# https://syzkaller.appspot.com/bug?id=f5debdc326dd0b1a266e810a7f4cef9a8544fdd0 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"namespace","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true} r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="74aba306d9a93461039153a7551fdad09d74150685c1d1ee9f321cfb0c002e27203939028cfdeb109bc191c4c4dd68b8a97649e0934c2ac037cc9fef38cb532ace9a5f11260be9a2cde74cc9142312dd4f6a6adbdd062bc116a41f967a53be03071f6656e98a8966fa1730cba5474e353f4e71aaa00612cdf0db029e12f347831cc7b19c02003a978fd2aac28a489514fd58f391d8ed4fb35c39"], 0x9a) splice(r1, 0x0, r0, &(0x7f0000000100), 0x3fffffffffff, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x22e9, 0xb8c, 0x0, 0x5, 0x8, 0x4, "d39841c4864fb9c0e858fb4df219dc60dcbcf3d91344752375feba9c9d918426181f356bf50ef97f2ea938b410b799f2698d6f41934a2b6cb0613006c35ea6be", "e943198f23059f8514e83f592f7c4087b5ebedf1764534cf0ac531d11c862d981a67a4e8ca9b6b33cde8908d29ed7c6b8ede3579277ffd0a038fc578d1783b6b", "79fba0ad71d7daedc5469c9d0632dc839e613d0761c7c24e317321976a4d0bee", [0x200]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000080)="02000000114fdddf6b284699df92d53e6f4a02759b9461ac", 0x18, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x100000000001040, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000775000)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='syscall\x00') r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r5, r4, &(0x7f0000000040), 0x100000001)