# https://syzkaller.appspot.com/bug?id=f47091e026691c1b5d8a1165c149cb99172ad98c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} r0 = open(&(0x7f0000000180)='./file0\x00', 0x80000000000206, 0x0) r1 = getpid() ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x40001d12, r1) ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x40001d12, r1) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, 0x0, 0x0) (async) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) getsockopt$sock_cred(r2, 0xffff, 0x1022, 0x0, &(0x7f0000000100)) semop(0x0, 0x0, 0x0) (async) semop(0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) geteuid() semop(0x0, &(0x7f0000000140)=[{0x4, 0x200}, {0x3, 0x0, 0x800}, {0x4, 0x9, 0x1000}, {0x4, 0x4}, {0x0, 0x5e0, 0x1000}, {0x2, 0xfffe, 0x1000}, {0x1, 0xda, 0x1800}, {0x3, 0x6, 0x1000}, {0x0, 0x8001, 0x1800}], 0x9) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000040), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r5 = getpid() shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={{0x5, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4d04}, 0x23, 0x1, r5, 0x0, 0x3ff, 0x7fffff7e, 0x2}) shmctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000002480)={{0xea, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8, 0x1000}, 0x7, 0x1, r5, 0x0, 0x7, 0x8, 0xff, 0x7}) (async) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001380)={{0x7, r3, r4, 0x0, 0xffffffffffffffff, 0x94, 0x1}, 0x7fffffff, 0x6, 0x0, r5, 0x0, 0x100000001, 0x80000001, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f00000001c0), &(0x7f0000000000)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0)