# https://syzkaller.appspot.com/bug?id=fcae301fcff89fc45ceb6a5dade0b7805ba43351 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0621201f00104ebfcb00000000000000"], 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x3, 0x6, 0x800d, 0x9, 0xee0, 0x5, 0x3e, 0x100}, &(0x7f0000000140)=0x20) socket$isdn_base(0x22, 0x3, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1000000000000005, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x1, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, 0x0, &(0x7f0000000180)="f698eaded7f498c3bf96e3c5977fec70a896", 0x5}, 0x20) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000002f00)=ANY=[@ANYBLOB], 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$smack_current(r4, &(0x7f0000000280)=']cgroup+nodev!\x00_\xf9H', 0xfffffffffffffff2) recvmmsg(r3, &(0x7f0000001e00)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/48, 0x20000070}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x800000000802) ioctl$FS_IOC_FSGETXATTR(r5, 0x4c00, &(0x7f0000000000)={0x4000100323, 0x6, 0x0, 0x0, 0x0, 0x200000000000000}) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) r7 = memfd_create(&(0x7f0000000300)='4t\xb9L<\xf2\x00\x90\xcd\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000440)=[{&(0x7f0000000100)="a8494c43bdffd622884db491c663511c10bb6d127db1652058e4f30cd2709d6ef32f9f38f896f6df94429281c97ca716136f34a940b65db4090000000000000036daef86d2148aa12ca1de95553fea3d4920738c38135a8303ba410b3daa34f733d48db792a449d9ceafb8727256fe193119d1f217a3b976c6b84c35d0b3f3d354dbacd32b222d60855eaa21801860", 0xfffffef7}], 0x1, 0x81003) r8 = accept4$tipc(r6, 0x0, &(0x7f00000000c0), 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r8, 0x10f, 0x84, &(0x7f00000001c0), 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000000)="11ffa5055e0bcfe47bf070") r10 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r10, 0x80045300, &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r10, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) write(r6, &(0x7f0000000000), 0x52698b21)