200 R8_w=inv(id=0,umin_value=4096,umax_value=267620351,var_off=(0x0; 0xfffffff)) R9_w=invP199 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv823296 R6=inv(id=2,umin_value=819201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv819200 R8=inv(id=0,umax_value=267616255,var_off=(0x0; 0xfffffff)) R9=invP200 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv823296 R2_w=inv(id=0,umax_value=267616255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=819201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv823296 R8=inv(id=0,umin_value=4096,umax_value=267616255,var_off=(0x0; 0xfffffff)) R9=invP200 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=819201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv823296 R8=inv(id=0,umin_value=4096,umax_value=267616255,var_off=(0x0; 0xfffffff)) R9=invP200 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv827392 R6=inv(id=2,umin_value=823297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv823296 R8_w=inv(id=0,umax_value=267612159,var_off=(0x0; 0xfffffff)) R9_w=invP201 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv827392 R2_w=inv(id=0,umax_value=267612159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=823297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv827392 R8_w=inv(id=0,umin_value=4096,umax_value=267612159,var_off=(0x0; 0xfffffff)) R9_w=invP201 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=823297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv827392 R8_w=inv(id=0,umin_value=4096,umax_value=267612159,var_off=(0x0; 0xfffffff)) R9_w=invP201 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv831488 R6=inv(id=2,umin_value=827393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv827392 R8_w=inv(id=0,umax_value=267608063,var_off=(0x0; 0xfffffff)) R9_w=invP202 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv831488 R2_w=inv(id=0,umax_value=267608063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=827393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv831488 R8_w=inv(id=0,umin_value=4096,umax_value=267608063,var_off=(0x0; 0xfffffff)) R9_w=invP202 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=827393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv831488 R8_w=inv(id=0,umin_value=4096,umax_value=267608063,var_off=(0x0; 0xfffffff)) R9_w=invP202 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv835584 R6=inv(id=2,umin_value=831489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv831488 R8_w=inv(id=0,umax_value=267603967,var_off=(0x0; 0xfffffff)) R9_w=invP203 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv835584 R2_w=inv(id=0,umax_value=267603967,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=831489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv835584 R8_w=inv(id=0,umin_value=4096,umax_value=267603967,var_off=(0x0; 0xfffffff)) R9_w=invP203 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=831489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv835584 R8_w=inv(id=0,umin_value=4096,umax_value=267603967,var_off=(0x0; 0xfffffff)) R9_w=invP203 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv839680 R6=inv(id=2,umin_value=835585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv835584 R8=inv(id=0,umax_value=267599871,var_off=(0x0; 0xfffffff)) R9=invP204 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv839680 R2_w=inv(id=0,umax_value=267599871,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=835585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv839680 R8=inv(id=0,umin_value=4096,umax_value=267599871,var_off=(0x0; 0xfffffff)) R9=invP204 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=835585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv839680 R8=inv(id=0,umin_value=4096,umax_value=267599871,var_off=(0x0; 0xfffffff)) R9=invP204 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv843776 R6=inv(id=2,umin_value=839681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv839680 R8_w=inv(id=0,umax_value=267595775,var_off=(0x0; 0xfffffff)) R9_w=invP205 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv843776 R2_w=inv(id=0,umax_value=267595775,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=839681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv843776 R8_w=inv(id=0,umin_value=4096,umax_value=267595775,var_off=(0x0; 0xfffffff)) R9_w=invP205 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=839681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv843776 R8_w=inv(id=0,umin_value=4096,umax_value=267595775,var_off=(0x0; 0xfffffff)) R9_w=invP205 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv847872 R6=inv(id=2,umin_value=843777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv843776 R8_w=inv(id=0,umax_value=267591679,var_off=(0x0; 0xfffffff)) R9_w=invP206 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv847872 R2_w=inv(id=0,umax_value=267591679,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=843777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv847872 R8_w=inv(id=0,umin_value=4096,umax_value=267591679,var_off=(0x0; 0xfffffff)) R9_w=invP206 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=843777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv847872 R8_w=inv(id=0,umin_value=4096,umax_value=267591679,var_off=(0x0; 0xfffffff)) R9_w=invP206 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv851968 R6=inv(id=2,umin_value=847873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv847872 R8_w=inv(id=0,umax_value=267587583,var_off=(0x0; 0xfffffff)) R9_w=invP207 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv851968 R2_w=inv(id=0,umax_value=267587583,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=847873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv851968 R8_w=inv(id=0,umin_value=4096,umax_value=267587583,var_off=(0x0; 0xfffffff)) R9_w=invP207 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=847873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv851968 R8_w=inv(id=0,umin_value=4096,umax_value=267587583,var_off=(0x0; 0xfffffff)) R9_w=invP207 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv856064 R6=inv(id=2,umin_value=851969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv851968 R8=inv(id=0,umax_value=267583487,var_off=(0x0; 0xfffffff)) R9=invP208 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv856064 R2_w=inv(id=0,umax_value=267583487,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=851969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv856064 R8=inv(id=0,umin_value=4096,umax_value=267583487,var_off=(0x0; 0xfffffff)) R9=invP208 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=851969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv856064 R8=inv(id=0,umin_value=4096,umax_value=267583487,var_off=(0x0; 0xfffffff)) R9=invP208 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv860160 R6=inv(id=2,umin_value=856065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv856064 R8_w=inv(id=0,umax_value=267579391,var_off=(0x0; 0xfffffff)) R9_w=invP209 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv860160 R2_w=inv(id=0,umax_value=267579391,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=856065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv860160 R8_w=inv(id=0,umin_value=4096,umax_value=267579391,var_off=(0x0; 0xfffffff)) R9_w=invP209 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=856065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv860160 R8_w=inv(id=0,umin_value=4096,umax_value=267579391,var_off=(0x0; 0xfffffff)) R9_w=invP209 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv864256 R6=inv(id=2,umin_value=860161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv860160 R8_w=inv(id=0,umax_value=267575295,var_off=(0x0; 0xfffffff)) R9_w=invP210 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv864256 R2_w=inv(id=0,umax_value=267575295,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=860161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv864256 R8_w=inv(id=0,umin_value=4096,umax_value=267575295,var_off=(0x0; 0xfffffff)) R9_w=invP210 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=860161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv864256 R8_w=inv(id=0,umin_value=4096,umax_value=267575295,var_off=(0x0; 0xfffffff)) R9_w=invP210 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv868352 R6=inv(id=2,umin_value=864257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv864256 R8_w=inv(id=0,umax_value=267571199,var_off=(0x0; 0xfffffff)) R9_w=invP211 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv868352 R2_w=inv(id=0,umax_value=267571199,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=864257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv868352 R8_w=inv(id=0,umin_value=4096,umax_value=267571199,var_off=(0x0; 0xfffffff)) R9_w=invP211 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=864257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv868352 R8_w=inv(id=0,umin_value=4096,umax_value=267571199,var_off=(0x0; 0xfffffff)) R9_w=invP211 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv872448 R6=inv(id=2,umin_value=868353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv868352 R8=inv(id=0,umax_value=267567103,var_off=(0x0; 0xfffffff)) R9=invP212 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv872448 R2_w=inv(id=0,umax_value=267567103,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=868353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv872448 R8=inv(id=0,umin_value=4096,umax_value=267567103,var_off=(0x0; 0xfffffff)) R9=invP212 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=868353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv872448 R8=inv(id=0,umin_value=4096,umax_value=267567103,var_off=(0x0; 0xfffffff)) R9=invP212 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv876544 R6=inv(id=2,umin_value=872449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv872448 R8_w=inv(id=0,umax_value=267563007,var_off=(0x0; 0xfffffff)) R9_w=invP213 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv876544 R2_w=inv(id=0,umax_value=267563007,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=872449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv876544 R8_w=inv(id=0,umin_value=4096,umax_value=267563007,var_off=(0x0; 0xfffffff)) R9_w=invP213 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=872449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv876544 R8_w=inv(id=0,umin_value=4096,umax_value=267563007,var_off=(0x0; 0xfffffff)) R9_w=invP213 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv880640 R6=inv(id=2,umin_value=876545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv876544 R8_w=inv(id=0,umax_value=267558911,var_off=(0x0; 0xfffffff)) R9_w=invP214 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv880640 R2_w=inv(id=0,umax_value=267558911,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=876545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv880640 R8_w=inv(id=0,umin_value=4096,umax_value=267558911,var_off=(0x0; 0xfffffff)) R9_w=invP214 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=876545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv880640 R8_w=inv(id=0,umin_value=4096,umax_value=267558911,var_off=(0x0; 0xfffffff)) R9_w=invP214 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv884736 R6=inv(id=2,umin_value=880641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv880640 R8_w=inv(id=0,umax_value=267554815,var_off=(0x0; 0xfffffff)) R9_w=invP215 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv884736 R2_w=inv(id=0,umax_value=267554815,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=880641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv884736 R8_w=inv(id=0,umin_value=4096,umax_value=267554815,var_off=(0x0; 0xfffffff)) R9_w=invP215 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=880641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv884736 R8_w=inv(id=0,umin_value=4096,umax_value=267554815,var_off=(0x0; 0xfffffff)) R9_w=invP215 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv888832 R6=inv(id=2,umin_value=884737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv884736 R8=inv(id=0,umax_value=267550719,var_off=(0x0; 0xfffffff)) R9=invP216 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv888832 R2_w=inv(id=0,umax_value=267550719,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=884737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv888832 R8=inv(id=0,umin_value=4096,umax_value=267550719,var_off=(0x0; 0xfffffff)) R9=invP216 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=884737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv888832 R8=inv(id=0,umin_value=4096,umax_value=267550719,var_off=(0x0; 0xfffffff)) R9=invP216 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv892928 R6=inv(id=2,umin_value=888833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv888832 R8_w=inv(id=0,umax_value=267546623,var_off=(0x0; 0xfffffff)) R9_w=invP217 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv892928 R2_w=inv(id=0,umax_value=267546623,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=888833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv892928 R8_w=inv(id=0,umin_value=4096,umax_value=267546623,var_off=(0x0; 0xfffffff)) R9_w=invP217 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=888833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv892928 R8_w=inv(id=0,umin_value=4096,umax_value=267546623,var_off=(0x0; 0xfffffff)) R9_w=invP217 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv897024 R6=inv(id=2,umin_value=892929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv892928 R8_w=inv(id=0,umax_value=267542527,var_off=(0x0; 0xfffffff)) R9_w=invP218 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv897024 R2_w=inv(id=0,umax_value=267542527,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=892929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv897024 R8_w=inv(id=0,umin_value=4096,umax_value=267542527,var_off=(0x0; 0xfffffff)) R9_w=invP218 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=892929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv897024 R8_w=inv(id=0,umin_value=4096,umax_value=267542527,var_off=(0x0; 0xfffffff)) R9_w=invP218 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv901120 R6=inv(id=2,umin_value=897025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv897024 R8_w=inv(id=0,umax_value=267538431,var_off=(0x0; 0xfffffff)) R9_w=invP219 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv901120 R2_w=inv(id=0,umax_value=267538431,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=897025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv901120 R8_w=inv(id=0,umin_value=4096,umax_value=267538431,var_off=(0x0; 0xfffffff)) R9_w=invP219 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=897025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv901120 R8_w=inv(id=0,umin_value=4096,umax_value=267538431,var_off=(0x0; 0xfffffff)) R9_w=invP219 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv905216 R6=inv(id=2,umin_value=901121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv901120 R8=inv(id=0,umax_value=267534335,var_off=(0x0; 0xfffffff)) R9=invP220 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv905216 R2_w=inv(id=0,umax_value=267534335,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=901121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv905216 R8=inv(id=0,umin_value=4096,umax_value=267534335,var_off=(0x0; 0xfffffff)) R9=invP220 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=901121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv905216 R8=inv(id=0,umin_value=4096,umax_value=267534335,var_off=(0x0; 0xfffffff)) R9=invP220 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv909312 R6=inv(id=2,umin_value=905217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv905216 R8_w=inv(id=0,umax_value=267530239,var_off=(0x0; 0xfffffff)) R9_w=invP221 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv909312 R2_w=inv(id=0,umax_value=267530239,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=905217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv909312 R8_w=inv(id=0,umin_value=4096,umax_value=267530239,var_off=(0x0; 0xfffffff)) R9_w=invP221 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=905217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv909312 R8_w=inv(id=0,umin_value=4096,umax_value=267530239,var_off=(0x0; 0xfffffff)) R9_w=invP221 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv913408 R6=inv(id=2,umin_value=909313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv909312 R8_w=inv(id=0,umax_value=267526143,var_off=(0x0; 0xfffffff)) R9_w=invP222 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv913408 R2_w=inv(id=0,umax_value=267526143,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=909313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv913408 R8_w=inv(id=0,umin_value=4096,umax_value=267526143,var_off=(0x0; 0xfffffff)) R9_w=invP222 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=909313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv913408 R8_w=inv(id=0,umin_value=4096,umax_value=267526143,var_off=(0x0; 0xfffffff)) R9_w=invP222 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv917504 R6=inv(id=2,umin_value=913409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv913408 R8_w=inv(id=0,umax_value=267522047,var_off=(0x0; 0xfffffff)) R9_w=invP223 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv917504 R2_w=inv(id=0,umax_value=267522047,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=913409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv917504 R8_w=inv(id=0,umin_value=4096,umax_value=267522047,var_off=(0x0; 0xfffffff)) R9_w=invP223 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=913409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv917504 R8_w=inv(id=0,umin_value=4096,umax_value=267522047,var_off=(0x0; 0xfffffff)) R9_w=invP223 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv921600 R6=inv(id=2,umin_value=917505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv917504 R8=inv(id=0,umax_value=267517951,var_off=(0x0; 0xfffffff)) R9=invP224 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv921600 R2_w=inv(id=0,umax_value=267517951,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=917505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv921600 R8=inv(id=0,umin_value=4096,umax_value=267517951,var_off=(0x0; 0xfffffff)) R9=invP224 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=917505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv921600 R8=inv(id=0,umin_value=4096,umax_value=267517951,var_off=(0x0; 0xfffffff)) R9=invP224 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv925696 R6=inv(id=2,umin_value=921601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv921600 R8_w=inv(id=0,umax_value=267513855,var_off=(0x0; 0xfffffff)) R9_w=invP225 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv925696 R2_w=inv(id=0,umax_value=267513855,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=921601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv925696 R8_w=inv(id=0,umin_value=4096,umax_value=267513855,var_off=(0x0; 0xfffffff)) R9_w=invP225 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=921601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv925696 R8_w=inv(id=0,umin_value=4096,umax_value=267513855,var_off=(0x0; 0xfffffff)) R9_w=invP225 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv929792 R6=inv(id=2,umin_value=925697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv925696 R8_w=inv(id=0,umax_value=267509759,var_off=(0x0; 0xfffffff)) R9_w=invP226 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv929792 R2_w=inv(id=0,umax_value=267509759,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=925697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv929792 R8_w=inv(id=0,umin_value=4096,umax_value=267509759,var_off=(0x0; 0xfffffff)) R9_w=invP226 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=925697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv929792 R8_w=inv(id=0,umin_value=4096,umax_value=267509759,var_off=(0x0; 0xfffffff)) R9_w=invP226 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv933888 R6=inv(id=2,umin_value=929793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv929792 R8_w=inv(id=0,umax_value=267505663,var_off=(0x0; 0xfffffff)) R9_w=invP227 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv933888 R2_w=inv(id=0,umax_value=267505663,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=929793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv933888 R8_w=inv(id=0,umin_value=4096,umax_value=267505663,var_off=(0x0; 0xfffffff)) R9_w=invP227 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=929793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv933888 R8_w=inv(id=0,umin_value=4096,umax_value=267505663,var_off=(0x0; 0xfffffff)) R9_w=invP227 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv937984 R6=inv(id=2,umin_value=933889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv933888 R8=inv(id=0,umax_value=267501567,var_off=(0x0; 0xfffffff)) R9=invP228 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv937984 R2_w=inv(id=0,umax_value=267501567,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=933889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv937984 R8=inv(id=0,umin_value=4096,umax_value=267501567,var_off=(0x0; 0xfffffff)) R9=invP228 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=933889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv937984 R8=inv(id=0,umin_value=4096,umax_value=267501567,var_off=(0x0; 0xfffffff)) R9=invP228 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv942080 R6=inv(id=2,umin_value=937985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv937984 R8_w=inv(id=0,umax_value=267497471,var_off=(0x0; 0xfffffff)) R9_w=invP229 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv942080 R2_w=inv(id=0,umax_value=267497471,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=937985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv942080 R8_w=inv(id=0,umin_value=4096,umax_value=267497471,var_off=(0x0; 0xfffffff)) R9_w=invP229 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=937985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv942080 R8_w=inv(id=0,umin_value=4096,umax_value=267497471,var_off=(0x0; 0xfffffff)) R9_w=invP229 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv946176 R6=inv(id=2,umin_value=942081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv942080 R8_w=inv(id=0,umax_value=267493375,var_off=(0x0; 0xfffffff)) R9_w=invP230 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv946176 R2_w=inv(id=0,umax_value=267493375,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=942081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv946176 R8_w=inv(id=0,umin_value=4096,umax_value=267493375,var_off=(0x0; 0xfffffff)) R9_w=invP230 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=942081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv946176 R8_w=inv(id=0,umin_value=4096,umax_value=267493375,var_off=(0x0; 0xfffffff)) R9_w=invP230 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv950272 R6=inv(id=2,umin_value=946177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv946176 R8_w=inv(id=0,umax_value=267489279,var_off=(0x0; 0xfffffff)) R9_w=invP231 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv950272 R2_w=inv(id=0,umax_value=267489279,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=946177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv950272 R8_w=inv(id=0,umin_value=4096,umax_value=267489279,var_off=(0x0; 0xfffffff)) R9_w=invP231 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=946177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv950272 