# https://syzkaller.appspot.com/bug?id=5429c5cdf83388793c638e122b2972c2b871d2a6 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = open$dir(0x0, 0x40000400000002c2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) poll(&(0x7f0000000180)=[{}, {r1}], 0x2, 0xff) bind(r1, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r2, 0x0, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) getsockopt$inet6_udplite(0xffffffffffffffff, 0x88, 0x2, 0x0, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) pipe2(0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) poll(&(0x7f0000000180)=[{}, {}], 0x2, 0xff) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0x100, 0x0, &(0x7f0000000340)) r3 = socket(0x2, 0x5, 0x0) connect$unix(r3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x1200, &(0x7f0000000340), &(0x7f0000000380)=0x1e0) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2, 0x9, @mcast2, 0xfffffffa}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@prinfo={0x14, 0x84, 0x7, {0x0, 0x5}}, @init={0x14, 0x84, 0x1, {0xf001, 0x2, 0x6, 0x7ff}}, @init={0x14, 0x84, 0x1, {0x4, 0xf000, 0x7fff, 0x64}}, @dstaddrv6={0x1c, 0x84, 0xa, @loopback}, @sndrcv={0x2c, 0x84, 0x2, {0x5, 0x9, 0x1000, 0xffff7640, 0x1, 0x7, 0xe7, 0x5}}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @sndinfo={0x1c, 0x84, 0x4, {0x9, 0xa00, 0x7, 0x6}}], 0xb0, 0x1}, 0x8)