# https://syzkaller.appspot.com/bug?id=6cdb1ae1ad4d036f37fb4bfaca0327d57318a46b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} syz_open_dev$ttys(0xc, 0x2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000000), 0x651, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, &(0x7f0000000840)={0x44, &(0x7f0000000400)={0x60, 0x16, 0x34, "6ab053665df8b288b7269660b1919a215aea61518677ef0cb082d144c995fbc74f309651d761e3b8538b4e8f9708840e8ce3fbda"}, 0x0, &(0x7f00000004c0)={0x0, 0x8, 0x1, 0x55}, &(0x7f0000000500)={0x20, 0x80, 0x1c, {0x400, 0x2, 0xcebe, 0x0, 0xff81, 0x1ff, 0xff, 0x0, 0x5, 0xc, 0x8}}, 0x0, 0x0, 0x0, 0x0}) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) io_setup(0x3, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x121602, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x14) ioctl$TIOCVHANGUP(r1, 0x5437, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, 0x0, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0)