R8_w=inv(id=0,umin_value=4096,umax_value=267489279,var_off=(0x0; 0xfffffff)) R9_w=invP231 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv954368 R6=inv(id=2,umin_value=950273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv950272 R8=inv(id=0,umax_value=267485183,var_off=(0x0; 0xfffffff)) R9=invP232 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv954368 R2_w=inv(id=0,umax_value=267485183,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=950273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv954368 R8=inv(id=0,umin_value=4096,umax_value=267485183,var_off=(0x0; 0xfffffff)) R9=invP232 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=950273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv954368 R8=inv(id=0,umin_value=4096,umax_value=267485183,var_off=(0x0; 0xfffffff)) R9=invP232 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv958464 R6=inv(id=2,umin_value=954369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv954368 R8_w=inv(id=0,umax_value=267481087,var_off=(0x0; 0xfffffff)) R9_w=invP233 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv958464 R2_w=inv(id=0,umax_value=267481087,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=954369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv958464 R8_w=inv(id=0,umin_value=4096,umax_value=267481087,var_off=(0x0; 0xfffffff)) R9_w=invP233 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=954369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv958464 R8_w=inv(id=0,umin_value=4096,umax_value=267481087,var_off=(0x0; 0xfffffff)) R9_w=invP233 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv962560 R6=inv(id=2,umin_value=958465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv958464 R8_w=inv(id=0,umax_value=267476991,var_off=(0x0; 0xfffffff)) R9_w=invP234 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv962560 R2_w=inv(id=0,umax_value=267476991,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=958465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv962560 R8_w=inv(id=0,umin_value=4096,umax_value=267476991,var_off=(0x0; 0xfffffff)) R9_w=invP234 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=958465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv962560 R8_w=inv(id=0,umin_value=4096,umax_value=267476991,var_off=(0x0; 0xfffffff)) R9_w=invP234 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv966656 R6=inv(id=2,umin_value=962561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv962560 R8_w=inv(id=0,umax_value=267472895,var_off=(0x0; 0xfffffff)) R9_w=invP235 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv966656 R2_w=inv(id=0,umax_value=267472895,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=962561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv966656 R8_w=inv(id=0,umin_value=4096,umax_value=267472895,var_off=(0x0; 0xfffffff)) R9_w=invP235 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=962561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv966656 R8_w=inv(id=0,umin_value=4096,umax_value=267472895,var_off=(0x0; 0xfffffff)) R9_w=invP235 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv970752 R6=inv(id=2,umin_value=966657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv966656 R8=inv(id=0,umax_value=267468799,var_off=(0x0; 0xfffffff)) R9=invP236 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv970752 R2_w=inv(id=0,umax_value=267468799,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=966657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv970752 R8=inv(id=0,umin_value=4096,umax_value=267468799,var_off=(0x0; 0xfffffff)) R9=invP236 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=966657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv970752 R8=inv(id=0,umin_value=4096,umax_value=267468799,var_off=(0x0; 0xfffffff)) R9=invP236 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv974848 R6=inv(id=2,umin_value=970753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv970752 R8_w=inv(id=0,umax_value=267464703,var_off=(0x0; 0xfffffff)) R9_w=invP237 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv974848 R2_w=inv(id=0,umax_value=267464703,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=970753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv974848 R8_w=inv(id=0,umin_value=4096,umax_value=267464703,var_off=(0x0; 0xfffffff)) R9_w=invP237 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=970753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv974848 R8_w=inv(id=0,umin_value=4096,umax_value=267464703,var_off=(0x0; 0xfffffff)) R9_w=invP237 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv978944 R6=inv(id=2,umin_value=974849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv974848 R8_w=inv(id=0,umax_value=267460607,var_off=(0x0; 0xfffffff)) R9_w=invP238 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv978944 R2_w=inv(id=0,umax_value=267460607,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=974849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv978944 R8_w=inv(id=0,umin_value=4096,umax_value=267460607,var_off=(0x0; 0xfffffff)) R9_w=invP238 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=974849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv978944 R8_w=inv(id=0,umin_value=4096,umax_value=267460607,var_off=(0x0; 0xfffffff)) R9_w=invP238 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv983040 R6=inv(id=2,umin_value=978945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv978944 R8_w=inv(id=0,umax_value=267456511,var_off=(0x0; 0xfffffff)) R9_w=invP239 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv983040 R2_w=inv(id=0,umax_value=267456511,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=978945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv983040 R8_w=inv(id=0,umin_value=4096,umax_value=267456511,var_off=(0x0; 0xfffffff)) R9_w=invP239 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=978945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv983040 R8_w=inv(id=0,umin_value=4096,umax_value=267456511,var_off=(0x0; 0xfffffff)) R9_w=invP239 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv987136 R6=inv(id=2,umin_value=983041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv983040 R8=inv(id=0,umax_value=267452415,var_off=(0x0; 0xfffffff)) R9=invP240 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv987136 R2_w=inv(id=0,umax_value=267452415,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=983041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv987136 R8=inv(id=0,umin_value=4096,umax_value=267452415,var_off=(0x0; 0xfffffff)) R9=invP240 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=983041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv987136 R8=inv(id=0,umin_value=4096,umax_value=267452415,var_off=(0x0; 0xfffffff)) R9=invP240 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv991232 R6=inv(id=2,umin_value=987137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv987136 R8_w=inv(id=0,umax_value=267448319,var_off=(0x0; 0xfffffff)) R9_w=invP241 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv991232 R2_w=inv(id=0,umax_value=267448319,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=987137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv991232 R8_w=inv(id=0,umin_value=4096,umax_value=267448319,var_off=(0x0; 0xfffffff)) R9_w=invP241 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=987137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv991232 R8_w=inv(id=0,umin_value=4096,umax_value=267448319,var_off=(0x0; 0xfffffff)) R9_w=invP241 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv995328 R6=inv(id=2,umin_value=991233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv991232 R8_w=inv(id=0,umax_value=267444223,var_off=(0x0; 0xfffffff)) R9_w=invP242 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv995328 R2_w=inv(id=0,umax_value=267444223,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=991233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv995328 R8_w=inv(id=0,umin_value=4096,umax_value=267444223,var_off=(0x0; 0xfffffff)) R9_w=invP242 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=991233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv995328 R8_w=inv(id=0,umin_value=4096,umax_value=267444223,var_off=(0x0; 0xfffffff)) R9_w=invP242 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv999424 R6=inv(id=2,umin_value=995329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv995328 R8_w=inv(id=0,umax_value=267440127,var_off=(0x0; 0xfffffff)) R9_w=invP243 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv999424 R2_w=inv(id=0,umax_value=267440127,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=995329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv999424 R8_w=inv(id=0,umin_value=4096,umax_value=267440127,var_off=(0x0; 0xfffffff)) R9_w=invP243 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=995329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv999424 R8_w=inv(id=0,umin_value=4096,umax_value=267440127,var_off=(0x0; 0xfffffff)) R9_w=invP243 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1003520 R6=inv(id=2,umin_value=999425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv999424 R8=inv(id=0,umax_value=267436031,var_off=(0x0; 0xfffffff)) R9=invP244 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1003520 R2_w=inv(id=0,umax_value=267436031,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=999425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1003520 R8=inv(id=0,umin_value=4096,umax_value=267436031,var_off=(0x0; 0xfffffff)) R9=invP244 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=999425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1003520 R8=inv(id=0,umin_value=4096,umax_value=267436031,var_off=(0x0; 0xfffffff)) R9=invP244 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1007616 R6=inv(id=2,umin_value=1003521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1003520 R8_w=inv(id=0,umax_value=267431935,var_off=(0x0; 0xfffffff)) R9_w=invP245 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1007616 R2_w=inv(id=0,umax_value=267431935,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1003521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1007616 R8_w=inv(id=0,umin_value=4096,umax_value=267431935,var_off=(0x0; 0xfffffff)) R9_w=invP245 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1003521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1007616 R8_w=inv(id=0,umin_value=4096,umax_value=267431935,var_off=(0x0; 0xfffffff)) R9_w=invP245 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1011712 R6=inv(id=2,umin_value=1007617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1007616 R8_w=inv(id=0,umax_value=267427839,var_off=(0x0; 0xfffffff)) R9_w=invP246 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1011712 R2_w=inv(id=0,umax_value=267427839,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1007617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1011712 R8_w=inv(id=0,umin_value=4096,umax_value=267427839,var_off=(0x0; 0xfffffff)) R9_w=invP246 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1007617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1011712 R8_w=inv(id=0,umin_value=4096,umax_value=267427839,var_off=(0x0; 0xfffffff)) R9_w=invP246 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1015808 R6=inv(id=2,umin_value=1011713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1011712 R8_w=inv(id=0,umax_value=267423743,var_off=(0x0; 0xfffffff)) R9_w=invP247 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1015808 R2_w=inv(id=0,umax_value=267423743,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1011713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1015808 R8_w=inv(id=0,umin_value=4096,umax_value=267423743,var_off=(0x0; 0xfffffff)) R9_w=invP247 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1011713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1015808 R8_w=inv(id=0,umin_value=4096,umax_value=267423743,var_off=(0x0; 0xfffffff)) R9_w=invP247 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1019904 R6=inv(id=2,umin_value=1015809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1015808 R8=inv(id=0,umax_value=267419647,var_off=(0x0; 0xfffffff)) R9=invP248 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1019904 R2_w=inv(id=0,umax_value=267419647,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1015809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1019904 R8=inv(id=0,umin_value=4096,umax_value=267419647,var_off=(0x0; 0xfffffff)) R9=invP248 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1015809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1019904 R8=inv(id=0,umin_value=4096,umax_value=267419647,var_off=(0x0; 0xfffffff)) R9=invP248 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1024000 R6=inv(id=2,umin_value=1019905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1019904 R8_w=inv(id=0,umax_value=267415551,var_off=(0x0; 0xfffffff)) R9_w=invP249 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1024000 R2_w=inv(id=0,umax_value=267415551,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1019905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1024000 R8_w=inv(id=0,umin_value=4096,umax_value=267415551,var_off=(0x0; 0xfffffff)) R9_w=invP249 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1019905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1024000 R8_w=inv(id=0,umin_value=4096,umax_value=267415551,var_off=(0x0; 0xfffffff)) R9_w=invP249 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1028096 R6=inv(id=2,umin_value=1024001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1024000 R8_w=inv(id=0,umax_value=267411455,var_off=(0x0; 0xfffffff)) R9_w=invP250 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1028096 R2_w=inv(id=0,umax_value=267411455,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1024001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1028096 R8_w=inv(id=0,umin_value=4096,umax_value=267411455,var_off=(0x0; 0xfffffff)) R9_w=invP250 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1024001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1028096 R8_w=inv(id=0,umin_value=4096,umax_value=267411455,var_off=(0x0; 0xfffffff)) R9_w=invP250 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1032192 R6=inv(id=2,umin_value=1028097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1028096 R8_w=inv(id=0,umax_value=267407359,var_off=(0x0; 0xfffffff)) R9_w=invP251 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1032192 R2_w=inv(id=0,umax_value=267407359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1028097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1032192 R8_w=inv(id=0,umin_value=4096,umax_value=267407359,var_off=(0x0; 0xfffffff)) R9_w=invP251 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1028097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1032192 R8_w=inv(id=0,umin_value=4096,umax_value=267407359,var_off=(0x0; 0xfffffff)) R9_w=invP251 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1036288 R6=inv(id=2,umin_value=1032193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1032192 R8=inv(id=0,umax_value=267403263,var_off=(0x0; 0xfffffff)) R9=invP252 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1036288 R2_w=inv(id=0,umax_value=267403263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1032193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1036288 R8=inv(id=0,umin_value=4096,umax_value=267403263,var_off=(0x0; 0xfffffff)) R9=invP252 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1032193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1036288 R8=inv(id=0,umin_value=4096,umax_value=267403263,var_off=(0x0; 0xfffffff)) R9=invP252 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1040384 R6=inv(id=2,umin_value=1036289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1036288 R8_w=inv(id=0,umax_value=267399167,var_off=(0x0; 0xfffffff)) R9_w=invP253 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1040384 R2_w=inv(id=0,umax_value=267399167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1036289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1040384 R8_w=inv(id=0,umin_value=4096,umax_value=267399167,var_off=(0x0; 0xfffffff)) R9_w=invP253 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1036289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1040384 R8_w=inv(id=0,umin_value=4096,umax_value=267399167,var_off=(0x0; 0xfffffff)) R9_w=invP253 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1044480 R6=inv(id=2,umin_value=1040385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1040384 R8_w=inv(id=0,umax_value=267395071,var_off=(0x0; 0xfffffff)) R9_w=invP254 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1044480 R2_w=inv(id=0,umax_value=267395071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1040385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1044480 R8_w=inv(id=0,umin_value=4096,umax_value=267395071,var_off=(0x0; 0xfffffff)) R9_w=invP254 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1040385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1044480 R8_w=inv(id=0,umin_value=4096,umax_value=267395071,var_off=(0x0; 0xfffffff)) R9_w=invP254 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1048576 R6=inv(id=2,umin_value=1044481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1044480 R8_w=inv(id=0,umax_value=267390975,var_off=(0x0; 0xfffffff)) R9_w=invP255 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1048576 R2_w=inv(id=0,umax_value=267390975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1044481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1048576 R8_w=inv(id=0,umin_value=4096,umax_value=267390975,var_off=(0x0; 0xfffffff)) R9_w=invP255 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1044481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1048576 R8_w=inv(id=0,umin_value=4096,umax_value=267390975,var_off=(0x0; 0xfffffff)) R9_w=invP255 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1052672 R6=inv(id=2,umin_value=1048577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1048576 R8=inv(id=0,umax_value=267386879,var_off=(0x0; 0xfffffff)) R9=invP256 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1052672 R2_w=inv(id=0,umax_value=267386879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1048577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1052672 R8=inv(id=0,umin_value=4096,umax_value=267386879,var_off=(0x0; 0xfffffff)) R9=invP256 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1048577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1052672 R8=inv(id=0,umin_value=4096,umax_value=267386879,var_off=(0x0; 0xfffffff)) R9=invP256 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1056768 R6=inv(id=2,umin_value=1052673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1052672 R8_w=inv(id=0,umax_value=267382783,var_off=(0x0; 0xfffffff)) R9_w=invP257 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1056768 R2_w=inv(id=0,umax_value=267382783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1052673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1056768 R8_w=inv(id=0,umin_value=4096,umax_value=267382783,var_off=(0x0; 0xfffffff)) R9_w=invP257 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1052673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1056768 R8_w=inv(id=0,umin_value=4096,umax_value=267382783,var_off=(0x0; 0xfffffff)) R9_w=invP257 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1060864 R6=inv(id=2,umin_value=1056769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1056768 R8_w=inv(id=0,umax_value=267378687,var_off=(0x0; 0xfffffff)) R9_w=invP258 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1060864 R2_w=inv(id=0,umax_value=267378687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1056769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1060864 R8_w=inv(id=0,umin_value=4096,umax_value=267378687,var_off=(0x0; 0xfffffff)) R9_w=invP258 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1056769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1060864 R8_w=inv(id=0,umin_value=4096,umax_value=267378687,var_off=(0x0; 0xfffffff)) R9_w=invP258 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1064960 R6=inv(id=2,umin_value=1060865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1060864 R8_w=inv(id=0,umax_value=267374591,var_off=(0x0; 0xfffffff)) R9_w=invP259 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1064960 R2_w=inv(id=0,umax_value=267374591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1060865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1064960 R8_w=inv(id=0,umin_value=4096,umax_value=267374591,var_off=(0x0; 0xfffffff)) R9_w=invP259 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1060865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1064960 R8_w=inv(id=0,umin_value=4096,umax_value=267374591,var_off=(0x0; 0xfffffff)) R9_w=invP259 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1069056 R6=inv(id=2,umin_value=1064961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1064960 R8=inv(id=0,umax_value=267370495,var_off=(0x0; 0xfffffff)) R9=invP260 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1069056 R2_w=inv(id=0,umax_value=267370495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1064961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1069056 R8=inv(id=0,umin_value=4096,umax_value=267370495,var_off=(0x0; 0xfffffff)) R9=invP260 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1064961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1069056 R8=inv(id=0,umin_value=4096,umax_value=267370495,var_off=(0x0; 0xfffffff)) R9=invP260 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1073152 R6=inv(id=2,umin_value=1069057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1069056 R8_w=inv(id=0,umax_value=267366399,var_off=(0x0; 0xfffffff)) R9_w=invP261 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1073152 R2_w=inv(id=0,umax_value=267366399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1069057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1073152 R8_w=inv(id=0,umin_value=4096,umax_value=267366399,var_off=(0x0; 0xfffffff)) R9_w=invP261 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1069057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1073152 R8_w=inv(id=0,umin_value=4096,umax_value=267366399,var_off=(0x0; 0xfffffff)) R9_w=invP261 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1077248 R6=inv(id=2,umin_value=1073153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1073152 R8_w=inv(id=0,umax_value=267362303,var_off=(0x0; 0xfffffff)) R9_w=invP262 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1077248 R2_w=inv(id=0,umax_value=267362303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1073153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1077248 R8_w=inv(id=0,umin_value=4096,umax_value=267362303,var_off=(0x0; 0xfffffff)) R9_w=invP262 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1073153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1077248 R8_w=inv(id=0,umin_value=4096,umax_value=267362303,var_off=(0x0; 0xfffffff)) R9_w=invP262 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1081344 R6=inv(id=2,umin_value=1077249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1077248 R8_w=inv(id=0,umax_value=267358207,var_off=(0x0; 0xfffffff)) R9_w=invP263 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1081344 R2_w=inv(id=0,umax_value=267358207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1077249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1081344 R8_w=inv(id=0,umin_value=4096,umax_value=267358207,var_off=(0x0; 0xfffffff)) R9_w=invP263 