# https://syzkaller.appspot.com/bug?id=9f5b67619fbe789c848432b2cad5bd2f585b300c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0x18, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1001, 0x0, 0x0) r2 = socket(0x18, 0x1, 0x0) close(r2) connect$unix(r2, 0x0, 0x0) r3 = dup(0xffffffffffffffff) listen(r3, 0xcf25) connect$unix(0xffffffffffffffff, 0x0, 0x0) r4 = kqueue() kevent(r4, &(0x7f0000000080)=[{{0xffffffffffffff9c}, 0xfffffffffffffff9, 0x1}], 0xf8b4, 0x0, 0x10000fe, 0x0) accept$inet6(r0, 0x0, 0x0) kevent(r4, 0x0, 0x0, 0x0, 0x1f, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x100, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x209], [0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x3ff], [0x0, 0x0, 0x401]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r5 = socket(0x18, 0x1, 0x0) r6 = openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BIOCSETIF(r6, 0x8020426c, 0x0) ioctl$BIOCSETF(r6, 0x80104267, 0x0) ioctl$BIOCSBLEN(r6, 0xc0044266, 0x0) r7 = fcntl$dupfd(r5, 0x0, r5) ioctl$TIOCFLUSH(r7, 0x8080691a, &(0x7f0000000300))