# https://syzkaller.appspot.com/bug?id=05ab204e25c2b557d4cf71d523e7857e7f2ee220 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000afe6bdbed0770cf084fe43b7cf984c3e0000a73d11108f872400"], 0x2a) write$P9_RWALK(r2, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RGETATTR(r2, &(0x7f00000003c0)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="e20000002901000000000072ced6751bdbfcca0e07b658d5fb5c9b4077220a8bbb7acb40180e0fe9d96e31ed130afd926576aac6849087cfe86ef3cb"], 0x3c) open$dir(&(0x7f00000013c0)='./file0\x00', 0x0, 0x0)