# https://syzkaller.appspot.com/bug?id=5e6e057ecfa926f45a6239bc36d8cac6cce9b555 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false} syz_mount_image$hfs(&(0x7f0000000000), &(0x7f0000000280)='./bus\x00', 0x100040a, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1, 0x264, &(0x7f0000000540)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0)