# https://syzkaller.appspot.com/bug?id=6eea1643991c65d0b6e48335439cca795de4592d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4040, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = creat(&(0x7f0000002500)='./file0/bus\x00', 0xcebb6074bb566d03) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x1}, {r0, 0x1208}, {r1, 0x4}, {r0, 0x1}, {r0}, {r0, 0x30}, {r1, 0x1010}, {r1, 0x4000}], 0x8, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)={0x80000000}, 0x8)