# https://syzkaller.appspot.com/bug?id=5aa94f1e557739f58b236ca7c62e6e11af314694 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"","fault_call":-1} r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) mkdir(&(0x7f0000001940)='./file0\x00', 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$packet(r1, &(0x7f0000001300)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6}, 0xffffff52) capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)={0x1, 0x0, 0x4, 0x0, 0x0, 0x7fffffff}) chroot(&(0x7f000009a000)='./file0\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ftruncate(r1, 0x401) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) getresuid(&(0x7f0000002e00), &(0x7f0000002e40), &(0x7f0000002e80))