# https://syzkaller.appspot.com/bug?id=136ef9d26ed9655be00dd1020c55174385e2ffd5 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x11001, 0x0) fchdir(r0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x82, 0x0) splice(r1, 0x0, r4, 0x0, 0xffffffff, 0x0) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r6 = openat(r5, &(0x7f0000000000)='./bus\x00', 0x0, 0x80) openat$cgroup(r6, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r7) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x6100) r9 = dup(0xffffffffffffffff) sendmsg$inet6(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)}, {&(0x7f00000002c0)}, {0x0}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001740)="8617dfb562992a4bbfafe647a8d7148028fcbab6d8e2ec99713fb1b6d550afb168106793f029a18335ce1a956a6eeb668cb602ed045186824f498ad87cb845023d1da6a1fbdbbb280d9fc0c96c30325a777fe6403de5e84c4f64269b788f7e4fcd1a77437841e2ddc1b302c0348b44f82436cd1b610751e0346908cb23c35a8e8e1e0aa92e14cb8c68a41e7d97663b907a965ba0e5a8cebd48cdc5298c01ae9a6c4a793fc97ef4770fc93fce16c86be5f793aa0dad64f02484e7e9ec31347c", 0xbf}], 0x6}, 0x40000) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r8, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xe20d) io_setup(0xff, 0x0) io_destroy(0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) timer_create(0x1, 0x0, 0x0) timer_getoverrun(0x0) getpeername$netlink(r8, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) write$cgroup_int(r11, &(0x7f0000000040), 0x185) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) splice(r10, 0x0, r12, 0x0, 0x8100000, 0x0)