# https://syzkaller.appspot.com/bug?id=442ac11f307d7b66334e59615b701de4f87ad323 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, 0x0, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) socket(0x2, 0x5, 0x0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) __semctl$GETNCNT(0x0, 0x1, 0x3, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r3, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) sendmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="477abc14f4b4ed9cc1b0182fb94ca66400fe91f47ffe84fa562c2e0840cfbb657fac3d9c1d61ae066dc5855129ee281112ca03291d691623c9094920cd2a615c8279d29cb911d12140ba9ad0c26c307ca4e29982794a53e915f50e85afc98db9a761b0a9e5e1eb770d63ddc0d1aa472fa0e40a36d6cea38b9d6a86775b4deab06d016d705bf5e7750d7d6fd903a0e5b7d617b914e17ffae8f3b3b8554bffb5d08387c944dc54fd55679366a477e0d4d420a22b", 0xb3}], 0x1, 0x0, 0x60}, 0x0)