# https://syzkaller.appspot.com/bug?id=851fe012db565ade456cf85782c651b7d1624bd9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"sandbox":"","fault":true,"fault_call":16,"fault_nth":10,"close_fds":false} socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) mkdir(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x7) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xe002, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="400000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000120008000100687372001400020008000200", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB], 0x40}}, 0x0)