# https://syzkaller.appspot.com/bug?id=534c3e964e6834c4ec17463f583965943a9ad68f # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:false Repeat:true Procs:8 Sandbox: Fault:false FaultCall:-1 FaultNth:0 EnableTun:false UseTmpDir:false HandleSegv:false WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xe7f000)=nil, 0xe7f000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000e7a000)='ceph\x00', &(0x7f000052d000)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000e7a000)='bdev/\x00', 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000e7e000-0x8)='./file0\x00', 0x503480, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f000044f000-0xa)='blacklist\x00') r1 = memfd_create(&(0x7f000066b000)="63657083003b", 0x3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000e7c000), &(0x7f0000e7c000)=0xc) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000e71000)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x3, 0x0, 0x3, 0x0, {0xa, 0x2, 0x3, @remote={0xfe, 0x80, [], 0x0, 0xbb}, 0x4}}}, 0x32) socket$l2tp(0x18, 0x1, 0x1) close(r2)