# https://syzkaller.appspot.com/bug?id=a74718ca902617e6aa7327aa008b25844eccf2d3 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":2,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} mknod(&(0x7f0000000080)='./file0\x00', 0x1ffb, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x81, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) open$dir(0x0, 0x10, 0x8) syz_extract_tcp_res(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20002, 0x0) ioctl$TIOCFLUSH(r0, 0x80206979, &(0x7f00000000c0))