# https://syzkaller.appspot.com/bug?id=5ac24a3c5711973c287882c9539f095ac817a309 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} rfork(0x50) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) (async) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, &(0x7f00000000c0)={0x19, 0x0, 0x10, &(0x7f0000000040)="0100743adeff", 0xfffffffffffffea9, 0x0, 0x0, 0x7d86619a, [0x0, 0x7]}) (async) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc0306367, &(0x7f0000001500)={0x0, 0x1, 0x0, 0x0, 0x0, &(0x7f0000001300), &(0x7f00000013c0), 0x0}) (async) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async, rerun: 64) ioctl$DIOCADDRULE(0xffffffffffffffff, 0xcbe04404, &(0x7f0000000100)="2ae663b765f10ed9794b1c383e4e485a8bab53ed45e2a4dee045a85757f27ad359e033c379eec3b5dcde15170ac4ab9bae30819dcd02ef814f616d16af6d43c5875ce5172ed171a062ef4262dcac2d6372f6a2906773d96939d7154f6c0d7c948d2ce0d6a0f1b8a6e50d340d5ee8765de42d89cfd963e907e7d8894f86823da7daf118f3d8a52928acf16cdadd525c5c523c6e61a7475330f0527b28e9187dd317861dc6e13f76ca5bd6cfe235f2246b279fc2d6d50c9e7d28223f4b8ed67a8690f514ae2d24c94b2f8183d6073272e970837d520ffd8dc06af5825feba65fd623888becf4") (async, rerun: 64) extattr_set_link(0x0, 0x0, 0x0, 0x0, 0x0) (async) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) (async) r1 = socket(0x1c, 0x2, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x8, 0x1c}, 0x1c) (async, rerun: 64) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 64) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000000)={0x0, 0x8, 0x0, 0x0, 0x1, &(0x7f00000002c0)='h', 0x0, 0x8d800000, [0x0, 0x2]}) (async) close(r0)