# https://syzkaller.appspot.com/bug?id=15c4c046c8c6f9bf5ecc29df3be486f0d920529c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x1ffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000280)=@ipv4_newnexthop={0x40, 0x68, 0x2, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x2, 0x0, 0x28}, [@NHA_OIF={0x8}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @SEG6_LOCAL_BPF={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_BPF_PROG={0x8}}}, @NHA_BLACKHOLE={0x4}, @NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @ILA_ATTR_HOOK_TYPE={0x5, 0x9, 0x1}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x12, 0x7, &(0x7f00000006c0)=@raw=[@jmp={0x5, 0x1, 0x7, 0xb, 0xa, 0x8, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x6e}, @ldst={0x1, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffe0, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @ldst={0x0, 0x3, 0x3, 0x9, 0xb, 0xfffffffffffffff0, 0x8}, @exit], &(0x7f0000000940)='syzkaller\x00', 0x7, 0x6f, &(0x7f0000000980)=""/111, 0x41100, 0x18, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x2, 0x2, 0x4, 0x4}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@bridge_delneigh={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r0}}, 0x1c}}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f00000003c0)="600ee23865fbca32dd79a980818c9659937b16e6b1bab361e2e45a5edd115ed9352ec5e759423b8d5a4c3bd58504ed1763db25b6d289c8aed8a6d4ea5e0a3c6894f87080365ce91af8890655aa99c483dae3f41e7625bc4e29755bd9ad06883ec95e9b53181d60a1b1180fa94f9c85835a990795f6e81e7b884875d50115bf1d0c102cff0448c49645d5ea096f681af1eb0fd3cc694fb9410b6196a36e257501fa9ecc77b62329b258732269f1a51d2975fbb971705235927746ad7fb5045559073055916ddf326bc522b6fb7143c74136027e9256050ed92f1c92152249e6f37bd99079c9f8040e545a04ceeffd") pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000540)='f', 0x1}], 0x1, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000000c0)}, {&(0x7f00000004c0)}, {0x0}, {&(0x7f0000000180)="76585d4ae304b4dd84c125d954e872fe145dded15164dec522212ca9564ecb27d3a7ac5a2d9d3a469b60b702d852aff87b", 0x31}, {&(0x7f00000007c0)="88c8a68eb180be41f6a46200", 0xc}], 0x5}, 0x0)