# https://syzkaller.appspot.com/bug?id=a301d69189624e35ec3293b69614be225df886bd # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x1fc], [0x0, 0xfe0000000000, 0x0, 0x9, 0xffffffffffffffff, 0xfdfffffffffdffff], [0x0, 0x0, 0x9], [{0x0, 0x7fffffff, 0xfffffffe}, {}, {0x0, 0x0, 0x208}, {}, {}, {}, {0x0, 0x0, 0x8000000}, {0x0, 0x0, 0x0, 0x8}], {}, {0x186, 0x0, 0x0, 0x7f}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = socket$inet6(0x18, 0x3, 0x0) r2 = dup2(r1, r1) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300))