# https://syzkaller.appspot.com/bug?id=f9c01cdb4391ad61a234249fee7f2717ab50d253 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"segv":true} socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(0xffffffffffffffff) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r1 = semget$private(0x0, 0x8, 0x10596) semctl$SETVAL(r1, 0x4, 0x8, &(0x7f0000000040)=0x80000001) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$speaker(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup(0xffffffffffffff9c) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x43}]}) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) pipe2(0x0, 0x10000) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, 0x0) sysctl$kern(&(0x7f0000000000)={0x1, 0x4d}, 0x2, 0x0, 0x0, &(0x7f00000010c0)="5cb7000a", 0x4)