# https://syzkaller.appspot.com/bug?id=f10ee477162a6f234fa4fc7120fa57a4586533c8 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x1, 0xa8, 0x59, 0xf6, 0x0, 0x8, 0x10200, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0x88048, 0x7ff, 0x100, 0x2, 0xa5, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x5}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xc) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000aa7208e8e8d9ed2409509432837b2780005300000000faff0000940000000f811d0b575e698bfb383b80"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x6, 0x4, 0x81, 0x2, 0x0, 0x81, 0x40000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x454eaf3e1e82047, @perf_bp={&(0x7f0000000640), 0x4}, 0x80, 0x80000001, 0x8a, 0x3, 0x8479, 0x5bb7, 0x1, 0x0, 0x1}, 0x0, 0xd, r0, 0x2) gettid() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x1a000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000c80)={r0, 0x20, &(0x7f0000000c40)={0x0, 0x0, 0x0, &(0x7f0000000c00)=""/14, 0xe}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r4, &(0x7f0000000340)={'full', 0x20, 0x7, 0x20, 0xffffa}, 0x2f) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000008000000000000004a64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000002d80)={r6}, 0x8) r7 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000032c0)={0x5, 0x80, 0x40, 0x3, 0x1, 0x9, 0x0, 0xffffffff, 0x80000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1000, 0x4, @perf_config_ext={0x3, 0x3f}, 0x80000, 0x8, 0x10001, 0x9, 0x2, 0x4, 0xfffa, 0x0, 0x87d2, 0x0, 0x2}, r7, 0x4, r6, 0x9) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x6, 0x81, 0x2, 0xff, 0x0, 0x81, 0xf4296dcb077eb582, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7e8e, 0x5ff7}, 0x2890, 0x2, 0x5, 0x7, 0x4, 0x95d, 0xfff9, 0x0, 0x1, 0x0, 0x6}, r7, 0x5, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={0xffffffffffffffff, 0xe0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00), 0x0, 0x0, 0x8, &(0x7f0000000e80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000ec0), &(0x7f0000000f00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000f40)}}, 0x10)