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1077249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1081344 R8_w=inv(id=0,umin_value=4096,umax_value=267358207,var_off=(0x0; 0xfffffff)) R9_w=invP263 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1085440 R6=inv(id=2,umin_value=1081345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1081344 R8=inv(id=0,umax_value=267354111,var_off=(0x0; 0xfffffff)) R9=invP264 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1085440 R2_w=inv(id=0,umax_value=267354111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1081345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1085440 R8=inv(id=0,umin_value=4096,umax_value=267354111,var_off=(0x0; 0xfffffff)) R9=invP264 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1081345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1085440 R8=inv(id=0,umin_value=4096,umax_value=267354111,var_off=(0x0; 0xfffffff)) R9=invP264 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1089536 R6=inv(id=2,umin_value=1085441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1085440 R8_w=inv(id=0,umax_value=267350015,var_off=(0x0; 0xfffffff)) R9_w=invP265 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1089536 R2_w=inv(id=0,umax_value=267350015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1085441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1089536 R8_w=inv(id=0,umin_value=4096,umax_value=267350015,var_off=(0x0; 0xfffffff)) R9_w=invP265 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1085441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1089536 R8_w=inv(id=0,umin_value=4096,umax_value=267350015,var_off=(0x0; 0xfffffff)) R9_w=invP265 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1093632 R6=inv(id=2,umin_value=1089537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1089536 R8_w=inv(id=0,umax_value=267345919,var_off=(0x0; 0xfffffff)) R9_w=invP266 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1093632 R2_w=inv(id=0,umax_value=267345919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1089537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1093632 R8_w=inv(id=0,umin_value=4096,umax_value=267345919,var_off=(0x0; 0xfffffff)) R9_w=invP266 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1089537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1093632 R8_w=inv(id=0,umin_value=4096,umax_value=267345919,var_off=(0x0; 0xfffffff)) R9_w=invP266 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1097728 R6=inv(id=2,umin_value=1093633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1093632 R8_w=inv(id=0,umax_value=267341823,var_off=(0x0; 0xfffffff)) R9_w=invP267 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1097728 R2_w=inv(id=0,umax_value=267341823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1093633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1097728 R8_w=inv(id=0,umin_value=4096,umax_value=267341823,var_off=(0x0; 0xfffffff)) R9_w=invP267 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1093633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1097728 R8_w=inv(id=0,umin_value=4096,umax_value=267341823,var_off=(0x0; 0xfffffff)) R9_w=invP267 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1101824 R6=inv(id=2,umin_value=1097729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1097728 R8=inv(id=0,umax_value=267337727,var_off=(0x0; 0xfffffff)) R9=invP268 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1101824 R2_w=inv(id=0,umax_value=267337727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1097729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1101824 R8=inv(id=0,umin_value=4096,umax_value=267337727,var_off=(0x0; 0xfffffff)) R9=invP268 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1097729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1101824 R8=inv(id=0,umin_value=4096,umax_value=267337727,var_off=(0x0; 0xfffffff)) R9=invP268 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1105920 R6=inv(id=2,umin_value=1101825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1101824 R8_w=inv(id=0,umax_value=267333631,var_off=(0x0; 0xfffffff)) R9_w=invP269 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1105920 R2_w=inv(id=0,umax_value=267333631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1101825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1105920 R8_w=inv(id=0,umin_value=4096,umax_value=267333631,var_off=(0x0; 0xfffffff)) R9_w=invP269 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1101825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1105920 R8_w=inv(id=0,umin_value=4096,umax_value=267333631,var_off=(0x0; 0xfffffff)) R9_w=invP269 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1110016 R6=inv(id=2,umin_value=1105921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1105920 R8_w=inv(id=0,umax_value=267329535,var_off=(0x0; 0xfffffff)) R9_w=invP270 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1110016 R2_w=inv(id=0,umax_value=267329535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1105921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1110016 R8_w=inv(id=0,umin_value=4096,umax_value=267329535,var_off=(0x0; 0xfffffff)) R9_w=invP270 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1105921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1110016 R8_w=inv(id=0,umin_value=4096,umax_value=267329535,var_off=(0x0; 0xfffffff)) R9_w=invP270 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1114112 R6=inv(id=2,umin_value=1110017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1110016 R8_w=inv(id=0,umax_value=267325439,var_off=(0x0; 0xfffffff)) R9_w=invP271 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1114112 R2_w=inv(id=0,umax_value=267325439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1110017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1114112 R8_w=inv(id=0,umin_value=4096,umax_value=267325439,var_off=(0x0; 0xfffffff)) R9_w=invP271 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1110017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1114112 R8_w=inv(id=0,umin_value=4096,umax_value=267325439,var_off=(0x0; 0xfffffff)) R9_w=invP271 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1118208 R6=inv(id=2,umin_value=1114113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1114112 R8=inv(id=0,umax_value=267321343,var_off=(0x0; 0xfffffff)) R9=invP272 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1118208 R2_w=inv(id=0,umax_value=267321343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1114113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1118208 R8=inv(id=0,umin_value=4096,umax_value=267321343,var_off=(0x0; 0xfffffff)) R9=invP272 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1114113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1118208 R8=inv(id=0,umin_value=4096,umax_value=267321343,var_off=(0x0; 0xfffffff)) R9=invP272 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1122304 R6=inv(id=2,umin_value=1118209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1118208 R8_w=inv(id=0,umax_value=267317247,var_off=(0x0; 0xfffffff)) R9_w=invP273 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1122304 R2_w=inv(id=0,umax_value=267317247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1118209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1122304 R8_w=inv(id=0,umin_value=4096,umax_value=267317247,var_off=(0x0; 0xfffffff)) R9_w=invP273 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1118209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1122304 R8_w=inv(id=0,umin_value=4096,umax_value=267317247,var_off=(0x0; 0xfffffff)) R9_w=invP273 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1126400 R6=inv(id=2,umin_value=1122305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1122304 R8_w=inv(id=0,umax_value=267313151,var_off=(0x0; 0xfffffff)) R9_w=invP274 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1126400 R2_w=inv(id=0,umax_value=267313151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1122305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1126400 R8_w=inv(id=0,umin_value=4096,umax_value=267313151,var_off=(0x0; 0xfffffff)) R9_w=invP274 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1122305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1126400 R8_w=inv(id=0,umin_value=4096,umax_value=267313151,var_off=(0x0; 0xfffffff)) R9_w=invP274 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1130496 R6=inv(id=2,umin_value=1126401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1126400 R8_w=inv(id=0,umax_value=267309055,var_off=(0x0; 0xfffffff)) R9_w=invP275 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1130496 R2_w=inv(id=0,umax_value=267309055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1126401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1130496 R8_w=inv(id=0,umin_value=4096,umax_value=267309055,var_off=(0x0; 0xfffffff)) R9_w=invP275 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1126401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1130496 R8_w=inv(id=0,umin_value=4096,umax_value=267309055,var_off=(0x0; 0xfffffff)) R9_w=invP275 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1134592 R6=inv(id=2,umin_value=1130497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1130496 R8=inv(id=0,umax_value=267304959,var_off=(0x0; 0xfffffff)) R9=invP276 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1134592 R2_w=inv(id=0,umax_value=267304959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1130497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1134592 R8=inv(id=0,umin_value=4096,umax_value=267304959,var_off=(0x0; 0xfffffff)) R9=invP276 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1130497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1134592 R8=inv(id=0,umin_value=4096,umax_value=267304959,var_off=(0x0; 0xfffffff)) R9=invP276 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1138688 R6=inv(id=2,umin_value=1134593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1134592 R8_w=inv(id=0,umax_value=267300863,var_off=(0x0; 0xfffffff)) R9_w=invP277 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1138688 R2_w=inv(id=0,umax_value=267300863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1134593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1138688 R8_w=inv(id=0,umin_value=4096,umax_value=267300863,var_off=(0x0; 0xfffffff)) R9_w=invP277 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1134593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1138688 R8_w=inv(id=0,umin_value=4096,umax_value=267300863,var_off=(0x0; 0xfffffff)) R9_w=invP277 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1142784 R6=inv(id=2,umin_value=1138689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1138688 R8_w=inv(id=0,umax_value=267296767,var_off=(0x0; 0xfffffff)) R9_w=invP278 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1142784 R2_w=inv(id=0,umax_value=267296767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1138689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1142784 R8_w=inv(id=0,umin_value=4096,umax_value=267296767,var_off=(0x0; 0xfffffff)) R9_w=invP278 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1138689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1142784 R8_w=inv(id=0,umin_value=4096,umax_value=267296767,var_off=(0x0; 0xfffffff)) R9_w=invP278 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1146880 R6=inv(id=2,umin_value=1142785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1142784 R8_w=inv(id=0,umax_value=267292671,var_off=(0x0; 0xfffffff)) R9_w=invP279 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1146880 R2_w=inv(id=0,umax_value=267292671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1142785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1146880 R8_w=inv(id=0,umin_value=4096,umax_value=267292671,var_off=(0x0; 0xfffffff)) R9_w=invP279 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1142785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1146880 R8_w=inv(id=0,umin_value=4096,umax_value=267292671,var_off=(0x0; 0xfffffff)) R9_w=invP279 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1150976 R6=inv(id=2,umin_value=1146881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1146880 R8=inv(id=0,umax_value=267288575,var_off=(0x0; 0xfffffff)) R9=invP280 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1150976 R2_w=inv(id=0,umax_value=267288575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1146881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1150976 R8=inv(id=0,umin_value=4096,umax_value=267288575,var_off=(0x0; 0xfffffff)) R9=invP280 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1146881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1150976 R8=inv(id=0,umin_value=4096,umax_value=267288575,var_off=(0x0; 0xfffffff)) R9=invP280 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1155072 R6=inv(id=2,umin_value=1150977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1150976 R8_w=inv(id=0,umax_value=267284479,var_off=(0x0; 0xfffffff)) R9_w=invP281 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1155072 R2_w=inv(id=0,umax_value=267284479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1150977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1155072 R8_w=inv(id=0,umin_value=4096,umax_value=267284479,var_off=(0x0; 0xfffffff)) R9_w=invP281 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1150977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1155072 R8_w=inv(id=0,umin_value=4096,umax_value=267284479,var_off=(0x0; 0xfffffff)) R9_w=invP281 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1159168 R6=inv(id=2,umin_value=1155073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1155072 R8_w=inv(id=0,umax_value=267280383,var_off=(0x0; 0xfffffff)) R9_w=invP282 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1159168 R2_w=inv(id=0,umax_value=267280383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1155073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1159168 R8_w=inv(id=0,umin_value=4096,umax_value=267280383,var_off=(0x0; 0xfffffff)) R9_w=invP282 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1155073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1159168 R8_w=inv(id=0,umin_value=4096,umax_value=267280383,var_off=(0x0; 0xfffffff)) R9_w=invP282 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1163264 R6=inv(id=2,umin_value=1159169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1159168 R8_w=inv(id=0,umax_value=267276287,var_off=(0x0; 0xfffffff)) R9_w=invP283 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1163264 R2_w=inv(id=0,umax_value=267276287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1159169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1163264 R8_w=inv(id=0,umin_value=4096,umax_value=267276287,var_off=(0x0; 0xfffffff)) R9_w=invP283 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1159169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1163264 R8_w=inv(id=0,umin_value=4096,umax_value=267276287,var_off=(0x0; 0xfffffff)) R9_w=invP283 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1167360 R6=inv(id=2,umin_value=1163265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1163264 R8=inv(id=0,umax_value=267272191,var_off=(0x0; 0xfffffff)) R9=invP284 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1167360 R2_w=inv(id=0,umax_value=267272191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1163265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1167360 R8=inv(id=0,umin_value=4096,umax_value=267272191,var_off=(0x0; 0xfffffff)) R9=invP284 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1163265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1167360 R8=inv(id=0,umin_value=4096,umax_value=267272191,var_off=(0x0; 0xfffffff)) R9=invP284 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1171456 R6=inv(id=2,umin_value=1167361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1167360 R8_w=inv(id=0,umax_value=267268095,var_off=(0x0; 0xfffffff)) R9_w=invP285 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1171456 R2_w=inv(id=0,umax_value=267268095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1167361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1171456 R8_w=inv(id=0,umin_value=4096,umax_value=267268095,var_off=(0x0; 0xfffffff)) R9_w=invP285 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1167361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1171456 R8_w=inv(id=0,umin_value=4096,umax_value=267268095,var_off=(0x0; 0xfffffff)) R9_w=invP285 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1175552 R6=inv(id=2,umin_value=1171457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1171456 R8_w=inv(id=0,umax_value=267263999,var_off=(0x0; 0xfffffff)) R9_w=invP286 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1175552 R2_w=inv(id=0,umax_value=267263999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1171457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1175552 R8_w=inv(id=0,umin_value=4096,umax_value=267263999,var_off=(0x0; 0xfffffff)) R9_w=invP286 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1171457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1175552 R8_w=inv(id=0,umin_value=4096,umax_value=267263999,var_off=(0x0; 0xfffffff)) R9_w=invP286 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1179648 R6=inv(id=2,umin_value=1175553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1175552 R8_w=inv(id=0,umax_value=267259903,var_off=(0x0; 0xfffffff)) R9_w=invP287 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1179648 R2_w=inv(id=0,umax_value=267259903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1175553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1179648 R8_w=inv(id=0,umin_value=4096,umax_value=267259903,var_off=(0x0; 0xfffffff)) R9_w=invP287 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1175553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1179648 R8_w=inv(id=0,umin_value=4096,umax_value=267259903,var_off=(0x0; 0xfffffff)) R9_w=invP287 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1183744 R6=inv(id=2,umin_value=1179649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1179648 R8=inv(id=0,umax_value=267255807,var_off=(0x0; 0xfffffff)) R9=invP288 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1183744 R2_w=inv(id=0,umax_value=267255807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1179649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1183744 R8=inv(id=0,umin_value=4096,umax_value=267255807,var_off=(0x0; 0xfffffff)) R9=invP288 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1179649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1183744 R8=inv(id=0,umin_value=4096,umax_value=267255807,var_off=(0x0; 0xfffffff)) R9=invP288 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1187840 R6=inv(id=2,umin_value=1183745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1183744 R8_w=inv(id=0,umax_value=267251711,var_off=(0x0; 0xfffffff)) R9_w=invP289 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1187840 R2_w=inv(id=0,umax_value=267251711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1183745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1187840 R8_w=inv(id=0,umin_value=4096,umax_value=267251711,var_off=(0x0; 0xfffffff)) R9_w=invP289 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1183745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1187840 R8_w=inv(id=0,umin_value=4096,umax_value=267251711,var_off=(0x0; 0xfffffff)) R9_w=invP289 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1191936 R6=inv(id=2,umin_value=1187841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1187840 R8_w=inv(id=0,umax_value=267247615,var_off=(0x0; 0xfffffff)) R9_w=invP290 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1191936 R2_w=inv(id=0,umax_value=267247615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1187841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1191936 R8_w=inv(id=0,umin_value=4096,umax_value=267247615,var_off=(0x0; 0xfffffff)) R9_w=invP290 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1187841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1191936 R8_w=inv(id=0,umin_value=4096,umax_value=267247615,var_off=(0x0; 0xfffffff)) R9_w=invP290 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1196032 R6=inv(id=2,umin_value=1191937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1191936 R8_w=inv(id=0,umax_value=267243519,var_off=(0x0; 0xfffffff)) R9_w=invP291 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1196032 R2_w=inv(id=0,umax_value=267243519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1191937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1196032 R8_w=inv(id=0,umin_value=4096,umax_value=267243519,var_off=(0x0; 0xfffffff)) R9_w=invP291 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1191937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1196032 R8_w=inv(id=0,umin_value=4096,umax_value=267243519,var_off=(0x0; 0xfffffff)) R9_w=invP291 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1200128 R6=inv(id=2,umin_value=1196033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1196032 R8=inv(id=0,umax_value=267239423,var_off=(0x0; 0xfffffff)) R9=invP292 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1200128 R2_w=inv(id=0,umax_value=267239423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1196033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1200128 R8=inv(id=0,umin_value=4096,umax_value=267239423,var_off=(0x0; 0xfffffff)) R9=invP292 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1196033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1200128 R8=inv(id=0,umin_value=4096,umax_value=267239423,var_off=(0x0; 0xfffffff)) R9=invP292 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1204224 R6=inv(id=2,umin_value=1200129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1200128 R8_w=inv(id=0,umax_value=267235327,var_off=(0x0; 0xfffffff)) R9_w=invP293 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1204224 R2_w=inv(id=0,umax_value=267235327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1200129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1204224 R8_w=inv(id=0,umin_value=4096,umax_value=267235327,var_off=(0x0; 0xfffffff)) R9_w=invP293 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1200129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1204224 R8_w=inv(id=0,umin_value=4096,umax_value=267235327,var_off=(0x0; 0xfffffff)) R9_w=invP293 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1208320 R6=inv(id=2,umin_value=1204225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1204224 R8_w=inv(id=0,umax_value=267231231,var_off=(0x0; 0xfffffff)) R9_w=invP294 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1208320 R2_w=inv(id=0,umax_value=267231231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1204225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1208320 R8_w=inv(id=0,umin_value=4096,umax_value=267231231,var_off=(0x0; 0xfffffff)) R9_w=invP294 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1204225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1208320 R8_w=inv(id=0,umin_value=4096,umax_value=267231231,var_off=(0x0; 0xfffffff)) R9_w=invP294 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1212416 R6=inv(id=2,umin_value=1208321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1208320 R8_w=inv(id=0,umax_value=267227135,var_off=(0x0; 0xfffffff)) R9_w=invP295 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1212416 R2_w=inv(id=0,umax_value=267227135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1208321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1212416 R8_w=inv(id=0,umin_value=4096,umax_value=267227135,var_off=(0x0; 