# https://syzkaller.appspot.com/bug?id=f7719d3447c91d8806d66d90e757bd9fb3adb206 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"sandbox":"","fault_call":-1} r0 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/osversion\x00', 0xf, 0x1, 0x0) r1 = proc_create(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='\x00', 0x1, 0x1) fchdir(r1, r0) tap_fds(&(0x7f0000000400)=[{0xffffffffffffffff, 0x2, 0x4, 0x8, &(0x7f00000003c0)={&(0x7f0000000340)="b6b948abacf12fa8826a9e5a800fb8d396ade6be481e12264852b6d72847a4ced40bb4b1723d2a4e1e15ddaa777a6a35dd86b6c99b4e9f9770229ea5a59fd17cfc4a1ec7398996a4f4a56529ac451aac", 0xfffffffffffff975, 0x1, 0x8, 0xffff, 0x2}}], 0x1) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) r2 = openat(r0, &(0x7f0000000480)='./file0\x00', 0x8, 0x21400, 0x1) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000500)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000540)='/prof/kptrace\x00', 0xe, 0x3, 0x0) fcntl$F_SETFL(r2, 0x4, 0x80000)