# https://syzkaller.appspot.com/bug?id=bddba6ce33aa2286aed84ee50a7281d2d3f910f4 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox: Fault:false FaultCall:-1 FaultNth:0 EnableTun:false UseTmpDir:false HandleSegv:false WaitRepeat:false Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000e27000-0x78)={0x2, 0x78, 0xdce9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000317000)=[{&(0x7f000001b000-0x60)={0x27, 0xffff, 0x0, 0x4, 0x8, 0xffffffff00000000, "9629c6003a6408ba9f6ac462d0c93c3b813b2fb38d009c132cf08b8af6c7d3804fa4a3021fe1a7c40130116057c20c5c79ec3e19337c67e8e5a42962cf7cd1", 0x91}, 0x60, &(0x7f000084c000)=[{&(0x7f00006d2000)="", 0x0}, {&(0x7f00006c9000)="", 0x0}, {&(0x7f0000f52000-0x1000)="", 0x0}, {&(0x7f0000c29000-0x1)="", 0x0}], 0x4, &(0x7f0000bc1000)={0x10, 0x117, 0x0, ""}, 0x10, 0x10}, {&(0x7f00009e8000)={0x27, 0x5, 0xb986, 0x3, 0x400, 0x400, "b64faec2b918d0af99b99ebc0ce761ae27ba3623725921ff29a1a1abe3b9e5b061dcbcbb6b1eec13e13912e044b010800d9fc2b5562eebd031ebf25abdab7f", 0xdd}, 0x60, &(0x7f0000a12000)=[{&(0x7f00008b8000-0xb5)="", 0x0}, {&(0x7f0000c4e000-0xe)="", 0x0}], 0x2, &(0x7f00008d2000-0x108)={0x10, 0x10d, 0x3f, ""}, 0x10, 0x8000}, {&(0x7f0000ecd000-0x60)={0x27, 0x0, 0xfffffffffffff1ff, 0x7, 0x2, 0x9, "94709bb5aa71ecd4dc82f6b2b37d8d256b2066fb1bc8c4dd246b0b6f6c90b61356a377ceb1523bacb4ea55796aabf02de8b9876d6ded8885139e780f34e75a", 0x9}, 0x60, &(0x7f0000093000)=[{&(0x7f0000fb8000-0x1000)="", 0x0}, {&(0x7f00000f6000-0x95)="", 0x0}], 0x2, &(0x7f00000bc000)={0x10, 0x18f, 0xb6d9, ""}, 0x10, 0x804}, {&(0x7f0000006000-0x60)={0x27, 0x3, 0x1, 0x4, 0x0, 0x2, "f4c8252e5e8d956b01e3ba6bfca75a300ed8a5444f79c19436ad7f166d6f42aea100c87a10c5ff67b3aa8edcaac5480d421faec84c0933653c1da974323cca", 0x3}, 0x60, &(0x7f0000f60000)=[{&(0x7f00004a4000-0x1000)="", 0x0}, {&(0x7f0000f97000)="", 0x0}], 0x2, &(0x7f00003f0000-0xe8)={0x10, 0x100, 0x7, ""}, 0x10, 0x20000010}], 0x4, 0x1) perf_event_open(&(0x7f0000e7b000-0x78)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0x0, 0x0}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000cf9000)={0x0, 0x80000000}, &(0x7f0000aff000-0x4)=0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)="2f6465762f7667615f6172626974657200", 0x100, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) close(r0) r1 = socket(0x10, 0x2, 0x10) write(r1, &(0x7f0000fdb000)="1c0000001f000720270100081d00000001000000000000000600f70000020019fa97", 0x22)