# https://syzkaller.appspot.com/bug?id=eb82f3e9b3167dedc159981ad1c179904b8e7c67 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"sysctl":true,"segv":true} seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getpid() process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x11, 0x0) bind$netlink(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x26) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4b46, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r3 = dup(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x13, r3, 0x2000) socket$netlink(0x10, 0x3, 0x8) socket$pppoe(0x18, 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9)