# https://syzkaller.appspot.com/bug?id=bc2bc9da2825a560d04dbe2039655f62599b27d7 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":4,"sandbox":"none","fault_call":-1,"close_fds":true,"devlinkpci":true} r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) name_to_handle_at(r1, 0x0, 0x0, 0x0, 0x0) close(r1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x9, 0x0, 0xffff}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}, 0x0) r3 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) name_to_handle_at(r3, 0x0, 0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100), 0x10) r4 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) name_to_handle_at(r4, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000200)=0x1) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000180)={0x9, 0x9, 0x4}) r5 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) name_to_handle_at(r5, 0x0, 0x0, 0x0, 0x0) fallocate(r5, 0xa, 0x6, 0x100000000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=""/122, 0x7a}) clone(0x28b84900, 0x0, 0x0, 0x0, &(0x7f0000000300)) r6 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) name_to_handle_at(r6, 0x0, 0x0, 0x0, 0x0) r7 = gettid() tkill(r7, 0x1000000000016)