# https://syzkaller.appspot.com/bug?id=af3a0728c8cbf6903ec2b0836441287cced00c1c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"none","fault_call":-1,"tmpdir":true,"segv":true} r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x28000, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x401) ioctl$KDSKBLED(r0, 0x4b65, 0x2000000000) socketpair(0x9, 0x800, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000080)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="691310667be5ef886a50c5d3c1fc672e", 0x10) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/4096, 0x1000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000001140), &(0x7f0000001180)=0x14) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000011c0)=0xf7) ioctl$KDSKBLED(r1, 0x4b65, 0x3f) ioctl$KDMKTONE(r0, 0x4b30, 0x7) flistxattr(r1, &(0x7f0000001200)=""/4096, 0x1000) r3 = semget$private(0x0, 0x0, 0x20) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000002200)=[0x3f, 0x1, 0x4]) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000002240)) symlink(&(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)='./file0\x00') syz_read_part_table(0x5f27ecd0, 0x7, &(0x7f0000003740)=[{&(0x7f0000002300), 0x0, 0x1}, {&(0x7f00000023c0), 0x0, 0x8000}, {&(0x7f0000002440), 0x0, 0x3}, {&(0x7f00000024c0), 0x0, 0x1f}, {&(0x7f0000002540), 0x0, 0x10000}, {&(0x7f0000002640), 0x0, 0xfffffffffffffff9}, {&(0x7f0000003640), 0x0, 0xffffffffffffff01}]) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000003800)=0x0) fcntl$setown(r0, 0x8, r4) ioctl$TIOCCBRK(r0, 0x5428) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000003840)={0x10000, 0x9, 0x1}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003880)='/dev/ptmx\x00', 0x40000, 0x0) read(r5, &(0x7f00000038c0)=""/131, 0x83)