# https://syzkaller.appspot.com/bug?id=20185b6047d7371885412b56ff188be88f740eab # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","close_fds":false,"tmpdir":true,"segv":true} shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x3000) r0 = socket(0x1c, 0x10000001, 0x84) sendmsg$inet6_sctp(r0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f00000002c0)={'rack\x00', 0x1000}, 0x24) setsockopt$inet_tcp_int(r1, 0x6, 0x426, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x10, 0x2, 0x0, @rand_addr=0x80}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, 0x0, 0x0) shutdown(r1, 0x1) r2 = fork() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x44, 0x7ff, 0x10003}, 0x0, 0x9, 0x3fd, 0x40008020, 0x0, r2, 0x6}) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x20, 0xffffffffffffffff})