# https://syzkaller.appspot.com/bug?id=010ab5cdbd5d0ca73a4227be6e883bd65fec09bc # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"procs":1,"sandbox":"","fault_call":-1,"close_fds":false,"tmpdir":true} socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000019c0)={0xffffffffffffffff}) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x420000a77, 0x0) write$P9_RSTAT(r2, &(0x7f0000000000)={0x66, 0x7d, 0x2, {0x0, 0x5f, 0x0, 0x5, {0x2, 0x4, 0x2}, 0x4000000, 0xcc, 0x3ff, 0xf057, 0xe, 'wlan0Mmd5sum@)', 0x3, '!%/', 0x1b, 'selinux\\!*proc-GPL*vboxnet0'}}, 0x66) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88)