# https://syzkaller.appspot.com/bug?id=c6e09f1460684d5ca2afdf19f6f77e5d27cc60e2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"vhci":true,"sysctl":true,"tmpdir":true,"segv":true} perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {0x0, 0x0, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000), 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0)