# https://syzkaller.appspot.com/bug?id=bc2bc9da2825a560d04dbe2039655f62599b27d7 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":4,"sandbox":"","fault_call":-1,"close_fds":false,"tmpdir":true} socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) sync_file_range(0xffffffffffffffff, 0x6, 0x6, 0x5) dup3(r3, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000340)=0x68) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0xe0) write$P9_ROPEN(r4, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syncfs(r5) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) write$P9_RAUTH(r2, &(0x7f0000000180)={0x14, 0x67, 0x1, {0x8, 0x0, 0x6}}, 0x14) syz_open_dev$ptys(0xc, 0x3, 0x1) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$unix(0x1, 0x1, 0x0) listen(r7, 0x0) accept$unix(r7, 0x0, 0x0) fsetxattr(r7, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x1a, 0x1) write$P9_ROPEN(r6, 0x0, 0x0) write$P9_RREADLINK(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="0700007574000000000000939c68"], 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r8, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000001c0)=0x80) close(r9) setsockopt$inet6_int(r9, 0x29, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r9, 0x0, 0x29, &(0x7f0000000200)={@local, @multicast2, 0x0, 0x4, [@dev={0xac, 0x14, 0x14, 0x38}, @rand_addr=0x4, @loopback, @local]}, 0x20) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x5450, 0x0)