# https://syzkaller.appspot.com/bug?id=07ae3fcbcf5382e1585661f1802d78c71b895211 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000d81000-0x1)="00", 0x2) mkdir(&(0x7f000000e000-0xa)="2e2f636f6e74726f6c00", 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0xc000800000000001, 0x10000, 0x1}, 0x10) getrlimit(0xb, &(0x7f00003d4000-0x10)={0x0, 0x0}) r0 = socket(0x11, 0x80003, 0x8) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00008e3000)={0x0, 0x4, 0x8ffd}, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000)="", 0x47e)