# https://syzkaller.appspot.com/bug?id=016814f413b437ebf8d530b3775e620a892cf584 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":true,"segv":true} dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(0x0, 0x2, 0x400) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') preadv(r1, 0x0, 0x0, 0x436, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x122) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000008000000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x224d42, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r4 = syz_clone(0x40005080, 0x0, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x3, r4, 0x2004) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4044845}, 0x44801)