# https://syzkaller.appspot.com/bug?id=e6ea4a97f963d77dc94e7a1e6524b78bbc8636b0 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:false Procs:1 Sandbox:none Fault:true FaultCall:7 FaultNth:52 EnableTun:false UseTmpDir:true EnableCgroups:true HandleSegv:false WaitRepeat:false Debug:false Repro:false} mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) chown(&(0x7f00000004c0)='./file0\x00', r0, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000280)='./file0\x00', 0x20) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)