# https://syzkaller.appspot.com/bug?id=0f5f6caa8dd94a8cfc94a9f2f4c22e00bc0f359e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000004c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0, 0x8960) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1fe], [0x0, 0x0, 0x0, 0x9, 0xfffffffffffff7ff], [0x0, 0x0, 0x401], [{}, {0x0, 0x1000000}, {0x73f5}], {}, {0x0, 0x0, 0x0, 0x4}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8080691a, &(0x7f0000000300))