# https://syzkaller.appspot.com/bug?id=7f8472a231571593c4ceb827f16396c452cacd27 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true,"callcomments":true} mkdir(0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_usb_connect(0x0, 0x81, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000a7420040ab0501030001010203010902240001000000000904000002aad45c0009058e02000000000009050a06"], 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_256={{0x303, 0x3a}, "03c0000000000500", "9e8ecc7bb535277672a2eff75b24866882519a85ef828f711330ff2bb17b5508", "dc5db43f", "a1034200000102a0"}, 0x38) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$usbfs(&(0x7f0000000800), 0xfffffffffffffffe, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000540)={"c34b88dbac0a86dda4474194bd079a6e", 0x0, 0x0, {0xf2, 0x8}, {0xffffffffffffffff, 0xe3}, 0x0, [0x8, 0x4, 0x6, 0x1, 0x5, 0x53, 0x6, 0xabd, 0x5f, 0x7fffffff, 0x5, 0x7, 0x241, 0x1, 0xffffffff, 0x8]})