# https://syzkaller.appspot.com/bug?id=286166aa4744abfe4a5d2b5f6eb4796575004992
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"threaded":true,"repeat":true,"procs":6,"sandbox":"","fault_call":-1,"segv":true}
creat(0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)
ptrace$cont(0x1f, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
ptrace$cont(0x7, 0x0, 0x0, 0x0)
openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x24000, 0x0)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x800, 0x0, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="45bf4d72617700000000000000000000000000000000000000000000000000000000000900000003000000d00200000000000010010000100100000000000010010000380200003802000038020000380200003802000003000000", @ANYPTR, @ANYBLOB], 0x3)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0)
socketpair(0x8, 0x6, 0x3, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
getgroups(0x0, 0x0)
r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0)
ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'})
write$binfmt_elf32(r3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
accept4(r2, 0x0, 0x0, 0x0)
socket$inet6(0xa, 0x1, 0x100000005)
r4 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003)
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80003)
r5 = syz_open_procfs(0x0, 0x0)
ioctl$sock_SIOCGIFBR(r5, 0x8940, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
flistxattr(0xffffffffffffffff, 0x0, 0x0)
mlock(&(0x7f0000001000/0x4000)=nil, 0x4000)
r6 = pkey_alloc(0x0, 0x2)
pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3, r6)
clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
ioctl$int_in(0xffffffffffffffff, 0x5473, 0x0)
r7 = openat$full(0xffffffffffffff9c, 0x0, 0x121880, 0x0)
ioctl$EVIOCSABS2F(r7, 0x401845ef, 0x0)
ptrace$getregs(0xe, 0x0, 0x0, &(0x7f0000001280)=""/4096)
setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0)
ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0)
getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000800)={'HL\x00'}, &(0x7f0000000840)=0x1e)
sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0)
setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB])
socket$key(0xf, 0x3, 0x2)