# https://syzkaller.appspot.com/bug?id=442ac11f307d7b66334e59615b701de4f87ad323 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, 0x0, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) socket(0x2, 0x5, 0x0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) __semctl$GETNCNT(0x0, 0x1, 0x3, &(0x7f0000000280)=""/242) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0}}, 0x1c) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r3, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000040)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000380)="477abc14f4b4ed9cc1b0182fb94ca66400fe91f47ffe84fa562c2e0840cfbb657fac3d9c1d61ae066dc5855129ee281112ca03291d691623c9094920cd2a615c8279d29cb911d12140ba9ad0c26c307ca4e29982794a53e915f50e85afc98db9a761b0a9e5e1eb770d63ddc0d1aa472fa0e40a36d6cea38b9d6a86775b4deab06d016d705bf5e7750d7d6fd903a0e5b7d617b914e17ffae8f3b3b8554bffb5d08387c944dc54fd55679366a477e0d4d420a22b", 0xb3}], 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="6000000000000000ffff000001000100519fa0ce1ff64c0fe468a4b69d097d7b9103cc600d7f449afb59059a9265a5e639653e02acd60a38e6cd1c13f063b7f4ebf7a6428d90531ccc483e9225e55b6a5f83f044b677777fae0ae20b848de300"], 0x60}, 0x0)