# https://syzkaller.appspot.com/bug?id=5c3b561116344be492dd717b2f794dcbf0f2a0dc # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true,"callcomments":true} syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x574, &(0x7f00000004c0)="$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") lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x361, 0x0) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) chown(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) syz_clone(0x600, 0x0, 0x33, 0x0, 0x0, 0x0) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "5211eb8e5ce6935e9bbd76e32c4c956e"}, 0x11, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000000000020"], 0x24, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000480)=ANY=[], 0xfe37, 0x0)