# https://syzkaller.appspot.com/bug?id=913598f2ef4504460d88ae845830e245d00debd5 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true} r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x400000, 0x42) connect$unix(r1, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0xea4832e43a46695) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x2) syz_extract_tcp_res(&(0x7f0000000040), 0x3b, 0x1) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x40087708, &(0x7f00000011c0)="000000800000800000") r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x180, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000040)) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r4, &(0x7f0000000180)=@in, &(0x7f0000000100)=0x80) r5 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x10}, 0x10001}, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0xa}, 0x20}, 0x401, [0xb54, 0x0, 0x5, 0xfffffffffffffff9, 0x8, 0x20, 0xc00000000000000, 0x3]}, 0x5c) fcntl$addseals(r5, 0x409, 0x8)