# https://syzkaller.appspot.com/bug?id=bc2bc9da2825a560d04dbe2039655f62599b27d7 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":4,"sandbox":"none","fault_call":-1,"close_fds":true,"devlinkpci":true} chmod(&(0x7f0000000000)='./file0\x00', 0x104) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) symlink(&(0x7f0000000100)='./file0\x00', 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$poke(0x5, r0, 0x0, 0x80000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_getparam(r3, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000240)) r4 = socket$unix(0x1, 0x1, 0x0) sendmsg(r4, 0x0, 0x80) readlink(0x0, &(0x7f0000001900)=""/249, 0xf9) modify_ldt$write(0x1, &(0x7f0000001a00)={0x1, 0x1000, 0x400, 0x1, 0x2, 0x1, 0x0, 0x1}, 0x10) r5 = dup(r1) statx(r5, 0x0, 0x0, 0x1, &(0x7f0000001a80)) mkdirat$cgroup(r5, 0x0, 0x1ff) inotify_init() open(&(0x7f0000002d80)='./file0\x00', 0x402181, 0x124) signalfd4(r1, 0x0, 0x0, 0x40000) pipe2(&(0x7f0000002e00), 0x84000) socketpair(0x4, 0xa, 0x6, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000009bc0)='/proc/thread-self\x00', 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x8040) socketpair(0x8, 0x3, 0x8, 0x0) r6 = add_key$user(&(0x7f0000009cc0)='user\x00', 0x0, &(0x7f0000009d40), 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r6) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000009e40)='/dev/zero\x00', 0x20000, 0x0) write$P9_RREAD(r7, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f000000a000)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000feb000/0x14000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ff3000/0xb000)=nil, &(0x7f0000009f00)="b2f30278b0cb9cf2e01bc8f5bb8684fddeff839c5170a9d58cdad2781805fab5a66de7cecea29a1a668d75ca478d6dcd0b02ad89ae44420765322986a319224c1de5af9cf582c52a938628e2225e9fab6f3cb8c2acdfd35210152c479aab9b0e3c9e379517169f120b7e07f8210e281029f418059303b643b7ea5aabea998c999f0ac6f7ecbaf6ccc49888d42cd8295c18e96dd4e1a4e29dc28ea6b42fa3243af5553b551171f8c2a6dcac5df125650f0dff0e61c02b4322f88bba0d65dbd0126a9da1b880bae3ea774211d97067b63488db0103270fc9", 0xd7, r2}, 0x68) r8 = openat(0xffffffffffffffff, 0x0, 0x240000, 0x3e) write$P9_RGETLOCK(r8, &(0x7f000000a0c0)={0x30, 0x37, 0x2, {0x1, 0x5, 0x239, r3, 0x12, '/proc/thread-self\x00'}}, 0x30)