# https://syzkaller.appspot.com/bug?id=f5debdc326dd0b1a266e810a7f4cef9a8544fdd0 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":1,"sandbox":"","fault_call":-1} r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='4'], 0x1) splice(r1, 0x0, r0, &(0x7f0000000100), 0x400000000003, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') sendfile(r3, r4, &(0x7f0000000100), 0x2007ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='uid_map\x00') r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r7, r6, &(0x7f0000000040), 0x100000001) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000775000))