# https://syzkaller.appspot.com/bug?id=a3d5cee035800a17bb033d6ab725d02a4fc61878 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} syz_emit_ethernet(0x0, 0x0) open$dir(0x0, 0x8, 0x48) link(0x0, 0x0) link(0x0, 0x0) r0 = openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$FIONREAD(r1, 0x80206979, &(0x7f0000000000)) symlink(0x0, &(0x7f0000000e40)='./file0\x00') rename(0x0, 0x0) rename(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000180)={'tap', 0x0}) syz_extract_tcp_res(0x0, 0x0, 0x0) socket(0x11, 0x2, 0x0) getdents(0xffffffffffffffff, 0x0, 0xfffffffffffffd8d) socket(0x18, 0x2, 0x0) socket(0x18, 0x2, 0x0) r2 = dup2(0xffffffffffffffff, r0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getdents(r2, 0x0, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, 0x0) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x20, 0x0, 0x3f, 0xbc6}, {0x25}, {0x40e, 0x0, 0x0, 0x4}]}) syz_emit_ethernet(0xe, 0x0) sysctl$vm_swapencrypt(&(0x7f0000000000), 0x3, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x27) setreuid(0xee00, 0x0) r3 = getuid() chown(&(0x7f0000000180)='./file0\x00', r3, 0x0) getuid() mmap(&(0x7f0000020000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)