# https://syzkaller.appspot.com/bug?id=0570ac8a98fda411e71501fc4694cc7ab2f8feab # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"tmpdir":true,"segv":true} clone(0x2000000002000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000180)='\xa1\x9fn\xa4dR\x05i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\xf2\x83\x93=\xb5\xe7L\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\xc6\xc96\x95Q\xdb\x87at)\xf1?p\xffb\xfb\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0)