# https://syzkaller.appspot.com/bug?id=cbf693554e7f0b00d6d1957c56e07af608c9c9d2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":4,"sandbox":"none","fault_call":-1,"netdev":true} clone(0x40000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r1 = semget$private(0x0, 0x1, 0x42) semctl$SETALL(r1, 0x0, 0x11, 0x0) ioctl$KDGKBLED(r0, 0x4b64, 0x0) pipe(0x0) r2 = shmget$private(0x0, 0x2000, 0x78000100, &(0x7f0000ffd000/0x2000)=nil) link(&(0x7f0000000480)='./file0\x00', 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) clock_gettime(0x0, 0x0) utimes(0x0, &(0x7f0000000600)={{}, {0x0, 0x2710}}) fsetxattr$security_smack_entry(r0, 0x0, 0x0, 0x0, 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) accept4(r0, 0x0, 0x0, 0x800) ioctl$TIOCGWINSZ(r0, 0x5413, 0x0) r3 = shmat(r2, &(0x7f0000ffe000/0x2000)=nil, 0x1000) shmdt(r3) ptrace$getsig(0x4202, 0x0, 0x8, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0)