# https://syzkaller.appspot.com/bug?id=97550d064a4ca3e570f7bd8a9f85fd08e2a2b0bf # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"devlinkpci":true,"tmpdir":true,"segv":true} socketpair(0x21, 0x0, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'eth1!('}], 0xa, "6710c0571bc4c498ea60ba364cffa9041789d5915ea277"}, 0x29) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x10000) r0 = dup(0xffffffffffffffff) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x200000c, 0x80010, r0, 0xa3ed) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e2, 0x0) timerfd_create(0x2, 0x80000) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x8) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)={0x7, 0xffffffffffff7fff, 0x4, 0x0, 0x0, [{{r1}, 0x8000}, {{}, 0x3}, {{}, 0x2}, {{}, 0x7}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) socketpair(0xf, 0x6, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8983, &(0x7f0000000400)={0x8, 'veth0_to_hsr\x00', {'rose0\x00'}}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfffffffffffffff7) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x121) r4 = dup(0xffffffffffffffff) ioctl$RNDADDTOENTCNT(r4, 0x40045201, &(0x7f00000004c0)=0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0)