# https://syzkaller.appspot.com/bug?id=61d80cc45077fcc43cec63681f58a989ec08dbf2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"","fault_call":-1,"close_fds":false} r0 = creat(0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @rand_addr=0x80000000}}) pipe(0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x4000) mount(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='ramfs\x00', 0x1000, &(0x7f0000000280)='/dev/input/mice\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x201, 0x0) write$binfmt_aout(r1, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) syz_open_pts(r1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0)