# https://syzkaller.appspot.com/bug?id=97550d064a4ca3e570f7bd8a9f85fd08e2a2b0bf # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"devlinkpci":true,"tmpdir":true,"segv":true} r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)={0xc5, 0x29, 0x1, {0x3, [{{0x8, 0x4}, 0x5, 0x9, 0x7, './file0'}, {{0x11, 0x3, 0x5}, 0xf364, 0x4, 0x7, './file0'}, {{0xffffffffffffffff, 0x2, 0x2}, 0x1, 0x7, 0x7, './file0'}, {{0x2, 0x4, 0x1}, 0x400000040, 0x80, 0x7, './file1'}, {{0x10, 0x3, 0x1}, 0x100000000, 0x6, 0x7, './file0'}, {{0x20, 0x0, 0x7}, 0x1000000000000008, 0xce, 0x7, './file0'}]}}, 0xc5) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x1, 0x1d00) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300), 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RFLUSH(r3, &(0x7f0000000040), 0xffffff7e) write$P9_RREMOVE(r3, &(0x7f0000000000)={0x7}, 0x7) dup2(r3, r2) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="05010700000b0600d44599476821bddfe2c70f72efd3ccbcf5a3d21b01e01a7cbf8487c10a1152876498e86802d51dda5f1e4b7f896cdd0f90c3e2d87278ccf27532c41404f1a0461989cb019ab1cf4e873b0ae641142cfd8a5e60234228003ae5617d17fb81f8bdbf919479d12291a2ed9b01ea112c84839a01fc32b1642cc20be2250e0837eac16b8728ce3abe14a82ce6c13ac6b7ad8744290985aeaac2f4184f6b0c3ee8a5dbacb5920666554cee0df716756f14eb67ffe44fa05907091d5de769dcd3bb979a1c5de6a2d633c394"], 0xdd, 0x1)