# https://syzkaller.appspot.com/bug?id=85d7144207e0f330c578af4096b9710b68eed9c9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":4,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"tmpdir":true,"segv":true} setxattr(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getgroups(0x8, &(0x7f0000000000)=[0xee01, 0xee00, 0x0, 0xee01, 0xee00, 0x0, 0xffffffffffffffff, 0xee01]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f0000000100)=[r1, r2]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x101000, 0x40) connect(0xffffffffffffffff, 0x0, 0x0) r3 = dup2(r0, r0) write$P9_RFLUSH(r3, 0x0, 0xfe76) setsockopt(r3, 0x1, 0x7, &(0x7f0000000540)="e43d0080", 0x4)