# https://syzkaller.appspot.com/bug?id=61d80cc45077fcc43cec63681f58a989ec08dbf2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="0bcbe0ea70221dbb37f271264ecb9b95"}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0xfffffffffffffffe, 0x4c066c43, 0xfffffffffffffffe}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\"/c:\xae\xc4\x91\xb8x \xd7C\x8dl\x03\xe0\xf9\xf6\x15\xc6\xd6\xb7;\x88\xaaFo\xae2\xacE\xafy;\xecQ\xc1\f\x1dP\xaau\x10\xbc\xbf\xdb\x12\x98\xee\xeb\x14a#\"\x80\xcf/*p$\xdd\xd1\xbf\xa6p\xdf\xc8\xd5MPR+\xcb\x80Z\xe0\\\x1e\b~\x1d\xda\xa6\xdfiB*\xd4\'\xd0\xda\xb2\xfa,\xd62\xcfd\x81q\xb3\xe8\x96\x00.X\vAB\f\x95\x9e1$R\xfcQ\xd9\x9b\xfc\xa3\n\x8c\x99c\x031x!\xc4\x82[\xdbQ^Q\x84<\xfe\x94\xc0\x01\xcd6\xfc\f\xed2\x7f?ac\x92\x02\xaeB\xf3\xe7@ur<\xdf\xc69V\xe7\x94\xb1f\x1a\x00\x00\x00\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\"/c:\xae\xc4\x91\xb8x \xd7C\x8dl\x03\xe0\xf9\xf6\x15\xc6\xd6\xb7;\x88\xaaFo\xae2\xacE\xafy;\xecQ\xc1\f\x1dP\xaau\x10\xbc\xbf\xdb\x12\x98\xee\xeb\x14a#\"\x80\xcf/*p$\xdd\xd1\xbf\xa6p\xdf\xc8\xd5MPR+\xcb\x80Z\xe0\\\x1e\b~\x1d\xda\xa6\xdfiB*\xd4\'\xd0\xda\xb2\xfa,\xd62\xcfd\x81q\xb3\xe8\x96\x00.X\vAB\f\x95\x9e1$R\xfcQ\xd9\x9b\xfc\xa3\n\x8c\x99c\x031x!\xc4\x82[\xdbQ^Q\x84<\xfe\x94\xc0\x01\xcd6\xfc\f\xed2\x7f?ac\x92\x02\xaeB\xf3\xe7@ur<\xdf\xc69V\xe7\x94\xb1f\x1a\x00\x00\x00\x00') fcntl$getown(r2, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), 0x0)