# https://syzkaller.appspot.com/bug?id=2fb3d0b2dbe8596f89d8c8173d7151122588def8 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000001b40)=ANY=[@ANYRES16, @ANYRES64=r0, @ANYBLOB="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"], &(0x7f0000001b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) unshare(0x22020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='rpc_pipefs\x00', 0x0, 0x0) unshare(0x40020000) rmdir(&(0x7f0000000740)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x75) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x4000, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)={0x6589}) unshare(0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f0000000c80)=[@text32={0x20, &(0x7f0000000440)="b92e0300000f320f01cab82ef700000f23c80f21f835080070000f23f866b8fe000f00d00f01d1b805000000b9090000000f01c1660f6a33c4e194568f00300000c744240011ff0000c744240204000000c7442406000000000f011c243626dbed", 0x61}], 0x1, 0x0, &(0x7f0000000cc0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000300)=0xc) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000003c0)='./file0/file0\x00', 0xd9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000280)="c4e2310b0a660f38826f050fc79d00300000c4c15556b943ffffff360f011b8fc868a6ef0036660f38818b34dba25f660f3880520066b8bc000f00d00f017800", 0x40}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000780)={0x0, 0x0, @ioapic})