# https://syzkaller.appspot.com/bug?id=976a3e2c5160ee885d9781bbae87283255227b8d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000800000000000000adff28c5850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) newfstatat(0xffffffffffffff9c, &(0x7f0000001dc0)='./file0\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x4040000) mount$9p_rdma(0x0, 0x0, 0x0, 0x2, &(0x7f0000000fc0)=ANY=[@ANYBLOB, @ANYRESDEC]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2002, 0x1, 0x11, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0)