# https://syzkaller.appspot.com/bug?id=136ef9d26ed9655be00dd1020c55174385e2ffd5 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"netdev":true,"cgroups":true,"close_fds":true,"tmpdir":true} r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, 0x0, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x11001, 0x0) fchdir(r0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x82, 0x0) splice(r1, 0x0, r4, 0x0, 0xffffffff, 0x0) r5 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r6 = openat(r5, 0x0, 0x0, 0x80) openat$cgroup(r6, 0x0, 0x200002, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r7) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x6100) r9 = dup(0xffffffffffffffff) sendmsg$inet6(r9, 0x0, 0x40000) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r8, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xe20d) io_setup(0xff, 0x0) io_destroy(0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) timer_create(0x1, 0x0, 0x0) timer_getoverrun(0x0) getpeername$netlink(r8, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) write$cgroup_int(r11, &(0x7f0000000040), 0x185) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) splice(r10, 0x0, r12, 0x0, 0x8100000, 0x0)