# https://syzkaller.appspot.com/bug?id=3514f48aabe8a6d61f3f93d0ea3ecc5544dc3176 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) r1 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) tap_fds(&(0x7f0000000900)=[{r1, 0x1, 0x1, 0x1, &(0x7f0000000140)={0x0, 0xaadb, 0x0, 0x1, 0x200, 0x7}}, {0xffffffffffffffff, 0x3, 0x20, 0x8, 0x0}, {r0, 0x3, 0x8, 0x7fffffff, 0x0}, {0xffffffffffffffff, 0x2, 0x404, 0x4, 0x0}, {0xffffffffffffffff, 0x1, 0xf57d97516ec224e9, 0x5, 0x0}, {0xffffffffffffffff, 0x1, 0x500, 0x20, 0x0}, {0xffffffffffffffff, 0x3, 0x60, 0xffffffff, 0x0}, {0xffffffffffffffff, 0x0, 0x1, 0x231, 0x0}, {0xffffffffffffffff, 0x1, 0x100, 0xffffffff, 0x0}], 0x9) read(r0, &(0x7f0000000cc0)=""/168, 0xa8)