# https://syzkaller.appspot.com/bug?id=53475b9f7c745934a7c7efda058095c49491c747 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true EnableCgroups:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x8) r0 = socket$alg(0x26, 0x5, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0, r1, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00', 0x1) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000180)=0x401) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) sendto(r0, &(0x7f0000000240), 0x0, 0x40801, &(0x7f0000000280)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80) mkdir(&(0x7f0000000100)='./file0\x00', 0x100) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)='self&em1\\vmnet1\x00', 0x10, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/251, 0xfb) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') recvmmsg(0xffffffffffffff9c, &(0x7f00000066c0)=[{{&(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000180)=""/235, 0xeb}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/213, 0xd5}, {&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f0000000100)=""/23, 0x17}], 0x5, &(0x7f0000001400)=""/254, 0xfe, 0xffffffff}, 0xffffffff}, {{&(0x7f0000001500)=@ipx, 0x80, &(0x7f0000001640)=[{&(0x7f0000001580)=""/18, 0x12}, {&(0x7f00000015c0)=""/74, 0x4a}], 0x2, &(0x7f0000001680)=""/206, 0xce, 0x7}, 0x1}, {{&(0x7f0000001780)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/129, 0x81}, {&(0x7f00000028c0)=""/6, 0x6}, {&(0x7f0000002900)=""/107, 0x6b}, {&(0x7f0000002980)=""/202, 0xca}, {&(0x7f0000002a80)=""/171, 0xab}, {&(0x7f0000002b40)=""/74, 0x4a}, {&(0x7f0000002bc0)=""/37, 0x25}], 0x8, &(0x7f0000002c80)=""/139, 0x8b, 0x1}, 0x400000000}, {{&(0x7f0000002d40)=@ipx, 0x80, &(0x7f0000004200)=[{&(0x7f0000002dc0)=""/4096, 0x1000}, {&(0x7f0000003dc0)=""/20, 0x14}, {&(0x7f0000003e00)=""/33, 0x21}, {&(0x7f0000003e40)=""/188, 0xbc}, {&(0x7f0000003f00)=""/15, 0xf}, {&(0x7f0000003f40)=""/197, 0xc5}, {&(0x7f0000004040)=""/220, 0xdc}, {&(0x7f0000004140)=""/137, 0x89}], 0x8, &(0x7f0000004280)=""/211, 0xd3, 0x3}, 0x7}, {{0x0, 0x0, &(0x7f0000004480)=[{&(0x7f0000004380)=""/188, 0xbc}, {&(0x7f0000004440)=""/33, 0x21}], 0x2, &(0x7f00000044c0)=""/24, 0x18, 0xffffffffffffff7f}, 0x5}, {{&(0x7f0000004500)=@rc, 0x80, &(0x7f0000004740)=[{&(0x7f0000004580)=""/20, 0x14}, {&(0x7f00000045c0)=""/138, 0x8a}, {&(0x7f0000004680)=""/152, 0x98}], 0x3, 0x0, 0x0, 0x2}, 0x1}, {{&(0x7f0000004780)=@l2, 0x80, &(0x7f0000004a80)=[{&(0x7f0000004800)=""/85, 0x55}, {&(0x7f0000004880)=""/249, 0xf9}, {&(0x7f0000004980)=""/232, 0xe8}], 0x3, &(0x7f0000004ac0)=""/123, 0x7b, 0x9}, 0x7}, {{&(0x7f0000004b40)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f0000005d00)=[{&(0x7f0000004bc0)=""/4096, 0x1000}, {&(0x7f0000005bc0)=""/163, 0xa3}, {&(0x7f0000005c80)=""/98, 0x62}], 0x3, &(0x7f0000005d40)=""/230, 0xe6, 0xffffffff}, 0x3f}, {{&(0x7f0000005e40)=@hci, 0x80, &(0x7f0000006540)=[{&(0x7f0000005ec0)=""/41, 