# https://syzkaller.appspot.com/bug?id=61ec9b78979c77b478704a46b43300223433acfe # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f00000d5000)="") mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000c6000)={0x0, 0x80000, 0xffffffffffffff9c}) readv(r0, &(0x7f000070f000-0x50)=[{&(0x7f0000269000-0x38)=""/56, 0x38}, {&(0x7f0000847000-0x1000)=""/4096, 0x1000}, {&(0x7f0000cbc000-0x85)=""/133, 0x85}, {&(0x7f00006f4000)=""/164, 0xa4}, {&(0x7f0000ced000)=""/89, 0x59}], 0x5) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = syz_open_procfs(0x0, &(0x7f0000d9e000)='stack\x00') read$eventfd(r1, &(0x7f0000ff9000-0x8)=0x0, 0x8) execve(&(0x7f00003f0000-0x8)='./file0\x00', &(0x7f000045f000)=[], &(0x7f0000cd5000-0x8)=[])