# https://syzkaller.appspot.com/bug?id=041377b6a1c24d19ed92fc64a6d4bf8fee03f71c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":2,"sandbox":"none","fault_call":-1,"tmpdir":true,"segv":true} mknod(&(0x7f00000001c0)='./file0\x00', 0x1000, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getpgid(0xffffffffffffffff) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000100), 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000180)=0xc) getppid() getuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, 0x0) getppid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000280), 0xc) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f00000002c0), 0xc) sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0xa, &(0x7f00000000c0)=[{&(0x7f0000000080)="44b98708227d5bd9be932c7fbac7cc21cfcfdebf1812dc", 0x17}], 0x1, 0x0, 0x0, 0x8}, 0x401) getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r1) setuid(0xee01) open$dir(&(0x7f0000001480)='./file0\x00', 0x1, 0x0) mknod(&(0x7f00000001c0)='./bus\x00', 0x80002008, 0x1000)