# https://syzkaller.appspot.com/bug?id=a26b0f3d97b4997c571201749d830c6b0a239ce0 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001fc0)={0xffffffffffffffff, 0xe0, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001d00)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000001d40)=[0x0, 0x0], &(0x7f0000001d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xae, &(0x7f0000001dc0)=[{}], 0x8, 0x10, &(0x7f0000001e00), &(0x7f0000001e40), 0x8, 0xbf, 0x8, 0x8, &(0x7f0000001e80)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002000), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x7}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000040)=r3, 0x8) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000027c0), 0x8) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000002880), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000003a00)={0x1a, 0xd, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x7d}, [@exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000002680)='GPL\x00', 0x6, 0xea, &(0x7f00000026c0)=""/234, 0x40f00, 0x2, '\x00', r0, 0x33, r4, 0x8, &(0x7f0000002800)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000002840)={0x3, 0x5, 0xfffffff7, 0xfffff083}, 0x10, r1, r5, 0x8, &(0x7f00000028c0)=[0x1], &(0x7f0000002900)=[{0x0, 0x2, 0xa, 0xb}, {0x4, 0x1, 0x2, 0x4}, {0x4, 0x3, 0x0, 0x4}, {0x0, 0x1, 0x10, 0xb}, {0x0, 0x5, 0x6, 0xb}, {0x1, 0x5, 0xe, 0x4}, {0x1, 0x4, 0x8, 0x1}, {0x4, 0x1, 0xa, 0x2}]}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002140)={{}, &(0x7f00000020c0), &(0x7f0000002100)='%pI4 \x00'}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002180)={0xffffffffffffffff, 0x9, 0x14}, 0xc) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000007000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='jbd2_checkpoint\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2, '\x00', 0x0, r9, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r9, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x69, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xf5, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001a00)={r9, 0x20, &(0x7f00000019c0)={&(0x7f00000008c0)=""/197, 0xc5, 0x0, &(0x7f00000009c0)=""/4096, 0x1000}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x3, 0x32, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @alu={0x0, 0x0, 0x7, 0x6, 0x1, 0x1, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x1, 0xb, 0x3, 0x30, 0x10}, @map_val={0x18, 0xe, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x42}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='syzkaller\x00', 0x8f, 0x54, &(0x7f00000004c0)=""/84, 0x41000, 0x1, '\x00', r11, 0x33, r9, 0x8, &(0x7f0000000840)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x10, 0x0, 0x9}, 0x10, r12, r9, 0x7, &(0x7f0000001a40)=[r9], &(0x7f0000001a80)=[{0x2, 0x1, 0x6, 0xa}, {0x4, 0x5, 0x8, 0x2}, {0x5, 0x2, 0xb, 0x6}, {0x0, 0x2, 0xf, 0x1}, {0x1, 0x3, 0xc, 0xb}, {0x0, 0x4, 0xa, 0x6}, {0x0, 0x4, 0x6, 0xc}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_deliver\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r9, 0x40086607, 0x20001412) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002580)={r13, 0x0, 0x4b, 0xf8, &(0x7f0000002300)="b7cab70c7074619c0b158a2ad935964b53ddfb467967a9340d4c61a1db129d00aab9adcdc786c63ff27d30d9a3d4801149e79fdfd6c956e4f2273298164b680861fe7c6ab95baf61421962", &(0x7f0000002380)=""/248, 0x1, 0x0, 0x0, 0xf3, &(0x7f0000002a00), &(0x7f0000002480)="c12a86b98e6c526e2452145ea563587f25e292e952a05644552819f51a350504c362d7acd60a62cb3bdb2c8694e311d5ed3a1bf6422a8026809d60b1f43a769851a1e9c0207abc9927dfc96ad159a36e6051ff6347916b41763902857b53a3658823ca28f1e003f95c6ede4b28cb851b05ef28c5b6a8493bf1b964969cf513147bf97730db263e950d1db072213ea9bf7e3a5af1b40a66eaa321113cc123988be2880d5e76cdcdf5fea1f84368a12ba8e9c0e6033b1d64645eb29c7a88d5033339c29bf2e0ba754b9bac84d968ec7b2503601acc46ac09f6663e9be8156f23410a0efcc98a5cd67cac9ffc450e56832953b1d8", 0x2, 0x0, 0x2bf}, 0x50)