# https://syzkaller.appspot.com/bug?id=a0a1b089410f757dfbba9c0fa043d99bfe05b2d2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"","fault_call":-1,"close_fds":false} r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc5005601, &(0x7f00000000c0)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x40000000000, 0x80000000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], [{}, {}, {}, {}, {}, {0x0, 0x0, 0x200}]}}) execve(0x0, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmm\x00', 0x2, 0x0) ioctl$VMM_IOC_INFO(r1, 0xc0185603, &(0x7f00000010c0)={0x0, 0x0, 0x0}) getpgid(0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, 0x0, 0x0)