# https://syzkaller.appspot.com/bug?id=7e90ffa51645d388bc8b816640b97f47e020de76 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} syz_mount_image$vfat(&(0x7f0000003880), &(0x7f0000000000)='./file1\x00', 0x0, &(0x7f00000007c0)={[{@numtail}, {@fat=@check_strict}, {@fat=@umask={'umask', 0x3d, 0xbc18}}, {@uni_xlate}, {@uni_xlateno}, {@fat=@fmask={'fmask', 0x3d, 0x20}}, {@utf8no}, {@numtail}, {@shortname_win95}, {@shortname_lower}, {@shortname_winnt}, {@uni_xlate}, {@fat=@time_offset={'time_offset', 0x3d, 0x1fb}}, {@fat=@debug}, {@uni_xlateno}, {@shortname_win95}]}, 0x6, 0x2ad, &(0x7f00000008c0)="$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") mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @any, 0x3}, 0xe) listen(r1, 0x0) accept4$bt_l2cap(r1, 0x0, 0x0, 0x0)