# https://syzkaller.appspot.com/bug?id=38d2267ecd2c57c356d86d4534df47adf85acccb # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"tmpdir":true,"segv":true} mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffff9c) r1 = socket$unix(0x1, 0x1, 0x0) getsockname(r1, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x103002, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r3 = accept$unix(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x208}, {0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x2}, {r3}, {0xffffffffffffffff, 0x4300}, {r2, 0x4000}, {r1, 0x200}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0x201}, {r0, 0x1}], 0xa, 0x0, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000800), 0x12)