# https://syzkaller.appspot.com/bug?id=9a2f1a62f250b59b5db8113c3b9e4d22656eb8d3 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x400) fcntl$dupfd(r1, 0xfe031221cb258484, 0xffffffffffffffff) mount(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r0, 0x0, 0x2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r2, 0x0) accept4$netrom(r2, 0x0, 0x0, 0x0)