# https://syzkaller.appspot.com/bug?id=e56e6e7d53c843019fd5c93c9550579105dac0c7 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000962000-0x4)=0x0, &(0x7f0000d78000)=0x4) mmap(&(0x7f0000f74000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2f, &(0x7f0000fdc000-0x4)=0x2, 0x4) sendto$inet6(r0, &(0x7f00007ad000)="6c01dc", 0x3, 0xfffffefffffffffc, &(0x7f0000f63000-0x1c)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x0}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00001ee000-0x4)=0x0, &(0x7f0000ea5000)=0x4) msync(&(0x7f00002af000/0x1000)=nil, 0x1000, 0xffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000796000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x80000) fgetxattr(r0, &(0x7f0000e15000)=@random={"62747266732e00", "637075736574706f7369785f61636c5f61636365737300"}, &(0x7f000094e000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xe1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f000009f000-0x4)=0x0) fcntl$getown(r0, 0x9) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f000004f000-0xe0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", [0x0, 0x0]}) r2 = open(&(0x7f000039a000)="2e2f66696c653000", 0x141042, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000314000-0xa)="2f6465762f70746d7800", 0x82, 0x0) ioctl$TCSETA(r2, 0x5402, &(0x7f000061c000-0x14)={0x8, 0x61e, 0x1, 0x1, 0x2, 0x40, 0x5, 0xb7, 0x0, 0x7203}) sendfile(r3, r1, &(0x7f0000336000-0x8)=0x0, 0x6bc6) accept4$ax25(r2, &(0x7f000053f000-0x10)={0x0, {"00000000000000"}, 0x0}, &(0x7f0000b59000-0x4)=0x10, 0x80000) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00006a9000-0x1c)={&(0x7f00003ea000-0x80)=@generic={0x10000000001e, "02ff01000000010000000000000007e77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1c000-0x18)=[{&(0x7f0000cdb000)="", 0x0}, {&(0x7f00006d2000)="910e496c237ed44d697408f6a8e7107bd599dec452a2fd5433af7e100ab98b28e24a579a348dc4168f05c83c20e7cc8c8b8f356a9fe3fa22f32fb5363feaf8aa9a46f3528efdd4321dd5a3e30c055fc6768c16680cbee194e5515b", 0x5b}, {&(0x7f000045a000-0xb0)="2d0d5b0c8f5e8d980c9ed43c09b1b0364c90e6365cf016f176dadf20993710ea5ffa771d1c7483c25837ee54ba57e85d888dfe44effdb0e87b90875153774231e2e076498e5d2e9ef5c3875ca82be2234289011618e09f378b588cd4cf9be18b173f351ec1e80cca9d061f2953099930f7997f6dd3b381818986d9f44cd5171d3750506d8dde3c741e3b3ae171f0540fbf9e9ae9e7db5effed4738e8c66c4ee91d2ce47f6503e15a649eacbdf71dad3e", 0xb0}], 0x3, &(0x7f0000c9e000)=[], 0x0, 0x0}, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f00003dd000)={0x3, 0x7, 0x3, 0x0, 0x7, 0x400, 0xfffffffffffffff9, 0x8, 0x9, 0x1, 0x5, 0x40}) socket$netlink(0x10, 0x3, 0x9b) keyctl$link(0x8, 0xfffffffffffffffb, 0xffffffffffffffff) r4 = request_key(&(0x7f0000494000-0x5)="6365706800", &(0x7f0000505000)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f00006d0000)="637075736574706f7369785f61636c5f61636365737300", 0xfffffffffffffffe) keyctl$search(0xa, r4, &(0x7f0000d04000-0x5)="7573657200", &(0x7f00008ea000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0)