# https://syzkaller.appspot.com/bug?id=6b04ed5bc7524e492c3e91d48627b0fbefa0380e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"tmpdir":true,"segv":true} execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x1) write$binfmt_elf32(r0, 0x0, 0xd8) execveat(r0, 0x0, 0x0, 0x0, 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) setuid(0x0) getgroups(0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2c000802) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0xffff, 0x0) io_setup(0x81, 0x0) write$FUSE_ATTR(r2, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x6800) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = memfd_create(0x0, 0x0) write$binfmt_elf32(r3, 0x0, 0xd8) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)