# https://syzkaller.appspot.com/bug?id=4bfdd911ebedfa79f04902344ec2b8eada2f6cf2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x278], [0x0, 0x0, 0x0, 0x9, 0xfffffffefffdffff], [0x0, 0x0, 0x401]}}) semop(0x0, &(0x7f0000000300)=[{0x1, 0x29c, 0x2800}, {0x4, 0x80, 0x1000}, {0x3, 0x1, 0xbfe}, {0x6, 0x1, 0x800}, {0x3, 0x5, 0x800}, {0x3, 0xfffffffffffffffa, 0x1800}, {0x7, 0x4, 0x800}, {0x0, 0x4, 0x800}, {0x0, 0xd3, 0x1800}], 0x9) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300))