# https://syzkaller.appspot.com/bug?id=a74718ca902617e6aa7327aa008b25844eccf2d3 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":2,"sandbox":"none","fault_call":-1,"close_fds":false,"segv":true} open(&(0x7f0000000100)='./file0\x00', 0x60a, 0x0) ktrace(&(0x7f0000000180)='./file0\x00', 0x14, 0xf14, 0x0) execve(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)="f51b9d74814c670dfce752976d8fb87a9e0eee5f3b6ae022915b0176d40aed62b0caafb82b241602574a852d34a929d13eae8d233b8f2ae92c02661c258b1a8ce9d2a740bfa013a553bb41386390d0b558b2d26a207b878488014cc8563385cd4ef8a68e21d9320741deb13e429bc73c63519164c324e5893924b4debe18028657f15742ffb968c5c8ddebace1ddd35ba218", 0x92}], 0x1) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket(0x2, 0x400000000002, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8020690c, &(0x7f0000000300))