0xfffffff)) R9_w=invP295 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1208321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1212416 R8_w=inv(id=0,umin_value=4096,umax_value=267227135,var_off=(0x0; 0xfffffff)) R9_w=invP295 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1216512 R6=inv(id=2,umin_value=1212417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1212416 R8=inv(id=0,umax_value=267223039,var_off=(0x0; 0xfffffff)) R9=invP296 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1216512 R2_w=inv(id=0,umax_value=267223039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1212417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1216512 R8=inv(id=0,umin_value=4096,umax_value=267223039,var_off=(0x0; 0xfffffff)) R9=invP296 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1212417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1216512 R8=inv(id=0,umin_value=4096,umax_value=267223039,var_off=(0x0; 0xfffffff)) R9=invP296 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1220608 R6=inv(id=2,umin_value=1216513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1216512 R8_w=inv(id=0,umax_value=267218943,var_off=(0x0; 0xfffffff)) R9_w=invP297 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1220608 R2_w=inv(id=0,umax_value=267218943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1216513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1220608 R8_w=inv(id=0,umin_value=4096,umax_value=267218943,var_off=(0x0; 0xfffffff)) R9_w=invP297 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1216513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1220608 R8_w=inv(id=0,umin_value=4096,umax_value=267218943,var_off=(0x0; 0xfffffff)) R9_w=invP297 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1224704 R6=inv(id=2,umin_value=1220609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1220608 R8_w=inv(id=0,umax_value=267214847,var_off=(0x0; 0xfffffff)) R9_w=invP298 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1224704 R2_w=inv(id=0,umax_value=267214847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1220609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1224704 R8_w=inv(id=0,umin_value=4096,umax_value=267214847,var_off=(0x0; 0xfffffff)) R9_w=invP298 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1220609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1224704 R8_w=inv(id=0,umin_value=4096,umax_value=267214847,var_off=(0x0; 0xfffffff)) R9_w=invP298 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1228800 R6=inv(id=2,umin_value=1224705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1224704 R8_w=inv(id=0,umax_value=267210751,var_off=(0x0; 0xfffffff)) R9_w=invP299 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1228800 R2_w=inv(id=0,umax_value=267210751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1224705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1228800 R8_w=inv(id=0,umin_value=4096,umax_value=267210751,var_off=(0x0; 0xfffffff)) R9_w=invP299 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1224705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1228800 R8_w=inv(id=0,umin_value=4096,umax_value=267210751,var_off=(0x0; 0xfffffff)) R9_w=invP299 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1232896 R6=inv(id=2,umin_value=1228801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1228800 R8=inv(id=0,umax_value=267206655,var_off=(0x0; 0xfffffff)) R9=invP300 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1232896 R2_w=inv(id=0,umax_value=267206655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1228801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1232896 R8=inv(id=0,umin_value=4096,umax_value=267206655,var_off=(0x0; 0xfffffff)) R9=invP300 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1228801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1232896 R8=inv(id=0,umin_value=4096,umax_value=267206655,var_off=(0x0; 0xfffffff)) R9=invP300 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1236992 R6=inv(id=2,umin_value=1232897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1232896 R8_w=inv(id=0,umax_value=267202559,var_off=(0x0; 0xfffffff)) R9_w=invP301 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1236992 R2_w=inv(id=0,umax_value=267202559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1232897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1236992 R8_w=inv(id=0,umin_value=4096,umax_value=267202559,var_off=(0x0; 0xfffffff)) R9_w=invP301 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1232897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1236992 R8_w=inv(id=0,umin_value=4096,umax_value=267202559,var_off=(0x0; 0xfffffff)) R9_w=invP301 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1241088 R6=inv(id=2,umin_value=1236993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1236992 R8_w=inv(id=0,umax_value=267198463,var_off=(0x0; 0xfffffff)) R9_w=invP302 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1241088 R2_w=inv(id=0,umax_value=267198463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1236993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1241088 R8_w=inv(id=0,umin_value=4096,umax_value=267198463,var_off=(0x0; 0xfffffff)) R9_w=invP302 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1236993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1241088 R8_w=inv(id=0,umin_value=4096,umax_value=267198463,var_off=(0x0; 0xfffffff)) R9_w=invP302 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1245184 R6=inv(id=2,umin_value=1241089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1241088 R8_w=inv(id=0,umax_value=267194367,var_off=(0x0; 0xfffffff)) R9_w=invP303 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1245184 R2_w=inv(id=0,umax_value=267194367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1241089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1245184 R8_w=inv(id=0,umin_value=4096,umax_value=267194367,var_off=(0x0; 0xfffffff)) R9_w=invP303 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1241089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1245184 R8_w=inv(id=0,umin_value=4096,umax_value=267194367,var_off=(0x0; 0xfffffff)) R9_w=invP303 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1249280 R6=inv(id=2,umin_value=1245185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1245184 R8=inv(id=0,umax_value=267190271,var_off=(0x0; 0xfffffff)) R9=invP304 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1249280 R2_w=inv(id=0,umax_value=267190271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1245185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1249280 R8=inv(id=0,umin_value=4096,umax_value=267190271,var_off=(0x0; 0xfffffff)) R9=invP304 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1245185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1249280 R8=inv(id=0,umin_value=4096,umax_value=267190271,var_off=(0x0; 0xfffffff)) R9=invP304 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1253376 R6=inv(id=2,umin_value=1249281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1249280 R8_w=inv(id=0,umax_value=267186175,var_off=(0x0; 0xfffffff)) R9_w=invP305 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1253376 R2_w=inv(id=0,umax_value=267186175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1249281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1253376 R8_w=inv(id=0,umin_value=4096,umax_value=267186175,var_off=(0x0; 0xfffffff)) R9_w=invP305 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1249281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1253376 R8_w=inv(id=0,umin_value=4096,umax_value=267186175,var_off=(0x0; 0xfffffff)) R9_w=invP305 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1257472 R6=inv(id=2,umin_value=1253377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1253376 R8_w=inv(id=0,umax_value=267182079,var_off=(0x0; 0xfffffff)) R9_w=invP306 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1257472 R2_w=inv(id=0,umax_value=267182079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1253377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1257472 R8_w=inv(id=0,umin_value=4096,umax_value=267182079,var_off=(0x0; 0xfffffff)) R9_w=invP306 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1253377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1257472 R8_w=inv(id=0,umin_value=4096,umax_value=267182079,var_off=(0x0; 0xfffffff)) R9_w=invP306 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1261568 R6=inv(id=2,umin_value=1257473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1257472 R8_w=inv(id=0,umax_value=267177983,var_off=(0x0; 0xfffffff)) R9_w=invP307 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1261568 R2_w=inv(id=0,umax_value=267177983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1257473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1261568 R8_w=inv(id=0,umin_value=4096,umax_value=267177983,var_off=(0x0; 0xfffffff)) R9_w=invP307 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1257473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1261568 R8_w=inv(id=0,umin_value=4096,umax_value=267177983,var_off=(0x0; 0xfffffff)) R9_w=invP307 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1265664 R6=inv(id=2,umin_value=1261569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1261568 R8=inv(id=0,umax_value=267173887,var_off=(0x0; 0xfffffff)) R9=invP308 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1265664 R2_w=inv(id=0,umax_value=267173887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1261569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1265664 R8=inv(id=0,umin_value=4096,umax_value=267173887,var_off=(0x0; 0xfffffff)) R9=invP308 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1261569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1265664 R8=inv(id=0,umin_value=4096,umax_value=267173887,var_off=(0x0; 0xfffffff)) R9=invP308 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1269760 R6=inv(id=2,umin_value=1265665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1265664 R8_w=inv(id=0,umax_value=267169791,var_off=(0x0; 0xfffffff)) R9_w=invP309 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1269760 R2_w=inv(id=0,umax_value=267169791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1265665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1269760 R8_w=inv(id=0,umin_value=4096,umax_value=267169791,var_off=(0x0; 0xfffffff)) R9_w=invP309 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1265665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1269760 R8_w=inv(id=0,umin_value=4096,umax_value=267169791,var_off=(0x0; 0xfffffff)) R9_w=invP309 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1273856 R6=inv(id=2,umin_value=1269761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1269760 R8_w=inv(id=0,umax_value=267165695,var_off=(0x0; 0xfffffff)) R9_w=invP310 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1273856 R2_w=inv(id=0,umax_value=267165695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1269761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1273856 R8_w=inv(id=0,umin_value=4096,umax_value=267165695,var_off=(0x0; 0xfffffff)) R9_w=invP310 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1269761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1273856 R8_w=inv(id=0,umin_value=4096,umax_value=267165695,var_off=(0x0; 0xfffffff)) R9_w=invP310 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1277952 R6=inv(id=2,umin_value=1273857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1273856 R8_w=inv(id=0,umax_value=267161599,var_off=(0x0; 0xfffffff)) R9_w=invP311 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1277952 R2_w=inv(id=0,umax_value=267161599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1273857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1277952 R8_w=inv(id=0,umin_value=4096,umax_value=267161599,var_off=(0x0; 0xfffffff)) R9_w=invP311 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1273857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1277952 R8_w=inv(id=0,umin_value=4096,umax_value=267161599,var_off=(0x0; 0xfffffff)) R9_w=invP311 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1282048 R6=inv(id=2,umin_value=1277953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1277952 R8=inv(id=0,umax_value=267157503,var_off=(0x0; 0xfffffff)) R9=invP312 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1282048 R2_w=inv(id=0,umax_value=267157503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1277953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1282048 R8=inv(id=0,umin_value=4096,umax_value=267157503,var_off=(0x0; 0xfffffff)) R9=invP312 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1277953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1282048 R8=inv(id=0,umin_value=4096,umax_value=267157503,var_off=(0x0; 0xfffffff)) R9=invP312 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1286144 R6=inv(id=2,umin_value=1282049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1282048 R8_w=inv(id=0,umax_value=267153407,var_off=(0x0; 0xfffffff)) R9_w=invP313 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1286144 R2_w=inv(id=0,umax_value=267153407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1282049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1286144 R8_w=inv(id=0,umin_value=4096,umax_value=267153407,var_off=(0x0; 0xfffffff)) R9_w=invP313 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1282049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1286144 R8_w=inv(id=0,umin_value=4096,umax_value=267153407,var_off=(0x0; 0xfffffff)) R9_w=invP313 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1290240 R6=inv(id=2,umin_value=1286145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1286144 R8_w=inv(id=0,umax_value=267149311,var_off=(0x0; 0xfffffff)) R9_w=invP314 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1290240 R2_w=inv(id=0,umax_value=267149311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1286145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1290240 R8_w=inv(id=0,umin_value=4096,umax_value=267149311,var_off=(0x0; 0xfffffff)) R9_w=invP314 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1286145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1290240 R8_w=inv(id=0,umin_value=4096,umax_value=267149311,var_off=(0x0; 0xfffffff)) R9_w=invP314 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1294336 R6=inv(id=2,umin_value=1290241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1290240 R8_w=inv(id=0,umax_value=267145215,var_off=(0x0; 0xfffffff)) R9_w=invP315 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1294336 R2_w=inv(id=0,umax_value=267145215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1290241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1294336 R8_w=inv(id=0,umin_value=4096,umax_value=267145215,var_off=(0x0; 0xfffffff)) R9_w=invP315 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1290241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1294336 R8_w=inv(id=0,umin_value=4096,umax_value=267145215,var_off=(0x0; 0xfffffff)) R9_w=invP315 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1298432 R6=inv(id=2,umin_value=1294337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1294336 R8=inv(id=0,umax_value=267141119,var_off=(0x0; 0xfffffff)) R9=invP316 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1298432 R2_w=inv(id=0,umax_value=267141119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1294337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1298432 R8=inv(id=0,umin_value=4096,umax_value=267141119,var_off=(0x0; 0xfffffff)) R9=invP316 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1294337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1298432 R8=inv(id=0,umin_value=4096,umax_value=267141119,var_off=(0x0; 0xfffffff)) R9=invP316 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1302528 R6=inv(id=2,umin_value=1298433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1298432 R8_w=inv(id=0,umax_value=267137023,var_off=(0x0; 0xfffffff)) R9_w=invP317 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1302528 R2_w=inv(id=0,umax_value=267137023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1298433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1302528 R8_w=inv(id=0,umin_value=4096,umax_value=267137023,var_off=(0x0; 0xfffffff)) R9_w=invP317 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1298433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1302528 R8_w=inv(id=0,umin_value=4096,umax_value=267137023,var_off=(0x0; 0xfffffff)) R9_w=invP317 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1306624 R6=inv(id=2,umin_value=1302529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1302528 R8_w=inv(id=0,umax_value=267132927,var_off=(0x0; 0xfffffff)) R9_w=invP318 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1306624 R2_w=inv(id=0,umax_value=267132927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1302529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1306624 R8_w=inv(id=0,umin_value=4096,umax_value=267132927,var_off=(0x0; 0xfffffff)) R9_w=invP318 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1302529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1306624 R8_w=inv(id=0,umin_value=4096,umax_value=267132927,var_off=(0x0; 0xfffffff)) R9_w=invP318 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1310720 R6=inv(id=2,umin_value=1306625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1306624 R8_w=inv(id=0,umax_value=267128831,var_off=(0x0; 0xfffffff)) R9_w=invP319 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1310720 R2_w=inv(id=0,umax_value=267128831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1306625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1310720 R8_w=inv(id=0,umin_value=4096,umax_value=267128831,var_off=(0x0; 0xfffffff)) R9_w=invP319 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1306625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1310720 R8_w=inv(id=0,umin_value=4096,umax_value=267128831,var_off=(0x0; 0xfffffff)) R9_w=invP319 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1314816 R6=inv(id=2,umin_value=1310721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1310720 R8=inv(id=0,umax_value=267124735,var_off=(0x0; 0xfffffff)) R9=invP320 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1314816 R2_w=inv(id=0,umax_value=267124735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1310721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1314816 R8=inv(id=0,umin_value=4096,umax_value=267124735,var_off=(0x0; 0xfffffff)) R9=invP320 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1310721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1314816 R8=inv(id=0,umin_value=4096,umax_value=267124735,var_off=(0x0; 0xfffffff)) R9=invP320 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1318912 R6=inv(id=2,umin_value=1314817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1314816 R8_w=inv(id=0,umax_value=267120639,var_off=(0x0; 0xfffffff)) R9_w=invP321 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1318912 R2_w=inv(id=0,umax_value=267120639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1314817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1318912 R8_w=inv(id=0,umin_value=4096,umax_value=267120639,var_off=(0x0; 0xfffffff)) R9_w=invP321 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1314817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1318912 R8_w=inv(id=0,umin_value=4096,umax_value=267120639,var_off=(0x0; 0xfffffff)) R9_w=invP321 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1323008 R6=inv(id=2,umin_value=1318913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1318912 R8_w=inv(id=0,umax_value=267116543,var_off=(0x0; 0xfffffff)) R9_w=invP322 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1323008 R2_w=inv(id=0,umax_value=267116543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1318913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1323008 R8_w=inv(id=0,umin_value=4096,umax_value=267116543,var_off=(0x0; 0xfffffff)) R9_w=invP322 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1318913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1323008 R8_w=inv(id=0,umin_value=4096,umax_value=267116543,var_off=(0x0; 0xfffffff)) R9_w=invP322 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1327104 R6=inv(id=2,umin_value=1323009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1323008 R8_w=inv(id=0,umax_value=267112447,var_off=(0x0; 0xfffffff)) R9_w=invP323 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1327104 R2_w=inv(id=0,umax_value=267112447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1323009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1327104 R8_w=inv(id=0,umin_value=4096,umax_value=267112447,var_off=(0x0; 0xfffffff)) R9_w=invP323 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1323009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1327104 R8_w=inv(id=0,umin_value=4096,umax_value=267112447,var_off=(0x0; 0xfffffff)) R9_w=invP323 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1331200 R6=inv(id=2,umin_value=1327105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1327104 R8=inv(id=0,umax_value=267108351,var_off=(0x0; 0xfffffff)) R9=invP324 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1331200 R2_w=inv(id=0,umax_value=267108351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1327105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1331200 R8=inv(id=0,umin_value=4096,umax_value=267108351,var_off=(0x0; 0xfffffff)) R9=invP324 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1327105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1331200 R8=inv(id=0,umin_value=4096,umax_value=267108351,var_off=(0x0; 0xfffffff)) R9=invP324 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1335296 R6=inv(id=2,umin_value=1331201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1331200 R8_w=inv(id=0,umax_value=267104255,var_off=(0x0; 0xfffffff)) R9_w=invP325 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1335296 R2_w=inv(id=0,umax_value=267104255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1331201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1335296 R8_w=inv(id=0,umin_value=4096,umax_value=267104255,var_off=(0x0; 0xfffffff)) R9_w=invP325 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1331201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1335296 R8_w=inv(id=0,umin_value=4096,umax_value=267104255,var_off=(0x0; 0xfffffff)) R9_w=invP325 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1339392 R6=inv(id=2,umin_value=1335297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1335296 R8_w=inv(id=0,umax_value=267100159,var_off=(0x0; 0xfffffff)) R9_w=invP326 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1339392 R2_w=inv(id=0,umax_value=267100159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1335297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1339392 R8_w=inv(id=0,umin_value=4096,umax_value=267100159,var_off=(0x0; 0xfffffff)) R9_w=invP326 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1335297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1339392 R8_w=inv(id=0,umin_value=4096,umax_value=267100159,var_off=(0x0; 0xfffffff)) R9_w=invP326 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1343488 R6=inv(id=2,umin_value=1339393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1339392 R8_w=inv(id=0,umax_value=267096063,var_off=(0x0; 0xfffffff)) R9_w=invP327 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1343488 R2_w=inv(id=0,umax_value=267096063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1339393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1343488 