# https://syzkaller.appspot.com/bug?id=243010a29bc1a503159df5f1991c30581ccb84f5 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"devlinkpci":true,"tmpdir":true,"segv":true} prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f00000001c0)}, 0x100}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0x174, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x7}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_FTM_RESPONDER={0x144, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x3e, 0x2, "a17ca631784cd18229e699b1cb2bf2090c3248fbd95b7dbc27b459cb36a5f1ca0907aa00e7507ff47fbeb232cde47a8c4267d981d24d0a63f1e5"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0xfd, 0x3, "75136f4505a180cffd8518c0a91b2a8c4200abc4035dc1094f5e99c6f10b0034be6e99075aab021c47073ba9b48b405c8ebb83a524cb0617bf92a16f7ceca133a1217747dec7bb1dd4bd676afc9c8667cc0c66830c33c85b1bc969d29f600ff64c1f4dc49164520b196f85807e6d89705329a4bfc8e014ce02e99657d79dd749f72a06d821df5dff72c493981f3621ff430b1892aebd14f0114a6528997c8aa96a8f695a2ff4214052a61235f55485531a2e457a5f8bade92b302d429181469d24a5c13d8f20afb6033ac35a0d18de1767234893c0bebf680583cd277c23b7281a44c845bedacf568d36f4132174c7523b7fdd3b5b76e3799c"}]}, @NL80211_ATTR_PBSS={0x4}]}, 0x174}, 0x1, 0x0, 0x0, 0x800}, 0x4010) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x0, 0x300) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x102}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$inet6(r4, &(0x7f0000001540)={&(0x7f0000000240)={0xa, 0x4e22, 0x0, @dev}, 0x1c, &(0x7f00000002c0)=[{0x0}, {0x0}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="1400000000dba400290000003e00000008000100000022ec605942f14aa1dcd475cc0b1932081a58bbf702611beb2664f8c1dc3726f8e476110b4164b27287e44b7e051614c3b69e6c4875e42cf042369371801b194ed16b1088a38812b334a6ae599582e4c8212d1772e1d91e4ba95f52355dfdbcb8221448101b6401205d7c71322a8dd9a2ebbdc039213ce28088cc99ba84c0122b4fc756a31f6fbb47b6fa0c5e20f3040cf8a17766e7376ca20158c1b85728589c7cf26308"], 0xba}, 0x4041) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000180)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [@call={0x4e}]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)