# https://syzkaller.appspot.com/bug?id=81988a8cbc67747b9785a61b36b29338b322b959 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} socketpair(0x2, 0x10000000, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000080)) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r2 = getgid() getgroups(0x9, &(0x7f0000000200)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) setregid(r2, r3) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(r1, 0xffff, 0x11, &(0x7f0000000300), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r5 = dup(0xffffffffffffff9c) recvfrom$inet(r5, &(0x7f00000003c0)=""/192, 0xc0, 0x41, &(0x7f0000000480)={0x2, 0x0}, 0xc) r6 = paccept(0xffffffffffffff9c, &(0x7f0000000500)=@in, &(0x7f0000000540)=0xc, 0x40000000) dup2(0xffffffffffffffff, r6) r7 = paccept(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x70000000) setsockopt$sock_linger(r7, 0xffff, 0x80, &(0x7f00000005c0)={0xfffffffb, 0x2}, 0x8) pipe(&(0x7f0000000600)={0xffffffffffffffff}) getsockopt$inet_opts(r8, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)) ftruncate(r4, 0x3)