# https://syzkaller.appspot.com/bug?id=30939bb216ed5ff65e74493fef7e7a7cde17404e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8802, 0x0) ioctl$DIOCOSFPADD(r0, 0xc088444f, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_NODELAY(r1, 0x84, 0x4, 0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket(0x2, 0x5, 0x0) dup2(r3, r2) sendmsg$inet6_sctp(r2, 0x0, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r4, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, 0x0, 0x0) sendmsg$inet6_sctp(r1, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1, 0x7, @remote={0xfe, 0x80, [], 0x0}, 0x7ff}, 0x1c, &(0x7f00000002c0)=[{&(0x7f00000001c0)="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", 0xfe}], 0x1, &(0x7f0000000380)=[@dstaddrv4={0x10, 0x84, 0x9, @loopback}, @init={0x14, 0x84, 0x1, {0x5, 0x108, 0x7f}}, @dstaddrv4={0x10, 0x84, 0x9, @multicast1}, @prinfo={0x14, 0x84, 0x7, {0x1, 0x7f}}], 0x48, 0x1}, 0x180) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000080)={0x600, 0x4000, 0x5, 0x1000}, 0x10)