# https://syzkaller.appspot.com/bug?id=e494bdb480e8b5f3508998e4768e689e17be564f # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EXPLICIT_EOR(r0, 0x84, 0x1b, &(0x7f0000000040)=0x1ff, 0x4) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2, 0x3, @rand_addr}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f00000002c0), 0x1) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}, 0x10) open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0x0) chflags(&(0x7f0000000080)='./file0\x00', 0x30006)