# https://syzkaller.appspot.com/bug?id=286166aa4744abfe4a5d2b5f6eb4796575004992 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"","fault_call":-1} r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000500)={0xa0, 0x0, 0x0, {{0x0, 0x3, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}}, 0xa0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x8000, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/115, 0x73, 0x2000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a80)=ANY=[@ANYBLOB="66696c746544ed94b200000000000000000000000000000000000000000000000700000004000000580400f700000000580200000000000070030000700300007003000004000000939b932145008f9e84", @ANYPTR, @ANYBLOB], 0x3) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0xffffffffffffffbd, 0x0}}], 0x3fffcf6, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x253be3f7d1139417, 0x0) clone(0x3102003ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$cont(0x18, 0x0, 0x3ff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)