# https://syzkaller.appspot.com/bug?id=20e6cd50a53746d174e401310a3c528fa9258a96 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e5], [0x0, 0x0, 0x0, 0x9, 0xfffffff7ffffffff], [0x0, 0x0, 0x401]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) write(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9dfc) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, 0x0) fcntl$dupfd(0xffffffffffffffff, 0xa, 0xffffffffffffffff) ioctl$TIOCFLUSH(0xffffffffffffffff, 0xc0106924, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket(0x18, 0x2, 0x0) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x80206979, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, 0x0) getpgid(r4) sysctl$hw(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) flock(0xffffffffffffff9c, 0x0) sysctl$net_inet6_ip6(&(0x7f0000000100)={0x4, 0x18, 0x29, 0x1}, 0x4, 0x0, 0x0, 0x0, 0x0)