# https://syzkaller.appspot.com/bug?id=36a185fa144b0ee3d64d62f6aeed36fb5339f530 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="d3d2b93c38f19c041acd801a"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9ebb2ee451010001010000800000006a7ce96c2482ba837296d861244e2e0ce4e8bbb2b07f3572"], 0x0, 0x66}, 0x20) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200c0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0xfffffffffffffffe, &(0x7f0000000080))