# https://syzkaller.appspot.com/bug?id=eb3d4d80703ceb68d41c5863ea6eccd6d50f2f74 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"slowdown":1,"sandbox":"none","fault_call":-1,"leak":true,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000e80)=[{0x0}, {&(0x7f0000000bc0)=""/214, 0xd6}, {&(0x7f0000000cc0)=""/31, 0x1f}, {&(0x7f0000000d00)=""/158, 0x9e}, {&(0x7f0000000dc0)=""/121, 0x79}], 0x5, 0x7, 0xff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000f40)={0x0, 0x70}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10001}, 0x2000c000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0xd0543, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001540)}, {0x0}, {&(0x7f00000001c0)="27f0ce8780bac3090a993bff285d389be8b91075fe9074f9c304e735222f56b8540412fe17e5a53ddd52", 0x2a}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001440)={'syztnl0\x00', &(0x7f00000013c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x40, 0x0, 0x18, @private1, @local, 0x10, 0x10, 0x10000, 0x1}}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002080)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x140) mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$incfs(0xffffffffffffffff, 0x0, 0x42040, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) inotify_init1(0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa0800460000280000000000219078ac141400ac1414aa0703420000000000040190780048fd88003bba37b16d1065df840df6c55e726e54f15facb35426bda5dc9e04d23b09d007213dad451c227f393b7943c6391d723edf1ecf1c3b21b5bf01cdcbf744a78c1cdc748037d81e4dfc6c388a9d370a12e8b6b2bafec7eb6164798b7322da43e66d3a8e109c3be6a4f2bcec0a8e3f1e38b36e256923cb5c2a895a"], 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x1d, 0xcc, 0x3, 0x1, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0), 0xfffffff7, r3}, 0x38) signalfd4(r3, &(0x7f0000000040)={[0x100]}, 0x8, 0x80800) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x10)