# https://syzkaller.appspot.com/bug?id=2da0807586b72e32626d0375b351654ce0adaf76 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000200)}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1e, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1810", @ANYRES32=0x1], &(0x7f0000000140)='syzkaller\x00', 0x40, 0xbc, &(0x7f0000000200)=""/188, 0x40f00, 0x1, '\x00', 0x0, 0x1f, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc09200a1, 0x0, 0x1000000, 0x0, 0x0, 0x0) (fail_nth: 78) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x2, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x5, 0x5, 0x0, 0x2}], 0x0, 0xf87, 0xc5, &(0x7f0000000500)=""/197, 0x0, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000600), 0x8, 0x10, &(0x7f0000000640)={0x5, 0xe}, 0x10}, 0x80)