# https://syzkaller.appspot.com/bug?id=898819aa10260a468a0191c309b066cc36437d7d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:false Repeat:true Procs:8 Sandbox: Fault:false FaultCall:-1 FaultNth:0 EnableTun:false UseTmpDir:false HandleSegv:false WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000251000+0xdca)="", &(0x7f0000744000)=0x0, &(0x7f00008c8000)=0x0, &(0x7f0000dad000-0x37)="") mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = syz_open_procfs(0x0, &(0x7f000042d000-0xc)='io\x00') read(r0, &(0x7f00008d2000)=""/104, 0x68) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000b8d000)='uid_map\x00') pipe(&(0x7f0000da8000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0xfffffdff, 0x0)