# https://syzkaller.appspot.com/bug?id=65e38e5a8444d3c1d5869e6a2652299df9cd6233 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"","fault_call":-1,"close_fds":false} open(0x0, 0x1, 0x0) pipe(&(0x7f0000000040)) openat$wsmuxmouse(0xffffffffffffff9c, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) setpgid(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x6, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x5) fcntl$setown(0xffffffffffffffff, 0x6, r0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) kqueue() dup2(0xffffffffffffffff, 0xffffffffffffffff) getppid() fcntl$getown(0xffffffffffffffff, 0x5) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, 0x0) socket(0x11, 0x3, 0x0) kqueue() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) msgrcv(0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1800) fcntl$setstatus(r1, 0x4, 0x46bfb) openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ttyCcfg\x00', 0x8000, 0x0) getpid() pipe(0x0) ktrace(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3, 0x100, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BIOCSETIF(r4, 0x8020426c, 0x0) ioctl$BIOCSETF(r4, 0x80104267, 0x0) ioctl$TIOCSETVERAUTH(0xffffffffffffffff, 0xc0107005, 0x0) msgget$private(0x0, 0x425) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r3, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) msgsnd(0x0, 0x0, 0x0, 0x80000803) r5 = open$dir(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46bfb) r6 = getppid() fcntl$setown(0xffffffffffffffff, 0x6, r6) r7 = fcntl$getown(0xffffffffffffffff, 0x5) fcntl$setown(0xffffffffffffffff, 0x6, r7) symlinkat(&(0x7f0000000080)='./bus\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00') ioctl$FIONBIO(r5, 0x8004667e, &(0x7f0000000140)=0x4000000008) pipe(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46bfb) r8 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse\x00', 0x0, 0x0) r9 = getppid() setpgid(0x0, r9) fcntl$setown(r8, 0x6, r9) fcntl$getown(r8, 0x5) read(0xffffffffffffffff, 0x0, 0x0) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r10, 0xc5005601, &(0x7f0000000580)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x20000000, 0x80000000]}}) r11 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x10, r11, 0x0, 0x0) openat$wsmuxmouse(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x4010, 0xffffffffffffffff, 0x0, 0x2)