# https://syzkaller.appspot.com/bug?id=da3454d7951f7559f08e73ec4129429876c63f84 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","close_fds":false,"tmpdir":true,"segv":true} getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x2876, 0x40000800) open$dir(0x0, 0x80, 0x80) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000), 0x2cfea}], 0x1000000000000013) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x100) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x10, r0, 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x3000004) preadv(r0, &(0x7f0000001580)=[{0x0}], 0x1, 0x0) open$dir(&(0x7f0000000100)='./file1\x00', 0x3efd24235b162026, 0x200) fktrace(0xffffffffffffffff, 0x0, 0x4, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000806c1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) open(0x0, 0x0, 0x0) fktrace(r2, 0x4, 0x4, 0x0) r3 = syz_usb_connect$printer(0x4, 0x0, 0x0, &(0x7f0000000540)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x201, 0x81, 0xfb, 0x4, 0x8, 0x3e}, 0x0, 0x0, 0x4, [{0x2, &(0x7f0000000200)=@string={0x2}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x41b}}, {0x89, 0x0}, {0xc0, &(0x7f0000000440)=@string={0xc0, 0x3, "849494f8500c101b29956abd77ae97b1c6ba6322fc1b3742fef57a0edd479481a0a2c202dbcd76ceacf195e978bc82ea8ae0aa3ef989fc78e6b15b20ce633c6a7d65f32483450814ad397ad7b6977993deb41aeca3d7fb444f31786b2bad71ecf2eb7f88ed0ad7614b10ae0e77689771608e456ae500bd3a24a44e6cd5f23f9743c93eebf36f80ad5fb8aac788d5a67669829d278eee5ea567a067dbc2889e415905d6676c094fefa1e4d284f60fefecd1de1fc0b37a4651a4aaacdfe639"}}]}) connect$unix(r3, &(0x7f00000003c0)=@abs={0x0, 0x0, 0x1}, 0x8)