# https://syzkaller.appspot.com/bug?id=b3cde20ed0414bc273525691696bf7ea7090ee84 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} r0 = openat$null(0xffffffffffffff9c, 0x0, 0x202000, 0x0) pread64(r0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) creat(0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x1, 0x0) ioctl$sock_ifreq(r3, 0x8995, 0x0) ioctl$TIOCNXCL(r0, 0x540d) fcntl$setstatus(r1, 0x4, 0x40400) r4 = socket$inet6(0xa, 0x2100000000000002, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$int_out(r2, 0x5460, &(0x7f0000000140)) bind$netlink(r5, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x2b}, 0x2, @in=@broadcast, 0x0, 0x3, 0x0, 0x9}}, 0xe8) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x200, 0x0) r7 = memfd_create(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r7, 0x400, 0x1) write$P9_RRENAME(r6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, 0x0, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x20032600)