# https://syzkaller.appspot.com/bug?id=906433df4abcde9bf8261b1c105f7a48418b8663 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} socket(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x0, 0xffffffffffffffff}, 0x8000000042}) r0 = socket(0x2, 0x2, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$FIONREAD(r0, 0x8040691a, &(0x7f00000001c0)) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, 0x0) ioctl$BIOCSETIF(0xffffffffffffff9c, 0x8020426c, 0x0) r1 = socket(0x2, 0x2, 0x0) ioctl$FIONREAD(r1, 0xc0206923, &(0x7f00000001c0)) r2 = socket(0x2, 0x2, 0x0) ioctl$FIONREAD(r2, 0x8020690c, &(0x7f00000001c0)) getsockopt(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) ioctl$BIOCSETIF(0xffffffffffffff9c, 0x8020426c, 0x0) r3 = msgget$private(0x0, 0x0) r4 = syz_open_pts() ioctl$TIOCCONS(r4, 0x80047462, 0x0) msgsnd(0x0, 0x0, 0xed, 0x0) msgctl$IPC_STAT(0x0, 0x2, 0x0) msgsnd(r3, 0x0, 0x4a, 0x800) ioctl$VMM_IOC_CREATE(0xffffffffffffffff, 0xc2585601, 0x0) r5 = open(0x0, 0x80000000000206, 0x4ebfac6bbaf7959) writev(r5, 0x0, 0x0) syz_emit_ethernet(0x17a, &(0x7f0000000380)=ANY=[@ANYBLOB]) syz_extract_tcp_res(0x0, 0xc0000000, 0x6) r6 = socket(0x2, 0x2, 0x0) connect$unix(r6, &(0x7f0000000300)=@file={0x0, '\x00'}, 0x3) semget$private(0x0, 0x7, 0x3c0)