# https://syzkaller.appspot.com/bug?id=21a122306cdfda1fa1fed64ad7326149a8ba43ef # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {&(0x7f00000000c0)}, {0x0}, {&(0x7f0000000280)="bb77de8ec26cbc26bcdd36bfac333da392fe575ab53c76cf07f1c78cc8937c86574a434620a34147f0c8fc271718730b113607ddfc90025be6f6e5042e1cc8de199b600f27145d99beac562bbb03697564dbdfa584086677855e1c6bd18fc8b68baadae7641e6442416cb1667096637f3e79a42f3c5b313cbae341b2b4ce6b09d4901ecdbb14ae4bbe4c7ff22e6de036e8852dd4dbf3e9", 0x97}, {0x0}], 0x5, 0x0}, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x400000000002, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8020690c, &(0x7f0000000300))