# https://syzkaller.appspot.com/bug?id=b6aff64ebd79a1ee5ee7e787ca5b8673ba722226 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}, 0x1c) writev(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000600)=&(0x7f0000000000)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x11}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffdffd}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000000c0)=0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x8526, 0xfffffffffffffff8, 0x0, &(0x7f0000000000), 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair(0x1, 0x5, 0xa, &(0x7f0000000100)) freebsd12_shm_open(&(0x7f0000001840)='./file0\x00', 0x2, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x1c}, &(0x7f0000000140)=0x64) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x20, @empty, 0x20}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x4, @loopback, 0x4}, 0x1c) setsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r0, 0x84, 0x1b, &(0x7f00000002c0)=0x3, 0x4) sendto(r0, &(0x7f0000000480), 0x0, 0x20108, 0x0, 0x0)