# https://syzkaller.appspot.com/bug?id=9f5b67619fbe789c848432b2cad5bd2f585b300c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x10110, 0x0) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) r2 = kqueue() r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) write(r3, &(0x7f0000000100), 0xfffffe5d) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x40, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffff], [0x0, 0x0, 0x401]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5)