# https://syzkaller.appspot.com/bug?id=54f750697b2aadf8f41aee22f2877a5d19d71ad2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"close_fds":false,"tmpdir":true,"segv":true} compat_43_ocreat(&(0x7f0000000000)='./file0\x00', 0x100) r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0) connect(r0, 0x0, 0x0) syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000100)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x4, 0x0, 0x2, [{{0x9, 0x4, 0x0, 0x2, 0x1, 0x3, 0x1, 0x2, 0x8, {0x9, 0x21, 0x5, 0x44, 0x1, {0x22, 0x4fc}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0x8, 0x3}}}}}]}}]}}, 0x0) rename(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0/../file0\x00') syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000480)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3, 0x0, 0xf7, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0x2, 0x1, 0x1, {0x22, 0xfa3}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x3, 0x7, 0x4}}}}}]}}]}}, &(0x7f0000000700)={0xa, &(0x7f00000004c0)={0xa, 0x6, 0x201, 0x0, 0x8, 0x69, 0x10, 0x7}, 0x19, &(0x7f0000000500)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x2, "c8a3ca33399f658cd8747e1a8250aa2c"}]}, 0x4, [{0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x1001}}, {0x2, &(0x7f0000000580)=@string={0x2}}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x7}}, {0x0, 0x0}]}) syz_usb_connect(0x7, 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x5, [{0x4, &(0x7f0000000cc0)=@lang_id={0x4, 0x3, 0x3227}}, {0x1e, &(0x7f0000000d00)=@string={0x1e, 0x3, "2e0c08c6ee906e89d85e13249650e1d99f8d337595fe153979c7245c"}}, {0x65, &(0x7f0000000d40)=@string={0x65, 0x3, "5de1b64439b5f878106db093ce8796c72a09736217c43b23a17a5a5baf8be187bbc3fa5e5bbcf1d34dc9b176078c25ac0a7a97b95c8643bd2f09529a3274bdee0faa561fe77340f7a60f2c1da9c39ee3f06fcb65a065b2241922da0e8135f3604dc957"}}, {0x6b, &(0x7f0000000dc0)=@string={0x6b, 0x3, "d705654f76327c450f9019b02a9b076244dabe2694dd709666922db811598f10ac0291eeb294d98814abd6b8875ad454110f3bc83cc9a40fa8b5d4af57c6559d773207ed31f30b8c385b36841b67edb5099b68ad70854675e232bbd52b5de3d7b34215b0d4b24c4aaf"}}, {0x4, &(0x7f0000000e40)=@lang_id={0x4, 0x3, 0x427}}]}) r1 = open$dir(&(0x7f0000000f00)='./file0/../file0\x00', 0x0, 0x10) renameat(r1, &(0x7f0000000f40)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000f80)='./file0\x00') getsockname$inet(0xffffffffffffff9c, &(0x7f0000003880), 0x0) syz_usb_connect$hid(0xb, 0x36, &(0x7f0000003900)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x8, 0x10, 0x2, [{{0x9, 0x4, 0x0, 0x4, 0x2, 0x3, 0x1, 0x0, 0x6, {0x9, 0x21, 0x9, 0xfa, 0x1, {0x22, 0x467}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x3, 0x5, 0x4}}}}}]}}]}}, &(0x7f0000003ac0)={0xa, &(0x7f0000003940)={0xa, 0x6, 0x250, 0x6, 0x6, 0x9, 0x10, 0x7f}, 0x0, 0x0, 0x1, [{0x4, &(0x7f0000003a80)=@lang_id={0x4, 0x3, 0x40a}}]}) msgctl$IPC_RMID(0x0, 0x0)