# https://syzkaller.appspot.com/bug?id=eae00482f9e8db1cb3bf94940b6b20e195e57d34 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":2,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} mknod(&(0x7f00000000c0)='./file0\x00', 0x1ffb, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0xc02, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_extract_tcp_res(0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='/dev/bpf\x00', &(0x7f0000000140)='tap', &(0x7f0000000180)='tap', &(0x7f00000001c0)='/dev/bpf\x00', &(0x7f0000000200)='tap'], &(0x7f0000000500)=[&(0x7f0000000280)='/dev/bpf\x00', &(0x7f00000002c0)='tap', &(0x7f0000000300)='/dev/bpf\x00', &(0x7f0000000340)='-+:\\-\'%-[%\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='^\x00', 0x0, &(0x7f0000000440)='/dev/bpf\x00', &(0x7f0000000480)='[^}&\x00', &(0x7f00000004c0)='$:-\x00']) ioctl$BIOCPROMISC(r1, 0x20004269) ioctl$TIOCFLUSH(r0, 0x80206979, &(0x7f00000000c0))