# https://syzkaller.appspot.com/bug?id=5d6876e3b686608374d1255da6b170777cfc3dc9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:none Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f00000b0000-0x40)=[], &(0x7f0000b5b000-0x8)=[]) r0 = syz_open_procfs(0x0, &(0x7f00000e0000)='stack\x00') readv(r0, &(0x7f000066e000-0x10)=[{&(0x7f00008ad000)=""/178, 0x313}], 0x1) r1 = getpid() faccessat(r0, &(0x7f000045e000)='./file0\x00', 0x80, 0xe00) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000e6f000), &(0x7f00009a7000)=0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000a3a000-0xc)={0x0, 0x0, 0x0}, &(0x7f0000077000-0x4)=0xc) setregid(0x0, r2) process_vm_readv(r1, &(0x7f0000de4000)=[{&(0x7f00009e0000)=""/225, 0xe1}], 0x1, &(0x7f0000d66000-0x48)=[{&(0x7f000082f000-0x4b)=""/75, 0x4b}], 0x1, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc00c6419, &(0x7f0000a96000-0xc)={0x5, &(0x7f0000a60000)=""/180, &(0x7f00001dc000-0x50)=[{0x1, 0x1000, 0xf663, &(0x7f0000cec000-0x1000)=""/4096}, {0x7, 0xde, 0x0, &(0x7f000008c000)=""/222}, {0x7, 0x4d, 0x5, &(0x7f000017a000-0x4d)=""/77}, {0xff, 0x5, 0x100000001, &(0x7f000051b000-0x5)=""/5}, {0x8, 0xa4, 0x5, &(0x7f0000643000-0xa4)=""/164}]}) open$dir(&(0x7f00003e9000-0x8)='./file0\x00', 0x26102, 0x0)