R8_w=inv(id=0,umin_value=4096,umax_value=267096063,var_off=(0x0; 0xfffffff)) R9_w=invP327 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1339393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1343488 R8_w=inv(id=0,umin_value=4096,umax_value=267096063,var_off=(0x0; 0xfffffff)) R9_w=invP327 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1347584 R6=inv(id=2,umin_value=1343489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1343488 R8=inv(id=0,umax_value=267091967,var_off=(0x0; 0xfffffff)) R9=invP328 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1347584 R2_w=inv(id=0,umax_value=267091967,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1343489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1347584 R8=inv(id=0,umin_value=4096,umax_value=267091967,var_off=(0x0; 0xfffffff)) R9=invP328 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1343489,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1347584 R8=inv(id=0,umin_value=4096,umax_value=267091967,var_off=(0x0; 0xfffffff)) R9=invP328 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1351680 R6=inv(id=2,umin_value=1347585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1347584 R8_w=inv(id=0,umax_value=267087871,var_off=(0x0; 0xfffffff)) R9_w=invP329 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1351680 R2_w=inv(id=0,umax_value=267087871,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1347585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1351680 R8_w=inv(id=0,umin_value=4096,umax_value=267087871,var_off=(0x0; 0xfffffff)) R9_w=invP329 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1347585,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1351680 R8_w=inv(id=0,umin_value=4096,umax_value=267087871,var_off=(0x0; 0xfffffff)) R9_w=invP329 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1355776 R6=inv(id=2,umin_value=1351681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1351680 R8_w=inv(id=0,umax_value=267083775,var_off=(0x0; 0xfffffff)) R9_w=invP330 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1355776 R2_w=inv(id=0,umax_value=267083775,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1351681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1355776 R8_w=inv(id=0,umin_value=4096,umax_value=267083775,var_off=(0x0; 0xfffffff)) R9_w=invP330 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1351681,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1355776 R8_w=inv(id=0,umin_value=4096,umax_value=267083775,var_off=(0x0; 0xfffffff)) R9_w=invP330 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1359872 R6=inv(id=2,umin_value=1355777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1355776 R8_w=inv(id=0,umax_value=267079679,var_off=(0x0; 0xfffffff)) R9_w=invP331 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1359872 R2_w=inv(id=0,umax_value=267079679,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1355777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1359872 R8_w=inv(id=0,umin_value=4096,umax_value=267079679,var_off=(0x0; 0xfffffff)) R9_w=invP331 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1355777,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1359872 R8_w=inv(id=0,umin_value=4096,umax_value=267079679,var_off=(0x0; 0xfffffff)) R9_w=invP331 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1363968 R6=inv(id=2,umin_value=1359873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1359872 R8=inv(id=0,umax_value=267075583,var_off=(0x0; 0xfffffff)) R9=invP332 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1363968 R2_w=inv(id=0,umax_value=267075583,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1359873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1363968 R8=inv(id=0,umin_value=4096,umax_value=267075583,var_off=(0x0; 0xfffffff)) R9=invP332 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1359873,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1363968 R8=inv(id=0,umin_value=4096,umax_value=267075583,var_off=(0x0; 0xfffffff)) R9=invP332 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1368064 R6=inv(id=2,umin_value=1363969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1363968 R8_w=inv(id=0,umax_value=267071487,var_off=(0x0; 0xfffffff)) R9_w=invP333 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1368064 R2_w=inv(id=0,umax_value=267071487,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1363969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1368064 R8_w=inv(id=0,umin_value=4096,umax_value=267071487,var_off=(0x0; 0xfffffff)) R9_w=invP333 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1363969,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1368064 R8_w=inv(id=0,umin_value=4096,umax_value=267071487,var_off=(0x0; 0xfffffff)) R9_w=invP333 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1372160 R6=inv(id=2,umin_value=1368065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1368064 R8_w=inv(id=0,umax_value=267067391,var_off=(0x0; 0xfffffff)) R9_w=invP334 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1372160 R2_w=inv(id=0,umax_value=267067391,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1368065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1372160 R8_w=inv(id=0,umin_value=4096,umax_value=267067391,var_off=(0x0; 0xfffffff)) R9_w=invP334 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1368065,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1372160 R8_w=inv(id=0,umin_value=4096,umax_value=267067391,var_off=(0x0; 0xfffffff)) R9_w=invP334 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1376256 R6=inv(id=2,umin_value=1372161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1372160 R8_w=inv(id=0,umax_value=267063295,var_off=(0x0; 0xfffffff)) R9_w=invP335 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1376256 R2_w=inv(id=0,umax_value=267063295,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1372161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1376256 R8_w=inv(id=0,umin_value=4096,umax_value=267063295,var_off=(0x0; 0xfffffff)) R9_w=invP335 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1372161,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1376256 R8_w=inv(id=0,umin_value=4096,umax_value=267063295,var_off=(0x0; 0xfffffff)) R9_w=invP335 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1380352 R6=inv(id=2,umin_value=1376257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1376256 R8=inv(id=0,umax_value=267059199,var_off=(0x0; 0xfffffff)) R9=invP336 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1380352 R2_w=inv(id=0,umax_value=267059199,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1376257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1380352 R8=inv(id=0,umin_value=4096,umax_value=267059199,var_off=(0x0; 0xfffffff)) R9=invP336 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1376257,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1380352 R8=inv(id=0,umin_value=4096,umax_value=267059199,var_off=(0x0; 0xfffffff)) R9=invP336 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1384448 R6=inv(id=2,umin_value=1380353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1380352 R8_w=inv(id=0,umax_value=267055103,var_off=(0x0; 0xfffffff)) R9_w=invP337 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1384448 R2_w=inv(id=0,umax_value=267055103,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1380353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1384448 R8_w=inv(id=0,umin_value=4096,umax_value=267055103,var_off=(0x0; 0xfffffff)) R9_w=invP337 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1380353,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1384448 R8_w=inv(id=0,umin_value=4096,umax_value=267055103,var_off=(0x0; 0xfffffff)) R9_w=invP337 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1388544 R6=inv(id=2,umin_value=1384449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1384448 R8_w=inv(id=0,umax_value=267051007,var_off=(0x0; 0xfffffff)) R9_w=invP338 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1388544 R2_w=inv(id=0,umax_value=267051007,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1384449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1388544 R8_w=inv(id=0,umin_value=4096,umax_value=267051007,var_off=(0x0; 0xfffffff)) R9_w=invP338 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1384449,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1388544 R8_w=inv(id=0,umin_value=4096,umax_value=267051007,var_off=(0x0; 0xfffffff)) R9_w=invP338 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1392640 R6=inv(id=2,umin_value=1388545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1388544 R8_w=inv(id=0,umax_value=267046911,var_off=(0x0; 0xfffffff)) R9_w=invP339 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1392640 R2_w=inv(id=0,umax_value=267046911,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1388545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1392640 R8_w=inv(id=0,umin_value=4096,umax_value=267046911,var_off=(0x0; 0xfffffff)) R9_w=invP339 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1388545,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1392640 R8_w=inv(id=0,umin_value=4096,umax_value=267046911,var_off=(0x0; 0xfffffff)) R9_w=invP339 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1396736 R6=inv(id=2,umin_value=1392641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1392640 R8=inv(id=0,umax_value=267042815,var_off=(0x0; 0xfffffff)) R9=invP340 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1396736 R2_w=inv(id=0,umax_value=267042815,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1392641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1396736 R8=inv(id=0,umin_value=4096,umax_value=267042815,var_off=(0x0; 0xfffffff)) R9=invP340 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1392641,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1396736 R8=inv(id=0,umin_value=4096,umax_value=267042815,var_off=(0x0; 0xfffffff)) R9=invP340 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1400832 R6=inv(id=2,umin_value=1396737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1396736 R8_w=inv(id=0,umax_value=267038719,var_off=(0x0; 0xfffffff)) R9_w=invP341 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1400832 R2_w=inv(id=0,umax_value=267038719,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1396737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1400832 R8_w=inv(id=0,umin_value=4096,umax_value=267038719,var_off=(0x0; 0xfffffff)) R9_w=invP341 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1396737,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1400832 R8_w=inv(id=0,umin_value=4096,umax_value=267038719,var_off=(0x0; 0xfffffff)) R9_w=invP341 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1404928 R6=inv(id=2,umin_value=1400833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1400832 R8_w=inv(id=0,umax_value=267034623,var_off=(0x0; 0xfffffff)) R9_w=invP342 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1404928 R2_w=inv(id=0,umax_value=267034623,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1400833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1404928 R8_w=inv(id=0,umin_value=4096,umax_value=267034623,var_off=(0x0; 0xfffffff)) R9_w=invP342 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1400833,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1404928 R8_w=inv(id=0,umin_value=4096,umax_value=267034623,var_off=(0x0; 0xfffffff)) R9_w=invP342 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1409024 R6=inv(id=2,umin_value=1404929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1404928 R8_w=inv(id=0,umax_value=267030527,var_off=(0x0; 0xfffffff)) R9_w=invP343 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1409024 R2_w=inv(id=0,umax_value=267030527,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1404929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1409024 R8_w=inv(id=0,umin_value=4096,umax_value=267030527,var_off=(0x0; 0xfffffff)) R9_w=invP343 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1404929,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1409024 R8_w=inv(id=0,umin_value=4096,umax_value=267030527,var_off=(0x0; 0xfffffff)) R9_w=invP343 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1413120 R6=inv(id=2,umin_value=1409025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1409024 R8=inv(id=0,umax_value=267026431,var_off=(0x0; 0xfffffff)) R9=invP344 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1413120 R2_w=inv(id=0,umax_value=267026431,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1409025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1413120 R8=inv(id=0,umin_value=4096,umax_value=267026431,var_off=(0x0; 0xfffffff)) R9=invP344 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1409025,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1413120 R8=inv(id=0,umin_value=4096,umax_value=267026431,var_off=(0x0; 0xfffffff)) R9=invP344 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1417216 R6=inv(id=2,umin_value=1413121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1413120 R8_w=inv(id=0,umax_value=267022335,var_off=(0x0; 0xfffffff)) R9_w=invP345 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1417216 R2_w=inv(id=0,umax_value=267022335,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1413121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1417216 R8_w=inv(id=0,umin_value=4096,umax_value=267022335,var_off=(0x0; 0xfffffff)) R9_w=invP345 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1413121,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1417216 R8_w=inv(id=0,umin_value=4096,umax_value=267022335,var_off=(0x0; 0xfffffff)) R9_w=invP345 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1421312 R6=inv(id=2,umin_value=1417217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1417216 R8_w=inv(id=0,umax_value=267018239,var_off=(0x0; 0xfffffff)) R9_w=invP346 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1421312 R2_w=inv(id=0,umax_value=267018239,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1417217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1421312 R8_w=inv(id=0,umin_value=4096,umax_value=267018239,var_off=(0x0; 0xfffffff)) R9_w=invP346 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1417217,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1421312 R8_w=inv(id=0,umin_value=4096,umax_value=267018239,var_off=(0x0; 0xfffffff)) R9_w=invP346 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1425408 R6=inv(id=2,umin_value=1421313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1421312 R8_w=inv(id=0,umax_value=267014143,var_off=(0x0; 0xfffffff)) R9_w=invP347 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1425408 R2_w=inv(id=0,umax_value=267014143,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1421313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1425408 R8_w=inv(id=0,umin_value=4096,umax_value=267014143,var_off=(0x0; 0xfffffff)) R9_w=invP347 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1421313,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1425408 R8_w=inv(id=0,umin_value=4096,umax_value=267014143,var_off=(0x0; 0xfffffff)) R9_w=invP347 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1429504 R6=inv(id=2,umin_value=1425409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1425408 R8=inv(id=0,umax_value=267010047,var_off=(0x0; 0xfffffff)) R9=invP348 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1429504 R2_w=inv(id=0,umax_value=267010047,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1425409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1429504 R8=inv(id=0,umin_value=4096,umax_value=267010047,var_off=(0x0; 0xfffffff)) R9=invP348 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1425409,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1429504 R8=inv(id=0,umin_value=4096,umax_value=267010047,var_off=(0x0; 0xfffffff)) R9=invP348 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1433600 R6=inv(id=2,umin_value=1429505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1429504 R8_w=inv(id=0,umax_value=267005951,var_off=(0x0; 0xfffffff)) R9_w=invP349 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1433600 R2_w=inv(id=0,umax_value=267005951,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1429505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1433600 R8_w=inv(id=0,umin_value=4096,umax_value=267005951,var_off=(0x0; 0xfffffff)) R9_w=invP349 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1429505,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1433600 R8_w=inv(id=0,umin_value=4096,umax_value=267005951,var_off=(0x0; 0xfffffff)) R9_w=invP349 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1437696 R6=inv(id=2,umin_value=1433601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1433600 R8_w=inv(id=0,umax_value=267001855,var_off=(0x0; 0xfffffff)) R9_w=invP350 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1437696 R2_w=inv(id=0,umax_value=267001855,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1433601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1437696 R8_w=inv(id=0,umin_value=4096,umax_value=267001855,var_off=(0x0; 0xfffffff)) R9_w=invP350 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1433601,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1437696 R8_w=inv(id=0,umin_value=4096,umax_value=267001855,var_off=(0x0; 0xfffffff)) R9_w=invP350 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1441792 R6=inv(id=2,umin_value=1437697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1437696 R8_w=inv(id=0,umax_value=266997759,var_off=(0x0; 0xfffffff)) R9_w=invP351 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1441792 R2_w=inv(id=0,umax_value=266997759,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1437697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1441792 R8_w=inv(id=0,umin_value=4096,umax_value=266997759,var_off=(0x0; 0xfffffff)) R9_w=invP351 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1437697,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1441792 R8_w=inv(id=0,umin_value=4096,umax_value=266997759,var_off=(0x0; 0xfffffff)) R9_w=invP351 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1445888 R6=inv(id=2,umin_value=1441793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1441792 R8=inv(id=0,umax_value=266993663,var_off=(0x0; 0xfffffff)) R9=invP352 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1445888 R2_w=inv(id=0,umax_value=266993663,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1441793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1445888 R8=inv(id=0,umin_value=4096,umax_value=266993663,var_off=(0x0; 0xfffffff)) R9=invP352 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1441793,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1445888 R8=inv(id=0,umin_value=4096,umax_value=266993663,var_off=(0x0; 0xfffffff)) R9=invP352 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1449984 R6=inv(id=2,umin_value=1445889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1445888 R8_w=inv(id=0,umax_value=266989567,var_off=(0x0; 0xfffffff)) R9_w=invP353 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1449984 R2_w=inv(id=0,umax_value=266989567,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1445889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1449984 R8_w=inv(id=0,umin_value=4096,umax_value=266989567,var_off=(0x0; 0xfffffff)) R9_w=invP353 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1445889,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1449984 R8_w=inv(id=0,umin_value=4096,umax_value=266989567,var_off=(0x0; 0xfffffff)) R9_w=invP353 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1454080 R6=inv(id=2,umin_value=1449985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1449984 R8_w=inv(id=0,umax_value=266985471,var_off=(0x0; 0xfffffff)) R9_w=invP354 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1454080 R2_w=inv(id=0,umax_value=266985471,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1449985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1454080 R8_w=inv(id=0,umin_value=4096,umax_value=266985471,var_off=(0x0; 0xfffffff)) R9_w=invP354 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1449985,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1454080 R8_w=inv(id=0,umin_value=4096,umax_value=266985471,var_off=(0x0; 0xfffffff)) R9_w=invP354 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1458176 R6=inv(id=2,umin_value=1454081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1454080 R8_w=inv(id=0,umax_value=266981375,var_off=(0x0; 0xfffffff)) R9_w=invP355 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1458176 R2_w=inv(id=0,umax_value=266981375,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1454081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1458176 R8_w=inv(id=0,umin_value=4096,umax_value=266981375,var_off=(0x0; 0xfffffff)) R9_w=invP355 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1454081,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1458176 R8_w=inv(id=0,umin_value=4096,umax_value=266981375,var_off=(0x0; 0xfffffff)) R9_w=invP355 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1462272 R6=inv(id=2,umin_value=1458177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1458176 R8=inv(id=0,umax_value=266977279,var_off=(0x0; 0xfffffff)) R9=invP356 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1462272 R2_w=inv(id=0,umax_value=266977279,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1458177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1462272 R8=inv(id=0,umin_value=4096,umax_value=266977279,var_off=(0x0; 0xfffffff)) R9=invP356 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1458177,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1462272 R8=inv(id=0,umin_value=4096,umax_value=266977279,var_off=(0x0; 0xfffffff)) R9=invP356 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1466368 R6=inv(id=2,umin_value=1462273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1462272 R8_w=inv(id=0,umax_value=266973183,var_off=(0x0; 0xfffffff)) R9_w=invP357 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1466368 R2_w=inv(id=0,umax_value=266973183,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1462273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1466368 R8_w=inv(id=0,umin_value=4096,umax_value=266973183,var_off=(0x0; 0xfffffff)) R9_w=invP357 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1462273,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1466368 R8_w=inv(id=0,umin_value=4096,umax_value=266973183,var_off=(0x0; 0xfffffff)) R9_w=invP357 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1470464 R6=inv(id=2,umin_value=1466369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1466368 R8_w=inv(id=0,umax_value=266969087,var_off=(0x0; 0xfffffff)) R9_w=invP358 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1470464 R2_w=inv(id=0,umax_value=266969087,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1466369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1470464 R8_w=inv(id=0,umin_value=4096,umax_value=266969087,var_off=(0x0; 0xfffffff)) R9_w=invP358 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1466369,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1470464 R8_w=inv(id=0,umin_value=4096,umax_value=266969087,var_off=(0x0; 0xfffffff)) R9_w=invP358 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1474560 R6=inv(id=2,umin_value=1470465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1470464 R8_w=inv(id=0,umax_value=266964991,var_off=(0x0; 0xfffffff)) R9_w=invP359 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1474560 