# https://syzkaller.appspot.com/bug?id=ddab56f7ce353a16efd67158ba74f9e081d5aa7e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true,"callcomments":true} syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x12000c0, &(0x7f0000000780)={[{@user_xattr}, {@nombcache}, {@jqfmt_vfsv0}, {@usrquota}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xe}}, {@noauto_da_alloc}, {@init_itable_val={'init_itable', 0x3d, 0x5}}, {@user_xattr}, {@errors_remount}]}, 0xee, 0x593, &(0x7f0000000840)="$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") r0 = open_tree(0xffffffffffffff9c, 0x0, 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) listen(r1, 0x8) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0)