# https://syzkaller.appspot.com/bug?id=00fadf9a6326e13098672b601d57f644cae380e9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","fault_call":-1,"close_fds":false} r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0xb8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@rand_addr=' \x01\x00', 'batadv_slave_1\x00'}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@inet=@iprange={{0x68}, {@ipv6=@rand_addr=' \x01\x00', @ipv6=@loopback, @ipv6=@private1, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x4}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000180)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x38, 0x0, 0xb, 0x301, 0x0, 0x0, {0x2}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x11, 0x1, '/proc/crypto\x00'}, @NFTA_COMPAT_REV={0x8}]}, 0x38}}, 0x0)