# https://syzkaller.appspot.com/bug?id=79a5e32797c5db8b95791b70df710c1ec73ae22b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":2,"sandbox":"none","fault_call":-1,"tmpdir":true,"segv":true} ioctl$WSDISPLAYIO_GETSCREENTYPE(0xffffffffffffffff, 0xc028575d, &(0x7f0000000180)={0x2, 0x401, './file0\x00', 0x7, 0x2, 0xfffffffffffffff9, 0xffffffffffffff7f}) r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f0000000000)="b100050309000000000021b1ffff00bd49451ae3d3051020741038f53e8551f30ce390500e08fecea11ea8fef96e4f9679d5c4c2a73764aebdbe781e4d8f6aef9187a869a4d3722c91f75073a1ebe2a4cbba982fd825582fe2aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89040fd3872babfbb770c1f5a872c881ff7cc53c894303b298a85ff3faa8d9211830e0f2f0c9f69ec7ab3a34c29000000000", 0xb1, 0x0, 0x0, 0x0) setegid(0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) r2 = dup2(r1, r1) ioctl$TIOCSTART(r2, 0x2000746e) open(0x0, 0x102, 0x0) socket(0x2, 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000004c0)="90c3fe67eb586898600425f2f573e0d1ac83c18d65c8e22066c0d389fe894a974c8d45aaf9d2e7ae9fed58938ea6ac68a0b0632688ca0fab3647175abf22fea120c9b3bb77ca60c128295bf234505356095dbf9e50a4a5079723b57fed8ef0a251b91e67e1f5d347d5b668a390a25beea3962e7c10b8d9f53f5c82b5eacc26757d14f2fa6be9a2cbb2cfacc5e906dfd1e3208364bbc454327b6a1522c332ea628b8cb672e9e7247818f970e017c7cb9303e6b505059f34d3fb9df3993b7535fa269859e24b2802782224d7d5c13c21d4", 0xd0}], 0x1, 0x0) msgget$private(0x0, 0x0) link(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='./bus\x00') pipe(0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x40, 0x0)