# https://syzkaller.appspot.com/bug?id=bda19bf6b14e7fddccf28ac6f0205c7df6d8c32e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0)={0x0, 0xe9d4ee96847eaddd, 0x0, 0x7}, 0x10) sendmsg$inet6_sctp(r0, &(0x7f0000000100)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000340)="f7", 0x1}], 0x1}, 0x0) r1 = dup2(r0, r0) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet(0x2, 0x3, 0x0) r3 = socket(0x2, 0x1, 0x0) open$dir(&(0x7f0000000240)='./file1\x00', 0x400, 0x25) r4 = kqueue() kevent(r4, &(0x7f00000000c0)=[{0x4, 0xfffffffffffffffc, 0x4001, 0x2, 0x2000000004000000, 0x0, [0x0, 0x0, 0x4]}], 0x1, 0x0, 0x0, 0x0) extattr_set_link(&(0x7f0000000180)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfnn\xa2p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r5 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x1, 0x0, 0x0) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x104) r6 = __specialfd$eventfd(0x1, &(0x7f0000000540), 0x8) ioctl$FILEMON_SET_FD(r5, 0xc0045301, &(0x7f0000000000)=r6) r7 = setsid() ioctl$FILEMON_SET_PID(r5, 0xc0045302, &(0x7f00000002c0)=r7) open$dir(&(0x7f0000000240)='./file1\x00', 0x8000, 0x88) r8 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r8, &(0x7f0000000140), 0x0, 0x0) copy_file_range(r3, 0x0, r1, 0x0, 0xfffffffffffffffd, 0x0) vfork() rfork(0x0)