# https://syzkaller.appspot.com/bug?id=81988a8cbc67747b9785a61b36b29338b322b959 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = semget(0x0, 0x0, 0x80) semctl$GETVAL(r0, 0x2, 0x5, 0x0) r1 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, ""/4096}, 0x0) semget$private(0x0, 0x0, 0x21) getuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, 0x0, 0x0) getgroups(0x3, &(0x7f00000011c0)=[0x0, 0x0, 0xffffffffffffffff]) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$sock_timeval(r2, 0xffff, 0x100b, &(0x7f0000001440), &(0x7f0000001480)=0x10) setsockopt$sock_timeval(r1, 0xffff, 0x100c, 0x0, 0x0) r3 = dup(r2) getsockname$unix(r3, &(0x7f0000001500)=@file={0x0, ""/60}, &(0x7f0000001540)=0x3e) r4 = accept$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r4, 0xffff, 0x11, 0x0, &(0x7f0000001600))