# https://syzkaller.appspot.com/bug?id=a2374a5541e385c5b4b098b85ac20ab37346c705 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":1,"sandbox":"","fault_call":-1} perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) fstatfs(r1, &(0x7f0000001380)=""/4096) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$packet(r1, &(0x7f0000001300)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6}, 0xffffff52) capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000001340)=0x7, 0x4) chroot(&(0x7f000009a000)='./file0\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fchmod(r0, 0x0) ftruncate(r1, 0x401) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0)