# https://syzkaller.appspot.com/bug?id=c9116f8cf1b1794ddf017bcc840ed42ae465cdaa # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x81, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) pipe(0x0) fcntl$getown(0xffffffffffffffff, 0x5) r1 = socket(0x800000018, 0x3, 0x102) bind$unix(r1, 0x0, 0x0) getsockopt$sock_cred(r1, 0xffff, 0x1022, 0x0, 0x0) r2 = socket(0x800000018, 0x3, 0x102) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r3, 0x8020426c, 0x0) r4 = kqueue() kevent(r4, &(0x7f00000001c0)=[{{r3}, 0xffffffffffffffff, 0x83}, {{r3}, 0xffffffffffffffff}], 0x2, 0x0, 0x3, 0x0) ioctl$BIOCSETIF(r3, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$TIOCFLUSH(r0, 0x80206979, &(0x7f00000000c0))