# https://syzkaller.appspot.com/bug?id=0158c17275e728b63c58080b4ad95b28c3eecb71 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') r1 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = accept$inet(r2, 0x0, 0x0) signalfd4(r3, 0x0, 0x0, 0x80800) mmap(&(0x7f00009d3000/0x2000)=nil, 0x2000, 0x200000a, 0x4010, r3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, 0x0) exit(0x0) lseek(r0, 0x801, 0x0)