# https://syzkaller.appspot.com/bug?id=61ec9b78979c77b478704a46b43300223433acfe # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"namespace","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0x43, 0x9, 0x0, {0xa9b, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x43) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x400000a8081, 0x0) sched_getattr(0x0, &(0x7f00000001c0), 0x30, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000240)={0x7, 0x1b, 0x1}, 0x7) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/user\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') sendfile(r1, r0, &(0x7f0000000040), 0x797fffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc)