# https://syzkaller.appspot.com/bug?id=f69b62825b83e1324a2824d26eef3e49c35e003a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"sandbox":"","fault_call":-1} umask(0xee7) r0 = proc_create(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='\x00', 0x1, 0x1) proc_run(r0) r1 = openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cputime\x00', 0xd, 0x1, 0x0) proc_create(&(0x7f0000000100)='./file0\x00', 0x8, &(0x7f0000000140)='/proc/self/notepg\x00', 0x12, 0x1) proc_run(r0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000000, 0x4012, r1, 0x9) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) rmdir(&(0x7f00000002c0)='./file0\x00', 0x8) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000380)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000400)='/prof/kpctl\x00', 0xc, 0x3, 0x0)