# https://syzkaller.appspot.com/bug?id=ca42a481e0bd58567705048a2b30a3b99c5c801a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"cgroups":true,"close_fds":true,"swap":true,"tmpdir":true} r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x0, 0x0, &(0x7f0000000480)=""/92, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003380)) r1 = eventfd2(0x76, 0x1) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000001c0)={0x0, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000600)=""/175, 0x0, 0x1000}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)={0x0, r1}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000140)=0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3000490, &(0x7f00000003c0)={[{@dioread_lock}, {@auto_da_alloc}, {@nojournal_checksum}, {@norecovery}, {@auto_da_alloc}, {@noquota}, {@data_err_abort}, {@grpid}, {@grpjquota}, {@nouid32}, {@grpid}]}, 0x45, 0x7d3, &(0x7f0000000c80)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)={'#! ', './file1'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r2, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x3, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x1, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x39}}}}}}}, 0x0)