# https://syzkaller.appspot.com/bug?id=6eea1643991c65d0b6e48335439cca795de4592d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_GET_NO_NEW_PRIVS(0x27) fsetxattr$security_smack_entry(r4, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r4, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r4], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r2, r2, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, 0x0, 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0)