# https://syzkaller.appspot.com/bug?id=9425942fef3978fcba3ee489391b5d89654c5bb2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":4,"sandbox":"","fault_call":-1,"close_fds":false,"segv":true} r0 = openat$null(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x102, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000740), 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) r4 = getgid() lchown(0x0, 0x0, r4) mount$9p_fd(0x0, 0x0, 0x0, 0x200001, 0x0) r5 = memfd_create(0x0, 0x0) close(r5) r6 = socket(0x29, 0xa, 0x7f) r7 = openat$random(0xffffffffffffff9c, 0x0, 0x82380, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r7, 0x6611) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, 0x0) open$dir(0x0, 0x0, 0x0) renameat(r5, 0x0, r5, 0x0)