# https://syzkaller.appspot.com/bug?id=c3c9e027d975ab52b83ab40defdaf72ca4795fec # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x0, @multicast2}}, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x9c) openat$vmci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x588c1, 0x0) ppoll(&(0x7f0000000480), 0x0, &(0x7f0000000500), 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x7, 0x40) fstatfs(0xffffffffffffffff, &(0x7f0000000080)=""/157) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@dellink={0x0, 0x11, 0x8, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0xc000, 0x4400}}, 0x5}, 0x1, 0x0, 0x0, 0x90694a652c3a7db0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) pidfd_getfd(r0, r2, 0x0) r3 = memfd_create(&(0x7f0000000200)='prodM\xb0\xea\a\x06\xbe\xaen/\xce4C\x80\x00\x00\x00\x00\x00\xadt\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x1dz\xd0\x11\xe3\x05N\xb1\x84\xea\x91^%A\xf5\x9e\x13TdT\xc6^p\xcc#P\x04\x06\xae\xeb\x7f;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6\xb4\v\xff\xfc\x88\x90\xabC\a`\xf0\xc72\xea\xb7Ww\xbe\xa8\x06\xa7\xdc\x06\x7f\x00\xc36\x96\xffZ\\A\x1dO\x03~Dk\xeb\x80\f\xed{u[\xbd\x9d^\xffj\x9c\x14\xb7\xb6v\x1d*1>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003F\xf1 \x17-\x964C?]\x8c\xb4Y\xcf\x80\x85\xd6\x036\xc8~\xa8\x8c\xcd\b\xb5U\xec\x85\x9b\xe4Q>\xed\xdf\xdf\a\xd0lg\x13\r\x8c:s>\xd7s\xef\xb3\x9f#\x15\xd3[i\x1b\x9b{4)\xd8\xa2\xb8\x8f\xa22)\x8d\xec\xf0(!\xf0\xb5-e+><\xc8X\xdaNz,u\x8f\x00'/300, 0x7) fcntl$addseals(r3, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x11, r3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3400000030000100000018a0b704b0ff68bd8945318bbdb6a9a9749732da4f516272260cec975a16a0000565bd5412ddc9a3708a10736e277d2725e09dd396c546a3ff3cdeb700eaaebe1c94ffc7cff285bcadcc8c8195003a878c868b45501109c0f875386472a4841c169791f8c7da34b939b449e62c4d7e16655b811c2ccab2d6daf28650508595b48def15dd21d35a91be91a46d7d5bd0b3ba1dfbf0c1fbc12d91dd072fe9b967a983c144354c1e6f43fac3e846211a3b8c65e0f053ebf0fe62cb36c29e254e8125ed0db520c779460ea58ee78d2f0a3ed34b03ca3c2f44bd1336291ad4bbbbff7030a8fdba0516c06284a92f58c7cc52b59a1454ceda192e49a170940acd2a8051af12dc54e11831cde4cb71bfb8df9d593c4c0598ebe03c5983690ef7a8bda06477f35a10936db14beae4761aa73fd9e63a2e6e03c27dbdcb0d07c4c57541cc45b6c1cdd4774c184816998a8a663ef77e06a931e80e6532d1182437e936fbcff37b251a8ea7e81599894a2cbb871719e1fb4644770cef269c87dccf5b27d890858e30c134b1ba11854ea5945670d5fe0d5162154abcc2ff982d01b64fdeb3d7d69c1070c547963c980d8f07e9ebfc4bbce914279c4b6630d388e34fbaf3ef3f39cc99058eeb4f704a55f4a131888dd6f9e3fecf08938dcd63819f08996ce6f7573e8ffb71602baf817a98aa4a9f0732b4c3b544ef3bf38c5efb3172a3859fbe67e58d37211deb16dd62423bec1b9e12bc10efbdb6a54462ee3b6f85aaef6e2bd27a364a1baa52", @ANYRES32=0x0, @ANYRES8=r3], 0x34}}, 0x0) unshare(0x42060480) r4 = memfd_create(&(0x7f0000000540)='\xdd#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf9\xff\xff\xff\x00\x17?$^\xe1Ob\xe1Y\x03\x00\x00\x00\x00\x00\x00\x00\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\xdc\xaa<\x96\xedE>{\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9\x87\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T[\xb7\xa4\xb0\bk&\xede\x8b\xc2\xb2\xcd\xef\xcf\x0fE\xc5\x86]\xc0]}\xdd^\xf6&\x16>c\x9d\x9c\xc9\x01\x04\x00\x00\xe9h\xbd\x10p\x8f\x14\x1f2\"\x1b;\xfda\x19\x8bo^\x96\x9a~Q\xce\x95\x02\xb8e\xbbG\xb0V[\xfe\x80\x94$y\x8a\\@\xa9^\x95!IJ\xcf\xf7\xafoX/qG\x97ITp\x01\xae\f\"n;%\xecT\xf6\xb6\xbf;\xde\xec\xb4z\xaa\xd9%\xa5;wy~\xcb\x9a\xd7\r\xe2\xcd\xf0C\x16\xbf0\x89\xb4\xf5\x86\xf3\x99\x9bq\xd3\x15\xe1:\x86\xe4\x14\x805K\xcf\xf6\xda\xd1A>\xf4r>\xfdyAH\x0f\x00'/426, 0x5) fsetxattr$security_ima(r4, &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x3, 0x2, 0x0, 0x0, 0x1, "89"}, 0xa, 0x0) lseek(r4, 0x0, 0x1)