# https://syzkaller.appspot.com/bug?id=3153e27944712d6149bbd81691fdcdc7cbdc0e60 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"namespace","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true,"waitrepeat":true} perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000040)={@mcast2, 0x0}, &(0x7f0000000080)=0x80) connect$packet(r1, &(0x7f0000001300)={0x11, 0x19, r2, 0x1, 0x2, 0x6}, 0xffffff52) chroot(&(0x7f000009a000)='./file0\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) getdents64(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fchmod(r0, 0x0) ftruncate(r1, 0x401) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0)