# https://syzkaller.appspot.com/bug?id=d93e92fde3857c69df2cf46b4244d9814c4318a7 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"slowdown":1,"sandbox":"none","close_fds":false,"tmpdir":true,"segv":true} open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000140)=[{0x0, 0x0, 0x2, 0x1000}, {}, {}]}) r0 = getuid() socketpair(0x2, 0x2, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) r2 = geteuid() r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r3, 0xa, r3) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) r5 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) r6 = getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0xa, &(0x7f0000000140)=[{&(0x7f00000000c0)="db9b0c9be1b12449804724cd680b295bd73720e184f469473f0a5c330af653e796cf6021ed281061753ab523d1e400476ba38e", 0x33}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000800f6ffffffffff0000dbb27125c143d712ca74348b9b3140468bfd2b6cb7875538de00000000008af0cabd0a5998f00a81e63093bbbaf9dc6393e52b56962361a4dc90e202b40d0f94470e2c013fff45a07e0000000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32, @ANYBLOB="2000000000000000ffff000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="000000002000000000000000ffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="bc59a3003aee7c967b7511bcef1ba31815b2b7e300000000000010de000000000000000067d4349d031a8dd53d84d3e17bb163f7d4f858c63014c82e1f7026ad3f917ebb60c6caadfd70a15dcda9c7836e67fca7f85257152b4386a7007523cbac109be49cf8011d9b4bfef3"], 0x60, 0x5}, 0xa) fchown(r1, r2, r6) r7 = getpid() ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x53e, r7) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x3ff, 0x0, 0x0, r0, r6, 0x104, 0x8}, 0x0, 0xda18, 0x0, r7, 0x8, 0xd7, 0x2, 0x5812}) poll(&(0x7f0000000000), 0x32, 0x0) ktrace(&(0x7f0000000180)='./file0\x00', 0x1, 0x20c, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() socketpair(0x2, 0x2, 0x9, &(0x7f0000000040)) geteuid() openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) fcntl$dupfd(r3, 0xa, r3) openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) getgid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0xa, &(0x7f0000000140)=[{&(0x7f00000000c0)="db9b0c9be1b12449804724cd680b295bd73720e184f469473f0a5c330af653e796cf6021ed281061753ab523d1e400476ba38e", 0x33}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000800f6ffffffffff0000dbb27125c143d712ca74348b9b3140468bfd2b6cb7875538de00000000008af0cabd0a5998f00a81e63093bbbaf9dc6393e52b56962361a4dc90e202b40d0f94470e2c013fff45a07e0000000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32, @ANYBLOB="2000000000000000ffff000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="000000002000000000000000ffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="bc59a3003aee7c967b7511bcef1ba31815b2b7e300000000000010de000000000000000067d4349d031a8dd53d84d3e17bb163f7d4f858c63014c82e1f7026ad3f917ebb60c6caadfd70a15dcda9c7836e67fca7f85257152b4386a7007523cbac109be49cf8011d9b4bfef3"], 0x60, 0x5}, 0xa) fchown(r1, r2, r6) getpid() ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x53e, r7) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x3ff, 0x0, 0x0, r0, r6, 0x104, 0x8}, 0x0, 0xda18, 0x0, r7, 0x8, 0xd7, 0x2, 0x5812}) poll(&(0x7f0000000000), 0x32, 0x0) ktrace(&(0x7f0000000180)='./file0\x00', 0x1, 0x20c, 0x0)