# https://syzkaller.appspot.com/bug?id=3fbc166c1cf69c513a9e388cd2cf5c6ff6aae21d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:false Collide:false Repeat:true Procs:8 Sandbox:none Fault:true FaultCall:5 FaultNth:60 EnableTun:false UseTmpDir:true EnableCgroups:true HandleSegv:false WaitRepeat:true Debug:false Repro:false} mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200))