# https://syzkaller.appspot.com/bug?id=0bbf254e7444ff971a84da2e5d570e37a27e4724 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"vhci":true,"wifi":true,"sysctl":true,"tmpdir":true,"segv":true} openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x286c00, 0x0) r0 = memfd_create(&(0x7f0000000100)='/s\xcb2\x1d\b\x00\xe8\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xbd\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa7,\xa6<\x13\xfe\xa8\xc3\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1s\xeb\x0f\x8e\xe93\xf2\xd6\x03\'\xb0(\x8f\xaf\f7\n$\x03\x89\xf7\xb6\xcd\xd0\xd2\x86i\xb6o\x9e\x1e\xad\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x1f?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J', 0x0) ftruncate(r0, 0x40003) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141142, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) lstat(&(0x7f00000018c0)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x48, &(0x7f0000001a00)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fsmagic={'fsmagic', 0x3d, 0x97}}, {@seclabel='seclabel'}]}}) syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0xffffff10)