# https://syzkaller.appspot.com/bug?id=1501a2fdbb051f4b598ba84788b7b2d2e2f11c11 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","close_fds":false,"tmpdir":true,"segv":true} r0 = msgget(0x3, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) (async) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc) (rerun: 32) semop(0x0, &(0x7f0000000140)=[{0x3, 0x6e, 0x1800}, {0x0, 0x139a}, {0x4, 0x2, 0x1800}], 0x3) (async, rerun: 64) semop(0x0, &(0x7f0000000380), 0x1d) (rerun: 64) semctl$GETNCNT(0x0, 0x3, 0x3, &(0x7f0000000000)) (async, rerun: 64) semctl$SETVAL(0x0, 0x3, 0x8, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, &(0x7f0000000040)) getgroups(0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) r2 = __clone(0x0, 0x0) (rerun: 64) getpgid(r2) (async, rerun: 32) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x5, 0x0, r1, 0x0, 0x0, 0x800, 0x20}, 0x8, 0x0, 0x0, r2, 0x0, 0x8000000000000000, 0x80000001, 0x5}) (rerun: 32)