# https://syzkaller.appspot.com/bug?id=3c27eae7bdba97293b68e79c9700ac110f977eed # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"namespace","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true,"waitrepeat":true} syz_open_procfs(0x0, &(0x7f0000000000)="6e48742f697076365f726f75047c3112ed64946a79baa1365850b5746500") mlockall(0x2) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000240)) ioctl$sock_netrom_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x400000, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000600)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000980)={0x7, 0x0, 0x1ff, 0x1d1a, 0x0, 0x7}) syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") write$binfmt_aout(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2b1) mq_open(&(0x7f0000000640)="8b439a9fea1e549fce253b700f", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x9, 0x0, 0x10000000000000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) init_module(&(0x7f00000006c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a", 0x3c, &(0x7f0000000700)='^\x00') openat$cgroup(r0, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) ustat(0x7, &(0x7f0000000080)) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={0x0, 0xde3, 0x400, 0x5}, &(0x7f00000005c0)=0x10) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4}}, 0x2e)