# https://syzkaller.appspot.com/bug?id=19d0e6a67b05b17477f93b142ab723a426f0e91d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000a81000-0x15)="2f70726f632f73656c662f6e65742f70666b657900", 0x400000, 0x0) ioctl$TIOCNXCL(r1, 0x540d) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f000064a000-0x10)={0x4, &(0x7f0000551000)=[{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000520000-0xe8)={{{@in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in6=@loopback={0x0, 0x0}, 0x0, 0x0}, 0x0, @in=@empty=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000f54000)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00005d6000)={0x0, 0x0, 0x0}, &(0x7f00000a2000)=0xc) getgroups(0x9, &(0x7f00002ed000-0x24)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3]) syz_fuseblk_mount(&(0x7f0000ee8000)="2e2f66696c653000", &(0x7f00006f1000-0x8)="2e2f66696c653000", 0xa000, r2, r4, 0xfffffffffffffff8, 0xf027, 0x2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf68000)=nil, 0xf68000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2000000000000002, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f00004e1000-0x4)=0x0, &(0x7f000000f000)=0x4) bind$inet6(r5, &(0x7f000002e000-0x1c)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x100000003}, 0x1c) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x100000d, 0x32, 0xffffffffffffffff, 0x0) poll(&(0x7f0000002000-0x11)=[{0xffffffffffffffff, 0x0, 0x0}, {0xffffffffffffffff, 0x0, 0x0}], 0x2, 0x0) bind$inet6(r5, &(0x7f0000002000-0xe)={0xa, 0x0, 0xfffffffffffffffd, @loopback={0x0, 0x1}, 0x0}, 0x1c) shutdown(r5, 0x1) getsockname$inet6(r5, &(0x7f0000f62000)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f0000e9d000)=0x1c) r6 = syz_open_dev$sg(&(0x7f0000a6b000-0x9)="2f6465762f73672300", 0x7fff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000a7f000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6c, 0x100000001, &(0x7f0000366000)={0x0, 0x0}) ioctl$EVIOCSABS0(r6, 0xc0189436, &(0x7f0000245000)={0x800005, 0xf3dd, 0x9, 0x4, 0x7, 0x4}) r7 = socket$inet(0x2, 0xa, 0x4) r8 = syz_open_dev$tun(&(0x7f00008be000-0xd)="2f6465762f6e65742f74756e00", 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000928000-0x28)={@common="67726530000000000000000000000000", @ifru_mtu=0xef3a}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000630000-0x20)={@common="67726530000000000000000000000000", @ifru_flags=0x301}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f000032b000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x10) sendto$inet(r0, &(0x7f00009e9000)="", 0x0, 0x20000040, &(0x7f0000bfb000-0x10)={0x2, 0x0, @rand_addr=0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) mkdir(&(0x7f0000fd6000-0x8)="2e2f66696c653000", 0x0) modify_ldt$read(0x0, &(0x7f0000125000)="00000000000000000000000000000000000000000000000000000000000000", 0x1f)