# https://syzkaller.appspot.com/bug?id=5d6876e3b686608374d1255da6b170777cfc3dc9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000a97000)={0x0, 0xffffffffffffffff, 0x0, @dev}, &(0x7f0000f1b000)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f000005a000-0xa)={0x3, [0x7, 0x6, 0x1]}, &(0x7f0000ec8000)=0xa) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f00000b0000-0x40)=[], &(0x7f0000b5b000-0x8)=[]) r1 = syz_open_procfs(0x0, &(0x7f00000e0000)='stack\x00') readv(r1, &(0x7f000066e000-0x10)=[{&(0x7f00008ad000)=""/178, 0xb2}], 0x1) getpid() open$dir(&(0x7f00003e9000-0x8)='./file0\x00', 0x26102, 0x0)