# https://syzkaller.appspot.com/bug?id=16e8d4e69b0b49a2f843d65cea3f46d202ea08c4 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"devlinkpci":true,"tmpdir":true,"segv":true} r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r1, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) r2 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0xa, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffd}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/bsg\x00', 0x109000, 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000000ac0)) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendto$llc(r5, 0x0, 0x0, 0x1, &(0x7f0000000b80)={0x1a, 0x30f, 0x0, 0x0, 0x7, 0x2, @dev={[], 0x19}}, 0x10) ppoll(&(0x7f0000001080)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x3ffe, 0x4) sendto$inet6(r6, 0x0, 0xffffffffffffffad, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @rand_addr="ffd6f1b9201348544de96b337da295b8"}, 0x1c) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r9, 0x5411, &(0x7f0000000040)) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf32(r10, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x34, 0x3, 0x0, 0x0, 0x20, 0x3}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2}]}, 0x54) ioctl$TIOCOUTQ(r10, 0x5411, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/full\x00', 0x200, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000c40)={0x5, &(0x7f0000000c00)=[{0xfffb, 0x9, 0x20, 0x800}, {0x1ff, 0x6, 0xee, 0x101}, {0x8b88, 0x1f, 0x3, 0x3}, {0x1, 0xfc, 0x4, 0x7}, {0x0, 0x0, 0x7, 0x6}]}) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000700)=&(0x7f0000000340)) r11 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r12 = dup(r11) getsockname$packet(r12, 0x0, &(0x7f0000000140)) fcntl$setown(0xffffffffffffffff, 0x8, r0)