# https://syzkaller.appspot.com/bug?id=3514f48aabe8a6d61f3f93d0ea3ecc5544dc3176 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) tap_fds(&(0x7f0000000300)=[{r0, 0x1, 0x201, 0x2, &(0x7f0000000100)={0x0, 0xffffffff, 0x0, 0x0, 0x10000, 0x8001}}, {0xffffffffffffffff, 0x3, 0x241, 0x6, 0x0}, {0xffffffffffffffff, 0x3, 0x4a, 0x8, 0x0}], 0x3) notify(0xffffffffffffffff, 0x31, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) r1 = openat$net_ether0_0_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) abort_sysc_fd(0xffffffffffffffff)