# https://syzkaller.appspot.com/bug?id=286166aa4744abfe4a5d2b5f6eb4796575004992 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"","fault_call":-1,"segv":true} creat(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x24000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x800, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="45bf4d72617700000000000000000000000000000000000000000000000000000000000900000003000000d00200000000000010010000100100000000000010010000380200003802000038020000380200003802000003000000", @ANYPTR, @ANYBLOB], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) socketpair(0x8, 0x6, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getgroups(0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$binfmt_elf32(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) accept4(r2, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x100000005) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80003) r5 = syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFBR(r5, 0x8940, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) mlock(&(0x7f0000001000/0x4000)=nil, 0x4000) r6 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x3, r6) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$int_in(0xffffffffffffffff, 0x5473, 0x0) r7 = openat$full(0xffffffffffffff9c, 0x0, 0x121880, 0x0) ioctl$EVIOCSABS2F(r7, 0x401845ef, 0x0) ptrace$getregs(0xe, 0x0, 0x0, &(0x7f0000001280)=""/4096) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000800)={'HL\x00'}, &(0x7f0000000840)=0x1e) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB]) socket$key(0xf, 0x3, 0x2)