# https://syzkaller.appspot.com/bug?id=90a4811c99d6a2df7b252971b754612ca632894d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":8,"slowdown":1,"sandbox":"none","close_fds":false,"tmpdir":true,"segv":true} socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket(0x18, 0xc002, 0x0) r2 = socket(0x18, 0x2, 0x0) connect$unix(r2, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) getsockname$unix(r2, &(0x7f00000000c0)=ANY=[], &(0x7f0000000040)=0xffffffffffffff19) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r1, r0) r3 = dup(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, 0x0) r4 = socket(0x400000000018, 0x3, 0x3a) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, 0x0) socket(0x18, 0x2, 0x0) getsockname$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) setsockopt(r4, 0x29, 0x6c, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0)