# https://syzkaller.appspot.com/bug?id=d91e323ce924658204882ab5ac5baf5bfebf932d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"sandbox":"","fault_call":-1} ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x3, 0x7f}}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000240)={{0x2, 0x7, 0x0, 0x81, 'syz0\x00', 0x6}, 0x5, 0x24, 0xfff, r0, 0x9, 0x100000000, 'syz0\x00', &(0x7f0000000180)=['cgroup\x00', '/dev/input/mice\x00', 'proc\x00', '/dev/snd/controlC#\x00', '/dev/zero\x00', '/dev/zero\x00', 'eth1\x00', '/dev/input/mice\x00', '/dev/input/mice\x00'], 0x68, [], [0x40, 0x6, 0x800, 0xfffffffd]}) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001580)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000001680)=0xe8) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0xfffffffffffeffff, 0xe54, 0x5, 0x10000}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8001a0, 0x0)