# https://syzkaller.appspot.com/bug?id=3ed32b4c8464bf7efb4a0bd6b0b6d01b0b0365cc # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"","fault_call":-1,"close_fds":false} r0 = semget$private(0x0, 0x2, 0x0) semctl$SETVAL(r0, 0x1, 0x8, 0x0) r1 = semget(0x2, 0x2, 0x8) semctl$SETALL(r1, 0x0, 0x9, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$GETZCNT(r0, 0x4, 0x7, 0x0) r2 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, 0x0, &(0x7f0000000180)) r3 = getegid() r4 = getppid() msgctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x3, r2, 0x0, 0x0, r3}, 0x2, 0x6b38, r4, 0x0, 0x8001, 0xffffffff, 0x1f, 0x80}) r5 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000280)) getsockopt$sock_int(r5, 0xffff, 0x2000, &(0x7f00000002c0), 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000340)=""/226) getsockname$inet(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getppid() r6 = shmget$private(0x0, 0x1000, 0x46, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_STAT(r6, 0x2, 0x0) r7 = semget$private(0x0, 0x4, 0x46) semctl$IPC_RMID(r7, 0x0, 0x0)