0x29}, {&(0x7f0000005f00)=""/251, 0xfb}, {&(0x7f0000006000)=""/106, 0x6a}, {&(0x7f0000006080)=""/250, 0xfa}, {&(0x7f0000006180)=""/194, 0xc2}, {&(0x7f0000006280)=""/173, 0xad}, {&(0x7f0000006340)=""/41, 0x29}, {&(0x7f0000006380)=""/23, 0x17}, {&(0x7f00000063c0)=""/149, 0x95}, {&(0x7f0000006480)=""/158, 0x9e}], 0xa, &(0x7f0000006600)=""/155, 0x9b}, 0x3}], 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000006900)={0x0, @in6={{0xa, 0x4e24, 0x1, @empty, 0x20}}, 0x8, 0x81, 0x3ad, 0x0, 0x20}, &(0x7f00000069c0)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000006a00)={r4, 0x6}, &(0x7f0000006a40)=0x8) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000006ac0)='/dev/hwrng\x00', 0x40, 0x0) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000006b00)={0x3, 0x3}) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000006a80)='/dev/cuse\x00', 0x800, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r6, 0xae04) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)={0x20000000000000ae, &(0x7f0000000040)}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000100)={0xfd, 0x6, 0x4, 0x401, "8cb530d39dfcb0b5505650b9311074a4e115cb5d1b685f5e2eb6ad07cd819bd2aae4181f1f1597072c369ba4", 0x3}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000000240)=ANY=[]) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r7, 0x40047211, &(0x7f0000004500)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000008c00000012df22623f5409c026d8a3141b6846b54a5abde1bf975c010f9550000000fb849eb551f960a2ee04f53c6e80656a3b5958b6dc7aa1ca590d17364d0c3be3c74780576275c0f7d71e7a9248b49788fe9e7d7d0c66d0cfe4556bcd7e13248d7f2f0d9ac81aa924353fcbe9fc4c788aa5bbc010559cfab709dc55742fb8c4a168e25e618f7d1015fd7d05504e79c2b0755e2af9617ae059a360a34f94fa8021ccbd39af9dd7c8833618b7b05ee7ed4906e9a4e0c1041245e7f1e58745187ee1cb29c9b5ce7d65e5b7f0daf58ee906001e6c725509b5a04431838a4e37eb94aff0d139d435fc9261d0feed347602210d2014bfbf66685c2c163877cc18c41c78df8c015f9660e76aa23f9f3248a114a73242d159dc5a1ccdd11a40e6534121896c9db9bc98b40b8a3ec879c67c5139cc72ca097058a249140edc73b31316e574eb78675f1f793d9079093e0624966681987bfdc5f53e99ee758eabd2009ae4fb6ba2c4816791b4ab65c8"], &(0x7f00000000c0)=0x1) ppoll(&(0x7f00000002c0)=[{}], 0x1, &(0x7f0000000340), &(0x7f0000000380), 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=@getlink={0x120, 0x12, 0xc00, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x40, 0xc0}, [@IFLA_NET_NS_PID={0x8, 0x13}, @IFLA_IFALIAS={0x14, 0x14, 'ifb0\x00'}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x1}, @IFLA_BROADCAST={0xc, 0x2, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @IFLA_LINKMODE={0x8, 0x11, 0x2}, @IFLA_PORT_SELF={0xc8, 0x19, [@typed={0x8, 0x94, @ipv4=@broadcast=0xffffffff}, @generic="e13bf2648ff40c0f91df18ed288718bd152ae7408f6ce8549b13378aff1c09c0c08cd95933353e", @typed={0x88, 