# https://syzkaller.appspot.com/bug?id=94100cff4d9a032b284ae1f06f9a8baaddf0a419 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"tmpdir":true,"segv":true} r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="5fb6a4956f3639176e617400000100000000000100000000e4dbb7748700000000000000000000001beeffff0403000000000000cc000000ac010000000000001004c1e090e1fe328af4faf2ceea5bc551cc3d95c4f1"], 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10010}, 0xc, 0x0}, 0x80) socket$inet6(0xa, 0x602000000802, 0xfb1) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004f80)={{{@in=@local, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@mcast2}}, 0x0)