# https://syzkaller.appspot.com/bug?id=f036811a07cb0aabc485b4e75d2307bc3d0e4b40 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} prctl$PR_GET_DUMPABLE(0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x20, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, 0x0, 0x0) r2 = dup(r1) r3 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$mice(0x0, 0x0, 0x0) fcntl$notify(r0, 0x402, 0x40000008) r4 = syz_open_procfs(r3, 0x0) ioctl$EVIOCGNAME(r4, 0x80404506, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x4}}, 0xfffffdd6) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000d00)='9p\x00', 0x0, &(0x7f0000000d40)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, 'fuse\x00'}}]}})