# https://syzkaller.appspot.com/bug?id=e81a2b08bf21ba11b4519eea77a0d1154c07fd37 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(r2, 0x0, &(0x7f00000001c0)) sendmsg$can_raw(r2, 0x0, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {&(0x7f0000000800)="16eb8664be1f8411cf0cbaefd0f74c676f99e9af1be31bc6fe2b896cad44ea064b1d517adf63e2887427276b5ca075d0d794b9258e5f08927704ebcd9eb84f26f781b10b1d92ca8ffbc4989c12f35641db1d8f8c145a370c0e783da3b0447e17501596d4ede4108b2b8fb8b720b0403696c841660d", 0x75}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe678c5ac25c4ad7c81760f7dc2296c0b9", 0x43}, {&(0x7f0000001940)}, {0x0}, {0x0}, {&(0x7f0000000080)="1d43dd939580d32daf418a14cd517946315afe2a6b8c40b9861cf4ee5f41e70c616d", 0x22}], 0x9) dup3(r0, r2, 0x80000)