# https://syzkaller.appspot.com/bug?id=af3a0728c8cbf6903ec2b0836441287cced00c1c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"","fault_call":-1} io_setup(0x0, &(0x7f0000000180)) inotify_init1(0x80800) accept4$inet6(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000380)=0x1c, 0x80000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r3 = socket$inet(0x2, 0xc682b15d8cd2eba0, 0x4) accept$inet6(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000480)=0x1c) r4 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x1, 0x1) r5 = dup3(r4, r3, 0x80000) fcntl$F_SET_RW_HINT(r5, 0x40c, &(0x7f00000000c0)=0x3) getsockopt$netlink(r5, 0x10e, 0x1, &(0x7f00000001c0)=""/199, &(0x7f00000002c0)=0xc7) r6 = semget(0x0, 0x3, 0x108) semctl$IPC_INFO(r6, 0x6, 0x3, &(0x7f0000000680)=""/215) accept4(r0, &(0x7f0000000bc0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000c40)=0x80, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'syz_tun\x00', r7}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001240)='/dev/ptmx\x00', 0x8080, 0x0) readv(r8, &(0x7f0000001340)=[{&(0x7f0000001280)=""/38, 0x26}, {&(0x7f00000012c0)=""/97, 0x61}], 0x2)