R2_w=inv(id=0,umax_value=266964991,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1470465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1474560 R8_w=inv(id=0,umin_value=4096,umax_value=266964991,var_off=(0x0; 0xfffffff)) R9_w=invP359 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1470465,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1474560 R8_w=inv(id=0,umin_value=4096,umax_value=266964991,var_off=(0x0; 0xfffffff)) R9_w=invP359 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1478656 R6=inv(id=2,umin_value=1474561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1474560 R8=inv(id=0,umax_value=266960895,var_off=(0x0; 0xfffffff)) R9=invP360 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1478656 R2_w=inv(id=0,umax_value=266960895,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1474561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1478656 R8=inv(id=0,umin_value=4096,umax_value=266960895,var_off=(0x0; 0xfffffff)) R9=invP360 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1474561,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1478656 R8=inv(id=0,umin_value=4096,umax_value=266960895,var_off=(0x0; 0xfffffff)) R9=invP360 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1482752 R6=inv(id=2,umin_value=1478657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1478656 R8_w=inv(id=0,umax_value=266956799,var_off=(0x0; 0xfffffff)) R9_w=invP361 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1482752 R2_w=inv(id=0,umax_value=266956799,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1478657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1482752 R8_w=inv(id=0,umin_value=4096,umax_value=266956799,var_off=(0x0; 0xfffffff)) R9_w=invP361 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1478657,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1482752 R8_w=inv(id=0,umin_value=4096,umax_value=266956799,var_off=(0x0; 0xfffffff)) R9_w=invP361 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1486848 R6=inv(id=2,umin_value=1482753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1482752 R8_w=inv(id=0,umax_value=266952703,var_off=(0x0; 0xfffffff)) R9_w=invP362 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1486848 R2_w=inv(id=0,umax_value=266952703,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1482753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1486848 R8_w=inv(id=0,umin_value=4096,umax_value=266952703,var_off=(0x0; 0xfffffff)) R9_w=invP362 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1482753,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1486848 R8_w=inv(id=0,umin_value=4096,umax_value=266952703,var_off=(0x0; 0xfffffff)) R9_w=invP362 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1490944 R6=inv(id=2,umin_value=1486849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1486848 R8_w=inv(id=0,umax_value=266948607,var_off=(0x0; 0xfffffff)) R9_w=invP363 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1490944 R2_w=inv(id=0,umax_value=266948607,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1486849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1490944 R8_w=inv(id=0,umin_value=4096,umax_value=266948607,var_off=(0x0; 0xfffffff)) R9_w=invP363 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1486849,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1490944 R8_w=inv(id=0,umin_value=4096,umax_value=266948607,var_off=(0x0; 0xfffffff)) R9_w=invP363 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1495040 R6=inv(id=2,umin_value=1490945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1490944 R8=inv(id=0,umax_value=266944511,var_off=(0x0; 0xfffffff)) R9=invP364 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1495040 R2_w=inv(id=0,umax_value=266944511,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1490945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1495040 R8=inv(id=0,umin_value=4096,umax_value=266944511,var_off=(0x0; 0xfffffff)) R9=invP364 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1490945,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1495040 R8=inv(id=0,umin_value=4096,umax_value=266944511,var_off=(0x0; 0xfffffff)) R9=invP364 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1499136 R6=inv(id=2,umin_value=1495041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1495040 R8_w=inv(id=0,umax_value=266940415,var_off=(0x0; 0xfffffff)) R9_w=invP365 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1499136 R2_w=inv(id=0,umax_value=266940415,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1495041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1499136 R8_w=inv(id=0,umin_value=4096,umax_value=266940415,var_off=(0x0; 0xfffffff)) R9_w=invP365 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1495041,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1499136 R8_w=inv(id=0,umin_value=4096,umax_value=266940415,var_off=(0x0; 0xfffffff)) R9_w=invP365 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1503232 R6=inv(id=2,umin_value=1499137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1499136 R8_w=inv(id=0,umax_value=266936319,var_off=(0x0; 0xfffffff)) R9_w=invP366 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1503232 R2_w=inv(id=0,umax_value=266936319,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1499137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1503232 R8_w=inv(id=0,umin_value=4096,umax_value=266936319,var_off=(0x0; 0xfffffff)) R9_w=invP366 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1499137,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1503232 R8_w=inv(id=0,umin_value=4096,umax_value=266936319,var_off=(0x0; 0xfffffff)) R9_w=invP366 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1507328 R6=inv(id=2,umin_value=1503233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1503232 R8_w=inv(id=0,umax_value=266932223,var_off=(0x0; 0xfffffff)) R9_w=invP367 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1507328 R2_w=inv(id=0,umax_value=266932223,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1503233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1507328 R8_w=inv(id=0,umin_value=4096,umax_value=266932223,var_off=(0x0; 0xfffffff)) R9_w=invP367 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1503233,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1507328 R8_w=inv(id=0,umin_value=4096,umax_value=266932223,var_off=(0x0; 0xfffffff)) R9_w=invP367 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1511424 R6=inv(id=2,umin_value=1507329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1507328 R8=inv(id=0,umax_value=266928127,var_off=(0x0; 0xfffffff)) R9=invP368 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1511424 R2_w=inv(id=0,umax_value=266928127,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1507329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1511424 R8=inv(id=0,umin_value=4096,umax_value=266928127,var_off=(0x0; 0xfffffff)) R9=invP368 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1507329,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1511424 R8=inv(id=0,umin_value=4096,umax_value=266928127,var_off=(0x0; 0xfffffff)) R9=invP368 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1515520 R6=inv(id=2,umin_value=1511425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1511424 R8_w=inv(id=0,umax_value=266924031,var_off=(0x0; 0xfffffff)) R9_w=invP369 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1515520 R2_w=inv(id=0,umax_value=266924031,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1511425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1515520 R8_w=inv(id=0,umin_value=4096,umax_value=266924031,var_off=(0x0; 0xfffffff)) R9_w=invP369 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1511425,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1515520 R8_w=inv(id=0,umin_value=4096,umax_value=266924031,var_off=(0x0; 0xfffffff)) R9_w=invP369 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1519616 R6=inv(id=2,umin_value=1515521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1515520 R8_w=inv(id=0,umax_value=266919935,var_off=(0x0; 0xfffffff)) R9_w=invP370 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1519616 R2_w=inv(id=0,umax_value=266919935,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1515521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1519616 R8_w=inv(id=0,umin_value=4096,umax_value=266919935,var_off=(0x0; 0xfffffff)) R9_w=invP370 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1515521,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1519616 R8_w=inv(id=0,umin_value=4096,umax_value=266919935,var_off=(0x0; 0xfffffff)) R9_w=invP370 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1523712 R6=inv(id=2,umin_value=1519617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1519616 R8_w=inv(id=0,umax_value=266915839,var_off=(0x0; 0xfffffff)) R9_w=invP371 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1523712 R2_w=inv(id=0,umax_value=266915839,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1519617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1523712 R8_w=inv(id=0,umin_value=4096,umax_value=266915839,var_off=(0x0; 0xfffffff)) R9_w=invP371 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1519617,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1523712 R8_w=inv(id=0,umin_value=4096,umax_value=266915839,var_off=(0x0; 0xfffffff)) R9_w=invP371 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1527808 R6=inv(id=2,umin_value=1523713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1523712 R8=inv(id=0,umax_value=266911743,var_off=(0x0; 0xfffffff)) R9=invP372 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1527808 R2_w=inv(id=0,umax_value=266911743,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1523713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1527808 R8=inv(id=0,umin_value=4096,umax_value=266911743,var_off=(0x0; 0xfffffff)) R9=invP372 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1523713,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1527808 R8=inv(id=0,umin_value=4096,umax_value=266911743,var_off=(0x0; 0xfffffff)) R9=invP372 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1531904 R6=inv(id=2,umin_value=1527809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1527808 R8_w=inv(id=0,umax_value=266907647,var_off=(0x0; 0xfffffff)) R9_w=invP373 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1531904 R2_w=inv(id=0,umax_value=266907647,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1527809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1531904 R8_w=inv(id=0,umin_value=4096,umax_value=266907647,var_off=(0x0; 0xfffffff)) R9_w=invP373 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1527809,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1531904 R8_w=inv(id=0,umin_value=4096,umax_value=266907647,var_off=(0x0; 0xfffffff)) R9_w=invP373 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1536000 R6=inv(id=2,umin_value=1531905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1531904 R8_w=inv(id=0,umax_value=266903551,var_off=(0x0; 0xfffffff)) R9_w=invP374 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1536000 R2_w=inv(id=0,umax_value=266903551,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1531905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1536000 R8_w=inv(id=0,umin_value=4096,umax_value=266903551,var_off=(0x0; 0xfffffff)) R9_w=invP374 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1531905,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1536000 R8_w=inv(id=0,umin_value=4096,umax_value=266903551,var_off=(0x0; 0xfffffff)) R9_w=invP374 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1540096 R6=inv(id=2,umin_value=1536001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1536000 R8_w=inv(id=0,umax_value=266899455,var_off=(0x0; 0xfffffff)) R9_w=invP375 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1540096 R2_w=inv(id=0,umax_value=266899455,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1536001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1540096 R8_w=inv(id=0,umin_value=4096,umax_value=266899455,var_off=(0x0; 0xfffffff)) R9_w=invP375 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1536001,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1540096 R8_w=inv(id=0,umin_value=4096,umax_value=266899455,var_off=(0x0; 0xfffffff)) R9_w=invP375 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1544192 R6=inv(id=2,umin_value=1540097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1540096 R8=inv(id=0,umax_value=266895359,var_off=(0x0; 0xfffffff)) R9=invP376 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1544192 R2_w=inv(id=0,umax_value=266895359,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1540097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1544192 R8=inv(id=0,umin_value=4096,umax_value=266895359,var_off=(0x0; 0xfffffff)) R9=invP376 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1540097,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1544192 R8=inv(id=0,umin_value=4096,umax_value=266895359,var_off=(0x0; 0xfffffff)) R9=invP376 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1548288 R6=inv(id=2,umin_value=1544193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1544192 R8_w=inv(id=0,umax_value=266891263,var_off=(0x0; 0xfffffff)) R9_w=invP377 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1548288 R2_w=inv(id=0,umax_value=266891263,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1544193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1548288 R8_w=inv(id=0,umin_value=4096,umax_value=266891263,var_off=(0x0; 0xfffffff)) R9_w=invP377 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1544193,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1548288 R8_w=inv(id=0,umin_value=4096,umax_value=266891263,var_off=(0x0; 0xfffffff)) R9_w=invP377 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1552384 R6=inv(id=2,umin_value=1548289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1548288 R8_w=inv(id=0,umax_value=266887167,var_off=(0x0; 0xfffffff)) R9_w=invP378 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1552384 R2_w=inv(id=0,umax_value=266887167,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1548289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1552384 R8_w=inv(id=0,umin_value=4096,umax_value=266887167,var_off=(0x0; 0xfffffff)) R9_w=invP378 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1548289,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1552384 R8_w=inv(id=0,umin_value=4096,umax_value=266887167,var_off=(0x0; 0xfffffff)) R9_w=invP378 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1556480 R6=inv(id=2,umin_value=1552385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1552384 R8_w=inv(id=0,umax_value=266883071,var_off=(0x0; 0xfffffff)) R9_w=invP379 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1556480 R2_w=inv(id=0,umax_value=266883071,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1552385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1556480 R8_w=inv(id=0,umin_value=4096,umax_value=266883071,var_off=(0x0; 0xfffffff)) R9_w=invP379 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1552385,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1556480 R8_w=inv(id=0,umin_value=4096,umax_value=266883071,var_off=(0x0; 0xfffffff)) R9_w=invP379 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1560576 R6=inv(id=2,umin_value=1556481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1556480 R8=inv(id=0,umax_value=266878975,var_off=(0x0; 0xfffffff)) R9=invP380 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1560576 R2_w=inv(id=0,umax_value=266878975,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1556481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1560576 R8=inv(id=0,umin_value=4096,umax_value=266878975,var_off=(0x0; 0xfffffff)) R9=invP380 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1556481,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1560576 R8=inv(id=0,umin_value=4096,umax_value=266878975,var_off=(0x0; 0xfffffff)) R9=invP380 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1564672 R6=inv(id=2,umin_value=1560577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1560576 R8_w=inv(id=0,umax_value=266874879,var_off=(0x0; 0xfffffff)) R9_w=invP381 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1564672 R2_w=inv(id=0,umax_value=266874879,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1560577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1564672 R8_w=inv(id=0,umin_value=4096,umax_value=266874879,var_off=(0x0; 0xfffffff)) R9_w=invP381 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1560577,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1564672 R8_w=inv(id=0,umin_value=4096,umax_value=266874879,var_off=(0x0; 0xfffffff)) R9_w=invP381 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1568768 R6=inv(id=2,umin_value=1564673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1564672 R8_w=inv(id=0,umax_value=266870783,var_off=(0x0; 0xfffffff)) R9_w=invP382 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1568768 R2_w=inv(id=0,umax_value=266870783,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1564673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1568768 R8_w=inv(id=0,umin_value=4096,umax_value=266870783,var_off=(0x0; 0xfffffff)) R9_w=invP382 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1564673,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1568768 R8_w=inv(id=0,umin_value=4096,umax_value=266870783,var_off=(0x0; 0xfffffff)) R9_w=invP382 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1572864 R6=inv(id=2,umin_value=1568769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1568768 R8_w=inv(id=0,umax_value=266866687,var_off=(0x0; 0xfffffff)) R9_w=invP383 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1572864 R2_w=inv(id=0,umax_value=266866687,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1568769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1572864 R8_w=inv(id=0,umin_value=4096,umax_value=266866687,var_off=(0x0; 0xfffffff)) R9_w=invP383 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1568769,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1572864 R8_w=inv(id=0,umin_value=4096,umax_value=266866687,var_off=(0x0; 0xfffffff)) R9_w=invP383 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1576960 R6=inv(id=2,umin_value=1572865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1572864 R8=inv(id=0,umax_value=266862591,var_off=(0x0; 0xfffffff)) R9=invP384 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1576960 R2_w=inv(id=0,umax_value=266862591,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1572865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1576960 R8=inv(id=0,umin_value=4096,umax_value=266862591,var_off=(0x0; 0xfffffff)) R9=invP384 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1572865,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1576960 R8=inv(id=0,umin_value=4096,umax_value=266862591,var_off=(0x0; 0xfffffff)) R9=invP384 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1581056 R6=inv(id=2,umin_value=1576961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1576960 R8_w=inv(id=0,umax_value=266858495,var_off=(0x0; 0xfffffff)) R9_w=invP385 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1581056 R2_w=inv(id=0,umax_value=266858495,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1576961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1581056 R8_w=inv(id=0,umin_value=4096,umax_value=266858495,var_off=(0x0; 0xfffffff)) R9_w=invP385 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1576961,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1581056 R8_w=inv(id=0,umin_value=4096,umax_value=266858495,var_off=(0x0; 0xfffffff)) R9_w=invP385 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1585152 R6=inv(id=2,umin_value=1581057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1581056 R8_w=inv(id=0,umax_value=266854399,var_off=(0x0; 0xfffffff)) R9_w=invP386 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1585152 R2_w=inv(id=0,umax_value=266854399,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1581057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1585152 R8_w=inv(id=0,umin_value=4096,umax_value=266854399,var_off=(0x0; 0xfffffff)) R9_w=invP386 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1581057,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1585152 R8_w=inv(id=0,umin_value=4096,umax_value=266854399,var_off=(0x0; 0xfffffff)) R9_w=invP386 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1589248 R6=inv(id=2,umin_value=1585153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1585152 R8_w=inv(id=0,umax_value=266850303,var_off=(0x0; 0xfffffff)) R9_w=invP387 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1589248 R2_w=inv(id=0,umax_value=266850303,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1585153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1589248 R8_w=inv(id=0,umin_value=4096,umax_value=266850303,var_off=(0x0; 0xfffffff)) R9_w=invP387 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1585153,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1589248 R8_w=inv(id=0,umin_value=4096,umax_value=266850303,var_off=(0x0; 0xfffffff)) R9_w=invP387 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1593344 R6=inv(id=2,umin_value=1589249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1589248 R8=inv(id=0,umax_value=266846207,var_off=(0x0; 0xfffffff)) R9=invP388 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1593344 R2_w=inv(id=0,umax_value=266846207,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1589249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1593344 R8=inv(id=0,umin_value=4096,umax_value=266846207,var_off=(0x0; 0xfffffff)) R9=invP388 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1589249,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1593344 R8=inv(id=0,umin_value=4096,umax_value=266846207,var_off=(0x0; 0xfffffff)) R9=invP388 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1597440 R6=inv(id=2,umin_value=1593345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1593344 R8_w=inv(id=0,umax_value=266842111,var_off=(0x0; 0xfffffff)) R9_w=invP389 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1597440 R2_w=inv(id=0,umax_value=266842111,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1593345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1597440 R8_w=inv(id=0,umin_value=4096,umax_value=266842111,var_off=(0x0; 0xfffffff)) R9_w=invP389 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1593345,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1597440 R8_w=inv(id=0,umin_value=4096,umax_value=266842111,var_off=(0x0; 0xfffffff)) R9_w=invP389 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1601536 R6=inv(id=2,umin_value=1597441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1597440 R8_w=inv(id=0,umax_value=266838015,var_off=(0x0; 0xfffffff)) R9_w=invP390 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1601536 R2_w=inv(id=0,umax_value=266838015,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1597441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1601536 R8_w=inv(id=0,umin_value=4096,umax_value=266838015,var_off=(0x0; 0xfffffff)) R9_w=invP390 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1597441,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1601536 R8_w=inv(id=0,umin_value=4096,umax_value=266838015,var_off=(0x0; 0xfffffff)) R9_w=invP390 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1605632 R6=inv(id=2,umin_value=1601537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1601536 R8_w=inv(id=0,umax_value=266833919,var_off=(0x0; 0xfffffff)) R9_w=invP391 