# https://syzkaller.appspot.com/bug?id=0fc2368907b1aca349f61f42d51a690ecf5d838b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false,"tmpdir":true,"segv":true} r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) bind(0xffffffffffffffff, 0x0, 0x0) r1 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, 0x0) open$dir(0x0, 0x200, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) openat$bpf(0xffffffffffffff9c, 0x0, 0x4011d38001af5d5c, 0x0) r3 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, 0x0, 0x0) connect$inet(r3, 0x0, 0x0) vfork() lio_listio(0x0, 0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r5 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$kbd(0xffffffffffffff9c, 0x0, 0x40, 0x0) vfork() lio_listio(0x0, 0x0, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r7, 0x0, 0x4b, 0x0, 0x0) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40044b09, 0xffff) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_mreqn(r8, 0x0, 0x9, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet_mreqn(r8, 0x0, 0xc, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x2e, 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc040636a, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x800, 0x0, 0x0) r9 = socket(0x1c, 0x1, 0x0) shutdown(r9, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x22, 0x0, 0x0) vfork() semget(0x2, 0x0, 0x0)