# https://syzkaller.appspot.com/bug?id=c24b0e34825024aa996935903817df565bb4034b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x1204, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x107, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) r1 = open(0x0, 0x80000000000206, 0x0) ftruncate(r1, 0xac8) ioctl$DIOCXCOMMIT(r1, 0xc0104452, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x10, 0x2, 0x2, @rand_addr=0x7fffffdf}, 0x10) listen(r2, 0x9)