# https://syzkaller.appspot.com/bug?id=0d05d2f934bae1b47d4335029f509638e99c2c88 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","sandbox_arg":0,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"sysctl":true,"tmpdir":true,"segv":true} openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) dup2(r1, r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(0xffffffffffffffff, 0x2) r2 = dup(0xffffffffffffffff) socket$unix(0x1, 0x5, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x80001, 0x0) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x2) r4 = dup(r3) accept(r4, 0x0, 0x0) r5 = dup3(r4, r2, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x80880, 0x0) connect$unix(r6, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$EXT4_IOC_GETSTATE(r5, 0x5452, &(0x7f0000000000))