# https://syzkaller.appspot.com/bug?id=8edee1de5a64be2c54d28c3a8292737de8a21b1e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"","fault_call":-1,"close_fds":false} syz_extract_tcp_res$synack(0x0, 0x1, 0x0) setitimer(0x1, &(0x7f0000000040)={{0x9, 0x8}, {0x3, 0xfffffffffffffff7}}, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$WSDISPLAYIO_DELFONT(r0, 0x8058574f, 0x0) r1 = semget(0x3, 0x5, 0x0) semop(r1, 0x0, 0x0) msgget$private(0x0, 0x0) flock(r0, 0x8) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, &(0x7f0000000800)={0xfff, 0xf9}, 0x8) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_WRITEREGS(r2, 0xc5005601, &(0x7f00000000c0)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x40000000000, 0x80000000, 0x0, 0x0, 0xfffffffffffffffc]}}) ioctl$VMM_IOC_INFO(0xffffffffffffffff, 0xc0185603, &(0x7f0000001f00)={0x0, 0x0, 0x0})