# https://syzkaller.appspot.com/bug?id=f10ee477162a6f234fa4fc7120fa57a4586533c8 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000008000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x4}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=@base={0x8, 0x9, 0xffff, 0x200, 0x806, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000dc0), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ec0)={0x11, 0x19, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, {}, {}, [@map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x100, 0x45, &(0x7f0000000bc0)=""/69, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000c80)={0x0, 0xb, 0xffff8e34, 0x80000000}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000e40)=[{0x0, 0x3, 0x7, 0x7}, {0x0, 0x4, 0x1}, {0x0, 0x4, 0x6, 0x5}, {0x3, 0x5, 0x3, 0x3}, {0x5, 0x4, 0xb}, {0x0, 0x1, 0xe, 0x3}, {0x5, 0x3, 0x8}, {0x2, 0x4, 0xa, 0x2}]}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002300)={0x11, 0x1, &(0x7f0000002140)=@raw=[@ldst={0x3, 0x1, 0x2, 0x9, 0x5, 0x80, 0xfffffffffffffff0}], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000021c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000002200)={0x4, 0x3, 0xff, 0x401}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000002280)=[{0x5, 0x5, 0x2, 0x4}, {0x2, 0x1, 0x3, 0x8}, {0x4, 0x5, 0x4, 0xc}, {0x0, 0x4, 0x6, 0x8}, {0x3, 0x1, 0x3, 0x2}, {0x0, 0x3, 0xa, 0x3}], 0x10, 0x80}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800)