# https://syzkaller.appspot.com/bug?id=61ec9b78979c77b478704a46b43300223433acfe # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:false Repeat:true Procs:8 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000e44000-0x8)='./file0\x00', &(0x7f0000481000-0x1c)=[&(0x7f0000905000)='selinuxmime_typebdev:#\x00', &(0x7f0000101000)='.vmnet0\'wlan0^posix_acl_access:\x00', &(0x7f0000caf000-0x2)='.\x00', &(0x7f0000add000-0x8)='selinux\x00', &(0x7f0000920000-0xb)='!+self/lo*\x00', &(0x7f0000efb000-0xc)=')security^^\x00', &(0x7f0000c27000-0x17)='$posix_acl_access^\'em1\x00'], &(0x7f0000c4a000-0x4)=[&(0x7f00000b0000-0x3c)="2f21006134634ae8012a639bd7c5935c1c8f1bbc755895c3a42676f7930ccfc5cb852705b345114c15f8a898941a2e9f5082f3dbaed201664bd0c2e8"]) r0 = syz_open_procfs(0x0, &(0x7f00000e0000)='stack\x00') readv(r0, &(0x7f000066e000-0x10)=[{&(0x7f00008ad000)=""/178, 0xb2}], 0x1) open$dir(&(0x7f00003e9000-0x8)='./file0\x00', 0x26102, 0x0)