# https://syzkaller.appspot.com/bug?id=af3a0728c8cbf6903ec2b0836441287cced00c1c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"none","fault_call":-1,"tmpdir":true,"netdev":true} r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup2(r0, r0) getpeername$inet(r1, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bpq0\x00', 0x0}) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e23, 0x0, 0x4e22, 0x5, 0xa, 0xa0, 0x80, 0x0, r2, r3}, {0x5, 0x1, 0x2000000000000000, 0xe6, 0x1, 0x7f, 0x5, 0x80}, {0x0, 0x1, 0x18e, 0xfffffffffffffffb}, 0x400, 0x6e6bb0, 0x3, 0x1, 0x0, 0x3}, {{@in6, 0x4d2, 0x32}, 0x2, @in, 0x3506, 0x1, 0x0, 0x2, 0x960, 0x4, 0x7}}, 0xe8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000000)=0x3f) r5 = socket$nl_route(0x10, 0x3, 0x0) listen(r5, 0x7ff) r6 = dup2(r5, r5) getsockopt$netlink(r6, 0x10e, 0x0, &(0x7f00000062c0)=""/247, &(0x7f0000000300)=0xf7) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r7, &(0x7f00000000c0)=""/225, 0xe1) syz_open_pts(r7, 0x0)