# https://syzkaller.appspot.com/bug?id=a74718ca902617e6aa7327aa008b25844eccf2d3 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":2,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} mknod(&(0x7f00000000c0)='./file0\x00', 0x1ffb, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0xc0, 0x44) pipe2(0x0, 0x10004) ioctl$VMM_IOC_INFO(0xffffffffffffffff, 0xc0185603, &(0x7f00000004c0)={0xbc, 0x0, &(0x7f0000000400)=""/188}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x81, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_extract_tcp_res(0x0, 0x0, 0x0) ioctl$TIOCFLUSH(r0, 0x80206979, &(0x7f00000000c0)) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f0000000100)={0x600000, 0x51, 0x1, 0x7fffffff, &(0x7f0000000500)={{0x4, 0x81, 0x7, 0xffff, 0x2, 0x1, 0xdf}, {[0xffffffff, 0x9, 0x0, 0x2, 0x3, 0x7, 0x6, 0x5, 0x2, 0x9639, 0xff, 0xefe, 0x10001, 0x2, 0xff, 0x1a, 0x3, 0x80000001], [0x0, 0x5, 0x2, 0x1, 0x5, 0x3, 0x400, 0x100000001, 0x7ff, 0xeb], [0x2, 0x9, 0x1000, 0x100000000, 0x5, 0x5, 0x8000], [0x1ff, 0x5, 0x40, 0x92ff, 0x20, 0x8bf], [{0x0, 0x1ab0, 0x8000, 0x400000000}, {0x80, 0x8, 0x8000, 0x63e4}, {0x7, 0x4, 0x691a, 0x4800000}, {0x200, 0x0, 0x1bff, 0x2}, {0x2270, 0x2, 0x1, 0x40}, {0x7, 0x20, 0xfffffffffffffff9, 0x7f}, {0x4, 0x2, 0x1, 0x4}, {0x7fff, 0xffffffffffffffff, 0x80000000, 0x8}], {0x2, 0xffffffff00000000, 0x6, 0x31687753}, {0x6093, 0x93, 0x601, 0x7}}}, 0x3ff, 0x2})