# https://syzkaller.appspot.com/bug?id=1c56327ba2b5b6ac0b9e75fb91b6aa51f7cca6af # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"","fault_call":-1,"tmpdir":true} r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x200000, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)) r1 = semget(0x1, 0x3, 0x234) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x815b, 0x200, 0x6, 0x1, 0x8001, 0x8bb1, 0x1, 0x8001, 0x8, 0x4]) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x3f) r2 = syz_open_pts(r0, 0x103002) ioctl$TIOCNXCL(r2, 0x540d) getpid() ioctl$KDSKBLED(r2, 0x4b65, 0x2) ioctl$TCSBRKP(r2, 0x5425, 0x7fffffff) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000240)) r3 = dup(r2) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000300)={0x8, 0x3, 0x6}) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000340)={0x1ff, 0x3, 0x6}) poll(&(0x7f0000000380)=[{r2, 0x1000}], 0x1, 0x400) sendto(r3, &(0x7f00000003c0), 0x0, 0x4000, &(0x7f00000013c0)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x4, 0x4, 0x1, 0x4}}, 0x80) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000001440)) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000001480), &(0x7f00000014c0)=0xc) io_setup(0xccaa, &(0x7f0000001500)) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000001540)={0x0, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x1, 0x7, [{{0x2, 0x4e20, @multicast1=0xe0000001}}, {{0x2, 0x4e22, @multicast2=0xe0000002}}, {{0x2, 0x4e23, @loopback=0x7f000001}}, {{0x2, 0x4e20}}, {{0x2, 0x4e24, @multicast2=0xe0000002}}, {{0x2, 0x4e21, @multicast2=0xe0000002}}, {{0x2, 0x4e20}}]}, 0x410) ioctl$TIOCSTI(r3, 0x5412, 0x1ff) write$binfmt_aout(r2, &(0x7f0000001980)={{0x10b, 0x0, 0x8, 0x302, 0x312, 0x5, 0x11d, 0x9af}, "", [[], [], [], [], [], [], [], [], []]}, 0x920)