# https://syzkaller.appspot.com/bug?id=1f4ce2d5f1d63d036647384968353a7a52cf795c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$video(&(0x7f0000000000), 0x40000000000003, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000001c0)={0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000040)=0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000013c0), 0x0, 0x0, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x8) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f00000001c0)={0x1, 0x100, 0x0, {0x1000, 0xe7fb}}) r2 = syz_open_dev$video(&(0x7f0000000000), 0x40000000000003, 0x0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000080)={0x1, 0x0, 0x31345f54edffcadf, {0x0, 0x0, 0x1000, 0x1fe}}) r3 = syz_open_dev$video(&(0x7f0000000000), 0x40000000000003, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000200)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x8, 0x5)