# https://syzkaller.appspot.com/bug?id=2c9e43516d5dfb1913cdd13856f93842eaaffb79 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"","fault_call":-1} r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r5, &(0x7f0000000200)=ANY=[@ANYBLOB='4'], 0x1) splice(r4, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0) unlink(&(0x7f0000000000)='./file0\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000080)="02000000114fdddf6b284699df92d53e6f4a02759b9461ac", 0x18, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x100000000001040, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000775000)) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='io\x00') pread64(r6, &(0x7f00009f3000), 0x352, 0x0)