# https://syzkaller.appspot.com/bug?id=d423bae4fbd77fe0f0f126315c1ae59e741f3eac # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} syz_open_pts() r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)=[{{r0}, 0xfffffffffffffffb, 0x20, 0x41, 0x800000000006605, 0x8b3f}, {{r0}, 0xffffffffffffffff, 0x1, 0xd24a2de73370bf4b, 0xe6, 0x2}, {{}, 0x43413686a06d1338, 0x5, 0xfffff, 0x4, 0x4}], 0x0, 0x0) nanosleep(0x0, 0x0) r1 = kqueue() r2 = kqueue() kevent(r2, &(0x7f00000003c0), 0xf8b1, 0x0, 0x10000fe, 0x0) mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x81, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$TIOCFLUSH(r3, 0x80206979, &(0x7f00000000c0)) kevent(r1, 0x0, 0x0, 0x0, 0x1f, 0x0)