# https://syzkaller.appspot.com/bug?id=059cee5623ce519359e7440ba6d0d6af8b82694e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"","fault_call":-1,"waitrepeat":true} write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'user.', 'cgroup.\x00'}, &(0x7f00000002c0)='ext4\x00', 0x5, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000002000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000380)=""/228, 0x8000a0ffffffff}, 0x28) r1 = socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x110, r1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x400000000fee) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000280)=""/145) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32], 0xfffffdf5) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x27, 0x1, 0x0, 0x0, {0xc}, [@typed={0xc, 0x5, @u64}]}, 0x20}, 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@nfc, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/123}], 0x0, &(0x7f0000000680)=""/108}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/164}], 0x3c3}, 0x3}], 0x4000000000000eb, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) dup(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d}, 0x2c, {'wfdno', 0x3d}, 0x2c}) r2 = socket$inet6(0xa, 0x2000000000001, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) bind$inet6(r2, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r2, &(0x7f00007a8fff), 0x3a7, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e20, 0x2c00000000000000, @loopback={0x0, 0x1}}, 0x1c) setsockopt(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000040), 0x0) memfd_create(&(0x7f00000000c0)='wlan1*{em0vboxnet1Uvboxnet0Jvboxnet0,em0cpusetem1}-:\x00', 0x1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a1, &(0x7f0000000140)={'bridge0\x00'}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000003940)=@hci, &(0x7f00000039c0)=0x80)