# https://syzkaller.appspot.com/bug?id=fbd54f3415be387d631fb489da7efdb3cb6214e5 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"vhci":true,"tmpdir":true,"segv":true} r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a34000000e3bd6efb250009000e000d00400000ff050005001201", 0x2e}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x2880008, 0xffffffffffffffff, 0xffffffffffffffff, 0x8a49, 0x10003, 0x801}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x800000}) ioctl(r1, 0x8b1a, &(0x7f0000000040))