# https://syzkaller.appspot.com/bug?id=ba670e411169ae8edf299e9711590436294b3fb6 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} mknod(&(0x7f0000000080)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x400000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x80, 0x8) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_evm(r1, 0x0, 0x0, 0x0, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)