# https://syzkaller.appspot.com/bug?id=c8688064f548f5fb30decc7c467b8aa5eb2bd58e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"close_fds":true,"segv":true} r0 = socket$inet(0x10, 0x3, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) fchmod(r1, 0x2a0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x40000000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmmsg$alg(r3, 0x0, 0x0, 0x800) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x899, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = open(0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r4, 0x0, 0x0) socket(0x10, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=@newlink={0xa8, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa8}}, 0x0) syz_emit_ethernet(0x6e, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000006000000000000000000aa000000001249db86924f82eb53a2b7ae459d15372e441969faad87f51950141261d1360c205c4c8f0614810292bbb105f9c8812a991874942faf1cef05221e9cc98b6ff5ed038b5e03e2255014df04b276dc1d04c5217bdd7275000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50001e84f846af96b1665f60f76640dd499dbd0fa2fde84909ab8cfd59bc14c0ec993b1346f24d4dd0707d4bd4e469267b916180158c2ee13b476a1790ffd72905e24cad9b60f0530704dd8199771ddc094eb2152b3fc29c481bb1ad634af3055b9569d4a4014133e7a9802bdb468f2aba4f931c6401629e194663af275c5483251109ac23fa66c440912118684b1bc0ef361e12a0a7a0fe3c56e61d0c4b393f06bf3d32d48ab1ecbf7520150498389290c022364cb86721efa05021723c4bc0b78e29a920880d613f4fd5b08958278e9865bf2e78de063967b2ee9a0b0b2963997b7694f92001229ecf000000000000"], 0x0) syz_open_procfs(0x0, 0x0)