# https://syzkaller.appspot.com/bug?id=7c54975d5857d7107ac357606c3c744771ef7610 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], 0x1e8}, 0xc04c081) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000140)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001480)='cgroup.stat\x00', 0x7a05, 0x1700) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x4, 0x0, 0xa, 0x3, 0xb, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000004c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x7, 0x5, 0x6}, 0x10}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r0)