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1605632 R2_w=inv(id=0,umax_value=266833919,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1601537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1605632 R8_w=inv(id=0,umin_value=4096,umax_value=266833919,var_off=(0x0; 0xfffffff)) R9_w=invP391 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1601537,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1605632 R8_w=inv(id=0,umin_value=4096,umax_value=266833919,var_off=(0x0; 0xfffffff)) R9_w=invP391 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1609728 R6=inv(id=2,umin_value=1605633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1605632 R8=inv(id=0,umax_value=266829823,var_off=(0x0; 0xfffffff)) R9=invP392 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1609728 R2_w=inv(id=0,umax_value=266829823,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1605633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1609728 R8=inv(id=0,umin_value=4096,umax_value=266829823,var_off=(0x0; 0xfffffff)) R9=invP392 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1605633,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1609728 R8=inv(id=0,umin_value=4096,umax_value=266829823,var_off=(0x0; 0xfffffff)) R9=invP392 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1613824 R6=inv(id=2,umin_value=1609729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1609728 R8_w=inv(id=0,umax_value=266825727,var_off=(0x0; 0xfffffff)) R9_w=invP393 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1613824 R2_w=inv(id=0,umax_value=266825727,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1609729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1613824 R8_w=inv(id=0,umin_value=4096,umax_value=266825727,var_off=(0x0; 0xfffffff)) R9_w=invP393 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1609729,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1613824 R8_w=inv(id=0,umin_value=4096,umax_value=266825727,var_off=(0x0; 0xfffffff)) R9_w=invP393 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1617920 R6=inv(id=2,umin_value=1613825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1613824 R8_w=inv(id=0,umax_value=266821631,var_off=(0x0; 0xfffffff)) R9_w=invP394 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1617920 R2_w=inv(id=0,umax_value=266821631,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1613825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1617920 R8_w=inv(id=0,umin_value=4096,umax_value=266821631,var_off=(0x0; 0xfffffff)) R9_w=invP394 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1613825,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1617920 R8_w=inv(id=0,umin_value=4096,umax_value=266821631,var_off=(0x0; 0xfffffff)) R9_w=invP394 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1622016 R6=inv(id=2,umin_value=1617921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1617920 R8_w=inv(id=0,umax_value=266817535,var_off=(0x0; 0xfffffff)) R9_w=invP395 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1622016 R2_w=inv(id=0,umax_value=266817535,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1617921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1622016 R8_w=inv(id=0,umin_value=4096,umax_value=266817535,var_off=(0x0; 0xfffffff)) R9_w=invP395 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1617921,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1622016 R8_w=inv(id=0,umin_value=4096,umax_value=266817535,var_off=(0x0; 0xfffffff)) R9_w=invP395 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1626112 R6=inv(id=2,umin_value=1622017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1622016 R8=inv(id=0,umax_value=266813439,var_off=(0x0; 0xfffffff)) R9=invP396 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1626112 R2_w=inv(id=0,umax_value=266813439,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1622017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1626112 R8=inv(id=0,umin_value=4096,umax_value=266813439,var_off=(0x0; 0xfffffff)) R9=invP396 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1622017,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1626112 R8=inv(id=0,umin_value=4096,umax_value=266813439,var_off=(0x0; 0xfffffff)) R9=invP396 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1630208 R6=inv(id=2,umin_value=1626113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1626112 R8_w=inv(id=0,umax_value=266809343,var_off=(0x0; 0xfffffff)) R9_w=invP397 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1630208 R2_w=inv(id=0,umax_value=266809343,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1626113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1630208 R8_w=inv(id=0,umin_value=4096,umax_value=266809343,var_off=(0x0; 0xfffffff)) R9_w=invP397 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1626113,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1630208 R8_w=inv(id=0,umin_value=4096,umax_value=266809343,var_off=(0x0; 0xfffffff)) R9_w=invP397 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1634304 R6=inv(id=2,umin_value=1630209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1630208 R8_w=inv(id=0,umax_value=266805247,var_off=(0x0; 0xfffffff)) R9_w=invP398 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1634304 R2_w=inv(id=0,umax_value=266805247,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1630209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1634304 R8_w=inv(id=0,umin_value=4096,umax_value=266805247,var_off=(0x0; 0xfffffff)) R9_w=invP398 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1630209,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1634304 R8_w=inv(id=0,umin_value=4096,umax_value=266805247,var_off=(0x0; 0xfffffff)) R9_w=invP398 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1638400 R6=inv(id=2,umin_value=1634305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1634304 R8_w=inv(id=0,umax_value=266801151,var_off=(0x0; 0xfffffff)) R9_w=invP399 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1638400 R2_w=inv(id=0,umax_value=266801151,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1634305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1638400 R8_w=inv(id=0,umin_value=4096,umax_value=266801151,var_off=(0x0; 0xfffffff)) R9_w=invP399 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1634305,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1638400 R8_w=inv(id=0,umin_value=4096,umax_value=266801151,var_off=(0x0; 0xfffffff)) R9_w=invP399 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1642496 R6=inv(id=2,umin_value=1638401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1638400 R8=inv(id=0,umax_value=266797055,var_off=(0x0; 0xfffffff)) R9=invP400 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1642496 R2_w=inv(id=0,umax_value=266797055,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1638401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1642496 R8=inv(id=0,umin_value=4096,umax_value=266797055,var_off=(0x0; 0xfffffff)) R9=invP400 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1638401,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1642496 R8=inv(id=0,umin_value=4096,umax_value=266797055,var_off=(0x0; 0xfffffff)) R9=invP400 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1646592 R6=inv(id=2,umin_value=1642497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1642496 R8_w=inv(id=0,umax_value=266792959,var_off=(0x0; 0xfffffff)) R9_w=invP401 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1646592 R2_w=inv(id=0,umax_value=266792959,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1642497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1646592 R8_w=inv(id=0,umin_value=4096,umax_value=266792959,var_off=(0x0; 0xfffffff)) R9_w=invP401 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1642497,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1646592 R8_w=inv(id=0,umin_value=4096,umax_value=266792959,var_off=(0x0; 0xfffffff)) R9_w=invP401 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1650688 R6=inv(id=2,umin_value=1646593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1646592 R8_w=inv(id=0,umax_value=266788863,var_off=(0x0; 0xfffffff)) R9_w=invP402 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1650688 R2_w=inv(id=0,umax_value=266788863,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1646593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1650688 R8_w=inv(id=0,umin_value=4096,umax_value=266788863,var_off=(0x0; 0xfffffff)) R9_w=invP402 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1646593,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1650688 R8_w=inv(id=0,umin_value=4096,umax_value=266788863,var_off=(0x0; 0xfffffff)) R9_w=invP402 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1654784 R6=inv(id=2,umin_value=1650689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1650688 R8_w=inv(id=0,umax_value=266784767,var_off=(0x0; 0xfffffff)) R9_w=invP403 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1654784 R2_w=inv(id=0,umax_value=266784767,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1650689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1654784 R8_w=inv(id=0,umin_value=4096,umax_value=266784767,var_off=(0x0; 0xfffffff)) R9_w=invP403 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1650689,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1654784 R8_w=inv(id=0,umin_value=4096,umax_value=266784767,var_off=(0x0; 0xfffffff)) R9_w=invP403 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1658880 R6=inv(id=2,umin_value=1654785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1654784 R8=inv(id=0,umax_value=266780671,var_off=(0x0; 0xfffffff)) R9=invP404 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1658880 R2_w=inv(id=0,umax_value=266780671,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1654785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1658880 R8=inv(id=0,umin_value=4096,umax_value=266780671,var_off=(0x0; 0xfffffff)) R9=invP404 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1654785,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1658880 R8=inv(id=0,umin_value=4096,umax_value=266780671,var_off=(0x0; 0xfffffff)) R9=invP404 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1662976 R6=inv(id=2,umin_value=1658881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1658880 R8_w=inv(id=0,umax_value=266776575,var_off=(0x0; 0xfffffff)) R9_w=invP405 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1662976 R2_w=inv(id=0,umax_value=266776575,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1658881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1662976 R8_w=inv(id=0,umin_value=4096,umax_value=266776575,var_off=(0x0; 0xfffffff)) R9_w=invP405 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1658881,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1662976 R8_w=inv(id=0,umin_value=4096,umax_value=266776575,var_off=(0x0; 0xfffffff)) R9_w=invP405 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1667072 R6=inv(id=2,umin_value=1662977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1662976 R8_w=inv(id=0,umax_value=266772479,var_off=(0x0; 0xfffffff)) R9_w=invP406 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1667072 R2_w=inv(id=0,umax_value=266772479,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1662977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1667072 R8_w=inv(id=0,umin_value=4096,umax_value=266772479,var_off=(0x0; 0xfffffff)) R9_w=invP406 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1662977,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1667072 R8_w=inv(id=0,umin_value=4096,umax_value=266772479,var_off=(0x0; 0xfffffff)) R9_w=invP406 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1671168 R6=inv(id=2,umin_value=1667073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1667072 R8_w=inv(id=0,umax_value=266768383,var_off=(0x0; 0xfffffff)) R9_w=invP407 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1671168 R2_w=inv(id=0,umax_value=266768383,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1667073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1671168 R8_w=inv(id=0,umin_value=4096,umax_value=266768383,var_off=(0x0; 0xfffffff)) R9_w=invP407 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1667073,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1671168 R8_w=inv(id=0,umin_value=4096,umax_value=266768383,var_off=(0x0; 0xfffffff)) R9_w=invP407 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1675264 R6=inv(id=2,umin_value=1671169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1671168 R8=inv(id=0,umax_value=266764287,var_off=(0x0; 0xfffffff)) R9=invP408 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1675264 R2_w=inv(id=0,umax_value=266764287,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1671169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1675264 R8=inv(id=0,umin_value=4096,umax_value=266764287,var_off=(0x0; 0xfffffff)) R9=invP408 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1671169,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1675264 R8=inv(id=0,umin_value=4096,umax_value=266764287,var_off=(0x0; 0xfffffff)) R9=invP408 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1679360 R6=inv(id=2,umin_value=1675265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1675264 R8_w=inv(id=0,umax_value=266760191,var_off=(0x0; 0xfffffff)) R9_w=invP409 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1679360 R2_w=inv(id=0,umax_value=266760191,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1675265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1679360 R8_w=inv(id=0,umin_value=4096,umax_value=266760191,var_off=(0x0; 0xfffffff)) R9_w=invP409 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1675265,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1679360 R8_w=inv(id=0,umin_value=4096,umax_value=266760191,var_off=(0x0; 0xfffffff)) R9_w=invP409 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1683456 R6=inv(id=2,umin_value=1679361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1679360 R8_w=inv(id=0,umax_value=266756095,var_off=(0x0; 0xfffffff)) R9_w=invP410 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1683456 R2_w=inv(id=0,umax_value=266756095,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1679361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1683456 R8_w=inv(id=0,umin_value=4096,umax_value=266756095,var_off=(0x0; 0xfffffff)) R9_w=invP410 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1679361,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1683456 R8_w=inv(id=0,umin_value=4096,umax_value=266756095,var_off=(0x0; 0xfffffff)) R9_w=invP410 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1687552 R6=inv(id=2,umin_value=1683457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1683456 R8_w=inv(id=0,umax_value=266751999,var_off=(0x0; 0xfffffff)) R9_w=invP411 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1687552 R2_w=inv(id=0,umax_value=266751999,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1683457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1687552 R8_w=inv(id=0,umin_value=4096,umax_value=266751999,var_off=(0x0; 0xfffffff)) R9_w=invP411 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1683457,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1687552 R8_w=inv(id=0,umin_value=4096,umax_value=266751999,var_off=(0x0; 0xfffffff)) R9_w=invP411 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1691648 R6=inv(id=2,umin_value=1687553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1687552 R8=inv(id=0,umax_value=266747903,var_off=(0x0; 0xfffffff)) R9=invP412 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1691648 R2_w=inv(id=0,umax_value=266747903,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1687553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1691648 R8=inv(id=0,umin_value=4096,umax_value=266747903,var_off=(0x0; 0xfffffff)) R9=invP412 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1687553,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1691648 R8=inv(id=0,umin_value=4096,umax_value=266747903,var_off=(0x0; 0xfffffff)) R9=invP412 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1695744 R6=inv(id=2,umin_value=1691649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1691648 R8_w=inv(id=0,umax_value=266743807,var_off=(0x0; 0xfffffff)) R9_w=invP413 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1695744 R2_w=inv(id=0,umax_value=266743807,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1691649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1695744 R8_w=inv(id=0,umin_value=4096,umax_value=266743807,var_off=(0x0; 0xfffffff)) R9_w=invP413 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1691649,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1695744 R8_w=inv(id=0,umin_value=4096,umax_value=266743807,var_off=(0x0; 0xfffffff)) R9_w=invP413 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1699840 R6=inv(id=2,umin_value=1695745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1695744 R8_w=inv(id=0,umax_value=266739711,var_off=(0x0; 0xfffffff)) R9_w=invP414 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1699840 R2_w=inv(id=0,umax_value=266739711,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1695745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1699840 R8_w=inv(id=0,umin_value=4096,umax_value=266739711,var_off=(0x0; 0xfffffff)) R9_w=invP414 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1695745,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1699840 R8_w=inv(id=0,umin_value=4096,umax_value=266739711,var_off=(0x0; 0xfffffff)) R9_w=invP414 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1703936 R6=inv(id=2,umin_value=1699841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1699840 R8_w=inv(id=0,umax_value=266735615,var_off=(0x0; 0xfffffff)) R9_w=invP415 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1703936 R2_w=inv(id=0,umax_value=266735615,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1699841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1703936 R8_w=inv(id=0,umin_value=4096,umax_value=266735615,var_off=(0x0; 0xfffffff)) R9_w=invP415 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1699841,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1703936 R8_w=inv(id=0,umin_value=4096,umax_value=266735615,var_off=(0x0; 0xfffffff)) R9_w=invP415 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1708032 R6=inv(id=2,umin_value=1703937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1703936 R8=inv(id=0,umax_value=266731519,var_off=(0x0; 0xfffffff)) R9=invP416 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1708032 R2_w=inv(id=0,umax_value=266731519,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1703937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1708032 R8=inv(id=0,umin_value=4096,umax_value=266731519,var_off=(0x0; 0xfffffff)) R9=invP416 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1703937,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1708032 R8=inv(id=0,umin_value=4096,umax_value=266731519,var_off=(0x0; 0xfffffff)) R9=invP416 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1712128 R6=inv(id=2,umin_value=1708033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1708032 R8_w=inv(id=0,umax_value=266727423,var_off=(0x0; 0xfffffff)) R9_w=invP417 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1712128 R2_w=inv(id=0,umax_value=266727423,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1708033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1712128 R8_w=inv(id=0,umin_value=4096,umax_value=266727423,var_off=(0x0; 0xfffffff)) R9_w=invP417 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1708033,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1712128 R8_w=inv(id=0,umin_value=4096,umax_value=266727423,var_off=(0x0; 0xfffffff)) R9_w=invP417 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1716224 R6=inv(id=2,umin_value=1712129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1712128 R8_w=inv(id=0,umax_value=266723327,var_off=(0x0; 0xfffffff)) R9_w=invP418 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1716224 R2_w=inv(id=0,umax_value=266723327,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1712129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1716224 R8_w=inv(id=0,umin_value=4096,umax_value=266723327,var_off=(0x0; 0xfffffff)) R9_w=invP418 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1712129,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1716224 R8_w=inv(id=0,umin_value=4096,umax_value=266723327,var_off=(0x0; 0xfffffff)) R9_w=invP418 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1720320 R6=inv(id=2,umin_value=1716225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1716224 R8_w=inv(id=0,umax_value=266719231,var_off=(0x0; 0xfffffff)) R9_w=invP419 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1720320 R2_w=inv(id=0,umax_value=266719231,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1716225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1720320 R8_w=inv(id=0,umin_value=4096,umax_value=266719231,var_off=(0x0; 0xfffffff)) R9_w=invP419 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1716225,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1720320 R8_w=inv(id=0,umin_value=4096,umax_value=266719231,var_off=(0x0; 0xfffffff)) R9_w=invP419 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1724416 R6=inv(id=2,umin_value=1720321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1720320 R8=inv(id=0,umax_value=266715135,var_off=(0x0; 0xfffffff)) R9=invP420 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1724416 R2_w=inv(id=0,umax_value=266715135,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1720321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1724416 R8=inv(id=0,umin_value=4096,umax_value=266715135,var_off=(0x0; 0xfffffff)) R9=invP420 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1720321,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1724416 R8=inv(id=0,umin_value=4096,umax_value=266715135,var_off=(0x0; 0xfffffff)) R9=invP420 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1728512 R6=inv(id=2,umin_value=1724417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1724416 R8_w=inv(id=0,umax_value=266711039,var_off=(0x0; 0xfffffff)) R9_w=invP421 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1728512 R2_w=inv(id=0,umax_value=266711039,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1724417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1728512 R8_w=inv(id=0,umin_value=4096,umax_value=266711039,var_off=(0x0; 0xfffffff)) R9_w=invP421 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1724417,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1728512 R8_w=inv(id=0,umin_value=4096,umax_value=266711039,var_off=(0x0; 0xfffffff)) R9_w=invP421 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1732608 R6=inv(id=2,umin_value=1728513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1728512 R8_w=inv(id=0,umax_value=266706943,var_off=(0x0; 0xfffffff)) R9_w=invP422 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1732608 R2_w=inv(id=0,umax_value=266706943,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1728513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1732608 R8_w=inv(id=0,umin_value=4096,umax_value=266706943,var_off=(0x0; 0xfffffff)) R9_w=invP422 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1728513,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1732608 R8_w=inv(id=0,umin_value=4096,umax_value=266706943,var_off=(0x0; 0xfffffff)) R9_w=invP422 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1736704 R6=inv(id=2,umin_value=1732609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1732608 