# https://syzkaller.appspot.com/bug?id=23339f9bce112ccbd80811d91885d595392b3360 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) madvise(&(0x7f0000399000/0x3000)=nil, 0x3000, 0x17) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) write(r1, &(0x7f0000000000)="fa", 0xfffffdef) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) recvmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, &(0x7f0000004340)=[{0x0}, {&(0x7f00000022c0)=""/77, 0x4d}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/4096, 0x1000}], 0x4}}, {{&(0x7f00000053c0)=@l2tp, 0x80, 0x0}, 0x9}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) r2 = getpid() process_vm_readv(r2, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0)