# https://syzkaller.appspot.com/bug?id=2823b77d382513d6a1cd8e696d4619bcbe1d5e0d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)=0x8, 0x4) (async) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$DIOCRCLRTABLES(r0, 0xc450443c, &(0x7f0000000200)={{"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", "ac82cfe25c7d03010000080000000000000030ca2b089638ea1766d1617626f0", 0x3, 0xfe}, 0x0, 0x7ff, 0x3, 0x6, 0x1, 0x40, 0x3, 0x4, 0x6}) (async) ioctl$DIOCNATLOOK(r0, 0xc04c4417, &(0x7f0000000000)) openat$crypto(0xffffff9c, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x5) (async) r1 = openat$filemon(0xffffffffffffff9c, 0x0, 0x200, 0x0) (rerun: 32) r2 = fork() (rerun: 32) ioctl$FILEMON_SET_PID(r1, 0xc0045302, &(0x7f0000000040)=r2) (async, rerun: 32) socket$inet6_sctp(0x1c, 0x5, 0x84) (rerun: 32) r3 = getppid() cpuset(&(0x7f00000000c0)) (async) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x80, &(0x7f00000001c0)=0x4, 0x4) (async) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x180, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async) r4 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x100) (rerun: 32) pwritev(r4, 0x0, 0x0, 0x0) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002e40)={&(0x7f0000000500)=ANY=[@ANYBLOB="0a012e2f66696ee5953a61e94f6e41d892021404300038d01690e4a8ce51d2ffd5bddadcd12515f36c5b52f2b720d4274039f4c5f8bf093b25a6af6669c0db727ea9b51bfafcfe080c89e5521f140800000095dfcb2cc5b481041e525818f29dcdc3bd1269b8ec8ca70fad6252001244a77439dd470fd33f1de2a2e7d1af881bf3abd45b8c779c209ead45059c5e64a7be799c4aa7a464c8abd6fbd3640dc34309d3c5110673697bb27aea56f8"], 0xa, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x118, 0x40100}, 0x20004) (async) ioctl$FILEMON_SET_PID(r1, 0xc0045302, &(0x7f0000000140)=r3) (async) ioctl$FILEMON_SET_PID(0xffffffffffffffff, 0xc0045302, &(0x7f0000000040)=r3)