R8_w=inv(id=0,umax_value=266702847,var_off=(0x0; 0xfffffff)) R9_w=invP423 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1736704 R2_w=inv(id=0,umax_value=266702847,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1732609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1736704 R8_w=inv(id=0,umin_value=4096,umax_value=266702847,var_off=(0x0; 0xfffffff)) R9_w=invP423 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1732609,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1736704 R8_w=inv(id=0,umin_value=4096,umax_value=266702847,var_off=(0x0; 0xfffffff)) R9_w=invP423 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1740800 R6=inv(id=2,umin_value=1736705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1736704 R8=inv(id=0,umax_value=266698751,var_off=(0x0; 0xfffffff)) R9=invP424 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1740800 R2_w=inv(id=0,umax_value=266698751,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1736705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1740800 R8=inv(id=0,umin_value=4096,umax_value=266698751,var_off=(0x0; 0xfffffff)) R9=invP424 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1736705,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1740800 R8=inv(id=0,umin_value=4096,umax_value=266698751,var_off=(0x0; 0xfffffff)) R9=invP424 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1744896 R6=inv(id=2,umin_value=1740801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1740800 R8_w=inv(id=0,umax_value=266694655,var_off=(0x0; 0xfffffff)) R9_w=invP425 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1744896 R2_w=inv(id=0,umax_value=266694655,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1740801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1744896 R8_w=inv(id=0,umin_value=4096,umax_value=266694655,var_off=(0x0; 0xfffffff)) R9_w=invP425 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1740801,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1744896 R8_w=inv(id=0,umin_value=4096,umax_value=266694655,var_off=(0x0; 0xfffffff)) R9_w=invP425 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1748992 R6=inv(id=2,umin_value=1744897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1744896 R8_w=inv(id=0,umax_value=266690559,var_off=(0x0; 0xfffffff)) R9_w=invP426 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1748992 R2_w=inv(id=0,umax_value=266690559,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1744897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1748992 R8_w=inv(id=0,umin_value=4096,umax_value=266690559,var_off=(0x0; 0xfffffff)) R9_w=invP426 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1744897,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1748992 R8_w=inv(id=0,umin_value=4096,umax_value=266690559,var_off=(0x0; 0xfffffff)) R9_w=invP426 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1753088 R6=inv(id=2,umin_value=1748993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1748992 R8_w=inv(id=0,umax_value=266686463,var_off=(0x0; 0xfffffff)) R9_w=invP427 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1753088 R2_w=inv(id=0,umax_value=266686463,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1748993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1753088 R8_w=inv(id=0,umin_value=4096,umax_value=266686463,var_off=(0x0; 0xfffffff)) R9_w=invP427 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1748993,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1753088 R8_w=inv(id=0,umin_value=4096,umax_value=266686463,var_off=(0x0; 0xfffffff)) R9_w=invP427 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1757184 R6=inv(id=2,umin_value=1753089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1753088 R8=inv(id=0,umax_value=266682367,var_off=(0x0; 0xfffffff)) R9=invP428 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1757184 R2_w=inv(id=0,umax_value=266682367,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1753089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1757184 R8=inv(id=0,umin_value=4096,umax_value=266682367,var_off=(0x0; 0xfffffff)) R9=invP428 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1753089,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1757184 R8=inv(id=0,umin_value=4096,umax_value=266682367,var_off=(0x0; 0xfffffff)) R9=invP428 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1761280 R6=inv(id=2,umin_value=1757185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1757184 R8_w=inv(id=0,umax_value=266678271,var_off=(0x0; 0xfffffff)) R9_w=invP429 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1761280 R2_w=inv(id=0,umax_value=266678271,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1757185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1761280 R8_w=inv(id=0,umin_value=4096,umax_value=266678271,var_off=(0x0; 0xfffffff)) R9_w=invP429 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1757185,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1761280 R8_w=inv(id=0,umin_value=4096,umax_value=266678271,var_off=(0x0; 0xfffffff)) R9_w=invP429 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1765376 R6=inv(id=2,umin_value=1761281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1761280 R8_w=inv(id=0,umax_value=266674175,var_off=(0x0; 0xfffffff)) R9_w=invP430 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1765376 R2_w=inv(id=0,umax_value=266674175,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1761281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1765376 R8_w=inv(id=0,umin_value=4096,umax_value=266674175,var_off=(0x0; 0xfffffff)) R9_w=invP430 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1761281,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1765376 R8_w=inv(id=0,umin_value=4096,umax_value=266674175,var_off=(0x0; 0xfffffff)) R9_w=invP430 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1769472 R6=inv(id=2,umin_value=1765377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1765376 R8_w=inv(id=0,umax_value=266670079,var_off=(0x0; 0xfffffff)) R9_w=invP431 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1769472 R2_w=inv(id=0,umax_value=266670079,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1765377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1769472 R8_w=inv(id=0,umin_value=4096,umax_value=266670079,var_off=(0x0; 0xfffffff)) R9_w=invP431 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1765377,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1769472 R8_w=inv(id=0,umin_value=4096,umax_value=266670079,var_off=(0x0; 0xfffffff)) R9_w=invP431 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1773568 R6=inv(id=2,umin_value=1769473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1769472 R8=inv(id=0,umax_value=266665983,var_off=(0x0; 0xfffffff)) R9=invP432 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1773568 R2_w=inv(id=0,umax_value=266665983,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1769473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1773568 R8=inv(id=0,umin_value=4096,umax_value=266665983,var_off=(0x0; 0xfffffff)) R9=invP432 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1769473,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1773568 R8=inv(id=0,umin_value=4096,umax_value=266665983,var_off=(0x0; 0xfffffff)) R9=invP432 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1777664 R6=inv(id=2,umin_value=1773569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1773568 R8_w=inv(id=0,umax_value=266661887,var_off=(0x0; 0xfffffff)) R9_w=invP433 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1777664 R2_w=inv(id=0,umax_value=266661887,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1773569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1777664 R8_w=inv(id=0,umin_value=4096,umax_value=266661887,var_off=(0x0; 0xfffffff)) R9_w=invP433 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1773569,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1777664 R8_w=inv(id=0,umin_value=4096,umax_value=266661887,var_off=(0x0; 0xfffffff)) R9_w=invP433 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1781760 R6=inv(id=2,umin_value=1777665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1777664 R8_w=inv(id=0,umax_value=266657791,var_off=(0x0; 0xfffffff)) R9_w=invP434 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1781760 R2_w=inv(id=0,umax_value=266657791,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1777665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1781760 R8_w=inv(id=0,umin_value=4096,umax_value=266657791,var_off=(0x0; 0xfffffff)) R9_w=invP434 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1777665,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1781760 R8_w=inv(id=0,umin_value=4096,umax_value=266657791,var_off=(0x0; 0xfffffff)) R9_w=invP434 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1785856 R6=inv(id=2,umin_value=1781761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1781760 R8_w=inv(id=0,umax_value=266653695,var_off=(0x0; 0xfffffff)) R9_w=invP435 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1785856 R2_w=inv(id=0,umax_value=266653695,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1781761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1785856 R8_w=inv(id=0,umin_value=4096,umax_value=266653695,var_off=(0x0; 0xfffffff)) R9_w=invP435 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1781761,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1785856 R8_w=inv(id=0,umin_value=4096,umax_value=266653695,var_off=(0x0; 0xfffffff)) R9_w=invP435 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1789952 R6=inv(id=2,umin_value=1785857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1785856 R8=inv(id=0,umax_value=266649599,var_off=(0x0; 0xfffffff)) R9=invP436 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1789952 R2_w=inv(id=0,umax_value=266649599,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1785857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1789952 R8=inv(id=0,umin_value=4096,umax_value=266649599,var_off=(0x0; 0xfffffff)) R9=invP436 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1785857,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1789952 R8=inv(id=0,umin_value=4096,umax_value=266649599,var_off=(0x0; 0xfffffff)) R9=invP436 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1794048 R6=inv(id=2,umin_value=1789953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1789952 R8_w=inv(id=0,umax_value=266645503,var_off=(0x0; 0xfffffff)) R9_w=invP437 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1794048 R2_w=inv(id=0,umax_value=266645503,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1789953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1794048 R8_w=inv(id=0,umin_value=4096,umax_value=266645503,var_off=(0x0; 0xfffffff)) R9_w=invP437 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1789953,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1794048 R8_w=inv(id=0,umin_value=4096,umax_value=266645503,var_off=(0x0; 0xfffffff)) R9_w=invP437 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1798144 R6=inv(id=2,umin_value=1794049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1794048 R8_w=inv(id=0,umax_value=266641407,var_off=(0x0; 0xfffffff)) R9_w=invP438 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1798144 R2_w=inv(id=0,umax_value=266641407,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1794049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1798144 R8_w=inv(id=0,umin_value=4096,umax_value=266641407,var_off=(0x0; 0xfffffff)) R9_w=invP438 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1794049,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1798144 R8_w=inv(id=0,umin_value=4096,umax_value=266641407,var_off=(0x0; 0xfffffff)) R9_w=invP438 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1802240 R6=inv(id=2,umin_value=1798145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1798144 R8_w=inv(id=0,umax_value=266637311,var_off=(0x0; 0xfffffff)) R9_w=invP439 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1802240 R2_w=inv(id=0,umax_value=266637311,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1798145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1802240 R8_w=inv(id=0,umin_value=4096,umax_value=266637311,var_off=(0x0; 0xfffffff)) R9_w=invP439 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1798145,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1802240 R8_w=inv(id=0,umin_value=4096,umax_value=266637311,var_off=(0x0; 0xfffffff)) R9_w=invP439 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1806336 R6=inv(id=2,umin_value=1802241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1802240 R8=inv(id=0,umax_value=266633215,var_off=(0x0; 0xfffffff)) R9=invP440 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1806336 R2_w=inv(id=0,umax_value=266633215,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1802241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1806336 R8=inv(id=0,umin_value=4096,umax_value=266633215,var_off=(0x0; 0xfffffff)) R9=invP440 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1802241,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1806336 R8=inv(id=0,umin_value=4096,umax_value=266633215,var_off=(0x0; 0xfffffff)) R9=invP440 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1810432 R6=inv(id=2,umin_value=1806337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1806336 R8_w=inv(id=0,umax_value=266629119,var_off=(0x0; 0xfffffff)) R9_w=invP441 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1810432 R2_w=inv(id=0,umax_value=266629119,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1806337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1810432 R8_w=inv(id=0,umin_value=4096,umax_value=266629119,var_off=(0x0; 0xfffffff)) R9_w=invP441 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1806337,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1810432 R8_w=inv(id=0,umin_value=4096,umax_value=266629119,var_off=(0x0; 0xfffffff)) R9_w=invP441 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1814528 R6=inv(id=2,umin_value=1810433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1810432 R8_w=inv(id=0,umax_value=266625023,var_off=(0x0; 0xfffffff)) R9_w=invP442 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1814528 R2_w=inv(id=0,umax_value=266625023,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1810433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1814528 R8_w=inv(id=0,umin_value=4096,umax_value=266625023,var_off=(0x0; 0xfffffff)) R9_w=invP442 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1810433,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1814528 R8_w=inv(id=0,umin_value=4096,umax_value=266625023,var_off=(0x0; 0xfffffff)) R9_w=invP442 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1818624 R6=inv(id=2,umin_value=1814529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1814528 R8_w=inv(id=0,umax_value=266620927,var_off=(0x0; 0xfffffff)) R9_w=invP443 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1818624 R2_w=inv(id=0,umax_value=266620927,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1814529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1818624 R8_w=inv(id=0,umin_value=4096,umax_value=266620927,var_off=(0x0; 0xfffffff)) R9_w=invP443 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1814529,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1818624 R8_w=inv(id=0,umin_value=4096,umax_value=266620927,var_off=(0x0; 0xfffffff)) R9_w=invP443 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1822720 R6=inv(id=2,umin_value=1818625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1818624 R8=inv(id=0,umax_value=266616831,var_off=(0x0; 0xfffffff)) R9=invP444 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1822720 R2_w=inv(id=0,umax_value=266616831,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1818625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1822720 R8=inv(id=0,umin_value=4096,umax_value=266616831,var_off=(0x0; 0xfffffff)) R9=invP444 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1818625,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1822720 R8=inv(id=0,umin_value=4096,umax_value=266616831,var_off=(0x0; 0xfffffff)) R9=invP444 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1826816 R6=inv(id=2,umin_value=1822721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1822720 R8_w=inv(id=0,umax_value=266612735,var_off=(0x0; 0xfffffff)) R9_w=invP445 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1826816 R2_w=inv(id=0,umax_value=266612735,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1822721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1826816 R8_w=inv(id=0,umin_value=4096,umax_value=266612735,var_off=(0x0; 0xfffffff)) R9_w=invP445 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1822721,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1826816 R8_w=inv(id=0,umin_value=4096,umax_value=266612735,var_off=(0x0; 0xfffffff)) R9_w=invP445 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1830912 R6=inv(id=2,umin_value=1826817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1826816 R8_w=inv(id=0,umax_value=266608639,var_off=(0x0; 0xfffffff)) R9_w=invP446 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1830912 R2_w=inv(id=0,umax_value=266608639,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1826817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1830912 R8_w=inv(id=0,umin_value=4096,umax_value=266608639,var_off=(0x0; 0xfffffff)) R9_w=invP446 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1826817,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1830912 R8_w=inv(id=0,umin_value=4096,umax_value=266608639,var_off=(0x0; 0xfffffff)) R9_w=invP446 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1835008 R6=inv(id=2,umin_value=1830913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1830912 R8_w=inv(id=0,umax_value=266604543,var_off=(0x0; 0xfffffff)) R9_w=invP447 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1835008 R2_w=inv(id=0,umax_value=266604543,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1830913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1835008 R8_w=inv(id=0,umin_value=4096,umax_value=266604543,var_off=(0x0; 0xfffffff)) R9_w=invP447 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1830913,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1835008 R8_w=inv(id=0,umin_value=4096,umax_value=266604543,var_off=(0x0; 0xfffffff)) R9_w=invP447 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1839104 R6=inv(id=2,umin_value=1835009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1835008 R8=inv(id=0,umax_value=266600447,var_off=(0x0; 0xfffffff)) R9=invP448 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1839104 R2_w=inv(id=0,umax_value=266600447,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1835009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1839104 R8=inv(id=0,umin_value=4096,umax_value=266600447,var_off=(0x0; 0xfffffff)) R9=invP448 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1835009,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1839104 R8=inv(id=0,umin_value=4096,umax_value=266600447,var_off=(0x0; 0xfffffff)) R9=invP448 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1843200 R6=inv(id=2,umin_value=1839105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1839104 R8_w=inv(id=0,umax_value=266596351,var_off=(0x0; 0xfffffff)) R9_w=invP449 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1843200 R2_w=inv(id=0,umax_value=266596351,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1839105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1843200 R8_w=inv(id=0,umin_value=4096,umax_value=266596351,var_off=(0x0; 0xfffffff)) R9_w=invP449 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1839105,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1843200 R8_w=inv(id=0,umin_value=4096,umax_value=266596351,var_off=(0x0; 0xfffffff)) R9_w=invP449 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1847296 R6=inv(id=2,umin_value=1843201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1843200 R8_w=inv(id=0,umax_value=266592255,var_off=(0x0; 0xfffffff)) R9_w=invP450 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1847296 R2_w=inv(id=0,umax_value=266592255,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1843201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1847296 R8_w=inv(id=0,umin_value=4096,umax_value=266592255,var_off=(0x0; 0xfffffff)) R9_w=invP450 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1843201,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1847296 R8_w=inv(id=0,umin_value=4096,umax_value=266592255,var_off=(0x0; 0xfffffff)) R9_w=invP450 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0_w=inv(id=0) R1_w=inv1851392 R6=inv(id=2,umin_value=1847297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1847296 R8_w=inv(id=0,umax_value=266588159,var_off=(0x0; 0xfffffff)) R9_w=invP451 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0_w=inv(id=0) R1_w=inv1851392 R2_w=inv(id=0,umax_value=266588159,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1847297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1851392 R8_w=inv(id=0,umin_value=4096,umax_value=266588159,var_off=(0x0; 0xfffffff)) R9_w=invP451 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0_w=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1847297,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1851392 R8_w=inv(id=0,umin_value=4096,umax_value=266588159,var_off=(0x0; 0xfffffff)) R9_w=invP451 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
regs=4 stack=0 before 20: (79) r1 = *(u64 *)(r10 -24)
regs=4 stack=0 before 38: (05) goto pc-19
regs=4 stack=0 before 37: (b4) w2 = 4096
; for (int i = 0; i < 512 && offset < args_size; i++) {
26: (26) if w9 > 0x1fe goto pc+5
;
27: (07) r8 += -4096
28: (bf) r1 = r7
29: (07) r1 += 4096
30: (04) w9 += 1
; for (int i = 0; i < 512 && offset < args_size; i++) {
31: (ad) if r7 < r6 goto pc+2
from 31 to 34: R0=inv(id=0) R1=inv1855488 R6=inv(id=2,umin_value=1851393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7=inv1851392 R8=inv(id=0,umax_value=266584063,var_off=(0x0; 0xfffffff)) R9=invP452 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
; int BPF_PROG(exec, struct linux_binprm *bprm) {
34: (bf) r7 = r1
; (void) bpf_probe_read_user(buf, read_size, src);
35: (bc) w2 = w8
36: (a5) if r8 < 0x1000 goto pc-17
R0=inv(id=0) R1=inv1855488 R2_w=inv(id=0,umax_value=266584063,var_off=(0x0; 0xfffffff)) R6=inv(id=2,umin_value=1851393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1855488 R8=inv(id=0,umin_value=4096,umax_value=266584063,var_off=(0x0; 0xfffffff)) R9=invP452 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
37: (b4) w2 = 4096
38: (05) goto pc-19
; void *src = (void *)(char *)bprm->p + offset;
20: (79) r1 = *(u64 *)(r10 -24)
21: (79) r3 = *(u64 *)(r1 +24)
; uint64_t read_size = args_size - offset;
22: (0f) r3 += r7
23: (07) r3 += -4096
; (void) bpf_probe_read_user(buf, read_size, src);
24: (79) r1 = *(u64 *)(r10 -16)
25: (85) call bpf_probe_read_user#112
R0=inv(id=0) R1_w=map_value(id=0,off=0,ks=4,vs=4096,imm=0) R2_w=inv4096 R3_w=inv(id=0) R6=inv(id=2,umin_value=1851393,umax_value=268435455,var_off=(0x0; 0xfffffff)) R7_w=inv1855488 R8=inv(id=0,umin_value=4096,umax_value=266584063,var_off=(0x0; 0xfffffff)) R9=invP452 R10=fp0 fp-8=mmmm???? fp-16=map_value fp-24=ptr_
last_idx 25 first_idx 34
regs=4 stack=0 before 24: (79) r1 = *(u64 *)(r10 -16)
regs=4 stack=0 before 23: (07) r3 += -4096
regs=4 stack=0 before 22: (0f) r3 += r7
regs=4 stack=0 before 21: (79) r3 = *(u64 *)(r1 +24)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment