# https://syzkaller.appspot.com/bug?id=ae28a692910f2e066889b98c890adc67d88a4fda # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x9e) freebsd11_stat(0x0, 0x0) openat$bpf(0xffffff9c, 0x0, 0x400000, 0x0) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000001940)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) rmdir(0x0) ioctl$DIOCRADDADDRS(r0, 0xc4504443, &(0x7f0000000880)={{"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", "d140c3d29fe7b3bd837ac0b2c6ba74898e9ca2bff7a60942e1b9dea01e50b80b", 0x7, 0x8}, &(0x7f0000000480), 0x7, 0x10007, 0x5, 0x6, 0xfffffffeffffffff, 0x6, 0x502, 0x7ff}) setsockopt(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) open(0x0, 0x80000, 0x155) open$dir(0x0, 0x0, 0x100) cpuset_setdomain(0x3, 0x9, 0x40, 0x20, &(0x7f0000000080)={[0xfffffffffffffffe]}, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r3 = open$dir(0x0, 0x0, 0x0) mkdir(0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x8000000000000000, 0x0) cpuset(&(0x7f0000000400)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r4, 0x29, 0x32, &(0x7f0000001040)=ANY=[], 0x8) getsockopt$inet6_buf(r4, 0x29, 0x32, &(0x7f0000001040)=""/4096, &(0x7f0000000000)=0x1000) socket$unix(0x1, 0x2, 0x0)