# https://syzkaller.appspot.com/bug?id=5500f1b6628d08f92055ecba5435eefa84cc8425 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = open(0x0, 0x0, 0x0) r1 = open$dir(0x0, 0x2020231, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)="92", 0x1}], 0x1) r2 = semget$private(0x0, 0x0, 0x100) getuid() r3 = getuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, 0x0, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) chown(0x0, r3, 0x0) geteuid() r4 = getuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, 0x0, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) chown(0x0, r4, 0x0) semctl$IPC_SET(r2, 0x0, 0x1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/96, 0x60}, 0x40) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000080)=""/105) __clone(0x0, 0x0)