# https://syzkaller.appspot.com/bug?id=08186da7e593654fb2a2b77f1718b59f8270d911 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} openat$ptmx(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x180, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN(r1, 0x6, 0x401, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x43b, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x1) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2, 0x0, @loopback}, 0x1c) listen(r2, 0x64)