# https://syzkaller.appspot.com/bug?id=5430294158dee6e96c855261480baf117a5ba6fb # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140), 0x10, 0x800) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x10, r0, 0xf56b9000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x26e1, 0x0) pwrite64(r1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x61bf, 0x1c2dbffff}) unshare(0x6c060000) socket$inet6(0x10, 0x2, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)