# https://syzkaller.appspot.com/bug?id=6eea1643991c65d0b6e48335439cca795de4592d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} prctl$PR_SVE_SET_VL(0x32, 0x1849d) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0xfffffffffffffcb5, 0x6, 0x5, 0x7, 0x800, 0x0, 0x2, 0x80, 0x2, 0x4dc, 0x1f, 0x1, 0x5012, 0x7, 0x81, 0x3, 0xffffffffb9c79526, 0x4a, 0x7fffffff, 0x2ea0, 0x4, 0x100000000, 0x8001, 0x100, 0x5, 0x5, 0x100000000, 0x400, 0x4, 0x1, 0xf2a7, 0x8, 0x10000000000, 0x0, 0x480000000, 0x400, 0x3, 0x0, 0x4, 0x3, @perf_config_ext={0x40, 0xdd}, 0x802, 0xffffffff, 0x7ff, 0x5, 0x4, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x2, 0xffffffffffffff9c, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='syz*\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) faccessat(r1, 0x0, 0x8, 0x1000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f00000001c0)={{}, 'syz*\x00'}) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0xfffffec6) pipe(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)