# https://syzkaller.appspot.com/bug?id=f69b62825b83e1324a2824d26eef3e49c35e003a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":8,"sandbox":"","fault_call":-1,"close_fds":false} r0 = openat$net_ipifc_1_remote(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) fcntl$F_SETFD(r0, 0x2, 0x1) openat$net_tcp_1_remote(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) openat$proc_self_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000240)='/prof/kpctl\x00', 0xc, 0x3, 0x0)