# https://syzkaller.appspot.com/bug?id=4ea85b4bddc3033a90bd9b33ae56b455973fb3f3 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"devlinkpci":true,"tmpdir":true,"segv":true} r0 = open$dir(0x0, 0x800, 0x103) fsetxattr$smack_xattr_label(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x100, 0x0) r2 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) r3 = fcntl$dupfd(r1, 0x0, r2) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x20) statx(r4, 0x0, 0x100, 0x2a0, 0x0) timerfd_gettime(r4, 0x0) dup(r1) r5 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x7) fsetxattr$security_ima(r5, 0x0, 0x0, 0x0, 0x3) r6 = open(0x0, 0x480, 0x98) renameat(r6, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r7, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x60) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0)