# https://syzkaller.appspot.com/bug?id=d24737e004c679ad45678f20e9aec57c98f9b478 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"vhci":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207220902"], 0x10}}, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {0x0, 0x0, 0x1ecc294f}, 0x0, 0x0, 0x1}, {{@in6=@private0, 0x0, 0x32}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0xb7, 0x1fb, 0xfffff7ff}}, 0xe8) sendmmsg(r0, &(0x7f0000000180), 0x400000000000354, 0x2873dedf99c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r3, 0xffffffffffffffff, 0x0, 0xf03b0000) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x8000000000004) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x210) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) fremovexattr(r4, &(0x7f00000001c0)=@known='system.sockprotoname\x00')