# https://syzkaller.appspot.com/bug?id=d73c92b739eb3b2f4e3a7c126f91bd3165f3313f # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} poll(0x0, 0x0, 0x4a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getuid() setresuid(0xee01, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) getpid() r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) freebsd11_lstat(0x0, 0x0) getgid() r2 = semget(0x2, 0x1, 0x390) getgid() geteuid() getresgid(0x0, 0x0, 0x0) __semctl$IPC_SET(r2, 0x0, 0x1, 0x0) r3 = open$dir(0x0, 0x40000400001803c1, 0x0) pwritev(r3, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r4, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r5, 0x0) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0)