# https://syzkaller.appspot.com/bug?id=f69b62825b83e1324a2824d26eef3e49c35e003a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"sandbox":"","fault_call":-1} openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) r0 = openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) read(r0, &(0x7f0000000180)=""/136, 0x88) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000240)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f00000002c0)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000440)='/net/ether0/clone\x00', 0x12, 0x3, 0x0)