# https://syzkaller.appspot.com/bug?id=e4ab71c5f102a9656fad8a509043c848e64e59ec # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} syz_emit_ethernet(0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x9, 0x0, 0x0, {[0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff], [0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x10001], [], [{0x0, 0x200}, {0x401, 0x3, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x1, 0x0, 0x5}, {0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0xffffffff}], {}, {0x8001}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket(0x2, 0x400000000002, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8020690c, &(0x7f0000000300))