# https://syzkaller.appspot.com/bug?id=5ac24a3c5711973c287882c9539f095ac817a309 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$inet_sctp(0x2, 0x0, 0x84) r0 = setsid() r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00'}, 0x24) sendto(r1, 0x0, 0x0, 0x20101, &(0x7f00000002c0)=@in={0x10, 0x2, 0x3, @multicast1}, 0x10) open$dir(&(0x7f0000000080)='./file1\x00', 0x10242, 0x0) r2 = openat$filemon(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$FILEMON_SET_FD(r2, 0xc0045301, &(0x7f00000001c0)=r2) procctl$PROC_WXMAP_CTL(0x2, r0, 0x15, &(0x7f0000000040)=0x9) ioctl$FILEMON_SET_PID(r2, 0xc0045302, &(0x7f0000000000)=r0) sigtimedwait(&(0x7f0000000200)={[0xbf09, 0xfff, 0x9, 0x90]}, 0x0, &(0x7f0000000280)={0x2000004673, 0xb4}) cap_rights_limit(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x31, 0x0, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r4, &(0x7f00000001c0)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x1c) r5 = dup2(r3, r4) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x2, &(0x7f0000000140), 0x14) open$dir(0x0, 0x40000400000002c2, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0xf, &(0x7f0000000240)={0x0, 0xffffffff, 0x7}, &(0x7f0000000040)=0xc) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x23, &(0x7f0000000080)={@in6={{0x1c, 0x1c, 0x3, 0x92, @empty, 0x4}}, r7, 0x80, 0x7, 0x3}, &(0x7f0000000140)=0x90) setsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x15, &(0x7f0000000180)={r8}, 0x8) openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0)