# https://syzkaller.appspot.com/bug?id=b443d21f7f64a6aeefd046bae43d1be8803e8810 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:1 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000005000)="2f6465762f73672300", 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000a22000-0x14)={0x5, 0x7, 0x80000001, 0x1, 0x1ff}, 0x14) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000be000)=[{&(0x7f00003ef000-0xa)=@file={0x0, "2e2f66696c653000"}, 0xa, &(0x7f0000603000)=[{&(0x7f0000007000)="", 0x0}], 0x1, &(0x7f0000b88000)=[], 0x0, 0x0}], 0x1, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0xffffffffffffffde, 0xc28c, 0x0, 0x0}) getsockopt$inet_tcp_TCP_MIN_RTO(r0, 0x6, 0x6b1, &(0x7f0000f39000)=0x0, &(0x7f00002c7000)=0x4) write$fuse_notify_poll_wakeup(r0, &(0x7f0000139000-0x18)={0x18, 0x497, 0x0, 0x2}, 0x18) ioctl(r0, 0x2285, &(0x7f0000007000)="") read$eventfd(r0, &(0x7f0000846000-0x8)=0x0, 0x8)