# https://syzkaller.appspot.com/bug?id=6645023ba8f2a5a0bc7bb7bdc75c006c25e657bf # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"close_fds":true,"vhci":true,"wifi":true,"tmpdir":true} perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x9}, 0x10400}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000740)={0x1, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1b, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x75b, 0x0, 0x0, 0x41100, 0x3, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x3, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x1d, 0x3, 0x1f, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r1, r0}) recvmsg(r1, 0x0, 0x10002)