# https://syzkaller.appspot.com/bug?id=36db21501777af3d5e5913af6bc0f1b5e7ec6b3b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"callcomments":true} openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x81000) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) gettid() r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x121602, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x14) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$cont(0x18, r1, 0x2, 0xfffffffffffffffa) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0)