# https://syzkaller.appspot.com/bug?id=0c984670d3841e6aab963a9db52f7343ce6ba3bf # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","close_fds":false,"tmpdir":true,"segv":true} sysctl$net_inet_udp(&(0x7f0000000000)={0x4, 0x2, 0x11, 0x4}, 0x4, 0x0, 0x0, &(0x7f0000000180)="8e4bf258", 0x4) sendto$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket(0x1, 0x4, 0x2) sendto$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffffff, 0xc0245755, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x400, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x801, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000001080), 0x400, 0x0) recvfrom(r0, &(0x7f00000010c0)=""/147, 0x93, 0x840, 0x0, 0x0) sysctl$kern(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$pf(0xffffffffffffff9c, 0x0, 0x1, 0x0) fchdir(0xffffffffffffffff) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x8) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, 0x0) ioctl$FIOASYNC(0xffffffffffffffff, 0xcd604404, 0x0) sysctl$kern(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket(0x11, 0x3, 0x0) semget(0x2, 0x1, 0x470) sysctl$kern(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdirat(0xffffffffffffffff, 0x0, 0x0)