# https://syzkaller.appspot.com/bug?id=66d11d71c4266e16f71ac6a16aba794a1ed75358 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":4,"sandbox":"","fault_call":-1,"close_fds":false,"segv":true} syz_execute_func(&(0x7f0000000000)="9826473e431c130f05f30f59bfd9130000c4a37bf0c53e41e2e9b55767660f6b32fb660f72d50f0fb8c4054e4eed751e0fa0450f0faa00001521b7ab34d1c4e10bf8c470c4c461cd583d00000081c66db712fd83397fd300c9dcdc0fbcaf00eae800f345d9c6acacc4c3214cb9a5605419c201b00b000000f08171a30b8a826ea80dd4d48cc7e8628f6808a3056f0000004e00c4618de3c0f526264788fe58c4a1dd7dbbbfdd5cc600d030a1c9fb110fd3c4a261b7e2") r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000280)={0x10000, 0x800, 0x4, 0x7, 0x11a286ef, 0x8000, 0x20, 0x7, 0x6862, 0x4, 0x3}, 0xb) listen(r0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x8008, &(0x7f0000000000), 0xffba)