# https://syzkaller.appspot.com/bug?id=30939bb216ed5ff65e74493fef7e7a7cde17404e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":4,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r0, &(0x7f0000000100)=""/111, 0x6f, 0x0, 0x0, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) r1 = semget(0x0, 0x4, 0x100) r2 = geteuid() setresuid(0x0, 0xee01, r2) r3 = geteuid() setresuid(0x0, r3, r2) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) fstat(r4, 0x0) freebsd11_fstat(r0, 0x0) freebsd11_stat(0x0, 0x0) __semctl$IPC_SET(r1, 0x0, 0x1, 0x0) shutdown(r0, 0x0) r5 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r5, 0x0) r6 = dup(r5) accept$inet(r6, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r6, 0x84, 0xe, 0x0, 0x0) r7 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r7, 0x0) freebsd11_fstat(r7, 0x0)