# https://syzkaller.appspot.com/bug?id=630ebccafbca582c59fd98f6474a05fcfe09505b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"","fault_call":-1} r0 = getpgrp(0x0) ptrace$poke(0x5, r0, &(0x7f0000000000), 0x7) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/cgroup\x00') r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000180)=0x9) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f00000001c0)={0xfffffffffffffffb, 0x1, 0x6}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000240)={'nat\x00'}, &(0x7f00000002c0)=0x54) r4 = syz_open_procfs(r3, &(0x7f0000000300)='fd/4\x00') read$eventfd(r4, &(0x7f0000000800), 0x8) read$eventfd(r4, &(0x7f0000000e40), 0x8)