# https://syzkaller.appspot.com/bug?id=a11115139c23237bf5bf2d920518bc11bbea7158 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"sandbox":"","fault_call":-1} pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000180)={0x4534eeb662e9c926, 0x4d, 0x1}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000007002e2f66696c6530000000000000"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1, {0x0, {}, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x80, 0x2, 0x20, 0x10001, 0x10001, 0xfffffffffffffffe}}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RSTAT(r1, &(0x7f0000000040)={0x5c, 0x7d, 0x1, {0x0, 0x55, 0x8001, 0xfffffffffffff20b, {0x80, 0x0, 0x6}, 0x85a40000, 0x0, 0x1, 0x5, 0x0, "", 0x0, "", 0x3, '9p\x00', 0x1f, 'usermd5sum{posix_acl_accesslo#&'}}, 0x5c) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) getxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='security.capability\x00', &(0x7f00000002c0)=""/19, 0x143)