# https://syzkaller.appspot.com/bug?id=53919424551f3c3d50d6e6f0a3b225addee1af03 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:true Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000067000)="2e2f66696c653000", 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)="2f6465762f73657175656e6365723200", 0x4000, 0x0) write$eventfd(r0, &(0x7f0000000000)=0x8, 0x8) r1 = fcntl$getown(r0, 0x9) process_vm_writev(r1, &(0x7f0000893000-0x10)=[{&(0x7f000083f000-0x5a)="", 0x0}], 0x1, &(0x7f000078e000)=[], 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000d9c000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f00003e4000)=0x6e) r2 = perf_event_open(&(0x7f000002f000-0x78)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) gettid() ppoll(&(0x7f00004e4000)=[{r0, 0x58e7, 0x9}, {r2, 0x1, 0x5}, {r2, 0x1cb, 0x8}, {r2, 0x101, 0x1}, {r0, 0x6, 0x1}, {r0, 0x26be, 0x7f}, {r2, 0x20, 0x9}], 0x7, &(0x7f0000bf8000)={0x0, 0x989680}, &(0x7f000063c000-0x8)={0x8}, 0x8) link(&(0x7f0000e66000)="2e2f66696c653000", &(0x7f00000dc000)="2e2f66696c653000") lseek(r0, 0x0, 0x484a1c1296444da1) listen$netrom(r0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000001000-0xe)="2f6465762f6b657963686f726400", 0x2, 0x0) write$eventfd(r3, &(0x7f0000567000)=0x1000100000001, 0x8)