# https://syzkaller.appspot.com/bug?id=ac2e142b3f17f41ebb0fcc47278a94d466a25a1e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) fwstat(r0, 0x0, 0x0, 0x0) r1 = openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000001040)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$prof_kptrace(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000001140)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000001300)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000001340)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) r2 = openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f00000013c0)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000001480)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$proc_self_status(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) fd2path(r1, &(0x7f0000001580)=""/196, 0xc4) tap_fds(&(0x7f0000001740)=[{r2, 0x1, 0x3, 0x2, &(0x7f0000001700)={&(0x7f0000001680)="5aa1f2575243c3d9d39ce7ac933726c9b2a357ae024c4dd70c238bbe8b2fc15dd73811d930a578886ef27cc8a382e4b176188b2fa972277f2038e51cd2c62e85d1b71b02690ecc9ef79d338ff334f024", 0xc5, 0x1, 0x5, 0x6a, 0x101}}], 0x1) openat$net_ipifc_1_data(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/self/notepg\x00', 0x12, 0x1, 0x0)