# https://syzkaller.appspot.com/bug?id=21a122306cdfda1fa1fed64ad7326149a8ba43ef # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} sendto$unix(0xffffffffffffffff, &(0x7f0000000240)="47c5194a0a650466564a3e6ef093cf570d653934d5da0bf19df4442d8b723f2da4658125085b8be11573bc6e3343e08ddbac577ad694f1da78a40ca98fdd855743bc7ef41b8617461839ccd519be4ab721e3544ea2f338d575c42f265b1cdac4603a13b560fa162984f48ef609cc0b9a06589be9835b454c21311dc4ceb29aa211c56bebd5f3a553c7e5a0d5829155f39a431a7e1f4b19f491c681c813c38c9c8ff24c7be68bd87f394c94ab541fa0f2da184060dd0aea829555af9e01f19db2284c5f0302de34ad8138e07f9a3cc45ce86d", 0x20, 0x0, 0x0, 0x227) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket(0x2, 0x400000000002, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8020690c, &(0x7f0000000300))