# https://syzkaller.appspot.com/bug?id=124373f67ef703d44990a3cf4dacd2510b0fc1fc # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r1 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) mmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2, 0x12, r1, 0x1) setrlimit(0x8, &(0x7f0000000980)={0x42, 0x62}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xfffffffffffffe50) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, r4}}) r5 = syz_open_pts() writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000200)="8b8c7e5e4a790900", 0x8}], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001640)={&(0x7f0000000040)=@un=@abs={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000340), 0x0, 0x0, 0x28}}, 0x10, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xc1, 0x0) r6 = syz_open_pts() flock(r6, 0x1) fcntl$lock(r6, 0x8, &(0x7f0000000000)={0x0, 0x2, 0x74f, 0x100000004, r3}) ioctl$TIOCSETA(r5, 0x802c7414, &(0x7f0000000000)={0x400, 0x0, 0xc, 0xffffffbf, "ffff09008700", 0x0, 0x6}) poll(0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000180)={0x0, 0x0}) socket(0x11, 0x3, 0x0) setrlimit(0x3, 0x0) syz_open_pts()