# https://syzkaller.appspot.com/bug?id=38896a9da63b2195cd9b5611e05910c5f5cfe65b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"","fault_call":-1,"tmpdir":true} r0 = semget$private(0x0, 0x4, 0x200) r1 = getuid() r2 = open(&(0x7f0000000640)='./file0\x00', 0x80, 0x20) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f00000006c0)={0x8bd2, 0x5, 0x7, 0x4}, 0x10) r4 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000500)={{0x280000, r1, r4, r5, r6, 0x60, 0x2}, 0x2, 0x5, 0x1}) semctl$IPC_RMID(r0, 0x0, 0x0)