# https://syzkaller.appspot.com/bug?id=61ec9b78979c77b478704a46b43300223433acfe # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f00000d5000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = syz_open_procfs(0x0, &(0x7f0000d9e000)="737461636b00") read$eventfd(r0, &(0x7f0000120000-0x8)=0x0, 0x8) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000c8a000-0x91)="", &(0x7f000044c000-0x4)=0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000cf4000-0xe)="2f73656c696e75782f6c6f616400", 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00007ed000-0xd)="2f73656c696e75782f6d6c7300", 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000c0e000-0x4)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000486000)={{{@in=@multicast2=0x0, @in=@empty=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0}, 0x0, @in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f00004f4000)=0xe8)