# https://syzkaller.appspot.com/bug?id=016814f413b437ebf8d530b3775e620a892cf584 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"segv":true} bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000007000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000007000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)=r0}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) dup3(0xffffffffffffffff, r4, 0x0) (async) dup3(0xffffffffffffffff, r4, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r4, &(0x7f0000000040), 0xfea0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r4}) (async) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r4}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)='%ps \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)=r0}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuacct.usage_user\x00', 0x0, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0x20, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x200}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x3, 0x2, 0x0, 0x1, 0xf, 0x30, 0x8}, @jmp={0x5, 0x1, 0x0, 0x2, 0x5, 0x100, 0xfffffffffffffffc}, @generic={0xc3, 0x5, 0x5, 0x4d3b, 0x40}, @map_fd={0x18, 0x6, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x6, 0x7, 0x1, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x579}}, @ldst={0x3, 0x2, 0x2, 0xb, 0x1, 0x50}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xe03119c7a13a07b3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0xf8, &(0x7f0000000480)=""/248, 0x0, 0x40, '\x00', 0x0, 0x29, r4, 0x8, &(0x7f0000000380)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x5, &(0x7f0000000740)=[r6, r7, r8, 0x1, r9], &(0x7f0000000780)=[{0x1, 0x3, 0xa, 0x1}, {0x3, 0x4, 0xf, 0x2}, {0x2, 0x5, 0xe, 0x7}, {0x3, 0x1, 0xf}, {0x4, 0x1, 0x1, 0xb}], 0x10, 0x3}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x16, 0x0, 0x30000, 0x1}, 0x48) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x16, 0x0, 0x30000, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000440)={r10, 0x0, 0x0}, 0x20)