# https://syzkaller.appspot.com/bug?id=143f4cd57ac648f4f0c65605287d7b158b6ff9f1 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getsid(0xffffffffffffffff) fktrace(r1, 0x1, 0xf, r2) r3 = getpid() fktrace(r0, 0x0, 0x4, r3) r4 = openat(0xffffffffffffffff, &(0x7f0000001640)='/proc/self/exe\x00', 0x0, 0x0) ptrace(0x16, 0x0, 0x0, 0x0) __lstat50(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = semget$private(0x0, 0x4, 0x4) compat_50_____semctl13$IPC_SET(r7, 0x0, 0x1, &(0x7f0000000c80)=@buf=&(0x7f0000000c40)={{r5, r6, 0x7fff, 0x80000001, 0xa0, 0x58d, 0xf99}, 0x106, 0x8000000000000001, 0x1, &(0x7f0000000c00)={0x8, 0x6, 0xdd4, 0x7}}) setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000000)={0x0, 0x0, r6}, 0xc) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x10, r4, 0x0, 0x0) preadv(r4, &(0x7f0000001580)=[{0x0}], 0x1, 0x0) setreuid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) mmap(&(0x7f0000680000/0x3000)=nil, 0x3000, 0x2, 0x410, 0xffffffffffffffff, 0x0, 0xea8b)