# https://syzkaller.appspot.com/bug?id=5ffce058ffb4587f12c59d926e2386cf7aa4455c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"netdev":true,"segv":true} r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x4, 0x1, 0x3}, 0xff}}, 0x18) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0'}, 0x4) rt_sigpending(&(0x7f00000010c0), 0x8) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x3) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000001100)=0x3) write$P9_RREADLINK(r0, &(0x7f0000001140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001180)='syz0') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000011c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000001200)={0x0, r1}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000001240)=0x1, 0x4) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000001280)=""/42) semget(0x1, 0x0, 0x2) r2 = getuid() stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000012c0)='./file0\x00', r2, r3) ioctl$VT_DISALLOCATE(r0, 0x5608) setresuid(r2, r2, r2) fstat(r0, &(0x7f00000013c0))