# https://syzkaller.appspot.com/bug?id=36ff00b72ca3a85275df08c14982093840dd358d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2, 0x3, @rand_addr}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f00000002c0), 0x1) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000100)=ANY=[], 0x9) r3 = fcntl$dupfd(r2, 0x0, r1) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000400)="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", 0xffe6}], 0x1, 0x0}, 0x4) symlink(&(0x7f0000000040)='.\x00', &(0x7f0000000200)='./file0\x00') chflags(&(0x7f0000000080)='./file0\x00', 0x41414)