# https://syzkaller.appspot.com/bug?id=ecc13ed3cdced06f4d20c13ae9973406c7192692 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"namespace","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000020180)={'#! ', './file0'}, 0xb) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, 0x0) r1 = inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = openat$kvm(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = pidfd_getfd(r0, r1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x20, &(0x7f0000000280)=""/223, &(0x7f0000000040)=0xdf) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001cc0)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f00000014c0)=""/54, 0x36}, &(0x7f0000001540)=[{&(0x7f0000001500)=""/15, 0xf}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0x90}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r7, 0x5414, &(0x7f0000000100)={0x401, 0x7}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000e00)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000737308b04740904eb006339aab1f2bf72757bfb4f4fc50c7e1790796cc9b599109b1ee8d86e9546f818925e9e17145eee9031484928b0d5b884e5d6a14e44ca28d75c030d5294afe261f508d78508653123107a47ebff440f848c8e65fd9396fc6a83f0a8c8723f9e8ab28b4aaebf77dfa46cdcf5c59889c52a67eac4d7ebeca933f75fd48c625bfc70000000000000000003f3fe2f40e3924ab338a6278f7122ec64ddcbda19f02028471ffdab1f011b06df5cea9d4ebe4f48729bb89a05f46b00f4388f1a23b400fe1589c05938c0533064e03f6e545167aafcbfe774112a1a2d865148c29a7ef6298cced6ee5a2a8a4911c8fc02be1cb77de670a0c430f4e1f395eaed677bfb3ea49ede402604e343c5b5f8fbd4cee22e096418e96c66d7cde4cf4ac7a4085855e169ee755b266f9a85d4f2abc4684b8345aa0eb76e6ad120f4ad4"]) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x4c, 0x3, 0xa, 0x101, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15)