# https://syzkaller.appspot.com/bug?id=d1908f0b2b3357cf512e197c1060c6f17bc93b23 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"slowdown":1,"sandbox":"none","fault_call":-1,"leak":true,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} syz_80211_inject_frame(&(0x7f0000000000)=@device_b, &(0x7f0000000040)=@data_frame={@no_qos=@type00={{0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x1}, @device_b, @device_a, @from_mac, {0x7, 0x8}}, @a_msdu=[{@broadcast, @device_a, 0x78, "18e130b32271659b06021f8dd3f92ebfb6bfcc9c4feb659e36f0872bd77f55740d134a89df2f66b45c9527845ae0f85e486a9bc3d883937b6a11bf1fb2ffff743c9944738157b5f362fd96efcf0817f5036cc4ca40ce0f8ae132414c03b98bb23c11c5e2eb0cb14a38610cd3dc20199bce20c8c599fe264f"}, {@device_b, @broadcast, 0xb5, "86209f1f30ea9e0e7734377d90367ce4cac2319420ca104e82b6cbebc7dfdf4741ebbf5c4240a9a5aee92c51293fb9f558b8353f9fc81ecdf1582f129407c2dff87891421355258536c6418cd59d278cdbbec0960ba614bd7454dcd043eb811313abbed431822b00bc9718cdf96faa03190d71d5b17f83a4eb3bf4dbc2b6bda65793d3492aac5b5bd400c32d7d4dae44839925f1b04e8c617718dcedbabec00794611e7655f2d20ac31038929ebc6ee21a86f23884"}, {@device_b, @broadcast}, {@broadcast, @device_a, 0x23, "7ad53b8d0b88d4d5c4af67b8b66ce0ebcd677a0f02adcc5b0bf5608f3fd19720da8e02"}, {@broadcast, @device_a, 0xd7, "809ef9b2e2d27ff3c6830455a77aaebb22eaf759ffe74a095d349256c140c29a2aabc67b293f4b32163d10c789a8238eaad8aa7d1446bf8f33689c8832f388534a859e8bd8f5ff48eaa0ac62aaba71b5cc6ed8ad7bcefe0c637780843111c3a8da061d80271d37a40d281e1a4da0b1e8ded5bee7484edae6064979ed88bd92a0f5c606f61f108a3982e92deb31397e8dd63712c4354b3683bf789fc906a3ce24b77d2078b837cc5958113c1cfac387c70f43fc01bf5e94841e4dcfd693ebd8835d654198f0d0ca61609e991406c43a96225d6fbab5f596"}, {@device_b, @device_b}]}, 0x2a0) syz_80211_inject_frame(&(0x7f0000000380)=@broadcast, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, 0x0}, 0x40000) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) getuid() syz_80211_inject_frame(0x0, 0x0, 0x0)