# https://syzkaller.appspot.com/bug?id=a3d5cee035800a17bb033d6ab725d02a4fc61878 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket(0x0, 0x0, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, 0x0) r1 = socket(0x1, 0x2, 0x0) ioctl$FIONREAD(r1, 0xc0106924, 0x0) r2 = kqueue() kevent(r2, 0x0, 0x121, 0x0, 0xe7f4, 0x0) ioctl$FIONREAD(r0, 0xc0206921, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, 0x0) r3 = socket(0x20, 0x2, 0x0) ioctl$FIONREAD(r3, 0xc0206923, 0x0) ktrace(0x0, 0x0, 0x0, 0x0) getitimer(0x0, 0x0) open(0x0, 0x20112, 0x83) openat$wskbd(0xffffffffffffff9c, 0x0, 0x21, 0x0) r4 = socket(0x0, 0x2, 0x0) close(r4) socket(0x0, 0x3, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg(r4, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x12, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r5 = socket(0x18, 0x3, 0x3a) setsockopt(r5, 0x29, 0x7ff, 0x0, 0x0) pipe2(0x0, 0x10004) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0x67, 0x0, 0x0) r6 = socket(0x2, 0x1, 0x0) sysctl$kern(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1021, 0x0, 0x0) setrlimit(0x0, 0x0) r7 = openat$bpf(0xffffffffffffff9c, 0x0, 0x100, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r8 = socket(0x18, 0x1, 0x0) setsockopt(r8, 0x2c, 0xc, 0x0, 0x0) setsockopt(r8, 0x1000000029, 0xc, 0x0, 0x0) setsockopt(r8, 0x1000000029, 0xd, 0x0, 0x0) ioctl$BIOCSETIF(r7, 0x8020426c, 0x0) ioctl$BIOCSETWF(r7, 0x80104277, 0x0) openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0)