# https://syzkaller.appspot.com/bug?id=9f5b67619fbe789c848432b2cad5bd2f585b300c
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true}
ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202], [0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, 0x3fff7bdfeff], [0x0, 0x0, 0x482]}})
ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0})
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5)
r0 = socket(0x18, 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300))
dup2(0xffffffffffffffff, 0xffffffffffffffff)
r2 = socket(0x18, 0x2, 0x0)
r3 = socket(0x18, 0x2, 0x0)
ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r2)
ioctl$TIOCFLUSH(r4, 0x80206979, &(0x7f0000000300))