# https://syzkaller.appspot.com/bug?id=286166aa4744abfe4a5d2b5f6eb4796575004992 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"","fault_call":-1} openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) getegid() ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) io_setup(0x2b0, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) uname(0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tables_matches\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e26, @local}, 0xd) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) read(r2, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, &(0x7f0000003b40)={0x0, 0x989680}) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000d40)={'filter\x00', 0x7, 0x4, 0xfffffffffffffea5, 0x280, 0x0, 0x3b4, 0x3b4, 0x3b4, 0x3b4, 0x4, &(0x7f0000000340), {[{{@uncond, 0xfffffffffffffe10, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @loopback, @rand_addr=0x1f, 0x8, 0xffffffff}}}, {{@arp={@empty, @multicast1, 0xff, 0x0, @empty, {[0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x7fff, 0xf65, 0xff, 0x7, 0x3f, 0xfffffffffffff801, 'eql\x00', 'bcsf0\x00', {}, {}, 0x0, 0x1}, 0xf0, 0xffffffffffffffee}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @local}}}, {{@arp={@loopback, @dev, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6gre0\x00', 'ip6_vti0\x00'}, 0xe1, 0x134}, @unspec=@LED={0x44, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0xffffffffffffff16) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) setxattr$security_smack_entry(0x0, 0x0, &(0x7f00000003c0)='syz1\x00', 0x5, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r4 = socket$netlink(0x10, 0x3, 0xffffffffffff7ffe) futex(0x0, 0x4, 0x0, 0x0, 0x0, 0x1) sendmsg$nl_route(r4, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0xb60, 0x0, 0x7, 0xc, 0x8, "22f1da29797e1ccd8a68d997f0fa534fc4a02f85fa1f390bc145291900149dc3945ae34bc827750cf52a05ef2730085e8bb3dc9f885933acb7a2cbcb6f75038f", "15c413ee62b006d272106a3c1410729826caf60e89bb4e23710fda8f5227b56fca301a56ff7cf4787adf9b5c21fb7e7b0af962012e81256d39787f623026d82a", "1c1f43b97307c861989ccfc425ca70087308ca063c799f3d7f336eb282e9dd73", [0x7, 0x6]}) creat(0x0, 0x80) getgid() write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(0x0, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r5, 0x403c5404, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0)