# https://syzkaller.appspot.com/bug?id=a3d5cee035800a17bb033d6ab725d02a4fc61878 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} mknodat(0xffffffffffffff9c, 0x0, 0x1000, 0x0) r0 = openat$vnd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VNDIOCSET(r0, 0xc0384600, 0x0) open(0x0, 0x78e, 0x0) getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) close(r1) dup(0xffffffffffffffff) semop(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x403) setsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x1005, 0x0, 0x0) r2 = open(0x0, 0x615, 0x0) writev(r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = semget$private(0x0, 0x2, 0x182) semctl$GETALL(r3, 0x0, 0x6, 0x0) semctl$GETALL(0xffffffffffffffff, 0x0, 0x6, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) semop(r3, 0x0, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) setregid(0xffffffffffffffff, 0x0) geteuid() socket(0x18, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x1000000029, 0x6, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x3a6fc2bc33788fe5, 0x2) r4 = socket(0x18, 0x2, 0x0) openat$wsmuxmouse(0xffffffffffffff9c, 0x0, 0x1, 0x0) syz_emit_ethernet(0x42, 0x0) poll(0x0, 0x0, 0x0) setsockopt(r4, 0x1000000029, 0x32, 0x0, 0x0) sendmsg(r4, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setrlimit(0x8, 0x0) r5 = open(0x0, 0x0, 0x0) mkdirat(r5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0)