# https://syzkaller.appspot.com/bug?id=286166aa4744abfe4a5d2b5f6eb4796575004992 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"sandbox":"","fault_call":-1} ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000009b979cd5030512a00000000000001f00000006000000f8e3fffffffffffff7000000b00200007003000000000000900500009005000090050000900500009005000006000800", @ANYPTR, @ANYBLOB], 0x3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) clone(0x8860000, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') write(r1, 0x0, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000680)={0x0, 0xfb, 0x15, 0x0, 0xa, "b0532450d9c8648c27911f4d32760ad5"}, 0x15, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0)