# https://syzkaller.appspot.com/bug?id=3514f48aabe8a6d61f3f93d0ea3ecc5544dc3176 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) tap_fds(&(0x7f00000008c0)=[{r0, 0x1, 0x3, 0x20, &(0x7f0000000300)={0x0, 0xffffffff, 0x1, 0x0, 0x0, 0x40}}, {0xffffffffffffffff, 0x2, 0x200, 0xc4, 0x0}, {0xffffffffffffffff, 0x3, 0x108, 0x1, 0x0}, {0xffffffffffffffff, 0x2, 0x89, 0x8, 0x0}, {0xffffffffffffffff, 0x3, 0x41, 0x35, 0x0}, {0xffffffffffffffff, 0x3, 0x400, 0x1, 0x0}, {0xffffffffffffffff, 0x2, 0x100, 0x7, 0x0}], 0x7) r1 = openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000d40)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) read(r1, 0x0, 0x0)