# https://syzkaller.appspot.com/bug?id=ea9377ccf66cade481c9a82a21a4f8d812e11f22 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":2,"slowdown":10,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} r0 = socket(0x1d, 0x2, 0x6) r1 = dup(r0) write$cgroup_devices(r1, 0x0, 0x8) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x5451, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x5451, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f00000020c0)={0x19980330}, &(0x7f0000002100)) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000180)='system_u:object_r:dlm_control_device_t:s0\x00', 0xffdf, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) (async) r3 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) (async) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) (async) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) (async) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[], 0x48}}, 0x4000) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[], 0x48}}, 0x4000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) socket$alg(0x26, 0x5, 0x0) (async) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) accept4$vsock_stream(r6, 0x0, 0x40, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x16b601, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x0)