# https://syzkaller.appspot.com/bug?id=d6533ca4afc571e2db183c47b749ea44c1c5c2db # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"namespace","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true,"waitrepeat":true} mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e24, 0x32, @mcast1={0xff, 0x1, [], 0x1}, 0xc000000000000}, {0xa, 0x4e21, 0x4f, @empty, 0x40}, 0x200, [0x4, 0x1, 0x6, 0xffff, 0x6, 0xac9d, 0x3, 0x404000]}, 0x5c) write$cgroup_pid(r0, &(0x7f0000000080)={[0x37, 0x33, 0x38, 0x34, 0x38, 0x32]}, 0x6) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x10040, &(0x7f0000000980)) r1 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) write$binfmt_elf32(r1, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) ioctl$KDMKTONE(r0, 0x4b30, 0x7b149fb3) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000018c0)="620f42bb99feef653325ff1c498a0e8bac96bc888461bc3f0713caeb1e5e343923cf46efcdcf8da6cdf675cc5ebe1f02086b1db79caf7093e1d8ed46d572c19bc6a83f728e85508507c914c65f4a14c423dfc98912dc7ba7a7", 0x59}], 0x1, 0x0)