0x64, @binary="f905da849da36ad6388f04b1661c5ee0e046d852fd9e3bcae6acbce242f9ce1c6661ce3d643cf2b965a407eeef6e889200cadb59e9de918dd533f1e1136dbdb25bc326ce71f4d67cd1ed87fcb4f25db48bfea8f4571d0c096f9d70393376a404294ee662ae7b3baf5479b9facf73cd9873ad48b38c5cb707c7826e13296bb05dd1"}, @generic, @generic, @nested={0xc, 0x8b, [@typed={0x8, 0x8e, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}]}]}, 0x120}, 0x1, 0x0, 0x0, 0xc010}, 0x4) r8 = socket$inet6(0xa, 0x3, 0x2b) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, 0x1c) r9 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400, 0x0) setsockopt$inet_dccp_int(r9, 0x21, 0x16, &(0x7f00000000c0), 0x4) sendmsg(r8, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000b80)}], 0x1, &(0x7f0000000240)}, 0xf00) unshare(0x405ff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00006a1e08)=[{&(0x7f0000fe5ff6)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000fe5fe0)}], 0x1, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$evdev(r10, &(0x7f0000000040)=[{{}, 0xfffffffffffffe01, 0x7fff, 0x9}], 0x18) setsockopt$bt_BT_DEFER_SETUP(r10, 0x112, 0x7, &(0x7f0000000080), 0x4) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=""/4096) delete_module(&(0x7f00000000c0)='@/)\x00', 0xa00) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)={0xfffffffffffffffe, 0x1000000000001, [0x4000000000000004]}) r11 = request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000240)='\x00', 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000100)="ecd671fe23d333cf180100c0ba60a9c752c8649a1a9c60be6ab9f64ad54077a6aee5176f2e208a72aa57695d3e71a61436433c051ff940b7fadcd66ac1852f654955f5ab1faac1dc64bd9acb344930ec", 0x50, r11) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x200002, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r12, 0xc4c85513, &(0x7f0000000580)={{0x8, 0x7, 0x5, 0x8, "39fbc06f441d1262e8ea6b71a979e605d0ab4d77da9344c75086c32144b04135f861842d24e0205a0b8dc981", 0x5e}, 0x7, [0x4, 0x3f8, 0x9, 0x4000000000000, 0x0, 0x3, 0x3, 0xffffffffffff3f34, 0xe0, 0xbf21, 0xffffffffffffff04, 0x3f47e55e, 0x0, 0x1000, 0x7fff, 0x0, 0x7fff, 0x1, 0x2, 0x3f, 0x3, 0x100, 0x5, 0x5, 0xffffffffffffffff, 0x1, 0x5, 0x0, 0x16d6, 0x6, 0x42, 0x3, 0x6, 0x8001, 0x7ff8000000, 0x20, 0x59, 0xe9, 0x8, 0x2, 0x4, 0x0, 0x2, 0x4, 0x3, 0x8, 0x0, 0x2, 0x1, 0x9, 0x2, 0xfffffffffffff000, 0xbf07, 0x9, 0x0, 0x1, 0x1, 0x6, 0x8, 0x6, 0x394, 0x2, 0xc, 0x2809, 0x3607, 0x400, 0x3f0000000, 0x4, 0xff, 0x5, 0x4000000000000, 0x2000000000000, 0x5, 0x7, 0x11, 0x9, 0x400, 0x9, 0x1, 0x7f, 0x9, 0x6, 0x100000000, 0x40, 0x1000, 0x6095, 0x0, 0x4, 0x7, 0x1000, 0x4077, 0x7, 0x7ff, 0x38, 0xfffffffffffffffc, 0xffffffff, 0x4, 0x9, 0xfffffffffffffabe, 0x380000, 0x800, 0x1, 0x3f, 0x4, 0x10000, 0x0, 0x6, 0x4, 0x1, 0x7, 0x2, 0x800, 0x1, 0xa77, 0xfff, 0x5, 0x1, 0x6, 0x7, 0x4, 0x0, 0x10001, 0xbf1, 0x7fffffff, 0x7, 0x468, 0x3ff, 0x8], {r13, r14+30000000}}) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', r12, &(0x7f0000000100)='./file0\x00', 0x7)