# https://syzkaller.appspot.com/bug?id=4478f38b309b53c49381f3560b4ecc3a786f16d9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) writev(r1, 0x0, 0x0) r2 = getpid() pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() fktrace(r3, 0x0, 0xe9157a38ce131743, r4) ktrace(&(0x7f0000000100)='./file2\x00', 0x0, 0x80, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, r0, 0x0, 0x0) pread(r1, &(0x7f0000000140)="96", 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x80, 0x7) close(r8) recvmsg(r6, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff4f}, 0x0) r9 = semget$private(0x0, 0x8, 0x10286) semop(r9, &(0x7f0000000300)=[{0x3, 0x2}, {0x1, 0x1, 0x3800}, {0x2, 0x1009, 0x1000}, {0x1, 0xffff, 0x1800}], 0x4) r10 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r11 = getuid() fchown(r10, r11, 0x0) dup2(r6, r7) setreuid(0xee00, r11) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc) r13 = getuid() semctl$IPC_SET(r9, 0x0, 0x1, &(0x7f0000000180)={{0x7ff, r11, r12, r13, 0xffffffffffffffff, 0x0, 0x5}, 0xffffffffffff9d03, 0x7, 0x4000000000000000}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000180)={{0x80000000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3f}, 0xfffffffffffffffd, 0x380000, 0x8}) fchownat(r1, &(0x7f0000000200)='./file2\x00', 0x0, r12, 0x400)