# https://syzkaller.appspot.com/bug?id=d71f28b21dad3419f79cf010f30167620cb0cfff # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f0000000380)=""/216, 0x0, 0xd8, 0x0, 0x10000}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0xc, 0x1a, 0x0, &(0x7f0000000000)='syzkaller\x00', 0xaa, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x1, 0x10, 0x9, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000f40)=[{0x5, 0x4, 0x9, 0x3}, {0x3, 0x4, 0x7, 0x8}, {0x3, 0x4, 0xf, 0x8}, {0x1, 0x5, 0x7, 0x6}, {0x2, 0x5, 0x3, 0x1}], 0x10, 0x5}, 0x90)