# https://syzkaller.appspot.com/bug?id=af3a0728c8cbf6903ec2b0836441287cced00c1c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_buf(r0, 0x0, 0x25, &(0x7f0000000040)=""/211, &(0x7f0000000140)=0xd3) r2 = open(&(0x7f0000000180)='./file0\x00', 0x800, 0x144) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000200)="4ff0be2041c36a86d833119e9e581f32", 0x10) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffa) r3 = socket$inet_icmp(0x2, 0x2, 0x1) write$P9_RRENAMEAT(r0, &(0x7f0000000440)={0x7, 0x4b, 0x2}, 0x7) recvmsg(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/77, 0x4d}], 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000580)="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") r4 = getpgrp(0xffffffffffffffff) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000680)=r4) setsockopt$inet_tcp_int(r3, 0x6, 0x9, &(0x7f00000006c0)=0x9, 0x4) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000740)=@add_del={0x2, &(0x7f0000000700)='nr0\x00', 0xe39}) fgetxattr(r3, &(0x7f0000000780)=@random={'os2.', 'pkcs7_test\x00'}, &(0x7f00000007c0)=""/33, 0x21) write$P9_RMKDIR(r2, &(0x7f0000000800)={0x14, 0x49, 0x1, {0x4, 0x3, 0x7}}, 0x14) wait4(r4, &(0x7f0000000840), 0x1000000, &(0x7f0000000880)) sched_getparam(r4, &(0x7f0000000940)) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000980)) fcntl$getflags(r3, 0x408) getresuid(&(0x7f00000011c0)=0x0, &(0x7f0000001200), &(0x7f0000001240)) getgroups(0x5, &(0x7f0000001280)=[0xee00, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00]) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000012c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000013c0)=0xe8) r8 = getegid() sendmsg$unix(r2, &(0x7f0000001480)={&(0x7f00000009c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001100)=[{&(0x7f0000000a40)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)}, {&(0x7f0000000c00)}, {&(0x7f0000000d00)}, {&(0x7f0000000dc0)}, {&(0x7f0000000e80)}, {&(0x7f0000000f80)}, {&(0x7f0000000fc0)}, {&(0x7f00000010c0)}], 0xa, &(0x7f0000001400)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r0, r3, r1, r1, r3, r0]}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r4, r7, r8}], 0x80}, 0x4004090) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ptmx\x00', 0x200002, 0x0) readv(r9, &(0x7f0000002840)=[{&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/196, 0xc4}, {&(0x7f0000002600)=""/135, 0x87}, {&(0x7f00000026c0)=""/212, 0xd4}, {&(0x7f00000027c0)=""/90, 0x5a}], 0x5)