# https://syzkaller.appspot.com/bug?id=9a4461b2f3bbdc6992efb16b2300ea2eabe21bd9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1807000000000000000008000000000085000000050000009500004000200000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000cc0)={0x0, r0}, 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000009c0), 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@bloom_filter={0x1e, 0x3, 0x40, 0x0, 0x20480, r1, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x10000003, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8000000000000000}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfff4}, 0x0, 0x0, r5, 0x0) syz_clone(0x24100400, &(0x7f0000000a40)="b8913430a3e1cafa000000003b9d30b175a45f22a1fd26a5a315be7e7e8bc50610e54058cd643175edd9ee84b1eb1d75d8d75576cf5bb92be3e66d8e99187b0edf8f8a8f59556d6469a529ad5231dd68c4b396213231388ac637e011a3177c382d14051ca4a259e6e906473a58ef8315893f31f23d8c8aa58c182147789990e9c3a72d665f394c09ac61a1355fb1c353c3345ef592d12cd23ff4851826165f69745cc4243fcc4f7b4b655ccf70a0", 0xae, 0x0, &(0x7f00000004c0), 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)=r0}, 0x20) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0x28, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffff95f, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x0, 0xa, 0x8, 0x19, 0xffffffffffffffc0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='syzkaller\x00', 0x2, 0x1, &(0x7f00000007c0)=""/1, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x28, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x5, 0xb, 0x6, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000880)=[r6], &(0x7f00000008c0)=[{0x0, 0x5, 0x2, 0x7}, {0x0, 0x5, 0xb, 0x2}, {0x4, 0x2, 0x7, 0x6}, {0x4, 0x1, 0xc, 0x5}, {0x4, 0x2, 0x6, 0x5}, {0x5, 0x1, 0x10}], 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup(r2, 0x0, 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r8 = perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0xaf, 0x6, 0x0, 0x0, 0xa, 0x20312, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000440), 0x2}, 0x404, 0x5, 0x1, 0x5, 0x4, 0x5, 0x2, 0x0, 0x2, 0x0, 0x30000000}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000480)='\x00')