# https://syzkaller.appspot.com/bug?id=f3a6c0ac070fb6c47551a4339490591fd7101de1 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"netdev":true,"close_fds":true,"tmpdir":true} syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000140)="03000300000000000000ab5d71aced", 0xf, 0x0, &(0x7f0000000000)={0x11, 0x8100, r2, 0x1, 0x0, 0x6, @random="e131b6ac9c26"}, 0x14) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, 0x0}, 0x5}], 0x2, 0x10022, 0x0) (async) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x5}], 0x2, 0x10022, 0x0)