# https://syzkaller.appspot.com/bug?id=65e38e5a8444d3c1d5869e6a2652299df9cd6233 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"","fault_call":-1,"close_fds":false} msgget$private(0x0, 0x2) munmap(&(0x7f000071c000/0x4000)=nil, 0x4000) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc5005601, &(0x7f0000000580)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x20000000, 0x80000000], [], [0x0, 0x0, 0x0, 0x0, 0x7fffffff]}}) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x1000) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x480, 0x0) ioctl$WSKBDIO_SETMODE(r1, 0x80045713, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, 0x0)