# https://syzkaller.appspot.com/bug?id=a3d5cee035800a17bb033d6ab725d02a4fc61878 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} ioctl$BIOCSETIF(0xffffffffffffff9c, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) r0 = socket(0x2, 0x2, 0x0) ioctl$FIONREAD(r0, 0xc0206923, &(0x7f00000001c0)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0xe8, 0x0) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000200)={'tap', 0x0}) ioctl$FIONREAD(r2, 0x8004745d, &(0x7f0000000200)) r3 = socket(0x2, 0x2, 0x0) ioctl$FIONREAD(r3, 0x8020690c, &(0x7f00000001c0)) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff}) r4 = socket(0x2, 0x2, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$FIONREAD(r4, 0x8040691a, &(0x7f00000001c0)) r5 = socket(0x2, 0x2, 0x0) ioctl$FIONREAD(r5, 0x80206979, &(0x7f00000001c0))