# https://syzkaller.appspot.com/bug?id=484483daf3652b40dae18531923aa9175d392a4d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} unshare(0x6c060000) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'nat\x00', 0x21880, [0x6300]}, &(0x7f0000000100)=0x54) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240), 0x68902, 0x0) write$rfkill(r1, &(0x7f0000000040)={0x1}, 0x8) write$rfkill(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x6, 0x3}, 0x8) write$rfkill(r1, &(0x7f0000000080)={0x9, 0x1, 0x3, 0x1, 0x1}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x4, 0x5, 0xfa, 0x5, 0x0, 0x5, 0x290, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2a, 0x8, 0x0, 0x8001}, 0x0, 0x0, r2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x106c, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010800)) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x23) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x18}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x2000440, 0x0) keyctl$clear(0x7, 0xfffffffffffffff8) r5 = socket$unix(0x1, 0x0, 0x0) sendto(r5, &(0x7f0000000380)="4f19da3c1b768d83ae09863effec7c26b320d3466ba6dcf06553d05a43282751e381e4305af6e5212cb719ecd968a70552fb99559011c1001c999e98cb5ca2cf3a323a19ec05f6e67f7cc2af12781edc5e9e32bed4ae078e0ffa40c0fe5f568d84ec6b90e24cfa88f73458ba8b186d3b19d45a8962f9de15661d8666d7fbcac30d2023d8ce6fb5522413e8a84570eae68dd844268a496afdea9e7753709717eb5784bb25197875f86a365d956f61c7bf22269b6db893d22c5a9b14b686f297cb89a7c4f027d9ef39d95545c4d480e5648a9f05aa3800781c847b8e1c2852639bfc76bd1c665a614fb8bd279f3093c81198f16eefd1dd4ddc", 0xf8, 0x4000000, &(0x7f00000001c0)=@nl=@unspec, 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'})