# https://syzkaller.appspot.com/bug?id=61d80cc45077fcc43cec63681f58a989ec08dbf2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"namespace","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"tmpdir":true,"segv":true} fchown(0xffffffffffffffff, 0x0, 0xee00) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c00406cb68030000d80000009801000090020000000000002804000028040000280400002804000028040000060000000000000000000000ac141400ac14140000000000000000000000000000000000000000000000000069666230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040005450524f58590000000000000000000000000000000000000000000000010000000000000000fe8000000000000000000000020000bb00000000000000000000000000000000000000fffffff4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c0000000000000000000000000000000000000dd22f7083a7692cda05b08f2cfa5000000000000002800445343500000000000000000000000000000000000000000000000000000000000000000000000000000e00000020000000000000000766c616e3000000000000000000000006e723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1414aaac1414bb00000000000000007465716c3000000000000000000000007465616d5f736c6176655f300000000000000000000000000000eeffffff00000000000000000000000000000000000000000000000000000000faffffffffffffff00000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040005450524f58590000000000000000000000000000000000000000000000010000000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000d2acc60146a810a40000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000009561f3e66cc10751514686591845259a927da2371c5bfc2d960d400f59ac7088dfe9d83c776f886e9989c385d6e2a7e7a5ee16681313b5bc269496e774a46520ebd27239182643a9b2ce002f6ddda33fe7514c0eef3751135a5012d26dafa959624beee5694ed27a5e93088611a52f1fcbf310f5d54579b5edfce244f3c8e9d1b97f678c03f781eaa79fe8b99959bd27645201f8"], 0x520) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, 0x0)