# https://syzkaller.appspot.com/bug?id=61ec9b78979c77b478704a46b43300223433acfe # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:false Repeat:true Procs:8 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f00000d5000)="") mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000714000)='./file0\x00', &(0x7f0000792000)=[], &(0x7f00008d2000)=[]) r0 = syz_open_procfs(0x0, &(0x7f0000d9e000)='stack\x00') read$eventfd(r0, &(0x7f0000ff9000-0x8)=0x0, 0x8) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000850000)=""/227)