# https://syzkaller.appspot.com/bug?id=84eb6aeee216974142ee817af9aac177e6c2fe96 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$BIOCPROMISC(r0, 0x20004269) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) r2 = kqueue() kevent(r2, &(0x7f00000001c0)=[{{r1}, 0xffffffffffffffff, 0x83}], 0x2, 0x0, 0x0, 0x0) kevent(r2, 0x0, 0x0, 0x0, 0xc4e, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r3 = socket(0x11, 0x3, 0x0) r4 = socket(0x2, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$TIOCFLUSH(r5, 0x80206979, &(0x7f0000000300))