# https://syzkaller.appspot.com/bug?id=e0b7b83472eeaddb7837c75bef3957ccb8fa71f6 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"leak":true,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7000000024000b0effffffff0000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000040000200000700ff7f00e2ffffff000000000000ffffffff000000001c000580180001000180ffff0000e0ffffffffff"], 0x70}}, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0)