# https://syzkaller.appspot.com/bug?id=3ed32b4c8464bf7efb4a0bd6b0b6d01b0b0365cc # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket$inet6(0x18, 0x5, 0xff) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x400, &(0x7f0000000040)={0x18, 0x0, 0x40, 0x8}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000001c0)={&(0x7f00000000c0)=@in, 0xc, 0x0, 0x0, &(0x7f0000000140)=""/91, 0x5b}, 0x40) getgid() r3 = socket(0x6, 0x5, 0x2) setsockopt$sock_int(r3, 0xffff, 0x1003, &(0x7f0000000200)=0x2b0, 0x4) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240)) recvfrom$unix(r4, &(0x7f0000000280)=""/41, 0x29, 0x841, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x0}, 0x8) r5 = socket$unix(0x1, 0x5, 0x0) shutdown(r5, 0x1) mlockall(0x5) faccessat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x172, 0x200) r6 = semget(0x1, 0x4, 0x4) semctl$IPC_STAT(r6, 0x0, 0x2, &(0x7f0000000340)=""/191) setsockopt$sock_int(r2, 0xffff, 0xfd84220900c7bf5e, &(0x7f0000000400)=0x6, 0x4) getpeername(r1, &(0x7f0000000440)=@in, &(0x7f0000000480)=0xc) r7 = accept$inet6(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500)=0xc) recvmsg(r7, &(0x7f00000006c0)={&(0x7f0000000540)=@in6, 0xc, &(0x7f0000000600)=[{&(0x7f0000000580)=""/83, 0x53}], 0x1, &(0x7f0000000640)=""/71, 0x47}, 0x805) connect$unix(r4, 0x0, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f00000007c0)={0x0, 0x0}, 0xc) setuid(r8) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000800)={0x1f}, 0x8) r9 = msgget$private(0x0, 0xa0) msgrcv(r9, 0x0, 0x0, 0x0, 0x800) r10 = accept$inet(0xffffffffffffff9c, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$SO_PEERCRED(r7, 0xffff, 0x11, &(0x7f00000009c0)={0x0}, 0xc) fcntl$setown(r10, 0x6, r11)