# https://syzkaller.appspot.com/bug?id=3514f48aabe8a6d61f3f93d0ea3ecc5544dc3176 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) r1 = openat$net_ether0_0_type(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) r2 = openat$net_tcp_clone(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) close(r2) r3 = openat$dev_capuse(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) r4 = openat$net_tcp_0_listen(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) r5 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) tap_fds(&(0x7f0000000880)=[{r0, 0x1, 0x101, 0x5dc, &(0x7f0000000140)={0x0, 0xf6, 0x1, 0x1, 0x2, 0x2}}, {r1, 0x3, 0x24f, 0x3, 0x0}, {0xffffffffffffffff, 0x2, 0x396, 0x8001, 0x0}, {r2, 0x1, 0x1, 0xb4, &(0x7f00000003c0)={0x0, 0xfffffff9, 0x0, 0xfffffdc4, 0x4, 0x1}}, {r3, 0x3, 0x600, 0x2, 0x0}, {r4, 0x3, 0x200, 0x80, 0x0}, {r5, 0x3, 0x2, 0x80000000, 0x0}, {0xffffffffffffffff, 0x1, 0x0, 0x7f, 0x0}, {0xffffffffffffffff, 0x3, 0x10, 0x2, 0x0}], 0x9)