# https://syzkaller.appspot.com/bug?id=94100cff4d9a032b284ae1f06f9a8baaddf0a419 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"namespace","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"tmpdir":true,"segv":true} r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2000011, r2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r3, 0x0, 0x10) r4 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000040)=ANY=[@ANYBLOB="6e61853100b8fd8a91000000ebdbb77487e9ff00000000000000000000000000001b1b0000000503000017ff00cc000000ac010000000000001004c1e090e1fe916dd282e0f36f000000000000095700001004000010"], 0x1) ptrace$setopts(0x4206, r4, 0x0, 0x0) getpid() mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1) wait4(0x0, 0x0, 0x0, 0x0) tkill(r4, 0x3c) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0x3, 0x4)