# https://syzkaller.appspot.com/bug?id=68299a0445e0e8d940ce1fc2ff39f7466ff40e7d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} r0 = shmget(0x2, 0x3000, 0x44, &(0x7f0000ffa000/0x3000)=nil) compat_50___shmctl13$SHM_UNLOCK(r0, 0x4) symlink(0x0, 0x0) mknod(0x0, 0x6000, 0xe03) r1 = open(0x0, 0x0, 0x0) compat_50_setitimer(0x0, 0x0, 0x0) __fhopen40(0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setrlimit(0x2, 0x0) ioctl$WSMUXIO_INJECTEVENT(r1, 0xc0184603, 0x0) __mount50(0x0, 0x0, 0x40000000, 0x0, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) munmap(&(0x7f0000690000/0x1000)=nil, 0x1000) shutdown(r2, 0x1) getsockname$inet(r2, 0x0, 0x0) compat_50___msgctl13$IPC_STAT(0x0, 0x2, 0x0) lchown(0x0, 0x0, 0xffffffffffffffff) compat_40_mount(0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x0, 0x287e) shmget$private(0x0, 0x6000, 0x28c, &(0x7f0000605000/0x6000)=nil) rename(0x0, 0x0) lseek(r1, 0x0, 0x248, 0x2) socket(0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) compat_50_____semctl13$GETVAL(0xffffffffffffffff, 0x0, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) modctl$MODCTL_UNLOAD(0x2, 0x0) r3 = getsid(0x0) ptrace(0x9, r3, 0x0, 0x0) compat_50_wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) symlink(0x0, 0x0) compat_50___msgctl13$IPC_STAT(0x0, 0x2, 0x0) lchown(0x0, 0x0, 0x0) compat_40_mount(0x0, 0x0, 0x0, 0x0) lchflags(0x0, 0xe) lchown(0x0, 0x0, 0xffffffffffffffff) compat_40_mount(0x0, 0x0, 0x0, 0x0) unlink(0x0) setsockopt(0xffffffffffffffff, 0x1000000000029, 0x16, 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) ioctl$FIOGETBMAP(r4, 0xc008667a, 0x0)