# https://syzkaller.appspot.com/bug?id=9f5b67619fbe789c848432b2cad5bd2f585b300c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r1 = kqueue() kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=[{{}, 0xfffffffffffffffe, 0x27}], 0x0, 0x0) kevent(r1, &(0x7f0000000140), 0x66, 0x0, 0x81, 0x0) recvfrom$inet6(r0, &(0x7f0000000100)=""/78, 0x4e, 0x7, 0x0, 0x0) r2 = openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BIOCSETF(r2, 0x80104267, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000180)={'tap', 0x0}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt(r3, 0x0, 0x9, 0x0, 0x0) sendto(r3, 0x0, 0x0, 0x20a, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0) writev(r2, 0x0, 0x0) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000000)='/dev/diskmap\x00', 0x72f1b8ab1ad9af0d, 0x0) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, 0x3fff7edffff], [0x0, 0x0, 0x482], [], {}, {0x0, 0x0, 0x0, 0x3a}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r4 = socket(0x18, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$TIOCFLUSH(r5, 0x8080691a, &(0x7f0000000300)) r6 = openat$diskmap(0xffffffffffffff9c, 0x0, 0x80, 0x0) openat$bpf(0xffffffffffffff9c, 0x0, 0x800, 0x0) mmap(&(0x7f000000f000/0x1000)=nil, 0x1000, 0x4, 0x2012, r6, 0x0, 0x8001) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, 0x0) ioctl$BIOCGHDRCMPLT(0xffffffffffffffff, 0x40044274, 0x0) ioctl$BIOCGDLTLIST(0xffffffffffffffff, 0xc010427b, 0x0) mknod(0x0, 0x3a0914c44f7b202c, 0x1b00) open(&(0x7f0000000100)='./bus\x00', 0x400000003fd, 0x0) r7 = open(0x0, 0x0, 0x0) r8 = kqueue() kevent(r8, 0x0, 0x66, 0x0, 0x81, 0x0) dup2(r8, r7) pipe2(0x0, 0x10000) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x107) getpeername$inet6(r9, &(0x7f0000000000), 0x0) ktrace(&(0x7f0000000180)='./file0\x00', 0x14, 0xf14, 0x0) ktrace(&(0x7f0000000240)='./file0\x00', 0x0, 0x8, 0xffffffffffffffff) openat$bpf(0xffffffffffffff9c, 0x0, 0x4000000001, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00') msgget$private(0x0, 0x718) getuid() socket(0x2, 0xc003, 0x11) r10 = openat$wskbd(0xffffffffffffff9c, 0x0, 0x7fd, 0x0) ioctl$TIOCSTSTAMP(r10, 0x4004570c, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x0, 0x0) getpgrp()