# https://syzkaller.appspot.com/bug?id=94100cff4d9a032b284ae1f06f9a8baaddf0a419 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"namespace","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"devlinkpci":true,"tmpdir":true,"segv":true} pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write(r0, &(0x7f0000000100)="3ee8a7ae7d449235cf425ea6705af5b5b7b0e70de4ad48fbdbf7a6254222dec0d4e7c7acb5fc74df1feac8fdeb518c9543e483071e09b15ec30964632dda2af96c0fc5a65dac68d7f3d73c7e64e31b90ee914273a946d6db0d04103b28eaf7bf6f490409efb0eb1b5bd1079f223cfff2bebd11f4aec0599c446e55e57d6e3eb56e5dea5de09d3c2b64b9643cda45c3", 0x1c) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) creat(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@ax25={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null]}, 0x80) clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000480)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080fb8c86310f90900563039e4444d7a646fda63c33cb775870020002bed40ef05000000c75e56d9489a98790000004fa91840a53b8b001018039cdd09f00000ac01000000003f49590000000000fece6028b8308e512bf3d484500400441fb9730493db2476aa1dd724c580f1d1d69c9c72defb2a"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000400)={'gretap0\x00', 0x200}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x23, "b0caaaf6f925d59b06c6fbbe4962c883a7c083ee3588ceddafd0c4ffd81a5edb1a58ac"}, &(0x7f00000003c0)=0x47) ptrace(0x10, r1) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'os2.', '\x00'}, &(0x7f0000000380)='ppp0vmnet1\x00', 0xb, 0x2) wait4(0x0, 0x0, 0x0, 0x0)