# https://syzkaller.appspot.com/bug?id=ebdd919d6b0b31f25602378e9f934129e122e808 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000009ffb)='comm\x00') stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e20, 0x0, 0x4e20, 0xa3, 0xa, 0x80, 0x80, 0x0, 0x0, r2}, {0xe8e9, 0x73a, 0x3, 0xdb1, 0x7ff, 0x400, 0xfffffffffffffffb, 0x7fffffff}, {0x6, 0x5, 0x5, 0x27}, 0x7f, 0x6e6bc0}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4d2, 0x3e}, 0xa, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3503, 0x2, 0x2, 0x0, 0x4, 0x400}}, 0xe8) exit(0x0) lseek(r1, 0x57, 0x0) mkdir(&(0x7f0000796000)='./file0\x00', 0x0) r3 = inotify_init1(0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r3, r4) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') restart_syscall() getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuseblk_mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x5000, r6, r7, 0x7ff, 0x4, 0x404) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000000)={0x9, 0xfffffffffffffff5, 0xfffffffffffffe01, 0x1000}, 0x8) bind$pptp(r5, &(0x7f0000000200)={0x18, 0x2, {0x1, @empty}}, 0x1e) r8 = add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000700)="974a0bed329afd2a4faa52d4864c288f20c12b7b504e7f4cd148f096644f1e97", 0x20, 0xfffffffffffffff9) keyctl$invalidate(0x15, r8) syz_extract_tcp_res$synack(&(0x7f0000000640), 0x1, 0x0) fcntl$setpipe(r5, 0x407, 0x8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000080)={0x201, @time={0x77359400}, 0x5, {0xc31, 0xffffffffffffff7f}, 0x9, 0x3, 0x3f}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x200}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000300)={r9, 0x1}, &(0x7f0000000340)=0x8) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r5, 0x408c5333, &(0x7f0000000140)={0x34, 0x4, 0x6, 'queue1\x00', 0x119}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000600)={0x979, 0x7, 0x9}) readv(r5, &(0x7f0000c55000)=[{&(0x7f00005ef000)=""/4096, 0xc17}], 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000240)=0x30) socket$inet_tcp(0x2, 0x1, 0x0) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x3ffd, 0x0) r11 = gettid() ioctl$sock_SIOCSPGRP(r10, 0x8902, &(0x7f0000000040)=r11) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r10, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r10, 0x84, 0x79, &(0x7f0000000100)=0x8, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8100) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r13, 0x84, 0x4, &(0x7f0000000040)=0x5, 0x4) close(r12) r14 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r14, &(0x7f000000e000)={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) r15 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x90a80, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r15, 0xc08c5336, &(0x7f0000000080)={0xb0, 0x8000, 0xdd, 'queue1\x00', 0x9}) mmap(&(0x7f0000001000/0xffe000)=nil, 0xffe000, 0x3, 0x32, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000001fe7)=""/33) r16 = socket$inet6(0xa, 0x2100000000000002, 0x0) r17 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r17, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r16, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x4e20, 0x0, 0x4e20, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x2b}, 0xa, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0xfffffffffffffffc, 0x0, 0x90}}, 0xe8) r18 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$unix(r18, &(0x7f0000000100)=""/184, 0xb8, 0x2040, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e)